From 3075e875bd746a955aa8199886176e0f0555aa0b Mon Sep 17 00:00:00 2001 From: Omkar Khatavkar Date: Mon, 8 Jan 2024 20:42:30 +0530 Subject: [PATCH] remove the unused testimony tokens & none used for reporting (#13479) --- scripts/polarion-test-case-upload.sh | 5 + testimony.yaml | 23 --- tests/foreman/api/test_activationkey.py | 18 +-- tests/foreman/api/test_ansible.py | 5 - tests/foreman/api/test_architecture.py | 5 - tests/foreman/api/test_audit.py | 5 - tests/foreman/api/test_bookmarks.py | 31 ++-- tests/foreman/api/test_capsulecontent.py | 27 ---- tests/foreman/api/test_classparameters.py | 5 - tests/foreman/api/test_computeprofile.py | 15 -- .../api/test_computeresource_azurerm.py | 22 +-- tests/foreman/api/test_computeresource_gce.py | 17 +-- .../api/test_computeresource_libvirt.py | 23 --- tests/foreman/api/test_contentcredentials.py | 5 - tests/foreman/api/test_contentview.py | 77 ---------- tests/foreman/api/test_contentviewfilter.py | 53 ------- tests/foreman/api/test_contentviewversion.py | 61 ++------ tests/foreman/api/test_convert2rhel.py | 9 +- tests/foreman/api/test_discoveredhost.py | 25 ++-- tests/foreman/api/test_discoveryrule.py | 5 - tests/foreman/api/test_docker.py | 12 -- tests/foreman/api/test_environment.py | 10 -- tests/foreman/api/test_errata.py | 47 +----- tests/foreman/api/test_filter.py | 5 - tests/foreman/api/test_foremantask.py | 5 - tests/foreman/api/test_host.py | 65 -------- tests/foreman/api/test_hostcollection.py | 9 -- tests/foreman/api/test_hostgroup.py | 25 ---- tests/foreman/api/test_http_proxy.py | 7 - tests/foreman/api/test_ldapauthsource.py | 5 - .../foreman/api/test_lifecycleenvironment.py | 15 +- tests/foreman/api/test_location.py | 11 -- tests/foreman/api/test_media.py | 7 - tests/foreman/api/test_multiple_paths.py | 5 - tests/foreman/api/test_operatingsystem.py | 8 - tests/foreman/api/test_organization.py | 10 -- .../foreman/api/test_oscap_tailoringfiles.py | 5 - tests/foreman/api/test_oscappolicy.py | 7 - tests/foreman/api/test_partitiontable.py | 5 - tests/foreman/api/test_permission.py | 5 - tests/foreman/api/test_ping.py | 5 - tests/foreman/api/test_product.py | 15 -- tests/foreman/api/test_provisioning.py | 5 - .../foreman/api/test_provisioningtemplate.py | 12 +- tests/foreman/api/test_puppetbootstrap.py | 6 - tests/foreman/api/test_registration.py | 7 - tests/foreman/api/test_remoteexecution.py | 5 - tests/foreman/api/test_reporttemplates.py | 5 - tests/foreman/api/test_repositories.py | 21 +-- tests/foreman/api/test_repository.py | 45 +----- tests/foreman/api/test_repository_set.py | 5 - tests/foreman/api/test_rhc.py | 8 +- tests/foreman/api/test_rhcloud_inventory.py | 13 +- tests/foreman/api/test_rhsm.py | 5 - tests/foreman/api/test_role.py | 36 ----- tests/foreman/api/test_settings.py | 13 +- tests/foreman/api/test_smartproxy.py | 37 +---- tests/foreman/api/test_subnet.py | 21 --- tests/foreman/api/test_subscription.py | 5 - tests/foreman/api/test_syncplan.py | 41 ----- .../foreman/api/test_template_combination.py | 5 - tests/foreman/api/test_templatesync.py | 66 ++++----- tests/foreman/api/test_user.py | 18 --- tests/foreman/api/test_usergroup.py | 7 - tests/foreman/api/test_webhook.py | 5 - tests/foreman/cli/test_abrt.py | 20 +-- tests/foreman/cli/test_activationkey.py | 72 ++------- tests/foreman/cli/test_ansible.py | 7 +- tests/foreman/cli/test_architecture.py | 5 - tests/foreman/cli/test_auth.py | 26 +--- tests/foreman/cli/test_bootdisk.py | 5 - tests/foreman/cli/test_bootstrap_script.py | 7 +- tests/foreman/cli/test_capsule.py | 22 +-- tests/foreman/cli/test_capsule_installer.py | 6 - tests/foreman/cli/test_classparameters.py | 5 - .../cli/test_computeresource_azurerm.py | 18 +-- tests/foreman/cli/test_computeresource_ec2.py | 7 - .../cli/test_computeresource_libvirt.py | 31 ---- tests/foreman/cli/test_computeresource_osp.py | 5 - .../foreman/cli/test_computeresource_rhev.py | 8 - .../cli/test_computeresource_vmware.py | 5 - .../foreman/cli/test_container_management.py | 7 +- tests/foreman/cli/test_contentaccess.py | 7 - tests/foreman/cli/test_contentcredentials.py | 31 ---- tests/foreman/cli/test_contentview.py | 123 ++------------- tests/foreman/cli/test_contentviewfilter.py | 11 -- tests/foreman/cli/test_discoveredhost.py | 9 +- tests/foreman/cli/test_discoveryrule.py | 32 ---- tests/foreman/cli/test_docker.py | 11 -- tests/foreman/cli/test_domain.py | 7 - tests/foreman/cli/test_environment.py | 7 - tests/foreman/cli/test_errata.py | 17 --- tests/foreman/cli/test_fact.py | 5 - tests/foreman/cli/test_filter.py | 5 - tests/foreman/cli/test_foremantask.py | 6 - tests/foreman/cli/test_globalparam.py | 5 - tests/foreman/cli/test_hammer.py | 5 - tests/foreman/cli/test_host.py | 83 +---------- tests/foreman/cli/test_hostcollection.py | 13 -- tests/foreman/cli/test_hostgroup.py | 20 +-- tests/foreman/cli/test_http_proxy.py | 13 +- tests/foreman/cli/test_installer.py | 5 - tests/foreman/cli/test_jobtemplate.py | 6 - tests/foreman/cli/test_ldapauthsource.py | 5 - tests/foreman/cli/test_leapp_client.py | 7 +- .../foreman/cli/test_lifecycleenvironment.py | 5 - tests/foreman/cli/test_location.py | 6 - tests/foreman/cli/test_logging.py | 7 - tests/foreman/cli/test_medium.py | 6 - tests/foreman/cli/test_model.py | 5 - tests/foreman/cli/test_operatingsystem.py | 8 - tests/foreman/cli/test_organization.py | 30 ---- tests/foreman/cli/test_oscap.py | 5 - .../foreman/cli/test_oscap_tailoringfiles.py | 5 - tests/foreman/cli/test_ostreebranch.py | 7 - tests/foreman/cli/test_partitiontable.py | 7 - tests/foreman/cli/test_ping.py | 5 - tests/foreman/cli/test_product.py | 8 +- tests/foreman/cli/test_provisioning.py | 5 - .../foreman/cli/test_provisioningtemplate.py | 9 -- tests/foreman/cli/test_puppetclass.py | 5 - tests/foreman/cli/test_realm.py | 5 - tests/foreman/cli/test_registration.py | 5 - tests/foreman/cli/test_remoteexecution.py | 23 +-- tests/foreman/cli/test_report.py | 5 - tests/foreman/cli/test_reporttemplates.py | 8 - tests/foreman/cli/test_repository.py | 94 ++++-------- tests/foreman/cli/test_repository_set.py | 5 - tests/foreman/cli/test_rhcloud_insights.py | 5 - tests/foreman/cli/test_rhcloud_inventory.py | 33 +---- tests/foreman/cli/test_role.py | 6 - tests/foreman/cli/test_satellitesync.py | 27 ---- tests/foreman/cli/test_settings.py | 11 -- tests/foreman/cli/test_sso.py | 5 - tests/foreman/cli/test_subnet.py | 5 - tests/foreman/cli/test_subscription.py | 7 - tests/foreman/cli/test_syncplan.py | 23 --- tests/foreman/cli/test_templatesync.py | 13 +- tests/foreman/cli/test_user.py | 18 +-- tests/foreman/cli/test_usergroup.py | 13 -- .../cli/test_vm_install_products_package.py | 5 - tests/foreman/cli/test_webhook.py | 5 - tests/foreman/destructive/conftest.py | 1 - tests/foreman/destructive/test_ansible.py | 5 - tests/foreman/destructive/test_auth.py | 6 - tests/foreman/destructive/test_capsule.py | 7 - .../destructive/test_capsule_loadbalancer.py | 8 +- .../destructive/test_capsulecontent.py | 6 - tests/foreman/destructive/test_clone.py | 5 - tests/foreman/destructive/test_contenthost.py | 7 - tests/foreman/destructive/test_contentview.py | 5 - .../destructive/test_discoveredhost.py | 7 +- .../foreman/destructive/test_foreman_rake.py | 7 +- .../destructive/test_foreman_service.py | 7 +- tests/foreman/destructive/test_host.py | 7 - tests/foreman/destructive/test_infoblox.py | 7 +- tests/foreman/destructive/test_installer.py | 9 -- .../foreman/destructive/test_katello_agent.py | 11 -- .../destructive/test_katello_certs_check.py | 6 - .../destructive/test_ldap_authentication.py | 13 -- .../destructive/test_ldapauthsource.py | 5 - .../destructive/test_leapp_satellite.py | 5 - tests/foreman/destructive/test_ping.py | 5 - .../foreman/destructive/test_puppetplugin.py | 5 - tests/foreman/destructive/test_realm.py | 5 - .../destructive/test_remoteexecution.py | 5 - tests/foreman/destructive/test_rename.py | 6 - tests/foreman/destructive/test_repository.py | 5 - tests/foreman/endtoend/test_api_endtoend.py | 5 - tests/foreman/endtoend/test_cli_endtoend.py | 5 - tests/foreman/installer/test_infoblox.py | 13 +- tests/foreman/installer/test_installer.py | 31 ---- tests/foreman/longrun/test_inc_updates.py | 7 - tests/foreman/longrun/test_n_1_upgrade.py | 6 - tests/foreman/longrun/test_oscap.py | 27 +--- tests/foreman/maintain/test_advanced.py | 5 - tests/foreman/maintain/test_backup_restore.py | 6 +- tests/foreman/maintain/test_health.py | 5 - .../foreman/maintain/test_maintenance_mode.py | 5 - tests/foreman/maintain/test_offload_DB.py | 9 +- tests/foreman/maintain/test_packages.py | 6 - tests/foreman/maintain/test_service.py | 5 - tests/foreman/maintain/test_upgrade.py | 5 - tests/foreman/sanity/test_bvt.py | 7 - tests/foreman/sys/test_dynflow.py | 5 - tests/foreman/sys/test_fam.py | 7 - tests/foreman/sys/test_katello_certs_check.py | 6 - tests/foreman/sys/test_pulp3_filesystem.py | 5 - tests/foreman/ui/test_activationkey.py | 77 +--------- tests/foreman/ui/test_ansible.py | 11 +- tests/foreman/ui/test_architecture.py | 7 - tests/foreman/ui/test_audit.py | 15 -- tests/foreman/ui/test_bookmarks.py | 23 +-- tests/foreman/ui/test_branding.py | 9 +- tests/foreman/ui/test_computeprofiles.py | 7 - tests/foreman/ui/test_computeresource.py | 19 --- .../ui/test_computeresource_azurerm.py | 11 -- tests/foreman/ui/test_computeresource_ec2.py | 11 +- tests/foreman/ui/test_computeresource_gce.py | 13 +- .../ui/test_computeresource_libvirt.py | 9 -- .../foreman/ui/test_computeresource_vmware.py | 17 --- tests/foreman/ui/test_config_group.py | 7 - tests/foreman/ui/test_containerimagetag.py | 6 - tests/foreman/ui/test_contentcredentials.py | 41 ----- tests/foreman/ui/test_contenthost.py | 59 -------- tests/foreman/ui/test_contentview.py | 140 ------------------ tests/foreman/ui/test_dashboard.py | 26 +--- tests/foreman/ui/test_discoveredhost.py | 5 - tests/foreman/ui/test_discoveryrule.py | 12 +- tests/foreman/ui/test_domain.py | 15 -- tests/foreman/ui/test_errata.py | 57 ++----- tests/foreman/ui/test_hardwaremodel.py | 8 - tests/foreman/ui/test_host.py | 89 +---------- tests/foreman/ui/test_hostcollection.py | 39 +---- tests/foreman/ui/test_hostgroup.py | 11 +- tests/foreman/ui/test_http_proxy.py | 18 +-- tests/foreman/ui/test_jobinvocation.py | 19 +-- tests/foreman/ui/test_jobtemplate.py | 7 - tests/foreman/ui/test_ldap_authentication.py | 25 ++-- tests/foreman/ui/test_lifecycleenvironment.py | 19 +-- tests/foreman/ui/test_location.py | 13 -- tests/foreman/ui/test_media.py | 7 - tests/foreman/ui/test_modulestreams.py | 7 - tests/foreman/ui/test_operatingsystem.py | 9 -- tests/foreman/ui/test_organization.py | 23 +-- tests/foreman/ui/test_oscapcontent.py | 13 +- tests/foreman/ui/test_oscappolicy.py | 11 +- tests/foreman/ui/test_oscaptailoringfile.py | 7 - tests/foreman/ui/test_package.py | 15 -- tests/foreman/ui/test_partitiontable.py | 19 --- tests/foreman/ui/test_product.py | 13 +- tests/foreman/ui/test_provisioningtemplate.py | 17 +-- tests/foreman/ui/test_puppetclass.py | 7 - tests/foreman/ui/test_puppetenvironment.py | 9 -- tests/foreman/ui/test_remoteexecution.py | 65 ++------ tests/foreman/ui/test_reporttemplates.py | 12 +- tests/foreman/ui/test_repository.py | 69 ++------- tests/foreman/ui/test_rhc.py | 9 +- tests/foreman/ui/test_rhcloud_insights.py | 15 +- tests/foreman/ui/test_rhcloud_inventory.py | 11 +- tests/foreman/ui/test_role.py | 7 - tests/foreman/ui/test_settings.py | 28 +--- tests/foreman/ui/test_smartclassparameter.py | 15 -- tests/foreman/ui/test_subnet.py | 7 - tests/foreman/ui/test_subscription.py | 15 -- tests/foreman/ui/test_sync.py | 15 +- tests/foreman/ui/test_syncplan.py | 13 -- tests/foreman/ui/test_templatesync.py | 11 +- tests/foreman/ui/test_user.py | 27 ---- tests/foreman/ui/test_usergroup.py | 9 -- tests/foreman/ui/test_webhook.py | 5 - tests/foreman/virtwho/api/test_esx.py | 25 ---- tests/foreman/virtwho/api/test_hyperv.py | 11 -- tests/foreman/virtwho/api/test_kubevirt.py | 11 -- tests/foreman/virtwho/api/test_libvirt.py | 11 -- tests/foreman/virtwho/api/test_nutanix.py | 15 -- tests/foreman/virtwho/cli/test_esx.py | 29 ---- tests/foreman/virtwho/cli/test_hyperv.py | 11 -- tests/foreman/virtwho/cli/test_kubevirt.py | 11 -- tests/foreman/virtwho/cli/test_libvirt.py | 11 -- tests/foreman/virtwho/cli/test_nutanix.py | 15 -- tests/foreman/virtwho/conftest.py | 1 - tests/foreman/virtwho/ui/test_esx.py | 33 +---- tests/foreman/virtwho/ui/test_hyperv.py | 11 -- tests/foreman/virtwho/ui/test_kubevirt.py | 11 -- tests/foreman/virtwho/ui/test_libvirt.py | 11 -- tests/foreman/virtwho/ui/test_nutanix.py | 15 -- tests/upgrades/test_activation_key.py | 5 - tests/upgrades/test_bookmarks.py | 13 +- tests/upgrades/test_capsule.py | 5 - tests/upgrades/test_classparameter.py | 5 - tests/upgrades/test_client.py | 5 - tests/upgrades/test_contentview.py | 5 - tests/upgrades/test_errata.py | 5 - tests/upgrades/test_host.py | 9 +- tests/upgrades/test_hostcontent.py | 5 - tests/upgrades/test_hostgroup.py | 5 - tests/upgrades/test_performance_tuning.py | 5 - tests/upgrades/test_provisioningtemplate.py | 5 - tests/upgrades/test_puppet.py | 5 - tests/upgrades/test_remoteexecution.py | 5 - tests/upgrades/test_repository.py | 5 - tests/upgrades/test_role.py | 5 - tests/upgrades/test_satellite_maintain.py | 5 - tests/upgrades/test_satellitesync.py | 5 - tests/upgrades/test_subnet.py | 5 - tests/upgrades/test_subscription.py | 5 - tests/upgrades/test_syncplan.py | 5 - tests/upgrades/test_user.py | 5 - tests/upgrades/test_usergroup.py | 5 - tests/upgrades/test_virtwho.py | 5 - 291 files changed, 338 insertions(+), 3944 deletions(-) diff --git a/scripts/polarion-test-case-upload.sh b/scripts/polarion-test-case-upload.sh index 888bacb04f0..0c24ba35c8d 100755 --- a/scripts/polarion-test-case-upload.sh +++ b/scripts/polarion-test-case-upload.sh @@ -69,6 +69,11 @@ DEFAULT_APPROVERS_VALUE = '${POLARION_USERNAME}:approved' DEFAULT_STATUS_VALUE = 'approved' DEFAULT_SUBTYPE2_VALUE = '-' TESTCASE_CUSTOM_FIELDS = default_config.TESTCASE_CUSTOM_FIELDS + ('customerscenario',) + ('team',) + ('markers',) +# converting TESTCASE_CUSTOM_FIELDS to list for removing tokens since the tokens are defined as defaults/mandatory in betelgeuse +TESTCASE_CUSTOM_FIELDS = list(TESTCASE_CUSTOM_FIELDS) +REMOVE_TOKEN_LIST = ['caselevel', 'upstream', 'testtype'] +TESTCASE_CUSTOM_FIELDS = tuple([token for token in TESTCASE_CUSTOM_FIELDS if token not in REMOVE_TOKEN_LIST]) + REQUIREMENT_CUSTOM_FIELDS = default_config.REQUIREMENT_CUSTOM_FIELDS + ('team',) TRANSFORM_CUSTOMERSCENARIO_VALUE = default_config._transform_to_lower DEFAULT_CUSTOMERSCENARIO_VALUE = 'false' diff --git a/testimony.yaml b/testimony.yaml index 9a198435f11..11b462ce5f5 100644 --- a/testimony.yaml +++ b/testimony.yaml @@ -116,15 +116,6 @@ CaseImportance: - Low required: true type: choice -CaseLevel: - casesensitive: true - choices: - - Component - - Integration - - System - - Acceptance - required: true - type: choice CasePosNeg: casesensitive: false choices: @@ -152,20 +143,6 @@ SubComponent: type: choice Subtype1: {} Teardown: {} -TestType: - casesensitive: false - choices: - - Functional - - Structural - required: true - type: choice -Upstream: - casesensitive: false - choices: - - 'Yes' - - 'No' - required: true - type: choice Parametrized: casesensitive: false choices: diff --git a/tests/foreman/api/test_activationkey.py b/tests/foreman/api/test_activationkey.py index 864588ded5f..d07bcc2f71f 100644 --- a/tests/foreman/api/test_activationkey.py +++ b/tests/foreman/api/test_activationkey.py @@ -4,17 +4,13 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ActivationKeys :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No + """ import http @@ -272,8 +268,6 @@ def test_positive_get_releases_status_code(target_sat): :expectedresults: HTTP 200 is returned with an ``application/json`` content-type - - :CaseLevel: Integration """ act_key = target_sat.api.ActivationKey().create() path = act_key.path('releases') @@ -290,8 +284,6 @@ def test_positive_get_releases_content(target_sat): :id: 2fec3d71-33e9-40e5-b934-90b03afc26a1 :expectedresults: A list of results is returned. - - :CaseLevel: Integration """ act_key = target_sat.api.ActivationKey().create() response = client.get(act_key.path('releases'), auth=get_credentials(), verify=False).json() @@ -313,8 +305,6 @@ def test_positive_add_host_collections(module_org, module_target_sat): collections and reading that activation key, the correct host collections are listed. - :CaseLevel: Integration - :CaseImportance: Critical """ # An activation key has no host collections by default. @@ -352,8 +342,6 @@ def test_positive_remove_host_collection(module_org, module_target_sat): 3. Disassociating host collection from the activation key actually removes it from the list - :CaseLevel: Integration - :CaseImportance: Critical """ # An activation key has no host collections by default. @@ -445,8 +433,6 @@ def test_positive_fetch_product_content( :expectedresults: Both Red Hat and custom product subscriptions are assigned as Activation Key's product content - :CaseLevel: Integration - :CaseImportance: Critical """ module_target_sat.upload_manifest(module_org.id, session_entitlement_manifest.content) @@ -500,8 +486,6 @@ def test_positive_add_future_subscription(): :CaseAutomation: NotAutomated - :CaseLevel: Integration - :CaseImportance: Critical """ diff --git a/tests/foreman/api/test_ansible.py b/tests/foreman/api/test_ansible.py index 42d3743e2af..2637dfe7064 100644 --- a/tests/foreman/api/test_ansible.py +++ b/tests/foreman/api/test_ansible.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Ansible-ConfigurationManagement :Team: Rocket -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ from fauxfactory import gen_string import pytest diff --git a/tests/foreman/api/test_architecture.py b/tests/foreman/api/test_architecture.py index f0b7c428b0f..362abbfae32 100644 --- a/tests/foreman/api/test_architecture.py +++ b/tests/foreman/api/test_architecture.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_choice import pytest diff --git a/tests/foreman/api/test_audit.py b/tests/foreman/api/test_audit.py index 278dff439df..3f0ccc290d6 100644 --- a/tests/foreman/api/test_audit.py +++ b/tests/foreman/api/test_audit.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: AuditLog :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/foreman/api/test_bookmarks.py b/tests/foreman/api/test_bookmarks.py index 694d0a6654a..b51ac194cb3 100644 --- a/tests/foreman/api/test_bookmarks.py +++ b/tests/foreman/api/test_bookmarks.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Search :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import random @@ -38,7 +33,7 @@ def test_positive_create_with_name(controller, target_sat): :parametrized: yes - :Steps: + :steps: 1. Create a bookmark with a random name and valid controller. 2. List the bookmarks. @@ -64,7 +59,7 @@ def test_positive_create_with_query(controller, target_sat): :parametrized: yes - :Steps: + :steps: 1. Create a bookmark with a random query and valid controller. 2. List the bookmarks. @@ -91,7 +86,7 @@ def test_positive_create_public(controller, public, target_sat): :parametrized: yes - :Steps: + :steps: 1. Create a bookmark with a valid controller and public attribute True or False. 2. List the bookmarks. @@ -116,7 +111,7 @@ def test_negative_create_with_invalid_name(controller, target_sat): :parametrized: yes - :Steps: + :steps: 1. Attempt to create a bookmark with an invalid name. 2. List the bookmarks. @@ -144,7 +139,7 @@ def test_negative_create_empty_query(controller, target_sat): :parametrized: yes - :Steps: + :steps: 1. Attempt to create a bookmark with a random name, valid controller, and empty query. 2. List the bookmarks. @@ -172,7 +167,7 @@ def test_negative_create_same_name(controller, target_sat): :parametrized: yes - :Steps: + :steps: 1. Create a bookmark with a random name and valid controller. 2. Attempt to create a second bookmark, using the same name as the previous bookmark. @@ -202,7 +197,7 @@ def test_negative_create_null_public(controller, target_sat): :parametrized: yes - :Steps: + :steps: 1. Attempt to create a bookmark with a random name and valid controller, with public attribute set to None. @@ -233,7 +228,7 @@ def test_positive_update_name(controller, target_sat): :parametrized: yes - :Steps: + :steps: 1. Create a bookmark with a valid controller. 2. Update the bookmark with a random name. @@ -260,7 +255,7 @@ def test_negative_update_same_name(controller, target_sat): :parametrized: yes - :Steps: + :steps: 1. Create a bookmark with a random name and valid controller. 2. Create a second bookmark for the same controller. @@ -291,7 +286,7 @@ def test_negative_update_invalid_name(controller, target_sat): :parametrized: yes - :Steps: + :steps: 1. Create a bookmark with valid controller. 2. Attempt to update the bookmark with an invalid name. @@ -320,7 +315,7 @@ def test_positive_update_query(controller, target_sat): :parametrized: yes - :Steps: + :steps: 1. Create a bookmark with a valid controller. 2. Update the bookmark's query with a random value. @@ -347,7 +342,7 @@ def test_negative_update_empty_query(controller, target_sat): :parametrized: yes - :Steps: + :steps: 1. Create a bookmark for a valid controller. 2. Attempt to update the query to an empty value. @@ -376,7 +371,7 @@ def test_positive_update_public(controller, public, target_sat): :parametrized: yes - :Steps: + :steps: 1. Create a bookmark for a valid controller. 2. Update the bookmark's public attribute. diff --git a/tests/foreman/api/test_capsulecontent.py b/tests/foreman/api/test_capsulecontent.py index eb1c5386e82..6ad8401d4f3 100644 --- a/tests/foreman/api/test_capsulecontent.py +++ b/tests/foreman/api/test_capsulecontent.py @@ -5,17 +5,11 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Capsule-Content :team: Phoenix-content -:TestType: Functional - :CaseImportance: High - -:Upstream: No """ import re from time import sleep @@ -61,7 +55,6 @@ def test_positive_insights_puppet_package_availability(self, module_capsule_conf in capsule repo and is available for installation on capsule via yum - :CaseLevel: System """ package_name = 'redhat-access-insights-puppet' result = module_capsule_configured.run(f'yum list {package_name} | grep @capsule') @@ -91,7 +84,6 @@ def test_positive_uploaded_content_library_sync( :expectedresults: custom content is present on external capsule - :CaseLevel: System """ repo = target_sat.api.Repository(product=function_product, url=None).create() # Associate the lifecycle environment with the capsule @@ -150,8 +142,6 @@ def test_positive_checksum_sync( :expectedresults: checksum type is updated in repodata of corresponding repository on capsule - :CaseLevel: System - :CaseImportance: Critical """ # Create repository with sha256 checksum type @@ -259,8 +249,6 @@ def test_positive_sync_updated_repo( 1. Capsule is synced successfully. 2. Content is present at the Capsule side. - :CaseLevel: Integration - :customerscenario: true :BZ: 2025494 @@ -365,7 +353,6 @@ def test_positive_capsule_sync( 5. Syncing repository which was updated will update the content on capsule - :CaseLevel: System """ repo_url = settings.repos.yum_1.url repo = target_sat.api.Repository(product=function_product, url=repo_url).create() @@ -497,7 +484,6 @@ def test_positive_iso_library_sync( :expectedresults: ISOs are present on external capsule - :CaseLevel: System """ # Enable & sync RH repository with ISOs rh_repo_id = module_target_sat.api_factory.enable_rhrepo_and_fetchid( @@ -574,7 +560,6 @@ def test_positive_on_demand_sync( 3. Package is successfully downloaded from the Capsule, its checksum matches the original package from the upstream repo - :CaseLevel: System """ repo_url = settings.repos.yum_3.url packages_count = constants.FAKE_3_YUM_REPOS_COUNT @@ -660,7 +645,6 @@ def test_positive_update_with_immediate_sync( :expectedresults: content was successfully synchronized - capsule filesystem contains valid links to packages - :CaseLevel: System """ repo_url = settings.repos.yum_1.url packages_count = constants.FAKE_1_YUM_REPOS_COUNT @@ -754,7 +738,6 @@ def test_positive_capsule_pub_url_accessible(self, module_capsule_configured): :BZ: 1463810, 2122780 - :CaseLevel: System """ https_pub_url = f'https://{module_capsule_configured.ip_addr}/pub' http_pub_url = f'http://{module_capsule_configured.ip_addr}/pub' @@ -787,8 +770,6 @@ def test_positive_sync_kickstart_repo( :expectedresults: 1. The kickstart repo is successfully synced to the Capsule. - :CaseLevel: Integration - :BZ: 1992329 """ repo_id = target_sat.api_factory.enable_rhrepo_and_fetchid( @@ -892,8 +873,6 @@ def test_positive_sync_container_repo_end_to_end( :parametrized: yes - :CaseLevel: Integration - :BZ: 2125244, 2148813 :customerscenario: true @@ -1022,8 +1001,6 @@ def test_positive_sync_collection_repo( :parametrized: yes - :CaseLevel: Integration - :BZ: 2121583 """ requirements = ''' @@ -1103,8 +1080,6 @@ def test_positive_sync_file_repo( 1. Both capsule syncs succeed. 2. Content is accessible on both, Satellite and Capsule. - :CaseLevel: Integration - :BZ: 1985122 """ repo = target_sat.api.Repository( @@ -1191,8 +1166,6 @@ def test_positive_sync_CV_to_multiple_LCEs( :expectedresults: 1. All capsule syncs succeed. - :CaseLevel: Integration - :customerscenario: true :BZ: 1830403 diff --git a/tests/foreman/api/test_classparameters.py b/tests/foreman/api/test_classparameters.py index 2ac825b9943..7712fbb1b9f 100644 --- a/tests/foreman/api/test_classparameters.py +++ b/tests/foreman/api/test_classparameters.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Puppet :CaseImportance: Medium :Team: Rocket -:TestType: Functional - -:Upstream: No """ import json from random import choice diff --git a/tests/foreman/api/test_computeprofile.py b/tests/foreman/api/test_computeprofile.py index dffe47620b4..6d374bc8b34 100644 --- a/tests/foreman/api/test_computeprofile.py +++ b/tests/foreman/api/test_computeprofile.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ComputeResources :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest from requests.exceptions import HTTPError @@ -37,8 +32,6 @@ def test_positive_create_with_name(name, target_sat): :CaseImportance: Critical - :CaseLevel: Component - :parametrized: yes """ profile = target_sat.api.ComputeProfile(name=name).create() @@ -56,8 +49,6 @@ def test_negative_create(name, target_sat): :CaseImportance: Critical - :CaseLevel: Component - :parametrized: yes """ with pytest.raises(HTTPError): @@ -75,8 +66,6 @@ def test_positive_update_name(new_name, target_sat): :CaseImportance: Critical - :CaseLevel: Component - :parametrized: yes """ profile = target_sat.api.ComputeProfile().create() @@ -96,8 +85,6 @@ def test_negative_update_name(new_name, target_sat): :CaseImportance: Critical - :CaseLevel: Component - :parametrized: yes """ profile = target_sat.api.ComputeProfile().create() @@ -118,8 +105,6 @@ def test_positive_delete(new_name, target_sat): :CaseImportance: Critical - :CaseLevel: Component - :parametrized: yes """ profile = target_sat.api.ComputeProfile(name=new_name).create() diff --git a/tests/foreman/api/test_computeresource_azurerm.py b/tests/foreman/api/test_computeresource_azurerm.py index eac3489766b..47bf8313066 100644 --- a/tests/foreman/api/test_computeresource_azurerm.py +++ b/tests/foreman/api/test_computeresource_azurerm.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ComputeResources-Azure :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -53,7 +48,6 @@ def test_positive_crud_azurerm_cr( :CaseImportance: Critical - :CaseLevel: Component """ # Create CR cr_name = gen_string('alpha') @@ -108,7 +102,6 @@ def test_positive_create_cloud_init_image( :expectedresults: Cloud init image should be added in AzureRM CR along with username - :CaseLevel: Integration """ assert module_azurerm_cloudimg.architecture.id == sat_azure_default_architecture.id @@ -128,7 +121,6 @@ def test_positive_check_available_networks(self, azurermclient, module_azurerm_c :expectedresults: All the networks from AzureRM CR should be available. - :CaseLevel: Integration """ cr_nws = module_azurerm_cr.available_networks() portal_nws = azurermclient.list_network() @@ -143,8 +135,6 @@ def test_gov_cloud_regions_from_azure_compute_resources(self): :CaseImportance: Medium - :CaseLevel: Acceptance - :CaseAutomation: ManualOnly :steps: @@ -267,9 +257,7 @@ def test_positive_azurerm_host_provisioned(self, class_host_ft, azureclient_host :id: ff27905f-fa3c-43ac-b969-9525b32f75f5 - :CaseLevel: Component - - ::CaseImportance: Critical + :CaseImportance: Critical :steps: 1. Create a AzureRM Compute Resource and provision host. @@ -300,8 +288,6 @@ def test_positive_azurerm_host_power_on_off(self, class_host_ft, azureclient_hos :id: 9ced29d7-d866-4d0c-ac27-78753b5b5a94 - :CaseLevel: System - :steps: 1. Create a AzureRM Compute Resource. 2. Provision a Host on Azure Cloud using above CR. @@ -421,9 +407,7 @@ def test_positive_azurerm_ud_host_provisioned(self, class_host_ud, azureclient_h :id: df496d7c-3443-4afe-b807-5bbfc90e866e - :CaseLevel: Component - - ::CaseImportance: Critical + :CaseImportance: Critical :steps: 1. Create a AzureRM Compute Resource and provision host. @@ -574,8 +558,6 @@ def test_positive_azurerm_custom_image_host_provisioned( :id: b5be5128-ad49-4dbd-a660-3e38ce012327 - :CaseLevel: System - :CaseImportance: Critical :steps: diff --git a/tests/foreman/api/test_computeresource_gce.py b/tests/foreman/api/test_computeresource_gce.py index 314a0a73596..ca4e32f329b 100644 --- a/tests/foreman/api/test_computeresource_gce.py +++ b/tests/foreman/api/test_computeresource_gce.py @@ -7,17 +7,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ComputeResources-GCE :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import random @@ -43,7 +38,6 @@ def test_positive_crud_gce_cr(self, sat_gce, sat_gce_org, sat_gce_loc, gce_cert) :CaseImportance: Critical - :CaseLevel: Component """ cr_name = gen_string('alpha') # Testing Create @@ -85,7 +79,6 @@ def test_positive_check_available_images(self, module_gce_compute, googleclient) :expectedresults: RHEL images from GCP are available to select in GCE CR - :CaseLevel: Integration """ satgce_images = module_gce_compute.available_images() googleclient_images = googleclient.list_templates( @@ -107,7 +100,6 @@ def test_positive_check_available_networks(self, module_gce_compute, googleclien :expectedresults: All the networks from Google CR should be available to select in GCE CR - :CaseLevel: Integration """ gceavailable_networks = module_gce_compute.available_networks() satgce_networks = [net['name'] for net in gceavailable_networks['results']] @@ -124,7 +116,6 @@ def test_positive_check_available_flavors(self, module_gce_compute): :expectedresults: All the flavors from Google CR should be available to select in GCE Host - :CaseLevel: Integration """ satgce_flavors = int(module_gce_compute.available_flavors()['total']) assert satgce_flavors > 1 @@ -145,7 +136,6 @@ def test_positive_create_finish_template_image( :expectedresults: Finish template image should be added in GCE CR along with username - :CaseLevel: Integration """ assert module_gce_finishimg.compute_resource.id == module_gce_compute.id assert module_gce_finishimg.uuid == gce_latest_rhel_uuid @@ -164,7 +154,6 @@ def test_positive_create_cloud_init_image( :expectedresults: Cloud init image should be added in GCE CR along with username - :CaseLevel: Integration """ assert module_gce_cloudimg.compute_resource.id == module_gce_compute.id assert module_gce_cloudimg.uuid == gce_custom_cloudinit_uuid @@ -245,9 +234,7 @@ def test_positive_gce_host_provisioned(self, class_host, google_host): :id: 889975f2-56ca-4584-95a7-21c513969630 - :CaseLevel: Component - - ::CaseImportance: Critical + :CaseImportance: Critical :steps: 1. Create a GCE Compute Resource @@ -271,8 +258,6 @@ def test_positive_gce_host_power_on_off(self, class_host, google_host): :id: b622c6fc-c45e-431d-8de3-9d0237873998 - :CaseLevel: System - :steps: 1. Create a GCE Compute Resource 2. Create a Hostgroup with all the Global and Foreman entities but diff --git a/tests/foreman/api/test_computeresource_libvirt.py b/tests/foreman/api/test_computeresource_libvirt.py index a02d741e899..5189af9d445 100644 --- a/tests/foreman/api/test_computeresource_libvirt.py +++ b/tests/foreman/api/test_computeresource_libvirt.py @@ -8,17 +8,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ComputeResources-libvirt :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -46,8 +41,6 @@ def test_positive_crud_libvirt_cr(module_target_sat, module_org, module_location :expectedresults: Compute resources are created with expected names :CaseImportance: Critical - - :CaseLevel: Component """ name = gen_string('alphanumeric') description = gen_string('alphanumeric') @@ -111,8 +104,6 @@ def test_positive_create_with_name_description( :CaseImportance: Critical - :CaseLevel: Component - :parametrized: yes """ compresource = module_target_sat.api.LibvirtComputeResource( @@ -137,8 +128,6 @@ def test_positive_create_with_orgs_and_locs(request, module_target_sat): locations assigned :CaseImportance: High - - :CaseLevel: Integration """ orgs = [module_target_sat.api.Organization().create() for _ in range(2)] locs = [module_target_sat.api.Location(organization=[org]).create() for org in orgs] @@ -161,8 +150,6 @@ def test_negative_create_with_invalid_name(name, module_target_sat, module_org, :CaseImportance: High - :CaseLevel: Component - :parametrized: yes """ with pytest.raises(HTTPError): @@ -183,8 +170,6 @@ def test_negative_create_with_same_name(request, module_target_sat, module_org, :expectedresults: Compute resources is not created :CaseImportance: High - - :CaseLevel: Component """ name = gen_string('alphanumeric') cr = module_target_sat.api.LibvirtComputeResource( @@ -212,8 +197,6 @@ def test_negative_create_with_url(module_target_sat, module_org, module_location :CaseImportance: High - :CaseLevel: Component - :parametrized: yes """ with pytest.raises(HTTPError): @@ -235,8 +218,6 @@ def test_negative_update_invalid_name( :CaseImportance: High - :CaseLevel: Component - :parametrized: yes """ name = gen_string('alphanumeric') @@ -259,8 +240,6 @@ def test_negative_update_same_name(request, module_target_sat, module_org, modul :expectedresults: Compute resources is not updated :CaseImportance: High - - :CaseLevel: Component """ name = gen_string('alphanumeric') compresource = module_target_sat.api.LibvirtComputeResource( @@ -291,8 +270,6 @@ def test_negative_update_url(url, request, module_target_sat, module_org, module :CaseImportance: High - :CaseLevel: Component - :parametrized: yes """ compresource = module_target_sat.api.LibvirtComputeResource( diff --git a/tests/foreman/api/test_contentcredentials.py b/tests/foreman/api/test_contentcredentials.py index 8c9660a7083..01c56e4906f 100644 --- a/tests/foreman/api/test_contentcredentials.py +++ b/tests/foreman/api/test_contentcredentials.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ContentCredentials :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest diff --git a/tests/foreman/api/test_contentview.py b/tests/foreman/api/test_contentview.py index 75591a65f9d..fc83390f23e 100644 --- a/tests/foreman/api/test_contentview.py +++ b/tests/foreman/api/test_contentview.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ContentViews :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import random @@ -116,8 +111,6 @@ def test_positive_subscribe_host( :expectedresults: It is possible to create a host and set its 'content_view_id' facet attribute - :CaseLevel: Integration - :CaseAutomation: Automated :CaseImportance: High @@ -151,8 +144,6 @@ def test_positive_clone_within_same_env(self, class_published_cloned_cv, module_ :expectedresults: Cloned content view can be published and promoted to the same environment as the original content view - :CaseLevel: Integration - :CaseImportance: High """ class_published_cloned_cv.read().version[0].promote(data={'environment_ids': module_lce.id}) @@ -171,8 +162,6 @@ def test_positive_clone_with_diff_env( :expectedresults: Cloned content view can be published and promoted to a different environment as the original content view - :CaseLevel: Integration - :CaseImportance: Medium """ le_clone = module_target_sat.api.LifecycleEnvironment(organization=module_org).create() @@ -186,8 +175,6 @@ def test_positive_add_custom_content(self, module_product, module_org, module_ta :expectedresults: Custom content assigned and present in content view - :CaseLevel: Integration - :CaseImportance: Critical """ yum_repo = module_target_sat.api.Repository(product=module_product).create() @@ -212,8 +199,6 @@ def test_positive_add_custom_module_streams( :expectedresults: Custom content (module streams) assigned and present in content view - :CaseLevel: Integration - :CaseImportance: High """ yum_repo = module_target_sat.api.Repository( @@ -239,8 +224,6 @@ def test_negative_add_dupe_repos( :expectedresults: User cannot add repos multiple times to the view - :CaseLevel: Integration - :CaseImportance: Low """ yum_repo = module_target_sat.api.Repository(product=module_product).create() @@ -263,8 +246,6 @@ def test_positive_add_sha512_rpm(self, content_view, module_org, module_target_s :expectedresults: Custom sha512 assigned and present in content view - :CaseLevel: Integration - :CaseComponent: Pulp :team: Rocket @@ -426,8 +407,6 @@ def test_positive_publish_with_content_multiple(self, content_view, module_org): content view can be published several times, and each content view version has at least one package. - :CaseLevel: Integration - :CaseImportance: High """ content_view.repository = [self.yum_repo] @@ -454,8 +433,6 @@ def test_positive_publish_composite_multiple_content_once(self, module_org, modu :expectedresults: Composite content view is published and corresponding version is assigned to it. - :CaseLevel: Integration - :CaseImportance: Critical """ composite_cv = module_target_sat.api.ContentView( @@ -481,8 +458,6 @@ def test_positive_publish_composite_multiple_content_multiple( :expectedresults: Composite content view is published several times and corresponding versions are assigned to it. - :CaseLevel: Integration - :CaseImportance: High """ composite_cv = module_target_sat.api.ContentView( @@ -506,8 +481,6 @@ def test_positive_promote_with_yum_multiple(self, content_view, module_org, modu version is in ``REPEAT + 1`` lifecycle environments and it has at least one package. - :CaseLevel: Integration - :CaseImportance: High """ content_view.repository = [self.yum_repo] @@ -540,8 +513,6 @@ def test_positive_add_to_composite(self, content_view, module_org, module_target :expectedresults: Content view can be created and assigned to composite one through content view versions mechanism - :CaseLevel: Integration - :CaseImportance: Critical """ content_view.repository = [self.yum_repo] @@ -572,8 +543,6 @@ def test_negative_add_components_to_composite( :expectedresults: User cannot add components to the view - :CaseLevel: Integration - :CaseImportance: Low """ content_view.repository = [self.yum_repo] @@ -603,8 +572,6 @@ def test_positive_promote_composite_multiple_content_once( :expectedresults: Composite content view version points to ``Library + 1`` lifecycle environments after the promotions. - :CaseLevel: Integration - :CaseImportance: High """ composite_cv = module_target_sat.api.ContentView( @@ -632,8 +599,6 @@ def test_positive_promote_composite_multiple_content_multiple( :expectedresults: Composite content view version points to ``Library + random`` lifecycle environments after the promotions. - :CaseLevel: Integration - :CaseImportance: High """ composite_cv = module_target_sat.api.ContentView( @@ -661,8 +626,6 @@ def test_positive_promote_out_of_sequence(self, content_view, module_org): :expectedresults: Content view promoted out of sequence properly - :CaseLevel: Integration - :CaseImportance: Medium """ for _ in range(REPEAT): @@ -697,8 +660,6 @@ def test_positive_publish_multiple_repos(self, content_view, module_org, module_ :expectedresults: Content view publish should not raise an exception. - :CaseLevel: Integration - :CaseComponent: Pulp :team: Rocket @@ -891,8 +852,6 @@ def test_positive_add_rh(self): :expectedresults: RH Content assigned and present in a view - :CaseLevel: Integration - :CaseImportance: High """ assert len(self.yumcv.repository) == 1 @@ -907,8 +866,6 @@ def test_positive_add_rh_custom_spin(self, target_sat): :expectedresults: Filtered RH content is available and can be seen in a view - :CaseLevel: Integration - :CaseImportance: High """ # content_view ← cv_filter @@ -935,8 +892,6 @@ def test_positive_update_rh_custom_spin(self, target_sat): :expectedresults: edited content view save is successful and info is updated - :CaseLevel: Integration - :CaseImportance: High """ cvf = target_sat.api.ErratumContentViewFilter( @@ -961,8 +916,6 @@ def test_positive_publish_rh(self, module_org, content_view): :expectedresults: Content view can be published - :CaseLevel: Integration - :CaseImportance: Critical """ content_view.repository = [self.repo] @@ -979,8 +932,6 @@ def test_positive_publish_rh_custom_spin(self, module_org, content_view, module_ :expectedresults: Content view can be published - :CaseLevel: Integration - :CaseImportance: High """ content_view.repository = [self.repo] @@ -999,8 +950,6 @@ def test_positive_promote_rh(self, module_org, content_view, module_lce): :expectedresults: Content view can be promoted - :CaseLevel: Integration - :CaseImportance: Critical """ content_view.repository = [self.repo] @@ -1024,8 +973,6 @@ def test_positive_promote_rh_custom_spin(self, content_view, module_lce, module_ :expectedresults: Content view can be promoted - :CaseLevel: Integration - :CaseImportance: High """ content_view.repository = [self.repo] @@ -1057,8 +1004,6 @@ def test_positive_admin_user_actions( :expectedresults: The user can Read, Modify, Delete, Publish, Promote the content views - :CaseLevel: Integration - :CaseImportance: Critical """ user_login = gen_string('alpha') @@ -1117,8 +1062,6 @@ def test_positive_readonly_user_actions(target_sat, function_role, content_view, :expectedresults: User with read-only role for content view can view the repository in the content view - :CaseLevel: Integration - :CaseImportance: Critical """ user_login = gen_string('alpha') @@ -1183,8 +1126,6 @@ def test_negative_readonly_user_actions( :BZ: 1922134 - :CaseLevel: Integration - :CaseImportance: Critical """ user_login = gen_string('alpha') @@ -1260,8 +1201,6 @@ def test_negative_non_readonly_user_actions(target_sat, content_view, function_r :expectedresults: the user can perform different operations against content view, but not read it - :CaseLevel: Integration - :CaseImportance: Critical """ user_login = gen_string('alpha') @@ -1339,8 +1278,6 @@ def test_positive_add_custom_ostree_content(self, content_view): :expectedresults: Custom ostree content assigned and present in content view - :CaseLevel: Integration - :CaseImportance: High """ assert len(content_view.repository) == 0 @@ -1358,8 +1295,6 @@ def test_positive_publish_custom_ostree(self, content_view): :expectedresults: Content-view with Custom ostree published successfully - :CaseLevel: Integration - :CaseImportance: High """ content_view.repository = [self.ostree_repo] @@ -1376,8 +1311,6 @@ def test_positive_promote_custom_ostree(self, content_view, module_lce): :expectedresults: Content-view with custom ostree contents promoted successfully - :CaseLevel: Integration - :CaseImportance: High """ content_view.repository = [self.ostree_repo] @@ -1398,8 +1331,6 @@ def test_positive_publish_promote_with_custom_ostree_and_other(self, content_vie :expectedresults: Content-view with custom ostree and other contents promoted successfully - :CaseLevel: Integration - :CaseImportance: High """ content_view.repository = [self.ostree_repo, self.yum_repo, self.docker_repo] @@ -1442,8 +1373,6 @@ def test_positive_add_rh_ostree_content(self, content_view): :expectedresults: RH atomic ostree content assigned and present in content view - :CaseLevel: Integration - :CaseImportance: High """ assert len(content_view.repository) == 0 @@ -1461,8 +1390,6 @@ def test_positive_publish_RH_ostree(self, content_view): :expectedresults: Content-view with RH ostree contents published successfully - :CaseLevel: Integration - :CaseImportance: High """ content_view.repository = [self.repo] @@ -1479,8 +1406,6 @@ def test_positive_promote_RH_ostree(self, content_view, module_lce): :expectedresults: Content-view with RH ostree contents promoted successfully - :CaseLevel: Integration - :CaseImportance: High """ content_view.repository = [self.repo] @@ -1503,8 +1428,6 @@ def test_positive_publish_promote_with_RH_ostree_and_other( :expectedresults: Content-view with RH ostree and other contents promoted successfully - :CaseLevel: Integration - :CaseImportance: High """ repo_id = module_target_sat.api_factory.enable_rhrepo_and_fetchid( diff --git a/tests/foreman/api/test_contentviewfilter.py b/tests/foreman/api/test_contentviewfilter.py index 42d34d54206..f17d256d802 100644 --- a/tests/foreman/api/test_contentviewfilter.py +++ b/tests/foreman/api/test_contentviewfilter.py @@ -8,17 +8,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ContentViews :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import http from random import randint @@ -79,8 +74,6 @@ def test_negative_get_with_no_args(self, target_sat): :expectedresults: An HTTP 200 response is received if a GET request is issued with no arguments specified. - :CaseLevel: Integration - :CaseImportance: Low """ response = client.get( @@ -99,8 +92,6 @@ def test_negative_get_with_bad_args(self, target_sat): :expectedresults: An HTTP 200 response is received if a GET request is issued with bad arguments specified. - :CaseLevel: Integration - :CaseImportance: Low """ response = client.get( @@ -123,7 +114,6 @@ def test_positive_create_erratum_with_name(self, name, content_view, target_sat) :expectedresults: Content view filter created successfully and has correct name and type - :CaseLevel: Integration """ cvf = target_sat.api.ErratumContentViewFilter(content_view=content_view, name=name).create() assert cvf.name == name @@ -141,8 +131,6 @@ def test_positive_create_pkg_group_with_name(self, name, content_view, target_sa :expectedresults: Content view filter created successfully and has correct name and type - :CaseLevel: Integration - :CaseImportance: Medium """ cvf = target_sat.api.PackageGroupContentViewFilter( @@ -164,8 +152,6 @@ def test_positive_create_rpm_with_name(self, name, content_view, target_sat): :expectedresults: Content view filter created successfully and has correct name and type - :CaseLevel: Integration - :CaseImportance: Medium """ cvf = target_sat.api.RPMContentViewFilter(content_view=content_view, name=name).create() @@ -184,7 +170,6 @@ def test_positive_create_with_inclusion(self, inclusion, content_view, target_sa :expectedresults: Content view filter created successfully and has correct inclusion value - :CaseLevel: Integration """ cvf = target_sat.api.RPMContentViewFilter( content_view=content_view, inclusion=inclusion @@ -203,8 +188,6 @@ def test_positive_create_with_description(self, description, content_view, targe :expectedresults: Content view filter created successfully and has correct description - :CaseLevel: Integration - :CaseImportance: Low """ cvf = target_sat.api.RPMContentViewFilter( @@ -222,7 +205,6 @@ def test_positive_create_with_repo(self, content_view, sync_repo, target_sat): :expectedresults: Content view filter created successfully and has repository assigned - :CaseLevel: Integration """ cvf = target_sat.api.RPMContentViewFilter( content_view=content_view, @@ -246,8 +228,6 @@ def test_positive_create_with_original_packages( :expectedresults: Content view filter created successfully and has 'original packages' value - :CaseLevel: Integration - :CaseImportance: Medium """ cvf = target_sat.api.RPMContentViewFilter( @@ -271,7 +251,6 @@ def test_positive_create_with_docker_repos( :expectedresults: Content view filter created successfully and has both repositories assigned (yum and docker) - :CaseLevel: Integration """ docker_repository = module_target_sat.api.Repository( content_type='docker', @@ -305,7 +284,6 @@ def test_positive_create_with_module_streams( :expectedresults: Content view filter created successfully for both Include and Exclude Type - :CaseLevel: Integration """ content_view.repository += [sync_repo_module_stream] content_view.update(['repository']) @@ -331,8 +309,6 @@ def test_negative_create_with_invalid_name(self, name, content_view, target_sat) :expectedresults: Content view filter was not created - :CaseLevel: Integration - :CaseImportance: Critical """ with pytest.raises(HTTPError): @@ -346,8 +322,6 @@ def test_negative_create_with_same_name(self, content_view, target_sat): :expectedresults: Second content view filter was not created - :CaseLevel: Integration - :CaseImportance: Low """ kwargs = {'content_view': content_view, 'name': gen_string('alpha')} @@ -364,8 +338,6 @@ def test_negative_create_without_cv(self, target_sat): :expectedresults: Content view filter is not created - :CaseLevel: Integration - :CaseImportance: Low """ with pytest.raises(HTTPError): @@ -380,8 +352,6 @@ def test_negative_create_with_invalid_repo_id(self, content_view, target_sat): :expectedresults: Content view filter is not created - :CaseLevel: Integration - :CaseImportance: Low """ with pytest.raises(HTTPError): @@ -398,8 +368,6 @@ def test_positive_delete_by_id(self, content_view, target_sat): :expectedresults: Content view filter was deleted - :CaseLevel: Integration - :CaseImportance: Critical """ cvf = target_sat.api.RPMContentViewFilter(content_view=content_view).create() @@ -419,7 +387,6 @@ def test_positive_update_name(self, name, content_view, target_sat): :expectedresults: Content view filter updated successfully and name was changed - :CaseLevel: Integration """ cvf = target_sat.api.RPMContentViewFilter(content_view=content_view).create() cvf.name = name @@ -437,8 +404,6 @@ def test_positive_update_description(self, description, content_view, target_sat :expectedresults: Content view filter updated successfully and description was changed - :CaseLevel: Integration - :CaseImportance: Low """ cvf = target_sat.api.RPMContentViewFilter(content_view=content_view).create() @@ -458,7 +423,6 @@ def test_positive_update_inclusion(self, inclusion, content_view, target_sat): :expectedresults: Content view filter updated successfully and inclusion value was changed - :CaseLevel: Integration """ cvf = target_sat.api.RPMContentViewFilter(content_view=content_view).create() cvf.inclusion = inclusion @@ -474,7 +438,6 @@ def test_positive_update_repo(self, module_product, sync_repo, content_view, tar :expectedresults: Content view filter updated successfully and has new repository assigned - :CaseLevel: Integration """ cvf = target_sat.api.RPMContentViewFilter( content_view=content_view, @@ -499,8 +462,6 @@ def test_positive_update_repos(self, module_product, sync_repo, content_view, ta :expectedresults: Content view filter updated successfully and has new repositories assigned - :CaseLevel: Integration - :CaseImportance: Low """ cvf = target_sat.api.RPMContentViewFilter( @@ -533,7 +494,6 @@ def test_positive_update_original_packages( :expectedresults: Content view filter updated successfully and 'original packages' value was changed - :CaseLevel: Integration """ cvf = target_sat.api.RPMContentViewFilter( content_view=content_view, @@ -556,7 +516,6 @@ def test_positive_update_repo_with_docker( :expectedresults: Content view filter was updated successfully and has both repositories assigned (yum and docker) - :CaseLevel: Integration """ cvf = target_sat.api.RPMContentViewFilter( content_view=content_view, @@ -588,8 +547,6 @@ def test_negative_update_name(self, name, content_view, target_sat): :expectedresults: Content view filter was not updated - :CaseLevel: Integration - :CaseImportance: Low """ cvf = target_sat.api.RPMContentViewFilter(content_view=content_view).create() @@ -605,8 +562,6 @@ def test_negative_update_same_name(self, content_view, target_sat): :expectedresults: Content view filter was not updated - :CaseLevel: Integration - :CaseImportance: Low """ name = gen_string('alpha', 8) @@ -625,7 +580,6 @@ def test_negative_update_cv_by_id(self, content_view, target_sat): :expectedresults: Content view filter was not updated - :CaseLevel: Integration """ cvf = target_sat.api.RPMContentViewFilter(content_view=content_view).create() cvf.content_view.id = gen_integer(10000, 99999) @@ -641,7 +595,6 @@ def test_negative_update_repo_by_id(self, sync_repo, content_view, target_sat): :expectedresults: Content view filter was not updated - :CaseLevel: Integration """ cvf = target_sat.api.RPMContentViewFilter( content_view=content_view, @@ -660,8 +613,6 @@ def test_negative_update_repo(self, module_product, sync_repo, content_view, tar :expectedresults: Content view filter was not updated - :CaseLevel: Integration - :CaseImportance: Low """ cvf = target_sat.api.RPMContentViewFilter( @@ -739,7 +690,6 @@ def test_positive_promote_module_stream_filter( :expectedresults: Content View should get published and promoted successfully with correct Module Stream count. - :CaseLevel: Integration """ # Exclude module stream filter content_view = content_view_module_stream @@ -795,7 +745,6 @@ def test_positive_include_exclude_module_stream_filter( :expectedresults: Module Stream count changes automatically after including or excluding modular errata - :CaseLevel: Integration """ content_view = content_view_module_stream cv_filter = target_sat.api.ErratumContentViewFilter( @@ -845,7 +794,6 @@ def test_positive_multi_level_filters(self, content_view_module_stream, target_s :expectedresults: Verify module stream and errata count should correct - :CaseLevel: Integration """ content_view = content_view_module_stream # apply include errata filter @@ -895,7 +843,6 @@ def test_positive_dependency_solving_module_stream_filter( :expectedresults: Verify dependant/non dependant module streams are getting fetched. - :CaseLevel: Integration """ content_view = content_view_module_stream content_view.solve_dependencies = True diff --git a/tests/foreman/api/test_contentviewversion.py b/tests/foreman/api/test_contentviewversion.py index 5953edeed42..5f3414456e3 100644 --- a/tests/foreman/api/test_contentviewversion.py +++ b/tests/foreman/api/test_contentviewversion.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ContentViews :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -52,8 +47,6 @@ def test_positive_create(module_cv): :expectedresults: Content View Version is created. - :CaseLevel: Integration - :CaseImportance: Critical """ # Fetch content view for latest information @@ -76,8 +69,6 @@ def test_negative_create(module_org, module_target_sat): :expectedresults: Content View Version is not created - :CaseLevel: Integration - :CaseImportance: Critical """ # The default content view cannot be published @@ -99,8 +90,6 @@ def test_positive_promote_valid_environment(module_lce_cv, module_org, module_ta :expectedresults: Promotion succeeds. - :CaseLevel: Integration - :CaseImportance: Critical """ # Create a new content view... @@ -131,8 +120,6 @@ def test_positive_promote_out_of_sequence_environment(module_org, module_lce_cv, :id: e88405de-843d-4279-9d81-cedaab7c23cf :expectedresults: The promotion succeeds. - - :CaseLevel: Integration """ # Create a new content view... cv = module_target_sat.api.ContentView(organization=module_org).create() @@ -159,8 +146,6 @@ def test_negative_promote_valid_environment(module_lce_cv): :expectedresults: The promotion fails. - :CaseLevel: Integration - :CaseImportance: Low """ lce1, _, default_cvv = module_lce_cv @@ -176,8 +161,6 @@ def test_negative_promote_out_of_sequence_environment(module_lce_cv, module_org, :id: 621d1bb6-92c6-4209-8369-6ea14a4c8a01 :expectedresults: The promotion fails. - - :CaseLevel: Integration """ # Create a new content view... cv = module_target_sat.api.ContentView(organization=module_org).create() @@ -209,8 +192,6 @@ def test_positive_delete(module_org, module_product, module_target_sat): :expectedresults: Content version deleted successfully - :CaseLevel: Integration - :CaseImportance: Critical """ key_content = DataFile.ZOO_CUSTOM_GPG_KEY.read_text() @@ -253,8 +234,6 @@ def test_positive_delete_non_default(module_org, module_target_sat): :expectedresults: Content view version deleted successfully - :CaseLevel: Integration - :CaseImportance: Critical """ content_view = module_target_sat.api.ContentView(organization=module_org).create() @@ -289,8 +268,6 @@ def test_positive_delete_composite_version(module_org, module_target_sat): :expectedresults: Content version deleted successfully - :CaseLevel: Integration - :BZ: 1276479 """ # Create product with repository and publish it @@ -330,8 +307,6 @@ def test_negative_delete(module_org, module_target_sat): :expectedresults: Content view version is not deleted - :CaseLevel: Integration - :CaseImportance: Critical """ content_view = module_target_sat.api.ContentView(organization=module_org).create() @@ -352,7 +327,7 @@ def test_positive_remove_renamed_cv_version_from_default_env(module_org, module_ :id: 7d5961d0-6a9a-4610-979e-cbc4ddbc50ca - :Steps: + :steps: 1. Create a content view 2. Add a yum repo to the content view @@ -362,8 +337,6 @@ def test_positive_remove_renamed_cv_version_from_default_env(module_org, module_ :expectedresults: content view version is removed from Library environment - - :CaseLevel: Integration """ new_name = gen_string('alpha') # create yum product and repo @@ -405,7 +378,7 @@ def test_positive_remove_qe_promoted_cv_version_from_default_env(module_org, mod :id: c7795762-93bd-419c-ac49-d10dc26b842b - :Steps: + :steps: 1. Create a content view 2. Add docker repo(s) to it @@ -416,8 +389,6 @@ def test_positive_remove_qe_promoted_cv_version_from_default_env(module_org, mod :expectedresults: Content view version exist only in DEV, QE and not in Library - - :CaseLevel: Integration """ lce_dev = module_target_sat.api.LifecycleEnvironment(organization=module_org).create() lce_qe = module_target_sat.api.LifecycleEnvironment( @@ -465,7 +436,7 @@ def test_positive_remove_prod_promoted_cv_version_from_default_env(module_org, m :id: 24911876-7c2a-4a12-a3aa-98051dfda29d - :Steps: + :steps: 1. Create a content view 2. Add yum repositories and docker repositories to CV @@ -476,8 +447,6 @@ def test_positive_remove_prod_promoted_cv_version_from_default_env(module_org, m :expectedresults: Content view version exist only in DEV, QE, PROD and not in Library - - :CaseLevel: Integration """ lce_dev = module_target_sat.api.LifecycleEnvironment(organization=module_org).create() lce_qe = module_target_sat.api.LifecycleEnvironment( @@ -534,7 +503,7 @@ def test_positive_remove_cv_version_from_env(module_org, module_target_sat): :id: 17cf18bf-09d5-4641-b0e0-c50e628fa6c8 - :Steps: + :steps: 1. Create a content view 2. Add a yum repo and a docker repo to the content view @@ -548,8 +517,6 @@ def test_positive_remove_cv_version_from_env(module_org, module_target_sat): :expectedresults: Content view version exist in Library, DEV, QE, STAGE, PROD - - :CaseLevel: Integration """ lce_dev = module_target_sat.api.LifecycleEnvironment(organization=module_org).create() lce_qe = module_target_sat.api.LifecycleEnvironment( @@ -616,7 +583,7 @@ def test_positive_remove_cv_version_from_multi_env(module_org, module_target_sat :id: 18b86a68-8e6a-43ea-b95e-188fba125a26 - :Steps: + :steps: 1. Create a content view 2. Add a yum repo and a docker repo to the content view @@ -627,8 +594,6 @@ def test_positive_remove_cv_version_from_multi_env(module_org, module_target_sat :expectedresults: Content view version exists only in Library, DEV - :CaseLevel: Integration - :CaseImportance: Low """ lce_dev = module_target_sat.api.LifecycleEnvironment(organization=module_org).create() @@ -693,7 +658,7 @@ def test_positive_delete_cv_promoted_to_multi_env(module_org, module_target_sat) :id: c164bd97-e710-4a5a-9c9f-657e6bed804b - :Steps: + :steps: 1. Create a content view 2. Add a yum repo and a docker repo to the content view @@ -705,8 +670,6 @@ def test_positive_delete_cv_promoted_to_multi_env(module_org, module_target_sat) :expectedresults: The content view doesn't exist - :CaseLevel: Integration - :CaseImportance: Critical """ lce_dev = module_target_sat.api.LifecycleEnvironment(organization=module_org).create() @@ -770,7 +733,7 @@ def test_positive_remove_cv_version_from_env_with_host_registered(): :id: a5b9ba8b-80e6-4435-bc0a-041b3fda227c - :Steps: + :steps: 1. Create a content view cv1 2. Add a yum repo to the content view @@ -795,8 +758,6 @@ def test_positive_remove_cv_version_from_env_with_host_registered(): 5. At content-host some package from cv1 is installable :CaseAutomation: NotAutomated - - :CaseLevel: System """ @@ -810,7 +771,7 @@ def test_positive_delete_cv_multi_env_promoted_with_host_registered(): :id: 10699af9-617e-4930-9c80-2827a0ba52eb - :Steps: + :steps: 1. Create two content views, cv1 and cv2 2. Add a yum repo to both content views @@ -837,8 +798,6 @@ def test_positive_delete_cv_multi_env_promoted_with_host_registered(): 6. At content-host some package from cv2 is installable :CaseAutomation: NotAutomated - - :CaseLevel: System """ @@ -850,7 +809,7 @@ def test_positive_remove_cv_version_from_multi_env_capsule_scenario(): :id: 1e8a8e64-eec8-49e0-b121-919c53f416d2 - :Steps: + :steps: 1. Create a content view 2. module_lce_cv satellite to use a capsule and to sync all lifecycle @@ -874,6 +833,4 @@ def test_positive_remove_cv_version_from_multi_env_capsule_scenario(): Library and DEV and exists only in QE and PROD :CaseAutomation: NotAutomated - - :CaseLevel: System """ diff --git a/tests/foreman/api/test_convert2rhel.py b/tests/foreman/api/test_convert2rhel.py index ce2e78d85b2..781f571ed02 100644 --- a/tests/foreman/api/test_convert2rhel.py +++ b/tests/foreman/api/test_convert2rhel.py @@ -4,15 +4,10 @@ :CaseAutomation: Automated -:CaseLevel: Integration - :CaseComponent: Registration :Team: Rocket -:TestType: Functional - -:Upstream: No """ import pytest import requests @@ -255,7 +250,7 @@ def test_convert2rhel_oracle(module_target_sat, oracle, activation_key_rhel, ver :id: 7fd393f0-551a-4de0-acdd-7f026b485f79 - :Steps: + :steps: 0. Have host registered to Satellite 1. Check for operating system 2. Convert host to RHEL @@ -307,7 +302,7 @@ def test_convert2rhel_centos(module_target_sat, centos, activation_key_rhel, ver :id: 6f698440-7d85-4deb-8dd9-363ea9003b92 - :Steps: + :steps: 0. Have host registered to Satellite 1. Check for operating system 2. Convert host to RHEL diff --git a/tests/foreman/api/test_discoveredhost.py b/tests/foreman/api/test_discoveredhost.py index 2e4742ad91f..92af7e879c5 100644 --- a/tests/foreman/api/test_discoveredhost.py +++ b/tests/foreman/api/test_discoveredhost.py @@ -8,11 +8,6 @@ :CaseAutomation: Automated -:CaseLevel: System - -:TestType: Functional - -:Upstream: No """ import re @@ -192,7 +187,7 @@ def test_positive_provision_pxe_host( :Setup: Provisioning and discovery should be configured - :Steps: + :steps: 1. Boot up the host to discover 2. Provision the host @@ -245,7 +240,7 @@ def test_positive_provision_pxe_less_host( :Setup: Provisioning should be configured and a host should be discovered - :Steps: PUT /api/v2/discovered_hosts/:id + :steps: PUT /api/v2/discovered_hosts/:id :expectedresults: Host should be provisioned successfully @@ -287,7 +282,7 @@ def test_positive_auto_provision_pxe_host( :Setup: Provisioning should be configured and a host should be discovered - :Steps: POST /api/v2/discovered_hosts/:id/auto_provision + :steps: POST /api/v2/discovered_hosts/:id/auto_provision :expectedresults: Selected Host should be auto-provisioned successfully @@ -316,7 +311,7 @@ def test_positive_auto_provision_all( :Setup: Provisioning should be configured and more than one host should be discovered - :Steps: POST /api/v2/discovered_hosts/auto_provision_all + :steps: POST /api/v2/discovered_hosts/auto_provision_all :expectedresults: All discovered hosts should be auto-provisioned successfully @@ -351,7 +346,7 @@ def test_positive_refresh_facts_pxe_host(self): be discovered 2. Add a NIC on discovered host - :Steps: PUT /api/v2/discovered_hosts/:id/refresh_facts + :steps: PUT /api/v2/discovered_hosts/:id/refresh_facts :expectedresults: Added Fact should be displayed on refreshing the facts @@ -382,7 +377,7 @@ def test_positive_reboot_pxe_host( :Setup: Provisioning should be configured and a host should be discovered via PXE boot. - :Steps: PUT /api/v2/discovered_hosts/:id/reboot + :steps: PUT /api/v2/discovered_hosts/:id/reboot :expectedresults: Selected host should be rebooted successfully @@ -415,7 +410,7 @@ def test_positive_reboot_all_pxe_hosts(self): :Setup: Provisioning should be configured and a hosts should be discovered via PXE boot. - :Steps: PUT /api/v2/discovered_hosts/reboot_all + :steps: PUT /api/v2/discovered_hosts/reboot_all :expectedresults: All disdcovered host should be rebooted successfully @@ -471,15 +466,13 @@ def test_positive_upload_facts(self, target_sat): :BZ: 1349364, 1392919 - :Steps: + :steps: 1. POST /api/v2/discovered_hosts/facts 2. Read the created discovered host :expectedresults: Host should be created successfully - :CaseLevel: Integration - :BZ: 1731112 """ name = gen_choice(list(valid_data_list().values())) @@ -497,7 +490,7 @@ def test_positive_delete_pxe_host(self, target_sat): :Setup: Provisioning should be configured and a host should be discovered - :Steps: DELETE /api/v2/discovered_hosts/:id + :steps: DELETE /api/v2/discovered_hosts/:id :expectedresults: Discovered Host should be deleted successfully """ diff --git a/tests/foreman/api/test_discoveryrule.py b/tests/foreman/api/test_discoveryrule.py index 34f4e38e2cf..e715267f5ff 100644 --- a/tests/foreman/api/test_discoveryrule.py +++ b/tests/foreman/api/test_discoveryrule.py @@ -8,13 +8,8 @@ :Team: Rocket -:TestType: Functional - -:CaseLevel: Acceptance - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_choice, gen_integer, gen_string import pytest diff --git a/tests/foreman/api/test_docker.py b/tests/foreman/api/test_docker.py index 68a2fe6e378..b11cc4bc126 100644 --- a/tests/foreman/api/test_docker.py +++ b/tests/foreman/api/test_docker.py @@ -4,13 +4,8 @@ :CaseAutomation: Automated -:CaseLevel: Component - -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from random import choice, randint, shuffle @@ -173,7 +168,6 @@ def test_positive_create_repos_using_same_product(self, module_product, module_t :expectedresults: Multiple docker repositories are created with a Docker upstream repository and they all belong to the same product. - :CaseLevel: Integration """ for _ in range(randint(2, 5)): repo = _create_repository(module_target_sat, module_product) @@ -189,7 +183,6 @@ def test_positive_create_repos_using_multiple_products(self, module_org, module_ Docker upstream repository and they all belong to their respective products. - :CaseLevel: Integration """ for _ in range(randint(2, 5)): product = module_target_sat.api.Product(organization=module_org).create() @@ -326,8 +319,6 @@ class TestDockerContentView: :CaseComponent: ContentViews :team: Phoenix-content - - :CaseLevel: Integration """ @pytest.mark.tier2 @@ -983,8 +974,6 @@ class TestDockerActivationKey: :CaseComponent: ActivationKeys :team: Phoenix-subscriptions - - :CaseLevel: Integration """ @pytest.mark.tier2 @@ -1019,7 +1008,6 @@ def test_positive_remove_docker_repo_cv( :expectedresults: Docker-based content view can be added and then removed from the activation key. - :CaseLevel: Integration """ content_view = content_view_publish_promote ak = module_target_sat.api.ActivationKey( diff --git a/tests/foreman/api/test_environment.py b/tests/foreman/api/test_environment.py index b6099d9ae73..4e3b52a2909 100644 --- a/tests/foreman/api/test_environment.py +++ b/tests/foreman/api/test_environment.py @@ -8,17 +8,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Puppet :Team: Rocket -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -127,7 +122,6 @@ def test_positive_update_and_remove( :expectedresults: Environment entity is updated and removed properly - :CaseLevel: Integration """ env = session_puppet_enabled_sat.api.Environment().create() assert len(env.organization) == 0 @@ -187,8 +181,6 @@ def test_positive_update_loc(module_puppet_environment): field. :BZ: 1262029 - - :CaseLevel: Integration """ names = {'location', 'location_ids', 'locations'} attributes = set(module_puppet_environment.update_json([]).keys()) @@ -205,8 +197,6 @@ def test_positive_update_org(module_puppet_environment): ``organization`` field. :BZ: 1262029 - - :CaseLevel: Integration """ names = {'organization', 'organization_ids', 'organizations'} attributes = set(module_puppet_environment.update_json([]).keys()) diff --git a/tests/foreman/api/test_errata.py b/tests/foreman/api/test_errata.py index 74e52cf196d..9cb3a316db3 100644 --- a/tests/foreman/api/test_errata.py +++ b/tests/foreman/api/test_errata.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: System - :CaseComponent: ErrataManagement :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ # For ease of use hc refers to host-collection throughout this document from time import sleep @@ -166,12 +161,10 @@ def test_positive_install_in_hc(module_org, activation_key, custom_repo, target_ :Setup: Errata synced on satellite server. - :Steps: PUT /api/v2/hosts/bulk/update_content + :steps: PUT /api/v2/hosts/bulk/update_content :expectedresults: errata is installed in the host-collection. - :CaseLevel: System - :BZ: 1983043 """ for client in content_hosts: @@ -227,8 +220,6 @@ def test_positive_install_in_host( :parametrized: yes - :CaseLevel: System - :BZ: 1983043 """ rhel_contenthost.install_katello_ca(target_sat) @@ -282,8 +273,6 @@ def test_positive_install_multiple_in_host( :CaseImportance: Medium :parametrized: yes - - :CaseLevel: System """ rhel_contenthost.install_katello_ca(target_sat) rhel_contenthost.register_contenthost(module_org.label, activation_key.name) @@ -324,12 +313,10 @@ def test_positive_list(module_org, custom_repo, target_sat): :Setup: Errata synced on satellite server. - :Steps: Create two repositories each synced and containing errata + :steps: Create two repositories each synced and containing errata :expectedresults: Check that the errata belonging to one repo is not showing in the other. - - :CaseLevel: System """ repo1 = target_sat.api.Repository(id=custom_repo['repository-id']).read() repo2 = target_sat.api.Repository( @@ -358,11 +345,9 @@ def test_positive_list_updated(module_org, custom_repo, target_sat): :Setup: Errata synced on satellite server. - :Steps: GET /katello/api/errata + :steps: GET /katello/api/errata :expectedresults: Errata is filtered by Org and sorted by Updated date. - - :CaseLevel: System """ repo = target_sat.api.Repository(id=custom_repo['repository-id']).read() assert repo.sync()['result'] == 'success' @@ -381,11 +366,9 @@ def test_positive_sorted_issue_date_and_filter_by_cve(module_org, custom_repo, t :Setup: Errata synced on satellite server. - :Steps: GET /katello/api/errata + :steps: GET /katello/api/errata :expectedresults: Errata is sorted by issued date and filtered by CVE. - - :CaseLevel: System """ # Errata is sorted by issued date. erratum_list = target_sat.api.Errata(repository=custom_repo['repository-id']).search( @@ -476,12 +459,10 @@ def test_positive_get_count_for_host(setup_content_rhel6, rhel6_contenthost, tar 1. Errata synced on satellite server. 2. Some Content hosts present. - :Steps: GET /api/v2/hosts + :steps: GET /api/v2/hosts :expectedresults: The available errata count is retrieved. - :CaseLevel: System - :parametrized: yes :CaseImportance: Medium @@ -518,12 +499,10 @@ def test_positive_get_applicable_for_host(setup_content_rhel6, rhel6_contenthost 1. Errata synced on satellite server. 2. Some Content hosts present. - :Steps: GET /api/v2/hosts/:id/errata + :steps: GET /api/v2/hosts/:id/errata :expectedresults: The available errata is retrieved. - :CaseLevel: System - :parametrized: yes :CaseImportance: Medium @@ -566,12 +545,10 @@ def test_positive_get_diff_for_cv_envs(target_sat): 1. Errata synced on satellite server. 2. Multiple environments present. - :Steps: GET /katello/api/compare + :steps: GET /katello/api/compare :expectedresults: Difference in errata between a set of environments for a content view is retrieved. - - :CaseLevel: System """ org = target_sat.api.Organization().create() env = target_sat.api.LifecycleEnvironment(organization=org).create() @@ -624,7 +601,7 @@ def test_positive_incremental_update_required( :Setup: 1. Errata synced on satellite server - :Steps: + :steps: 1. Create VM as Content Host, registering to CV with custom errata 2. Install package in VM so it needs one erratum 3. Check if incremental_updates required: @@ -642,8 +619,6 @@ def test_positive_incremental_update_required( :parametrized: yes - :CaseLevel: System - :BZ: 2013093 """ rhel7_contenthost.install_katello_ca(target_sat) @@ -754,8 +729,6 @@ def test_errata_installation_with_swidtags( :parametrized: yes :CaseImportance: Critical - - :CaseLevel: System """ module_name = 'kangaroo' version = '20180704111719' @@ -912,8 +885,6 @@ def test_apply_modular_errata_using_default_content_view( :CaseAutomation: Automated :parametrized: yes - - :CaseLevel: System """ module_name = 'duck' stream = '0' @@ -962,8 +933,6 @@ def test_positive_sync_repos_with_large_errata(target_sat): :BZ: 1463811 - :CaseLevel: Integration - :expectedresults: both repositories were successfully synchronized """ org = target_sat.api.Organization().create() diff --git a/tests/foreman/api/test_filter.py b/tests/foreman/api/test_filter.py index 9a06f6cdfb1..b676a67c6da 100644 --- a/tests/foreman/api/test_filter.py +++ b/tests/foreman/api/test_filter.py @@ -8,17 +8,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: UsersRoles :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/foreman/api/test_foremantask.py b/tests/foreman/api/test_foremantask.py index 6d8bee0b42d..c736a0e7161 100644 --- a/tests/foreman/api/test_foremantask.py +++ b/tests/foreman/api/test_foremantask.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: TasksPlugin :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest from requests.exceptions import HTTPError diff --git a/tests/foreman/api/test_host.py b/tests/foreman/api/test_host.py index d495d6c7c24..94730d56925 100644 --- a/tests/foreman/api/test_host.py +++ b/tests/foreman/api/test_host.py @@ -8,17 +8,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import http @@ -93,8 +88,6 @@ def test_positive_search_by_org_id(target_sat): organization id was done :BZ: 1447958 - - :CaseLevel: Integration """ host = target_sat.api.Host().create() # adding org id as GET parameter for correspondence with BZ @@ -220,8 +213,6 @@ def test_positive_create_and_update_with_hostgroup( :id: 8f9601f9-afd8-4a88-8f28-a5cbc996e805 :expectedresults: A host is created and updated with expected hostgroup assigned - - :CaseLevel: Integration """ module_published_cv.version[0].promote(data={'environment_ids': module_lce.id, 'force': False}) hostgroup = module_target_sat.api.HostGroup( @@ -261,8 +252,6 @@ def test_positive_create_inherit_lce_cv( :expectedresults: Host's lifecycle environment and content view match the ones specified in hostgroup - :CaseLevel: Integration - :BZ: 1391656 """ hostgroup = module_target_sat.api.HostGroup( @@ -413,8 +402,6 @@ def test_positive_create_and_update_with_subnet( :id: 9aa97aff-8439-4027-89ee-01c643fbf7d1 :expectedresults: A host is created and updated with expected subnet assigned - - :CaseLevel: Integration """ host = module_target_sat.api.Host( location=module_location, organization=module_org, subnet=module_default_subnet @@ -438,8 +425,6 @@ def test_positive_create_and_update_with_compresource( :expectedresults: A host is created and updated with expected compute resource assigned - - :CaseLevel: Integration """ host = module_target_sat.api.Host( compute_resource=module_cr_libvirt, location=module_location, organization=module_org @@ -460,8 +445,6 @@ def test_positive_create_and_update_with_model(module_model, module_target_sat): :id: 7a912a19-71e4-4843-87fd-bab98c156f4a :expectedresults: A host is created and updated with expected model assigned - - :CaseLevel: Integration """ host = module_target_sat.api.Host(model=module_model).create() assert host.model.read().name == module_model.name @@ -480,8 +463,6 @@ def test_positive_create_and_update_with_user( :id: 72e20f8f-17dc-4e38-8ac1-d08df8758f56 :expectedresults: A host is created and updated with expected user assigned - - :CaseLevel: Integration """ host = module_target_sat.api.Host( owner=module_user, owner_type='User', organization=module_org, location=module_location @@ -504,8 +485,6 @@ def test_positive_create_and_update_with_usergroup( :id: 706e860c-8c05-4ddc-be20-0ecd9f0da813 :expectedresults: A host is created and updated with expected user group assigned - - :CaseLevel: Integration """ user = module_target_sat.api.User( location=[module_location], organization=[module_org], role=[function_role] @@ -619,8 +598,6 @@ def test_positive_create_and_update_with_compute_profile(module_compute_profile, :expectedresults: A host is created and updated with expected compute profile assigned - - :CaseLevel: Integration """ host = module_target_sat.api.Host(compute_profile=module_compute_profile).create() assert host.compute_profile.read().name == module_compute_profile.name @@ -639,8 +616,6 @@ def test_positive_create_and_update_with_content_view( :id: 10f69c7a-088e-474c-b869-1ad12deda2ad :expectedresults: A host is created and updated with expected content view - - :CaseLevel: Integration """ host = module_target_sat.api.Host( organization=module_org, @@ -710,8 +685,6 @@ def test_positive_end_to_end_with_image( :expectedresults: A host is created with expected image, image is removed and host is updated with expected image - - :CaseLevel: Integration """ host = module_target_sat.api.Host( organization=module_org, @@ -780,8 +753,6 @@ def test_positive_create_and_update_domain( :id: 8ca9f67c-4c11-40f9-b434-4f200bad000f :expectedresults: A host is created and updated with expected domain - - :CaseLevel: Integration """ host = module_target_sat.api.Host( organization=module_org, location=module_location, domain=module_domain @@ -805,8 +776,6 @@ def test_positive_create_and_update_env( :id: 87a08dbf-fd4c-4b6c-bf73-98ab70756fc6 :expectedresults: A host is created and updated with expected environment - - :CaseLevel: Integration """ host = session_puppet_enabled_sat.api.Host( organization=module_puppet_org, @@ -830,8 +799,6 @@ def test_positive_create_and_update_arch(module_architecture, module_target_sat) :id: 5f190b14-e6db-46e1-8cd1-e94e048e6a77 :expectedresults: A host is created and updated with expected architecture - - :CaseLevel: Integration """ host = module_target_sat.api.Host(architecture=module_architecture).create() assert host.architecture.read().name == module_architecture.name @@ -849,8 +816,6 @@ def test_positive_create_and_update_os(module_os, module_target_sat): :id: 46edced1-8909-4066-b196-b8e22512341f :expectedresults: A host is created updated with expected operating system - - :CaseLevel: Integration """ host = module_target_sat.api.Host(operatingsystem=module_os).create() assert host.operatingsystem.read().name == module_os.name @@ -873,8 +838,6 @@ def test_positive_create_and_update_medium(module_org, module_location, module_t :id: d81cb65c-48b3-4ce3-971e-51b9dd123697 :expectedresults: A host is created and updated with expected medium - - :CaseLevel: Integration """ medium = module_target_sat.api.Media( organization=[module_org], location=[module_location] @@ -938,8 +901,6 @@ def test_negative_update_arch(module_architecture, module_target_sat): :id: 07b9c0e7-f02b-4aff-99ae-5c203255aba1 :expectedresults: A host is not updated - - :CaseLevel: Integration """ host = module_target_sat.api.Host().create() host.architecture = module_architecture @@ -956,8 +917,6 @@ def test_negative_update_os(target_sat): :id: 40e79f73-6356-4d61-9806-7ade2f4f8829 :expectedresults: A host is not updated - - :CaseLevel: Integration """ host = target_sat.api.Host().create() new_os = target_sat.api.OperatingSystem( @@ -984,8 +943,6 @@ def test_positive_read_content_source_id( response :BZ: 1339613, 1488130 - - :CaseLevel: System """ proxy = target_sat.api.SmartProxy().search(query={'url': f'{target_sat.url}:9090'})[0].read() module_published_cv.version[0].promote(data={'environment_ids': module_lce.id, 'force': False}) @@ -1020,8 +977,6 @@ def test_positive_update_content_source_id( response :BZ: 1339613, 1488130 - - :CaseLevel: System """ proxy = target_sat.api.SmartProxy().search(query={'url': f'{target_sat.url}:9090'})[0] module_published_cv.version[0].promote(data={'environment_ids': module_lce.id, 'force': False}) @@ -1065,8 +1020,6 @@ def test_positive_read_enc_information( :expectedresults: host ENC information read successfully :BZ: 1362372 - - :CaseLevel: Integration """ lce = ( session_puppet_enabled_sat.api.LifecycleEnvironment() @@ -1127,8 +1080,6 @@ def test_positive_add_future_subscription(): 2. Add the subscription to the content host :expectedresults: The future-dated subscription was added to the host - - :CaseLevel: Integration """ @@ -1148,8 +1099,6 @@ def test_positive_add_future_subscription_with_ak(): 3. Register a new content host with the activation key :expectedresults: The host was registered and future subscription added - - :CaseLevel: Integration """ @@ -1168,8 +1117,6 @@ def test_negative_auto_attach_future_subscription(): 3. Run auto-attach on the content host :expectedresults: Only the current subscription was added to the host - - :CaseLevel: Integration """ @@ -1189,8 +1136,6 @@ def test_positive_create_baremetal_with_bios(): :expectedresults: Host is created :CaseAutomation: NotAutomated - - :CaseLevel: System """ @@ -1210,8 +1155,6 @@ def test_positive_create_baremetal_with_uefi(): :expectedresults: Host is created :CaseAutomation: NotAutomated - - :CaseLevel: System """ @@ -1242,8 +1185,6 @@ def test_positive_verify_files_with_pxegrub_uefi(): And record in /var/lib/dhcpd/dhcpd.leases points to the bootloader :CaseAutomation: NotAutomated - - :CaseLevel: System """ @@ -1278,8 +1219,6 @@ def test_positive_verify_files_with_pxegrub_uefi_secureboot(): :CaseComponent: TFTP :Team: Rocket - - :CaseLevel: Integration """ @@ -1314,8 +1253,6 @@ def test_positive_verify_files_with_pxegrub2_uefi(): :CaseComponent: TFTP :Team: Rocket - - :CaseLevel: Integration """ @@ -1347,8 +1284,6 @@ def test_positive_verify_files_with_pxegrub2_uefi_secureboot(): :CaseAutomation: NotAutomated - :CaseLevel: Integration - :CaseComponent: TFTP :Team: Rocket diff --git a/tests/foreman/api/test_hostcollection.py b/tests/foreman/api/test_hostcollection.py index 004d1089818..985f989718e 100644 --- a/tests/foreman/api/test_hostcollection.py +++ b/tests/foreman/api/test_hostcollection.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: HostCollections :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from random import choice, randint @@ -204,8 +199,6 @@ def test_positive_add_host(module_org, fake_hosts, module_target_sat): :expectedresults: Host was added to the host collection. - :CaseLevel: Integration - :BZ:1325989 """ host_collection = module_target_sat.api.HostCollection(organization=module_org).create() @@ -223,8 +216,6 @@ def test_positive_add_hosts(module_org, fake_hosts, module_target_sat): :expectedresults: Hosts were added to the host collection. - :CaseLevel: Integration - :BZ: 1325989 """ host_collection = module_target_sat.api.HostCollection(organization=module_org).create() diff --git a/tests/foreman/api/test_hostgroup.py b/tests/foreman/api/test_hostgroup.py index b13e675eca1..7f786ef821c 100644 --- a/tests/foreman/api/test_hostgroup.py +++ b/tests/foreman/api/test_hostgroup.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: HostGroup :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from random import randint @@ -62,7 +57,6 @@ def test_inherit_puppetclass(self, session_puppet_enabled_sat): :BZ: 1107708, 1222118, 1487586 - :CaseLevel: System """ # Creating entities like organization, content view and lifecycle_env # with not utf-8 names for easier interaction with puppet environment @@ -169,7 +163,6 @@ def test_rebuild_config(self, module_org, module_location, hostgroup, module_tar :CaseImportance: Medium - :CaseLevel: System """ lce = module_target_sat.api.LifecycleEnvironment(organization=module_org).create() content_view = module_target_sat.api.ContentView(organization=module_org).create() @@ -248,8 +241,6 @@ def test_positive_create_with_properties( :expectedresults: A hostgroup is created with expected properties, updated and deleted - :CaseLevel: Integration - :CaseImportance: High """ env = session_puppet_enabled_sat.api.Environment( @@ -402,7 +393,6 @@ def test_positive_create_with_realm(self, module_org, module_location, target_sa :expectedresults: A hostgroup is created with expected realm assigned - :CaseLevel: Integration """ realm = target_sat.api.Realm( location=[module_location], @@ -427,7 +417,6 @@ def test_positive_create_with_locs(self, module_org, module_target_sat): :expectedresults: A hostgroup is created with expected multiple locations assigned - :CaseLevel: Integration """ locs = [ module_target_sat.api.Location(organization=[module_org]).create() @@ -449,7 +438,6 @@ def test_positive_create_with_orgs(self, target_sat): :expectedresults: A hostgroup is created with expected multiple organizations assigned - :CaseLevel: Integration """ orgs = [target_sat.api.Organization().create() for _ in range(randint(3, 5))] hostgroup = target_sat.api.HostGroup(organization=orgs).create() @@ -482,7 +470,6 @@ def test_positive_update_puppet_ca_proxy(self, puppet_hostgroup, session_puppet_ :CaseImportance: Medium - :CaseLevel: Integration """ new_proxy = session_puppet_enabled_sat.api.SmartProxy().search( query={'search': f'url = {session_puppet_enabled_sat.url}:9090'} @@ -502,7 +489,6 @@ def test_positive_update_realm(self, module_org, module_location, target_sat): :expectedresults: A hostgroup is updated with expected realm - :CaseLevel: Integration """ realm = target_sat.api.Realm( location=[module_location], @@ -535,7 +521,6 @@ def test_positive_update_puppet_proxy(self, puppet_hostgroup, session_puppet_ena :expectedresults: A hostgroup is updated with expected puppet proxy - :CaseLevel: Integration """ new_proxy = session_puppet_enabled_sat.api.SmartProxy().search( query={'search': f'url = {session_puppet_enabled_sat.url}:9090'} @@ -554,7 +539,6 @@ def test_positive_update_content_source(self, hostgroup, target_sat): :expectedresults: A hostgroup is updated with expected puppet proxy - :CaseLevel: Integration """ new_content_source = target_sat.api.SmartProxy().search( query={'search': f'url = {target_sat.url}:9090'} @@ -573,7 +557,6 @@ def test_positive_update_locs(self, module_org, hostgroup, module_target_sat): :expectedresults: A hostgroup is updated with expected locations - :CaseLevel: Integration """ new_locs = [ module_target_sat.api.Location(organization=[module_org]).create() @@ -593,7 +576,6 @@ def test_positive_update_orgs(self, hostgroup, target_sat): :expectedresults: A hostgroup is updated with expected organizations - :CaseLevel: Integration """ new_orgs = [target_sat.api.Organization().create() for _ in range(randint(3, 5))] hostgroup.organization = new_orgs @@ -649,8 +631,6 @@ def test_positive_create_with_group_parameters(self, module_org, module_target_s :customerscenario: true - :CaseLevel: Integration - :BZ: 1710853 """ group_params = {'name': gen_string('alpha'), 'value': gen_string('alpha')} @@ -681,7 +661,6 @@ def test_positive_get_content_source(self, hostgroup, target_sat): :expectedresults: The response contains both values for the ``content_source`` field. - :CaseLevel: Integration """ names = target_sat.api_factory.one_to_one_names('content_source') hostgroup_attrs = set(hostgroup.read_json().keys()) @@ -700,7 +679,6 @@ def test_positive_get_cv(self, hostgroup, target_sat): :expectedresults: The response contains both values for the ``content_view`` field. - :CaseLevel: Integration """ names = target_sat.api_factory.one_to_one_names('content_view') hostgroup_attrs = set(hostgroup.read_json().keys()) @@ -719,7 +697,6 @@ def test_positive_get_lce(self, hostgroup, target_sat): :expectedresults: The response contains both values for the ``lifecycle_environment`` field. - :CaseLevel: Integration """ names = target_sat.api_factory.one_to_one_names('lifecycle_environment') hostgroup_attrs = set(hostgroup.read_json().keys()) @@ -740,7 +717,6 @@ def test_positive_read_puppet_proxy_name(self, session_puppet_enabled_sat): :BZ: 1371900 - :CaseLevel: Integration """ proxy = session_puppet_enabled_sat.api.SmartProxy().search( query={'search': f'url = {session_puppet_enabled_sat.url}:9090'} @@ -762,7 +738,6 @@ def test_positive_read_puppet_ca_proxy_name(self, session_puppet_enabled_sat): :BZ: 1371900 - :CaseLevel: Integration """ proxy = session_puppet_enabled_sat.api.SmartProxy().search( query={'search': f'url = {session_puppet_enabled_sat.url}:9090'} diff --git a/tests/foreman/api/test_http_proxy.py b/tests/foreman/api/test_http_proxy.py index ee1016377b5..9decd84d33b 100644 --- a/tests/foreman/api/test_http_proxy.py +++ b/tests/foreman/api/test_http_proxy.py @@ -2,19 +2,14 @@ :Requirement: HttpProxy -:CaseLevel: Acceptance - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: High :CaseAutomation: Automated -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -157,8 +152,6 @@ def test_positive_auto_attach_with_http_proxy( :BZ: 2046337 :parametrized: yes - - :CaseLevel: System """ org = function_entitlement_manifest_org lce = module_target_sat.api.LifecycleEnvironment(organization=org).create() diff --git a/tests/foreman/api/test_ldapauthsource.py b/tests/foreman/api/test_ldapauthsource.py index 2139e7c947f..fbcc7039193 100644 --- a/tests/foreman/api/test_ldapauthsource.py +++ b/tests/foreman/api/test_ldapauthsource.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: LDAP :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest from requests.exceptions import HTTPError diff --git a/tests/foreman/api/test_lifecycleenvironment.py b/tests/foreman/api/test_lifecycleenvironment.py index dfc3ed1ba27..b68017efb87 100644 --- a/tests/foreman/api/test_lifecycleenvironment.py +++ b/tests/foreman/api/test_lifecycleenvironment.py @@ -8,17 +8,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: LifecycleEnvironments :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -138,8 +133,6 @@ def test_positive_update_description(module_lce, new_desc, module_target_sat): :expectedresults: Lifecycle environment is created and updated properly - :CaseLevel: Integration - :CaseImportance: Low :parametrized: yes @@ -197,7 +190,7 @@ def test_positive_search_in_org(name, target_sat): :id: 110e4777-c374-4365-b676-b1db4552fe51 - :Steps: + :steps: 1. Create an organization. 2. Create a lifecycle environment belonging to the organization. @@ -206,8 +199,6 @@ def test_positive_search_in_org(name, target_sat): :expectedresults: Only "Library" and the lifecycle environment just created are in the search results. - :CaseLevel: Integration - :parametrized: yes """ new_org = target_sat.api.Organization().create() @@ -232,11 +223,9 @@ def test_positive_create_environment_after_host_register(): 2. Create a new content host. 3. Register the content host to the Library environment. - :Steps: Create a new environment. + :steps: Create a new environment. :expectedresults: The environment is created without any errors. - :CaseLevel: Integration - :CaseAutomation: NotAutomated """ diff --git a/tests/foreman/api/test_location.py b/tests/foreman/api/test_location.py index ad226389c57..2e54a4862fa 100644 --- a/tests/foreman/api/test_location.py +++ b/tests/foreman/api/test_location.py @@ -7,17 +7,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: OrganizationsandLocations :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from random import randint @@ -40,7 +35,6 @@ def valid_loc_data_list(): Note: The maximum allowed length of location name is 246 only. This is an intended behavior (Also note that 255 is the standard across other entities.) - """ return dict( alpha=gen_string('alpha', randint(1, 246)), @@ -127,7 +121,6 @@ def test_positive_create_and_update_with_org(self, make_orgs, target_sat): :expectedresults: Location created successfully and has correct organization assigned to it with expected title - :CaseLevel: Integration """ location = target_sat.api.Location(organization=[make_orgs['org']]).create() assert location.organization[0].id == make_orgs['org'].id @@ -208,7 +201,6 @@ def test_positive_update_entities(self, make_entities, target_sat): :expectedresults: Location updated successfully and has correct domain assigned - :CaseLevel: Integration """ location = target_sat.api.Location().create() @@ -247,8 +239,6 @@ def test_positive_create_update_and_remove_capsule(self, make_proxies, target_sa :BZ: 1398695 - :CaseLevel: Integration - :CaseImportance: High """ proxy_id_1 = make_proxies['proxy1']['id'] @@ -276,7 +266,6 @@ def test_negative_update_domain(self, target_sat): :expectedresults: Location is not updated - :CaseLevel: Integration """ location = target_sat.api.Location(domain=[target_sat.api.Domain().create()]).create() domain = target_sat.api.Domain().create() diff --git a/tests/foreman/api/test_media.py b/tests/foreman/api/test_media.py index f68ea37bd72..79c5cb7f20e 100644 --- a/tests/foreman/api/test_media.py +++ b/tests/foreman/api/test_media.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import random @@ -90,7 +85,6 @@ def test_positive_create_with_location(self, module_org, module_location, module :expectedresults: Media entity is created and has proper location - :CaseLevel: Integration """ media = module_target_sat.api.Media( organization=[module_org], location=[module_location] @@ -105,7 +99,6 @@ def test_positive_create_with_os(self, module_org, module_target_sat): :expectedresults: Media entity is created and assigned to expected OS - :CaseLevel: Integration """ os = module_target_sat.api.OperatingSystem().create() media = module_target_sat.api.Media( diff --git a/tests/foreman/api/test_multiple_paths.py b/tests/foreman/api/test_multiple_paths.py index 9ef87e66696..8c683ca309a 100644 --- a/tests/foreman/api/test_multiple_paths.py +++ b/tests/foreman/api/test_multiple_paths.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: API :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import http diff --git a/tests/foreman/api/test_operatingsystem.py b/tests/foreman/api/test_operatingsystem.py index 4cdb27a04a2..9e25a92e167 100644 --- a/tests/foreman/api/test_operatingsystem.py +++ b/tests/foreman/api/test_operatingsystem.py @@ -4,17 +4,12 @@ :CaseAutomation: NotAutomated -:CaseLevel: System - :CaseComponent: Provisioning :Team: Rocket -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ from http.client import NOT_FOUND import random @@ -213,7 +208,6 @@ def test_positive_create_with_archs(self, target_sat): :expectedresults: The operating system is created and points at the expected architectures. - :CaseLevel: Integration """ amount = range(random.randint(3, 5)) archs = [target_sat.api.Architecture().create() for _ in amount] @@ -231,7 +225,6 @@ def test_positive_create_with_ptables(self, target_sat): :expectedresults: The operating system is created and points at the expected partition tables. - :CaseLevel: Integration """ amount = range(random.randint(3, 5)) ptables = [target_sat.api.PartitionTable().create() for _ in amount] @@ -365,7 +358,6 @@ def test_positive_update_medias(self, module_org, module_target_sat): :expectedresults: The operating system is updated and points at the expected medias. - :CaseLevel: Integration """ initial_media = module_target_sat.api.Media(organization=[module_org]).create() os = module_target_sat.api.OperatingSystem(medium=[initial_media]).create() diff --git a/tests/foreman/api/test_organization.py b/tests/foreman/api/test_organization.py index 5907c11e5ce..615ae873a56 100644 --- a/tests/foreman/api/test_organization.py +++ b/tests/foreman/api/test_organization.py @@ -7,17 +7,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: OrganizationsandLocations :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import http import json @@ -255,7 +250,6 @@ def test_positive_update_user(self, module_org, target_sat): :expectedresults: User is associated with organization. - :CaseLevel: Integration """ user = target_sat.api.User().create() module_org.user = [user] @@ -271,7 +265,6 @@ def test_positive_update_subnet(self, module_org, target_sat): :expectedresults: Subnet is associated with organization. - :CaseLevel: Integration """ subnet = target_sat.api.Subnet().create() module_org.subnet = [subnet] @@ -289,8 +282,6 @@ def test_positive_add_and_remove_hostgroup(self, target_sat): :expectedresults: Hostgroup is added to organization and then removed - :CaseLevel: Integration - :CaseImportance: Medium """ org = target_sat.api.Organization().create() @@ -313,7 +304,6 @@ def test_positive_add_and_remove_smart_proxy(self, target_sat): :BZ: 1395229 - :CaseLevel: Integration """ # Every Satellite has a built-in smart proxy, so let's find it smart_proxy = target_sat.api.SmartProxy().search( diff --git a/tests/foreman/api/test_oscap_tailoringfiles.py b/tests/foreman/api/test_oscap_tailoringfiles.py index fb6b78750f0..af6b5f47a65 100644 --- a/tests/foreman/api/test_oscap_tailoringfiles.py +++ b/tests/foreman/api/test_oscap_tailoringfiles.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: SCAPPlugin :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/foreman/api/test_oscappolicy.py b/tests/foreman/api/test_oscappolicy.py index c9500c465d1..ba318c801cb 100644 --- a/tests/foreman/api/test_oscappolicy.py +++ b/tests/foreman/api/test_oscappolicy.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: SCAPPlugin :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -34,8 +29,6 @@ def test_positive_crud_scap_policy( :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: Critical """ name = gen_string('alpha') diff --git a/tests/foreman/api/test_partitiontable.py b/tests/foreman/api/test_partitiontable.py index fd0027cbc40..9b8e2a29d2c 100644 --- a/tests/foreman/api/test_partitiontable.py +++ b/tests/foreman/api/test_partitiontable.py @@ -8,17 +8,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import random diff --git a/tests/foreman/api/test_permission.py b/tests/foreman/api/test_permission.py index 5ca6deeb132..4abcf58f21f 100644 --- a/tests/foreman/api/test_permission.py +++ b/tests/foreman/api/test_permission.py @@ -8,17 +8,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: UsersRoles :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from itertools import chain import json diff --git a/tests/foreman/api/test_ping.py b/tests/foreman/api/test_ping.py index 57d64fa372c..5c3c905df8f 100644 --- a/tests/foreman/api/test_ping.py +++ b/tests/foreman/api/test_ping.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: API :Team: Endeavour -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ import pytest diff --git a/tests/foreman/api/test_product.py b/tests/foreman/api/test_product.py index dfa9f59f705..7915ddd2de7 100644 --- a/tests/foreman/api/test_product.py +++ b/tests/foreman/api/test_product.py @@ -7,17 +7,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -96,8 +91,6 @@ def test_positive_create_with_gpg(module_org, module_target_sat): :id: 57331c1f-15dd-4c9f-b8fc-3010847b2975 :expectedresults: A product is created with the specified GPG key. - - :CaseLevel: Integration """ gpg_key = module_target_sat.api.GPGKey( content=DataFile.VALID_GPG_KEY_FILE.read_text(), @@ -225,8 +218,6 @@ def test_positive_update_gpg(module_org, module_target_sat): :id: 3b08f155-a0d6-4987-b281-dc02e8d5a03e :expectedresults: The updated product points to a new GPG key. - - :CaseLevel: Integration """ # Create a product and make it point to a GPG key. gpg_key_1 = module_target_sat.api.GPGKey( @@ -254,8 +245,6 @@ def test_positive_update_organization(module_org, module_target_sat): :expectedresults: The updated product points to a new organization - :CaseLevel: Integration - :BZ: 1310422 """ product = module_target_sat.api.Product(organization=module_org).create() @@ -350,8 +339,6 @@ def test_positive_sync_several_repos(module_org, module_target_sat): :expectedresults: All repositories within a product are successfully synced. - :CaseLevel: Integration - :BZ: 1389543 """ product = module_target_sat.api.Product(organization=module_org).create() @@ -380,8 +367,6 @@ def test_positive_filter_product_list(module_entitlement_manifest_org, module_ta :expectedresults: Able to list the products based on defined filter. - :CaseLevel: Integration - :BZ: 1667129 """ org = module_entitlement_manifest_org diff --git a/tests/foreman/api/test_provisioning.py b/tests/foreman/api/test_provisioning.py index 3cff7baca75..7b2aeaec917 100644 --- a/tests/foreman/api/test_provisioning.py +++ b/tests/foreman/api/test_provisioning.py @@ -4,17 +4,12 @@ :CaseAutomation: NotAutomated -:CaseLevel: System - :CaseComponent: Provisioning :Team: Rocket -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ from fauxfactory import gen_string from packaging.version import Version diff --git a/tests/foreman/api/test_provisioningtemplate.py b/tests/foreman/api/test_provisioningtemplate.py index 43ba2aa3188..1b62a9f003e 100644 --- a/tests/foreman/api/test_provisioningtemplate.py +++ b/tests/foreman/api/test_provisioningtemplate.py @@ -11,13 +11,8 @@ :Team: Rocket -:TestType: Functional - -:CaseLevel: Integration - :CaseImportance: High -:Upstream: No """ from random import choice @@ -129,10 +124,7 @@ def tftpboot(module_org, module_target_sat): class TestProvisioningTemplate: - """Tests for provisioning templates - - :CaseLevel: Acceptance - """ + """Tests for provisioning templates""" @pytest.mark.tier1 @pytest.mark.e2e @@ -225,8 +217,6 @@ def test_positive_build_pxe_default(self, tftpboot, module_target_sat): :expectedresults: The response is a JSON payload, all templates are deployed to TFTP/HTTP and are rendered correctly - :CaseLevel: Integration - :CaseImportance: Critical :BZ: 1202564 diff --git a/tests/foreman/api/test_puppetbootstrap.py b/tests/foreman/api/test_puppetbootstrap.py index 4ccdb5c9541..c1de7cda574 100644 --- a/tests/foreman/api/test_puppetbootstrap.py +++ b/tests/foreman/api/test_puppetbootstrap.py @@ -4,17 +4,11 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Puppet :Team: Rocket -:TestType: Functional - :CaseImportance: Medium - -:Upstream: No """ from fauxfactory import gen_string import pytest diff --git a/tests/foreman/api/test_registration.py b/tests/foreman/api/test_registration.py index 97268df8d69..86ac85dd4b8 100644 --- a/tests/foreman/api/test_registration.py +++ b/tests/foreman/api/test_registration.py @@ -2,8 +2,6 @@ :Requirement: Registration -:CaseLevel: Acceptance - :CaseComponent: Registration :CaseAutomation: Automated @@ -12,9 +10,6 @@ :Team: Rocket -:TestType: Functional - -:Upstream: No """ import uuid @@ -107,8 +102,6 @@ def test_positive_allow_reregistration_when_dmi_uuid_changed( :customerscenario: true :BZ: 1747177 - - :CaseLevel: Integration """ uuid_1 = str(uuid.uuid1()) uuid_2 = str(uuid.uuid4()) diff --git a/tests/foreman/api/test_remoteexecution.py b/tests/foreman/api/test_remoteexecution.py index a06faea9e23..19e3e9daab7 100644 --- a/tests/foreman/api/test_remoteexecution.py +++ b/tests/foreman/api/test_remoteexecution.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: RemoteExecution :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/foreman/api/test_reporttemplates.py b/tests/foreman/api/test_reporttemplates.py index 884b9a5959e..f1c0866c4f2 100644 --- a/tests/foreman/api/test_reporttemplates.py +++ b/tests/foreman/api/test_reporttemplates.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Reporting :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from broker import Broker from fauxfactory import gen_string diff --git a/tests/foreman/api/test_repositories.py b/tests/foreman/api/test_repositories.py index 0a63fde1bb6..bd3ec77c80d 100644 --- a/tests/foreman/api/test_repositories.py +++ b/tests/foreman/api/test_repositories.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ from manifester import Manifester from nailgun.entity_mixins import call_entity_method_with_timeout @@ -35,7 +30,7 @@ def test_negative_disable_repository_with_cv(module_entitlement_manifest_org, ta :id: e521a7a4-2502-4fe2-b297-a13fc99e679b - :Steps: + :steps: 1. Enable and sync a RH Repo 2. Create a Content View with Repository attached 3. Publish Content View @@ -77,7 +72,7 @@ def test_positive_update_repository_metadata(module_org, target_sat): :id: 6fe7bb3f-1640-4904-a223-b4764534afe8 - :Steps: + :steps: 1. Create a Product and Yum Repository 2. Sync the Repository and returns its content_counts for rpm 3. Update the url to a different Repo and re-sync the Repository @@ -127,7 +122,7 @@ def test_positive_epel_repositories_with_mirroring_policy( :id: 5c4e0ba4-4486-4eaf-b6ad-62831b7353a4 - :Steps: + :steps: 1. Create a Epel repository with mirroring_policy set 2. Sync the Repository and return its content_counts for rpm 3. Assert content was synced and mirroring policy type is correct @@ -151,8 +146,6 @@ def test_positive_sync_kickstart_repo(module_entitlement_manifest_org, target_sa :expectedresults: No encoding gzip errors present in /var/log/messages. - :CaseLevel: Integration - :customerscenario: true :steps: @@ -199,7 +192,7 @@ def test_negative_upload_expired_manifest(module_org, target_sat): :id: d6e652d8-5f46-4d15-9191-d842466d45d0 - :Steps: + :steps: 1. Upload a manifest 2. Delete the Subscription Allocation on RHSM 3. Attempt to refresh the manifest @@ -225,7 +218,7 @@ def test_positive_multiple_orgs_with_same_repo(target_sat): :id: 39cff8ea-969d-4b8f-9fb4-33b1ba768ff2 - :Steps: + :steps: 1. Create multiple organizations 2. Sync the same repository to each organization 3. Assert that each repository from each organization contain the same content counts @@ -250,7 +243,7 @@ def test_positive_sync_mulitple_large_repos(module_target_sat, module_entitlemen :id: b51c4a3d-d532-4342-be61-e868f7c3a723 - :Steps: + :steps: 1. Enabled multiple large Repositories Red Hat Enterprise Linux 8 for x86_64 - AppStream RPMs 8 Red Hat Enterprise Linux 8 for x86_64 - BaseOS RPMs 8 @@ -298,7 +291,7 @@ def test_positive_available_repositories_endpoint(module_sca_manifest_org, targe :id: f4c9d4a0-9a82-4f06-b772-b1f7e3f45e7d - :Steps: + :steps: 1. Enable a Red Hat Repository 2. Attempt to hit the enpoint: GET /katello/api/repository_sets/:id/available_repositories diff --git a/tests/foreman/api/test_repository.py b/tests/foreman/api/test_repository.py index ba3d88895b1..2352d91f403 100644 --- a/tests/foreman/api/test_repository.py +++ b/tests/foreman/api/test_repository.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import re from string import punctuation @@ -317,7 +312,6 @@ def test_positive_create_with_gpg(self, module_org, module_product, module_targe :expectedresults: A repository is created with the given GPG key ID. - :CaseLevel: Integration """ gpg_key = module_target_sat.api.GPGKey( organization=module_org, @@ -336,7 +330,6 @@ def test_positive_create_same_name_different_orgs(self, repo, target_sat): :expectedresults: The two repositories are successfully created and have given name. - :CaseLevel: Integration """ org_2 = target_sat.api.Organization().create() product_2 = target_sat.api.Product(organization=org_2).create() @@ -678,7 +671,6 @@ def test_positive_update_gpg(self, module_org, module_product, module_target_sat :expectedresults: The updated repository points to a new GPG key. - :CaseLevel: Integration """ # Create a repo and make it point to a GPG key. gpg_key_1 = module_target_sat.api.GPGKey( @@ -705,7 +697,6 @@ def test_positive_update_contents(self, repo): :expectedresults: The repository's contents include one RPM. - :CaseLevel: Integration """ # Upload RPM content. repo.upload_content(files={'content': DataFile.RPM_TO_UPLOAD.read_bytes()}) @@ -867,7 +858,6 @@ def test_positive_synchronize(self, repo): :expectedresults: The repo has at least one RPM. - :CaseLevel: Integration """ repo.sync() assert repo.read().content_counts['rpm'] >= 1 @@ -901,7 +891,6 @@ def test_positive_synchronize_auth_yum_repo(self, repo): :expectedresults: Repository is created and synced - :CaseLevel: Integration """ # Verify that repo is not yet synced assert repo.content_counts['rpm'] == 0 @@ -940,7 +929,6 @@ def test_negative_synchronize_auth_yum_repo(self, repo): :expectedresults: Repository is created but synchronization fails - :CaseLevel: Integration """ with pytest.raises(TaskFailedError): repo.sync() @@ -967,7 +955,6 @@ def test_positive_resynchronize_rpm_repo(self, repo, target_sat): :BZ: 1459845, 1318004 - :CaseLevel: Integration """ # Synchronize it repo.sync() @@ -1023,7 +1010,6 @@ def test_positive_delete_rpm(self, repo): :expectedresults: The repository deleted successfully. - :CaseLevel: Integration """ repo.sync() # Check that there is at least one package @@ -1058,8 +1044,6 @@ def test_positive_access_protected_repository(self, module_org, repo, target_sat :BZ: 1242310 - :CaseLevel: Integration - :CaseImportance: High """ repo.sync() @@ -1100,8 +1084,6 @@ def test_positive_access_unprotected_repository(self, module_org, repo, target_s :expectedresults: The repository data file is successfully accessed. - :CaseLevel: Integration - :CaseImportance: Medium """ repo.sync() @@ -1208,7 +1190,6 @@ def test_positive_mirroring_policy(self, target_sat): :expectedresults: 1. The resync restores the original content properly. - :CaseLevel: System """ repo_url = settings.repos.yum_0.url packages_count = constants.FAKE_0_YUM_REPO_PACKAGES_COUNT @@ -1263,8 +1244,6 @@ def test_positive_sync_repos_with_lots_files(self, target_sat): :BZ: 1404345 - :CaseLevel: Integration - :expectedresults: repository was successfully synchronized """ org = target_sat.api.Organization().create() @@ -1282,7 +1261,6 @@ def test_positive_sync_rh(self, module_entitlement_manifest_org, target_sat): :expectedresults: Synced repo should fetch the data successfully. - :CaseLevel: Integration """ repo_id = target_sat.api_factory.enable_rhrepo_and_fetchid( basearch='x86_64', @@ -1314,8 +1292,6 @@ def test_positive_sync_yum_with_string_based_version(self, repo): :expectedresults: Synced repo should fetch the data successfully and parse versions as string. - :CaseLevel: Integration - :customerscenario: true :BZ: 1741011 @@ -1336,7 +1312,6 @@ def test_positive_sync_rh_app_stream(self): :expectedresults: Synced repo should fetch the data successfully and it should contain the module streams. - :CaseLevel: Integration """ pass @@ -1702,7 +1677,6 @@ def test_positive_synchronize_private_registry(self, repo): :BZ: 1475121 - :CaseLevel: Integration """ repo.sync() assert repo.read().content_counts['docker_manifest'] >= 1 @@ -1740,7 +1714,6 @@ def test_negative_synchronize_private_registry_wrong_password(self, repo_options :BZ: 1475121, 1580510 - :CaseLevel: Integration """ msg = "401, message=\'Unauthorized\'" with pytest.raises(TaskFailedError, match=msg): @@ -1779,7 +1752,6 @@ def test_negative_synchronize_private_registry_wrong_repo(self, repo_options, re :BZ: 1475121, 1580510 - :CaseLevel: Integration """ msg = "404, message=\'Not Found\'" with pytest.raises(TaskFailedError, match=msg): @@ -1819,7 +1791,6 @@ def test_negative_synchronize_private_registry_no_passwd( :BZ: 1475121, 1580510 - :CaseLevel: Integration """ with pytest.raises( HTTPError, @@ -2087,8 +2058,6 @@ def test_negative_synchronize_docker_repo_with_invalid_tags(self, repo_options, # # :expectedresults: Synced repo should fetch the data successfully. # -# :CaseLevel: Integration -# # :customerscenario: true # # :BZ: 1625783 @@ -2190,8 +2159,6 @@ class TestSRPMRepositoryIgnoreContent: In particular sync of duplicate SRPMs would fail when using the flag ``ignorable_content``. - :CaseLevel: Integration - :CaseComponent: Pulp :customerscenario: true @@ -2301,7 +2268,7 @@ def test_positive_upload_file_to_file_repo(self, repo, target_sat): :id: fdb46481-f0f4-45aa-b075-2a8f6725e51b - :Steps: + :steps: 1. Create a File Repository 2. Upload an arbitrary file to it @@ -2330,7 +2297,7 @@ def test_positive_file_permissions(self): 1. Create a File Repository 2. Upload an arbitrary file to it - :Steps: Retrieve file permissions from File Repository + :steps: Retrieve file permissions from File Repository :expectedresults: uploaded file permissions are kept after upload @@ -2356,7 +2323,7 @@ def test_positive_remove_file(self, repo, target_sat): 1. Create a File Repository 2. Upload an arbitrary file to it - :Steps: Remove a file from File Repository + :steps: Remove a file from File Repository :expectedresults: file is not listed under File Repository after removal @@ -2386,7 +2353,7 @@ def test_positive_remote_directory_sync(self): 1. Create a directory to be synced with a pulp manifest on its root 2. Make the directory available through http - :Steps: + :steps: 1. Create a File Repository with url pointing to http url created on setup 2. Initialize synchronization @@ -2409,7 +2376,7 @@ def test_positive_local_directory_sync(self): 1. Create a directory to be synced with a pulp manifest on its root locally (on the Satellite/Foreman host) - :Steps: + :steps: 1. Create a File Repository with url pointing to local url created on setup 2. Initialize synchronization @@ -2435,7 +2402,7 @@ def test_positive_symlinks_sync(self): locally (on the Satellite/Foreman host) 2. Make sure it contains synlinks - :Steps: + :steps: 1. Create a File Repository with url pointing to local url created on setup 2. Initialize synchronization diff --git a/tests/foreman/api/test_repository_set.py b/tests/foreman/api/test_repository_set.py index e4766585824..8f8c56ea04e 100644 --- a/tests/foreman/api/test_repository_set.py +++ b/tests/foreman/api/test_repository_set.py @@ -7,17 +7,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/foreman/api/test_rhc.py b/tests/foreman/api/test_rhc.py index 6a279c70480..3eb6b39c894 100644 --- a/tests/foreman/api/test_rhc.py +++ b/tests/foreman/api/test_rhc.py @@ -4,17 +4,11 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: RHCloud :Team: Platform -:TestType: Functional - :CaseImportance: High - -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -44,7 +38,7 @@ def test_positive_configure_cloud_connector(target_sat, default_org, fixture_ena :id: 1338dc6a-12e0-4378-9a51-a33f4679ba30 - :Steps: + :steps: 1. Enable RH Cloud Connector 2. Check if the task is completed successfully diff --git a/tests/foreman/api/test_rhcloud_inventory.py b/tests/foreman/api/test_rhcloud_inventory.py index 0a2bb0a63a6..03c8b1060ea 100644 --- a/tests/foreman/api/test_rhcloud_inventory.py +++ b/tests/foreman/api/test_rhcloud_inventory.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: System - :CaseComponent: RHCloud :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from datetime import datetime @@ -144,7 +139,7 @@ def test_rhcloud_inventory_api_hosts_synchronization( :id: 7be22e1c-906b-4ae5-93dd-5f79f395601c - :Steps: + :steps: 1. Prepare machine and upload its data to Insights. 2. Sync inventory status using RH Cloud plugin api. @@ -264,7 +259,7 @@ def test_rhcloud_inventory_auto_upload_setting(): :customerscenario: true - :Steps: + :steps: 1. Register a content host with satellite. 2. Enable "Automatic inventory upload" setting. 3. Verify that satellite automatically generate and upload @@ -294,7 +289,7 @@ def test_inventory_upload_with_http_proxy(): :customerscenario: true - :Steps: + :steps: 1. Create a http proxy which is using port 80. 2. Register a content host with satellite. 3. Set Default HTTP Proxy setting. @@ -322,7 +317,7 @@ def test_include_parameter_tags_setting( :id: 3136a1e3-f844-416b-8334-75b27fd9e3a1 - :Steps: + :steps: 1. Enable include_parameter_tags setting. 2. Register a content host with satellite. 3. Generate inventory report. diff --git a/tests/foreman/api/test_rhsm.py b/tests/foreman/api/test_rhsm.py index 2194ecdb147..096163a8719 100644 --- a/tests/foreman/api/test_rhsm.py +++ b/tests/foreman/api/test_rhsm.py @@ -8,17 +8,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: SubscriptionManagement :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import http diff --git a/tests/foreman/api/test_role.py b/tests/foreman/api/test_role.py index 7afbba1f439..d333f63f873 100644 --- a/tests/foreman/api/test_role.py +++ b/tests/foreman/api/test_role.py @@ -8,17 +8,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: UsersRoles :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from nailgun.config import ServerConfig import pytest @@ -576,7 +571,6 @@ def test_negative_access_entities_from_org_admin( :expectedresults: User should not be able to access any resources and permissions in taxonomies selected in Org Admin role - :CaseLevel: System """ user = self.create_org_admin_user( target_sat, role_taxos=role_taxonomies, user_taxos=filter_taxonomies @@ -609,7 +603,6 @@ def test_negative_access_entities_from_user( :expectedresults: User should not be able to access any resources and permissions in its own taxonomies - :CaseLevel: System """ user = self.create_org_admin_user( target_sat, role_taxos=role_taxonomies, user_taxos=filter_taxonomies @@ -636,7 +629,6 @@ def test_positive_override_cloned_role_filter(self, role_taxonomies, target_sat) :expectedresults: Filter in cloned role should be overridden - :CaseLevel: Integration """ role_name = gen_string('alpha') role = target_sat.api.Role(name=role_name).create() @@ -679,7 +671,6 @@ def test_positive_emptiness_of_filter_taxonomies_on_role_clone( None in cloned role 2. Override flag is set to True in cloned role filter - :CaseLevel: Integration """ role = target_sat.api.Role( name=gen_string('alpha'), @@ -722,7 +713,6 @@ def test_positive_clone_role_having_overridden_filter_with_taxonomies( :expectedresults: Unlimited and Override flags should be set to True on filter for filter that is overridden in parent role - :CaseLevel: Integration """ role = target_sat.api.Role( name=gen_string('alpha'), @@ -770,7 +760,6 @@ def test_positive_clone_role_having_non_overridden_filter_with_taxonomies( :expectedresults: Both unlimited and override flag should be set to False on filter for filter that is not overridden in parent role - :CaseLevel: Integration """ role = target_sat.api.Role( name=gen_string('alpha'), @@ -811,7 +800,6 @@ def test_positive_clone_role_having_unlimited_filter_with_taxonomies( :expectedresults: Both unlimited and override flags should be set to False on filter for filter that is unlimited in parent role - :CaseLevel: Integration """ role = target_sat.api.Role( name=gen_string('alpha'), @@ -852,7 +840,6 @@ def test_positive_clone_role_having_overridden_filter_without_taxonomies( :expectedresults: Both unlimited and Override flags should be set to True on filter for filter that is overridden in parent role - :CaseLevel: Integration """ role = target_sat.api.Role( name=gen_string('alpha'), @@ -895,8 +882,6 @@ def test_positive_clone_role_without_taxonomies_non_overided_filter( 1. Unlimited flag should be set to True 2. Override flag should be set to False - :CaseLevel: Integration - :BZ: 1488908 """ role = target_sat.api.Role( @@ -935,8 +920,6 @@ def test_positive_clone_role_without_taxonomies_unlimited_filter( 1. Unlimited flag should be set to True 2. Override flag should be set to False - :CaseLevel: Integration - :BZ: 1488908 """ role = target_sat.api.Role( @@ -974,7 +957,6 @@ def test_positive_user_group_users_access_as_org_admin(self, role_taxonomies, ta :expectedresults: Both the user should have access to the resources of organization A and Location A - :CaseLevel: System """ org_admin = self.create_org_admin_role( target_sat, orgs=[role_taxonomies['org'].id], locs=[role_taxonomies['loc'].id] @@ -1059,7 +1041,6 @@ def test_positive_user_group_users_access_contradict_as_org_admins(self): 2. User assigned to Organization A and Location A should have access to the resources of organization A and Location A - :CaseLevel: System """ @pytest.mark.tier2 @@ -1082,7 +1063,6 @@ def test_negative_assign_org_admin_to_user_group( :expectedresults: Both the user shouldn't have access to the resources of organization A,B and Location A,B - :CaseLevel: System """ org_admin = self.create_org_admin_role( target_sat, orgs=[role_taxonomies['org'].id], locs=[role_taxonomies['loc'].id] @@ -1124,7 +1104,6 @@ def test_negative_assign_taxonomies_by_org_admin( :expectedresults: Org Admin should not be able to assign the organizations to any of its resources - :CaseLevel: Integration """ org_admin = self.create_org_admin_role( target_sat, orgs=[role_taxonomies['org'].id], locs=[role_taxonomies['loc'].id] @@ -1206,7 +1185,6 @@ def test_positive_taxonomies_control_to_superadmin_with_org_admin( :expectedresults: Super admin should be able to access the target_sat.api in taxonomies assigned to Org Admin - :CaseLevel: Integration """ user = self.create_org_admin_user( target_sat, role_taxos=role_taxonomies, user_taxos=role_taxonomies @@ -1251,7 +1229,6 @@ def test_positive_taxonomies_control_to_superadmin_without_org_admin( :expectedresults: Super admin should be able to access the target_sat.api in taxonomies assigned to Org Admin after deleting Org Admin - :CaseLevel: Integration """ user = self.create_org_admin_user( target_sat, role_taxos=role_taxonomies, user_taxos=role_taxonomies @@ -1367,7 +1344,6 @@ def test_negative_admin_permissions_to_org_admin(self, role_taxonomies, target_s :expectedresults: Org Admin should not have access of Admin user - :CaseLevel: Integration """ org_admin = self.create_org_admin_role( target_sat, orgs=[role_taxonomies['org'].id], locs=[role_taxonomies['loc'].id] @@ -1414,7 +1390,6 @@ def test_positive_create_user_by_org_admin(self, role_taxonomies, target_sat): :customerscenario: true - :CaseLevel: Integration """ org_admin = self.create_org_admin_role( target_sat, orgs=[role_taxonomies['org'].id], locs=[role_taxonomies['loc'].id] @@ -1468,7 +1443,6 @@ def test_positive_access_users_inside_org_admin_taxonomies(self, role_taxonomies :expectedresults: Org Admin should be able to access users inside its taxonomies - :CaseLevel: Integration """ user = self.create_org_admin_user( target_sat, role_taxos=role_taxonomies, user_taxos=role_taxonomies @@ -1499,7 +1473,6 @@ def test_positive_create_nested_location(self, role_taxonomies, target_sat): :expectedresults: after adding the needed permissions, user should be able to create nested locations - :CaseLevel: Integration """ user_login = gen_string('alpha') user_pass = gen_string('alphanumeric') @@ -1542,7 +1515,6 @@ def test_negative_access_users_outside_org_admin_taxonomies( :expectedresults: Org Admin should not be able to access users outside its taxonomies - :CaseLevel: Integration """ user = self.create_org_admin_user( target_sat, role_taxos=role_taxonomies, user_taxos=role_taxonomies @@ -1667,8 +1639,6 @@ def test_negative_access_entities_from_ldap_org_admin( :expectedresults: LDAP User should not be able to access resources and permissions in taxonomies selected in Org Admin role - :CaseLevel: System - :CaseAutomation: Automated """ org_admin = self.create_org_admin_role( @@ -1714,8 +1684,6 @@ def test_negative_access_entities_from_ldap_user( :expectedresults: LDAP User should not be able to access any resources and permissions in its own taxonomies - :CaseLevel: System - :CaseAutomation: Automated """ org_admin = self.create_org_admin_role( @@ -1760,8 +1728,6 @@ def test_positive_assign_org_admin_to_ldap_user_group( resources in taxonomies if the taxonomies of Org Admin role are same - :CaseLevel: System - :CaseAutomation: Automated """ group_name = gen_string("alpha") @@ -1823,8 +1789,6 @@ def test_negative_assign_org_admin_to_ldap_user_group( resources in taxonomies if the taxonomies of Org Admin role is not same - :CaseLevel: System - :CaseAutomation: Automated """ group_name = gen_string("alpha") diff --git a/tests/foreman/api/test_settings.py b/tests/foreman/api/test_settings.py index b4fe49c23c1..4cbb5609bd0 100644 --- a/tests/foreman/api/test_settings.py +++ b/tests/foreman/api/test_settings.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Settings :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import random @@ -50,7 +45,6 @@ def test_positive_update_login_page_footer_text(setting_update): :parametrized: yes :expectedresults: Parameter is updated successfully - """ login_text_value = random.choice(list(valid_data_list().values())) setting_update.value = login_text_value @@ -69,7 +63,6 @@ def test_positive_update_login_page_footer_text_without_value(setting_update): :parametrized: yes :expectedresults: login_text has empty value after update - """ setting_update.value = "" setting_update = setting_update.update({'value'}) @@ -88,7 +81,6 @@ def test_positive_update_login_page_footer_text_with_long_string(setting_update) :parametrized: yes :expectedresults: Parameter is updated - """ login_text_value = random.choice(list(generate_strings_list(1000))) setting_update.value = login_text_value @@ -126,7 +118,6 @@ def test_positive_update_hostname_prefix_without_value(setting_update): :BZ: 1911228 :expectedresults: Error should be raised on setting empty value for discovery_prefix setting - """ setting_update.value = "" with pytest.raises(HTTPError): @@ -192,7 +183,7 @@ def test_positive_custom_repo_download_policy(setting_update, download_policy, t :id: d5150cce-ba85-4ea0-a8d1-6a54d0d29571 - :Steps: + :steps: 1. Create a product, Organization 2. Update the Default Custom Repository download policy in the setting. 3. Create a custom repo under the created organization. @@ -205,8 +196,6 @@ def test_positive_custom_repo_download_policy(setting_update, download_policy, t repository. :CaseImportance: Medium - - :CaseLevel: Acceptance """ org = target_sat.api.Organization().create() prod = target_sat.api.Product(organization=org).create() diff --git a/tests/foreman/api/test_smartproxy.py b/tests/foreman/api/test_smartproxy.py index 7fb654c9970..d4a2af8e5de 100644 --- a/tests/foreman/api/test_smartproxy.py +++ b/tests/foreman/api/test_smartproxy.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ForemanProxy :Team: Platform -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ from fauxfactory import gen_string, gen_url import pytest @@ -60,11 +55,7 @@ def test_negative_create_with_url(target_sat): :id: e48a6260-97e0-4234-a69c-77bbbcde85d6 - :expectedresults: Proxy is not created - - :CaseLevel: Component - - """ + :expectedresults: Proxy is not created""" # Create a random proxy with pytest.raises(HTTPError) as context: target_sat.api.SmartProxy(url=gen_url(scheme='https')).create() @@ -81,8 +72,6 @@ def test_positive_create_with_name(request, target_sat, name): :expectedresults: Proxy is created - :CaseLevel: Component - :Parametrized: Yes :BZ: 2084661 @@ -105,8 +94,6 @@ def test_positive_delete(target_sat): :expectedresults: Proxy is deleted - :CaseLevel: Component - :BZ: 1398695 """ new_port = target_sat.available_capsule_port @@ -125,9 +112,6 @@ def test_positive_update_name(request, target_sat): :id: f279640e-d7e9-48a3-aed8-7bf406e9d6f2 :expectedresults: Proxy has the name updated - - :CaseLevel: Component - """ new_port = target_sat.available_capsule_port with target_sat.default_url_on_new_port(9090, new_port) as url: @@ -146,9 +130,6 @@ def test_positive_update_url(request, target_sat): :id: 0305fd54-4e0c-4dd9-a537-d342c3dc867e :expectedresults: Proxy has the url updated - - :CaseLevel: Component - """ # Create fake capsule port = target_sat.available_capsule_port @@ -170,9 +151,6 @@ def test_positive_update_organization(request, target_sat): :id: 62631275-7a92-4d34-a949-c56e0c4063f1 :expectedresults: Proxy has the name updated - - :CaseLevel: Component - """ organizations = [target_sat.api.Organization().create() for _ in range(2)] newport = target_sat.available_capsule_port @@ -191,9 +169,6 @@ def test_positive_update_location(request, target_sat): :id: e08eaaa9-7c11-4cda-bbe7-6d1f7c732569 :expectedresults: Proxy has the name updated - - :CaseLevel: Component - """ locations = [target_sat.api.Location().create() for _ in range(2)] new_port = target_sat.available_capsule_port @@ -214,8 +189,6 @@ def test_positive_refresh_features(request, target_sat): :expectedresults: Proxy features are refreshed - :CaseLevel: Integration - """ # Since we want to run multiple commands against our fake capsule, we # need the tunnel kept open in order not to allow different concurrent @@ -237,8 +210,6 @@ def test_positive_import_puppet_classes(session_puppet_enabled_sat, puppet_proxy :expectedresults: Puppet classes are imported from proxy - :CaseLevel: Integration - :BZ: 1398695 """ with session_puppet_enabled_sat as puppet_sat: @@ -276,9 +247,6 @@ def test_positive_update_loc(module_proxy_attrs): :BZ: 1262037 :CaseImportance: High - - :CaseLevel: Component - """ names = {'location', 'location_ids', 'locations'} assert len(names & module_proxy_attrs) >= 1, f'None of {names} are in {module_proxy_attrs}' @@ -296,9 +264,6 @@ def test_positive_update_org(module_proxy_attrs): :BZ: 1262037 :CaseImportance: High - - :CaseLevel: Component - """ names = {'organization', 'organization_ids', 'organizations'} assert len(names & module_proxy_attrs) >= 1, f'None of {names} are in {module_proxy_attrs}' diff --git a/tests/foreman/api/test_subnet.py b/tests/foreman/api/test_subnet.py index 9ac9fca0979..b4882116f8e 100644 --- a/tests/foreman/api/test_subnet.py +++ b/tests/foreman/api/test_subnet.py @@ -9,17 +9,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Networking :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import re @@ -206,8 +201,6 @@ def test_positive_inherit_subnet_parmeters_in_host(): 2. The parameters from subnet should be displayed in host enc output - :CaseLevel: System - :CaseImportance: Medium :BZ: 1470014 @@ -234,8 +227,6 @@ def test_positive_subnet_parameters_override_from_host(): 2. The new value should be assigned to parameter 3. The parameter and value should be accessible as host parameters - :CaseLevel: Integration - :CaseImportance: Medium :BZ: 1470014 @@ -258,8 +249,6 @@ def test_positive_subnet_parameters_override_impact_on_subnet(target_sat): :expectedresults: The override value of subnet parameter from host should not change actual value in subnet parameter - :CaseLevel: System - :CaseImportance: Medium """ @@ -368,8 +357,6 @@ def test_positive_update_subnet_parameter_host_impact(): 2. The inherited subnet parameter in host enc should have updated name and value - :CaseLevel: Integration - :BZ: 1470014 """ @@ -415,8 +402,6 @@ def test_positive_delete_subnet_parameter_host_impact(): 1. The parameter should be deleted from host 2. The parameter should be deleted from host enc - :CaseLevel: Integration - :BZ: 1470014 """ @@ -444,8 +429,6 @@ def test_positive_delete_subnet_overridden_parameter_host_impact(): host parameter now 2. The parameter should not be deleted from host enc as well - :CaseLevel: Integration - :BZ: 1470014 """ @@ -512,8 +495,6 @@ def test_positive_subnet_parameter_priority(): 2. Host enc should display the parameter with value inherited from higher priority component(HostGroup in this case) - :CaseLevel: System - :CaseImportance: Low :BZ: 1470014 @@ -543,8 +524,6 @@ def test_negative_component_overrides_subnet_parameter(): 2. Host enc should not display the parameter with value inherited from lower priority component(domain in this case) - :CaseLevel: System - :CaseImportance: Low :BZ: 1470014 diff --git a/tests/foreman/api/test_subscription.py b/tests/foreman/api/test_subscription.py index 23a5a5406e1..d5810fe4b52 100644 --- a/tests/foreman/api/test_subscription.py +++ b/tests/foreman/api/test_subscription.py @@ -8,17 +8,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: SubscriptionManagement :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string from nailgun.config import ServerConfig diff --git a/tests/foreman/api/test_syncplan.py b/tests/foreman/api/test_syncplan.py index 06104efd8a3..7ebadcdc98c 100644 --- a/tests/foreman/api/test_syncplan.py +++ b/tests/foreman/api/test_syncplan.py @@ -8,17 +8,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: SyncPlans :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from datetime import datetime, timedelta from time import sleep @@ -485,8 +480,6 @@ def test_positive_add_product(module_org, module_target_sat): :expectedresults: A sync plan can be created and one product can be added to it. - :CaseLevel: Integration - :CaseImportance: Critical """ sync_plan = module_target_sat.api.SyncPlan(enabled=False, organization=module_org).create() @@ -505,8 +498,6 @@ def test_positive_add_products(module_org, module_target_sat): :expectedresults: A sync plan can be created and two products can be added to it. - - :CaseLevel: Integration """ sync_plan = module_target_sat.api.SyncPlan(enabled=False, organization=module_org).create() products = [module_target_sat.api.Product(organization=module_org).create() for _ in range(2)] @@ -526,8 +517,6 @@ def test_positive_remove_product(module_org, module_target_sat): :expectedresults: A sync plan can be created and one product can be removed from it. - :CaseLevel: Integration - :BZ: 1199150 """ sync_plan = module_target_sat.api.SyncPlan(enabled=False, organization=module_org).create() @@ -550,8 +539,6 @@ def test_positive_remove_products(module_org, module_target_sat): :expectedresults: A sync plan can be created and both products can be removed from it. - - :CaseLevel: Integration """ sync_plan = module_target_sat.api.SyncPlan(enabled=False, organization=module_org).create() products = [module_target_sat.api.Product(organization=module_org).create() for _ in range(2)] @@ -570,8 +557,6 @@ def test_positive_repeatedly_add_remove(module_org, request, target_sat): :expectedresults: A task is returned which can be used to monitor the additions and removals. - :CaseLevel: Integration - :BZ: 1199150 """ sync_plan = target_sat.api.SyncPlan(organization=module_org).create() @@ -593,8 +578,6 @@ def test_positive_add_remove_products_custom_cron(module_org, request, target_sa :expectedresults: A sync plan can be created and both products can be removed from it. - - :CaseLevel: Integration """ cron_expression = gen_choice(valid_cron_expressions()) @@ -619,8 +602,6 @@ def test_negative_synchronize_custom_product_past_sync_date(module_org, request, :expectedresults: Product was not synchronized :BZ: 1279539 - - :CaseLevel: System """ product = target_sat.api.Product(organization=module_org).create() repo = target_sat.api.Repository(product=product).create() @@ -651,8 +632,6 @@ def test_positive_synchronize_custom_product_past_sync_date(module_org, request, :expectedresults: Product is synchronized successfully. :BZ: 1279539 - - :CaseLevel: System """ interval = 60 * 60 # 'hourly' sync interval in seconds delay = 2 * 60 @@ -697,8 +676,6 @@ def test_positive_synchronize_custom_product_future_sync_date(module_org, reques :expectedresults: Product is synchronized successfully. - :CaseLevel: System - :BZ: 1655595, 1695733 """ delay = 2 * 60 # delay for sync date in seconds @@ -748,8 +725,6 @@ def test_positive_synchronize_custom_products_future_sync_date(module_org, reque :expectedresults: Products are synchronized successfully. - :CaseLevel: System - :BZ: 1695733 """ # Test with multiple products and multiple repos needs more delay. @@ -815,8 +790,6 @@ def test_positive_synchronize_rh_product_past_sync_date( :customerscenario: true :BZ: 1279539, 1879537 - - :CaseLevel: System """ interval = 60 * 60 # 'hourly' sync interval in seconds delay = 2 * 60 @@ -880,8 +853,6 @@ def test_positive_synchronize_rh_product_future_sync_date( :id: 6697a00f-2181-4c2b-88eb-2333268d780b :expectedresults: Product is synchronized successfully. - - :CaseLevel: System """ delay = 2 * 60 # delay for sync date in seconds org = function_entitlement_manifest_org @@ -938,8 +909,6 @@ def test_positive_synchronize_custom_product_daily_recurrence(module_org, reques :id: d60e33a0-f75c-498e-9e6f-0a2025295a9d :expectedresults: Product is synchronized successfully. - - :CaseLevel: System """ delay = 2 * 60 product = target_sat.api.Product(organization=module_org).create() @@ -983,8 +952,6 @@ def test_positive_synchronize_custom_product_weekly_recurrence(module_org, reque :expectedresults: Product is synchronized successfully. :BZ: 1396647 - - :CaseLevel: System """ delay = 2 * 60 product = target_sat.api.Product(organization=module_org).create() @@ -1025,8 +992,6 @@ def test_positive_delete_one_product(module_org, module_target_sat): :expectedresults: A sync plan is created with one product and sync plan can be deleted. - - :CaseLevel: Integration """ sync_plan = module_target_sat.api.SyncPlan(organization=module_org).create() product = module_target_sat.api.Product(organization=module_org).create() @@ -1044,8 +1009,6 @@ def test_positive_delete_products(module_org, module_target_sat): :expectedresults: A sync plan is created with one product and sync plan can be deleted. - - :CaseLevel: Integration """ sync_plan = module_target_sat.api.SyncPlan(organization=module_org).create() products = [module_target_sat.api.Product(organization=module_org).create() for _ in range(2)] @@ -1064,8 +1027,6 @@ def test_positive_delete_synced_product(module_org, module_target_sat): :expectedresults: A sync plan is created with one synced product and sync plan can be deleted. - - :CaseLevel: Integration """ sync_plan = module_target_sat.api.SyncPlan(organization=module_org).create() product = module_target_sat.api.Product(organization=module_org).create() @@ -1087,8 +1048,6 @@ def test_positive_delete_synced_product_custom_cron(module_org, module_target_sa :expectedresults: A sync plan is created with one synced product and sync plan can be deleted. - - :CaseLevel: Integration """ sync_plan = module_target_sat.api.SyncPlan( organization=module_org, diff --git a/tests/foreman/api/test_template_combination.py b/tests/foreman/api/test_template_combination.py index c3995bae568..7e9d5f11be8 100644 --- a/tests/foreman/api/test_template_combination.py +++ b/tests/foreman/api/test_template_combination.py @@ -4,15 +4,10 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ProvisioningTemplates :Team: Rocket -:TestType: Functional - -:Upstream: No """ import pytest from requests.exceptions import HTTPError diff --git a/tests/foreman/api/test_templatesync.py b/tests/foreman/api/test_templatesync.py index 9fa0cd1114f..bda401ef373 100644 --- a/tests/foreman/api/test_templatesync.py +++ b/tests/foreman/api/test_templatesync.py @@ -4,15 +4,10 @@ :CaseAutomation: Automated -:CaseLevel: Integration - :CaseComponent: TemplatesPlugin :Team: Endeavour -:TestType: Functional - -:Upstream: No """ import base64 import json @@ -35,10 +30,7 @@ class TestTemplateSyncTestCase: - """Implements TemplateSync tests from API - - :CaseLevel: Acceptance - """ + """Implements TemplateSync tests from API""" @pytest.fixture(scope='module', autouse=True) def setUpClass(self, module_target_sat): @@ -74,7 +66,7 @@ def test_positive_import_filtered_templates_from_git( :id: 628a95d6-7a4e-4e56-ad7b-d9fecd34f765 - :Steps: + :steps: 1. Using nailgun or direct API call import only the templates matching with regex e.g: `^atomic.*` refer to: `/apidoc/v2/template/import.html` @@ -150,7 +142,7 @@ def test_import_filtered_templates_from_git_with_negate(self, module_org, module :id: a6857454-249b-4a2e-9b53-b5d7b4eb34e3 - :Steps: + :steps: 1. Using nailgun or direct API call import the templates NOT matching with regex e.g: `^freebsd.*` refer to: `/apidoc/v2/template/import.html` using the @@ -194,7 +186,7 @@ def test_import_filtered_templates_from_git_with_negate(self, module_org, module def test_import_template_with_puppet(self, parametrized_puppet_sat): """Importing puppet templates with enabled/disabled puppet module - :Steps: + :steps: 1. Have enabled(disabled) puppet module 2. Import template containing puppet 3. Check if template was imported @@ -243,7 +235,7 @@ def test_positive_import_and_associate( :id: 04a14a56-bd71-412b-b2da-4b8c3991c401 - :Steps: + :steps: 1. Create new taxonomies, lets say org X and loc Y. 2. From X and Y taxonomies scope, Import template1 as associate 'never', where the template contains the metadata anything other than X and Y taxonomies. @@ -373,7 +365,7 @@ def test_positive_import_from_subdirectory(self, module_org, module_target_sat): :id: 8ea11a1a-165e-4834-9387-7accb4c94e77 - :Steps: + :steps: 1. Using nailgun or direct API call import templates specifying a git subdirectory e.g: `-d {'dirname': 'test_sub_dir'}` in POST body @@ -411,7 +403,7 @@ def test_positive_export_filtered_templates_to_localdir( :id: b7c98b75-4dd1-4b6a-b424-35b0f48c25db - :Steps: + :steps: 1. Using nailgun or direct API call export only the templates matching with regex e.g: `robottelo` refer to: `/apidoc/v2/template/export.html` @@ -447,7 +439,7 @@ def test_positive_export_filtered_templates_negate( :id: 2f8ad8f3-f02b-4b2d-85af-423a228976f3 - :Steps: + :steps: 1. Using nailgun or direct API call export templates matching that does not matches regex e.g: `robottelo` using `negate` option. @@ -482,7 +474,7 @@ def test_positive_export_and_import_with_metadata( :id: ba8a34ce-c2c6-4889-8729-59714c0a4b19 - :Steps: + :steps: 1. Create a template in local directory and specify Org/Loc. 2. Use import to pull this specific template (using filter). 3. Using nailgun or direct API call @@ -560,7 +552,7 @@ def test_positive_import_json_output_verbose(self, module_org, verbose, module_t :id: 74b0a701-341f-4062-9769-e5cb1a1c4792 - :Steps: + :steps: 1. Using nailgun or direct API call Impot a template with verbose `True` and `False` option @@ -612,7 +604,7 @@ def test_positive_import_json_output_changed_key_true( :id: 4b866144-822c-4786-9188-53bc7e2dd44a - :Steps: + :steps: 1. Using nailgun or direct API call Create a template and import it from a source 2. Update the template data in source location @@ -648,7 +640,7 @@ def test_positive_import_json_output_changed_key_false( :id: 64456c0c-c2c6-4a1c-a16e-54ca4a8b66d3 - :Steps: + :steps: 1. Using nailgun or direct API call Create a template and import it from a source 2. Dont update the template data in source location @@ -681,7 +673,7 @@ def test_positive_import_json_output_name_key( :id: a5639368-3d23-4a37-974a-889e2ec0916e - :Steps: + :steps: 1. Using nailgun or direct API call Create a template with some name and import it from a source @@ -713,7 +705,7 @@ def test_positive_import_json_output_imported_key( :id: 5bc11163-e8f3-4744-8a76-5c16e6e46e86 - :Steps: + :steps: 1. Using nailgun or direct API call Create a template and import it from a source @@ -740,7 +732,7 @@ def test_positive_import_json_output_file_key( :id: da0b094c-6dc8-4526-b115-8e08bfb05fbb - :Steps: + :steps: 1. Using nailgun or direct API call Create a template with some name and import it from a source @@ -767,7 +759,7 @@ def test_positive_import_json_output_corrupted_metadata( :id: 6bd5bc6b-a7a2-4529-9df6-47a670cd86d8 - :Steps: + :steps: 1. Create a template with wrong syntax in metadata 2. Using nailgun or direct API call Import above template @@ -801,7 +793,7 @@ def test_positive_import_json_output_filtered_skip_message( :id: db68b5de-7647-4568-b79c-2aec3292328a - :Steps: + :steps: 1. Using nailgun or direct API call Create template with name not matching filter @@ -837,7 +829,7 @@ def test_positive_import_json_output_no_name_error( :id: 259a8a3a-8749-442d-a2bc-51e9af89ce8c - :Steps: + :steps: 1. Create a template without name in metadata 2. Using nailgun or direct API call Import above template @@ -871,7 +863,7 @@ def test_positive_import_json_output_no_model_error( :id: d3f1ffe4-58d7-45a8-b278-74e081dc5062 - :Steps: + :steps: 1. Create a template without model keyword in metadata 2. Using nailgun or direct API call Import above template @@ -905,7 +897,7 @@ def test_positive_import_json_output_blank_model_error( :id: 5007b12d-1cf6-49e6-8e54-a189d1a209de - :Steps: + :steps: 1. Create a template with blank model name in metadata 2. Using nailgun or direct API call Import above template @@ -938,7 +930,7 @@ def test_positive_export_json_output( :id: 141b893d-72a3-47c2-bb03-004c757bcfc9 - :Steps: + :steps: 1. Using nailgun or direct API call Export all the templates @@ -990,7 +982,7 @@ def test_positive_import_log_to_production(self, module_org, target_sat): :id: 19ed0e6a-ee77-4e28-86c9-49db1adec479 - :Steps: + :steps: 1. Using nailgun or direct API call Import template from a source @@ -999,8 +991,6 @@ def test_positive_import_log_to_production(self, module_org, target_sat): :Requirement: Take Templates out of tech preview - :CaseLevel: System - :CaseImportance: Low """ target_sat.api.Template().imports( @@ -1028,7 +1018,7 @@ def test_positive_export_log_to_production( :id: 8ae370b1-84e8-436e-a7d7-99cd0b8f45b1 - :Steps: + :steps: 1. Using nailgun or direct API call Export template to destination @@ -1037,8 +1027,6 @@ def test_positive_export_log_to_production( :Requirement: Take Templates out of tech preview - :CaseLevel: System - :CaseImportance: Low """ target_sat.api.Template().imports( @@ -1085,7 +1073,7 @@ def test_positive_export_all_templates_to_repo( :id: 0bf6fe77-01a3-4843-86d6-22db5b8adf3b - :Steps: + :steps: 1. Using nailgun export all templates to repository (ensure filters are empty) :expectedresults: @@ -1126,7 +1114,7 @@ def test_positive_import_all_templates_from_repo(self, module_org, module_target :id: 95ac9543-d989-44f4-b4d9-18f20a0b58b9 - :Steps: + :steps: 1. Using nailgun import all templates from repository (ensure filters are empty) :expectedresults: @@ -1158,7 +1146,7 @@ def test_negative_import_locked_template(self, module_org, module_target_sat): :id: 88e21cad-448e-45e0-add2-94493a1319c5 - :Steps: + :steps: 1. Using nailgun try to import a locked template :expectedresults: @@ -1207,7 +1195,7 @@ def test_positive_import_locked_template(self, module_org, module_target_sat): :id: 936c91cc-1947-45b0-8bf0-79ba4be87b97 - :Steps: + :steps: 1. Using nailgun try to import a locked template with force parameter :expectedresults: diff --git a/tests/foreman/api/test_user.py b/tests/foreman/api/test_user.py index bf534f56fcc..6fc5d0e4abd 100644 --- a/tests/foreman/api/test_user.py +++ b/tests/foreman/api/test_user.py @@ -8,17 +8,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: UsersRoles :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import json import re @@ -636,7 +631,6 @@ def test_positive_ssh_key_in_host_enc(self, class_target_sat): :expectedresults: SSH key should be added to host ENC output - :CaseLevel: Integration """ org = class_target_sat.api.Organization().create() loc = class_target_sat.api.Location(organization=[org]).create() @@ -705,7 +699,6 @@ def test_positive_create_in_ldap_mode(self, username, create_ldap, target_sat): :expectedresults: User is created without specifying the password - :CaseLevel: Integration """ user = target_sat.api.User( login=username, auth_source=create_ldap['authsource'], password='' @@ -724,7 +717,6 @@ def test_positive_ad_basic_no_roles(self, create_ldap, target_sat): :expectedresults: Log in to foreman successfully but cannot access target_sat.api. - :CaseLevel: System """ sc = ServerConfig( auth=(create_ldap['ldap_user_name'], create_ldap['ldap_user_passwd']), @@ -752,7 +744,6 @@ def test_positive_access_entities_from_ldap_org_admin(self, create_ldap, module_ :expectedresults: LDAP User should be able to access all the resources and permissions in taxonomies selected in Org Admin role - :CaseLevel: System """ role_name = gen_string('alpha') default_org_admin = module_target_sat.api.Role().search( @@ -847,7 +838,6 @@ def test_positive_ipa_basic_no_roles(self, create_ldap, target_sat): :expectedresults: Log in to foreman successfully but cannot access target_sat.api. - :CaseLevel: System """ sc = ServerConfig( auth=(create_ldap['username'], create_ldap['ldap_user_passwd']), @@ -875,7 +865,6 @@ def test_positive_access_entities_from_ipa_org_admin(self, create_ldap, target_s :expectedresults: FreeIPA User should be able to access all the resources and permissions in taxonomies selected in Org Admin role - :CaseLevel: System """ role_name = gen_string('alpha') default_org_admin = target_sat.api.Role().search( @@ -935,8 +924,6 @@ def test_personal_access_token_admin(self): 1. Should show output of the api endpoint 2. When revoked, authentication error - :CaseLevel: System - :CaseImportance: High """ @@ -959,10 +946,7 @@ def test_positive_personal_access_token_user_with_role(self): 2. When an incorrect role and end point is used, missing permission should be displayed. - :CaseLevel: System - :CaseImportance: High - """ @pytest.mark.tier2 @@ -979,8 +963,6 @@ def test_expired_personal_access_token(self): :expectedresults: Authentication error - :CaseLevel: System - :CaseImportance: Medium """ diff --git a/tests/foreman/api/test_usergroup.py b/tests/foreman/api/test_usergroup.py index a01ee213a38..95d1547934f 100644 --- a/tests/foreman/api/test_usergroup.py +++ b/tests/foreman/api/test_usergroup.py @@ -7,17 +7,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: UsersRoles :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from random import randint @@ -155,7 +150,6 @@ def test_positive_create_with_usergroups(self, target_sat): :expectedresults: User group is created successfully and contains all expected user groups - :CaseLevel: Integration """ sub_user_groups = [target_sat.api.UserGroup().create() for _ in range(randint(3, 5))] user_group = target_sat.api.UserGroup(usergroup=sub_user_groups).create() @@ -234,7 +228,6 @@ def test_positive_update_with_existing_user(self, target_sat): :expectedresults: User group is updated successfully. - :CaseLevel: Integration """ users = [target_sat.api.User().create() for _ in range(2)] user_group = target_sat.api.UserGroup(user=[users[0]]).create() diff --git a/tests/foreman/api/test_webhook.py b/tests/foreman/api/test_webhook.py index 47e4af469ba..dd7ffea5afc 100644 --- a/tests/foreman/api/test_webhook.py +++ b/tests/foreman/api/test_webhook.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: HooksandWebhooks :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import re diff --git a/tests/foreman/cli/test_abrt.py b/tests/foreman/cli/test_abrt.py index ecba0b067b7..0543679b733 100644 --- a/tests/foreman/cli/test_abrt.py +++ b/tests/foreman/cli/test_abrt.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Infrastructure :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest @@ -30,7 +25,7 @@ def test_positive_create_report(self): :Setup: abrt - :Steps: start a sleep process in background, kill it send the report + :steps: start a sleep process in background, kill it send the report using smart-proxy-abrt-send :expectedresults: A abrt report with ccpp.* extension created under @@ -39,7 +34,6 @@ def test_positive_create_report(self): :CaseAutomation: NotAutomated :CaseImportance: Critical - """ @@ -51,7 +45,7 @@ def test_positive_create_reports(self): :Setup: abrt - :Steps: + :steps: 1. Create multiple reports of abrt 2. Keep track of counts @@ -59,7 +53,6 @@ def test_positive_create_reports(self): :expectedresults: Count is updated in proper manner :CaseAutomation: NotAutomated - """ @@ -71,12 +64,11 @@ def test_positive_update_timer(self): :Setup: abrt - :Steps: edit the timer for /etc/cron.d/rubygem-smart_proxy_abrt + :steps: edit the timer for /etc/cron.d/rubygem-smart_proxy_abrt :expectedresults: the timer file is edited :CaseAutomation: NotAutomated - """ @@ -88,12 +80,11 @@ def test_positive_identify_hostname(self): :Setup: abrt - :Steps: UI => Settings => Abrt tab => edit hostnames + :steps: UI => Settings => Abrt tab => edit hostnames :expectedresults: Assertion of hostnames is possible :CaseAutomation: NotAutomated - """ @@ -105,10 +96,9 @@ def test_positive_search_report(self): :Setup: abrt - :Steps: access /var/tmp/abrt/ccpp-* files + :steps: access /var/tmp/abrt/ccpp-* files :expectedresults: Assertion of parameters :CaseAutomation: NotAutomated - """ diff --git a/tests/foreman/cli/test_activationkey.py b/tests/foreman/cli/test_activationkey.py index 34f7d7422a1..409525d33e9 100644 --- a/tests/foreman/cli/test_activationkey.py +++ b/tests/foreman/cli/test_activationkey.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ActivationKeys :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from random import choice import re @@ -147,8 +142,6 @@ def test_positive_create_with_cv(name, module_org, get_default_env, module_targe :expectedresults: Activation key is created and has proper content view assigned - :CaseLevel: Integration - :parametrized: yes """ new_cv = module_target_sat.cli_factory.make_content_view( @@ -205,8 +198,6 @@ def test_positive_create_content_and_check_enabled(module_org, module_target_sat successfully :BZ: 1361993 - - :CaseLevel: Integration """ result = module_target_sat.cli_factory.setup_org_for_a_custom_repo( {'url': settings.repos.yum_0.url, 'organization-id': module_org.id} @@ -365,8 +356,6 @@ def test_positive_delete_with_cv(module_org, module_target_sat): :id: bba323fa-0362-4a9b-97af-560d446cbb6c :expectedresults: Activation key is deleted - - :CaseLevel: Integration """ new_cv = module_target_sat.cli_factory.make_content_view({'organization-id': module_org.id}) new_ak = module_target_sat.cli_factory.make_activation_key( @@ -385,8 +374,6 @@ def test_positive_delete_with_lce(module_org, get_default_env, module_target_sat :id: e1830e52-5b1a-4ac4-8d0a-df6efb218a8b :expectedresults: Activation key is deleted - - :CaseLevel: Integration """ new_ak = module_target_sat.cli_factory.make_activation_key( {'organization-id': module_org.id, 'lifecycle-environment': get_default_env['name']} @@ -475,8 +462,6 @@ def test_positive_update_lce(module_org, get_default_env, module_target_sat): :id: 55aaee60-b8c8-49f0-995a-6c526b9b653b :expectedresults: Activation key is updated - - :CaseLevel: Integration """ ak_env = module_target_sat.cli_factory.make_activation_key( {'organization-id': module_org.id, 'lifecycle-environment-id': get_default_env['id']} @@ -509,8 +494,6 @@ def test_positive_update_cv(module_org, module_target_sat): :id: aa94997d-fc9b-4532-aeeb-9f27b9834914 :expectedresults: Activation key is updated - - :CaseLevel: Integration """ cv = module_target_sat.cli_factory.make_content_view({'organization-id': module_org.id}) ak_cv = module_target_sat.cli_factory.make_activation_key( @@ -614,7 +597,7 @@ def test_positive_usage_limit(module_org, target_sat): :id: 00ded856-e939-4140-ac84-91b6a8643623 - :Steps: + :steps: 1. Create Activation key 2. Update Usage Limit to a finite number @@ -626,8 +609,6 @@ def test_positive_usage_limit(module_org, target_sat): shown :CaseImportance: Critical - - :CaseLevel: System """ env = target_sat.cli_factory.make_lifecycle_environment({'organization-id': module_org.id}) new_cv = target_sat.cli_factory.make_content_view({'organization-id': module_org.id}) @@ -669,8 +650,6 @@ def test_positive_update_host_collection(module_org, host_col_name, module_targe :expectedresults: Host collections are successfully associated to Activation key - :CaseLevel: Integration - :parametrized: yes """ activation_key = module_target_sat.cli_factory.make_activation_key( @@ -729,8 +708,6 @@ def test_positive_add_redhat_product(function_entitlement_manifest_org, target_s :expectedresults: RH products are successfully associated to Activation key - - :CaseLevel: System """ org = function_entitlement_manifest_org @@ -761,8 +738,6 @@ def test_positive_add_custom_product(module_org, module_target_sat): :expectedresults: Custom products are successfully associated to Activation key - :CaseLevel: System - :BZ: 1426386 """ result = module_target_sat.cli_factory.setup_org_for_a_custom_repo( @@ -786,7 +761,7 @@ def test_positive_add_redhat_and_custom_products( :id: 74c77426-18f5-4abb-bca9-a2135f7fcc1f - :Steps: + :steps: 1. Create Activation key 2. Associate RH product(s) to Activation Key @@ -795,8 +770,6 @@ def test_positive_add_redhat_and_custom_products( :expectedresults: RH/Custom product is successfully associated to Activation key - :CaseLevel: System - :BZ: 1426386 """ org = function_entitlement_manifest_org @@ -834,7 +807,7 @@ def test_positive_delete_manifest(function_entitlement_manifest_org, target_sat) :id: 8256ac6d-3f60-4668-897d-2e88d29532d3 - :Steps: + :steps: 1. Upload manifest 2. Create activation key - attach some subscriptions 3. Delete manifest @@ -875,8 +848,6 @@ def test_positive_delete_subscription(function_entitlement_manifest_org, module_ :expectedresults: Deleting subscription removes it from the Activation key - - :CaseLevel: Integration """ org = function_entitlement_manifest_org new_ak = module_target_sat.cli_factory.make_activation_key({'organization-id': org.id}) @@ -914,8 +885,6 @@ def test_positive_update_aks_to_chost(module_org, rhel7_contenthost, target_sat) host :parametrized: yes - - :CaseLevel: System """ env = target_sat.cli_factory.make_lifecycle_environment({'organization-id': module_org.id}) new_cv = target_sat.cli_factory.make_content_view({'organization-id': module_org.id}) @@ -963,8 +932,6 @@ def test_positive_update_aks_to_chost_in_one_command(module_org): :expectedresults: Multiple Activation keys are attached to a Content host - - :CaseLevel: System """ @@ -1046,7 +1013,7 @@ def test_positive_remove_host_collection_by_id(module_org, module_target_sat): :id: 20f8ecca-1756-4900-b966-f0144b6bd0aa - :Steps: + :steps: 1. Create Activation key 2. Create host collection @@ -1059,8 +1026,6 @@ def test_positive_remove_host_collection_by_id(module_org, module_target_sat): :CaseImportance: Medium - :CaseLevel: Integration - :BZ: 1336716 """ activation_key = module_target_sat.cli_factory.make_activation_key( @@ -1097,7 +1062,7 @@ def test_positive_remove_host_collection_by_name(module_org, host_col, module_ta :id: 1a559a82-db5f-48b0-beeb-2fa02aed7ef9 - :Steps: + :steps: 1. Create Activation key 2. Create host collection @@ -1108,8 +1073,6 @@ def test_positive_remove_host_collection_by_name(module_org, host_col, module_ta :expectedresults: Host collection successfully removed from activation key - :CaseLevel: Integration - :BZ: 1336716 :parametrized: yes @@ -1149,7 +1112,7 @@ def test_create_ak_with_syspurpose_set(module_entitlement_manifest_org, module_t :id: ac8931e5-7089-494a-adac-cee2a8ab57ee - :Steps: + :steps: 1. Create Activation key with system purpose values set 2. Read Activation key values and assert system purpose values are set 3. Clear AK system purpose values @@ -1200,7 +1163,7 @@ def test_update_ak_with_syspurpose_values(module_entitlement_manifest_org, modul :id: db943c05-70f1-4385-9537-fe23368a9dfd - :Steps: + :steps: 1. Create Activation key with no system purpose values set 2. Assert system purpose values are not set @@ -1268,7 +1231,7 @@ def test_positive_add_subscription_by_id(module_entitlement_manifest_org, module :id: b884be1c-b35d-440a-9a9d-c854c83e10a7 - :Steps: + :steps: 1. Create Activation key 2. Upload manifest and add subscription @@ -1278,8 +1241,6 @@ def test_positive_add_subscription_by_id(module_entitlement_manifest_org, module :BZ: 1463685 - :CaseLevel: Integration - :BZ: 1463685 """ org_id = module_entitlement_manifest_org.id @@ -1344,7 +1305,6 @@ def test_negative_copy_with_same_name(module_org, module_target_sat): :id: f867c468-4155-495c-a1e5-c04d9868a2e0 :expectedresults: Activation key is not successfully copied - """ parent_ak = module_target_sat.cli_factory.make_activation_key( {'organization-id': module_org.id} @@ -1370,15 +1330,13 @@ def test_positive_copy_subscription(module_entitlement_manifest_org, module_targ :id: f4ee8096-4120-4d06-8c9a-57ac1eaa8f68 - :Steps: + :steps: 1. Create parent key and add content 2. Copy Activation key by passing id of parent 3. Verify content was successfully copied :expectedresults: Activation key is successfully copied - - :CaseLevel: Integration """ # Begin test setup org = module_entitlement_manifest_org @@ -1408,7 +1366,7 @@ def test_positive_update_autoattach_toggle(module_org, module_target_sat): :id: de3b5fb7-7963-420a-b4c9-c66e78a111dc - :Steps: + :steps: 1. Get the key's current auto attach value. 2. Update the key with the value's inverse. @@ -1453,7 +1411,7 @@ def test_negative_update_autoattach(module_org, module_target_sat): :id: 54b6f808-ff54-4e69-a54d-e1f99a4652f9 - :Steps: + :steps: 1. Attempt to update a key with incorrect auto-attach value 2. Verify that an appropriate error message was returned @@ -1482,7 +1440,7 @@ def test_positive_content_override(module_org, module_target_sat): :id: a4912cc0-3bf7-4e90-bb51-ec88b2fad227 - :Steps: + :steps: 1. Create activation key and add content 2. Get the first product's label @@ -1490,8 +1448,6 @@ def test_positive_content_override(module_org, module_target_sat): 4. Verify that the command succeeded :expectedresults: Activation key content override was successful - - :CaseLevel: System """ result = module_target_sat.cli_factory.setup_org_for_a_custom_repo( {'url': settings.repos.yum_0.url, 'organization-id': module_org.id} @@ -1572,8 +1528,6 @@ def test_positive_view_subscriptions_by_non_admin_user( subscription :BZ: 1406076 - - :CaseLevel: System """ org = module_entitlement_manifest_org user_name = gen_alphanumeric() @@ -1713,7 +1667,7 @@ def test_positive_ak_with_custom_product_on_rhel6(module_org, rhel6_contenthost, :customerscenario: true - :Steps: + :steps: 1. Create a custom repo 2. Create ak and add custom repo to ak 3. Add subscriptions to the ak diff --git a/tests/foreman/cli/test_ansible.py b/tests/foreman/cli/test_ansible.py index a515d20b2cc..0a3795d224a 100644 --- a/tests/foreman/cli/test_ansible.py +++ b/tests/foreman/cli/test_ansible.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Ansible-ConfigurationManagement :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest @@ -30,7 +25,7 @@ def test_positive_ansible_e2e(target_sat, module_org, rhel_contenthost): :id: 0c52bc63-a41a-4f48-a980-fe49b4ecdbdc - :Steps: + :steps: 1. Register a content host with satellite 2. Import a role into satellite 3. Assign that role to a host diff --git a/tests/foreman/cli/test_architecture.py b/tests/foreman/cli/test_architecture.py index 4f0fe73061b..7578fe577b6 100644 --- a/tests/foreman/cli/test_architecture.py +++ b/tests/foreman/cli/test_architecture.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_choice import pytest diff --git a/tests/foreman/cli/test_auth.py b/tests/foreman/cli/test_auth.py index 76084dd8285..bf81a87413d 100644 --- a/tests/foreman/cli/test_auth.py +++ b/tests/foreman/cli/test_auth.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Authentication :Team: Endeavour -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ from time import sleep @@ -70,7 +65,7 @@ def test_positive_create_session(admin_user, target_sat): :id: fcee7f5f-1040-41a9-bf17-6d0c24a93e22 - :Steps: + :steps: 1. Set use_sessions, set short expiration time 2. Authenticate, assert credentials are not demanded @@ -109,7 +104,7 @@ def test_positive_disable_session(admin_user, target_sat): :id: 38ee0d85-c2fe-4cac-a992-c5dbcec11031 - :Steps: + :steps: 1. Set use_sessions 2. Authenticate, assert credentials are not demanded @@ -117,7 +112,6 @@ def test_positive_disable_session(admin_user, target_sat): 3. Disable use_sessions :expectedresults: The session is terminated - """ result = configure_sessions(target_sat) assert result == 0, 'Failed to configure hammer sessions' @@ -141,7 +135,7 @@ def test_positive_log_out_from_session(admin_user, target_sat): :id: 0ba05f2d-7b83-4b0c-a04c-80e62b7c4cf2 - :Steps: + :steps: 1. Set use_sessions 2. Authenticate, assert credentials are not demanded @@ -149,7 +143,6 @@ def test_positive_log_out_from_session(admin_user, target_sat): 3. Run `hammer auth logout` :expectedresults: The session is terminated - """ result = configure_sessions(target_sat) assert result == 0, 'Failed to configure hammer sessions' @@ -171,7 +164,7 @@ def test_positive_change_session(admin_user, non_admin_user, target_sat): :id: b6ea6f3c-fcbd-4e7b-97bd-f3e0e6b9da8f - :Steps: + :steps: 1. Set use_sessions 2. Authenticate, assert credentials are not demanded @@ -181,7 +174,6 @@ def test_positive_change_session(admin_user, non_admin_user, target_sat): :CaseImportance: High :expectedresults: The session is altered - """ result = configure_sessions(target_sat) assert result == 0, 'Failed to configure hammer sessions' @@ -202,7 +194,7 @@ def test_positive_session_survives_unauthenticated_call(admin_user, target_sat): :id: 8bc304a0-70ea-489c-9c3f-ea8343c5284c - :Steps: + :steps: 1. Set use_sessions 2. Authenticate, assert credentials are not demanded @@ -212,7 +204,6 @@ def test_positive_session_survives_unauthenticated_call(admin_user, target_sat): :CaseImportance: Medium :expectedresults: The session is unchanged - """ result = configure_sessions(target_sat) assert result == 0, 'Failed to configure hammer sessions' @@ -236,7 +227,7 @@ def test_positive_session_survives_failed_login(admin_user, non_admin_user, targ :BZ: 1465552 - :Steps: + :steps: 1. Set use_sessions 2. Authenticate, assert credentials are not demanded @@ -244,7 +235,6 @@ def test_positive_session_survives_failed_login(admin_user, non_admin_user, targ 3. Run login with invalid credentials :expectedresults: The session is unchanged - """ result = configure_sessions(target_sat) assert result == 0, 'Failed to configure hammer sessions' @@ -274,7 +264,7 @@ def test_positive_session_preceeds_saved_credentials(admin_user, target_sat): :CaseImportance: High - :Steps: + :steps: 1. Set use_sessions, set username and password, set short expiration time @@ -284,7 +274,6 @@ def test_positive_session_preceeds_saved_credentials(admin_user, target_sat): :expectedresults: Session expires after specified time and saved credentials are not applied - """ try: idle_timeout = target_sat.cli.Settings.list({'search': 'name=idle_timeout'})[0]['value'] @@ -330,7 +319,6 @@ def test_negative_no_permissions(admin_user, non_admin_user, target_sat): :expectedresults: Command is not executed :CaseImportance: High - """ result = configure_sessions(target_sat) assert result == 0, 'Failed to configure hammer sessions' diff --git a/tests/foreman/cli/test_bootdisk.py b/tests/foreman/cli/test_bootdisk.py index 9035bd8d66c..3204d300230 100644 --- a/tests/foreman/cli/test_bootdisk.py +++ b/tests/foreman/cli/test_bootdisk.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: System - :CaseComponent: BootdiskPlugin :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_mac, gen_string import pytest diff --git a/tests/foreman/cli/test_bootstrap_script.py b/tests/foreman/cli/test_bootstrap_script.py index e3b910a0a87..f4b71c24bd1 100644 --- a/tests/foreman/cli/test_bootstrap_script.py +++ b/tests/foreman/cli/test_bootstrap_script.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Bootstrap :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest @@ -35,7 +30,7 @@ def test_positive_register( :id: e34561fd-e0d6-4587-84eb-f86bd131aab1 - :Steps: + :steps: 1. Ensure system is not registered 2. Register a system diff --git a/tests/foreman/cli/test_capsule.py b/tests/foreman/cli/test_capsule.py index 7bb95a6d59a..a11b8aa71d5 100644 --- a/tests/foreman/cli/test_capsule.py +++ b/tests/foreman/cli/test_capsule.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ForemanProxy :Team: Platform -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ from fauxfactory import gen_alphanumeric, gen_string import pytest @@ -48,8 +43,6 @@ def test_negative_create_with_url(target_sat): :expectedresults: Proxy is not created - :CaseLevel: Component - """ # Create a random proxy with pytest.raises(CLIFactoryError, match='Could not create the proxy:'): @@ -70,8 +63,6 @@ def test_positive_create_with_name(request, target_sat, name): :expectedresults: Proxy is created - :CaseLevel: Component - :Parametrized: Yes :BZ: 1398695, 2084661 @@ -92,8 +83,6 @@ def test_positive_delete_by_id(request, name, target_sat): :expectedresults: Proxy is deleted - :CaseLevel: Component - :Parametrized: Yes :BZ: 1398695, 2084661 @@ -115,8 +104,6 @@ def test_positive_update_name(request, target_sat): :expectedresults: Proxy has the name updated - :CaseLevel: Component - :BZ: 1398695, 2084661 """ proxy = _make_proxy(request, target_sat, options={'name': gen_alphanumeric()}) @@ -140,8 +127,6 @@ def test_positive_refresh_features_by_id(request, target_sat): :expectedresults: Proxy features are refreshed - :CaseLevel: Integration - :CaseImportance: High """ @@ -165,8 +150,6 @@ def test_positive_refresh_features_by_name(request, target_sat): :expectedresults: Proxy features are refreshed - :CaseLevel: Integration - :CaseImportance: High """ @@ -189,9 +172,6 @@ def test_positive_import_puppet_classes(session_puppet_enabled_sat): :id: 42e3a9c0-62e1-4049-9667-f3c0cdfe0b04 :expectedresults: Puppet classes are imported from proxy - - :CaseLevel: Component - """ with session_puppet_enabled_sat as puppet_sat: port = puppet_sat.available_capsule_port @@ -211,7 +191,7 @@ def test_positive_provision(): of this case for each supported compute resource type). Also, functioning capsule with proxy is required. - :Steps: + :steps: 1. Attempt to route provisioning content through capsule that is using a proxy diff --git a/tests/foreman/cli/test_capsule_installer.py b/tests/foreman/cli/test_capsule_installer.py index 8ace478a1ac..407faa45407 100644 --- a/tests/foreman/cli/test_capsule_installer.py +++ b/tests/foreman/cli/test_capsule_installer.py @@ -4,17 +4,11 @@ :CaseAutomation: Automated -:CaseLevel: System - :CaseComponent: ForemanProxy :Team: Platform -:TestType: Functional - :CaseImportance: High - -:Upstream: No """ import pytest diff --git a/tests/foreman/cli/test_classparameters.py b/tests/foreman/cli/test_classparameters.py index 7944ce2a885..5841e576a31 100644 --- a/tests/foreman/cli/test_classparameters.py +++ b/tests/foreman/cli/test_classparameters.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Puppet :CaseImportance: Medium :Team: Rocket -:TestType: Functional - -:Upstream: No """ import pytest diff --git a/tests/foreman/cli/test_computeresource_azurerm.py b/tests/foreman/cli/test_computeresource_azurerm.py index 1d080abd0f7..1756a0ed674 100644 --- a/tests/foreman/cli/test_computeresource_azurerm.py +++ b/tests/foreman/cli/test_computeresource_azurerm.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ComputeResources-Azure :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -72,7 +67,6 @@ def test_positive_crud_azurerm_cr( :CaseImportance: Critical - :CaseLevel: Component """ # Create CR cr_name = gen_string('alpha') @@ -155,7 +149,6 @@ def test_positive_image_crud( :CaseImportance: Critical - :CaseLevel: Integration """ # Create @@ -229,8 +222,6 @@ def test_positive_check_available_networks(self, sat_azure, azurermclient, modul :expectedresults: All the networks from AzureRM CR should be available. - :CaseLevel: Integration - :BZ: 1850934 """ @@ -254,7 +245,6 @@ def test_positive_create_compute_profile_values( :expectedresults: Compute-profile values should be create with AzureRm CR - :CaseLevel: Integration """ username = gen_string('alpha') password = gen_string('alpha') @@ -398,9 +388,7 @@ def test_positive_azurerm_host_provisioned( :id: 9e8242e5-3ef3-4884-a200-7ba79b8ef49f - :CaseLevel: Component - - ::CaseImportance: Critical + :CaseImportance: Critical :steps: 1. Create a AzureRM Compute Resource and provision host. @@ -527,9 +515,7 @@ def test_positive_azurerm_host_provisioned( :id: c99d2679-1742-4ef3-9288-2961d18a30e7 - :CaseLevel: Component - - ::CaseImportance: Critical + :CaseImportance: Critical :steps: 1. Create a AzureRM Compute Resource and provision host. diff --git a/tests/foreman/cli/test_computeresource_ec2.py b/tests/foreman/cli/test_computeresource_ec2.py index 61efdd42839..e4e1e669e6b 100644 --- a/tests/foreman/cli/test_computeresource_ec2.py +++ b/tests/foreman/cli/test_computeresource_ec2.py @@ -1,17 +1,12 @@ """ :Requirement: Computeresource EC2 -:CaseLevel: Acceptance - :CaseComponent: ComputeResources-EC2 :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -53,8 +48,6 @@ def test_positive_create_ec2_with_custom_region(aws, module_target_sat): :CaseAutomation: Automated :CaseImportance: Critical - - :CaseLevel: Component """ cr_name = gen_string(str_type='alpha') cr_description = gen_string(str_type='alpha') diff --git a/tests/foreman/cli/test_computeresource_libvirt.py b/tests/foreman/cli/test_computeresource_libvirt.py index 128b4b15275..3c96a3598c8 100644 --- a/tests/foreman/cli/test_computeresource_libvirt.py +++ b/tests/foreman/cli/test_computeresource_libvirt.py @@ -21,17 +21,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ComputeResources-libvirt :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import random @@ -120,8 +115,6 @@ def test_positive_create_with_name(libvirt_url, module_target_sat): :expectedresults: Compute resource is created :CaseImportance: Critical - - :CaseLevel: Component """ module_target_sat.cli.ComputeResource.create( { @@ -141,8 +134,6 @@ def test_positive_info(libvirt_url, module_target_sat): :expectedresults: Compute resource Info is displayed :CaseImportance: Critical - - :CaseLevel: Component """ name = gen_string('utf8') compute_resource = module_target_sat.cli_factory.compute_resource( @@ -165,8 +156,6 @@ def test_positive_list(libvirt_url, module_target_sat): :expectedresults: Compute resource List is displayed :CaseImportance: Critical - - :CaseLevel: Component """ comp_res = module_target_sat.cli_factory.compute_resource( {'provider': FOREMAN_PROVIDERS['libvirt'], 'url': libvirt_url} @@ -190,8 +179,6 @@ def test_positive_delete_by_name(libvirt_url, module_target_sat): :expectedresults: Compute resource deleted :CaseImportance: Critical - - :CaseLevel: Component """ comp_res = module_target_sat.cli_factory.compute_resource( {'provider': FOREMAN_PROVIDERS['libvirt'], 'url': libvirt_url} @@ -215,8 +202,6 @@ def test_positive_create_with_libvirt(libvirt_url, options, target_sat): :CaseImportance: Critical - :CaseLevel: Component - :parametrized: yes """ target_sat.cli.ComputeResource.create( @@ -238,8 +223,6 @@ def test_positive_create_with_loc(libvirt_url, module_target_sat): :expectedresults: Compute resource is created and has location assigned :CaseImportance: High - - :CaseLevel: Integration """ location = module_target_sat.cli_factory.make_location() comp_resource = module_target_sat.cli_factory.compute_resource( @@ -263,8 +246,6 @@ def test_positive_create_with_locs(libvirt_url, module_target_sat): locations assigned :CaseImportance: High - - :CaseLevel: Integration """ locations_amount = random.randint(3, 5) locations = [module_target_sat.cli_factory.make_location() for _ in range(locations_amount)] @@ -294,8 +275,6 @@ def test_negative_create_with_name_url(libvirt_url, options, target_sat): :CaseImportance: High - :CaseLevel: Component - :parametrized: yes """ with pytest.raises(CLIReturnCodeError): @@ -317,8 +296,6 @@ def test_negative_create_with_same_name(libvirt_url, module_target_sat): :expectedresults: Compute resource not created :CaseImportance: High - - :CaseLevel: Component """ comp_res = module_target_sat.cli_factory.compute_resource( {'provider': FOREMAN_PROVIDERS['libvirt'], 'url': libvirt_url} @@ -347,8 +324,6 @@ def test_positive_update_name(libvirt_url, options, module_target_sat): :CaseImportance: Critical - :CaseLevel: Component - :parametrized: yes """ comp_res = module_target_sat.cli_factory.compute_resource( @@ -379,8 +354,6 @@ def test_negative_update(libvirt_url, options, module_target_sat): :CaseImportance: High - :CaseLevel: Component - :parametrized: yes """ comp_res = module_target_sat.cli_factory.compute_resource( @@ -411,8 +384,6 @@ def test_positive_create_with_console_password_and_name( :CaseImportance: High - :CaseLevel: Component - :parametrized: yes """ module_target_sat.cli.ComputeResource.create( @@ -438,8 +409,6 @@ def test_positive_update_console_password(libvirt_url, set_console_password, mod :CaseImportance: High - :CaseLevel: Component - :parametrized: yes """ cr_name = gen_string('utf8') diff --git a/tests/foreman/cli/test_computeresource_osp.py b/tests/foreman/cli/test_computeresource_osp.py index 1d76fe561d4..d88daaf1ad8 100644 --- a/tests/foreman/cli/test_computeresource_osp.py +++ b/tests/foreman/cli/test_computeresource_osp.py @@ -3,17 +3,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ComputeResources-OpenStack :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from box import Box from fauxfactory import gen_string diff --git a/tests/foreman/cli/test_computeresource_rhev.py b/tests/foreman/cli/test_computeresource_rhev.py index 5036bd2fd7c..808f1bbfd68 100644 --- a/tests/foreman/cli/test_computeresource_rhev.py +++ b/tests/foreman/cli/test_computeresource_rhev.py @@ -3,17 +3,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ComputeResources-RHEV :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -344,7 +339,6 @@ def test_negative_add_image_rhev_with_invalid_name(rhev, module_os, module_targe name parameter, compute-resource image create. :expectedresults: The image should not be added to the CR - """ if rhev.image_uuid is None: pytest.skip('Missing configuration for rhev.image_uuid') @@ -538,8 +532,6 @@ def test_positive_provision_rhev_without_host_group(rhev): :expectedresults: The host should be provisioned successfully :CaseAutomation: NotAutomated - - :CaseLevel: Integration """ diff --git a/tests/foreman/cli/test_computeresource_vmware.py b/tests/foreman/cli/test_computeresource_vmware.py index 3606b0a077d..e106fa9f49f 100644 --- a/tests/foreman/cli/test_computeresource_vmware.py +++ b/tests/foreman/cli/test_computeresource_vmware.py @@ -1,19 +1,14 @@ """ :Requirement: Computeresource Vmware -:CaseLevel: Acceptance - :CaseComponent: ComputeResources-VMWare :Team: Rocket -:TestType: Functional - :CaseImportance: High :CaseAutomation: Automated -:Upstream: No """ from fauxfactory import gen_string import pytest diff --git a/tests/foreman/cli/test_container_management.py b/tests/foreman/cli/test_container_management.py index 9229260475a..17d0b0b4bd0 100644 --- a/tests/foreman/cli/test_container_management.py +++ b/tests/foreman/cli/test_container_management.py @@ -4,13 +4,10 @@ :CaseAutomation: Automated -:TestType: Functional - :Team: Phoenix-content :CaseComponent: ContainerManagement-Content -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -52,8 +49,6 @@ class TestDockerClient: """Tests specific to using ``Docker`` as a client to pull Docker images from a Satellite 6 instance. - :CaseLevel: System - :CaseImportance: Medium """ @@ -64,7 +59,7 @@ def test_positive_pull_image(self, module_org, container_contenthost, target_sat :id: 023f0538-2aad-4f87-b8a8-6ccced648366 - :Steps: + :steps: 1. Publish and promote content view with Docker content 2. Register Docker-enabled client against Satellite 6. diff --git a/tests/foreman/cli/test_contentaccess.py b/tests/foreman/cli/test_contentaccess.py index 3f044995399..36bb6650e6f 100644 --- a/tests/foreman/cli/test_contentaccess.py +++ b/tests/foreman/cli/test_contentaccess.py @@ -2,17 +2,12 @@ :Requirement: Content Access -:CaseLevel: Acceptance - :CaseComponent: Hosts-Content :CaseAutomation: Automated :team: Phoenix-subscriptions -:TestType: Functional - -:Upstream: No """ import time @@ -227,8 +222,6 @@ def test_negative_unregister_and_pull_content(vm): :expectedresults: Host can no longer retrieve content from satellite - :CaseLevel: System - :parametrized: yes :CaseImportance: Critical diff --git a/tests/foreman/cli/test_contentcredentials.py b/tests/foreman/cli/test_contentcredentials.py index d1a47b71b83..dbefc75bd4f 100644 --- a/tests/foreman/cli/test_contentcredentials.py +++ b/tests/foreman/cli/test_contentcredentials.py @@ -6,17 +6,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ContentCredentials :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from tempfile import mkstemp @@ -330,8 +325,6 @@ def test_positive_add_empty_product(module_org, target_sat): :id: 61c700db-43ab-4b8c-8527-f4cfc085afaa :expectedresults: gpg key is associated with product - - :CaseLevel: Integration """ gpg_key = target_sat.cli_factory.make_content_credential({'organization-id': module_org.id}) product = target_sat.cli_factory.make_product( @@ -349,8 +342,6 @@ def test_positive_add_product_with_repo(module_org, target_sat): :expectedresults: gpg key is associated with product as well as with the repository - - :CaseLevel: Integration """ product = target_sat.cli_factorymake_product({'organization-id': module_org.id}) repo = target_sat.cli_factory.make_repository({'product-id': product['id']}) @@ -374,8 +365,6 @@ def test_positive_add_product_with_repos(module_org, target_sat): :expectedresults: gpg key is associated with product as well as with the repositories - - :CaseLevel: Integration """ product = target_sat.cli_factory.make_product({'organization-id': module_org.id}) repos = [ @@ -403,8 +392,6 @@ def test_positive_add_repo_from_product_with_repo(module_org, target_sat): :expectedresults: gpg key is associated with the repository but not with the product - - :CaseLevel: Integration """ product = target_sat.cli_factory.make_product({'organization-id': module_org.id}) repo = target_sat.cli_factory.make_repository({'product-id': product['id']}) @@ -429,8 +416,6 @@ def test_positive_add_repo_from_product_with_repos(module_org, target_sat): :id: e3019a61-ec32-4044-9087-e420b8db4e09 :expectedresults: gpg key is associated with the repository - - :CaseLevel: Integration """ product = target_sat.cli_factory.make_product({'organization-id': module_org.id}) repos = [ @@ -462,8 +447,6 @@ def test_positive_update_key_for_empty_product(module_org, target_sat): :expectedresults: gpg key is associated with product before/after update - - :CaseLevel: Integration """ # Create a product and a gpg key product = target_sat.cli_factory.make_product({'organization-id': module_org.id}) @@ -498,8 +481,6 @@ def test_positive_update_key_for_product_with_repo(module_org, target_sat): :expectedresults: gpg key is associated with product before/after update as well as with the repository - - :CaseLevel: Integration """ # Create a product and a gpg key product = target_sat.cli_factory.make_product({'organization-id': module_org.id}) @@ -541,8 +522,6 @@ def test_positive_update_key_for_product_with_repos(module_org, target_sat): :expectedresults: gpg key is associated with product before/after update as well as with the repositories - - :CaseLevel: Integration """ # Create a product and a gpg key product = target_sat.cli_factory.make_product({'organization-id': module_org.id}) @@ -589,8 +568,6 @@ def test_positive_update_key_for_repo_from_product_with_repo(module_org, target_ :expectedresults: gpg key is associated with the repository before/after update, but not with the product - - :CaseLevel: Integration """ # Create a product and a gpg key product = target_sat.cli_factory.make_product({'organization-id': module_org.id}) @@ -628,8 +605,6 @@ def test_positive_update_key_for_repo_from_product_with_repos(module_org, target :expectedresults: gpg key is associated with a single repository before/after update and not associated with product or other repositories - - :CaseLevel: Integration """ # Create a product and a gpg key product = target_sat.cli_factory.make_product({'organization-id': module_org.id}) @@ -677,7 +652,6 @@ def test_positive_delete_key_for_empty_product(module_org, target_sat): :expectedresults: gpg key is associated with product during creation but removed from product after deletion - :CaseLevel: Integration """ # Create a product and a gpg key gpg_key = target_sat.cli_factory.make_content_credential({'organization-id': module_org.id}) @@ -708,8 +682,6 @@ def test_positive_delete_key_for_product_with_repo(module_org, target_sat): :expectedresults: gpg key is associated with product but and its repository during creation but removed from product and repository after deletion - - :CaseLevel: Integration """ # Create product, repository and gpg key product = target_sat.cli_factory.make_product({'organization-id': module_org.id}) @@ -748,7 +720,6 @@ def test_positive_delete_key_for_product_with_repos(module_org, target_sat): repositories during creation but removed from the product and the repositories after deletion - :CaseLevel: Integration """ # Create product, repositories and gpg key product = target_sat.cli_factory.make_product({'organization-id': module_org.id}) @@ -793,7 +764,6 @@ def test_positive_delete_key_for_repo_from_product_with_repo(module_org, target_ not the product during creation and was removed from repository after deletion - :CaseLevel: Integration """ # Create product, repository and gpg key product = target_sat.cli_factory.make_product({'organization-id': module_org.id}) @@ -831,7 +801,6 @@ def test_positive_delete_key_for_repo_from_product_with_repos(module_org, target not the product during creation and removed from repository after deletion - :CaseLevel: Integration """ # Create product, repositories and gpg key product = target_sat.cli_factory.make_product({'organization-id': module_org.id}) diff --git a/tests/foreman/cli/test_contentview.py b/tests/foreman/cli/test_contentview.py index f8b103b1760..cddb7a8d8a1 100644 --- a/tests/foreman/cli/test_contentview.py +++ b/tests/foreman/cli/test_contentview.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ContentViews :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import random @@ -205,8 +200,6 @@ def test_positive_update_filter(self, repo_setup, module_target_sat): :expectedresults: Edited content view save is successful and info is updated - :CaseLevel: Integration - :CaseImportance: High """ # Create CV @@ -289,7 +282,6 @@ def test_positive_delete_version_by_name(self, module_org, module_target_sat): :CaseImportance: High - :CaseLevel: Integration """ content_view = module_target_sat.cli_factory.make_content_view( {'organization-id': module_org.id} @@ -372,7 +364,6 @@ def test_negative_delete_version_by_id(self, module_org, module_target_sat): :CaseImportance: Critical - :CaseLevel: Integration """ content_view = module_target_sat.cli_factory.make_content_view( {'organization-id': module_org.id} @@ -417,7 +408,6 @@ def test_positive_remove_lce_by_id_and_reassign_ak(self, module_org, module_targ :CaseImportance: Medium - :CaseLevel: Integration """ env = [ module_target_sat.cli_factory.make_lifecycle_environment( @@ -484,7 +474,6 @@ def test_positive_remove_lce_by_id_and_reassign_chost(self, module_org, module_t :CaseImportance: Low - :CaseLevel: Integration """ env = [ module_target_sat.cli_factory.make_lifecycle_environment( @@ -668,8 +657,6 @@ def test_positive_create_composite(self, module_org, module_target_sat): :expectedresults: Composite content views are created - :CaseLevel: Integration - :CaseImportance: High """ # Create REPO @@ -714,8 +701,6 @@ def test_positive_create_composite_by_name(self, module_org, module_target_sat): :BZ: 1416857 - :CaseLevel: Integration - :CaseImportance: High """ new_product = module_target_sat.cli_factory.make_product({'organization-id': module_org.id}) @@ -765,8 +750,6 @@ def test_positive_remove_version_by_id_from_composite( :expectedresults: Composite content view info output does not contain any values - :CaseLevel: Integration - :CaseImportance: High """ # Create new repository @@ -820,8 +803,6 @@ def test_positive_remove_component_by_name(self, module_org, module_product, mod :BZ: 1416857 - :CaseLevel: Integration - :CaseImportance: High """ # Create new repository @@ -874,8 +855,6 @@ def test_positive_create_composite_with_component_ids(self, module_org, module_t :BZ: 1487265 - :CaseLevel: Integration - :CaseImportance: High """ # Create first CV @@ -911,8 +890,6 @@ def test_negative_create_composite_with_component_ids(self, module_org, module_t :BZ: 1487265 - :CaseLevel: Integration - :CaseImportance: Low """ # Create CV @@ -943,8 +920,6 @@ def test_positive_update_composite_with_component_ids(module_org, module_target_ :expectedresults: Composite content view component ids are similar to the nested content view versions ids - :CaseLevel: Integration - :CaseImportance: Low """ # Create a CV to add to the composite one @@ -980,8 +955,6 @@ def test_positive_add_rh_repo_by_id( :expectedresults: RH Content can be seen in the content view - :CaseLevel: Integration - :CaseImportance: Critical """ # Create CV @@ -1019,8 +992,6 @@ def test_positive_add_rh_repo_by_id_and_create_filter( :CaseImportance: Low - :CaseLevel: Integration - :BZ: 1359665 """ # Create CV @@ -1064,7 +1035,6 @@ def test_positive_add_module_stream_filter_rule(self, module_org, target_sat): :CaseImportance: Low - :CaseLevel: Integration """ filter_name = gen_string('alpha') repo_name = gen_string('alpha') @@ -1112,7 +1082,6 @@ def test_positive_add_custom_repo_by_id(self, module_org, module_product, module :CaseImportance: High - :CaseLevel: Integration """ new_repo = module_target_sat.cli_factory.make_repository( {'content-type': 'yum', 'product-id': module_product.id} @@ -1172,7 +1141,6 @@ def test_negative_add_component_in_non_composite_cv( :CaseImportance: Low - :CaseLevel: Integration """ # Create REPO new_repo = module_target_sat.cli_factory.make_repository( @@ -1209,7 +1177,6 @@ def test_negative_add_same_yum_repo_twice(self, module_org, module_product, modu :CaseImportance: Low - :CaseLevel: Integration """ new_repo = module_target_sat.cli_factory.make_repository( {'content-type': 'yum', 'product-id': module_product.id} @@ -1247,7 +1214,6 @@ def test_positive_promote_rh_content( :CaseImportance: Critical - :CaseLevel: Integration """ # Create CV new_cv = module_target_sat.cli_factory.make_content_view( @@ -1287,7 +1253,6 @@ def test_positive_promote_rh_and_custom_content( :CaseImportance: Low - :CaseLevel: Integration """ # Create custom repo new_repo = module_target_sat.cli_factory.make_repository( @@ -1348,7 +1313,6 @@ def test_positive_promote_custom_content(self, module_org, module_product, modul :CaseImportance: High - :CaseLevel: Integration """ # Create REPO new_repo = module_target_sat.cli_factory.make_repository( @@ -1395,7 +1359,6 @@ def test_positive_promote_ccv(self, module_org, module_product, module_target_sa :CaseImportance: High - :CaseLevel: Integration """ # Create REPO new_repo = module_target_sat.cli_factory.make_repository( @@ -1452,7 +1415,6 @@ def test_negative_promote_default_cv(self, module_org, module_target_sat): :CaseImportance: Low - :CaseLevel: Integration """ environment = module_target_sat.cli_factory.make_lifecycle_environment( {'organization-id': module_org.id} @@ -1482,7 +1444,6 @@ def test_negative_promote_with_invalid_lce(self, module_org, module_product, mod :CaseImportance: Low - :CaseLevel: Integration """ # Create REPO new_repo = module_target_sat.cli_factory.make_repository( @@ -1527,7 +1488,6 @@ def test_positive_publish_rh_content( :CaseImportance: Critical - :CaseLevel: Integration """ # Create CV new_cv = module_target_sat.cli_factory.make_content_view( @@ -1561,7 +1521,6 @@ def test_positive_publish_rh_and_custom_content( :CaseImportance: High - :CaseLevel: Integration """ # Create custom repo new_repo = module_target_sat.cli_factory.make_repository( @@ -1615,7 +1574,6 @@ def test_positive_publish_custom_content(self, module_org, module_product, modul :CaseImportance: Critical - :CaseLevel: Integration """ new_repo = module_target_sat.cli_factory.make_repository( {'content-type': 'yum', 'product-id': module_product.id} @@ -1651,7 +1609,6 @@ def test_positive_publish_custom_major_minor_cv_version(self, module_target_sat) 1. CV version with custom major and minor versions is created - :CaseLevel: System """ org = module_target_sat.cli_factory.make_org() major = random.randint(1, 1000) @@ -1687,7 +1644,6 @@ def test_positive_publish_custom_content_module_stream( :CaseImportance: Medium - :CaseLevel: Integration """ software_repo = module_target_sat.cli_factory.make_repository( { @@ -1756,7 +1712,6 @@ def test_positive_republish_after_content_removed( :customerscenario: true - :CaseLevel: Integration """ # Create new Yum repository yum_repo = module_target_sat.cli_factory.make_repository( @@ -1824,8 +1779,6 @@ def test_positive_republish_after_rh_content_removed( :BZ: 1323751 - :CaseLevel: Integration - :customerscenario: true :CaseImportance: Medium @@ -1871,7 +1824,6 @@ def test_positive_publish_ccv(self, module_org, module_product, module_target_sa :CaseImportance: Critical - :CaseLevel: Integration """ repository = module_target_sat.cli_factory.make_repository( {'content-type': 'yum', 'product-id': module_product.id} @@ -1932,8 +1884,6 @@ def test_positive_update_version_once(self, module_org, module_product, module_t environment. - :CaseLevel: Integration - :CaseImportance: Critical """ # Create REPO @@ -2011,7 +1961,6 @@ def test_positive_update_version_multiple(self, module_org, module_product, modu :CaseImportance: Low - :CaseLevel: Integration """ # Create REPO new_repo = module_target_sat.cli_factory.make_repository( @@ -2098,8 +2047,6 @@ def test_positive_auto_update_composite_to_latest_cv_version( :BZ: 1177766 - :CaseLevel: Integration - :CaseImportance: High """ content_view = module_target_sat.cli_factory.make_content_view( @@ -2155,7 +2102,6 @@ def test_positive_subscribe_chost_by_id(self, module_org, module_target_sat): :CaseImportance: High - :CaseLevel: System """ env = module_target_sat.cli_factory.make_lifecycle_environment( {'organization-id': module_org.id} @@ -2195,8 +2141,6 @@ def test_positive_subscribe_chost_by_id_using_rh_content( :expectedresults: Content Host can be subscribed to content view with Red Hat repository - :CaseLevel: System - :CaseImportance: Medium """ env = module_target_sat.cli_factory.make_lifecycle_environment( @@ -2247,8 +2191,6 @@ def test_positive_subscribe_chost_by_id_using_rh_content_and_filters( :expectedresults: Content Host can be subscribed to filtered content view with Red Hat repository - :CaseLevel: System - :BZ: 1359665 :CaseImportance: Low @@ -2320,8 +2262,6 @@ def test_positive_subscribe_chost_by_id_using_custom_content( :expectedresults: Content Host can be subscribed to content view with custom repository - :CaseLevel: System - :CaseImportance: High """ new_product = module_target_sat.cli_factory.make_product({'organization-id': module_org.id}) @@ -2375,7 +2315,6 @@ def test_positive_subscribe_chost_by_id_using_ccv(self, module_org, module_targe :CaseImportance: High - :CaseLevel: System """ env = module_target_sat.cli_factory.make_lifecycle_environment( {'organization-id': module_org.id} @@ -2448,7 +2387,6 @@ def test_positive_sub_host_with_restricted_user_perm_at_custom_loc( :parametrized: yes - :CaseLevel: System """ # Note: this test has been stubbed waitin for bug 1511481 resolution # prepare the user and the required permissions data @@ -2605,7 +2543,6 @@ def test_positive_sub_host_with_restricted_user_perm_at_default_loc( :parametrized: yes - :CaseLevel: System """ # prepare the user and the required permissions data user_name = gen_alphanumeric() @@ -2777,8 +2714,6 @@ def test_positive_clone_within_same_env(self, module_org, module_target_sat): :expectedresults: Cloned content view can be published and promoted to the same environment as the original content view - :CaseLevel: Integration - :CaseImportance: High """ cloned_cv_name = gen_string('alpha') @@ -2818,7 +2753,6 @@ def test_positive_clone_with_diff_env(self, module_org, module_target_sat): :CaseImportance: Low - :CaseLevel: Integration """ cloned_cv_name = gen_string('alpha') lc_env = module_target_sat.cli_factory.make_lifecycle_environment( @@ -2893,7 +2827,7 @@ def test_positive_remove_renamed_cv_version_from_default_env( :id: aa9bbfda-72e8-45ec-b26d-fdf2691980cf - :Steps: + :steps: 1. Create a content view 2. Add a yum repo to the content view @@ -2904,8 +2838,6 @@ def test_positive_remove_renamed_cv_version_from_default_env( :expectedresults: content view version is removed from Library environment - :CaseLevel: Integration - :CaseImportance: Low """ new_name = gen_string('alpha') @@ -2969,7 +2901,7 @@ def test_positive_remove_promoted_cv_version_from_default_env( :id: 6643837a-560a-47de-aa4d-90778914dcfa - :Steps: + :steps: 1. Create a content view 2. Add a yum repo to the content view @@ -2982,8 +2914,6 @@ def test_positive_remove_promoted_cv_version_from_default_env( 1. Content view version exist only in DEV and not in Library 2. The yum repo exists in content view version - :CaseLevel: Integration - :CaseImportance: High """ lce_dev = module_target_sat.cli_factory.make_lifecycle_environment( @@ -3061,7 +2991,7 @@ def test_positive_remove_qe_promoted_cv_version_from_default_env( :id: e286697f-4113-40a3-b8e8-9ca50647e6d5 - :Steps: + :steps: 1. Create a content view 2. Add docker repo(s) to it @@ -3073,8 +3003,6 @@ def test_positive_remove_qe_promoted_cv_version_from_default_env( :expectedresults: Content view version exist only in DEV, QE and not in Library - :CaseLevel: Integration - :CaseImportance: High """ lce_dev = module_target_sat.cli_factory.make_lifecycle_environment( @@ -3150,7 +3078,7 @@ def test_positive_remove_prod_promoted_cv_version_from_default_env( :id: ffe3d64e-c3d2-4889-9454-ccc6b10f4db7 - :Steps: + :steps: 1. Create a content view 2. Add yum repositories and docker repositories to CV @@ -3164,7 +3092,6 @@ def test_positive_remove_prod_promoted_cv_version_from_default_env( :CaseImportance: High - :CaseLevel: Integration """ lce_dev = module_target_sat.cli_factory.make_lifecycle_environment( {'organization-id': module_org.id} @@ -3257,7 +3184,7 @@ def test_positive_remove_cv_version_from_env(self, module_org, module_target_sat :id: 577757ac-b184-4ece-9310-182dd5ceb718 - :Steps: + :steps: 1. Create a content view 2. Add a yum repo and a docker repo to the content view @@ -3272,8 +3199,6 @@ def test_positive_remove_cv_version_from_env(self, module_org, module_target_sat :expectedresults: Content view version exist in Library, DEV, QE, STAGE, PROD - :CaseLevel: Integration - :CaseImportance: High """ lce_dev = module_target_sat.cli_factory.make_lifecycle_environment( @@ -3385,7 +3310,7 @@ def test_positive_remove_cv_version_from_multi_env(self, module_org, module_targ :id: 997cfd7d-9029-47e2-a41e-84f4370b5ce5 - :Steps: + :steps: 1. Create a content view 2. Add a yum repo and a docker to the content view @@ -3396,8 +3321,6 @@ def test_positive_remove_cv_version_from_multi_env(self, module_org, module_targ :expectedresults: Content view version exists only in Library, DEV - :CaseLevel: Integration - :CaseImportance: High """ lce_dev = module_target_sat.cli_factory.make_lifecycle_environment( @@ -3491,7 +3414,7 @@ def test_positive_delete_cv_promoted_to_multi_env(self, module_org, module_targe :id: 93dd7518-5901-4a71-a4c3-0f1215238b26 - :Steps: + :steps: 1. Create a content view 2. Add a yum repo and a docker to the content view @@ -3503,8 +3426,6 @@ def test_positive_delete_cv_promoted_to_multi_env(self, module_org, module_targe :expectedresults: The content view doesn't exists - :CaseLevel: Integration - :CaseImportance: High """ lce_dev = module_target_sat.cli_factory.make_lifecycle_environment( @@ -3603,7 +3524,7 @@ def test_positive_remove_cv_version_from_env_with_host_registered(self): :id: 001a2b76-a87b-4c11-8837-f5fe3c04a075 - :Steps: + :steps: 1. Create a content view cv1 2. Add a yum repo to the content view @@ -3630,7 +3551,6 @@ def test_positive_remove_cv_version_from_env_with_host_registered(self): :CaseAutomation: NotAutomated - :CaseLevel: System """ @pytest.mark.stubbed @@ -3642,7 +3562,7 @@ def test_positive_delete_cv_multi_env_promoted_with_host_registered(self): :id: 82442d23-45b5-4d39-b867-c5d46bbcbbf9 - :Steps: + :steps: 1. Create two content view cv1 and cv2 2. Add a yum repo to both content views @@ -3670,7 +3590,6 @@ def test_positive_delete_cv_multi_env_promoted_with_host_registered(self): :CaseAutomation: NotAutomated - :CaseLevel: System """ @pytest.mark.run_in_one_thread @@ -3687,7 +3606,7 @@ def test_positive_remove_cv_version_from_multi_env_capsule_scenario( :id: 3725fef6-73a4-4dcb-a306-70e6ba826a3d - :Steps: + :steps: 1. Create a content view 2. Setup satellite to use a capsule and to sync all lifecycle @@ -3712,8 +3631,6 @@ def test_positive_remove_cv_version_from_multi_env_capsule_scenario( :CaseAutomation: Automated - :CaseLevel: System - :CaseImportance: High """ # Note: This test case requires complete external capsule @@ -3911,8 +3828,6 @@ def test_negative_user_with_read_only_cv_permission(self, module_org, module_tar :BZ: 1922134 - :CaseLevel: Integration - :CaseImportance: Critical """ cv = module_target_sat.cli_factory.make_content_view({'organization-id': module_org.id}) @@ -3988,8 +3903,6 @@ def test_positive_user_with_all_cv_permissions(self, module_org, module_target_s :BZ: 1464414 - :CaseLevel: Integration - :CaseImportance: Critical """ cv = module_target_sat.cli_factory.make_content_view({'organization-id': module_org.id}) @@ -4062,7 +3975,6 @@ def test_positive_inc_update_no_lce(self, module_org, module_product, module_tar :CaseImportance: Medium - :CaseLevel: Integration """ repo = module_target_sat.cli_factory.make_repository( { @@ -4156,15 +4068,13 @@ def test_positive_arbitrary_file_repo_addition( 2. Upload an arbitrary file to it 3. Create a Content View (CV) - :Steps: + :steps: 1. Add the FR to the CV :expectedresults: Check FR is added to CV :CaseAutomation: Automated - :CaseLevel: Integration - :CaseImportance: High :BZ: 1610309, 1908465 @@ -4201,15 +4111,13 @@ def test_positive_arbitrary_file_repo_removal( 3. Create a Content View (CV) 4. Add the FR to the CV - :Steps: + :steps: 1. Remove the FR from the CV :expectedresults: Check FR is removed from CV :CaseAutomation: Automated - :CaseLevel: Integration - :BZ: 1908465 """ cv = module_target_sat.cli_factory.make_content_view({'organization-id': module_org.id}) @@ -4241,14 +4149,13 @@ def test_positive_arbitrary_file_sync_over_capsule(self): 5. Create a Capsule 6. Connect the Capsule with Satellite/Foreman host - :Steps: + :steps: 1. Start synchronization :expectedresults: Check CV with FR is synced over Capsule :CaseAutomation: NotAutomated - :CaseLevel: System """ @pytest.mark.tier3 @@ -4267,7 +4174,7 @@ def test_positive_arbitrary_file_repo_promotion( 4. Add the FR to the CV 5. Create an Environment - :Steps: + :steps: 1. Promote the CV to the Environment :expectedresults: Check arbitrary files from FR is available on @@ -4275,8 +4182,6 @@ def test_positive_arbitrary_file_repo_promotion( :CaseAutomation: Automated - :CaseLevel: Integration - :CaseImportance: High """ diff --git a/tests/foreman/cli/test_contentviewfilter.py b/tests/foreman/cli/test_contentviewfilter.py index a9e7ded1783..faf28c42def 100644 --- a/tests/foreman/cli/test_contentviewfilter.py +++ b/tests/foreman/cli/test_contentviewfilter.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ContentViews :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -590,8 +585,6 @@ def test_positive_update_name(self, new_name, module_org, content_view, module_t :expectedresults: Content view filter updated successfully and has proper and expected name - :CaseLevel: Integration - :CaseImportance: Critical """ cvf_name = gen_string('utf8') @@ -628,8 +621,6 @@ def test_positive_update_repo_with_same_type( :expectedresults: Content view filter updated successfully and has new repository affected - :CaseLevel: Integration - :CaseImportance: Critical """ cvf_name = gen_string('utf8') @@ -684,7 +675,6 @@ def test_positive_update_repo_with_different_type( :expectedresults: Content view filter updated successfully and has new repository affected - :CaseLevel: Integration """ cvf_name = gen_string('utf8') module_target_sat.cli.ContentView.filter.create( @@ -737,7 +727,6 @@ def test_positive_update_inclusion(self, module_org, content_view, module_target :expectedresults: Content view filter updated successfully and has correct and expected value for inclusion parameter - :CaseLevel: Integration """ cvf_name = gen_string('utf8') module_target_sat.cli.ContentView.filter.create( diff --git a/tests/foreman/cli/test_discoveredhost.py b/tests/foreman/cli/test_discoveredhost.py index a451087643d..99a3350fb19 100644 --- a/tests/foreman/cli/test_discoveredhost.py +++ b/tests/foreman/cli/test_discoveredhost.py @@ -8,11 +8,6 @@ :Team: Rocket -:TestType: Functional - -:CaseLevel: System - -:Upstream: No """ from time import sleep @@ -72,7 +67,7 @@ def test_positive_provision_pxeless_bios_syslinux(): :Setup: 1. Craft the FDI with remaster the image to have ssh enabled - :Steps: + :steps: 1. Create a BIOS VM and set it to boot from the FDI 2. Run assertion steps #1-2 3. Provision the discovered host using PXELinux loader @@ -374,7 +369,7 @@ def test_positive_list_facts(): :Setup: 1. Provisioning is configured and Host is already discovered - :Steps: Validate specified builtin and custom facts + :steps: Validate specified builtin and custom facts :expectedresults: All checked facts should be displayed correctly diff --git a/tests/foreman/cli/test_discoveryrule.py b/tests/foreman/cli/test_discoveryrule.py index 577cf7d6bc7..0bdd7dd8678 100644 --- a/tests/foreman/cli/test_discoveryrule.py +++ b/tests/foreman/cli/test_discoveryrule.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: DiscoveryPlugin :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from functools import partial import random @@ -136,7 +131,6 @@ def test_positive_create_with_hostname(self, discoveryrule_factory): :expectedresults: Rule should be successfully created and has expected hostname value - :CaseLevel: Component """ host_name = 'myhost' rule = discoveryrule_factory(options={'hostname': host_name}) @@ -198,7 +192,6 @@ def test_positive_create_with_hosts_limit(self, discoveryrule_factory): :expectedresults: Rule should be successfully created and has expected hosts limit value - :CaseLevel: Component """ hosts_limit = '5' rule = discoveryrule_factory(options={'hosts-limit': hosts_limit}) @@ -229,7 +222,6 @@ def test_positive_create_disabled_rule(self, discoveryrule_factory): :expectedresults: Disabled rule should be successfully created - :CaseLevel: Component """ rule = discoveryrule_factory(options={'enabled': 'false'}) assert rule.enabled == 'false' @@ -245,8 +237,6 @@ def test_negative_create_with_invalid_name(self, name, discoveryrule_factory): :CaseImportance: Medium - :CaseLevel: Component - :parametrized: yes """ with pytest.raises(CLIFactoryError): @@ -263,8 +253,6 @@ def test_negative_create_with_invalid_hostname(self, name, discoveryrule_factory :CaseImportance: Medium - :CaseLevel: Component - :BZ: 1378427 :parametrized: yes @@ -324,8 +312,6 @@ def test_positive_update_name(self, discoveryrule_factory): :expectedresults: Rule name is updated - :CaseLevel: Component - :CaseImportance: Medium """ rule = discoveryrule_factory() @@ -344,7 +330,6 @@ def test_positive_update_org_loc_by_id(self, discoveryrule_factory, target_sat): :BZ: 1377990 - :CaseLevel: Component """ new_org = Box(target_sat.cli_factory.make_org()) new_loc = Box(target_sat.cli_factory.make_location()) @@ -377,8 +362,6 @@ def test_positive_update_org_loc_by_name(self, discoveryrule_factory, target_sat :BZ: 1377990 - :CaseLevel: Component - :CaseImportance: Medium """ new_org = Box(target_sat.cli_factory.make_org()) @@ -409,7 +392,6 @@ def test_positive_update_query(self, discoveryrule_factory): :expectedresults: Rule search field is updated - :CaseLevel: Component """ rule = discoveryrule_factory() new_query = 'model = KVM' @@ -425,7 +407,6 @@ def test_positive_update_hostgroup(self, discoveryrule_factory, class_org, targe :expectedresults: Rule host group is updated - :CaseLevel: Component """ new_hostgroup = Box( target_sat.cli_factory.make_hostgroup({'organization-ids': class_org.id}) @@ -444,7 +425,6 @@ def test_positive_update_hostname(self, discoveryrule_factory): :expectedresults: Rule host name is updated - :CaseLevel: Component """ new_hostname = gen_string('alpha') rule = discoveryrule_factory() @@ -460,7 +440,6 @@ def test_positive_update_limit(self, discoveryrule_factory): :expectedresults: Rule host limit field is updated - :CaseLevel: Component """ rule = discoveryrule_factory(options={'hosts-limit': '5'}) new_limit = '10' @@ -513,8 +492,6 @@ def test_negative_update_name(self, name, discoveryrule_factory): :expectedresults: Rule name is not updated - :CaseLevel: Component - :CaseImportance: Medium :parametrized: yes @@ -533,7 +510,6 @@ def test_negative_update_hostname(self, discoveryrule_factory): :CaseImportance: Medium - :CaseLevel: Component """ rule = discoveryrule_factory() with pytest.raises(CLIReturnCodeError): @@ -547,8 +523,6 @@ def test_negative_update_limit(self, discoveryrule_factory): :expectedresults: Rule host limit is not updated - :CaseLevel: Component - :CaseImportance: Medium """ rule = discoveryrule_factory() @@ -564,8 +538,6 @@ def test_negative_update_priority(self, discoveryrule_factory): :expectedresults: Rule priority is not updated - :CaseLevel: Component - :CaseImportance: Medium """ rule = discoveryrule_factory() @@ -623,7 +595,6 @@ def test_positive_create_rule_with_non_admin_user( :expectedresults: Rule should be created successfully. - :CaseLevel: Integration """ rule_name = gen_string('alpha') rule = Box( @@ -654,7 +625,6 @@ def test_positive_delete_rule_with_non_admin_user( :expectedresults: Rule should be deleted successfully. - :CaseLevel: Integration """ rule_name = gen_string('alpha') rule = Box( @@ -703,7 +673,6 @@ def test_positive_view_existing_rule_with_non_admin_user( :expectedresults: Rule should be visible to non-admin user. - :CaseLevel: Integration """ rule_name = gen_string('alpha') rule = Box( @@ -742,7 +711,6 @@ def test_negative_delete_rule_with_non_admin_user( :expectedresults: User should validation error and rule should not be deleted successfully. - :CaseLevel: Integration """ rule = Box( target_sat.cli_factory.make_discoveryrule( diff --git a/tests/foreman/cli/test_docker.py b/tests/foreman/cli/test_docker.py index 23064641819..10b1d1dd4fc 100644 --- a/tests/foreman/cli/test_docker.py +++ b/tests/foreman/cli/test_docker.py @@ -4,13 +4,8 @@ :CaseAutomation: Automated -:CaseLevel: Component - -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from random import choice, randint @@ -169,7 +164,6 @@ def test_positive_create_repos_using_same_product( :expectedresults: Multiple docker repositories are created with a Docker upstream repository and they all belong to the same product. - :CaseLevel: Integration """ repo_names = set() for _ in range(randint(2, 5)): @@ -191,7 +185,6 @@ def test_positive_create_repos_using_multiple_products(self, module_org, module_ Docker upstream repository and they all belong to their respective products. - :CaseLevel: Integration """ for _ in range(randint(2, 5)): product = module_target_sat.cli_factory.make_product_wait( @@ -404,8 +397,6 @@ class TestDockerContentView: :CaseComponent: ContentViews :team: Phoenix-content - - :CaseLevel: Integration """ @pytest.mark.tier2 @@ -1145,8 +1136,6 @@ class TestDockerActivationKey: :CaseComponent: ActivationKeys :team: Phoenix-subscriptions - - :CaseLevel: Integration """ @pytest.mark.tier2 diff --git a/tests/foreman/cli/test_domain.py b/tests/foreman/cli/test_domain.py index ab415f1ed0c..32f81369592 100644 --- a/tests/foreman/cli/test_domain.py +++ b/tests/foreman/cli/test_domain.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -194,8 +189,6 @@ def test_negative_create_with_invalid_dns_id(module_target_sat): :BZ: 1398392 - :CaseLevel: Integration - :CaseImportance: Medium """ with pytest.raises(CLIFactoryError) as context: diff --git a/tests/foreman/cli/test_environment.py b/tests/foreman/cli/test_environment.py index 10481c743c6..90e5b79e72a 100644 --- a/tests/foreman/cli/test_environment.py +++ b/tests/foreman/cli/test_environment.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Puppet :Team: Rocket -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ from random import choice @@ -49,8 +44,6 @@ def test_negative_list_with_parameters( :expectedresults: Server returns empty result as there is no environment associated with location - :CaseLevel: Integration - :BZ: 1337947 """ session_puppet_enabled_sat.cli.Environment.create( diff --git a/tests/foreman/cli/test_errata.py b/tests/foreman/cli/test_errata.py index 43d9b9d5caa..3291f3eb33b 100644 --- a/tests/foreman/cli/test_errata.py +++ b/tests/foreman/cli/test_errata.py @@ -4,17 +4,11 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ErrataManagement :team: Phoenix-content -:TestType: Functional - :CaseImportance: High - -:Upstream: No """ from datetime import date, datetime, timedelta from operator import itemgetter @@ -406,8 +400,6 @@ def test_positive_install_by_host_collection_and_org( :expectedresults: Erratum is installed. - :CaseLevel: System - :BZ: 1457977, 1983043 """ errata_id = REPO_WITH_ERRATA['errata'][0]['id'] @@ -461,7 +453,6 @@ def test_negative_install_by_hc_id_without_errata_info( :CaseImportance: Low - :CaseLevel: System """ with pytest.raises(CLIReturnCodeError, match="Error: Option '--errata' is required"): target_sat.cli.HostCollection.erratum_install( @@ -490,7 +481,6 @@ def test_negative_install_by_hc_name_without_errata_info( :CaseImportance: Low - :CaseLevel: System """ with pytest.raises(CLIReturnCodeError, match="Error: Option '--errata' is required"): target_sat.cli.HostCollection.erratum_install( @@ -521,8 +511,6 @@ def test_negative_install_without_hc_info( :BZ: 1928281 :CaseImportance: Low - - :CaseLevel: System """ module_target_sat.cli_factory.make_host_collection( {'organization-id': module_entitlement_manifest_org.id} @@ -553,7 +541,6 @@ def test_negative_install_by_hc_id_without_org_info( :CaseImportance: Low - :CaseLevel: System """ with pytest.raises(CLIReturnCodeError, match='Error: Could not find organization'): module_target_sat.cli.HostCollection.erratum_install( @@ -578,7 +565,6 @@ def test_negative_install_by_hc_name_without_org_info( :CaseImportance: Low - :CaseLevel: System """ with pytest.raises(CLIReturnCodeError, match='Error: Could not find organization'): module_target_sat.cli.HostCollection.erratum_install( @@ -1117,8 +1103,6 @@ def test_negative_list_filter_by_product_name(products_with_repos, module_target :expectedresults: Error must be returned. :CaseImportance: Low - - :CaseLevel: System """ with pytest.raises(CLIReturnCodeError): module_target_sat.cli.Erratum.list( @@ -1173,7 +1157,6 @@ def test_positive_list_filter_by_cve(module_entitlement_manifest_org, rh_repo, t :Steps: erratum list --cve :expectedresults: Errata is filtered by CVE. - """ target_sat.cli.RepositorySet.enable( { diff --git a/tests/foreman/cli/test_fact.py b/tests/foreman/cli/test_fact.py index 32d71033929..caab7827f3a 100644 --- a/tests/foreman/cli/test_fact.py +++ b/tests/foreman/cli/test_fact.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Fact :Team: Rocket -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ from fauxfactory import gen_string import pytest diff --git a/tests/foreman/cli/test_filter.py b/tests/foreman/cli/test_filter.py index c4b109ef0b4..4108ce07d6b 100644 --- a/tests/foreman/cli/test_filter.py +++ b/tests/foreman/cli/test_filter.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: UsersRoles :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/foreman/cli/test_foremantask.py b/tests/foreman/cli/test_foremantask.py index 7dcd90ac669..bdce6e63a97 100644 --- a/tests/foreman/cli/test_foremantask.py +++ b/tests/foreman/cli/test_foremantask.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: TasksPlugin :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest @@ -48,5 +43,4 @@ def test_positive_tasks_backup(): :CaseImportance: High :CaseAutomation: NotAutomated - """ diff --git a/tests/foreman/cli/test_globalparam.py b/tests/foreman/cli/test_globalparam.py index 2a5d49cf966..41bb8ca769b 100644 --- a/tests/foreman/cli/test_globalparam.py +++ b/tests/foreman/cli/test_globalparam.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Parameters :Team: Rocket -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ from functools import partial diff --git a/tests/foreman/cli/test_hammer.py b/tests/foreman/cli/test_hammer.py index 86693a56e82..a5f7509cb25 100644 --- a/tests/foreman/cli/test_hammer.py +++ b/tests/foreman/cli/test_hammer.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Hammer :Team: Endeavour -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ import io import json diff --git a/tests/foreman/cli/test_host.py b/tests/foreman/cli/test_host.py index e94ea588187..65f8264427c 100644 --- a/tests/foreman/cli/test_host.py +++ b/tests/foreman/cli/test_host.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from random import choice import re @@ -574,8 +569,6 @@ def test_positive_katello_and_openscap_loaded(target_sat): and foreman_openscap are available in help message (note: help is generated dynamically based on apipie cache) - :CaseLevel: System - :customerscenario: true :CaseImportance: Medium @@ -603,7 +596,6 @@ def test_positive_register_with_no_ak( :parametrized: yes - :CaseLevel: System """ rhel7_contenthost.install_katello_ca(target_sat) rhel7_contenthost.register_contenthost( @@ -624,7 +616,6 @@ def test_negative_register_twice(module_ak_with_cv, module_org, rhel7_contenthos :parametrized: yes - :CaseLevel: System """ rhel7_contenthost.install_katello_ca(target_sat) rhel7_contenthost.register_contenthost(module_org.label, module_ak_with_cv.name) @@ -652,8 +643,6 @@ def test_positive_list_and_unregister( Unlike content host, host has not disappeared from list of hosts after unregistering. :parametrized: yes - - :CaseLevel: System """ rhel7_contenthost.install_katello_ca(target_sat) rhel7_contenthost.register_contenthost(module_org.label, module_ak_with_cv.name) @@ -682,8 +671,6 @@ def test_positive_list_by_last_checkin( :BZ: 1285992 :parametrized: yes - - :CaseLevel: System """ rhel7_contenthost.install_katello_ca(target_sat) rhel7_contenthost.register_contenthost( @@ -710,8 +697,6 @@ def test_positive_list_infrastructure_hosts( :expectedresults: Infrastructure hosts are listed :parametrized: yes - - :CaseLevel: System """ rhel7_contenthost.install_katello_ca(target_sat) rhel7_contenthost.register_contenthost( @@ -747,8 +732,6 @@ def test_positive_create_inherit_lce_cv( :expectedresults: Host's lifecycle environment and content view match the ones specified in hostgroup - :CaseLevel: Integration - :BZ: 1391656 """ hostgroup = target_sat.api.HostGroup( @@ -776,8 +759,6 @@ def test_positive_create_inherit_nested_hostgroup(target_sat): :expectedresults: Host created successfully using host group title - :CaseLevel: System - :customerscenario: true :BZ: 1436162 @@ -838,8 +819,6 @@ def test_positive_list_with_nested_hostgroup(target_sat): nested host groups names in its hostgroup parameter :BZ: 1427554, 1955421 - - :CaseLevel: System """ options = target_sat.api.Host() options.create_missing() @@ -915,9 +894,7 @@ def test_negative_create_with_incompatible_pxe_loader(): 2. Files not deployed on TFTP 3. Host not created - :CaseAutomation: NotAutomated - - :CaseLevel: System + :CaseAutomation: NotAutomated """ @@ -1031,8 +1008,6 @@ def test_negative_update_arch(function_host, module_architecture, target_sat): :id: a86524da-8caf-472b-9a3d-17a4385c3a18 :expectedresults: A host is not updated - - :CaseLevel: Integration """ with pytest.raises(CLIReturnCodeError): target_sat.cli.Host.update( @@ -1051,8 +1026,6 @@ def test_negative_update_os(target_sat, function_host, module_architecture): :id: ff13d2af-e54a-4daf-a24d-7ec930b4fbbe :expectedresults: A host is not updated - - :CaseLevel: Integration """ p_table = function_host['operating-system']['partition-table'] p_table = target_sat.api.PartitionTable().search(query={'search': f'name="{p_table}"'})[0] @@ -1082,7 +1055,7 @@ def test_hammer_host_info_output(target_sat, module_user): :id: 03468516-0ebb-11eb-8ad8-0c7a158cbff4 - :Steps: + :steps: 1. Update the host with any owner 2. Get host info by running `hammer host info` 3. Create new user and update his location and organization based on the hosts @@ -1330,8 +1303,6 @@ def test_positive_set_multi_line_and_with_spaces_parameter_value(function_host, from yaml format :BZ: 1315282 - - :CaseLevel: Integration """ param_name = gen_string('alpha').lower() # long string that should be escaped and affected by line break with @@ -1399,9 +1370,7 @@ def test_positive_provision_baremetal_with_bios_syslinux(): 6. GRUB config changes the boot order (boot local first) 7. Hosts boots straight to RHEL after reboot (step #4) - :CaseAutomation: NotAutomated - - :CaseLevel: System + :CaseAutomation: NotAutomated """ @@ -1437,9 +1406,7 @@ def test_positive_provision_baremetal_with_uefi_syslinux(): 6. GRUB config changes the boot order (boot local first) 7. Hosts boots straight to RHEL after reboot (step #4) - :CaseAutomation: NotAutomated - - :CaseLevel: System + :CaseAutomation: NotAutomated """ @@ -1478,9 +1445,7 @@ def test_positive_provision_baremetal_with_uefi_grub(): 7. Hosts boots straight to RHEL after reboot (step #4) - :CaseAutomation: NotAutomated - - :CaseLevel: System + :CaseAutomation: NotAutomated """ @@ -1521,9 +1486,7 @@ def test_positive_provision_baremetal_with_uefi_grub2(): 7. Hosts boots straight to RHEL after reboot (step #4) - :CaseAutomation: NotAutomated - - :CaseLevel: System + :CaseAutomation: NotAutomated """ @@ -1556,9 +1519,7 @@ def test_positive_provision_baremetal_with_uefi_secureboot(): :expectedresults: Host is provisioned - :CaseAutomation: NotAutomated - - :CaseLevel: System + :CaseAutomation: NotAutomated """ @@ -1648,8 +1609,6 @@ def test_positive_report_package_installed_removed( :BZ: 1463809 :parametrized: yes - - :CaseLevel: System """ client = katello_host_tools_host host_info = target_sat.cli.Host.info({'name': client.hostname}) @@ -1694,8 +1653,6 @@ def test_positive_package_applicability(katello_host_tools_host, setup_custom_re :BZ: 1463809 :parametrized: yes - - :CaseLevel: System """ client = katello_host_tools_host host_info = target_sat.cli.Host.info({'name': client.hostname}) @@ -1757,8 +1714,6 @@ def test_positive_erratum_applicability( :BZ: 1463809,1740790 :parametrized: yes - - :CaseLevel: System """ client = katello_host_tools_host host_info = target_sat.cli.Host.info({'name': client.hostname}) @@ -1812,8 +1767,6 @@ def test_positive_apply_security_erratum(katello_host_tools_host, setup_custom_r :expectedresults: erratum is recognized by the `yum update --security` command on client - :CaseLevel: System - :customerscenario: true :BZ: 1420671 @@ -1852,8 +1805,6 @@ def test_positive_install_package_via_rex( :expectedresults: Package was installed - :CaseLevel: System - :parametrized: yes """ client = katello_host_tools_host @@ -1916,8 +1867,6 @@ def test_positive_register( :expectedresults: host successfully registered :parametrized: yes - - :CaseLevel: System """ hosts = target_sat.cli.Host.list( { @@ -1980,8 +1929,6 @@ def test_positive_attach( enabled, and repository package installed :parametrized: yes - - :CaseLevel: System """ # create an activation key without subscriptions # register the client host @@ -2037,8 +1984,6 @@ def test_positive_attach_with_lce( repository enabled, and repository package installed :parametrized: yes - - :CaseLevel: System """ host_subscription_client.register_contenthost( module_org.name, @@ -2076,8 +2021,6 @@ def test_negative_without_attach( :expectedresults: repository list is empty :parametrized: yes - - :CaseLevel: System """ target_sat.cli.Host.subscription_register( { @@ -2115,8 +2058,6 @@ def test_negative_without_attach_with_lce( :expectedresults: repository not enabled on host :parametrized: yes - - :CaseLevel: System """ content_view = target_sat.api.ContentView(organization=function_org).create() ak = target_sat.api.ActivationKey( @@ -2178,8 +2119,6 @@ def test_positive_remove( :expectedresults: subscription successfully removed from host :parametrized: yes - - :CaseLevel: System """ target_sat.cli.Host.subscription_register( { @@ -2253,8 +2192,6 @@ def test_positive_auto_attach( repository enabled, and repository package installed :parametrized: yes - - :CaseLevel: System """ target_sat.cli.Host.subscription_register( { @@ -2289,8 +2226,6 @@ def test_positive_unregister_host_subscription( :expectedresults: host subscription is unregistered :parametrized: yes - - :CaseLevel: System """ # register the host client host_subscription_client.register_contenthost( @@ -2347,8 +2282,6 @@ def test_syspurpose_end_to_end( :CaseImportance: Critical :parametrized: yes - - :CaseLevel: System """ # Create an activation key with test values purpose_addons = "test-addon1, test-addon2" @@ -2608,8 +2541,6 @@ def test_positive_list_scparams( :expectedresults: Overridden sc-param from puppet class are listed - - :CaseLevel: Integration """ update_smart_proxy(session_puppet_enabled_sat, module_puppet_loc, session_puppet_enabled_proxy) # Create hostgroup with associated puppet class diff --git a/tests/foreman/cli/test_hostcollection.py b/tests/foreman/cli/test_hostcollection.py index 91bf5c4f563..ce3426030b5 100644 --- a/tests/foreman/cli/test_hostcollection.py +++ b/tests/foreman/cli/test_hostcollection.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: HostCollections :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from broker import Broker from fauxfactory import gen_string @@ -224,8 +219,6 @@ def test_positive_list_by_org_id(module_org, module_target_sat): :id: afbe077a-0de1-432c-a0c4-082129aab92e :expectedresults: Only host-collection within specific org is listed - - :CaseLevel: Integration """ # Create two host collections within different organizations module_target_sat.cli_factory.make_host_collection({'organization-id': module_org.id}) @@ -253,8 +246,6 @@ def test_positive_host_collection_host_pagination(module_org, module_target_sat) :expectedresults: Number of host per page follows per_page configuration restriction - - :CaseLevel: Integration """ host_collection = module_target_sat.cli_factory.make_host_collection( {'organization-id': module_org.id} @@ -287,8 +278,6 @@ def test_positive_copy_by_id(module_org, module_target_sat): :expectedresults: Host collection is cloned successfully :BZ: 1328925 - - :CaseLevel: Integration """ host_collection = module_target_sat.cli_factory.make_host_collection( {'name': gen_string('alpha', 15), 'organization-id': module_org.id} @@ -311,8 +300,6 @@ def test_positive_register_host_ak_with_host_collection(module_org, module_ak_wi :expectedresults: Host successfully registered and listed in host collection :BZ: 1385814 - - :CaseLevel: System """ host_info = _make_fake_host_helper(module_org, target_sat) diff --git a/tests/foreman/cli/test_hostgroup.py b/tests/foreman/cli/test_hostgroup.py index 6408120af2b..c42356a4478 100644 --- a/tests/foreman/cli/test_hostgroup.py +++ b/tests/foreman/cli/test_hostgroup.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: HostGroup :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_integer from nailgun import entities @@ -115,8 +110,6 @@ def test_positive_create_with_multiple_entities_and_delete( :BZ: 1395254, 1313056 - :CaseLevel: Integration - :CaseImportance: Critical """ with session_puppet_enabled_sat: @@ -214,8 +207,6 @@ def test_negative_create_with_content_source(module_org, module_target_sat): :BZ: 1260697 :expectedresults: Hostgroup was not created - - :CaseLevel: Integration """ with pytest.raises(CLIFactoryError): module_target_sat.cli_factory.hostgroup( @@ -247,8 +238,6 @@ def test_positive_update_hostgroup_with_puppet( :expectedresults: Hostgroup was successfully updated with new content source, name and puppet classes - - :CaseLevel: Integration """ with session_puppet_enabled_sat as puppet_sat: hostgroup = puppet_sat.cli_factory.hostgroup( @@ -302,8 +291,6 @@ def test_positive_update_hostgroup( :expectedresults: Hostgroup was successfully updated with new content source and name - - :CaseLevel: Integration """ hostgroup = module_target_sat.cli_factory.hostgroup( { @@ -337,8 +324,6 @@ def test_negative_update_content_source(hostgroup, content_source, module_target :expectedresults: Host group was not updated. Content source remains the same as it was before update - - :CaseLevel: Integration """ with pytest.raises(CLIReturnCodeError): module_target_sat.cli.HostGroup.update( @@ -370,8 +355,6 @@ def test_negative_delete_by_id(module_target_sat): :id: 047c9f1a-4dd6-4fdc-b7ed-37cc725c68d3 :expectedresults: HostGroup is not deleted - - :CaseLevel: Integration """ entity_id = invalid_id_list()[0] with pytest.raises(CLIReturnCodeError): @@ -390,7 +373,6 @@ def test_positive_created_nested_hostgroup(module_org, module_target_sat): :customerscenario: true :CaseImportance: Low - """ parent_hg = module_target_sat.cli_factory.hostgroup({'organization-ids': module_org.id}) nested = module_target_sat.cli_factory.hostgroup( @@ -412,7 +394,7 @@ def test_positive_nested_hostgroup_info(): :customerscenario: true - :Steps: + :steps: 1. Create parent hostgroup and nested hostgroup, with puppet environment, classes, and parameters on each. diff --git a/tests/foreman/cli/test_http_proxy.py b/tests/foreman/cli/test_http_proxy.py index c43870fd162..00c1dae59c6 100644 --- a/tests/foreman/cli/test_http_proxy.py +++ b/tests/foreman/cli/test_http_proxy.py @@ -2,19 +2,14 @@ :Requirement: HttpProxy -:CaseLevel: Acceptance - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: High :CaseAutomation: Automated -:Upstream: No """ from fauxfactory import gen_integer, gen_string, gen_url import pytest @@ -99,7 +94,7 @@ def test_insights_client_registration_with_http_proxy(): :customerscenario: true - :Steps: + :steps: 1. Create HTTP Proxy. 2. Set created proxy as "Default HTTP Proxy" in settings. 3. Edit /etc/resolv.conf and comment out all entries so that @@ -130,7 +125,7 @@ def test_positive_set_content_default_http_proxy(block_fake_repo_access, target_ :id: c12868eb-98f1-4763-a168-281ac44d9ff5 - :Steps: + :steps: 1. Create a product with repo. 2. Create an un-authenticated proxy. 3. Set the proxy to be the global default proxy. @@ -139,7 +134,6 @@ def test_positive_set_content_default_http_proxy(block_fake_repo_access, target_ :expectedresults: Repo is synced :CaseImportance: High - """ org = target_sat.api.Organization().create() proxy_name = gen_string('alpha', 15) @@ -184,7 +178,7 @@ def test_positive_environment_variable_unset_set(): :customerscenario: true - :Steps: + :steps: 1. Export any environment variable from [http_proxy, https_proxy, ssl_cert_file, HTTP_PROXY, HTTPS_PROXY, SSL_CERT_FILE] 2. satellite-installer @@ -195,7 +189,6 @@ def test_positive_environment_variable_unset_set(): :CaseImportance: High :CaseAutomation: NotAutomated - """ diff --git a/tests/foreman/cli/test_installer.py b/tests/foreman/cli/test_installer.py index 52f4887eed2..b7601ccde84 100644 --- a/tests/foreman/cli/test_installer.py +++ b/tests/foreman/cli/test_installer.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Installation :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/foreman/cli/test_jobtemplate.py b/tests/foreman/cli/test_jobtemplate.py index 7d52d3486b8..66553d2c54d 100644 --- a/tests/foreman/cli/test_jobtemplate.py +++ b/tests/foreman/cli/test_jobtemplate.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: RemoteExecution :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -158,7 +153,6 @@ def test_positive_view_dump(module_org, module_target_sat): :id: 25fcfcaa-fc4c-425e-919e-330e36195c4a :expectedresults: Verify no errors are thrown - """ template_name = gen_string('alpha', 7) module_target_sat.cli_factory.job_template( diff --git a/tests/foreman/cli/test_ldapauthsource.py b/tests/foreman/cli/test_ldapauthsource.py index da2849e5ebb..0c85354311f 100644 --- a/tests/foreman/cli/test_ldapauthsource.py +++ b/tests/foreman/cli/test_ldapauthsource.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: LDAP :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string from nailgun import entities diff --git a/tests/foreman/cli/test_leapp_client.py b/tests/foreman/cli/test_leapp_client.py index 7ce39b648d2..636dfc4d111 100644 --- a/tests/foreman/cli/test_leapp_client.py +++ b/tests/foreman/cli/test_leapp_client.py @@ -2,19 +2,14 @@ :Requirement: leapp -:CaseLevel: Integration - :CaseComponent: Leappintegration :Team: Rocket -:TestType: Functional - :CaseImportance: High :CaseAutomation: Automated -:Upstream: No """ from broker import Broker import pytest @@ -229,7 +224,7 @@ def test_leapp_upgrade_rhel( :id: 8eccc689-3bea-4182-84f3-c121e95d54c3 - :Steps: + :steps: 1. Import a subscription manifest and enable, sync source & target repositories 2. Create LCE, Create CV, add repositories to it, publish and promote CV, Create AK, etc. 3. Register content host with AK diff --git a/tests/foreman/cli/test_lifecycleenvironment.py b/tests/foreman/cli/test_lifecycleenvironment.py index 93001a70fe8..75bf12c681b 100644 --- a/tests/foreman/cli/test_lifecycleenvironment.py +++ b/tests/foreman/cli/test_lifecycleenvironment.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: LifecycleEnvironments :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from math import ceil diff --git a/tests/foreman/cli/test_location.py b/tests/foreman/cli/test_location.py index ca1169d1734..c5ca06a7032 100644 --- a/tests/foreman/cli/test_location.py +++ b/tests/foreman/cli/test_location.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: OrganizationsandLocations :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -281,7 +276,6 @@ def test_positive_add_and_remove_capsule(self, request, target_sat): :BZ: 1398695 - :CaseLevel: Integration """ location = _location(request, target_sat) proxy = _proxy(request, target_sat) diff --git a/tests/foreman/cli/test_logging.py b/tests/foreman/cli/test_logging.py index 61ead1bee0e..8d315b3e59c 100644 --- a/tests/foreman/cli/test_logging.py +++ b/tests/foreman/cli/test_logging.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Logging :Team: Rocket -:TestType: Functional - :CaseImportance: Medium -:Upstream: No """ import re @@ -223,8 +218,6 @@ def test_positive_logging_from_pulp3(module_org, target_sat): :id: 8d5718e6-3442-47d6-b541-0aa78d007e8b - :CaseLevel: Component - :CaseImportance: High """ source_log = '/var/log/foreman/production.log' diff --git a/tests/foreman/cli/test_medium.py b/tests/foreman/cli/test_medium.py index 5ded3225e84..26017b415ab 100644 --- a/tests/foreman/cli/test_medium.py +++ b/tests/foreman/cli/test_medium.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_alphanumeric import pytest @@ -93,7 +88,6 @@ def test_positive_remove_os(self, module_target_sat): :expectedresults: Operating system removed - :CaseLevel: Integration """ medium = module_target_sat.cli_factory.make_medium() os = module_target_sat.cli_factory.make_os() diff --git a/tests/foreman/cli/test_model.py b/tests/foreman/cli/test_model.py index a627a3158b7..8fc51be9f62 100644 --- a/tests/foreman/cli/test_model.py +++ b/tests/foreman/cli/test_model.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest diff --git a/tests/foreman/cli/test_operatingsystem.py b/tests/foreman/cli/test_operatingsystem.py index 7b5e0bd60a5..48ed8af8099 100644 --- a/tests/foreman/cli/test_operatingsystem.py +++ b/tests/foreman/cli/test_operatingsystem.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Provisioning :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_alphanumeric, gen_string import pytest @@ -223,7 +218,6 @@ def test_positive_add_arch(self, target_sat): :expectedresults: Architecture is added to Operating System - :CaseLevel: Integration """ architecture = target_sat.cli_factory.make_architecture() os = target_sat.cli_factory.make_os() @@ -243,7 +237,6 @@ def test_positive_add_template(self, target_sat): :expectedresults: Provisioning template is added to Operating System - :CaseLevel: Integration """ template = target_sat.cli_factory.make_template() os = target_sat.cli_factory.make_os() @@ -265,7 +258,6 @@ def test_positive_add_ptable(self, target_sat): :expectedresults: Partition table is added to Operating System - :CaseLevel: Integration """ # Create a partition table. ptable_name = target_sat.cli_factory.make_partition_table()['name'] diff --git a/tests/foreman/cli/test_organization.py b/tests/foreman/cli/test_organization.py index 3990ddd56e9..71e4c30f0e7 100644 --- a/tests/foreman/cli/test_organization.py +++ b/tests/foreman/cli/test_organization.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: OrganizationsandLocations :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -171,8 +166,6 @@ def test_positive_add_and_remove_subnets(module_org, module_target_sat): :expectedresults: Subnets are handled as expected :BZ: 1395229 - - :CaseLevel: Integration """ subnets = [module_target_sat.cli_factory.make_subnet() for _ in range(0, 2)] module_target_sat.cli.Org.add_subnet({'name': module_org.name, 'subnet': subnets[0]['name']}) @@ -202,8 +195,6 @@ def test_positive_add_and_remove_users(module_org, module_target_sat): 4. create and delete admin user by id :BZ: 1395229 - - :CaseLevel: Integration """ user = module_target_sat.cli_factory.user() admin_user = module_target_sat.cli_factory.user({'admin': '1'}) @@ -249,8 +240,6 @@ def test_positive_add_and_remove_hostgroups(module_org, module_target_sat): :steps: 1. add and remove hostgroup by name 2. add and remove hostgroup by id - - :CaseLevel: Integration """ hostgroups = [module_target_sat.cli_factory.hostgroup() for _ in range(0, 2)] @@ -290,8 +279,6 @@ def test_positive_add_and_remove_compute_resources(module_org, module_target_sat :steps: 1. Add and remove compute resource by id 2. Add and remove compute resource by name - - :CaseLevel: Integration """ compute_resources = [ module_target_sat.cli_factory.compute_resource( @@ -338,8 +325,6 @@ def test_positive_add_and_remove_media(module_org, module_target_sat): :steps: 1. add and remove medium by id 2. add and remove medium by name - - :CaseLevel: Integration """ media = [module_target_sat.cli_factory.make_medium() for _ in range(0, 2)] module_target_sat.cli.Org.add_medium({'id': module_org.id, 'medium-id': media[0]['id']}) @@ -369,8 +354,6 @@ def test_positive_add_and_remove_templates(module_org, module_target_sat): :steps: 1. Add and remove template by id 2. Add and remove template by name - - :CaseLevel: Integration """ # create and remove templates by name name = list(valid_data_list().values())[0] @@ -427,8 +410,6 @@ def test_positive_add_and_remove_domains(module_org, module_target_sat): :steps: 1. Add and remove domain by name 2. Add and remove domain by id - - :CaseLevel: Integration """ domains = [module_target_sat.cli_factory.make_domain() for _ in range(0, 2)] module_target_sat.cli.Org.add_domain({'domain-id': domains[0]['id'], 'name': module_org.name}) @@ -455,8 +436,6 @@ def test_positive_add_and_remove_lce(module_org, module_target_sat): :steps: 1. create and add lce to org 2. remove lce from org - - :CaseLevel: Integration """ # Create a lifecycle environment. lc_env_name = module_target_sat.cli_factory.make_lifecycle_environment( @@ -487,8 +466,6 @@ def test_positive_add_and_remove_capsules(proxy, module_org, module_target_sat): :steps: 1. add and remove capsule by ip 2. add and remove capsule by name - - :CaseLevel: Integration """ module_target_sat.cli.Org.add_smart_proxy({'id': module_org.id, 'smart-proxy-id': proxy['id']}) org_info = module_target_sat.cli.Org.info({'name': module_org.name}) @@ -524,8 +501,6 @@ def test_positive_add_and_remove_locations(module_org, module_target_sat): :steps: 1. add and remove locations by name 2. add and remove locations by id - - :CaseLevel: Integration """ locations = [module_target_sat.cli_factory.make_location() for _ in range(0, 2)] module_target_sat.cli.Org.add_location( @@ -600,7 +575,6 @@ def test_negative_create_with_invalid_name(name, module_target_sat): :parametrized: yes :expectedresults: organization is not created - """ with pytest.raises(CLIFactoryError): module_target_sat.cli_factory.make_org( @@ -667,7 +641,6 @@ def test_negative_update_name(new_name, module_org, module_target_sat): :parametrized: yes :expectedresults: organization name is not updated - """ with pytest.raises(CLIReturnCodeError): module_target_sat.cli.Org.update({'id': module_org.id, 'new-name': new_name}) @@ -683,8 +656,6 @@ def test_positive_create_user_with_timezone(module_org, module_target_sat): :BZ: 1733269 - :CaseLevel: Integration - :CaseImportance: Medium :steps: @@ -693,7 +664,6 @@ def test_positive_create_user_with_timezone(module_org, module_target_sat): 3. Remove user from organization and validate :expectedresults: User created and removed successfully with valid timezone - """ users_timezones = [ 'Pacific Time (US & Canada)', diff --git a/tests/foreman/cli/test_oscap.py b/tests/foreman/cli/test_oscap.py index 7e4997226a3..f5f801af05b 100644 --- a/tests/foreman/cli/test_oscap.py +++ b/tests/foreman/cli/test_oscap.py @@ -2,19 +2,14 @@ :Requirement: Oscap -:CaseLevel: Acceptance - :CaseComponent: SCAPPlugin :Team: Endeavour -:TestType: Functional - :CaseImportance: High :CaseAutomation: Automated -:Upstream: No """ from fauxfactory import gen_string from nailgun import entities diff --git a/tests/foreman/cli/test_oscap_tailoringfiles.py b/tests/foreman/cli/test_oscap_tailoringfiles.py index 3f36bff3288..e95cfb2891a 100644 --- a/tests/foreman/cli/test_oscap_tailoringfiles.py +++ b/tests/foreman/cli/test_oscap_tailoringfiles.py @@ -2,19 +2,14 @@ :Requirement: tailoringfiles -:CaseLevel: Acceptance - :CaseComponent: SCAPPlugin :Team: Endeavour -:TestType: Functional - :CaseImportance: High :CaseAutomation: Automated -:Upstream: No """ from fauxfactory import gen_string import pytest diff --git a/tests/foreman/cli/test_ostreebranch.py b/tests/foreman/cli/test_ostreebranch.py index ccb35ea0bae..d768b3f2d70 100644 --- a/tests/foreman/cli/test_ostreebranch.py +++ b/tests/foreman/cli/test_ostreebranch.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import random @@ -94,7 +89,6 @@ def test_positive_list_by_repo_id( :id: 8cf1a973-031c-4c02-af14-0faba22ab60b :expectedresults: Ostree Branch List is displayed - """ branch = module_target_sat.cli.OstreeBranch.with_user(*ostree_user_credentials) @@ -139,7 +133,6 @@ def test_positive_list_by_cv_id(ostree_repo_with_user, ostree_user_credentials, :id: 3654f107-44ee-4af2-a9e4-f9fd8c68491e :expectedresults: Ostree Branch List is displayed - """ result = module_target_sat.cli.OstreeBranch.with_user(*ostree_user_credentials).list( {'content-view-id': ostree_repo_with_user['cv']['id']} diff --git a/tests/foreman/cli/test_partitiontable.py b/tests/foreman/cli/test_partitiontable.py index d32bd11bf03..35e52cbbe65 100644 --- a/tests/foreman/cli/test_partitiontable.py +++ b/tests/foreman/cli/test_partitiontable.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from random import randint @@ -135,7 +130,6 @@ def test_positive_add_remove_os_by_id(self, module_target_sat): :expectedresults: Operating system is added to partition table - :CaseLevel: Integration """ ptable = module_target_sat.cli_factory.make_partition_table() os = module_target_sat.cli_factory.make_os() @@ -160,7 +154,6 @@ def test_positive_add_remove_os_by_name(self, module_target_sat): :expectedresults: Operating system is added to partition table - :CaseLevel: Integration """ ptable = module_target_sat.cli_factory.make_partition_table() os = module_target_sat.cli_factory.make_os() diff --git a/tests/foreman/cli/test_ping.py b/tests/foreman/cli/test_ping.py index 68f6024372b..0a288143233 100644 --- a/tests/foreman/cli/test_ping.py +++ b/tests/foreman/cli/test_ping.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Hammer :Team: Endeavour -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ import pytest diff --git a/tests/foreman/cli/test_product.py b/tests/foreman/cli/test_product.py index 5a61c2dfb31..3d413209db3 100644 --- a/tests/foreman/cli/test_product.py +++ b/tests/foreman/cli/test_product.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_alphanumeric, gen_integer, gen_string, gen_url import pytest @@ -172,7 +167,6 @@ def test_product_list_with_default_settings(module_org, target_sat): :customerscenario: true :expectedresults: product/reporsitory list should work as expected. - """ org_id = str(module_org.id) default_product_name = gen_string('alpha') @@ -227,7 +221,7 @@ def test_positive_product_sync_state(module_org, module_target_sat): :customerscenario: true - :Steps: + :steps: 1. Sync a custom repository that fails. 2. Run `hammer product info --product-id `. 3. Successfully sync another repository under the same product. diff --git a/tests/foreman/cli/test_provisioning.py b/tests/foreman/cli/test_provisioning.py index 8e67bdcbb48..1c7799edc53 100644 --- a/tests/foreman/cli/test_provisioning.py +++ b/tests/foreman/cli/test_provisioning.py @@ -4,17 +4,12 @@ :CaseAutomation: NotAutomated -:CaseLevel: System - :CaseComponent: Provisioning :Team: Rocket -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ import pytest diff --git a/tests/foreman/cli/test_provisioningtemplate.py b/tests/foreman/cli/test_provisioningtemplate.py index 663aa64a1e2..59aabc2d2c4 100644 --- a/tests/foreman/cli/test_provisioningtemplate.py +++ b/tests/foreman/cli/test_provisioningtemplate.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ProvisioningTemplates :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import random from random import randint @@ -167,8 +162,6 @@ def test_positive_add_remove_os_by_id(module_target_sat, module_os_with_minor): :id: d9f481b3-9757-4208-b451-baf4792d4d70 :expectedresults: Operating system is added/removed from the template - - :CaseLevel: Integration """ os = module_os_with_minor os_string = f'{os.name} {os.major}.{os.minor}' @@ -212,8 +205,6 @@ def test_positive_clone(module_target_sat): :id: 27d69c1e-0d83-4b99-8a3c-4f1bdec3d261 :expectedresults: The template is cloned successfully - - :CaseLevel: Integration """ cloned_template_name = gen_string('alpha') template = module_target_sat.cli_factory.make_template() diff --git a/tests/foreman/cli/test_puppetclass.py b/tests/foreman/cli/test_puppetclass.py index 9d849ff0ff1..3a8b50856bb 100644 --- a/tests/foreman/cli/test_puppetclass.py +++ b/tests/foreman/cli/test_puppetclass.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Puppet :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/foreman/cli/test_realm.py b/tests/foreman/cli/test_realm.py index e488e150cc6..c05dc1291f8 100644 --- a/tests/foreman/cli/test_realm.py +++ b/tests/foreman/cli/test_realm.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Authentication :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import random diff --git a/tests/foreman/cli/test_registration.py b/tests/foreman/cli/test_registration.py index 439be5f12f0..65dd5b8cd30 100644 --- a/tests/foreman/cli/test_registration.py +++ b/tests/foreman/cli/test_registration.py @@ -2,8 +2,6 @@ :Requirement: Registration -:CaseLevel: Acceptance - :CaseComponent: Registration :CaseAutomation: Automated @@ -12,9 +10,6 @@ :Team: Rocket -:TestType: Functional - -:Upstream: No """ import pytest diff --git a/tests/foreman/cli/test_remoteexecution.py b/tests/foreman/cli/test_remoteexecution.py index b8bcdc0fffc..48f095870fc 100644 --- a/tests/foreman/cli/test_remoteexecution.py +++ b/tests/foreman/cli/test_remoteexecution.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: RemoteExecution :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from datetime import datetime, timedelta from time import sleep @@ -393,7 +388,7 @@ def test_positive_run_effective_user_job(self, rex_contenthost, target_sat): :id: a5fa20d8-c2bd-4bbf-a6dc-bf307b59dd8c - :Steps: + :steps: 0. Create a VM and register to SAT and prepare for REX (ssh key) @@ -407,8 +402,6 @@ def test_positive_run_effective_user_job(self, rex_contenthost, target_sat): :CaseAutomation: Automated - :CaseLevel: System - :parametrized: yes """ client = rex_contenthost @@ -448,7 +441,7 @@ def test_positive_run_reccuring_job(self, rex_contenthost, target_sat): :id: 49b0d31d-58f9-47f1-aa5d-561a1dcb0d66 - :Steps: + :steps: 0. Create a VM and register to SAT and prepare for REX (ssh key) @@ -460,8 +453,6 @@ def test_positive_run_reccuring_job(self, rex_contenthost, target_sat): :CaseAutomation: Automated - :CaseLevel: System - :parametrized: yes """ client = rex_contenthost @@ -488,7 +479,7 @@ def test_positive_run_concurrent_jobs(self, registered_hosts, target_sat): :id: ad0f108c-03f2-49c7-8732-b1056570567b - :Steps: + :steps: 0. Create 2 hosts, disable foreman_tasks_proxy_batch_trigger @@ -500,8 +491,6 @@ def test_positive_run_concurrent_jobs(self, registered_hosts, target_sat): :customerscenario: true - :CaseLevel: System - :BZ: 1817320 :parametrized: yes @@ -547,7 +536,7 @@ def test_positive_run_packages_and_services_job(self, rex_contenthost, module_or :id: 47ed82fb-77ca-43d6-a52e-f62bae5d3a42 - :Steps: + :steps: 0. Create a VM and register to SAT and prepare for REX (ssh key) @@ -563,8 +552,6 @@ def test_positive_run_packages_and_services_job(self, rex_contenthost, module_or :CaseAutomation: Automated - :CaseLevel: System - :bz: 1872688, 1811166 :CaseImportance: Critical @@ -642,7 +629,7 @@ def test_positive_install_ansible_collection( ): """Test whether Ansible collection can be installed via REX - :Steps: + :steps: 1. Upload a manifest. 2. Enable and sync Ansible repository. 3. Register content host to Satellite. diff --git a/tests/foreman/cli/test_report.py b/tests/foreman/cli/test_report.py index 113b129641b..5d5856b11e6 100644 --- a/tests/foreman/cli/test_report.py +++ b/tests/foreman/cli/test_report.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Puppet :Team: Rocket -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ import random diff --git a/tests/foreman/cli/test_reporttemplates.py b/tests/foreman/cli/test_reporttemplates.py index 8fa07fc85ee..9c502fdc524 100644 --- a/tests/foreman/cli/test_reporttemplates.py +++ b/tests/foreman/cli/test_reporttemplates.py @@ -3,17 +3,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Reporting :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from broker import Broker from fauxfactory import gen_alpha @@ -120,7 +115,6 @@ def test_positive_report_help(module_target_sat): :expectedresults: report-templates command is included in help, report-templates command details are displayed, report-templates create command details are displayed - """ command_output = module_target_sat.cli.Base().execute('--help') assert 'report-template' in command_output @@ -298,7 +292,6 @@ def test_positive_report_add_userinput(module_target_sat): 1. hammer template-input create ... :expectedresults: User input is assigned to the report template - """ name = gen_alpha() report_template = module_target_sat.cli_factory.report_template({'name': name}) @@ -441,7 +434,6 @@ def test_positive_applied_errata(): :expectedresults: 1. A report is generated with all applied errata listed 2,3. A report is generated asynchronously - """ diff --git a/tests/foreman/cli/test_repository.py b/tests/foreman/cli/test_repository.py index c7e03fdbba8..ef21b476811 100644 --- a/tests/foreman/cli/test_repository.py +++ b/tests/foreman/cli/test_repository.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from random import choice from string import punctuation @@ -729,8 +724,6 @@ def test_positive_synchronize_yum_repo(self, repo_options, repo, target_sat): :expectedresults: Repository is created and synced - :CaseLevel: Integration - :CaseImportance: Critical """ # Repo is not yet synced @@ -756,8 +749,6 @@ def test_positive_synchronize_file_repo(self, repo_options, repo, target_sat): :expectedresults: Repository is created and synced - :CaseLevel: Integration - :CaseImportance: Critical """ # Assertion that repo is not yet synced @@ -798,7 +789,6 @@ def test_positive_synchronize_auth_yum_repo(self, repo, target_sat): :BZ: 1328092 - :CaseLevel: Integration """ # Assertion that repo is not yet synced assert repo['sync']['status'] == 'Not Synced' @@ -839,7 +829,6 @@ def test_negative_synchronize_auth_yum_repo(self, repo, target_sat): :BZ: 1405503, 1453118 - :CaseLevel: Integration """ # Try to synchronize it repo_sync = target_sat.cli.Repository.synchronize({'id': repo['id'], 'async': True}) @@ -1086,7 +1075,6 @@ def test_positive_resynchronize_rpm_repo(self, repo, target_sat): :BZ: 1459845, 1459874, 1318004 - :CaseLevel: Integration """ target_sat.cli.Repository.synchronize({'id': repo['id']}) repo = target_sat.cli.Repository.info({'id': repo['id']}) @@ -1143,7 +1131,7 @@ def test_mirror_on_sync_removes_rpm(self, module_org, repo, repo_options_2, modu 3. Delete one package from repo 1. 4. Sync the second repo (repo 2) from the first repo (repo 1). - :Steps: + :steps: 1. Check that the package deleted from repo 1 was removed from repo 2. :expectedresults: A package removed from repo 1 is removed from repo 2 when synced. @@ -1215,8 +1203,6 @@ def test_positive_synchronize_rpm_repo_ignore_SRPM( :BZ: 1591358 - :CaseLevel: Integration - """ target_sat.cli.Repository.synchronize({'id': repo['id']}) repo = target_sat.cli.Repository.info({'id': repo['id']}) @@ -1645,7 +1631,7 @@ def test_negative_restricted_user_cv_add_repository(self, module_org, repo, modu :BZ: 1436209,1410916 - :Steps: + :steps: 1. Setup a restricted user with permissions that filter the products with names like Test_* or "rhel7*" 2. Create a content view @@ -1661,7 +1647,6 @@ def test_negative_restricted_user_cv_add_repository(self, module_org, repo, modu view, assert that the restricted user still cannot view the product repository. - :CaseLevel: Integration """ required_permissions = { 'Katello::Product': ( @@ -1944,7 +1929,7 @@ def test_positive_create_get_update_delete_module_streams( :Setup: 1. valid yum repo with Module Streams. - :Steps: + :steps: 1. Create Yum Repository with url contain module-streams 2. Initialize synchronization 3. Another Repository with same Url @@ -2013,7 +1998,7 @@ def test_module_stream_list_validation( :Setup: 1. valid yum repo with Module Streams. - :Steps: + :steps: 1. Create Yum Repositories with url contain module-streams and Products 2. Initialize synchronization 3. Verify the module-stream list with various inputs options @@ -2051,7 +2036,7 @@ def test_module_stream_info_validation(self, repo, module_target_sat): :Setup: 1. valid yum repo with Module Streams. - :Steps: + :steps: 1. Create Yum Repositories with url contain module-streams 2. Initialize synchronization 3. Verify the module-stream info with various inputs options @@ -2085,7 +2070,7 @@ def test_negative_update_red_hat_repo(self, module_manifest_org, module_target_s :BZ: 1756951, 2002653 - :Steps: + :steps: 1. Import manifest and enable a Red Hat repository. 2. Attempt to update the Red Hat repository: # hammer repository update --id --url http://example.com/repo @@ -2323,9 +2308,8 @@ def test_positive_sync_third_party_repo(self, repo_options, module_target_sat): # :parametrized: yes # # :expectedresults: Ostree repository is created and synced -# -# :CaseLevel: Integration -# + + # :BZ: 1625783 # """ # # Synchronize it @@ -2510,8 +2494,6 @@ def test_positive_sync_ansible_collection(self, repo, module_target_sat): :expectedresults: All content synced successfully - :CaseLevel: Integration - :CaseImportance: High :parametrized: yes @@ -2544,8 +2526,6 @@ def test_positive_export_ansible_collection(self, repo, module_org, target_sat): :expectedresults: All content exported and imported successfully - :CaseLevel: Integration - :CaseImportance: High """ @@ -2604,8 +2584,6 @@ def test_positive_sync_ansible_collection_from_satellite(self, repo, target_sat) :expectedresults: All content synced successfully - :CaseLevel: Integration - :CaseImportance: High """ @@ -2777,11 +2755,9 @@ def test_positive_git_local_create(self): :id: 89211cd5-82b8-4391-b729-a7502e57f824 - :CaseLevel: Integration - :Setup: Assure local GIT puppet has been created and found by pulp - :Steps: Create link to local puppet mirror via cli + :steps: Create link to local puppet mirror via cli :expectedresults: Content source containing local GIT puppet mirror content is created @@ -2796,11 +2772,9 @@ def test_positive_git_local_update(self): :id: 341f40f2-3501-4754-9acf-7cda1a61f7db - :CaseLevel: Integration - :Setup: Assure local GIT puppet has been created and found by pulp - :Steps: Modify details for existing puppet repo (name, etc.) via cli + :steps: Modify details for existing puppet repo (name, etc.) via cli :expectedresults: Content source containing local GIT puppet mirror content is modified @@ -2816,11 +2790,9 @@ def test_positive_git_local_delete(self): :id: a243f5bb-5186-41b3-8e8a-07d5cc784ccd - :CaseLevel: Integration - :Setup: Assure local GIT puppet has been created and found by pulp - :Steps: Delete link to local puppet mirror via cli + :steps: Delete link to local puppet mirror via cli :expectedresults: Content source containing local GIT puppet mirror content no longer exists/is available. @@ -2835,11 +2807,9 @@ def test_positive_git_remote_create(self): :id: 8582529f-3112-4b49-8d8f-f2bbf7dceca7 - :CaseLevel: Integration - :Setup: Assure remote GIT puppet has been created and found by pulp - :Steps: Create link to local puppet mirror via cli + :steps: Create link to local puppet mirror via cli :expectedresults: Content source containing remote GIT puppet mirror content is created @@ -2854,11 +2824,9 @@ def test_positive_git_remote_update(self): :id: 582c50b3-3b90-4244-b694-97642b1b13a9 - :CaseLevel: Integration - :Setup: Assure remote GIT puppet has been created and found by pulp - :Steps: modify details for existing puppet repo (name, etc.) via cli + :steps: modify details for existing puppet repo (name, etc.) via cli :expectedresults: Content source containing remote GIT puppet mirror content is modified @@ -2874,11 +2842,9 @@ def test_positive_git_remote_delete(self): :id: 0a23f969-b202-4c6c-b12e-f651a0b7d049 - :CaseLevel: Integration - :Setup: Assure remote GIT puppet has been created and found by pulp - :Steps: Delete link to remote puppet mirror via cli + :steps: Delete link to remote puppet mirror via cli :expectedresults: Content source containing remote GIT puppet mirror content no longer exists/is available. @@ -2893,11 +2859,9 @@ def test_positive_git_sync(self): :id: a46c16bd-0986-48db-8e62-aeb3907ba4d2 - :CaseLevel: Integration - :Setup: git mirror (local or remote) exists as a content source - :Steps: Attempt to sync content from mirror via cli + :steps: Attempt to sync content from mirror via cli :expectedresults: Content is pulled down without error @@ -2914,11 +2878,9 @@ def test_positive_git_sync_schedule(self): :id: 0d58d180-9836-4524-b608-66b67f9cab12 - :CaseLevel: Integration - :Setup: git mirror (local or remote) exists as a content source - :Steps: Attempt to create a scheduled sync content from mirror, via cli + :steps: Attempt to create a scheduled sync content from mirror, via cli :expectedresults: Content is pulled down without error on expected schedule @@ -2933,11 +2895,9 @@ def test_positive_git_view_content(self): :id: 02f06092-dd6c-49fa-be9f-831e52476e41 - :CaseLevel: Integration - :Setup: git mirror (local or remote) exists as a content source - :Steps: Attempt to list contents of repo via cli + :steps: Attempt to list contents of repo via cli :expectedresults: Spot-checked items (filenames, dates, perhaps checksums?) are correct. @@ -2962,7 +2922,7 @@ def test_positive_upload_file_to_file_repo(self, repo_options, repo, target_sat) :parametrized: yes - :Steps: + :steps: 1. Create a File Repository 2. Upload an arbitrary file to it @@ -3003,7 +2963,7 @@ def test_positive_file_permissions(self): 1. Create a File Repository 2. Upload an arbitrary file to it - :Steps: Retrieve file permissions from File Repository + :steps: Retrieve file permissions from File Repository :expectedresults: uploaded file permissions are kept after upload @@ -3030,7 +2990,7 @@ def test_positive_remove_file(self, repo, target_sat): 1. Create a File Repository 2. Upload an arbitrary file to it - :Steps: Remove a file from File Repository + :steps: Remove a file from File Repository :expectedresults: file is not listed under File Repository after removal @@ -3086,7 +3046,7 @@ def test_positive_remote_directory_sync(self, repo, module_target_sat): 1. Create a directory to be synced with a pulp manifest on its root 2. Make the directory available through http - :Steps: + :steps: 1. Create a File Repository with url pointing to http url created on setup 2. Initialize synchronization @@ -3116,7 +3076,7 @@ def test_positive_file_repo_local_directory_sync(self, repo, target_sat): 1. Create a directory to be synced with a pulp manifest on its root locally (on the Satellite/Foreman host) - :Steps: + :steps: 1. Create a File Repository with url pointing to local url created on setup 2. Initialize synchronization @@ -3154,7 +3114,7 @@ def test_positive_symlinks_sync(self, repo, target_sat): locally (on the Satellite/Foreman host) 2. Make sure it contains symlinks - :Steps: + :steps: 1. Create a File Repository with url pointing to local url created on setup 2. Initialize synchronization @@ -3196,7 +3156,7 @@ def test_file_repo_contains_only_newer_file(self, repo_options, repo, target_sat 4. Add some text keyword to the file locally. 5. Upload new version of file. - :Steps: + :steps: 1. Check that the repo contains only the new version of the file :expectedresults: The file is not duplicated and only the latest version of the file @@ -3259,7 +3219,7 @@ def test_copy_package_group_between_repos(): 2. Create another product and create a yum repo (repo 2) 3. Select the package group from repo 1 and sync it to repo 2 - :Steps: + :steps: Assert the list of package in repo 2 matches the group list from repo 1 :CaseAutomation: NotAutomated @@ -3284,7 +3244,7 @@ def test_include_and_exclude_content_units(): 4. Select a package and exclude its dependencies 5. Copy packages from repo 1 to repo 2 - :Steps: + :steps: Assert the list of packages in repo 2 matches the packages selected in repo 1, including only those dependencies expected. @@ -3311,7 +3271,7 @@ def test_copy_erratum_and_RPMs_within_a_date_range(): 5. Copy filtered list of items from repo 1 to repo 2 6. Repeat using errata in place of RPMs - :Steps: + :steps: Assert the list of packages or errata in repo 2 matches those selected and filtered in repo 1, including those dependencies expected. diff --git a/tests/foreman/cli/test_repository_set.py b/tests/foreman/cli/test_repository_set.py index 317f19e33d5..092034c6dc8 100644 --- a/tests/foreman/cli/test_repository_set.py +++ b/tests/foreman/cli/test_repository_set.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/foreman/cli/test_rhcloud_insights.py b/tests/foreman/cli/test_rhcloud_insights.py index e8cf08abe50..3ab4a27b81e 100644 --- a/tests/foreman/cli/test_rhcloud_insights.py +++ b/tests/foreman/cli/test_rhcloud_insights.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: System - :CaseComponent: RHCloud :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from broker import Broker import pytest diff --git a/tests/foreman/cli/test_rhcloud_inventory.py b/tests/foreman/cli/test_rhcloud_inventory.py index be022e4f6b3..1da1e78f865 100644 --- a/tests/foreman/cli/test_rhcloud_inventory.py +++ b/tests/foreman/cli/test_rhcloud_inventory.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: System - :CaseComponent: RHCloud :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from datetime import datetime import time @@ -41,7 +36,7 @@ def test_positive_inventory_generate_upload_cli( :customerscenario: true - :Steps: + :steps: 0. Create a VM and register to insights within org having manifest. 1. Generate and upload report for all organizations @@ -64,8 +59,6 @@ def test_positive_inventory_generate_upload_cli( :BZ: 1957129, 1895953, 1956190 :CaseAutomation: Automated - - :CaseLevel: System """ org, _ = organization_ak_setup cmd = f'organization_id={org.id} foreman-rake rh_cloud_inventory:report:generate_upload' @@ -112,7 +105,7 @@ def test_positive_inventory_recommendation_sync( :id: 361af91d-1246-4308-9cc8-66beada7d651 - :Steps: + :steps: 0. Create a VM and register to insights within org having manifest. 1. Sync insights recommendation using following foreman-rake command. @@ -123,8 +116,6 @@ def test_positive_inventory_recommendation_sync( :BZ: 1957186 :CaseAutomation: Automated - - :CaseLevel: System """ org, ak = organization_ak_setup cmd = f'organization_id={org.id} foreman-rake rh_cloud_insights:sync' @@ -156,7 +147,7 @@ def test_positive_sync_inventory_status( :id: 915ffbfd-c2e6-4296-9d69-f3f9a0e79b32 - :Steps: + :steps: 0. Create a VM and register to insights within org having manifest. 1. Sync inventory status for specific organization. @@ -168,8 +159,6 @@ def test_positive_sync_inventory_status( :BZ: 1957186 :CaseAutomation: Automated - - :CaseLevel: System """ org, ak = organization_ak_setup cmd = f'organization_id={org.id} foreman-rake rh_cloud_inventory:sync' @@ -203,7 +192,7 @@ def test_max_org_size_variable(): :id: 7dd964c3-fde8-4335-ab13-02329119d7f6 - :Steps: + :steps: 1. Register few content hosts with satellite. 2. Change value of max_org_size for testing purpose(See BZ#1962694#c2). @@ -218,8 +207,6 @@ def test_max_org_size_variable(): :BZ: 1962694 :CaseAutomation: ManualOnly - - :CaseLevel: System """ @@ -229,7 +216,7 @@ def test_satellite_inventory_slice_variable(): :id: ffbef1c7-08f3-444b-9255-2251d5594fcb - :Steps: + :steps: 1. Register few content hosts with satellite. 2. Set SATELLITE_INVENTORY_SLICE_SIZE=1 dynflow environment variable. @@ -244,8 +231,6 @@ def test_satellite_inventory_slice_variable(): :BZ: 1945661 :CaseAutomation: ManualOnly - - :CaseLevel: System """ @@ -255,7 +240,7 @@ def test_rhcloud_external_links(): :id: bc7f6354-ed3e-4ac5-939d-90bfe4177043 - :Steps: + :steps: 1. Go to Configure > Inventory upload 2. Go to Configure > Insights @@ -267,8 +252,6 @@ def test_rhcloud_external_links(): :BZ: 1975093 :CaseAutomation: ManualOnly - - :CaseLevel: System """ @@ -278,7 +261,7 @@ def test_positive_generate_all_reports_job(target_sat): :id: a9e4bfdb-6d7c-4f8c-ae57-a81442926dd8 - :Steps: + :steps: 1. Disable the Automatic Inventory upload setting. 2. Execute Foreman GenerateAllReportsJob via foreman-rake. @@ -289,8 +272,6 @@ def test_positive_generate_all_reports_job(target_sat): :customerscenario: true :CaseAutomation: Automated - - :CaseLevel: System """ try: target_sat.update_setting('allow_auto_inventory_upload', False) diff --git a/tests/foreman/cli/test_role.py b/tests/foreman/cli/test_role.py index 2fbb152f796..7ccdafdf4f1 100644 --- a/tests/foreman/cli/test_role.py +++ b/tests/foreman/cli/test_role.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: UsersRoles :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from math import ceil from random import choice @@ -283,7 +278,6 @@ def test_system_admin_role_end_to_end(self, target_sat): 4. System Admin role should be able to create Organization admins 5. User with sys admin role should be able to edit filters on roles - :CaseLevel: System """ org = target_sat.cli_factory.make_org() location = target_sat.cli_factory.make_location() diff --git a/tests/foreman/cli/test_satellitesync.py b/tests/foreman/cli/test_satellitesync.py index 23b48cc6099..8c6bd86ac01 100644 --- a/tests/foreman/cli/test_satellitesync.py +++ b/tests/foreman/cli/test_satellitesync.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: InterSatelliteSync :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import os from time import sleep @@ -237,8 +232,6 @@ def test_positive_export_version_custom_repo( 1. Complete export succeeds, exported files are present on satellite machine. 2. Incremental export succeeds, exported files are present on satellite machine. - :CaseLevel: System - :BZ: 1944733 :customerscenario: true @@ -296,7 +289,6 @@ def test_positive_export_library_custom_repo( 1. Complete export succeeds, exported files are present on satellite machine. 2. Incremental export succeeds, exported files are present on satellite machine. - :CaseLevel: System """ # Create cv and publish cv_name = gen_string('alpha') @@ -350,7 +342,6 @@ def test_positive_export_complete_library_rh_repo( :expectedresults: 1. Repository was successfully exported, exported files are present on satellite machine - :CaseLevel: System """ # Create cv and publish cv_name = gen_string('alpha') @@ -560,8 +551,6 @@ def test_positive_export_import_cv_end_to_end( 1. CV version custom contents has been exported to directory. 2. All The exported custom contents has been imported in org/satellite. - :CaseLevel: System - :BZ: 1832858 :customerscenario: true @@ -652,8 +641,6 @@ def test_positive_export_import_default_org_view( 1. Default Organization View version custom contents has been exported. 2. All the exported custom contents has been imported in org/satellite. - :CaseLevel: System - :BZ: 1671319 :customerscenario: true @@ -751,7 +738,6 @@ def test_positive_export_import_filtered_cvv( 1. Filtered CV version custom contents has been exported to directory 2. Filtered exported custom contents has been imported in org/satellite - :CaseLevel: System """ exporting_cv_name = importing_cvv = gen_string('alpha') exporting_cv, exporting_cvv = _create_cv( @@ -844,7 +830,6 @@ def test_positive_export_import_promoted_cv( 2. Promoted CV version contents has been imported successfully. 3. The imported CV should only be published and not promoted. - :CaseLevel: System """ import_cv_name = class_export_entities['exporting_cv_name'] export_cv_id = class_export_entities['exporting_cv']['id'] @@ -930,7 +915,6 @@ def test_positive_export_import_redhat_cv( :customerscenario: true - :CaseLevel: System """ # Create cv and publish cv_name = gen_string('alpha') @@ -1659,8 +1643,6 @@ def test_positive_export_incremental_syncable_check_content( 1. Complete and incremental export succeed. 2. All files referenced in the repomd.xml files are present in the exports. - :CaseLevel: System - :BZ: 2212523 :customerscenario: true @@ -1745,7 +1727,6 @@ def test_positive_export_import_cv_incremental(self): :CaseAutomation: NotAutomated - :CaseLevel: System """ @pytest.mark.stubbed @@ -1767,7 +1748,6 @@ def test_positive_reimport_repo(self): :CaseAutomation: NotAutomated - :CaseLevel: System """ @pytest.mark.stubbed @@ -1785,7 +1765,6 @@ def test_negative_export_repo_from_future_datetime(self): :CaseAutomation: NotAutomated - :CaseLevel: System """ @pytest.mark.tier3 @@ -1817,7 +1796,6 @@ def test_positive_export_import_incremental_yum_repo( in the importing organization and content counts match. 2. Incremental export and import succeeds, content counts match the updated counts. - :CaseLevel: System """ export_cc = target_sat.cli.Repository.info({'id': function_synced_custom_repo.id})[ 'content-counts' @@ -1904,8 +1882,6 @@ def test_positive_export_import_mismatch_label( :expectedresults: 1. All exports and imports succeed. - :CaseLevel: System - :CaseImportance: Medium :BZ: 2092039 @@ -2005,8 +1981,6 @@ def test_positive_custom_cdn_with_credential( :expectedresults: 1. Repository can be enabled and synced from Upstream to Downstream Satellite. - :CaseLevel: System - :BZ: 2112098 :customerscenario: true @@ -2117,5 +2091,4 @@ def test_positive_install_package_from_imported_repos(self): :CaseAutomation: NotAutomated - :CaseLevel: System """ diff --git a/tests/foreman/cli/test_settings.py b/tests/foreman/cli/test_settings.py index 4923e8ec5f8..fdd005e02e8 100644 --- a/tests/foreman/cli/test_settings.py +++ b/tests/foreman/cli/test_settings.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Settings :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import random from time import sleep @@ -60,7 +55,6 @@ def test_positive_update_hostname_prefix_without_value(setting_update, module_ta :BZ: 1470083 :expectedresults: Error should be raised on setting empty value for discovery_prefix setting - """ with pytest.raises(CLIReturnCodeError): module_target_sat.cli.Settings.set({'name': "discovery_prefix", 'value': ""}) @@ -76,7 +70,6 @@ def test_positive_update_hostname_default_prefix(setting_update, module_target_s :parametrized: yes :expectedresults: Default set prefix should be updated with new value - """ hostname_prefix_value = gen_string('alpha') module_target_sat.cli.Settings.set({'name': "discovery_prefix", 'value': hostname_prefix_value}) @@ -128,7 +121,6 @@ def test_positive_update_login_page_footer_text(setting_update, module_target_sa :parametrized: yes :expectedresults: Parameter is updated successfully - """ login_text_value = random.choice(list(valid_data_list().values())) module_target_sat.cli.Settings.set({'name': "login_text", 'value': login_text_value}) @@ -151,7 +143,6 @@ def test_positive_update_login_page_footer_text_without_value(setting_update, mo :parametrized: yes :expectedresults: Message on login screen should be removed - """ module_target_sat.cli.Settings.set({'name': "login_text", 'value': ""}) login_text = module_target_sat.cli.Settings.list({'search': 'name=login_text'})[0] @@ -465,8 +456,6 @@ def test_positive_failed_login_attempts_limit(setting_update, target_sat): :CaseImportance: Critical - :CaseLevel: System - :parametrized: yes :expectedresults: failed_login_attempts_limit works as expected diff --git a/tests/foreman/cli/test_sso.py b/tests/foreman/cli/test_sso.py index d70a56a139f..d8b772a936f 100644 --- a/tests/foreman/cli/test_sso.py +++ b/tests/foreman/cli/test_sso.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: LDAP :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/foreman/cli/test_subnet.py b/tests/foreman/cli/test_subnet.py index a08fe818dfd..12272ed57c2 100644 --- a/tests/foreman/cli/test_subnet.py +++ b/tests/foreman/cli/test_subnet.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Networking :Team: Rocket -:TestType: Functional - :CaseImportance: Medium -:Upstream: No """ import random import re diff --git a/tests/foreman/cli/test_subscription.py b/tests/foreman/cli/test_subscription.py index 86d066f5041..a7a74f4360c 100644 --- a/tests/foreman/cli/test_subscription.py +++ b/tests/foreman/cli/test_subscription.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: SubscriptionManagement :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string from nailgun import entities @@ -91,8 +86,6 @@ def test_positive_enable_manifest_reposet(function_entitlement_manifest_org, mod :expectedresults: you are able to enable and synchronize repository contained in a manifest - :CaseLevel: Integration - :CaseImportance: Critical """ module_target_sat.cli.Subscription.list( diff --git a/tests/foreman/cli/test_syncplan.py b/tests/foreman/cli/test_syncplan.py index 483a7145c85..86f33b68ffb 100644 --- a/tests/foreman/cli/test_syncplan.py +++ b/tests/foreman/cli/test_syncplan.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: SyncPlans :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from datetime import datetime, timedelta from time import sleep @@ -349,8 +344,6 @@ def test_positive_info_with_assigned_product(module_org, module_target_sat): :BZ: 1390545 :CaseImportance: Critical - - :CaseLevel: Integration """ prod1 = gen_string('alpha') prod2 = gen_string('alpha') @@ -384,8 +377,6 @@ def test_negative_synchronize_custom_product_past_sync_date(module_org, request, :expectedresults: Repository was not synchronized :BZ: 1279539 - - :CaseLevel: System """ new_sync_plan = target_sat.cli_factory.sync_plan( { @@ -415,8 +406,6 @@ def test_positive_synchronize_custom_product_past_sync_date(module_org, request, :expectedresults: Product is synchronized successfully. :BZ: 1279539 - - :CaseLevel: System """ interval = 60 * 60 # 'hourly' sync interval in seconds delay = 2 * 60 @@ -467,8 +456,6 @@ def test_positive_synchronize_custom_product_future_sync_date(module_org, reques :expectedresults: Product is synchronized successfully. - :CaseLevel: System - :BZ: 1655595 """ cron_multiple = 5 # sync event is on every multiple of this value, starting from 00 mins @@ -526,8 +513,6 @@ def test_positive_synchronize_custom_products_future_sync_date(module_org, reque :expectedresults: Products are synchronized successfully. - :CaseLevel: System - :BZ: 1655595 """ cron_multiple = 5 # sync event is on every multiple of this value, starting from 00 mins @@ -606,8 +591,6 @@ def test_positive_synchronize_rh_product_past_sync_date( :expectedresults: Product is synchronized successfully. :BZ: 1279539 - - :CaseLevel: System """ interval = 60 * 60 # 'hourly' sync interval in seconds delay = 2 * 60 @@ -673,8 +656,6 @@ def test_positive_synchronize_rh_product_future_sync_date( :expectedresults: Product is synchronized successfully. - :CaseLevel: System - :BZ: 1655595 """ cron_multiple = 5 # sync event is on every multiple of this value, starting from 00 mins @@ -746,8 +727,6 @@ def test_positive_synchronize_custom_product_daily_recurrence(module_org, reques :id: 8d882e8b-b5c1-4449-81c6-0efd31ad75a7 :expectedresults: Product is synchronized successfully. - - :CaseLevel: System """ delay = 2 * 60 product = target_sat.cli_factory.make_product({'organization-id': module_org.id}) @@ -797,8 +776,6 @@ def test_positive_synchronize_custom_product_weekly_recurrence(module_org, reque :expectedresults: Product is synchronized successfully. :BZ: 1396647 - - :CaseLevel: System """ delay = 2 * 60 product = target_sat.cli_factory.make_product({'organization-id': module_org.id}) diff --git a/tests/foreman/cli/test_templatesync.py b/tests/foreman/cli/test_templatesync.py index 059bd501933..168090e0c98 100644 --- a/tests/foreman/cli/test_templatesync.py +++ b/tests/foreman/cli/test_templatesync.py @@ -4,15 +4,10 @@ :CaseAutomation: Automated -:CaseLevel: Integration - :CaseComponent: TemplatesPlugin :Team: Endeavour -:TestType: Functional - -:Upstream: No """ import base64 @@ -66,7 +61,7 @@ def test_positive_import_force_locked_template( :id: b80fbfc4-bcab-4a5d-b6c1-0e22906cd8ab - :Steps: + :steps: 1. Import some of the locked template specifying the `force` parameter `false`. 2. After ensuring the template is not updated, Import same locked template @@ -133,7 +128,7 @@ def test_positive_update_templates_in_git( :id: 5b0be026-2983-4570-bc63-d9aba36fca65 - :Steps: + :steps: 1. Repository contains file with same name as exported template. 2. Export "Atomic Kickstart default" templates to git repo. @@ -200,7 +195,7 @@ def test_positive_export_filtered_templates_to_git( :id: fd583f85-f170-4b93-b9b1-36d72f31c31f - :Steps: + :steps: 1. Export only the templates matching with regex e.g: `^atomic.*` to git repo. :expectedresults: @@ -241,7 +236,7 @@ def test_positive_export_filtered_templates_to_temp_dir(self, module_org, target :bz: 1778177 - :Steps: Export the templates matching with regex e.g: `ansible` to /tmp directory. + :steps: Export the templates matching with regex e.g: `ansible` to /tmp directory. :expectedresults: The templates are exported /tmp directory diff --git a/tests/foreman/cli/test_user.py b/tests/foreman/cli/test_user.py index ff23b22276e..b334a7184ca 100644 --- a/tests/foreman/cli/test_user.py +++ b/tests/foreman/cli/test_user.py @@ -10,17 +10,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: UsersRoles :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import datetime import random @@ -205,7 +200,6 @@ def test_positive_create_with_orgs_and_update(self, module_target_sat): :expectedresults: User is created with orgs, orgs are updated - :CaseLevel: Integration """ orgs_amount = 2 orgs = [module_target_sat.cli_factory.make_org() for _ in range(orgs_amount)] @@ -247,7 +241,6 @@ def test_positive_last_login_for_new_user(self, module_target_sat): :BZ: 1763816 - :CaseLevel: Integration """ login = gen_string('alpha') password = gen_string('alpha') @@ -280,7 +273,7 @@ def test_positive_update_all_locales(self, module_target_sat): :id: f0993495-5117-461d-a116-44867b820139 - :Steps: Update current User with all different Language options + :steps: Update current User with all different Language options :expectedresults: Current User is updated @@ -309,7 +302,6 @@ def test_positive_add_and_delete_roles(self, module_roles, module_target_sat): :expectedresults: Roles are added to user and deleted successfully - :CaseLevel: Integration """ user = module_target_sat.cli_factory.user() original_role_names = set(user['roles']) @@ -415,8 +407,6 @@ def test_personal_access_token_admin_user(self, target_sat): 1. Should show output of the api endpoint 2. When revoked, authentication error - :CaseLevel: System - :CaseImportance: High """ user = target_sat.cli_factory.user({'admin': '1'}) @@ -453,8 +443,6 @@ def test_positive_personal_access_token_user_with_role(self, target_sat): 2. When an incorrect end point is used, missing permission should be displayed. - :CaseLevel: System - :CaseImportance: High """ user = target_sat.cli_factory.user() @@ -487,8 +475,6 @@ def test_expired_personal_access_token(self, target_sat): :expectedresults: Authentication error - :CaseLevel: System - :CaseImportance: Medium """ user = target_sat.cli_factory.user() @@ -527,8 +513,6 @@ def test_custom_personal_access_token_role(self, target_sat): :expectedresults: Non admin user is able to view only the assigned entity - :CaseLevel: System - :CaseImportance: High :BZ: 1974685, 1996048 diff --git a/tests/foreman/cli/test_usergroup.py b/tests/foreman/cli/test_usergroup.py index c7569483f61..1c757b4e766 100644 --- a/tests/foreman/cli/test_usergroup.py +++ b/tests/foreman/cli/test_usergroup.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: UsersRoles :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import random @@ -117,8 +112,6 @@ def test_positive_add_and_remove_elements(module_target_sat): :expectedresults: Elements are added to user group and then removed successfully. - - :CaseLevel: Integration """ role = module_target_sat.cli_factory.make_role() user_group = module_target_sat.cli_factory.usergroup() @@ -164,8 +157,6 @@ def test_positive_remove_user_assigned_to_usergroup(module_target_sat): :customerscenario: true - :CaseLevel: Integration - :BZ: 1667704 """ user = module_target_sat.cli_factory.user() @@ -189,8 +180,6 @@ def test_positive_automate_bz1426957(ldap_auth_source, function_user_group, targ :customerscenario: true - :CaseLevel: Integration - :BZ: 1426957, 1667704 """ ext_user_group = target_sat.cli_factory.usergroup_external( @@ -229,8 +218,6 @@ def test_negative_automate_bz1437578(ldap_auth_source, function_user_group, modu :expectedresults: Error message as Domain Users is a special group in AD. - :CaseLevel: Integration - :BZ: 1437578 """ with pytest.raises(CLIReturnCodeError): diff --git a/tests/foreman/cli/test_vm_install_products_package.py b/tests/foreman/cli/test_vm_install_products_package.py index 53777235341..f03fc19e997 100644 --- a/tests/foreman/cli/test_vm_install_products_package.py +++ b/tests/foreman/cli/test_vm_install_products_package.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from broker import Broker import pytest diff --git a/tests/foreman/cli/test_webhook.py b/tests/foreman/cli/test_webhook.py index 516df792b63..2849b6aa57d 100644 --- a/tests/foreman/cli/test_webhook.py +++ b/tests/foreman/cli/test_webhook.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: HooksandWebhooks :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from functools import partial from random import choice diff --git a/tests/foreman/destructive/conftest.py b/tests/foreman/destructive/conftest.py index 190bc2cabe0..c80a2b6d288 100644 --- a/tests/foreman/destructive/conftest.py +++ b/tests/foreman/destructive/conftest.py @@ -20,7 +20,6 @@ def test_foo(session): with session: # your ui test steps here session.architecture.create({'name': 'bar'}) - """ with module_target_sat.ui_session(test_name, ui_user.login, ui_user.password) as session: yield session diff --git a/tests/foreman/destructive/test_ansible.py b/tests/foreman/destructive/test_ansible.py index cde68a6fecb..46598727290 100644 --- a/tests/foreman/destructive/test_ansible.py +++ b/tests/foreman/destructive/test_ansible.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Ansible-ConfigurationManagement :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/foreman/destructive/test_auth.py b/tests/foreman/destructive/test_auth.py index 78e19a61298..96e5695b5b4 100644 --- a/tests/foreman/destructive/test_auth.py +++ b/tests/foreman/destructive/test_auth.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Authentication :Team: Endeavour -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -36,7 +31,6 @@ def test_positive_password_reset(target_sat): :expectedresults: verify the 'foreman-rake permissions:reset' command for the admin user :CaseImportance: High - """ result = target_sat.execute('foreman-rake permissions:reset') assert result.status == 0 diff --git a/tests/foreman/destructive/test_capsule.py b/tests/foreman/destructive/test_capsule.py index 9dae30c9218..1cc63f4fbbe 100644 --- a/tests/foreman/destructive/test_capsule.py +++ b/tests/foreman/destructive/test_capsule.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ForemanProxy :Team: Platform -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -33,8 +28,6 @@ def test_positive_capsule_certs_generate_with_special_char(target_sat): :expectedresults: capsule-certs-generate works - :CaseLevel: Component - :BZ: 1908841 :customerscenario: true diff --git a/tests/foreman/destructive/test_capsule_loadbalancer.py b/tests/foreman/destructive/test_capsule_loadbalancer.py index 4d17f770203..2da4c179d94 100644 --- a/tests/foreman/destructive/test_capsule_loadbalancer.py +++ b/tests/foreman/destructive/test_capsule_loadbalancer.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Integration - :CaseComponent: ForemanProxy :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest @@ -145,7 +140,7 @@ def test_loadbalancer_register_client_using_ak_to_ha_proxy(loadbalancer_setup, r :id: bd3c2e50-18e2-4be7-8a7f-c32472e17c61 - :Steps: + :steps: 1. run `subscription-manager register --org=Your_Organization \ --activationkey=Your_Activation_Key \ --serverurl=https://loadbalancer.example.com:8443/rhsm \ @@ -159,7 +154,6 @@ def test_loadbalancer_register_client_using_ak_to_ha_proxy(loadbalancer_setup, r :expectedresults: The client should be get the package irrespective of the capsule registration. - :CaseLevel: Integration """ url = f'https://{loadbalancer_setup["setup_haproxy"]["haproxy"].hostname}' server_url = f'{url}:8443/rhsm' diff --git a/tests/foreman/destructive/test_capsulecontent.py b/tests/foreman/destructive/test_capsulecontent.py index 91abf5fd5b4..ce07d9ef127 100644 --- a/tests/foreman/destructive/test_capsulecontent.py +++ b/tests/foreman/destructive/test_capsulecontent.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: System - :CaseComponent: Capsule-Content :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_alpha import pytest @@ -51,7 +46,6 @@ def test_positive_sync_without_deadlock( :customerscenario: true :BZ: 2062526 - """ # Note: As of now BZ#2122872 prevents us to use the originally intended RHEL7 repo because # of a memory leak causing Satellite OOM crash in this scenario. Therefore, for now we use diff --git a/tests/foreman/destructive/test_clone.py b/tests/foreman/destructive/test_clone.py index 2ccb5087bca..81e630b9221 100644 --- a/tests/foreman/destructive/test_clone.py +++ b/tests/foreman/destructive/test_clone.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: SatelliteClone :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/foreman/destructive/test_contenthost.py b/tests/foreman/destructive/test_contenthost.py index 9ed7c80398c..1c93d524ca5 100644 --- a/tests/foreman/destructive/test_contenthost.py +++ b/tests/foreman/destructive/test_contenthost.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Hosts-Content :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest @@ -33,8 +28,6 @@ def test_content_access_after_stopped_foreman(target_sat, rhel7_contenthost): :expectedresults: Package should get installed even after foreman service is stopped - :CaseLevel: System - :CaseImportance: Medium :CaseComponent: Infrastructure diff --git a/tests/foreman/destructive/test_contentview.py b/tests/foreman/destructive/test_contentview.py index 76f91ac0f42..03af433a939 100644 --- a/tests/foreman/destructive/test_contentview.py +++ b/tests/foreman/destructive/test_contentview.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ContentViews :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from nailgun.entity_mixins import TaskFailedError import pytest diff --git a/tests/foreman/destructive/test_discoveredhost.py b/tests/foreman/destructive/test_discoveredhost.py index da5b924bbdd..8034957ec72 100644 --- a/tests/foreman/destructive/test_discoveredhost.py +++ b/tests/foreman/destructive/test_discoveredhost.py @@ -8,11 +8,6 @@ :CaseAutomation: Automated -:CaseLevel: System - -:TestType: Functional - -:Upstream: No """ from copy import copy import re @@ -211,7 +206,7 @@ def test_positive_provision_pxe_host_dhcp_change(): :Setup: Provisioning should be configured and a host should be discovered - :Steps: + :steps: 1. Set some dhcp range in dhcpd.conf in satellite. 2. Create subnet entity in satellite with a range different from whats defined in `dhcpd.conf`. diff --git a/tests/foreman/destructive/test_foreman_rake.py b/tests/foreman/destructive/test_foreman_rake.py index f655fc3787b..5162fa94be2 100644 --- a/tests/foreman/destructive/test_foreman_rake.py +++ b/tests/foreman/destructive/test_foreman_rake.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: System - -:TestType: Functional - :CaseImportance: Medium :CaseComponent: TasksPlugin :Team: Endeavour -:Upstream: No """ import pytest @@ -28,7 +23,7 @@ def test_positive_katello_reimport(target_sat): :id: b4119265-1bf0-4b0b-8b96-43f68af39708 - :Steps: Have satellite up and run 'foreman-rake katello:reimport' + :steps: Have satellite up and run 'foreman-rake katello:reimport' :expectedresults: Successfully reimport without errors diff --git a/tests/foreman/destructive/test_foreman_service.py b/tests/foreman/destructive/test_foreman_service.py index 7f481df3114..6d0d24de110 100644 --- a/tests/foreman/destructive/test_foreman_service.py +++ b/tests/foreman/destructive/test_foreman_service.py @@ -4,13 +4,8 @@ :CaseAutomation: Automated -:CaseLevel: System - -:TestType: Functional - :CaseImportance: Medium -:Upstream: No """ import pytest @@ -29,7 +24,7 @@ def test_positive_foreman_service_auto_restart(foreman_service_teardown): :id: 766560b8-30bb-11eb-8dae-d46d6dd3b5b2 - :Steps: + :steps: 1. Stop the Foreman Service 2. Make any API call to Satellite diff --git a/tests/foreman/destructive/test_host.py b/tests/foreman/destructive/test_host.py index d626256d59f..084e5d23797 100644 --- a/tests/foreman/destructive/test_host.py +++ b/tests/foreman/destructive/test_host.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from airgun.exceptions import NoSuchElementException import pytest @@ -39,8 +34,6 @@ def test_positive_cockpit(self, cockpit_host, class_cockpit_sat, class_org): :BZ: 1876220 - :CaseLevel: System - :steps: 1. kill the cockpit service. 2. go to web console and verify if getting 503 error. diff --git a/tests/foreman/destructive/test_infoblox.py b/tests/foreman/destructive/test_infoblox.py index 1230507f8e0..7143e0355d5 100644 --- a/tests/foreman/destructive/test_infoblox.py +++ b/tests/foreman/destructive/test_infoblox.py @@ -2,17 +2,12 @@ :Requirement: Infoblox, Installer -:CaseLevel: System - :CaseComponent: DHCPDNS :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_mac, gen_string import pytest @@ -100,7 +95,7 @@ def test_plugin_installation(target_sat, command_args, command_opts, rpm_command :id: c75aa5f3-870a-4f4a-9d7a-0a871b47fd6f - :Steps: Run installer with mininum options required to install plugins + :steps: Run installer with mininum options required to install plugins :expectedresults: Plugins install successfully diff --git a/tests/foreman/destructive/test_installer.py b/tests/foreman/destructive/test_installer.py index f07d8bc19d1..b6dcd89cd45 100644 --- a/tests/foreman/destructive/test_installer.py +++ b/tests/foreman/destructive/test_installer.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Installation :Team: Platform -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ import pytest @@ -44,8 +39,6 @@ def test_installer_sat_pub_directory_accessibility(target_sat): :CaseImportance: High - :CaseLevel: System - :BZ: 1960801 :customerscenario: true @@ -94,8 +87,6 @@ def test_installer_inventory_plugin_update(target_sat): :CaseImportance: High - :CaseLevel: System - :BZ: 1863597 :customerscenario: true diff --git a/tests/foreman/destructive/test_katello_agent.py b/tests/foreman/destructive/test_katello_agent.py index 97b92c495c8..6e9077b3593 100644 --- a/tests/foreman/destructive/test_katello_agent.py +++ b/tests/foreman/destructive/test_katello_agent.py @@ -4,17 +4,11 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: katello-agent :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High - -:Upstream: No """ import pytest @@ -40,7 +34,6 @@ def test_positive_apply_errata(katello_agent_client): :parametrized: yes - :CaseLevel: System """ sat = katello_agent_client['sat'] client = katello_agent_client['client'] @@ -68,7 +61,6 @@ def test_positive_install_and_remove_package(katello_agent_client): :parametrized: yes - :CaseLevel: System """ sat = katello_agent_client['sat'] client = katello_agent_client['client'] @@ -93,7 +85,6 @@ def test_positive_upgrade_package(katello_agent_client): :parametrized: yes - :CaseLevel: System """ sat = katello_agent_client['sat'] client = katello_agent_client['client'] @@ -115,7 +106,6 @@ def test_positive_upgrade_packages_all(katello_agent_client): :parametrized: yes - :CaseLevel: System """ sat = katello_agent_client['sat'] client = katello_agent_client['client'] @@ -135,7 +125,6 @@ def test_positive_install_and_remove_package_group(katello_agent_client): :parametrized: yes - :CaseLevel: System """ sat = katello_agent_client['sat'] client = katello_agent_client['client'] diff --git a/tests/foreman/destructive/test_katello_certs_check.py b/tests/foreman/destructive/test_katello_certs_check.py index 68ef4f365f1..db133e99749 100644 --- a/tests/foreman/destructive/test_katello_certs_check.py +++ b/tests/foreman/destructive/test_katello_certs_check.py @@ -4,18 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: System - :CaseComponent: Installation :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No - """ import re diff --git a/tests/foreman/destructive/test_ldap_authentication.py b/tests/foreman/destructive/test_ldap_authentication.py index b25ff4ad098..025e0b45bf2 100644 --- a/tests/foreman/destructive/test_ldap_authentication.py +++ b/tests/foreman/destructive/test_ldap_authentication.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Integration - :CaseComponent: LDAP :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import os from time import sleep @@ -204,7 +199,6 @@ def test_single_sign_on_ldap_ipa_server( :expectedresults: After single sign on user should redirected from /extlogin to /hosts page :BZ: 1941997 - """ result = target_sat.execute(f'echo {settings.ipa.password} | kinit {settings.ipa.user}') assert result.status == 0 @@ -229,7 +223,6 @@ def test_single_sign_on_ldap_ad_server( using curl. It should navigate to hosts page. (verify using url only) :BZ: 1941997 - """ # create the kerberos ticket for authentication result = target_sat.execute(f'echo {settings.ldap.password} | kinit {settings.ldap.username}') @@ -440,7 +433,6 @@ def test_user_permissions_rhsso_user_after_group_delete( :expectedresults: external rhsso user's permissions should get revoked after external rhsso group deletion. - """ default_sso_host.get_rhsso_client_id() username = settings.rhsso.rhsso_user @@ -598,7 +590,6 @@ def test_permissions_external_ldap_mapped_rhsso_group( :expectedresults: The external ldap mapped rhsso user should contain the permissions based on the user group level - """ ad_data = ad_data() login_details = { @@ -642,7 +633,6 @@ def test_negative_negotiate_login_without_ticket( :expectedresults: 1. Proper messages are returned in all cases. 2. Login and hosts listing fails without Kerberos ticket. - """ result = parametrized_enrolled_sat.cli.Auth.status() assert NO_KERB_MSG in str(result) @@ -680,7 +670,6 @@ def test_positive_negotiate_login_with_ticket( 2. Negotiate login works with the ticket. 3. External user is created and permissions enforcing works. 4. Proper messages are returned in all cases. - """ auth_type = request.node.callspec.params['parametrized_enrolled_sat'] user = ( @@ -744,7 +733,6 @@ def test_positive_negotiate_CRUD( 3. Listing and CRUD operations via hammer succeed. :BZ: 2122617 - """ auth_type = request.node.callspec.params['parametrized_enrolled_sat'] user = ( @@ -820,7 +808,6 @@ def test_positive_negotiate_logout( 1. Session is closed on log out properly on logout. 2. Hammer command fails after log out. 3. Proper messages are returned in all cases. - """ auth_type = request.node.callspec.params['parametrized_enrolled_sat'] user = ( diff --git a/tests/foreman/destructive/test_ldapauthsource.py b/tests/foreman/destructive/test_ldapauthsource.py index 03e09384db8..020aad9f716 100644 --- a/tests/foreman/destructive/test_ldapauthsource.py +++ b/tests/foreman/destructive/test_ldapauthsource.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: LDAP :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from time import sleep diff --git a/tests/foreman/destructive/test_leapp_satellite.py b/tests/foreman/destructive/test_leapp_satellite.py index 51d50d3896e..4e9b269c4e6 100644 --- a/tests/foreman/destructive/test_leapp_satellite.py +++ b/tests/foreman/destructive/test_leapp_satellite.py @@ -2,17 +2,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Upgrades :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from broker import Broker import pytest diff --git a/tests/foreman/destructive/test_ping.py b/tests/foreman/destructive/test_ping.py index e683a84a2b6..96ae171c8f7 100644 --- a/tests/foreman/destructive/test_ping.py +++ b/tests/foreman/destructive/test_ping.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Hammer :Team: Endeavour -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ import pytest diff --git a/tests/foreman/destructive/test_puppetplugin.py b/tests/foreman/destructive/test_puppetplugin.py index 545bd613173..70d82a816ac 100644 --- a/tests/foreman/destructive/test_puppetplugin.py +++ b/tests/foreman/destructive/test_puppetplugin.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Puppet :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/foreman/destructive/test_realm.py b/tests/foreman/destructive/test_realm.py index c9740611a4c..c495e29176e 100644 --- a/tests/foreman/destructive/test_realm.py +++ b/tests/foreman/destructive/test_realm.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Authentication :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import random diff --git a/tests/foreman/destructive/test_remoteexecution.py b/tests/foreman/destructive/test_remoteexecution.py index 56a453dfbd3..a94fb987320 100644 --- a/tests/foreman/destructive/test_remoteexecution.py +++ b/tests/foreman/destructive/test_remoteexecution.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: RemoteExecution :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string from nailgun import client diff --git a/tests/foreman/destructive/test_rename.py b/tests/foreman/destructive/test_rename.py index 1954259f99a..03fd9ff0d6f 100644 --- a/tests/foreman/destructive/test_rename.py +++ b/tests/foreman/destructive/test_rename.py @@ -4,18 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: System - :CaseComponent: Installation :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No - """ from fauxfactory import gen_string import pytest diff --git a/tests/foreman/destructive/test_repository.py b/tests/foreman/destructive/test_repository.py index 2ff48fb13b2..026134f2017 100644 --- a/tests/foreman/destructive/test_repository.py +++ b/tests/foreman/destructive/test_repository.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from nailgun.entity_mixins import TaskFailedError import pytest diff --git a/tests/foreman/endtoend/test_api_endtoend.py b/tests/foreman/endtoend/test_api_endtoend.py index c3f00afdd90..2471c02a15a 100644 --- a/tests/foreman/endtoend/test_api_endtoend.py +++ b/tests/foreman/endtoend/test_api_endtoend.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: API :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from collections import defaultdict import http diff --git a/tests/foreman/endtoend/test_cli_endtoend.py b/tests/foreman/endtoend/test_cli_endtoend.py index e62a28982de..d3349896bbe 100644 --- a/tests/foreman/endtoend/test_cli_endtoend.py +++ b/tests/foreman/endtoend/test_cli_endtoend.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hammer :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_alphanumeric, gen_ipaddr import pytest diff --git a/tests/foreman/installer/test_infoblox.py b/tests/foreman/installer/test_infoblox.py index e8b77fcc67d..5f839d4e850 100644 --- a/tests/foreman/installer/test_infoblox.py +++ b/tests/foreman/installer/test_infoblox.py @@ -2,19 +2,14 @@ :Requirement: Infoblox, Installer -:CaseLevel: System - :CaseAutomation: Automated :CaseComponent: DHCPDNS :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest @@ -27,13 +22,11 @@ def test_dhcp_ip_range(): :id: ba957e82-79bb-11e6-94c5-68f72889dc7f - :Steps: Provision a host with infoblox as dhcp provider + :steps: Provision a host with infoblox as dhcp provider :expectedresults: Check host ip is on infoblox range configured by option --foreman-proxy-plugin-dhcp-infoblox-use-ranges=true - :CaseLevel: System - :CaseAutomation: NotAutomated """ @@ -46,14 +39,12 @@ def test_dns_records(): :id: 007ad06e-79bc-11e6-885f-68f72889dc7f - :Steps: + :steps: 1. Provision a host with infoblox as dns provider 2. Update a DNS record on infoblox :expectedresults: Check host dns is updated accordingly to infoblox - :CaseLevel: System - :CaseAutomation: NotAutomated """ diff --git a/tests/foreman/installer/test_installer.py b/tests/foreman/installer/test_installer.py index 1061ba7867b..24d1a107825 100644 --- a/tests/foreman/installer/test_installer.py +++ b/tests/foreman/installer/test_installer.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Installation :Team: Platform -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ import pytest @@ -1311,8 +1306,6 @@ def test_positive_selinux_foreman_module(target_sat): 1. Check "foreman-selinux" package availability on satellite. 2. Check SELinux foreman module on satellite. - :CaseLevel: System - :expectedresults: Foreman RPM and SELinux module are both present on the satellite """ rpm_result = target_sat.execute('rpm -q foreman-selinux') @@ -1357,8 +1350,6 @@ def test_positive_check_installer_hammer_ping(target_sat): :customerscenario: true :expectedresults: All services are active (running) - - :CaseLevel: System """ # check status reported by hammer ping command result = target_sat.execute('hammer ping') @@ -1517,8 +1508,6 @@ def test_satellite_installation_on_ipv6(): 4: Satellite service restart should work. 5: After system reboot all the services comes to up state. - :CaseLevel: System - :CaseAutomation: NotAutomated """ @@ -1540,8 +1529,6 @@ def test_capsule_installation_on_ipv6(): 3. Satellite service restart should work. 4. After system reboot all the services come to up state. - :CaseLevel: System - :CaseAutomation: NotAutomated """ @@ -1564,8 +1551,6 @@ def test_installer_check_on_ipv6(): 1. Tuning parameter set successfully for medium size. 2. custom-hiera.yaml related changes should be successfully applied. - :CaseLevel: System - :CaseAutomation: NotAutomated """ @@ -1590,8 +1575,6 @@ def test_installer_verbose_stdout(): external capsule installation pre-requisite, upgrade capsule instruction, running internal capsule url, log file. - :CaseLevel: System - :CaseAutomation: NotAutomated """ @@ -1611,8 +1594,6 @@ def test_installer_answers_file(): :expectedresults: Installer configures plugins and hooks in answers file. - :CaseLevel: System - :CaseAutomation: NotAutomated """ @@ -1635,8 +1616,6 @@ def test_capsule_installer_verbose_stdout(): 2. Installer STDOUTs system configuration completion. 3. Finally, Installer informs running capsule url, log file. - :CaseLevel: System - :CaseAutomation: NotAutomated """ @@ -1657,8 +1636,6 @@ def test_installer_timestamp_logs(): 1. Installer logs satellite installation with timestamps in following format YYYY-MM-DD HH:MM:SS - :CaseLevel: System - :CaseAutomation: NotAutomated """ @@ -1690,8 +1667,6 @@ def test_positive_capsule_installer_and_register(): 1. Capsule integrate successfully with satellite. 2. Capsule sync should be worked properly. - :CaseLevel: System - :CaseAutomation: NotAutomated """ @@ -1719,8 +1694,6 @@ def test_positive_satellite_installer_logfile_check(): 4. /var/log/httpd, 5. /var/log/candlepin - :CaseLevel: System - :CaseAutomation: NotAutomated """ @@ -1755,8 +1728,6 @@ def test_positive_capsule_installer_logfile_check(): 3. /var/log/httpd 4. /var/log/foreman-proxy - :CaseLevel: System - :CaseAutomation: NotAutomated """ @@ -1782,8 +1753,6 @@ def test_installer_cap_pub_directory_accessibility(capsule_configured): :CaseImportance: High - :CaseLevel: System - :BZ: 1860519 :customerscenario: true diff --git a/tests/foreman/longrun/test_inc_updates.py b/tests/foreman/longrun/test_inc_updates.py index 7cf89b9cc8c..66b07567b48 100644 --- a/tests/foreman/longrun/test_inc_updates.py +++ b/tests/foreman/longrun/test_inc_updates.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts-Content :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from datetime import datetime, timedelta @@ -198,8 +193,6 @@ def test_positive_noapply_api( Content view has a newer version :parametrized: yes - - :CaseLevel: System """ # Promote CV to new LCE versions = sorted(module_cv.read().version, key=lambda ver: ver.id) diff --git a/tests/foreman/longrun/test_n_1_upgrade.py b/tests/foreman/longrun/test_n_1_upgrade.py index d3f3d8051aa..eb46ec50a67 100644 --- a/tests/foreman/longrun/test_n_1_upgrade.py +++ b/tests/foreman/longrun/test_n_1_upgrade.py @@ -4,17 +4,11 @@ :CaseAutomation: ManualOnly -:CaseLevel: System - :CaseComponent: ForemanProxy :Team: Platform -:TestType: Functional - :CaseImportance: Critical - -:Upstream: No """ import pytest diff --git a/tests/foreman/longrun/test_oscap.py b/tests/foreman/longrun/test_oscap.py index 6d968bb3ce3..2d1df22a7e6 100644 --- a/tests/foreman/longrun/test_oscap.py +++ b/tests/foreman/longrun/test_oscap.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: SCAPPlugin :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from broker import Broker from fauxfactory import gen_string @@ -377,7 +372,7 @@ def test_positive_has_arf_report_summary_page(): :id: 25be7898-50c5-4825-adc7-978c7b4e3488 - :Steps: + :steps: 1. Make sure the oscap report with it's corresponding hostname is visible in the UI. 2. Click on the host name to access the oscap report. @@ -385,8 +380,6 @@ def test_positive_has_arf_report_summary_page(): :expectedresults: Oscap ARF reports should have summary page. :CaseAutomation: NotAutomated - - :CaseLevel: System """ @@ -397,7 +390,7 @@ def test_positive_view_full_report_button(): :id: 5a41916d-66db-4d2f-8261-b83f833189b9 - :Steps: + :steps: 1. Make sure the oscap report with it's corresponding hostname is visible in the UI. 2. Click on the host name to access the oscap report. @@ -406,8 +399,6 @@ def test_positive_view_full_report_button(): actual HTML report. :CaseAutomation: NotAutomated - - :CaseLevel: System """ @@ -419,7 +410,7 @@ def test_positive_download_xml_button(): :id: 07a5f495-a702-4ca4-b5a4-579a133f9181 - :Steps: + :steps: 1. Make sure the oscap report with it's corresponding hostname is visible in the UI. 2. Click on the host name to access the oscap report. @@ -428,8 +419,6 @@ def test_positive_download_xml_button(): the xml report. :CaseAutomation: NotAutomated - - :CaseLevel: System """ @@ -441,15 +430,13 @@ def test_positive_select_oscap_proxy(): :id: d56576c8-6fab-4af6-91c1-6a56d9cca94b - :Steps: Choose the Oscap Proxy/capsule appropriately for the host or + :steps: Choose the Oscap Proxy/capsule appropriately for the host or host-groups. :expectedresults: Should have an Oscap-Proxy select box while filling hosts and host-groups form. :CaseAutomation: NotAutomated - - :CaseLevel: System """ @@ -460,7 +447,7 @@ def test_positive_delete_multiple_arf_reports(): :id: c1a8ce02-f42f-4c48-893d-8f31432b5520 - :Steps: + :steps: 1. Run Oscap scans are run for multiple Hosts. 2. Make sure the oscap reports with it's corresponding hostnames are visible in the UI. @@ -470,8 +457,6 @@ def test_positive_delete_multiple_arf_reports(): :expectedresults: Multiple Oscap ARF reports can be deleted. :CaseAutomation: NotAutomated - - :CaseLevel: System """ @@ -485,6 +470,4 @@ def test_positive_reporting_emails_of_oscap_reports(): :expectedresults: Whether email reporting of oscap reports is possible. :CaseAutomation: NotAutomated - - :CaseLevel: System """ diff --git a/tests/foreman/maintain/test_advanced.py b/tests/foreman/maintain/test_advanced.py index 9322bfba50e..0a1081c79eb 100644 --- a/tests/foreman/maintain/test_advanced.py +++ b/tests/foreman/maintain/test_advanced.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: SatelliteMaintain :Team: Platform -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ import pytest import yaml diff --git a/tests/foreman/maintain/test_backup_restore.py b/tests/foreman/maintain/test_backup_restore.py index 1c00da98705..ca0a86fcfeb 100644 --- a/tests/foreman/maintain/test_backup_restore.py +++ b/tests/foreman/maintain/test_backup_restore.py @@ -4,17 +4,13 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: SatelliteMaintain :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No + """ import re diff --git a/tests/foreman/maintain/test_health.py b/tests/foreman/maintain/test_health.py index c14f762f40a..30ed6b943bb 100644 --- a/tests/foreman/maintain/test_health.py +++ b/tests/foreman/maintain/test_health.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: SatelliteMaintain :Team: Platform -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ import time diff --git a/tests/foreman/maintain/test_maintenance_mode.py b/tests/foreman/maintain/test_maintenance_mode.py index b11a33615e2..50d130ac55a 100644 --- a/tests/foreman/maintain/test_maintenance_mode.py +++ b/tests/foreman/maintain/test_maintenance_mode.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: SatelliteMaintain :Team: Platform -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ import pytest import yaml diff --git a/tests/foreman/maintain/test_offload_DB.py b/tests/foreman/maintain/test_offload_DB.py index 1e7c5da134e..0e1b3ced9d9 100644 --- a/tests/foreman/maintain/test_offload_DB.py +++ b/tests/foreman/maintain/test_offload_DB.py @@ -4,17 +4,12 @@ :CaseAutomation: ManualOnly -:CaseLevel: Integration - :CaseComponent: SatelliteMaintain :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest @@ -28,12 +23,10 @@ def test_offload_internal_db_to_external_db_host(): :id: d07235c8-4584-469a-a87d-ace4dadb0a1f - :Steps: Run satellite-installer with foreman, candlepin and pulpcore options + :steps: Run satellite-installer with foreman, candlepin and pulpcore options referring to external DB host :expectedresults: Installed successful, all services running - :CaseLevel: Integration - :CaseComponent: Installation """ diff --git a/tests/foreman/maintain/test_packages.py b/tests/foreman/maintain/test_packages.py index 86972feecc2..69cd31b3ddd 100644 --- a/tests/foreman/maintain/test_packages.py +++ b/tests/foreman/maintain/test_packages.py @@ -4,17 +4,11 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: SatelliteMaintain :Team: Platform -:TestType: Functional - :CaseImportance: Critical - -:Upstream: No """ import pytest diff --git a/tests/foreman/maintain/test_service.py b/tests/foreman/maintain/test_service.py index 8915a09212a..0d9a99cf931 100644 --- a/tests/foreman/maintain/test_service.py +++ b/tests/foreman/maintain/test_service.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: SatelliteMaintain :Team: Platform -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ from fauxfactory import gen_string import pytest diff --git a/tests/foreman/maintain/test_upgrade.py b/tests/foreman/maintain/test_upgrade.py index dd49c7f4252..4afc10d48c9 100644 --- a/tests/foreman/maintain/test_upgrade.py +++ b/tests/foreman/maintain/test_upgrade.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: SatelliteMaintain :Team: Platform -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ import pytest diff --git a/tests/foreman/sanity/test_bvt.py b/tests/foreman/sanity/test_bvt.py index 7fe5dc77f02..7da1ccc3d8e 100644 --- a/tests/foreman/sanity/test_bvt.py +++ b/tests/foreman/sanity/test_bvt.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: BVT :Team: JPL -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ import re @@ -76,8 +71,6 @@ def test_all_interfaces_are_accessible(target_sat): :id: 0a212120-8e49-4489-a1a4-4272004e16dc :expectedresults: All three satellite interfaces are accessible - - """ errors = {} # API Interface diff --git a/tests/foreman/sys/test_dynflow.py b/tests/foreman/sys/test_dynflow.py index 6712cfe10d5..31db3b7a8df 100644 --- a/tests/foreman/sys/test_dynflow.py +++ b/tests/foreman/sys/test_dynflow.py @@ -2,19 +2,14 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Dynflow :Team: Endeavour :Requirement: Dynflow -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/foreman/sys/test_fam.py b/tests/foreman/sys/test_fam.py index aeab1f2cc4c..ebc9d155769 100644 --- a/tests/foreman/sys/test_fam.py +++ b/tests/foreman/sys/test_fam.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: System - -:TestType: Functional - :CaseImportance: High :CaseComponent: AnsibleCollection :Team: Platform -:Upstream: No """ import pytest @@ -46,7 +41,6 @@ def test_positive_ansible_modules_installation(target_sat): :expectedresults: ansible-collection-redhat-satellite package is available and supported modules are contained - """ # list installed modules result = target_sat.execute(f'ls {FAM_MODULE_PATH} | grep .py$ | sed "s/.[^.]*$//"') @@ -72,7 +66,6 @@ def test_positive_import_run_roles(sync_roles, target_sat): :id: d3379fd3-b847-43ce-a51f-c02170e7b267 :expectedresults: fam roles import and run successfully - """ roles = sync_roles.get('roles') target_sat.cli.Host.ansible_roles_assign({'ansible-roles': roles, 'name': target_sat.hostname}) diff --git a/tests/foreman/sys/test_katello_certs_check.py b/tests/foreman/sys/test_katello_certs_check.py index 2c79c6d8850..640add5a0ae 100644 --- a/tests/foreman/sys/test_katello_certs_check.py +++ b/tests/foreman/sys/test_katello_certs_check.py @@ -4,18 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: System - :CaseComponent: Installation :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No - """ import re diff --git a/tests/foreman/sys/test_pulp3_filesystem.py b/tests/foreman/sys/test_pulp3_filesystem.py index 754d6459cff..ac747ca5f10 100644 --- a/tests/foreman/sys/test_pulp3_filesystem.py +++ b/tests/foreman/sys/test_pulp3_filesystem.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: System - :CaseComponent: Pulp :team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from datetime import datetime import json diff --git a/tests/foreman/ui/test_activationkey.py b/tests/foreman/ui/test_activationkey.py index 62599a26bc9..0e386863ff4 100644 --- a/tests/foreman/ui/test_activationkey.py +++ b/tests/foreman/ui/test_activationkey.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ActivationKeys :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import random @@ -39,8 +34,6 @@ def test_positive_end_to_end_crud(session, module_org): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') @@ -84,8 +77,6 @@ def test_positive_end_to_end_register( :expectedresults: Content host was registered successfully using activation key, association is reflected on webUI - :CaseLevel: System - :parametrized: yes :CaseImportance: High @@ -116,8 +107,6 @@ def test_positive_create_with_cv(session, module_org, cv_name, target_sat): :parametrized: yes :expectedresults: Activation key is created - - :CaseLevel: Integration """ name = gen_string('alpha') env_name = gen_string('alpha') @@ -145,8 +134,6 @@ def test_positive_search_scoped(session, module_org, target_sat): :BZ: 1259374 - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') @@ -180,8 +167,6 @@ def test_positive_create_with_host_collection(session, module_org): :id: 0e4ad2b4-47a7-4087-828f-2b0535a97b69 :expectedresults: Activation key is created - - :CaseLevel: Integration """ name = gen_string('alpha') hc = entities.HostCollection(organization=module_org).create() @@ -201,8 +186,6 @@ def test_positive_create_with_envs(session, module_org, target_sat): :id: f75e994a-6da1-40a3-9685-f8387388b3f0 :expectedresults: Activation key is created - - :CaseLevel: Integration """ name = gen_string('alpha') cv_name = gen_string('alpha') @@ -231,8 +214,6 @@ def test_positive_add_host_collection_non_admin(module_org, test_name, target_sa listed :BZ: 1473212 - - :CaseLevel: Integration """ ak_name = gen_string('alpha') hc = entities.HostCollection(organization=module_org).create() @@ -267,8 +248,6 @@ def test_positive_remove_host_collection_non_admin(module_org, test_name, target :expectedresults: Activation key is created, removed host collection is not listed - - :CaseLevel: Integration """ ak_name = gen_string('alpha') hc = entities.HostCollection(organization=module_org).create() @@ -304,8 +283,6 @@ def test_positive_delete_with_env(session, module_org, target_sat): :id: b6019881-3d6e-4b75-89f5-1b62aff3b1ca :expectedresults: Activation key is deleted - - :CaseLevel: Integration """ name = gen_string('alpha') cv_name = gen_string('alpha') @@ -328,8 +305,6 @@ def test_positive_delete_with_cv(session, module_org, target_sat): :id: 7e40e1ed-8314-406b-9451-05f64806a6e6 :expectedresults: Activation key is deleted - - :CaseLevel: Integration """ name = gen_string('alpha') cv_name = gen_string('alpha') @@ -354,8 +329,6 @@ def test_positive_update_env(session, module_org, target_sat): :id: 895cda6a-bb1e-4b94-a858-95f0be78a17b :expectedresults: Activation key is updated - - :CaseLevel: Integration """ name = gen_string('alpha') cv_name = gen_string('alpha') @@ -385,14 +358,12 @@ def test_positive_update_cv(session, module_org, cv2_name, target_sat): :parametrized: yes - :Steps: + :steps: 1. Create Activation key 2. Update the Content view with another Content view which has custom products :expectedresults: Activation key is updated - - :CaseLevel: Integration """ name = gen_string('alpha') env1_name = gen_string('alpha') @@ -424,15 +395,13 @@ def test_positive_update_rh_product(function_entitlement_manifest_org, session, :id: 9b0ac209-45de-4cc4-97e8-e191f3f37239 - :Steps: + :steps: 1. Create an activation key 2. Update the content view with another content view which has RH products :expectedresults: Activation key is updated - - :CaseLevel: Integration """ name = gen_string('alpha') env1_name = gen_string('alpha') @@ -481,8 +450,6 @@ def test_positive_add_rh_product(function_entitlement_manifest_org, session, tar :id: d805341b-6d2f-4e16-8cb4-902de00b9a6c :expectedresults: RH products are successfully associated to Activation key - - :CaseLevel: Integration """ name = gen_string('alpha') cv_name = gen_string('alpha') @@ -518,8 +485,6 @@ def test_positive_add_custom_product(session, module_org, target_sat): :expectedresults: Custom products are successfully associated to Activation key - - :CaseLevel: Integration """ name = gen_string('alpha') cv_name = gen_string('alpha') @@ -551,15 +516,13 @@ def test_positive_add_rh_and_custom_products( :id: 3d8876fa-1412-47ca-a7a4-bce2e8baf3bc - :Steps: + :steps: 1. Create Activation key 2. Associate RH product(s) to Activation Key 3. Associate custom product(s) to Activation Key :expectedresults: RH/Custom product is successfully associated to Activation key - - :CaseLevel: Integration """ name = gen_string('alpha') rh_repo = { @@ -616,8 +579,6 @@ def test_positive_fetch_product_content(function_entitlement_manifest_org, sessi assigned as Activation Key's product content :BZ: 1426386, 1432285 - - :CaseLevel: Integration """ org = function_entitlement_manifest_org rh_repo_id = target_sat.api_factory.enable_rhrepo_and_fetchid( @@ -664,8 +625,6 @@ def test_positive_access_non_admin_user(session, test_name): admin user :BZ: 1463813 - - :CaseLevel: Integration """ ak_name = gen_string('alpha') non_searchable_ak_name = gen_string('alpha') @@ -776,8 +735,6 @@ def test_positive_add_docker_repo_cv(session, module_org): :expectedresults: Content view with docker repo can be added to activation key - - :CaseLevel: Integration """ lce = entities.LifecycleEnvironment(organization=module_org).create() repo = entities.Repository( @@ -812,8 +769,6 @@ def test_positive_add_docker_repo_ccv(session, module_org): :expectedresults: Docker-based content view can be added to activation key - - :CaseLevel: Integration """ lce = entities.LifecycleEnvironment(organization=module_org).create() repo = entities.Repository( @@ -850,7 +805,7 @@ def test_positive_add_host(session, module_org, rhel6_contenthost, target_sat): :id: 886e9ea5-d917-40e0-a3b1-41254c4bf5bf - :Steps: + :steps: 1. Create Activation key 2. Create different hosts 3. Associate the hosts to Activation key @@ -858,8 +813,6 @@ def test_positive_add_host(session, module_org, rhel6_contenthost, target_sat): :expectedresults: Hosts are successfully associated to Activation key :parametrized: yes - - :CaseLevel: System """ ak = entities.ActivationKey( environment=entities.LifecycleEnvironment( @@ -886,7 +839,7 @@ def test_positive_delete_with_system(session, rhel6_contenthost, target_sat): :id: 86cd070e-cf46-4bb1-b555-e7cb42e4dc9f - :Steps: + :steps: 1. Create an Activation key 2. Register systems to it 3. Delete the Activation key @@ -894,8 +847,6 @@ def test_positive_delete_with_system(session, rhel6_contenthost, target_sat): :expectedresults: Activation key is deleted :parametrized: yes - - :CaseLevel: System """ name = gen_string('alpha') cv_name = gen_string('alpha') @@ -928,7 +879,7 @@ def test_negative_usage_limit(session, module_org, target_sat): :id: 9fe2d661-66f8-46a4-ae3f-0a9329494bdd - :Steps: + :steps: 1. Create Activation key 2. Update Usage Limit to a finite number 3. Register Systems to match the Usage Limit @@ -936,8 +887,6 @@ def test_negative_usage_limit(session, module_org, target_sat): Limit :expectedresults: System Registration fails. Appropriate error shown - - :CaseLevel: System """ name = gen_string('alpha') hosts_limit = '1' @@ -971,8 +920,6 @@ def test_positive_add_multiple_aks_to_system(session, module_org, rhel6_contenth :expectedresults: Multiple Activation keys are attached to a system :parametrized: yes - - :CaseLevel: System """ key_1_name = gen_string('alpha') key_2_name = gen_string('alpha') @@ -1035,8 +982,6 @@ def test_positive_host_associations(session, target_sat): :customerscenario: true :BZ: 1344033, 1372826, 1394388 - - :CaseLevel: System """ org = entities.Organization().create() org_entities = target_sat.cli_factory.setup_org_for_a_custom_repo( @@ -1099,8 +1044,6 @@ def test_positive_service_level_subscription_with_custom_product( :BZ: 1394357 :parametrized: yes - - :CaseLevel: System """ org = function_entitlement_manifest_org entities_ids = target_sat.cli_factory.setup_org_for_a_custom_repo( @@ -1144,15 +1087,13 @@ def test_positive_delete_manifest(session, function_entitlement_manifest_org): :id: 512d8e41-b937-451e-a9c6-840457d3d7d4 - :Steps: + :steps: 1. Create Activation key 2. Associate a manifest to the Activation Key 3. Delete the manifest :expectedresults: Deleting a manifest removes it from the Activation key - - :CaseLevel: Integration """ org = function_entitlement_manifest_org # Create activation key @@ -1191,7 +1132,7 @@ def test_positive_ak_with_custom_product_on_rhel6(session, rhel6_contenthost, ta :customerscenario: true - :Steps: + :steps: 1. Create a custom repo 2. Create ak and add custom repo to ak 3. Add subscriptions to the ak @@ -1200,8 +1141,6 @@ def test_positive_ak_with_custom_product_on_rhel6(session, rhel6_contenthost, ta :expectedresults: Host is registered successfully :bz: 2038388 - - :CaseLevel: Integration """ org = target_sat.api.Organization().create() entities_ids = target_sat.cli_factory.setup_org_for_a_custom_repo( diff --git a/tests/foreman/ui/test_ansible.py b/tests/foreman/ui/test_ansible.py index 346c3f859a9..87031155f86 100644 --- a/tests/foreman/ui/test_ansible.py +++ b/tests/foreman/ui/test_ansible.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Ansible-ConfigurationManagement :Team: Rocket -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -29,7 +24,7 @@ def test_positive_create_and_delete_variable(target_sat): :id: 7006d7c7-788a-4447-a564-d6b03ec06aaf - :Steps: + :steps: 1. Import Ansible roles if none have been imported yet. 2. Create an Ansible variable with only a name and an assigned Ansible role. @@ -60,7 +55,7 @@ def test_positive_create_variable_with_overrides(target_sat): :id: 90acea37-4c2f-42e5-92a6-0c88148f4fb6 - :Steps: + :steps: 1. Import Ansible roles if none have been imported yet. 2. Create an Anible variable, populating all fields on the creation form. @@ -166,7 +161,7 @@ def test_positive_ansible_custom_role(target_sat, session, module_org, rhel_cont :customerscenario: true - :Steps: + :steps: 1. Register a content host with satellite 2. Create a custom role and import into satellite 3. Assign that role to a host diff --git a/tests/foreman/ui/test_architecture.py b/tests/foreman/ui/test_architecture.py index bafaa89f78f..045d7f06cc6 100644 --- a/tests/foreman/ui/test_architecture.py +++ b/tests/foreman/ui/test_architecture.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - :CaseImportance: Low -:Upstream: No """ from fauxfactory import gen_string from nailgun import entities @@ -30,8 +25,6 @@ def test_positive_end_to_end(session): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') diff --git a/tests/foreman/ui/test_audit.py b/tests/foreman/ui/test_audit.py index 5b340e73b01..bb1d3cb2a8b 100644 --- a/tests/foreman/ui/test_audit.py +++ b/tests/foreman/ui/test_audit.py @@ -4,15 +4,10 @@ :CaseAutomation: Automated -:CaseLevel: Medium - :CaseComponent: AuditLog :Team: Endeavour -:TestType: Functional - -:Upstream: No """ from fauxfactory import gen_string from nailgun import entities @@ -40,8 +35,6 @@ def test_positive_create_event(session, module_org, module_location): :CaseAutomation: Automated - :CaseLevel: Integration - :CaseImportance: Medium :BZ: 1730360 @@ -87,8 +80,6 @@ def test_positive_audit_comment(session, module_org): :CaseAutomation: Automated - :CaseLevel: Component - :CaseImportance: Low """ name = gen_string('alpha') @@ -122,8 +113,6 @@ def test_positive_update_event(session, module_org): :CaseAutomation: Automated - :CaseLevel: Integration - :CaseImportance: Medium """ name = gen_string('alpha') @@ -154,8 +143,6 @@ def test_positive_delete_event(session, module_org): :CaseAutomation: Automated - :CaseLevel: Component - :CaseImportance: Medium """ architecture = entities.Architecture().create() @@ -181,8 +168,6 @@ def test_positive_add_event(session, module_org): :CaseAutomation: Automated - :CaseLevel: Integration - :CaseImportance: Medium """ cv = entities.ContentView(organization=module_org).create() diff --git a/tests/foreman/ui/test_bookmarks.py b/tests/foreman/ui/test_bookmarks.py index 71363b68643..5f10b5e877a 100644 --- a/tests/foreman/ui/test_bookmarks.py +++ b/tests/foreman/ui/test_bookmarks.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Search :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from airgun.exceptions import NoSuchElementException from airgun.session import Session @@ -71,8 +66,6 @@ def test_positive_end_to_end(session, ui_entity): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') @@ -105,7 +98,7 @@ def test_positive_create_bookmark_public(session, ui_entity, default_viewer_role :Setup: Create a non-admin user with 'viewer' role - :Steps: + :steps: 1. Navigate to the entity page 2. Choose "bookmark this search" from the search drop-down menu @@ -120,8 +113,6 @@ def test_positive_create_bookmark_public(session, ui_entity, default_viewer_role :expectedresults: No errors, public bookmarks is displayed for all users, non-public bookmark is displayed for creator but not for different user - - :CaseLevel: Integration """ public_name = gen_string('alphanumeric') nonpublic_name = gen_string('alphanumeric') @@ -151,7 +142,7 @@ def test_positive_update_bookmark_public( public and one private 2. Create a non-admin user with 'viewer' role - :Steps: + :steps: 1. Login to Satellite server (establish a UI session) as the pre-created user @@ -176,8 +167,6 @@ def test_positive_update_bookmark_public( :expectedresults: New public bookmark is listed, and the private one is hidden - - :CaseLevel: Integration """ public_name = gen_string('alphanumeric') nonpublic_name = gen_string('alphanumeric') @@ -218,15 +207,13 @@ def test_negative_delete_bookmark(ui_entity, default_viewer_role, test_name): 2. Create a non-admin user without destroy_bookmark role (e.g. viewer) - :Steps: + :steps: 1. Login to Satellite server (establish a UI session) as a non-admin user 2. List the bookmarks (Navigate to Administer -> Bookmarks) :expectedresults: The delete buttons are not displayed - - :CaseLevel: Integration """ bookmark = entities.Bookmark(controller=ui_entity['controller'], public=True).create() with Session( @@ -248,15 +235,13 @@ def test_negative_create_with_duplicate_name(session, ui_entity): 1. Create a bookmark of a random name with random query. - :Steps: + :steps: 1. Create new bookmark with duplicate name. :expectedresults: Bookmark can't be created, submit button is disabled :BZ: 1920566, 1992652 - - :CaseLevel: Integration """ query = gen_string('alphanumeric') bookmark = entities.Bookmark(controller=ui_entity['controller'], public=True).create() diff --git a/tests/foreman/ui/test_branding.py b/tests/foreman/ui/test_branding.py index 3067614e02a..a7e08659d8b 100644 --- a/tests/foreman/ui/test_branding.py +++ b/tests/foreman/ui/test_branding.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Branding :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from airgun.session import Session import pytest @@ -27,14 +22,12 @@ def test_verify_satellite_login_screen_info(target_sat): :id: f48110ad-29b4-49b1-972a-a70075a05732 - :Steps: Get the info from the login screen + :steps: Get the info from the login screen :expectedresults: 1. Correct Satellite version 2. If 'Beta' is present, should fail until a GA snap is received - :CaseLevel: System - :BZ: 1315849, 1367495, 1372436, 1502098, 1540710, 1582476, 1724738, 1959135, 2076979, 1687250, 1686540, 1742872, 1805642, 2105949 """ diff --git a/tests/foreman/ui/test_computeprofiles.py b/tests/foreman/ui/test_computeprofiles.py index 5aea38df2cf..31075e7c1fb 100644 --- a/tests/foreman/ui/test_computeprofiles.py +++ b/tests/foreman/ui/test_computeprofiles.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ComputeResources :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string from nailgun import entities @@ -30,8 +25,6 @@ def test_positive_end_to_end(session, module_location, module_org): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') diff --git a/tests/foreman/ui/test_computeresource.py b/tests/foreman/ui/test_computeresource.py index 000f95951f8..7bd9f2552ce 100644 --- a/tests/foreman/ui/test_computeresource.py +++ b/tests/foreman/ui/test_computeresource.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Integration - :CaseComponent: ComputeResources :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from nailgun import entities import pytest @@ -62,8 +57,6 @@ def test_positive_end_to_end(session, rhev_data, module_org, module_location): :expectedresults: All expected CRUD actions finished successfully. - :CaseLevel: Integration - :CaseImportance: Critical """ name = gen_string('alpha') @@ -105,8 +98,6 @@ def test_positive_add_resource(session, rhev_data): :expectedresults: resource created successfully - :CaseLevel: Integration - :CaseImportance: Critical """ # Our RHEV testing uses custom cert which we specify manually. @@ -138,8 +129,6 @@ def test_positive_edit_resource_description(session, rhev_data): :parametrized: yes :expectedresults: resource updated successfully and has new description - - :CaseLevel: Integration """ name = gen_string('alpha') description = gen_string('alpha') @@ -173,8 +162,6 @@ def test_positive_list_resource_vms(session, rhev_data): :parametrized: yes :expectedresults: VMs listed for provided compute resource - - :CaseLevel: Integration """ name = gen_string('alpha') with session: @@ -205,8 +192,6 @@ def test_positive_resource_vm_power_management(session, rhev_data): :expectedresults: virtual machine is powered on or powered off depending on its initial state - - :CaseLevel: Integration """ name = gen_string('alpha') with session: @@ -249,8 +234,6 @@ def test_positive_VM_import(session, module_org, module_location, rhev_data): :expectedresults: VM is shown as Host in Foreman - :CaseLevel: Integration - :CaseImportance: Medium :BZ: 1636067 @@ -381,8 +364,6 @@ def test_positive_image_end_to_end(session, rhev_data, module_location, target_s :expectedresults: All expected CRUD actions finished successfully. - :CaseLevel: Integration - :CaseImportance: High """ cr_name = gen_string('alpha') diff --git a/tests/foreman/ui/test_computeresource_azurerm.py b/tests/foreman/ui/test_computeresource_azurerm.py index aab0bdf6c53..36228513ffa 100644 --- a/tests/foreman/ui/test_computeresource_azurerm.py +++ b/tests/foreman/ui/test_computeresource_azurerm.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ComputeResources-Azure :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -91,7 +86,6 @@ def test_positive_end_to_end_azurerm_ft_host_provision( sat_azure_loc, module_azure_hg, ): - """Provision Host with hostgroup and Compute-profile using finish template on AzureRm compute resource @@ -101,8 +95,6 @@ def test_positive_end_to_end_azurerm_ft_host_provision( 1. Host is provisioned. 2. Host is deleted Successfully. - :CaseLevel: System - :BZ: 1850934 """ hostname = f'test-{gen_string("alpha")}' @@ -175,7 +167,6 @@ def test_positive_azurerm_host_provision_ud( sat_azure_loc, module_azure_hg, ): - """Provision a Host with hostgroup and Compute-profile using cloud-init image on AzureRm compute resource @@ -185,8 +176,6 @@ def test_positive_azurerm_host_provision_ud( :CaseImportance: Critical - :CaseLevel: System - :BZ: 1850934 """ diff --git a/tests/foreman/ui/test_computeresource_ec2.py b/tests/foreman/ui/test_computeresource_ec2.py index 94c50f69547..8f575bd4a80 100644 --- a/tests/foreman/ui/test_computeresource_ec2.py +++ b/tests/foreman/ui/test_computeresource_ec2.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ComputeResources-EC2 :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string from nailgun import entities @@ -55,7 +50,7 @@ def test_positive_default_end_to_end_with_custom_profile( :id: 33f80a8f-2ecf-4f15-b0c3-aab5fe0ac8d3 - :Steps: + :steps: 1. Create an EC2 compute resource with default properties and taxonomies. 2. Update the compute resource name and add new taxonomies. @@ -65,8 +60,6 @@ def test_positive_default_end_to_end_with_custom_profile( :expectedresults: The EC2 compute resource is created, updated, compute profile associated and deleted. - :CaseLevel: Integration - :BZ: 1451626, 2032530 :CaseImportance: High @@ -163,8 +156,6 @@ def test_positive_create_ec2_with_custom_region(session, module_ec2_settings): :BZ: 1456942 - :CaseLevel: Integration - :CaseImportance: Critical """ cr_name = gen_string('alpha') diff --git a/tests/foreman/ui/test_computeresource_gce.py b/tests/foreman/ui/test_computeresource_gce.py index d61c1fc4c01..8db2d10b385 100644 --- a/tests/foreman/ui/test_computeresource_gce.py +++ b/tests/foreman/ui/test_computeresource_gce.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ComputeResources-GCE :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import json import random @@ -43,7 +38,7 @@ def test_positive_default_end_to_end_with_custom_profile( :id: 59ffd83e-a984-4c22-b91b-cad055b4fbd7 - :Steps: + :steps: 1. Create an GCE compute resource with default properties. 2. Update the compute resource name and add new taxonomies. @@ -53,8 +48,6 @@ def test_positive_default_end_to_end_with_custom_profile( :expectedresults: The GCE compute resource is created, updated, compute profile associated and deleted. - :CaseLevel: Integration - :CaseImportance: Critical """ cr_name = gen_string('alpha') @@ -167,8 +160,6 @@ def test_positive_gce_provision_end_to_end( :id: 33542680-c23e-4d21-9cde-d0dca85b8eca :expectedresults: Host is provisioned successfully - - :CaseLevel: System """ name = f'test{gen_string("alpha", 4).lower()}' hostname = f'{name}.{gce_domain.name}' @@ -253,8 +244,6 @@ def test_positive_gce_cloudinit_provision_end_to_end( :id: 80a86cbd-5a26-41df-98b7-1f5e5af837d8 :expectedresults: Host is provisioned successfully - - :CaseLevel: System """ name = f'test{gen_string("alpha", 4).lower()}' hostname = f'{name}.{gce_domain.name}' diff --git a/tests/foreman/ui/test_computeresource_libvirt.py b/tests/foreman/ui/test_computeresource_libvirt.py index 2d05fa45bf3..6938edd2fbd 100644 --- a/tests/foreman/ui/test_computeresource_libvirt.py +++ b/tests/foreman/ui/test_computeresource_libvirt.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ComputeResources-libvirt :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from random import choice @@ -44,8 +39,6 @@ def test_positive_end_to_end(session, module_target_sat, module_org, module_loca :expectedresults: All expected CRUD actions finished successfully. - :CaseLevel: Integration - :CaseImportance: High :BZ: 1662164 @@ -144,8 +137,6 @@ def test_positive_provision_end_to_end( :expectedresults: Host is provisioned successfully - :CaseLevel: System - :customerscenario: true :BZ: 1243223, 2236693 diff --git a/tests/foreman/ui/test_computeresource_vmware.py b/tests/foreman/ui/test_computeresource_vmware.py index 66bf85252c0..bac89865a8a 100644 --- a/tests/foreman/ui/test_computeresource_vmware.py +++ b/tests/foreman/ui/test_computeresource_vmware.py @@ -8,13 +8,8 @@ :Team: Rocket -:CaseLevel: Acceptance - -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from math import floor, log10 from random import choice @@ -91,8 +86,6 @@ def test_positive_end_to_end(session, module_org, module_location): :id: 47fc9e77-5b22-46b4-a76c-3217434fde2f :expectedresults: All expected CRUD actions finished successfully. - - :CaseLevel: Integration """ cr_name = gen_string('alpha') new_cr_name = gen_string('alpha') @@ -171,8 +164,6 @@ def test_positive_retrieve_virtual_machine_list(session): 2. Go to "Virtual Machines" tab. :expectedresults: The Virtual machines should be displayed - - :CaseLevel: Integration """ cr_name = gen_string('alpha') vm_name = settings.vmware.vm_name @@ -201,8 +192,6 @@ def test_positive_image_end_to_end(session, target_sat): :id: 6b7949ef-c684-40aa-b181-11f8d4cd39c6 :expectedresults: All expected CRUD actions finished successfully. - - :CaseLevel: Integration """ cr_name = gen_string('alpha') image_name = gen_string('alpha') @@ -262,8 +251,6 @@ def test_positive_resource_vm_power_management(session): :id: faeabe45-5112-43a6-bde9-f869dfb26cf5 :expectedresults: virtual machine is powered on or powered off depending on its initial state - - :CaseLevel: Integration """ cr_name = gen_string('alpha') vm_name = settings.vmware.vm_name @@ -320,8 +307,6 @@ def test_positive_select_vmware_custom_profile_guest_os_rhel7(session): :expectedresults: Guest OS RHEL7 is selected successfully. :BZ: 1315277 - - :CaseLevel: Integration """ cr_name = gen_string('alpha') guest_os_name = 'Red Hat Enterprise Linux 7 (64-bit)' @@ -362,8 +347,6 @@ def test_positive_access_vmware_with_custom_profile(session): :expectedresults: The Compute Resource created and associated to compute profile (3-Large) with provided values. - - :CaseLevel: Integration """ cr_name = gen_string('alpha') data_store_summary_string = _get_vmware_datastore_summary_string() diff --git a/tests/foreman/ui/test_config_group.py b/tests/foreman/ui/test_config_group.py index ada7fc5b8c4..b38384d2977 100644 --- a/tests/foreman/ui/test_config_group.py +++ b/tests/foreman/ui/test_config_group.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Puppet :Team: Rocket -:TestType: Functional - :CaseImportance: Low -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -34,8 +29,6 @@ def test_positive_end_to_end(session_puppet_enabled_sat, module_puppet_class): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') diff --git a/tests/foreman/ui/test_containerimagetag.py b/tests/foreman/ui/test_containerimagetag.py index cefb1794dee..b47803cfa2d 100644 --- a/tests/foreman/ui/test_containerimagetag.py +++ b/tests/foreman/ui/test_containerimagetag.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ContainerManagement-Content :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from nailgun import entities import pytest @@ -59,7 +54,6 @@ def test_positive_search(session, module_org, module_product, module_repository) :expectedresults: The docker image tag can be searched and found, details are read - :CaseLevel: Integration """ with session: session.organization.select(org_name=module_org.name) diff --git a/tests/foreman/ui/test_contentcredentials.py b/tests/foreman/ui/test_contentcredentials.py index cff5c8aed45..abd54d534dc 100644 --- a/tests/foreman/ui/test_contentcredentials.py +++ b/tests/foreman/ui/test_contentcredentials.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ContentCredentials :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from nailgun import entities import pytest @@ -49,8 +44,6 @@ def test_positive_end_to_end(session, module_org, gpg_content): :id: d1a8cc1b-a072-465b-887d-5bca0acd21c3 :expectedresults: All expected CRUD actions finished successfully - - :CaseLevel: Integration """ name = gen_string('alpha') new_name = gen_string('alpha') @@ -123,8 +116,6 @@ def test_positive_add_empty_product(session, module_org, gpg_content): :id: e18ae9f5-43d9-4049-92ca-1eafaca05096 :expectedresults: gpg key is associated with product - - :CaseLevel: Integration """ prod_name = gen_string('alpha') gpg_key = entities.GPGKey(content=gpg_content, organization=module_org).create() @@ -146,8 +137,6 @@ def test_positive_add_product_with_repo(session, module_org, gpg_content): :expectedresults: gpg key is associated with product as well as with the repository - - :CaseLevel: Integration """ name = gen_string('alpha') gpg_key = entities.GPGKey(content=gpg_content, name=name, organization=module_org).create() @@ -179,8 +168,6 @@ def test_positive_add_product_with_repos(session, module_org, gpg_content): :id: 0edffad7-0ab4-4bef-b16b-f6c8de55b0dc :expectedresults: gpg key is properly associated with repositories - - :CaseLevel: Integration """ name = gen_string('alpha') gpg_key = entities.GPGKey(content=gpg_content, name=name, organization=module_org).create() @@ -207,8 +194,6 @@ def test_positive_add_repo_from_product_with_repo(session, module_org, gpg_conte :expectedresults: gpg key is associated with the repository but not with the product - - :CaseLevel: Integration """ name = gen_string('alpha') gpg_key = entities.GPGKey(content=gpg_content, name=name, organization=module_org).create() @@ -238,8 +223,6 @@ def test_positive_add_repo_from_product_with_repos(session, module_org, gpg_cont :expectedresults: gpg key is associated with one of the repositories but not with the product - - :CaseLevel: Integration """ name = gen_string('alpha') gpg_key = entities.GPGKey(content=gpg_content, name=name, organization=module_org).create() @@ -272,8 +255,6 @@ def test_positive_add_product_using_repo_discovery(session, gpg_path): the repositories :BZ: 1210180, 1461804, 1595792 - - :CaseLevel: Integration """ name = gen_string('alpha') product_name = gen_string('alpha') @@ -319,8 +300,6 @@ def test_positive_add_product_and_search(session, module_org, gpg_content): gpg key 'Product' tab :BZ: 1411800 - - :CaseLevel: Integration """ name = gen_string('alpha') gpg_key = entities.GPGKey(content=gpg_content, name=name, organization=module_org).create() @@ -354,8 +333,6 @@ def test_positive_update_key_for_product_using_repo_discovery(session, gpg_path) repository before/after update :BZ: 1210180, 1461804 - - :CaseLevel: Integration """ name = gen_string('alpha') new_name = gen_string('alpha') @@ -413,7 +390,6 @@ def test_positive_delete_key_for_product_using_repo_discovery(session, gpg_path) :BZ: 1210180, 1461804 - :CaseLevel: Integration """ name = gen_string('alpha') product_name = gen_string('alpha') @@ -453,8 +429,6 @@ def test_positive_update_key_for_empty_product(session, module_org, gpg_content) :expectedresults: gpg key is associated with product before/after update - - :CaseLevel: Integration """ name = gen_string('alpha') new_name = gen_string('alpha') @@ -483,8 +457,6 @@ def test_positive_update_key_for_product_with_repo(session, module_org, gpg_cont :expectedresults: gpg key is associated with product as well as with repository after update - - :CaseLevel: Integration """ name = gen_string('alpha') new_name = gen_string('alpha') @@ -515,8 +487,6 @@ def test_positive_update_key_for_product_with_repos(session, module_org, gpg_con :expectedresults: gpg key is associated with product as well as with repositories after update - - :CaseLevel: Integration """ name = gen_string('alpha') new_name = gen_string('alpha') @@ -547,8 +517,6 @@ def test_positive_update_key_for_repo_from_product_with_repo(session, module_org :expectedresults: gpg key is associated with repository after update but not with product. - - :CaseLevel: Integration """ name = gen_string('alpha') new_name = gen_string('alpha') @@ -582,8 +550,6 @@ def test_positive_update_key_for_repo_from_product_with_repos(session, module_or :expectedresults: gpg key is associated with single repository after update but not with product - - :CaseLevel: Integration """ name = gen_string('alpha') new_name = gen_string('alpha') @@ -614,7 +580,6 @@ def test_positive_delete_key_for_empty_product(session, module_org, gpg_content) :expectedresults: gpg key is associated with product during creation but removed from product after deletion - :CaseLevel: Integration """ gpg_key = entities.GPGKey(content=gpg_content, organization=module_org).create() # Creates new product and associate GPGKey with it @@ -646,7 +611,6 @@ def test_positive_delete_key_for_product_with_repo(session, module_org, gpg_cont the repository during creation but removed from product after deletion - :CaseLevel: Integration """ gpg_key = entities.GPGKey(content=gpg_content, organization=module_org).create() # Creates new product and associate GPGKey with it @@ -688,7 +652,6 @@ def test_positive_delete_key_for_product_with_repos(session, module_org, gpg_con repositories during creation but removed from product after deletion - :CaseLevel: Integration """ gpg_key = entities.GPGKey(content=gpg_content, organization=module_org).create() # Creates new product and associate GPGKey with it @@ -732,8 +695,6 @@ def test_positive_delete_key_for_repo_from_product_with_repo(session, module_org :expectedresults: gpg key is associated with single repository during creation but removed from repository after deletion - - :CaseLevel: Integration """ gpg_key = entities.GPGKey(content=gpg_content, organization=module_org).create() # Creates new product without selecting GPGkey @@ -771,8 +732,6 @@ def test_positive_delete_key_for_repo_from_product_with_repos(session, module_or deletion :BZ: 1461804 - - :CaseLevel: Integration """ # Creates New GPGKey gpg_key = entities.GPGKey(content=gpg_content, organization=module_org).create() diff --git a/tests/foreman/ui/test_contenthost.py b/tests/foreman/ui/test_contenthost.py index 7e20537f3cd..b55d296913b 100644 --- a/tests/foreman/ui/test_contenthost.py +++ b/tests/foreman/ui/test_contenthost.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Hosts-Content :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from datetime import datetime, timedelta import re @@ -120,8 +115,6 @@ def test_positive_end_to_end(session, default_location, module_repos_collection_ :expectedresults: content host details are the same as expected, package and errata installation are successful - :CaseLevel: System - :parametrized: yes :CaseImportance: Critical @@ -234,8 +227,6 @@ def test_positive_end_to_end_bulk_update(session, default_location, vm, target_s :BZ: 1712069, 1838800 :parametrized: yes - - :CaseLevel: System """ hc_name = gen_string('alpha') description = gen_string('alpha') @@ -318,8 +309,6 @@ def test_positive_search_by_subscription_status(session, default_location, vm): :BZ: 1406855, 1498827, 1495271 :parametrized: yes - - :CaseLevel: System """ with session: session.location.select(default_location.name) @@ -369,8 +358,6 @@ def test_positive_toggle_subscription_status(session, default_location, vm): :BZ: 1836868 - :CaseLevel: System - :parametrized: yes :CaseImportance: Medium @@ -427,8 +414,6 @@ def test_negative_install_package(session, default_location, vm): :expectedresults: Task finished with warning :parametrized: yes - - :CaseLevel: System """ with session: session.location.select(default_location.name) @@ -464,8 +449,6 @@ def test_positive_remove_package(session, default_location, vm): :expectedresults: Package was successfully removed :parametrized: yes - - :CaseLevel: System """ vm.download_install_rpm(settings.repos.yum_6.url, FAKE_0_CUSTOM_PACKAGE) with session: @@ -503,8 +486,6 @@ def test_positive_upgrade_package(session, default_location, vm): :expectedresults: Package was successfully upgraded :parametrized: yes - - :CaseLevel: System """ vm.run(f'yum install -y {FAKE_1_CUSTOM_PACKAGE}') with session: @@ -543,8 +524,6 @@ def test_positive_install_package_group(session, default_location, vm): :expectedresults: Package group was successfully installed :parametrized: yes - - :CaseLevel: System """ with session: session.location.select(default_location.name) @@ -584,8 +563,6 @@ def test_positive_remove_package_group(session, default_location, vm): :expectedresults: Package group was successfully removed :parametrized: yes - - :CaseLevel: System """ with session: session.location.select(default_location.name) @@ -629,8 +606,6 @@ def test_positive_search_errata_non_admin( listed :parametrized: yes - - :CaseLevel: System """ vm.run(f'yum install -y {FAKE_1_CUSTOM_PACKAGE}') with Session( @@ -684,8 +659,6 @@ def test_positive_ensure_errata_applicability_with_host_reregistered(session, de :BZ: 1463818 :parametrized: yes - - :CaseLevel: System """ vm.run(f'yum install -y {FAKE_1_CUSTOM_PACKAGE}') result = vm.run(f'rpm -q {FAKE_1_CUSTOM_PACKAGE}') @@ -744,8 +717,6 @@ def test_positive_host_re_registration_with_host_rename( :BZ: 1762793 :parametrized: yes - - :CaseLevel: System """ vm.run(f'yum install -y {FAKE_1_CUSTOM_PACKAGE}') result = vm.run(f'rpm -q {FAKE_1_CUSTOM_PACKAGE}') @@ -813,8 +784,6 @@ def test_positive_check_ignore_facts_os_setting(session, default_location, vm, m :BZ: 1155704 :parametrized: yes - - :CaseLevel: System """ major = str(gen_integer(15, 99)) minor = str(gen_integer(1, 9)) @@ -883,8 +852,6 @@ def test_positive_virt_who_hypervisor_subscription_status( :BZ: 1336924, 1860928 :parametrized: yes - - :CaseLevel: System """ org = entities.Organization().create() lce = entities.LifecycleEnvironment(organization=org).create() @@ -968,8 +935,6 @@ def test_module_stream_actions_on_content_host(session, default_location, vm_mod :expectedresults: Remote execution for module actions should succeed. :parametrized: yes - - :CaseLevel: System """ stream_version = '5.21' run_remote_command_on_content_host('dnf -y upload-profile', vm_module_streams) @@ -1090,8 +1055,6 @@ def test_module_streams_customize_action(session, default_location, vm_module_st :expectedresults: Remote execution for module actions should be succeed. - :CaseLevel: System - :parametrized: yes :CaseImportance: Medium @@ -1158,8 +1121,6 @@ def test_install_modular_errata(session, default_location, vm_module_streams): :expectedresults: Modular Errata should get installed on content host. :parametrized: yes - - :CaseLevel: System """ stream_version = '0' module_name = 'kangaroo' @@ -1239,8 +1200,6 @@ def test_module_status_update_from_content_host_to_satellite( :expectedresults: module stream status should get updated in Satellite :parametrized: yes - - :CaseLevel: System """ module_name = 'walrus' stream_version = '0.71' @@ -1306,8 +1265,6 @@ def test_module_status_update_without_force_upload_package_profile( :expectedresults: module stream status should get updated in Satellite - :CaseLevel: System - :parametrized: yes :CaseImportance: Medium @@ -1390,8 +1347,6 @@ def test_module_stream_update_from_satellite(session, default_location, vm_modul :expectedresults: module stream should get updated. :parametrized: yes - - :CaseLevel: System """ module_name = 'duck' stream_version = '0' @@ -1468,8 +1423,6 @@ def test_syspurpose_attributes_empty(session, default_location, vm_module_stream :expectedresults: Syspurpose attrs are empty, and syspurpose status is set as 'Not specified' - :CaseLevel: System - :parametrized: yes :CaseImportance: High @@ -1510,8 +1463,6 @@ def test_set_syspurpose_attributes_cli(session, default_location, vm_module_stre :expectedresults: Syspurpose attributes set for the content host - :CaseLevel: System - :parametrized: yes :CaseImportance: High @@ -1557,8 +1508,6 @@ def test_unset_syspurpose_attributes_cli(session, default_location, vm_module_st :expectedresults: Syspurpose attributes are empty - :CaseLevel: System - :parametrized: yes :CaseImportance: High @@ -1608,8 +1557,6 @@ def test_syspurpose_matched(session, default_location, vm_module_streams): :expectedresults: Syspurpose status is Matched - :CaseLevel: System - :parametrized: yes :CaseImportance: High @@ -1651,8 +1598,6 @@ def test_syspurpose_bulk_action(session, default_location, vm): :expectedresults: Syspurpose parameters are set and reflected on the host - :CaseLevel: System - :CaseImportance: High """ syspurpose_attributes = { @@ -1697,8 +1642,6 @@ def test_syspurpose_mismatched(session, default_location, vm_module_streams): :expectedresults: Syspurpose status is 'Mismatched' - :CaseLevel: System - :parametrized: yes :CaseImportance: High @@ -1784,8 +1727,6 @@ def test_search_for_virt_who_hypervisors(session, default_location): :customerscenario: true - :CaseLevel: System - :CaseImportance: Medium """ org = entities.Organization().create() diff --git a/tests/foreman/ui/test_contentview.py b/tests/foreman/ui/test_contentview.py index 74dd2a0c796..0b271e534c0 100644 --- a/tests/foreman/ui/test_contentview.py +++ b/tests/foreman/ui/test_contentview.py @@ -7,17 +7,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: ContentViews :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import datetime from random import randint @@ -78,8 +73,6 @@ def test_positive_add_custom_content(session): :expectedresults: Custom content can be seen in a view - :CaseLevel: Integration - :CaseImportance: Critical """ org = entities.Organization().create() @@ -114,8 +107,6 @@ def test_positive_end_to_end(session, module_org, target_sat): :expectedresults: content view is created, updated with repo publish and promoted to next selected env - :CaseLevel: Integration - :CaseImportance: High """ repo_name = gen_string('alpha') @@ -151,8 +142,6 @@ def test_positive_publish_version_changes_in_source_env(session, module_org): :expectedresults: Content view version is updated in source environment. - :CaseLevel: Integration - :CaseImportance: High """ lce = entities.LifecycleEnvironment(organization=module_org).create() @@ -204,8 +193,6 @@ def test_positive_repo_count_for_composite_cv(session, module_org, target_sat): :BZ: 1431778 - :CaseLevel: Integration - :CaseImportance: High """ lce = entities.LifecycleEnvironment(organization=module_org).create() @@ -253,8 +240,6 @@ def test_positive_create_composite( :expectedresults: Composite content views are created - :CaseLevel: System - :CaseImportance: High """ org = module_entitlement_manifest_org @@ -307,8 +292,6 @@ def test_positive_add_rh_content(session, function_entitlement_manifest_org, tar :expectedresults: RH Content can be seen in a view - :CaseLevel: Integration - :CaseImportance: Critical """ cv_name = gen_string('alpha') @@ -340,8 +323,6 @@ def test_positive_add_docker_repo(session, module_org, module_prod): :expectedresults: The repo is added to a non-composite content view - :CaseLevel: Integration - :CaseImportance: High """ content_view = entities.ContentView(composite=False, organization=module_org).create() @@ -364,8 +345,6 @@ def test_positive_add_docker_repos(session, module_org, module_prod): :expectedresults: The repos are added to a non-composite content view. - :CaseLevel: Integration - :CaseImportance: Low """ content_view = entities.ContentView(composite=False, organization=module_org).create() @@ -393,8 +372,6 @@ def test_positive_add_synced_docker_repo(session, module_org, module_prod): :expectedresults: Synchronized docker repository was successfully added to content view. - :CaseLevel: Integration - :CaseImportance: High """ content_view = entities.ContentView(composite=False, organization=module_org).create() @@ -419,8 +396,6 @@ def test_positive_add_docker_repo_to_ccv(session, module_org, module_prod): :expectedresults: The repository is added to a content view which is then added to a composite content view. - :CaseLevel: Integration - :CaseImportance: High """ content_view = entities.ContentView(composite=False, organization=module_org).create() @@ -447,8 +422,6 @@ def test_positive_add_docker_repos_to_ccv(session, module_org, module_prod): :expectedresults: The repository is added to a random number of content views which are then added to a composite content view. - :CaseLevel: Integration - :CaseImportance: Low """ cvs = [] @@ -482,8 +455,6 @@ def test_positive_publish_with_docker_repo(session, module_org, module_prod): :expectedresults: The repo is added to a content view which is then successfully published. - :CaseLevel: Integration - :CaseImportance: High """ content_view = entities.ContentView(composite=False, organization=module_org).create() @@ -508,8 +479,6 @@ def test_positive_publish_with_docker_repo_composite(session, module_org, module which is then published only once and then added to a composite content view which is also published only once. - :CaseLevel: Integration - :CaseImportance: High """ repo = entities.Repository( @@ -537,8 +506,6 @@ def test_positive_publish_multiple_with_docker_repo(session, module_org, module_ :expectedresults: Content view with docker repo is successfully published multiple times. - :CaseLevel: Integration - :CaseImportance: Low """ repo = entities.Repository( @@ -562,8 +529,6 @@ def test_positive_publish_multiple_with_docker_repo_composite(session, module_or :expectedresults: Composite content view with docker repo is successfully published multiple times. - :CaseLevel: Integration - :CaseImportance: Low """ repo = entities.Repository( @@ -591,8 +556,6 @@ def test_positive_promote_with_docker_repo(session, module_org, module_prod): :expectedresults: Docker repository is promoted to content view found in the specific lifecycle-environment. - :CaseLevel: Integration - :CaseImportance: High """ lce = entities.LifecycleEnvironment(organization=module_org).create() @@ -619,8 +582,6 @@ def test_positive_promote_multiple_with_docker_repo(session, module_org, module_ :expectedresults: Docker repository is promoted to content view found in the specific lifecycle-environments. - :CaseLevel: Integration - :CaseImportance: Low """ repo = entities.Repository( @@ -648,8 +609,6 @@ def test_positive_promote_with_docker_repo_composite(session, module_org, module :expectedresults: Docker repository is promoted to content view found in the specific lifecycle-environment. - :CaseLevel: Integration - :CaseImportance: High """ lce = entities.LifecycleEnvironment(organization=module_org).create() @@ -682,8 +641,6 @@ def test_positive_promote_multiple_with_docker_repo_composite(session, module_or :expectedresults: Docker repository is promoted to content view found in the specific lifecycle-environments. - :CaseLevel: Integration - :CaseImportance: Low """ repo = entities.Repository( @@ -714,8 +671,6 @@ def test_negative_add_components_to_non_composite(session): :expectedresults: User cannot add components to the view - :CaseLevel: Integration - :CaseImportance: Low """ cv1_name = gen_string('alpha') @@ -744,8 +699,6 @@ def test_positive_add_unpublished_cv_to_composite(session): :expectedresults: Non-composite content view is added to composite one - :CaseLevel: Integration - :CaseImportance: Low :BZ: 1367123 @@ -788,8 +741,6 @@ def test_positive_add_non_composite_cv_to_composite(session): composite content view. 3. Composite content view is successfully published - :CaseLevel: Integration - :BZ: 1367123 :CaseImportance: High @@ -835,8 +786,6 @@ def test_positive_check_composite_cv_addition_list_versions(session): :expectedresults: second non-composite content view version should be listed as default one to be added to composite view - :CaseLevel: Integration - :BZ: 1411074 :CaseImportance: Low @@ -874,8 +823,6 @@ def test_negative_add_dupe_repos(session, module_org, target_sat): :expectedresults: User cannot add repos multiple times to the view - :CaseLevel: Integration - :CaseImportance: Low """ cv_name = gen_string('alpha') @@ -902,8 +849,6 @@ def test_positive_publish_with_custom_content(session, module_org, target_sat): :expectedresults: Content view can be published - :CaseLevel: Integration - :CaseImportance: Critical """ repo_name = gen_string('alpha') @@ -931,8 +876,6 @@ def test_positive_publish_with_rh_content(session, function_entitlement_manifest :expectedresults: Content view can be published - :CaseLevel: Integration - :CaseImportance: Critical """ cv_name = gen_string('alpha') @@ -971,8 +914,6 @@ def test_positive_publish_composite_with_custom_content( :expectedresults: Composite content view can be published - :CaseLevel: Integration - :CaseImportance: High """ cv1_name = gen_string('alpha') @@ -1063,8 +1004,6 @@ def test_positive_publish_version_changes_in_target_env(session, module_org, tar :expectedresults: Content view version is updated in target environment. - :CaseLevel: Integration - :CaseImportance: High """ cv_name = gen_string('alpha') @@ -1115,8 +1054,6 @@ def test_positive_promote_with_custom_content(session, module_org, target_sat): :expectedresults: Content view can be promoted - :CaseLevel: Integration - :BZ: 1361793 :CaseImportance: Critical @@ -1160,8 +1097,6 @@ def test_positive_promote_with_rh_content(session, function_entitlement_manifest :expectedresults: Content view can be promoted - :CaseLevel: System - :CaseImportance: Critical """ cv_name = gen_string('alpha') @@ -1203,8 +1138,6 @@ def test_positive_promote_composite_with_custom_content( :expectedresults: Composite content view can be promoted - :CaseLevel: Integration - :CaseImportance: High """ cv1_name = gen_string('alpha') @@ -1335,8 +1268,6 @@ def test_negative_add_same_package_filter_twice(session, module_org, target_sat) :expectedresults: Same package filter can not be added again - :CaseLevel: Integration - :CaseImportance: High """ cv_name = gen_string('alpha') @@ -1382,8 +1313,6 @@ def test_positive_remove_cv_version_from_default_env(session, module_org, target :expectedresults: content view version is removed from Library environment - :CaseLevel: Integration - :CaseImportance: Critical """ cv_name = gen_string('alpha') @@ -1425,8 +1354,6 @@ def test_positive_remove_promoted_cv_version_from_default_env(session, module_or 1. Content view version exist only in DEV and not in Library 2. The yum repos exists in content view version - :CaseLevel: Integration - :CaseImportance: High """ repo = target_sat.cli_factory.RepositoryCollection( @@ -1471,8 +1398,6 @@ def test_positive_remove_qe_promoted_cv_version_from_default_env(session, module :expectedresults: Content view version exist only in DEV, QE and not in Library - :CaseLevel: Integration - :CaseImportance: Low """ dev_lce = entities.LifecycleEnvironment(organization=module_org).create() @@ -1542,8 +1467,6 @@ def test_positive_remove_cv_version_from_env(session, module_org, repos_collecti :expectedresults: Content view version exist in Library, DEV, QE - :CaseLevel: Integration - :CaseImportance: High """ dev_lce = entities.LifecycleEnvironment(organization=module_org).create() @@ -1600,8 +1523,6 @@ def test_positive_delete_cv_promoted_to_multi_env(session, module_org, target_sa :expectedresults: The content view doesn't exists. - :CaseLevel: Integration - :CaseImportance:High """ repo = target_sat.cli_factory.RepositoryCollection( @@ -1635,8 +1556,6 @@ def test_positive_delete_composite_version(session, module_org, target_sat): :expectedresults: Deletion was performed successfully - :CaseLevel: Integration - :BZ: 1276479 :CaseImportance: High @@ -1673,8 +1592,6 @@ def test_positive_delete_non_default_version(session, target_sat): :expectedresults: Deletion was performed successfully - :CaseLevel: Integration - :CaseImportance: Critical """ repo_name = gen_string('alpha') @@ -1707,8 +1624,6 @@ def test_positive_delete_version_with_ak(session): :expectedresults: Delete operation was performed successfully - :CaseLevel: Integration - :CaseImportance: High """ org = entities.Organization().create() @@ -1748,8 +1663,6 @@ def test_positive_clone_within_same_env(session, module_org, target_sat): :BZ: 1461017 - :CaseLevel: Integration - :CaseImportance: High """ repo_name = gen_string('alpha') @@ -1781,8 +1694,6 @@ def test_positive_clone_within_diff_env(session, module_org, target_sat): :BZ: 1461017 - :CaseLevel: Integration - :CaseImportance: High """ repo_name = gen_string('alpha') @@ -1821,8 +1732,6 @@ def test_positive_remove_filter(session, module_org): :expectedresults: content views filter removed successfully - :CaseLevel: Integration - :CaseImportance: Low """ filter_name = gen_string('alpha') @@ -1850,8 +1759,6 @@ def test_positive_add_package_filter(session, module_org, target_sat): :expectedresults: content views filter created and selected packages can be added for inclusion - :CaseLevel: Integration - :CaseImportance: High """ packages = ( @@ -1894,8 +1801,6 @@ def test_positive_add_package_inclusion_filter_and_publish(session, module_org, :expectedresults: Package is included in content view version - :CaseLevel: Integration - :CaseImportance: High """ filter_name = gen_string('alpha') @@ -1940,8 +1845,6 @@ def test_positive_add_package_exclusion_filter_and_publish(session, module_org, :expectedresults: Package is excluded from content view version - :CaseLevel: Integration - :CaseImportance: High """ filter_name = gen_string('alpha') @@ -1987,8 +1890,6 @@ def test_positive_remove_package_from_exclusion_filter(session, module_org, targ :expectedresults: Package was successfully removed from content view filter and is present in next published content view version - :CaseLevel: Integration - :CaseImportance: High """ filter_name = gen_string('alpha') @@ -2036,8 +1937,6 @@ def test_positive_update_inclusive_filter_package_version(session, module_org, t :expectedresults: Version was updated, next content view version contains package with updated version - :CaseLevel: Integration - :CaseImportance: High """ filter_name = gen_string('alpha') @@ -2100,8 +1999,6 @@ def test_positive_update_exclusive_filter_package_version(session, module_org, t :expectedresults: Version was updated, next content view version contains package with updated version - :CaseLevel: Integration - :CaseImportance: High """ filter_name = gen_string('alpha') @@ -2216,8 +2113,6 @@ def test_positive_edit_rh_custom_spin(session, target_sat): :expectedresults: edited content view save is successful and info is updated - :CaseLevel: System - :CaseImportance: High """ filter_name = gen_string('alpha') @@ -2277,8 +2172,6 @@ def test_positive_promote_with_rh_custom_spin(session, target_sat): :expectedresults: Content view can be promoted - :CaseLevel: Integration - :CaseImportance: Critical """ filter_name = gen_string('alpha') @@ -2369,8 +2262,6 @@ def test_positive_add_errata_filter(session, module_org, target_sat): :expectedresults: content views filter created and selected errata-id can be added for inclusion/exclusion - :CaseLevel: Integration - :CaseImportance: High """ filter_name = gen_string('alpha') @@ -2408,8 +2299,6 @@ def test_positive_add_module_stream_filter(session, module_org, target_sat): :expectedresults: content views filter created and selected module stream can be added for inclusion/exclusion - :CaseLevel: Integration - :CaseImportance: High """ filter_name = gen_string('alpha') @@ -2449,8 +2338,6 @@ def test_positive_add_package_group_filter(session, module_org, target_sat): :expectedresults: content views filter created and selected package groups can be added for inclusion/exclusion - :CaseLevel: Integration - :CaseImportance: Low """ filter_name = gen_string('alpha') @@ -2485,8 +2372,6 @@ def test_positive_update_filter_affected_repos(session, module_org, target_sat): version publishing only updated repos are affected by content view filter - :CaseLevel: Integration - :CaseImportance: High """ filter_name = gen_string('alpha') @@ -2551,8 +2436,6 @@ def test_positive_search_composite(session): :BZ: 1259374 - :CaseLevel: Integration - :CaseImportance: Low """ composite_name = gen_string('alpha') @@ -2585,8 +2468,6 @@ def test_positive_publish_with_repo_with_disabled_http(session, module_org, targ :BZ: 1355752 - :CaseLevel: Integration - :CaseImportance: Low """ repo_name = gen_string('alpha') @@ -2632,8 +2513,6 @@ def test_positive_subscribe_system_with_custom_content( :expectedresults: Systems can be subscribed to content view(s) - :CaseLevel: Integration - :parametrized: yes :CaseImportance: High @@ -2668,8 +2547,6 @@ def test_positive_delete_with_kickstart_repo_and_host_group( :BZ: 1417072 - :CaseLevel: Integration - :CaseImportance: High """ hg_name = gen_string('alpha') @@ -2745,8 +2622,6 @@ def test_positive_rh_mixed_content_end_to_end( :expectedresults: CV should be published and promoted with RH OSTree and all other contents. Then version is removed successfully. - :CaseLevel: System - :customerscenario: true :CaseImportance: High @@ -2801,7 +2676,6 @@ def test_positive_errata_inc_update_list_package(session, target_sat): :CaseImportance: High - :CaseLevel: Integration """ org = entities.Organization().create() product = entities.Product(organization=org).create() @@ -2889,7 +2763,6 @@ def test_positive_composite_child_inc_update(session, rhel7_contenthost, target_ :parametrized: yes - :CaseLevel: Integration """ org = entities.Organization().create() lce = entities.LifecycleEnvironment(organization=org).create() @@ -2983,8 +2856,6 @@ def test_positive_module_stream_end_to_end(session, module_org, target_sat): :expectedresults: Content view works properly with module_streams and count shown should be correct - :CaseLevel: Integration - :CaseImportance: Medium """ repo_name = gen_string('alpha') @@ -3026,8 +2897,6 @@ def test_positive_search_module_streams_in_content_view(session, module_org, tar :expectedresults: Searching for module streams should work inside content view version - :CaseLevel: Integration - :CaseImportance: Low """ repo_name = gen_string('alpha') @@ -3070,8 +2939,6 @@ def test_positive_non_admin_user_actions(session, module_org, test_name, target_ :BZ: 1461017 - :CaseLevel: Integration - :CaseImportance: Critical """ # note: the user to be created should not have permissions to access @@ -3161,8 +3028,6 @@ def test_positive_readonly_user_actions(module_org, test_name, target_sat): :expectedresults: User with read-only role for content view can view the repository in the content view - :CaseLevel: Integration - :CaseImportance: Critical """ user_login = gen_string('alpha') @@ -3215,8 +3080,6 @@ def test_negative_read_only_user_actions(session, module_org, test_name, target_ :BZ: 1922134 - :CaseLevel: Integration - :CaseImportance: Critical """ # create a content view read only user with lifecycle environment @@ -3319,8 +3182,6 @@ def test_negative_non_readonly_user_actions(module_org, test_name, target_sat): :expectedresults: the user cannot access content views web resources - :CaseLevel: Integration - :CaseImportance: High """ user_login = gen_string('alpha') @@ -3741,7 +3602,6 @@ def test_positive_no_duplicate_key_violate_unique_constraint_using_filters( :CaseImportance: Medium - :CaseLevel: Integration """ cv = gen_string('alpha') filter_name = gen_string('alpha') diff --git a/tests/foreman/ui/test_dashboard.py b/tests/foreman/ui/test_dashboard.py index 464c9142ae0..7b2ee6d2a10 100644 --- a/tests/foreman/ui/test_dashboard.py +++ b/tests/foreman/ui/test_dashboard.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Dashboard :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from airgun.session import Session from nailgun import entities @@ -35,7 +30,7 @@ def test_positive_host_configuration_status(session): :customerscenario: true - :Steps: + :steps: 1. Navigate to Monitor -> Dashboard 2. Review the Host Configuration Status @@ -45,8 +40,6 @@ def test_positive_host_configuration_status(session): :expectedresults: Each link shows the right info :BZ: 1631219 - - :CaseLevel: Integration """ org = entities.Organization().create() loc = entities.Location().create() @@ -106,15 +99,13 @@ def test_positive_host_configuration_chart(session): :id: b03314aa-4394-44e5-86da-c341c783003d - :Steps: + :steps: 1. Navigate to Monitor -> Dashboard 2. Review the Host Configuration Chart widget 3. Check that chart contains correct percentage value :expectedresults: Chart showing correct data - - :CaseLevel: Integration """ org = entities.Organization().create() loc = entities.Location().create() @@ -135,7 +126,7 @@ def test_positive_task_status(session): :id: fb667d6a-7255-4341-9f79-2f03d19e8e0f - :Steps: + :steps: 1. Navigate to Monitor -> Dashboard 2. Review the Latest Warning/Error Tasks widget @@ -148,8 +139,6 @@ def test_positive_task_status(session): from Tasks dashboard :BZ: 1718889 - - :CaseLevel: Integration """ url = 'www.non_existent_repo_url.org' org = entities.Organization().create() @@ -214,7 +203,7 @@ def test_positive_user_access_with_host_filter( :id: 24b4b371-cba0-4bc8-bc6a-294c62e0586d - :Steps: + :steps: 1. Specify proper filter with permission for your role 2. Create new user and assign role to it @@ -228,8 +217,6 @@ def test_positive_user_access_with_host_filter( :BZ: 1417114 :parametrized: yes - - :CaseLevel: System """ user_login = gen_string('alpha') user_password = gen_string('alphanumeric') @@ -277,12 +264,11 @@ def test_positive_user_access_with_host_filter( @pytest.mark.tier2 @pytest.mark.skipif((not settings.robottelo.REPOS_HOSTING_URL), reason='Missing repos_hosting_url') def test_positive_sync_overview_widget(session, module_org, module_product): - """Check if the Sync Overview widget is working in the Dashboard UI :id: 553fbe33-0f6f-46fb-8d80-5d1d9ed483cf - :Steps: + :steps: 1. Sync some repositories 2. Navigate to Monitor -> Dashboard 3. Review the Sync Overview widget @@ -290,8 +276,6 @@ def test_positive_sync_overview_widget(session, module_org, module_product): :expectedresults: Correct data should appear in the widget :BZ: 1995424 - - :CaseLevel: Integration """ repo = entities.Repository(url=settings.repos.yum_1.url, product=module_product).create() with session: diff --git a/tests/foreman/ui/test_discoveredhost.py b/tests/foreman/ui/test_discoveredhost.py index 761d391379d..8a92595789c 100644 --- a/tests/foreman/ui/test_discoveredhost.py +++ b/tests/foreman/ui/test_discoveredhost.py @@ -8,11 +8,6 @@ :Team: Rocket -:TestType: Functional - -:CaseLevel: System - -:Upstream: No """ from fauxfactory import gen_ipaddr, gen_string from nailgun import entities diff --git a/tests/foreman/ui/test_discoveryrule.py b/tests/foreman/ui/test_discoveryrule.py index bdad529f447..cea1513e1c3 100644 --- a/tests/foreman/ui/test_discoveryrule.py +++ b/tests/foreman/ui/test_discoveryrule.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: System - :CaseComponent: DiscoveryPlugin :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from airgun.session import Session from fauxfactory import gen_integer, gen_ipaddr, gen_string @@ -92,7 +87,6 @@ def test_positive_create_rule_with_non_admin_user(manager_loc, manager_user, mod :expectedresults: Rule should be created successfully. - :CaseLevel: Integration """ name = gen_string('alpha') search = gen_string('alpha') @@ -120,7 +114,6 @@ def test_positive_delete_rule_with_non_admin_user(manager_loc, manager_user, mod :expectedresults: Rule should be deleted successfully. - :CaseLevel: Integration """ hg = entities.HostGroup(organization=[module_org]).create() dr = entities.DiscoveryRule( @@ -151,7 +144,6 @@ def test_positive_view_existing_rule_with_non_admin_user( :expectedresults: Rule should be visible to non-admin user. - :CaseLevel: Integration """ hg = entities.HostGroup(organization=[module_org]).create() dr = entities.DiscoveryRule( @@ -172,8 +164,6 @@ def test_negative_delete_rule_with_non_admin_user( :expectedresults: User should validation error and rule should not be deleted successfully. - - :CaseLevel: Integration """ hg = entities.HostGroup(organization=[module_org]).create() dr = entities.DiscoveryRule( @@ -197,7 +187,7 @@ def test_positive_list_host_based_on_rule_search_query( :id: f7473fa2-7349-42d3-9cdb-f74b55d2f440 - :Steps: + :steps: 1. discovered host with cpu_count = 2 2. Define a rule 'rule1' with search query cpu_count = 2 diff --git a/tests/foreman/ui/test_domain.py b/tests/foreman/ui/test_domain.py index 32c91482153..4f7594e6e74 100644 --- a/tests/foreman/ui/test_domain.py +++ b/tests/foreman/ui/test_domain.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string from nailgun import entities @@ -40,8 +35,6 @@ def test_positive_set_parameter(session, valid_domain_name, param_value): :parametrized: yes :expectedresults: Domain parameter is created. - - :CaseLevel: Integration """ new_param = {'name': gen_string('alpha', 255), 'value': param_value} with session: @@ -62,8 +55,6 @@ def test_negative_set_parameter(session, valid_domain_name): :expectedresults: Domain parameter is not updated. Error is raised - :CaseLevel: Integration - :CaseImportance: Medium """ update_values = { @@ -85,8 +76,6 @@ def test_negative_set_parameter_same(session, valid_domain_name): :expectedresults: Domain parameter with same values is not created. - :CaseLevel: Integration - :CaseImportance: Medium """ param_name = gen_string('alpha') @@ -108,8 +97,6 @@ def test_positive_remove_parameter(session, valid_domain_name): :expectedresults: Domain parameter is removed - :CaseLevel: Integration - :CaseImportance: Medium """ param_name = gen_string('alpha') @@ -132,8 +119,6 @@ def test_positive_end_to_end(session, module_org, module_location, valid_domain_ :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ dns_domain_name = valid_domain_name diff --git a/tests/foreman/ui/test_errata.py b/tests/foreman/ui/test_errata.py index b4dbd4bb300..9c97f93ff5c 100644 --- a/tests/foreman/ui/test_errata.py +++ b/tests/foreman/ui/test_errata.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ErrataManagement :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from airgun.session import Session from broker import Broker @@ -199,8 +194,6 @@ def test_end_to_end( :BZ: 2029192 :customerscenario: true - - :CaseLevel: System """ ERRATA_DETAILS = { 'advisory': 'RHSA-2012:0055', @@ -271,7 +264,7 @@ def test_content_host_errata_page_pagination(session, function_org_with_paramete :id: 6363eda7-a162-4a4a-b70f-75decbd8202e - :Steps: + :steps: 1. Install more than 20 packages that need errata 2. View Content Host's Errata page 3. Assert total_pages > 1 @@ -293,8 +286,6 @@ def test_content_host_errata_page_pagination(session, function_org_with_paramete :customerscenario: true :BZ: 1662254, 1846670 - - :CaseLevel: System """ org = function_org_with_parameter @@ -358,15 +349,13 @@ def test_positive_list(session, function_org_with_parameter, lce, target_sat): :Setup: Errata synced on satellite server. - :Steps: Create two Orgs each having a product synced which contains errata. + :steps: Create two Orgs each having a product synced which contains errata. :expectedresults: Check that the errata belonging to one Org is not showing in the other. :BZ: 1659941, 1837767 :customerscenario: true - - :CaseLevel: Integration """ org = function_org_with_parameter rc = target_sat.cli_factory.RepositoryCollection( @@ -412,12 +401,10 @@ def test_positive_list_permission( 2. Make sure that they both have errata. 3. Create a user with view access on one product and not on the other. - :Steps: Go to Content -> Errata. + :steps: Go to Content -> Errata. :expectedresults: Check that the new user is able to see errata for one product only. - - :CaseLevel: Integration """ module_org = module_org_with_parameter role = entities.Role().create() @@ -469,15 +456,13 @@ def test_positive_apply_for_all_hosts( :customerscenario: true - :Steps: + :steps: 1. Go to Content -> Errata. Select an erratum -> Content Hosts tab. 2. Select all Content Hosts and apply the erratum. :expectedresults: Check that the erratum is applied in all the content hosts. - - :CaseLevel: System """ with Broker( nick=module_repos_collection_with_setup.distro, host_class=ContentHost, _count=2 @@ -523,14 +508,12 @@ def test_positive_view_cve(session, module_repos_collection_with_setup): :Setup: Errata synced on satellite server. - :Steps: Go to Content -> Errata. Select an Errata. + :steps: Go to Content -> Errata. Select an Errata. :expectedresults: 1. Check if the CVE information is shown in Errata Details page. 2. Check if 'N/A' is displayed if CVE information is not present. - - :CaseLevel: Integration """ with session: errata_values = session.errata.read(RHVA_ERRATA_ID) @@ -569,12 +552,10 @@ def test_positive_filter_by_environment( :Setup: Errata synced on satellite server. - :Steps: Go to Content -> Errata. Select an Errata -> Content Hosts tab + :steps: Go to Content -> Errata. Select an Errata -> Content Hosts tab -> Filter content hosts by Environment. :expectedresults: Content hosts can be filtered by Environment. - - :CaseLevel: System """ module_org = module_org_with_parameter with Broker( @@ -646,14 +627,12 @@ def test_positive_content_host_previous_env( 1. Make sure multiple environments are present. 2. Content host's previous environments have additional errata. - :Steps: Go to Content Hosts -> Select content host -> Errata Tab -> + :steps: Go to Content Hosts -> Select content host -> Errata Tab -> Select Previous environments. :expectedresults: The errata from previous environments are displayed. :parametrized: yes - - :CaseLevel: System """ module_org = module_org_with_parameter hostname = vm.hostname @@ -705,13 +684,11 @@ def test_positive_content_host_library(session, module_org_with_parameter, vm): 1. Make sure multiple environments are present. 2. Content host's Library environment has additional errata. - :Steps: Go to Content Hosts -> Select content host -> Errata Tab -> Select 'Library'. + :steps: Go to Content Hosts -> Select content host -> Errata Tab -> Select 'Library'. :expectedresults: The errata from Library are displayed. :parametrized: yes - - :CaseLevel: System """ hostname = vm.hostname assert _install_client_package(vm, FAKE_1_CUSTOM_PACKAGE, errata_applicability=True) @@ -745,14 +722,12 @@ def test_positive_content_host_search_type(session, erratatype_vm): :customerscenario: true - :Steps: Search for errata on content host by type (e.g. 'type = security') + :steps: Search for errata on content host by type (e.g. 'type = security') Step 1 Search for "type = security", assert expected amount and IDs found Step 2 Search for "type = bugfix", assert expected amount and IDs found Step 3 Search for "type = enhancement", assert expected amount and IDs found :BZ: 1653293 - - :CaseLevel: Integration """ pkgs = ' '.join(FAKE_9_YUM_OUTDATED_PACKAGES) @@ -820,15 +795,13 @@ def test_positive_show_count_on_content_host_page( 1. Errata synced on satellite server. 2. Some content hosts are present. - :Steps: Go to Hosts -> Content Hosts. + :steps: Go to Hosts -> Content Hosts. :expectedresults: The available errata count is displayed. :BZ: 1484044, 1775427 :customerscenario: true - - :CaseLevel: System """ vm = erratatype_vm hostname = vm.hostname @@ -878,13 +851,11 @@ def test_positive_show_count_on_content_host_details_page( 1. Errata synced on satellite server. 2. Some content hosts are present. - :Steps: Go to Hosts -> Content Hosts -> Select Content Host -> Details page. + :steps: Go to Hosts -> Content Hosts -> Select Content Host -> Details page. :expectedresults: The errata section should be displayed with Security, Bug fix, Enhancement. :BZ: 1484044 - - :CaseLevel: System """ vm = erratatype_vm hostname = vm.hostname @@ -924,7 +895,7 @@ def test_positive_filtered_errata_status_installable_param( :id: ed94cf34-b8b9-4411-8edc-5e210ea6af4f - :Steps: + :steps: 1. Prepare setup: Create Lifecycle Environment, Content View, Activation Key and all necessary repos @@ -940,8 +911,6 @@ def test_positive_filtered_errata_status_installable_param( :BZ: 1368254, 2013093 :CaseImportance: Medium - - :CaseLevel: System """ org = function_entitlement_manifest_org lce = entities.LifecycleEnvironment(organization=org).create() @@ -1042,7 +1011,7 @@ def test_content_host_errata_search_commands( :customerscenario: true - :Steps: + :steps: 1. host list --search "errata_status = security_needed" 2. host list --search "errata_status = errata_needed" 3. host list --search "applicable_errata = RHSA-2012:0055" diff --git a/tests/foreman/ui/test_hardwaremodel.py b/tests/foreman/ui/test_hardwaremodel.py index ce3203a2446..38ab302dfcf 100644 --- a/tests/foreman/ui/test_hardwaremodel.py +++ b/tests/foreman/ui/test_hardwaremodel.py @@ -4,15 +4,10 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - -:Upstream: No """ from fauxfactory import gen_string from nailgun import entities @@ -22,15 +17,12 @@ @pytest.mark.tier2 @pytest.mark.upgrade def test_positive_end_to_end(session, host_ui_options): - """Perform end to end testing for hardware model component :id: 93663cc9-7c8f-4f43-8050-444be1313bed :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: Medium :BZ:1758260 diff --git a/tests/foreman/ui/test_host.py b/tests/foreman/ui/test_host.py index d4ddb6b6438..af9978b6c95 100644 --- a/tests/foreman/ui/test_host.py +++ b/tests/foreman/ui/test_host.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import copy import csv @@ -132,8 +127,6 @@ def test_positive_end_to_end(session, module_global_params, target_sat, host_ui_ and deleted. :BZ: 1419161 - - :CaseLevel: System """ api_values, host_name = host_ui_options global_params = [ @@ -194,8 +187,6 @@ def test_positive_read_from_details_page(session, module_host_template): :id: ffba5d40-918c-440e-afbb-6b910db3a8fb :expectedresults: Host is created and has expected content - - :CaseLevel: System """ template = module_host_template @@ -228,8 +219,6 @@ def test_positive_read_from_edit_page(session, host_ui_options): :id: 758fcab3-b363-4bfc-8f5d-173098a7e72d :expectedresults: Host is created and has expected content - - :CaseLevel: System """ api_values, host_name = host_ui_options with session: @@ -277,8 +266,6 @@ def test_positive_assign_taxonomies( :expectedresults: Host Assign Organization and Location actions are working as expected. - - :CaseLevel: Integration """ host = target_sat.api.Host(organization=module_org, location=smart_proxy_location).create() with session: @@ -340,8 +327,6 @@ def test_positive_assign_compliance_policy(session, scap_policy, target_sat, fun expected. :BZ: 1862135 - - :CaseLevel: Integration """ org = function_host.organization.read() loc = function_host.location.read() @@ -393,8 +378,6 @@ def test_positive_export(session, target_sat, function_org, function_location): :id: ffc512ad-982e-4b60-970a-41e940ebc74c :expectedresults: csv file contains same values as on web UI - - :CaseLevel: System """ hosts = [ target_sat.api.Host(organization=function_org, location=function_location).create() @@ -464,9 +447,6 @@ def test_negative_delete_primary_interface(session, host_ui_options): :BZ: 1417119 :expectedresults: Interface was not deleted - - - :CaseLevel: System """ values, host_name = host_ui_options interface_id = values['interfaces.interface.device_identifier'] @@ -493,8 +473,6 @@ def test_positive_view_hosts_with_non_admin_user( :expectedresults: user with only view_hosts, edit_hosts and view_organization permissions is able to read content hosts and hosts - - :CaseLevel: System """ user_password = gen_string('alpha') role = target_sat.api.Role(organization=[module_org]).create() @@ -532,8 +510,6 @@ def test_positive_remove_parameter_non_admin_user( :expectedresults: user with sufficient permissions may remove host parameter - - :CaseLevel: System """ user_password = gen_string('alpha') parameter = {'name': gen_string('alpha'), 'value': gen_string('alpha')} @@ -588,8 +564,6 @@ def test_negative_remove_parameter_non_admin_user( :expectedresults: user with insufficient permissions is unable to remove host parameter, 'Remove' link is not visible for him - - :CaseLevel: System """ user_password = gen_string('alpha') @@ -644,8 +618,6 @@ def test_positive_check_permissions_affect_create_procedure( entities for create host procedure that he has access to :BZ: 1293716 - - :CaseLevel: System """ # Create two lifecycle environments lc_env = target_sat.api.LifecycleEnvironment(organization=function_org).create() @@ -760,8 +732,6 @@ def test_positive_search_by_parameter(session, module_org, smart_proxy_location, :expectedresults: Only one specific host is returned by search :BZ: 1725686 - - :CaseLevel: Integration """ param_name = gen_string('alpha') param_value = gen_string('alpha') @@ -795,8 +765,6 @@ def test_positive_search_by_parameter_with_different_values( :expectedresults: Only one specific host is returned by search :BZ: 1725686 - - :CaseLevel: Integration """ param_name = gen_string('alpha') param_values = [gen_string('alpha'), gen_string('alphanumeric')] @@ -831,8 +799,6 @@ def test_positive_search_by_parameter_with_prefix( :expectedresults: All assigned hosts to organization are returned by search - - :CaseLevel: Integration """ param_name = gen_string('alpha') param_value = gen_string('alpha') @@ -870,8 +836,6 @@ def test_positive_search_by_parameter_with_operator( search :BZ: 1463806 - - :CaseLevel: Integration """ param_name = gen_string('alpha') param_value = gen_string('alpha') @@ -912,8 +876,6 @@ def test_positive_search_with_org_and_loc_context( :BZ: 1405496 :customerscenario: true - - :CaseLevel: Integration """ host = target_sat.api.Host(organization=function_org, location=function_location).create() with session: @@ -937,8 +899,6 @@ def test_positive_search_by_org(session, smart_proxy_location, target_sat): result is returned :BZ: 1447958 - - :CaseLevel: Integration """ host = target_sat.api.Host(location=smart_proxy_location).create() org = host.organization.read() @@ -958,9 +918,9 @@ def test_positive_validate_inherited_cv_lce(session, target_sat, module_host_tem :expectedresults: Host's lifecycle environment and content view match the ones specified in hostgroup. - :CaseLevel: Integration + :customerscenario: true - :BZ: 1391656 + :BZ: 1391656, 2094912 """ cv_name = gen_string('alpha') lce_name = gen_string('alphanumeric') @@ -1013,8 +973,6 @@ def test_positive_global_registration_form( :customerscenario: true :expectedresults: The curl command contains all required parameters - - :CaseLevel: Integration """ # rex and insights parameters are only specified in curl when differing from # inerited parameters @@ -1089,8 +1047,6 @@ def test_positive_global_registration_end_to_end( client work out of the box :parametrized: yes - - :CaseLevel: Integration """ # make sure global parameters for rex and insights are set to true insights_cp = ( @@ -1224,8 +1180,6 @@ def test_global_registration_form_populate( e.g. activation key, operating system, life-cycle environment, host parameters for remote-execution, insights setup. - :CaseLevel: Integration - :steps: 1. create and sync repository 2. create the content view and activation-key @@ -1291,8 +1245,6 @@ def test_global_registration_with_capsule_host( :expectedresults: Host is successfully registered with capsule host, remote execution and insights client work out of the box - :CaseLevel: Integration - :steps: 1. create and sync repository 2. create the content view and activation-key @@ -1385,8 +1337,6 @@ def test_global_registration_with_gpg_repo_and_default_package( :expectedresults: Host is successfully registered, gpg repo is enabled and default package is installed. - :CaseLevel: Integration - :steps: 1. create and sync repository 2. create the content view and activation-key @@ -1445,8 +1395,6 @@ def test_global_registration_upgrade_subscription_manager( :expectedresults: Host is successfully registered, repo is enabled on advanced tab and subscription-manager is updated. - :CaseLevel: Integration - :steps: 1. Create activation-key 2. Open the global registration form, add repo and activation key @@ -1498,8 +1446,6 @@ def test_global_re_registration_host_with_force_ignore_error_options( :expectedresults: Verify the force and ignore checkbox options - :CaseLevel: Integration - :steps: 1. create and sync repository 2. create the content view and activation-key @@ -1543,8 +1489,6 @@ def test_global_registration_token_restriction( :expectedresults: global registration token should be restricted for any api calls other than the registration - :CaseLevel: Integration - :steps: 1. open the global registration form and generate the curl token 2. use that curl token to execute other api calls e.g. GET /hosts, /users @@ -1584,8 +1528,6 @@ def test_positive_bulk_delete_host(session, smart_proxy_location, target_sat, fu :expectedresults: All selected hosts should be deleted successfully :BZ: 1368026 - - :CaseLevel: System """ host_template = target_sat.api.Host(organization=function_org, location=smart_proxy_location) host_template.create_missing() @@ -1739,8 +1681,6 @@ def test_positive_gce_provision_end_to_end( :id: 8d1877bb-fbc2-4969-a13e-e95e4df4f4cd :expectedresults: Host is provisioned successfully - - :CaseLevel: System """ name = f'test{gen_string("alpha", 4).lower()}' hostname = f'{name}.{gce_domain.name}' @@ -1828,7 +1768,6 @@ def test_positive_gce_cloudinit_provision_end_to_end( :expectedresults: Host is provisioned successfully - :CaseLevel: System """ name = f'test{gen_string("alpha", 4).lower()}' hostname = f'{name}.{gce_domain.name}' @@ -1895,8 +1834,6 @@ def test_positive_read_details_page_from_new_ui(session, host_ui_options): :id: ef0c5942-9049-11ec-8029-98fa9b6ecd5a :expectedresults: Host is created and has expected content - - :CaseLevel: System """ with session: api_values, host_name = host_ui_options @@ -1929,8 +1866,6 @@ def test_rex_new_ui(session, target_sat, rex_contenthost): :expectedresults: Remote execution succeeded and the job is visible on Recent jobs card on Overview tab - - :CaseLevel: System """ hostname = rex_contenthost.hostname job_args = { @@ -1989,7 +1924,6 @@ def test_positive_update_delete_package( 9. Delete the package :expectedresults: The package is updated and deleted - """ client = rhel_contenthost client.add_rex_key(target_sat) @@ -2109,7 +2043,6 @@ def test_positive_apply_erratum( 5. Select errata and apply via rex. :expectedresults: The erratum is applied - """ # install package client = rhel_contenthost @@ -2191,7 +2124,6 @@ def test_positive_crud_module_streams( 5. Reset the Module stream :expectedresults: Module streams can be enabled, installed, removed and reset using the new UI. - """ module_name = 'duck' client = rhel_contenthost @@ -2283,8 +2215,6 @@ def test_positive_inherit_puppet_env_from_host_group_when_action( :expectedresults: Expected puppet environment is inherited to the host :BZ: 1414914 - - :CaseLevel: System """ host = session_puppet_enabled_sat.api.Host( organization=module_puppet_org, location=module_puppet_loc @@ -2337,8 +2267,6 @@ def test_positive_create_with_puppet_class( :id: d883f169-1105-435c-8422-a7160055734a :expectedresults: Host is created and contains correct puppet class - - :CaseLevel: System """ host_template = session_puppet_enabled_sat.api.Host( @@ -2398,8 +2326,6 @@ def test_positive_inherit_puppet_env_from_host_group_when_create( :expectedresults: Expected puppet environment is inherited to the form :BZ: 1414914 - - :CaseLevel: Integration """ hg_name = gen_string('alpha') @@ -2451,8 +2377,6 @@ def test_positive_set_multi_line_and_with_spaces_parameter_value( 2. host parameter value is the same when restored from yaml format :BZ: 1315282 - - :CaseLevel: System """ host_template = session_puppet_enabled_sat.api.Host( organization=module_puppet_org, location=module_puppet_loc @@ -2515,8 +2439,6 @@ def test_positive_host_role_information(self): :Team: Rocket - :CaseLevel: System - :Steps: 1. Register a RHEL host to Satellite. 2. Import all roles available by default. @@ -2529,7 +2451,6 @@ def test_positive_host_role_information(self): :expectedresults: Roles assigned directly to the Host are visible on the subtab, and roles assigned to the Host Group are visible by clicking the "view all assigned roles" link - """ @pytest.mark.stubbed @@ -2544,8 +2465,6 @@ def test_positive_role_variable_information(self): :Team: Rocket - :CaseLevel: System - :Steps: 1. Register a RHEL host to Satellite. 2. Import all roles available by default. @@ -2572,8 +2491,6 @@ def test_positive_assign_role_in_new_ui(self): :Team: Rocket - :CaseLevel: System - :Steps: 1. Register a RHEL host to Satellite. 2. Import all roles available by default. @@ -2597,8 +2514,6 @@ def test_positive_remove_role_in_new_ui(self): :Team: Rocket - :CaseLevel: System - :Steps: 1. Register a RHEL host to Satellite. 2. Import all roles available by default. diff --git a/tests/foreman/ui/test_hostcollection.py b/tests/foreman/ui/test_hostcollection.py index 697b72e7d0a..06af17c4a5a 100644 --- a/tests/foreman/ui/test_hostcollection.py +++ b/tests/foreman/ui/test_hostcollection.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: HostCollections :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import time @@ -220,8 +215,6 @@ def test_positive_end_to_end( :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ hc_name = gen_string('alpha') @@ -272,8 +265,6 @@ def test_negative_install_via_remote_execution( :expectedresults: The package is not installed, and the job invocation status contains some expected values: hosts information, jos status. - - :CaseLevel: Integration """ hosts = [] for _ in range(2): @@ -312,8 +303,6 @@ def test_negative_install_via_custom_remote_execution( :expectedresults: The package is not installed, and the job invocation status contains some expected values: hosts information, jos status. - - :CaseLevel: Integration """ hosts = [] for _ in range(2): @@ -347,8 +336,6 @@ def test_positive_add_host(session, module_target_sat): :id: 80824c9f-15a1-4f76-b7ac-7d9ca9f6ed9e :expectedresults: Host is added to Host Collection successfully - - :CaseLevel: System """ hc_name = gen_string('alpha') org = module_target_sat.api.Organization().create() @@ -383,8 +370,6 @@ def test_positive_install_package( :expectedresults: Package was successfully installed on all the hosts in host collection - - :CaseLevel: System """ with session: session.organization.select(org_name=module_org_with_parameter.name) @@ -409,8 +394,6 @@ def test_positive_remove_package( :expectedresults: Package was successfully removed from all the hosts in host collection - - :CaseLevel: System """ _install_package_with_assertion(vm_content_hosts, constants.FAKE_0_CUSTOM_PACKAGE) with session: @@ -437,8 +420,6 @@ def test_positive_upgrade_package( :expectedresults: Package was successfully upgraded on all the hosts in host collection - - :CaseLevel: System """ _install_package_with_assertion(vm_content_hosts, constants.FAKE_1_CUSTOM_PACKAGE) with session: @@ -464,8 +445,6 @@ def test_positive_install_package_group( :expectedresults: Package group was successfully installed on all the hosts in host collection - - :CaseLevel: System """ with session: session.organization.select(org_name=module_org_with_parameter.name) @@ -491,8 +470,6 @@ def test_positive_remove_package_group( :expectedresults: Package group was successfully removed on all the hosts in host collection - - :CaseLevel: System """ for client in vm_content_hosts: result = client.run(f'yum groups install -y {constants.FAKE_0_CUSTOM_PACKAGE_GROUP_NAME}') @@ -524,8 +501,6 @@ def test_positive_install_errata( :expectedresults: Errata was successfully installed in all the hosts in host collection - - :CaseLevel: System """ _install_package_with_assertion(vm_content_hosts, constants.FAKE_1_CUSTOM_PACKAGE) with session: @@ -594,8 +569,6 @@ def test_positive_change_assigned_content( names :BZ: 1315280 - - :CaseLevel: System """ new_lce_name = gen_string('alpha') new_cv_name = gen_string('alpha') @@ -663,7 +636,7 @@ def test_negative_hosts_limit( :id: 57b70977-2110-47d9-be3b-461ad15c70c7 - :Steps: + :steps: 1. Create Host Collection entity that can contain only one Host (using Host Limit field) 2. Create Host and add it to Host Collection. Check that it was @@ -673,8 +646,6 @@ def test_negative_hosts_limit( :expectedresults: Second host is not added to Host Collection and appropriate error is shown - - :CaseLevel: System """ hc_name = gen_string('alpha') org = module_target_sat.api.Organization().create() @@ -729,7 +700,7 @@ def test_positive_install_module_stream( :id: e5d882e0-3520-4cb6-8629-ef4c18692868 - :Steps: + :steps: 1. Run dnf upload profile to sync module streams from hosts to Satellite 2. Navigate to host_collection 3. Install the module stream duck @@ -738,8 +709,6 @@ def test_positive_install_module_stream( :expectedresults: Module-Stream should get installed on all the hosts in host collection - - :CaseLevel: System """ _run_remote_command_on_content_hosts('dnf -y upload-profile', vm_content_hosts_module_stream) with session: @@ -779,7 +748,7 @@ def test_positive_install_modular_errata( :id: 8d6fb447-af86-4084-a147-7910f0cecdef - :Steps: + :steps: 1. Generate modular errata by installing older version of module stream 2. Run dnf upload-profile 3. Install the modular errata by 'remote execution' @@ -787,8 +756,6 @@ def test_positive_install_modular_errata( :expectedresults: Modular Errata should get installed on all hosts in host collection. - - :CaseLevel: System """ stream = "0" version = "20180704111719" diff --git a/tests/foreman/ui/test_hostgroup.py b/tests/foreman/ui/test_hostgroup.py index 60feaa63bfa..964dedc172f 100644 --- a/tests/foreman/ui/test_hostgroup.py +++ b/tests/foreman/ui/test_hostgroup.py @@ -6,15 +6,10 @@ :CaseComponent: HostGroup -:CaseLevel: Integration - :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string from nailgun import entities @@ -178,7 +173,7 @@ def test_positive_create_new_host(): :id: 49704437-5ca1-46cb-b74e-de58396add37 - :Steps: + :steps: 1. Create hostgroup with the Content Source field populated. 2. Create host from Hosts > Create Host, selecting the hostgroup in the Host Group field. @@ -201,7 +196,7 @@ def test_positive_nested_host_groups( :id: 547f8e72-df65-48eb-aeb1-6b5fd3cbf4e5 - :Steps: + :steps: 1. Create the parent host-group. 2. Create, Update and Delete the nested host-group. @@ -275,7 +270,7 @@ def test_positive_clone_host_groups( :id: 9f02dcc5-98aa-48bd-8114-edd3a0be65c1 - :Steps: + :steps: 1. Create the host-group. 2. Clone the host-group created in step 1 3. Update and Delete the cloned host-group. diff --git a/tests/foreman/ui/test_http_proxy.py b/tests/foreman/ui/test_http_proxy.py index 2e7665b3e46..0ca3bdf242c 100644 --- a/tests/foreman/ui/test_http_proxy.py +++ b/tests/foreman/ui/test_http_proxy.py @@ -2,19 +2,14 @@ :Requirement: HttpProxy -:CaseLevel: Acceptance - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: High :CaseAutomation: Automated -:Upstream: No """ from fauxfactory import gen_integer, gen_string, gen_url import pytest @@ -32,8 +27,6 @@ def test_positive_create_update_delete(module_org, module_location, target_sat): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ http_proxy_name = gen_string('alpha', 15) @@ -195,7 +188,7 @@ def test_set_default_http_proxy(module_org, module_location, setting_update, tar :id: e93733e1-5c05-4b7f-89e4-253b9ce55a5a - :Steps: + :steps: 1. Navigate to Infrastructure > Http Proxies 2. Create a Http Proxy 3. GoTo to Administer > Settings > content tab @@ -209,8 +202,6 @@ def test_set_default_http_proxy(module_org, module_location, setting_update, tar :expectedresults: Setting "Default HTTP Proxy" to "no global default" result in success.''' :CaseImportance: Medium - - :CaseLevel: Acceptance """ property_name = setting_update.name @@ -241,12 +232,11 @@ def test_set_default_http_proxy(module_org, module_location, setting_update, tar def test_check_http_proxy_value_repository_details( function_org, function_location, function_product, setting_update, target_sat ): - """Deleted Global Http Proxy is reflected in repository details page". :id: 3f64255a-ef6c-4acb-b99b-e5579133b564 - :Steps: + :steps: 1. Create Http Proxy (Go to Infrastructure > Http Proxies > New Http Proxy) 2. GoTo to Administer > Settings > content tab 3. Update the "Default HTTP Proxy" with created above. @@ -263,8 +253,6 @@ def test_check_http_proxy_value_repository_details( 2. "HTTP Proxy" field in repository details page should be set to Global Default (None). :CaseImportance: Medium - - :CaseLevel: Acceptance """ property_name = setting_update.name @@ -309,7 +297,7 @@ def test_http_proxy_containing_special_characters(): :customerscenario: true - :Steps: + :steps: 1. Navigate to Infrastructure > Http Proxies 2. Create HTTP Proxy with special characters in password. 3. Go To to Administer > Settings > content tab diff --git a/tests/foreman/ui/test_jobinvocation.py b/tests/foreman/ui/test_jobinvocation.py index 492452a8315..eabef2b69b4 100644 --- a/tests/foreman/ui/test_jobinvocation.py +++ b/tests/foreman/ui/test_jobinvocation.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: RemoteExecution :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from inflection import camelize import pytest @@ -42,7 +37,7 @@ def test_positive_run_default_job_template_by_ip( :Setup: Use pre-defined job template. - :Steps: + :steps: 1. Set remote_execution_connect_by_ip on host to true 2. Navigate to an individual host and click Run Job @@ -52,8 +47,6 @@ def test_positive_run_default_job_template_by_ip( :expectedresults: Verify the job was successfully ran against the host :parametrized: yes - - :CaseLevel: System """ hostname = module_rhel_client_by_ip.hostname with session: @@ -83,7 +76,7 @@ def test_positive_run_custom_job_template_by_ip( :Setup: Create a working job template. - :Steps: + :steps: 1. Set remote_execution_connect_by_ip on host to true 2. Navigate to an individual host and click Run Job @@ -93,8 +86,6 @@ def test_positive_run_custom_job_template_by_ip( :expectedresults: Verify the job was successfully ran against the host :parametrized: yes - - :CaseLevel: System """ hostname = module_rhel_client_by_ip.hostname job_template_name = gen_string('alpha') @@ -139,7 +130,7 @@ def test_positive_schedule_recurring_host_job(self): :Team: Rocket - :Steps: + :steps: 1. Register a RHEL host to Satellite. 2. Import all roles available by default. 3. Assign a role to host. @@ -151,7 +142,6 @@ def test_positive_schedule_recurring_host_job(self): :expectedresults: The scheduled Job appears in the Job Invocation list at the appointed time - """ @@ -166,7 +156,7 @@ def test_positive_schedule_recurring_hostgroup_job(self): :Team: Rocket - :Steps: + :steps: 1. Register a RHEL host to Satellite. 2. Import all roles available by default. 3. Assign a role to host. @@ -178,5 +168,4 @@ def test_positive_schedule_recurring_hostgroup_job(self): :expectedresults: The scheduled Job appears in the Job Invocation list at the appointed time - """ diff --git a/tests/foreman/ui/test_jobtemplate.py b/tests/foreman/ui/test_jobtemplate.py index 91e1d8612cc..10ff62efb5a 100644 --- a/tests/foreman/ui/test_jobtemplate.py +++ b/tests/foreman/ui/test_jobtemplate.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: RemoteExecution :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -28,8 +23,6 @@ def test_positive_end_to_end(session, module_org, module_location, target_sat): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ template_name = gen_string('alpha') diff --git a/tests/foreman/ui/test_ldap_authentication.py b/tests/foreman/ui/test_ldap_authentication.py index 470658a992c..389767897e6 100644 --- a/tests/foreman/ui/test_ldap_authentication.py +++ b/tests/foreman/ui/test_ldap_authentication.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Integration - :CaseComponent: LDAP :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import os @@ -145,8 +140,6 @@ def test_positive_end_to_end(session, ldap_auth_source, ldap_tear_down): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High :parametrized: yes @@ -248,7 +241,7 @@ def test_positive_add_katello_role( :id: aa5e3bf4-cb42-43a4-93ea-a2eea54b847a - :Steps: + :steps: 1. Create an UserGroup. 2. Assign some foreman roles to UserGroup. 3. Create and associate an External UserGroup. @@ -503,7 +496,7 @@ def test_positive_add_admin_role_with_org_loc( :setup: LDAP Auth Source should be created with Org and Location Associated. - :Steps: + :steps: 1. Create an UserGroup. 2. Assign admin role to UserGroup. 3. Create and associate an External UserGroup. @@ -563,7 +556,7 @@ def test_positive_add_foreman_role_with_org_loc( :setup: LDAP Auth Source should be created with Org and Location Associated. - :Steps: + :steps: 1. Create an UserGroup. 2. Assign some foreman roles to UserGroup. @@ -629,7 +622,7 @@ def test_positive_add_katello_role_with_org( :setup: LDAP Auth Source should be created with Organization associated. - :Steps: + :steps: 1. Create an UserGroup. 2. Assign some katello roles to UserGroup. 3. Create and associate an External UserGroup. @@ -955,7 +948,7 @@ def test_onthefly_functionality(session, ldap_auth_source, ldap_tear_down): :id: 6998de30-ef77-11ea-a0ce-0c7a158cbff4 - :Steps: + :steps: 1. Create an auth source with onthefly disabled 2. Try login with a user from auth source @@ -1043,7 +1036,7 @@ def test_verify_attribute_of_users_are_updated(session, ldap_auth_source, ldap_t :customerscenario: true - :Steps: + :steps: 1. Create authsource with onthefly disabled 2. Create a user manually and select the authsource created 3. Attributes of the user (like names and email) should be synced. @@ -1221,7 +1214,7 @@ def test_positive_group_sync_open_ldap_authsource( :BZ: 1883209 - :Steps: + :steps: 1. Create an UserGroup. 2. Assign some foreman roles to UserGroup. 3. Create and associate an External OpenLDAP UserGroup. @@ -1268,7 +1261,7 @@ def test_verify_group_permissions( :id: 7e2ef59c-0c68-11eb-b6f3-0c7a158cbff4 - :Steps: + :steps: 1. Create two usergroups and link it with external group having a user in common 2. Give those usergroup different permissions @@ -1316,7 +1309,7 @@ def test_verify_ldap_filters_ipa( :id: 0052b272-08b1-11eb-80c6-0c7a158cbff4 - :Steps: + :steps: 1. Create authsource with onthefly enabled and ldap filter 2. Verify login from users according to the filter diff --git a/tests/foreman/ui/test_lifecycleenvironment.py b/tests/foreman/ui/test_lifecycleenvironment.py index 5ff44751f6e..e99d9f9c895 100644 --- a/tests/foreman/ui/test_lifecycleenvironment.py +++ b/tests/foreman/ui/test_lifecycleenvironment.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: LifecycleEnvironments :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from airgun.session import Session from navmazing import NavigationTriesExceeded @@ -42,8 +37,6 @@ def test_positive_end_to_end(session): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ lce_name = gen_string('alpha') @@ -79,8 +72,6 @@ def test_positive_create_chain(session): :id: ed3d2c88-ef0a-4a1a-9f11-5bdb2119fc18 :expectedresults: Environment is created - - :CaseLevel: Integration """ lce_path_name = gen_string('alpha') lce_name = gen_string('alpha') @@ -120,8 +111,6 @@ def test_positive_search_lce_content_view_packages_by_full_name(session, module_ :expectedresults: only the searched packages where found :BZ: 1432155 - - :CaseLevel: System """ packages = [ {'name': FAKE_0_CUSTOM_PACKAGE_NAME, 'full_names': [FAKE_0_CUSTOM_PACKAGE]}, @@ -173,8 +162,6 @@ def test_positive_search_lce_content_view_packages_by_name(session, module_org, :expectedresults: only the searched packages where found :BZ: 1432155 - - :CaseLevel: System """ packages = [ {'name': FAKE_0_CUSTOM_PACKAGE_NAME, 'packages_count': 1}, @@ -218,8 +205,6 @@ def test_positive_search_lce_content_view_module_streams_by_name(session, module 5. Search by module stream names :expectedresults: only the searched module streams where found - - :CaseLevel: System """ module_streams = [ {'name': FAKE_1_CUSTOM_PACKAGE_NAME, 'streams_count': 2}, @@ -254,7 +239,7 @@ def test_positive_custom_user_view_lce(session, test_name, target_sat): :BZ: 1420511 - :Steps: + :steps: As an admin user: @@ -281,8 +266,6 @@ def test_positive_custom_user_view_lce(session, test_name, target_sat): :expectedresults: The additional lifecycle environment is viewable and accessible by the custom user. - - :CaseLevel: Integration """ role_name = gen_string('alpha') lce_name = gen_string('alpha') diff --git a/tests/foreman/ui/test_location.py b/tests/foreman/ui/test_location.py index 5226784bae8..e9428868c0c 100644 --- a/tests/foreman/ui/test_location.py +++ b/tests/foreman/ui/test_location.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: OrganizationsandLocations :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_ipaddr, gen_string from nailgun import entities @@ -33,8 +28,6 @@ def test_positive_end_to_end(session): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: Critical """ loc_parent = entities.Location().create() @@ -124,8 +117,6 @@ def test_positive_update_with_all_users(session): was enabled and then disabled afterwards :BZ: 1321543, 1479736, 1479736 - - :CaseLevel: Integration """ user = entities.User().create() loc = entities.Location().create() @@ -160,8 +151,6 @@ def test_positive_add_org_hostgroup_template(session): :expectedresults: organization, hostgroup, provisioning template are added to location - - :CaseLevel: Integration """ org = entities.Organization().create() loc = entities.Location().create() @@ -202,8 +191,6 @@ def test_positive_update_compresource(session): :id: 1d24414a-666d-490d-89b9-cd0704684cdd :expectedresults: compute resource is added and removed from the location - - :CaseLevel: Integration """ url = LIBVIRT_RESOURCE_URL % settings.libvirt.libvirt_hostname resource = entities.LibvirtComputeResource(url=url).create() diff --git a/tests/foreman/ui/test_media.py b/tests/foreman/ui/test_media.py index 5f87c4821f0..446ecd64542 100644 --- a/tests/foreman/ui/test_media.py +++ b/tests/foreman/ui/test_media.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - :CaseImportance: Low -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -31,8 +26,6 @@ def test_positive_end_to_end(session, module_org, module_location): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') diff --git a/tests/foreman/ui/test_modulestreams.py b/tests/foreman/ui/test_modulestreams.py index 23461437f48..f8a67ed15c6 100644 --- a/tests/foreman/ui/test_modulestreams.py +++ b/tests/foreman/ui/test_modulestreams.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string from nailgun import entities @@ -56,8 +51,6 @@ def test_positive_module_stream_details_search_in_repo(session, module_org, modu :expectedresults: Content search functionality works as intended and expected module_streams are present inside of repository - :CaseLevel: Integration - :BZ: 1948758 """ with session: diff --git a/tests/foreman/ui/test_operatingsystem.py b/tests/foreman/ui/test_operatingsystem.py index 3a172369115..1324b556230 100644 --- a/tests/foreman/ui/test_operatingsystem.py +++ b/tests/foreman/ui/test_operatingsystem.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Provisioning :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest @@ -31,8 +26,6 @@ def test_positive_end_to_end(session, module_org, module_location, target_sat): :expectedresults: All scenarios flows work properly - :CaseLevel: Integration - :CaseImportance: Critical """ name = gen_string('alpha') @@ -155,8 +148,6 @@ def test_positive_verify_os_name(session, target_sat): :BZ: 1778503 - :CaseLevel: Component - :CaseImportance: Low """ name = gen_string('alpha') diff --git a/tests/foreman/ui/test_organization.py b/tests/foreman/ui/test_organization.py index cca0ce2ca8c..8c1da97081a 100644 --- a/tests/foreman/ui/test_organization.py +++ b/tests/foreman/ui/test_organization.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: OrganizationsandLocations :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string from nailgun import entities @@ -58,8 +53,6 @@ def test_positive_end_to_end(session): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: Critical """ name = gen_string('alpha') @@ -202,8 +195,6 @@ def test_positive_create_with_all_users(session): :expectedresults: Organization and user entities assigned to each other :BZ: 1321543 - - :CaseLevel: Integration """ user = entities.User().create() org = entities.Organization().create() @@ -227,8 +218,6 @@ def test_positive_update_compresource(session): :id: a49349b9-4637-4ef6-b65b-bd3eccb5a12a :expectedresults: Compute resource is added and then removed. - - :CaseLevel: Integration """ url = f'{LIBVIRT_RESOURCE_URL}{settings.libvirt.libvirt_hostname}' resource = entities.LibvirtComputeResource(url=url).create() @@ -259,8 +248,6 @@ def test_positive_delete_with_manifest_lces(session, target_sat, function_entitl :expectedresults: Organization is deleted successfully. - :CaseLevel: Integration - :CaseImportance: Critical """ org = function_entitlement_manifest_org @@ -288,8 +275,6 @@ def test_positive_download_debug_cert_after_refresh( :expectedresults: Scenario passed successfully - :CaseLevel: Integration - :CaseImportance: High """ org = function_entitlement_manifest_org @@ -311,14 +296,12 @@ def test_positive_errata_view_organization_switch( :id: faad9cf3-f8d5-49a6-87d1-431837b67675 - :Steps: Create an Organization having a product synced which contains errata. + :steps: Create an Organization having a product synced which contains errata. :expectedresults: Verify that the errata belonging to one Organization is not showing in the Default organization. :CaseImportance: High - - :CaseLevel: Integration """ rc = module_target_sat.cli_factory.RepositoryCollection( repositories=[module_target_sat.cli_factory.YumRepository(settings.repos.yum_3.url)] @@ -340,7 +323,7 @@ def test_positive_product_view_organization_switch(session, module_org, module_p :id: 50cc459a-3a23-433a-99b9-9f3b929e6d64 - :Steps: + :steps: 1. Create an Organization having a product and verify that product is present in the Organization. 2. Switch the Organization to default and verify that product is not visible in it. @@ -348,8 +331,6 @@ def test_positive_product_view_organization_switch(session, module_org, module_p :expectedresults: Verify that the Product belonging to one Organization is not visible in another organization. - :CaseLevel: Integration - :CaseImportance: High """ with session: diff --git a/tests/foreman/ui/test_oscapcontent.py b/tests/foreman/ui/test_oscapcontent.py index 21e6367de0f..5669fb9e854 100644 --- a/tests/foreman/ui/test_oscapcontent.py +++ b/tests/foreman/ui/test_oscapcontent.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: SCAPPlugin :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import os @@ -45,7 +40,7 @@ def test_positive_end_to_end( :id: 9870555d-0b60-41ab-a481-81d4d3f78fec - :Steps: + :steps: 1. Create an openscap content. 2. Read values from created entity. @@ -53,8 +48,6 @@ def test_positive_end_to_end( 4. Delete openscap content :expectedresults: All expected CRUD actions finished successfully - - :CaseLevel: Integration """ title = gen_string('alpha') new_title = gen_string('alpha') @@ -93,7 +86,7 @@ def test_negative_create_with_same_name(session, oscap_content_path, default_org :id: f5c6491d-b83c-4ca2-afdf-4bb93e6dd92b - :Steps: + :steps: 1. Create an openscap content. 2. Provide all the appropriate parameters. @@ -128,7 +121,7 @@ def test_external_disa_scap_content(session, default_org, default_location): :id: 5f29254e-7c15-45e1-a2ec-4da1d3d8d74d - :Steps: + :steps: 1. Create an openscap content with external DISA SCAP content. 2. Assert that openscap content has been created. diff --git a/tests/foreman/ui/test_oscappolicy.py b/tests/foreman/ui/test_oscappolicy.py index 37196d8e2cf..712e6f37481 100644 --- a/tests/foreman/ui/test_oscappolicy.py +++ b/tests/foreman/ui/test_oscappolicy.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: SCAPPlugin :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from nailgun import entities import pytest @@ -47,7 +42,7 @@ def test_positive_check_dashboard( :customerscenario: true - :Steps: + :steps: 1. Create new host group 2. Create new host using host group from step 1 @@ -58,8 +53,6 @@ def test_positive_check_dashboard( data :BZ: 1424936 - - :CaseLevel: Integration """ name = gen_string('alpha') oscap_content_title = gen_string('alpha') @@ -124,8 +117,6 @@ def test_positive_end_to_end( :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: Critical """ name = '{} {}'.format(gen_string('alpha'), gen_string('alpha')) diff --git a/tests/foreman/ui/test_oscaptailoringfile.py b/tests/foreman/ui/test_oscaptailoringfile.py index 011cb9bff00..0f6bdcdfc63 100644 --- a/tests/foreman/ui/test_oscaptailoringfile.py +++ b/tests/foreman/ui/test_oscaptailoringfile.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: SCAPPlugin :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from nailgun import entities import pytest @@ -30,8 +25,6 @@ def test_positive_end_to_end(session, tailoring_file_path, default_org, default_ :id: 9aebccb8-6837-4583-8a8a-8883480ab688 :expectedresults: All expected CRUD actions finished successfully - - :CaseLevel: Integration """ name = gen_string('alpha') new_name = gen_string('alpha') diff --git a/tests/foreman/ui/test_package.py b/tests/foreman/ui/test_package.py index 257e571dc76..643608811d1 100644 --- a/tests/foreman/ui/test_package.py +++ b/tests/foreman/ui/test_package.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string from nailgun import entities @@ -82,8 +77,6 @@ def test_positive_search_in_repo(session, module_org, module_yum_repo): :expectedresults: Content search functionality works as intended and expected packages are present inside of repository - - :CaseLevel: Integration """ with session: session.organization.select(org_name=module_org.name) @@ -108,8 +101,6 @@ def test_positive_search_in_multiple_repos(session, module_org, module_yum_repo, expected packages are present inside of repositories :BZ: 1514457 - - :CaseLevel: Integration """ with session: session.organization.select(org_name=module_org.name) @@ -139,8 +130,6 @@ def test_positive_check_package_details(session, module_org, module_yum_repo): :expectedresults: Package is present inside of repository and has all expected values in details section - :CaseLevel: Integration - :customerscenario: true """ with session: @@ -181,8 +170,6 @@ def test_positive_check_custom_package_details(session, module_org, module_yum_r :expectedresults: Package is present inside of repository and it possible to view its details - :CaseLevel: Integration - :customerscenario: true :BZ: 1387766, 1394390 @@ -210,8 +197,6 @@ def test_positive_rh_repo_search_and_check_file_list(session, module_org, module :expectedresults: Content search functionality works as intended and package contains expected list of files - - :CaseLevel: System """ with session: session.organization.select(org_name=module_org.name) diff --git a/tests/foreman/ui/test_partitiontable.py b/tests/foreman/ui/test_partitiontable.py index 0538498e3c8..8877c3d6a45 100644 --- a/tests/foreman/ui/test_partitiontable.py +++ b/tests/foreman/ui/test_partitiontable.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -37,8 +32,6 @@ def test_positive_create_default_for_organization(session): :expectedresults: New partition table is created and is present in the list of selected partition tables for any new organization - :CaseLevel: Integration - :CaseImportance: Medium """ name = gen_string('alpha') @@ -66,8 +59,6 @@ def test_positive_create_custom_organization(session): :expectedresults: New partition table is created and is not present in the list of selected partition tables for any new organization - :CaseLevel: Integration - :CaseImportance: Medium """ name = gen_string('alpha') @@ -95,8 +86,6 @@ def test_positive_create_default_for_location(session): :expectedresults: New partition table is created and is present in the list of selected partition tables for any new location - :CaseLevel: Integration - :CaseImportance: Medium """ name = gen_string('alpha') @@ -124,8 +113,6 @@ def test_positive_create_custom_location(session): :expectedresults: New partition table is created and is not present in the list of selected partition tables for any new location - :CaseLevel: Integration - :CaseImportance: Medium """ name = gen_string('alpha') @@ -152,8 +139,6 @@ def test_positive_delete_with_lock_and_unlock(session): :expectedresults: New partition table is created and not deleted when locked and only deleted after unlock - :CaseLevel: Integration - :CaseImportance: Medium """ name = gen_string('alpha') @@ -182,8 +167,6 @@ def test_positive_clone(session): :expectedresults: New partition table is created and cloned successfully - :CaseLevel: Integration - :CaseImportance: Medium """ name = gen_string('alpha') @@ -218,8 +201,6 @@ def test_positive_end_to_end(session, module_org, module_location, template_data :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') diff --git a/tests/foreman/ui/test_product.py b/tests/foreman/ui/test_product.py index a70623620f1..71a468ccb8e 100644 --- a/tests/foreman/ui/test_product.py +++ b/tests/foreman/ui/test_product.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from datetime import timedelta @@ -46,8 +41,6 @@ def test_positive_end_to_end(session, module_org): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: Critical """ product_name = gen_string('alpha') @@ -113,8 +106,6 @@ def test_positive_create_in_different_orgs(session, product_name): :expectedresults: Product is created successfully in both organizations. - - :CaseLevel: Integration """ orgs = [entities.Organization().create() for _ in range(2)] with session: @@ -134,8 +125,6 @@ def test_positive_product_create_with_create_sync_plan(session, module_org): :expectedresults: Ensure sync get created and assigned to Product. - :CaseLevel: Integration - :CaseImportance: Medium """ product_name = gen_string('alpha') @@ -180,7 +169,7 @@ def test_positive_bulk_action_advanced_sync(session, module_org): :customerscenario: true - :Steps: + :steps: 1. Enable or create a repository and sync it. 2. Navigate to Content > Product > click on the product. 3. Click Select Action > Advanced Sync. diff --git a/tests/foreman/ui/test_provisioningtemplate.py b/tests/foreman/ui/test_provisioningtemplate.py index 29bc8acbacf..da2b8446dce 100644 --- a/tests/foreman/ui/test_provisioningtemplate.py +++ b/tests/foreman/ui/test_provisioningtemplate.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ProvisioningTemplates :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest @@ -50,13 +45,11 @@ def test_positive_clone(module_org, module_location, target_sat, clone_setup): :id: 912f1619-4bb0-4e0f-88ce-88b5726fdbe0 - :Steps: + :steps: 1. Go to Provisioning template UI 2. Choose a template and attempt to clone it :expectedresults: The template is cloned - - :CaseLevel: Integration """ clone_name = gen_string('alpha') with target_sat.ui_session() as session: @@ -81,13 +74,11 @@ def test_positive_clone_locked(target_sat): :id: 2df8550a-fe7d-405f-ab48-2896554cda12 - :Steps: + :steps: 1. Go to Provisioning template UI 2. Choose a locked provisioning template and attempt to clone it :expectedresults: The template is cloned - - :CaseLevel: Integration """ clone_name = gen_string('alpha') with target_sat.ui_session() as session: @@ -112,8 +103,6 @@ def test_positive_end_to_end(module_org, module_location, template_data, target_ :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') @@ -190,7 +179,7 @@ def test_positive_verify_supported_templates_rhlogo(target_sat, module_org, modu :id: 2df8550a-fe7d-405f-ab48-2896554cda14 - :Steps: + :steps: 1. Go to Provisioning template UI 2. Choose a any provisioning template and check if its supported or not diff --git a/tests/foreman/ui/test_puppetclass.py b/tests/foreman/ui/test_puppetclass.py index 5c5fdb98d78..b44ad73e7a7 100644 --- a/tests/foreman/ui/test_puppetclass.py +++ b/tests/foreman/ui/test_puppetclass.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Puppet :Team: Rocket -:TestType: Functional - :CaseImportance: Low -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -29,8 +24,6 @@ def test_positive_end_to_end(session_puppet_enabled_sat, module_puppet_org, modu :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') diff --git a/tests/foreman/ui/test_puppetenvironment.py b/tests/foreman/ui/test_puppetenvironment.py index 6d11797d1fb..57502a51191 100644 --- a/tests/foreman/ui/test_puppetenvironment.py +++ b/tests/foreman/ui/test_puppetenvironment.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Puppet :Team: Rocket -:TestType: Functional - :CaseImportance: Low -:Upstream: No """ import pytest @@ -31,8 +26,6 @@ def test_positive_end_to_end(session_puppet_enabled_sat, module_puppet_org, modu :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') @@ -74,8 +67,6 @@ def test_positive_availability_for_host_and_hostgroup_in_multiple_orgs( :BZ: 543178 - :CaseLevel: Integration - :CaseImportance: High """ env_name = gen_string('alpha') diff --git a/tests/foreman/ui/test_remoteexecution.py b/tests/foreman/ui/test_remoteexecution.py index d265ef96d7c..3818120aef1 100644 --- a/tests/foreman/ui/test_remoteexecution.py +++ b/tests/foreman/ui/test_remoteexecution.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: RemoteExecution :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import datetime import time @@ -47,7 +42,7 @@ def test_positive_run_default_job_template_by_ip( :Setup: Use pre-defined job template. - :Steps: + :steps: 1. Navigate to an individual host and click Run Job 2. Select the job and appropriate template @@ -60,8 +55,6 @@ def test_positive_run_default_job_template_by_ip( :bz: 1898656 :customerscenario: true - - :CaseLevel: Integration """ hostname = module_vm_client_by_ip.hostname with session: @@ -101,7 +94,7 @@ def test_positive_run_custom_job_template_by_ip( :Setup: Create a working job template. - :Steps: + :steps: 1. Set remote_execution_connect_by_ip on host to true 2. Navigate to an individual host and click Run Job @@ -111,8 +104,6 @@ def test_positive_run_custom_job_template_by_ip( :expectedresults: Verify the job was successfully ran against the host :parametrized: yes - - :CaseLevel: System """ hostname = module_vm_client_by_ip.hostname @@ -155,7 +146,7 @@ def test_positive_run_job_template_multiple_hosts_by_ip( :Setup: Create a working job template. - :Steps: + :steps: 1. Set remote_execution_connect_by_ip on hosts to true 2. Navigate to the hosts page and select at least two hosts @@ -164,8 +155,6 @@ def test_positive_run_job_template_multiple_hosts_by_ip( 5. Run the job :expectedresults: Verify the job was successfully ran against the hosts - - :CaseLevel: System """ with Broker(nick='rhel7', host_class=ContentHost, _count=2) as hosts: host_names = [] @@ -210,7 +199,7 @@ def test_positive_run_scheduled_job_template_by_ip( :Setup: Use pre-defined job template. - :Steps: + :steps: 1. Set remote_execution_connect_by_ip on host to true 2. Navigate to an individual host and click Run Job @@ -225,8 +214,6 @@ def test_positive_run_scheduled_job_template_by_ip( 2. Verify the job was successfully ran after the designated time :parametrized: yes - - :CaseLevel: System """ job_time = 10 * 60 hostname = module_vm_client_by_ip.hostname @@ -292,7 +279,7 @@ def test_positive_ansible_job_check_mode(session): :id: 7aeb7253-e555-4e28-977f-71f16d3c32e2 - :Steps: + :steps: 1. Set the value of the ansible_roles_check_mode parameter to true on a host 2. Associate one or more Ansible roles with the host @@ -301,8 +288,6 @@ def test_positive_ansible_job_check_mode(session): :expectedresults: Verify that the roles were run in check mode (i.e. no changes were made on the host) - :CaseLevel: System - :CaseAutomation: NotAutomated :CaseComponent: Ansible-RemoteExecution @@ -318,7 +303,7 @@ def test_positive_ansible_config_report_failed_tasks_errors(session): :id: 1a91e534-143f-4f35-953a-7ad8b7d2ddf3 - :Steps: + :steps: 1. Import Ansible roles 2. Assign Ansible roles to a host @@ -326,8 +311,6 @@ def test_positive_ansible_config_report_failed_tasks_errors(session): :expectedresults: Verify that any task failures are listed as errors in the config report - :CaseLevel: System - :CaseAutomation: NotAutomated :CaseComponent: Ansible-ConfigurationManagement @@ -343,7 +326,7 @@ def test_positive_ansible_config_report_changes_notice(session): :id: 8c90f179-8b70-4932-a477-75dc3566c437 - :Steps: + :steps: 1. Import Ansible Roles 2. Assign Ansible roles to a host @@ -352,8 +335,6 @@ def test_positive_ansible_config_report_changes_notice(session): :expectedresults: Verify that any tasks that make changes on the host are listed as notice in the config report - :CaseLevel: System - :CaseAutomation: NotAutomated :CaseComponent: Ansible-ConfigurationManagement @@ -369,14 +350,12 @@ def test_positive_ansible_variables_imported_with_roles(session): :id: 107c53e8-5a8a-4291-bbde-fbd66a0bb85e - :Steps: + :steps: 1. Import Ansible roles :expectedresults: Verify that any variables in the role were also imported to Satellite - :CaseLevel: System - :CaseAutomation: NotAutomated :CaseComponent: Ansible-ConfigurationManagement @@ -392,14 +371,12 @@ def test_positive_roles_import_in_background(session): :id: 4f1c7b76-9c67-42b2-9a73-980ca1f05abc - :Steps: + :steps: 1. Import Ansible roles :expectedresults: Verify that the UI is accessible while roles are importing - :CaseLevel: System - :CaseAutomation: NotAutomated :CaseComponent: Ansible-ConfigurationManagement @@ -415,15 +392,13 @@ def test_positive_ansible_roles_ignore_list(session): :id: 6fa1d8f0-b583-4a07-88eb-c9ae7fcd0219 - :Steps: + :steps: 1. Add roles to the ignore list in Administer > Settings > Ansible 2. Navigate to Configure > Roles :expectedresults: Verify that any roles on the ignore list are not available for import - :CaseLevel: System - :CaseAutomation: NotAutomated :CaseComponent: Ansible-ConfigurationManagement @@ -440,7 +415,7 @@ def test_positive_ansible_variables_installed_with_collection(session): :id: 7ff88022-fe9b-482f-a6bb-3922036a1e1c - :Steps: + :steps: 1. Install an Ansible collection 2. Navigate to Configure > Variables @@ -448,8 +423,6 @@ def test_positive_ansible_variables_installed_with_collection(session): :expectedresults: Verify that any variables associated with the collection are present on Configure > Variables - :CaseLevel: System - :CaseAutomation: NotAutomated :CaseComponent: Ansible-ConfigurationManagement @@ -465,7 +438,7 @@ def test_positive_install_ansible_collection_via_job_invocation(session): :id: d4096aef-f6fc-41b6-ae56-d19b1f49cd42 - :Steps: + :steps: 1. Enable a host for remote execution 2. Navigate to Hosts > Schedule Remote Job @@ -476,8 +449,6 @@ def test_positive_install_ansible_collection_via_job_invocation(session): :expectedresults: The Ansible collection is successfully installed on the host - :CaseLevel: System - :CaseAutomation: NotAutomated :CaseComponent: Ansible-RemoteExecution @@ -493,7 +464,7 @@ def test_positive_set_ansible_role_order_per_host(session): :id: 24fbcd60-7cd1-46ff-86ac-16d6b436202c - :Steps: + :steps: 1. Enable a host for remote execution 2. Navigate to Hosts > All Hosts > $hostname > Edit > Ansible Roles @@ -503,8 +474,6 @@ def test_positive_set_ansible_role_order_per_host(session): :expectedresults: The roles are run in the specified order - :CaseLevel: System - :CaseAutomation: NotAutomated :CaseComponent: Ansible-ConfigurationManagement @@ -520,7 +489,7 @@ def test_positive_set_ansible_role_order_per_hostgroup(session): :id: 9eb5bc8e-081a-45b9-8751-f4220c944da6 - :Steps: + :steps: 1. Enable a host for remote execution 2. Create a host group @@ -532,8 +501,6 @@ def test_positive_set_ansible_role_order_per_hostgroup(session): :expectedresults: The roles are run in the specified order - :CaseLevel: System - :CaseAutomation: NotAutomated :CaseComponent: Ansible-ConfigurationManagement @@ -549,7 +516,7 @@ def test_positive_matcher_field_highlight(session): :id: 67b45cfe-31bb-41a8-b88e-27917c68f33e - :Steps: + :steps: 1. Navigate to Configure > Variables > $variablename 2. Select the "Override" checkbox in the "Default Behavior" section @@ -560,8 +527,6 @@ def test_positive_matcher_field_highlight(session): :expectedresults: The background of each field turns yellow when a change is made - :CaseLevel: System - :CaseAutomation: NotAutomated :CaseComponent: Ansible-ConfigurationManagement diff --git a/tests/foreman/ui/test_reporttemplates.py b/tests/foreman/ui/test_reporttemplates.py index 6cce22087d8..7b9bced2e43 100644 --- a/tests/foreman/ui/test_reporttemplates.py +++ b/tests/foreman/ui/test_reporttemplates.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Integration - :CaseComponent: Reporting :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import csv import json @@ -138,8 +133,6 @@ def test_positive_end_to_end(session, module_org, module_location): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: Critical """ name = gen_string('alpha') @@ -238,8 +231,6 @@ def test_positive_generate_registered_hosts_report(target_sat, module_org, modul :expectedresults: The Host - Registered Content Hosts report is generated (with host filter) and it contains created host with correct data - :CaseLevel: Integration - :CaseImportance: High """ # generate Host Status report @@ -293,8 +284,6 @@ def test_positive_generate_subscriptions_report_json( :expectedresults: The Subscriptions report is generated in JSON - :CaseLevel: Integration - :CaseImportance: Medium """ # generate Subscriptions report @@ -489,6 +478,7 @@ def test_negative_nonauthor_of_report_cant_download_it(session): 4. Wait for dynflow 5. As a different user, try to download the generated report :expectedresults: Report can't be downloaded. Error. + :CaseImportance: High """ diff --git a/tests/foreman/ui/test_repository.py b/tests/foreman/ui/test_repository.py index 7e466b1c7c1..bfa4eef2fa9 100644 --- a/tests/foreman/ui/test_repository.py +++ b/tests/foreman/ui/test_repository.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from datetime import datetime, timedelta from random import randint, shuffle @@ -65,8 +60,6 @@ def test_positive_create_in_different_orgs(session, module_org): :expectedresults: Repository is created successfully for both organizations - - :CaseLevel: Integration """ repo_name = gen_string('alpha') org2 = entities.Organization().create() @@ -100,8 +93,6 @@ def test_positive_create_as_non_admin_user(module_org, test_name, target_sat): :expectedresults: Repository successfully created :BZ: 1426393 - - :CaseLevel: Integration """ user_login = gen_string('alpha') user_password = gen_string('alphanumeric') @@ -152,8 +143,6 @@ def test_positive_create_yum_repo_same_url_different_orgs(session, module_prod): :id: f4cb00ed-6faf-4c79-9f66-76cd333299cb :expectedresults: Repositories are created and have equal number of packages. - - :CaseLevel: Integration """ # Create first repository repo = entities.Repository(product=module_prod, url=settings.repos.yum_0.url).create() @@ -191,8 +180,6 @@ def test_positive_create_as_non_admin_user_with_cv_published(module_org, test_na :expectedresults: New repository successfully created by non admin user :BZ: 1447829 - - :CaseLevel: Integration """ user_login = gen_string('alpha') user_password = gen_string('alphanumeric') @@ -262,8 +249,6 @@ def test_positive_discover_repo_via_existing_product(session, module_org): :id: 9181950c-a756-456f-a46a-059e7a2add3c :expectedresults: Repository is discovered and created - - :CaseLevel: Integration """ repo_name = 'fakerepo01' product = entities.Product(organization=module_org).create() @@ -290,8 +275,6 @@ def test_positive_discover_repo_via_new_product(session, module_org): :id: dc5281f8-1a8a-4a17-b746-728f344a1504 :expectedresults: Repository is discovered and created - - :CaseLevel: Integration """ product_name = gen_string('alpha') repo_name = 'fakerepo01' @@ -319,11 +302,9 @@ def test_positive_discover_module_stream_repo_via_existing_product(session, modu :id: e7b9e2c4-7ecd-4cde-8f74-961fbac8919c - :CaseLevel: Integration - :BZ: 1676642 - :Steps: + :steps: 1. Create a product. 2. From Content > Products, click on the Repo Discovery button. 3. Enter a url containing a yum repository with module streams, e.g., @@ -361,8 +342,6 @@ def test_positive_sync_custom_repo_yum(session, module_org): :id: afa218f4-e97a-4240-a82a-e69538d837a1 :expectedresults: Sync procedure for specific yum repository is successful - - :CaseLevel: Integration """ product = entities.Product(organization=module_org).create() repo = entities.Repository(url=settings.repos.yum_1.url, product=product).create() @@ -385,8 +364,6 @@ def test_positive_sync_custom_repo_docker(session, module_org): :expectedresults: Sync procedure for specific docker repository is successful - - :CaseLevel: Integration """ product = entities.Product(organization=module_org).create() repo = entities.Repository( @@ -411,8 +388,6 @@ def test_positive_resync_custom_repo_after_invalid_update(session, module_org): procedure for specific yum repository is successful :BZ: 1487173, 1262313 - - :CaseLevel: Integration """ product = entities.Product(organization=module_org).create() repo = entities.Repository(url=settings.repos.yum_1.url, product=product).create() @@ -441,8 +416,6 @@ def test_positive_resynchronize_rpm_repo(session, module_prod): :expectedresults: Repository has updated non-zero package count - :CaseLevel: Integration - :BZ: 1318004 """ repo = entities.Repository( @@ -476,8 +449,6 @@ def test_positive_end_to_end_custom_yum_crud(session, module_org, module_prod): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ repo_name = gen_string('alpha') @@ -542,8 +513,6 @@ def test_positive_end_to_end_custom_module_streams_crud(session, module_org, mod :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ repo_name = gen_string('alpha') @@ -588,8 +557,6 @@ def test_positive_upstream_with_credentials(session, module_prod): 2. The custom repository upstream credentials are updated. 3. The credentials are cleared. - :CaseLevel: Integration - :CaseImportance: High :BZ: 1433481, 1743271 @@ -648,8 +615,7 @@ def test_positive_upstream_with_credentials(session, module_prod): # # :expectedresults: All expected CRUD actions finished successfully # -# :CaseLevel: Integration -# +# # # :CaseImportance: High # # :BZ: 1467722 @@ -688,10 +654,7 @@ def test_positive_sync_ansible_collection_gallaxy_repo(session, module_prod): :expectedresults: All content synced successfully - :CaseLevel: Integration - :CaseImportance: High - """ repo_name = f'gallaxy-{gen_string("alpha")}' requirements = ''' @@ -723,8 +686,6 @@ def test_positive_reposet_disable(session, target_sat, function_entitlement_mani :id: de596c56-1327-49e8-86d5-a1ab907f26aa :expectedresults: RH repo was disabled - - :CaseLevel: Integration """ org = function_entitlement_manifest_org sat_tools_repo = target_sat.cli_factory.SatelliteToolsRepository(distro='rhel7', cdn=True) @@ -771,8 +732,6 @@ def test_positive_reposet_disable_after_manifest_deleted( :expectedresults: RH repo was disabled :BZ: 1344391 - - :CaseLevel: Integration """ org = function_entitlement_manifest_org sub = entities.Subscription(organization=org) @@ -823,8 +782,6 @@ def test_positive_delete_random_docker_repo(session, module_org): :expectedresults: Random repository can be deleted from random product without altering the other products. - - :CaseLevel: Integration """ entities_list = [] products = [entities.Product(organization=module_org).create() for _ in range(randint(2, 5))] @@ -853,8 +810,6 @@ def test_positive_delete_rhel_repo(session, module_entitlement_manifest_org, tar :expectedresults: Repository can be successfully deleted - :CaseLevel: Integration - :BZ: 1152672 """ @@ -903,8 +858,6 @@ def test_positive_recommended_repos(session, module_entitlement_manifest_org): 1. Shows repositories as per On/Off 'Recommended Repositories'. 2. Check last Satellite version Capsule/Tools repos do not exist. - :CaseLevel: Integration - :BZ: 1776108 """ with session: @@ -937,7 +890,7 @@ def test_positive_upload_resigned_rpm(): :customerscenario: true - :Steps: + :steps: 1. Buld or prepare an unsigned rpm. 2. Create a gpg key. 3. Use the gpg key to sign the rpm with sha1. @@ -963,7 +916,7 @@ def test_positive_remove_srpm_change_checksum(): :BZ: 1850914 - :Steps: + :steps: 1. Sync a repository that contains rpms and srpms and uses sha1 repodata. 2. Re-sync the repository after an srpm has been removed and its repodata regenerated using sha256. @@ -985,7 +938,7 @@ def test_positive_repo_discovery_change_ssl(): :BZ: 1789848 - :Steps: + :steps: 1. Navigate to Content > Products > click on 'Repo Discovery'. 2. Set the repository type to 'Yum Repositories'. 3. Enter an upstream URL to discover and click on 'Discover'. @@ -1009,7 +962,7 @@ def test_positive_remove_credentials(session, function_product, function_org, fu :customerscenario: true - :Steps: + :steps: 1. Create a custom repository, with a repository type of 'yum' and an upstream username and password. 3. Remove the saved credentials by clicking the delete icon next to the 'Upstream @@ -1053,7 +1006,7 @@ def test_sync_status_persists_after_task_delete(session, module_prod, module_org :customerscenario: true - :Steps: + :steps: 1. Sync a custom Repo. 2. Navigate to Content > Sync Status. Assert status is Synced. 3. Use foreman-rake console to delete the Sync task. @@ -1110,7 +1063,7 @@ def test_positive_sync_status_repo_display(): :customerscenario: true - :Steps: + :steps: 1. Import manifest and enable RHEL 8 repositories. 2. Navigate to Content > Sync Status. @@ -1131,7 +1084,7 @@ def test_positive_search_enabled_kickstart_repos(): :BZ: 1724807, 1829817 - :Steps: + :steps: 1. Import a manifest 2. Navigate to Content > Red Hat Repositories, and enable some kickstart repositories. 3. In the search bar on the right side, select 'Enabled/Both'. @@ -1154,7 +1107,7 @@ def test_positive_rpm_metadata_display(): :BZ: 1904369 - :Steps: + :steps: 1. Enable and sync a repository, e.g., 'Red Hat Satellite Tools 6.9 for RHEL 7 Server RPMs x86_64'. 2. Navigate to Content > Packages > click on a package in the repository (e.g., @@ -1210,7 +1163,7 @@ def test_positive_sync_repo_and_verify_checksum(session, module_org): :BZ: 1951626 - :Steps: + :steps: 1. Enable and sync repository 2. Go to Products -> Select Action -> Verify Content Checksum diff --git a/tests/foreman/ui/test_rhc.py b/tests/foreman/ui/test_rhc.py index 86e203676e5..7eca58e995d 100644 --- a/tests/foreman/ui/test_rhc.py +++ b/tests/foreman/ui/test_rhc.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: RHCloud :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -116,7 +111,7 @@ def test_positive_configure_cloud_connector( :id: 67e45cfe-31bb-51a8-b88f-27918c68f32e - :Steps: + :steps: 1. Navigate to Configure > Inventory Upload 2. Click Configure Cloud Connector @@ -124,8 +119,6 @@ def test_positive_configure_cloud_connector( :expectedresults: The Cloud Connector has been installed and the service is running - :CaseLevel: Integration - :CaseImportance: Critical :BZ: 1818076 diff --git a/tests/foreman/ui/test_rhcloud_insights.py b/tests/foreman/ui/test_rhcloud_insights.py index c098bd99b5e..396e69fc986 100644 --- a/tests/foreman/ui/test_rhcloud_insights.py +++ b/tests/foreman/ui/test_rhcloud_insights.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: System - :CaseComponent: RHCloud :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from datetime import datetime @@ -39,7 +34,7 @@ def test_rhcloud_insights_e2e( :id: d952e83c-3faf-4299-a048-2eb6ccb8c9c2 - :Steps: + :steps: 1. Prepare misconfigured machine and upload its data to Insights. 2. In Satellite UI, Configure -> Insights -> Sync recommendations. 3. Run remediation for "OpenSSH config permissions" recommendation against rhel8/rhel9 host. @@ -125,7 +120,7 @@ def test_insights_reporting_status(): :id: 75629a08-b585-472b-a295-ce497075e519 - :Steps: + :steps: 1. Register a satellite content host with insights. 2. Change 48 hours of wait time to 4 minutes in insights_client_report_status.rb file. See foreman_rh_cloud PR#596. @@ -151,7 +146,7 @@ def test_recommendation_sync_for_satellite(): :id: ee3feba3-c255-42f1-8293-b04d540dcca5 - :Steps: + :steps: 1. Register Satellite with insights.(satellite-installer --register-with-insights) 2. Add RH cloud token in settings. 3. Go to Configure > Insights > Click on Sync recommendations button. @@ -201,7 +196,7 @@ def test_host_sorting_based_on_recommendation_count(): :id: b1725ec1-60db-422e-809d-f81d99ae156e - :Steps: + :steps: 1. Register few satellite content host with insights. 2. Sync Insights recommendations. 3. Go to Hosts > All Host @@ -367,7 +362,7 @@ def test_delete_host_having_insights_recommendation( :customerscenario: true - :Steps: + :steps: 1. Prepare misconfigured machine and upload its data to Insights. 2. Sync insights recommendations. 3. Sync RH Cloud inventory status. diff --git a/tests/foreman/ui/test_rhcloud_inventory.py b/tests/foreman/ui/test_rhcloud_inventory.py index 14022819bb4..70799901e4a 100644 --- a/tests/foreman/ui/test_rhcloud_inventory.py +++ b/tests/foreman/ui/test_rhcloud_inventory.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: System - :CaseComponent: RHCloud :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from datetime import datetime, timedelta @@ -241,7 +236,7 @@ def test_obfuscate_host_ipv4_addresses( :customerscenario: true - :Steps: + :steps: 1. Prepare machine and upload its data to Insights. 2. Go to Configure > Inventory upload > enable “Obfuscate host ipv4 addresses” setting. @@ -457,7 +452,7 @@ def test_failed_inventory_upload(): :id: 230d3fc3-2810-4385-b07b-30f9bf632488 - :Steps: + :steps: 1. Register a satellite content host with insights. 2. Change 'DEST' from /var/lib/foreman/red_hat_inventory/uploads/uploader.sh to an invalid url. @@ -481,7 +476,7 @@ def test_rhcloud_inventory_without_manifest(session, module_org, target_sat): :id: 1d90bb24-2380-4653-8ed6-a084fce66d1e - :Steps: + :steps: 1. Don't import manifest to satellite. 3. Go to Configure > Inventory upload > Click on restart button. diff --git a/tests/foreman/ui/test_role.py b/tests/foreman/ui/test_role.py index f83429fde48..a67f34cdcd6 100644 --- a/tests/foreman/ui/test_role.py +++ b/tests/foreman/ui/test_role.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: UsersRoles :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import random @@ -36,8 +31,6 @@ def test_positive_end_to_end(session, module_org, module_location): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :customerscenario: true :BZ: 1353788 diff --git a/tests/foreman/ui/test_settings.py b/tests/foreman/ui/test_settings.py index 21f2d3f2b59..f5bececc2f7 100644 --- a/tests/foreman/ui/test_settings.py +++ b/tests/foreman/ui/test_settings.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: Settings :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import math @@ -64,8 +59,6 @@ def test_positive_update_restrict_composite_view(session, setting_update, repo_s :expectedresults: Parameter is updated successfully :CaseImportance: Critical - - :CaseLevel: Acceptance """ property_name = setting_update.name composite_cv = entities.ContentView(composite=True, organization=repo_setup['org']).create() @@ -111,7 +104,6 @@ def test_positive_httpd_proxy_url_update(session, setting_update): :BZ: 1677282 :CaseImportance: Medium - """ property_name = setting_update.name with session: @@ -218,7 +210,6 @@ def test_positive_update_login_page_footer_text(session, setting_update): :CaseImportance: Medium - :CaseLevel: Acceptance """ property_name = setting_update.name login_text_data = gen_string('alpha', 270) @@ -253,8 +244,6 @@ def test_negative_settings_access_to_non_admin(module_target_sat): :expectedresults: Administer -> Settings tab should not be available to non admin users :CaseImportance: Medium - - :CaseLevel: Acceptance """ login = gen_string('alpha') password = gen_string('alpha') @@ -300,8 +289,6 @@ def test_positive_update_email_delivery_method_smtp(): :CaseImportance: Critical - :CaseLevel: Acceptance - :CaseAutomation: NotAutomated """ @@ -335,8 +322,6 @@ def test_negative_update_email_delivery_method_smtp(): :CaseImportance: Critical - :CaseLevel: Acceptance - :CaseAutomation: NotAutomated """ @@ -367,8 +352,6 @@ def test_positive_update_email_delivery_method_sendmail(session, target_sat): :BZ: 2080324 :CaseImportance: Critical - - :CaseLevel: Acceptance """ property_name = "Email" mail_config_default_param = { @@ -431,8 +414,6 @@ def test_negative_update_email_delivery_method_sendmail(): :CaseImportance: Critical - :CaseLevel: Acceptance - :CaseAutomation: NotAutomated """ @@ -463,8 +444,6 @@ def test_positive_email_yaml_config_precedence(): :CaseImportance: Critical - :CaseLevel: Acceptance - :CaseAutomation: NotAutomated """ @@ -477,7 +456,7 @@ def test_negative_update_hostname_with_empty_fact(session, setting_update): :id: e0eaab69-4926-4c1e-b111-30c51ede273e - :Steps: + :steps: 1. Goto settings ->Discovered tab -> Hostname_facts 2. Set empty hostname_facts (without any value) @@ -490,7 +469,6 @@ def test_negative_update_hostname_with_empty_fact(session, setting_update): :expectedresults: Error should be raised on setting empty value for hostname_facts setting - """ new_hostname = "" property_name = setting_update.name @@ -508,7 +486,7 @@ def test_positive_entries_per_page(session, setting_update): :id: 009026b6-7550-40aa-9f78-5eb7f7e3800f - :Steps: + :steps: 1. Navigate to Administer > Settings > General tab 2. Update the entries per page value 3. GoTo Monitor > Tasks Table > Pagination @@ -525,8 +503,6 @@ def test_positive_entries_per_page(session, setting_update): :BZ: 1746221 :CaseImportance: Medium - - :CaseLevel: Acceptance """ property_name = setting_update.name property_value = 19 diff --git a/tests/foreman/ui/test_smartclassparameter.py b/tests/foreman/ui/test_smartclassparameter.py index 98c3ba430c3..adc5169f2ae 100644 --- a/tests/foreman/ui/test_smartclassparameter.py +++ b/tests/foreman/ui/test_smartclassparameter.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Puppet :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from random import choice, uniform @@ -80,8 +75,6 @@ def test_positive_end_to_end(session_puppet_enabled_sat, module_puppet_classes, :expectedresults: All expected basic actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ sc_param = sc_params_list.pop() @@ -201,8 +194,6 @@ def test_positive_create_matcher_attribute_priority( :expectedresults: The YAML output has the value only for fqdn matcher. - :CaseLevel: Integration - :BZ: 1241249 :CaseImportance: Critical @@ -380,8 +371,6 @@ def test_positive_update_matcher_from_attribute( 1. The host/hostgroup is saved with changes. 2. Matcher value in parameter is updated from fqdn/hostgroup. - :CaseLevel: Integration - :CaseImportance: Critical """ sc_param = sc_params_list.pop() @@ -448,8 +437,6 @@ def test_positive_impact_parameter_delete_attribute( 1. The matcher for deleted attribute removed from parameter. 2. On recreating attribute, the matcher should not reappear in parameter. - - :CaseLevel: Integration """ sc_param = sc_params_list.pop() matcher_value = gen_string('alpha') @@ -522,8 +509,6 @@ def test_positive_hidden_value_in_attribute( 4. And the value shown hidden. 5. Parameter is successfully unhidden. - :CaseLevel: Integration - :CaseImportance: Critical """ sc_param = sc_params_list.pop() diff --git a/tests/foreman/ui/test_subnet.py b/tests/foreman/ui/test_subnet.py index f188820d4ba..45886c3ec86 100644 --- a/tests/foreman/ui/test_subnet.py +++ b/tests/foreman/ui/test_subnet.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Networking :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_ipaddr import pytest @@ -40,8 +35,6 @@ def test_positive_end_to_end(session, module_target_sat, module_dom): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') diff --git a/tests/foreman/ui/test_subscription.py b/tests/foreman/ui/test_subscription.py index 36e50897de4..fc7c9311915 100644 --- a/tests/foreman/ui/test_subscription.py +++ b/tests/foreman/ui/test_subscription.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: SubscriptionManagement :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from tempfile import mkstemp import time @@ -157,8 +152,6 @@ def test_positive_access_with_non_admin_user_without_manifest(test_name, target_ :BZ: 1417082 - :CaseLevel: Integration - :CaseImportance: Critical """ org = entities.Organization().create() @@ -204,8 +197,6 @@ def test_positive_access_with_non_admin_user_with_manifest( :customerscenario: true - :CaseLevel: Integration - :CaseImportance: Critical """ org = function_entitlement_manifest_org @@ -244,8 +235,6 @@ def test_positive_access_manifest_as_another_admin_user( :customerscenario: true - :CaseLevel: Integration - :CaseImportance: High """ org = entities.Organization().create() @@ -306,8 +295,6 @@ def test_positive_view_vdc_subscription_products( :BZ: 1366327 :parametrized: yes - - :CaseLevel: System """ org = function_entitlement_manifest_org lce = entities.LifecycleEnvironment(organization=org).create() @@ -367,8 +354,6 @@ def test_positive_view_vdc_guest_subscription_products( :BZ: 1395788, 1506636, 1487317 :parametrized: yes - - :CaseLevel: System """ org = function_entitlement_manifest_org lce = entities.LifecycleEnvironment(organization=org).create() diff --git a/tests/foreman/ui/test_sync.py b/tests/foreman/ui/test_sync.py index 041a36a011d..c5ea76e0fa4 100644 --- a/tests/foreman/ui/test_sync.py +++ b/tests/foreman/ui/test_sync.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Repositories :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string from nailgun import entities @@ -70,8 +65,6 @@ def test_positive_sync_rh_repos(session, target_sat, module_entitlement_manifest :id: e30f6509-0b65-4bcc-a522-b4f3089d3911 :expectedresults: Sync procedure for RedHat Repos is successful - - :CaseLevel: Integration """ repos = ( target_sat.cli_factory.SatelliteCapsuleRepository(cdn=True), @@ -113,8 +106,6 @@ def test_positive_sync_custom_ostree_repo(session, module_custom_product): :customerscenario: true - :CaseLevel: Integration - :BZ: 1625783 """ repo = entities.Repository( @@ -139,7 +130,7 @@ def test_positive_sync_rh_ostree_repo(session, target_sat, module_entitlement_ma :id: 4d28fff0-5fda-4eee-aa0c-c5af02c31de5 - :Steps: + :steps: 1. Import a valid manifest 2. Enable the OStree repo and sync it @@ -147,8 +138,6 @@ def test_positive_sync_rh_ostree_repo(session, target_sat, module_entitlement_ma :expectedresults: ostree repo should be synced successfully from CDN - :CaseLevel: Integration - :BZ: 1625783 """ target_sat.api_factory.enable_rhrepo_and_fetchid( @@ -175,8 +164,6 @@ def test_positive_sync_docker_via_sync_status(session, module_org): :expectedresults: Sync procedure for specific docker repository is successful - - :CaseLevel: Integration """ product = entities.Product(organization=module_org).create() repo_name = gen_string('alphanumeric') diff --git a/tests/foreman/ui/test_syncplan.py b/tests/foreman/ui/test_syncplan.py index eeca462f521..142dbda94b1 100644 --- a/tests/foreman/ui/test_syncplan.py +++ b/tests/foreman/ui/test_syncplan.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: SyncPlans :team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from datetime import datetime, timedelta import time @@ -78,8 +73,6 @@ def test_positive_end_to_end(session, module_org): :customerscenario: true - :CaseLevel: Integration - :BZ: 1693795 """ plan_name = gen_string('alpha') @@ -131,8 +124,6 @@ def test_positive_end_to_end_custom_cron(session): :id: 48c88529-6318-47b0-97bc-eb46aae0294a :expectedresults: All CRUD actions for component finished successfully - - :CaseLevel: Integration """ plan_name = gen_string('alpha') description = gen_string('alpha') @@ -214,8 +205,6 @@ def test_positive_synchronize_custom_product_custom_cron_real_time(session, modu :id: c551ef9a-6e5a-435a-b24d-e86de203a2bb :expectedresults: Product is synchronized successfully. - - :CaseLevel: System """ plan_name = gen_string('alpha') product = entities.Product(organization=module_org).create() @@ -269,8 +258,6 @@ def test_positive_synchronize_custom_product_custom_cron_past_sync_date( :id: 4d9ed0bf-a63c-44de-846d-7cf302273bcc :expectedresults: Product is synchronized successfully. - - :CaseLevel: System """ plan_name = gen_string('alpha') product = entities.Product(organization=module_org).create() diff --git a/tests/foreman/ui/test_templatesync.py b/tests/foreman/ui/test_templatesync.py index a3aff4d133d..d2679e1bf62 100644 --- a/tests/foreman/ui/test_templatesync.py +++ b/tests/foreman/ui/test_templatesync.py @@ -4,15 +4,10 @@ :CaseAutomation: Automated -:CaseLevel: Integration - :CaseComponent: TemplatesPlugin :Team: Endeavour -:TestType: Functional - -:Upstream: No """ from fauxfactory import gen_string from nailgun import entities @@ -45,7 +40,7 @@ def test_positive_import_templates(session, templates_org, templates_loc): :bz: 1778181, 1778139 - :Steps: + :steps: 1. Navigate to Host -> Sync Templates, and choose Import. 2. Select fields: @@ -102,7 +97,7 @@ def test_positive_export_templates(session, create_import_export_local_dir, targ :bz: 1778139 - :Steps: + :steps: 1. Navigate to Host -> Sync Templates, and choose Export. 2. Select fields: @@ -163,7 +158,7 @@ def test_positive_export_filtered_templates_to_git(session, git_repository, git_ :id: e4de338a-9ab9-492e-ac42-6cc2ebcd1792 - :Steps: + :steps: 1. Export only the templates matching with regex e.g: `^atomic.*` to git repo. :expectedresults: diff --git a/tests/foreman/ui/test_user.py b/tests/foreman/ui/test_user.py index 65a1ab36c40..f2b35897a5a 100644 --- a/tests/foreman/ui/test_user.py +++ b/tests/foreman/ui/test_user.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: UsersRoles :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import random @@ -35,8 +30,6 @@ def test_positive_end_to_end(session, target_sat, test_name, module_org, module_ :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') @@ -110,8 +103,6 @@ def test_positive_create_with_multiple_roles(session, target_sat): :expectedresults: User is created successfully and has proper roles assigned - - :CaseLevel: Integration """ name = gen_string('alpha') role1 = gen_string('alpha') @@ -141,8 +132,6 @@ def test_positive_create_with_all_roles(session): :id: 814593ca-1566-45ea-9eff-e880183b1ee3 :expectedresults: User is created successfully - - :CaseLevel: Integration """ name = gen_string('alpha') password = gen_string('alpha') @@ -168,8 +157,6 @@ def test_positive_create_with_multiple_orgs(session, target_sat): :id: d74c0284-3995-4a4a-8746-00858282bf5d :expectedresults: User is created successfully - - :CaseLevel: Integration """ name = gen_string('alpha') org_name1 = gen_string('alpha') @@ -204,8 +191,6 @@ def test_positive_update_with_multiple_roles(session, target_sat): :id: 127fb368-09fd-4f10-8319-566a1bcb5cd2 :expectedresults: User is updated successfully - - :CaseLevel: Integration """ name = gen_string('alpha') role_names = [target_sat.api.Role().create().name for _ in range(3)] @@ -232,8 +217,6 @@ def test_positive_update_with_all_roles(session): :id: cd7a9cfb-a700-45f2-a11d-bba6be3c810d :expectedresults: User is updated successfully - - :CaseLevel: Integration """ name = gen_string('alpha') password = gen_string('alpha') @@ -259,8 +242,6 @@ def test_positive_update_orgs(session, target_sat): :id: a207188d-1ad1-4ff1-9906-bae1d91104fd :expectedresults: User is updated - - :CaseLevel: Integration """ name = gen_string('alpha') password = gen_string('alpha') @@ -294,8 +275,6 @@ def test_positive_create_product_with_limited_user_permission( :customerscenario: true - :CaseLevel: Component - :CaseImportance: High :BZ: 1771937 @@ -343,8 +322,6 @@ def test_personal_access_token_admin(): 1. Should show output of the api endpoint 2. When revoked, authentication error - :CaseLevel: System - :CaseImportance: High """ @@ -368,8 +345,6 @@ def test_positive_personal_access_token_user_with_role(): 2. When an incorrect role and end point is used, missing permission should be displayed. - :CaseLevel: System - :CaseImportance: High """ @@ -388,7 +363,5 @@ def test_expired_personal_access_token(): :expectedresults: Authentication error - :CaseLevel: System - :CaseImportance: Medium """ diff --git a/tests/foreman/ui/test_usergroup.py b/tests/foreman/ui/test_usergroup.py index 6010f8b03bb..37b2afaa9d6 100644 --- a/tests/foreman/ui/test_usergroup.py +++ b/tests/foreman/ui/test_usergroup.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: UsersRoles :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string, gen_utf8 from nailgun import entities @@ -29,8 +24,6 @@ def test_positive_delete_with_user(session, module_org, module_location): :id: 2bda3db5-f54f-412f-831f-8e005631f271 :expectedresults: Usergroup is deleted but added user is not - - :CaseLevel: Integration """ user_name = gen_string('alpha') group_name = gen_utf8(smp=False) @@ -59,8 +52,6 @@ def test_positive_end_to_end(session, module_org, module_location): :expectedresults: All expected CRUD actions finished successfully - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') diff --git a/tests/foreman/ui/test_webhook.py b/tests/foreman/ui/test_webhook.py index f3df30aef78..c0e3b470c20 100644 --- a/tests/foreman/ui/test_webhook.py +++ b/tests/foreman/ui/test_webhook.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: HooksandWebhooks :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string, gen_url import pytest diff --git a/tests/foreman/virtwho/api/test_esx.py b/tests/foreman/virtwho/api/test_esx.py index d7f9faf0c22..85af193b43a 100644 --- a/tests/foreman/virtwho/api/test_esx.py +++ b/tests/foreman/virtwho/api/test_esx.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Virt-whoConfigurePlugin :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -65,8 +60,6 @@ def test_positive_deploy_configure_by_id( :expectedresults: Config can be created and deployed - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config.status == 'unknown' @@ -123,8 +116,6 @@ def test_positive_deploy_configure_by_script( :expectedresults: Config can be created and deployed - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config.status == 'unknown' @@ -182,8 +173,6 @@ def test_positive_debug_option(self, default_org, form_data, virtwho_config, tar :expectedresults: debug option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ options = {'true': '1', 'false': '0', '1': '1', '0': '0'} @@ -210,8 +199,6 @@ def test_positive_interval_option(self, default_org, form_data, virtwho_config, :expectedresults: interval option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ options = { @@ -249,8 +236,6 @@ def test_positive_hypervisor_id_option( :expectedresults: hypervisor_id option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ # esx and rhevm support hwuuid option @@ -279,8 +264,6 @@ def test_positive_filter_option(self, default_org, form_data, virtwho_config, ta :expectedresults: filter and filter_hosts can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ whitelist = {'filtering_mode': '1', 'whitelist': '.*redhat.com'} @@ -329,8 +312,6 @@ def test_positive_proxy_option(self, default_org, form_data, virtwho_config, tar :expectedresults: http_proxy/https_proxy and no_proxy option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium :BZ: 1902199 @@ -374,8 +355,6 @@ def test_positive_configure_organization_list( :expectedresults: Config can be searched in org list - :CaseLevel: Integration - :CaseImportance: Medium """ command = get_configure_command(virtwho_config.id, default_org.name) @@ -397,8 +376,6 @@ def test_positive_deploy_configure_hypervisor_password_with_special_characters( :expectedresults: Config can be created and deployed without any error - :CaseLevel: Integration - :CaseImportance: High :BZ: 1870816,1959136 @@ -450,8 +427,6 @@ def test_positive_remove_env_option(self, default_org, form_data, virtwho_config the option "env=" should be removed from etc/virt-who.d/virt-who.conf /var/log/messages should not display warning message - :CaseLevel: Integration - :customerscenario: true :CaseImportance: Medium diff --git a/tests/foreman/virtwho/api/test_hyperv.py b/tests/foreman/virtwho/api/test_hyperv.py index 4cf0fb8d8d5..71b73f10fe1 100644 --- a/tests/foreman/virtwho/api/test_hyperv.py +++ b/tests/foreman/virtwho/api/test_hyperv.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Virt-whoConfigurePlugin :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -62,8 +57,6 @@ def test_positive_deploy_configure_by_id( :expectedresults: Config can be created and deployed - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config.status == 'unknown' @@ -120,8 +113,6 @@ def test_positive_deploy_configure_by_script( :expectedresults: Config can be created and deployed - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config.status == 'unknown' @@ -181,8 +172,6 @@ def test_positive_hypervisor_id_option( :expectedresults: hypervisor_id option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ values = ['uuid', 'hostname'] diff --git a/tests/foreman/virtwho/api/test_kubevirt.py b/tests/foreman/virtwho/api/test_kubevirt.py index f14a24e1dd2..7f6f79c65b6 100644 --- a/tests/foreman/virtwho/api/test_kubevirt.py +++ b/tests/foreman/virtwho/api/test_kubevirt.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Virt-whoConfigurePlugin :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -60,8 +55,6 @@ def test_positive_deploy_configure_by_id( :expectedresults: Config can be created and deployed - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config.status == 'unknown' @@ -118,8 +111,6 @@ def test_positive_deploy_configure_by_script( :expectedresults: Config can be created and deployed - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config.status == 'unknown' @@ -179,8 +170,6 @@ def test_positive_hypervisor_id_option( :expectedresults: hypervisor_id option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ values = ['uuid', 'hostname'] diff --git a/tests/foreman/virtwho/api/test_libvirt.py b/tests/foreman/virtwho/api/test_libvirt.py index d5c3ca87e4f..eb093806af0 100644 --- a/tests/foreman/virtwho/api/test_libvirt.py +++ b/tests/foreman/virtwho/api/test_libvirt.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Virt-whoConfigurePlugin :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -61,8 +56,6 @@ def test_positive_deploy_configure_by_id( :expectedresults: Config can be created and deployed - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config.status == 'unknown' @@ -119,8 +112,6 @@ def test_positive_deploy_configure_by_script( :expectedresults: Config can be created and deployed - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config.status == 'unknown' @@ -180,8 +171,6 @@ def test_positive_hypervisor_id_option( :expectedresults: hypervisor_id option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ values = ['uuid', 'hostname'] diff --git a/tests/foreman/virtwho/api/test_nutanix.py b/tests/foreman/virtwho/api/test_nutanix.py index 1c943b42182..6cce2d30668 100644 --- a/tests/foreman/virtwho/api/test_nutanix.py +++ b/tests/foreman/virtwho/api/test_nutanix.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Virt-whoConfigurePlugin :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -66,8 +61,6 @@ def test_positive_deploy_configure_by_id( :expectedresults: Config can be created and deployed - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config.status == 'unknown' @@ -124,8 +117,6 @@ def test_positive_deploy_configure_by_script( :expectedresults: Config can be created and deployed - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config.status == 'unknown' @@ -185,8 +176,6 @@ def test_positive_hypervisor_id_option( :expectedresults: hypervisor_id option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ values = ['uuid', 'hostname'] @@ -213,8 +202,6 @@ def test_positive_prism_central_deploy_configure_by_id_script( Config can be created and deployed The prism_central has been set in /etc/virt-who.d/vir-who.conf file - :CaseLevel: Integration - :CaseImportance: High """ form_data['prism_flavor'] = "central" @@ -285,8 +272,6 @@ def test_positive_prism_central_prism_central_option( :expectedresults: prism_flavor option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ value = 'central' diff --git a/tests/foreman/virtwho/cli/test_esx.py b/tests/foreman/virtwho/cli/test_esx.py index 081455a0b1f..72244a33b76 100644 --- a/tests/foreman/virtwho/cli/test_esx.py +++ b/tests/foreman/virtwho/cli/test_esx.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Virt-whoConfigurePlugin :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import re @@ -70,8 +65,6 @@ def test_positive_deploy_configure_by_id( :expectedresults: Config can be created and deployed - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config['status'] == 'No Report Yet' @@ -121,8 +114,6 @@ def test_positive_deploy_configure_by_script( :expectedresults: Config can be created, fetch and deploy - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config['status'] == 'No Report Yet' @@ -172,8 +163,6 @@ def test_positive_debug_option(self, default_org, form_data, virtwho_config, tar :expectedresults: debug option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ assert virtwho_config['name'] == form_data['name'] @@ -202,8 +191,6 @@ def test_positive_interval_option(self, default_org, form_data, virtwho_config, :expectedresults: interval option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ options = { @@ -236,8 +223,6 @@ def test_positive_hypervisor_id_option( :expectedresults: hypervisor_id option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ # esx and rhevm support hwuuid option @@ -265,8 +250,6 @@ def test_positive_filter_option(self, default_org, form_data, virtwho_config, ta :expectedresults: filter and filter_hosts can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ regex = '.*redhat.com' @@ -306,8 +289,6 @@ def test_positive_proxy_option(self, default_org, form_data, virtwho_config, tar :expectedresults: http_proxy and no_proxy option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium :BZ: 1902199 @@ -349,8 +330,6 @@ def test_positive_rhsm_option(self, default_org, form_data, virtwho_config, targ rhsm_hostname, rhsm_prefix are ecpected rhsm_username is not a login account - :CaseLevel: Integration - :CaseImportance: Medium """ config_file = get_configure_file(virtwho_config['id']) @@ -372,8 +351,6 @@ def test_positive_post_hypervisors(self, function_org, target_sat): :expectedresults: hypervisor/guest json can be posted and the task is success status - :CaseLevel: Integration - :customerscenario: true :CaseImportance: Medium @@ -403,8 +380,6 @@ def test_positive_foreman_packages_protection( virt-who packages can be installed the virt-who plugin can be deployed successfully - :CaseLevel: Integration - :customerscenario: true :CaseImportance: Medium @@ -431,8 +406,6 @@ def test_positive_deploy_configure_hypervisor_password_with_special_characters( :expectedresults: Config can be created and deployed without any error - :CaseLevel: Integration - :CaseImportance: High :BZ: 1870816,1959136 @@ -481,8 +454,6 @@ def test_positive_remove_env_option(self, default_org, form_data, virtwho_config the option "env=" should be removed from etc/virt-who.d/virt-who.conf /var/log/messages should not display warning message - :CaseLevel: Integration - :CaseImportance: Medium :BZ: 1834897 diff --git a/tests/foreman/virtwho/cli/test_hyperv.py b/tests/foreman/virtwho/cli/test_hyperv.py index 7a53537ab79..f7527dacff4 100644 --- a/tests/foreman/virtwho/cli/test_hyperv.py +++ b/tests/foreman/virtwho/cli/test_hyperv.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Virt-whoConfigurePlugin :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -62,8 +57,6 @@ def test_positive_deploy_configure_by_id( :expectedresults: Config can be created and deployed - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config['status'] == 'No Report Yet' @@ -107,8 +100,6 @@ def test_positive_deploy_configure_by_script( :expectedresults: Config can be created, fetch and deploy - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config['status'] == 'No Report Yet' @@ -154,8 +145,6 @@ def test_positive_hypervisor_id_option( :expectedresults: hypervisor_id option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ values = ['uuid', 'hostname'] diff --git a/tests/foreman/virtwho/cli/test_kubevirt.py b/tests/foreman/virtwho/cli/test_kubevirt.py index c9bdc0dde9b..03dc5cafa69 100644 --- a/tests/foreman/virtwho/cli/test_kubevirt.py +++ b/tests/foreman/virtwho/cli/test_kubevirt.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Virt-whoConfigurePlugin :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -60,8 +55,6 @@ def test_positive_deploy_configure_by_id( :expectedresults: Config can be created and deployed - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config['status'] == 'No Report Yet' @@ -105,8 +98,6 @@ def test_positive_deploy_configure_by_script( :expectedresults: Config can be created, fetch and deploy - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config['status'] == 'No Report Yet' @@ -152,8 +143,6 @@ def test_positive_hypervisor_id_option( :expectedresults: hypervisor_id option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ values = ['uuid', 'hostname'] diff --git a/tests/foreman/virtwho/cli/test_libvirt.py b/tests/foreman/virtwho/cli/test_libvirt.py index e4ae2033a98..a0372b55fdd 100644 --- a/tests/foreman/virtwho/cli/test_libvirt.py +++ b/tests/foreman/virtwho/cli/test_libvirt.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Virt-whoConfigurePlugin :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -61,8 +56,6 @@ def test_positive_deploy_configure_by_id( :expectedresults: Config can be created and deployed - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config['status'] == 'No Report Yet' @@ -106,8 +99,6 @@ def test_positive_deploy_configure_by_script( :expectedresults: Config can be created, fetch and deploy - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config['status'] == 'No Report Yet' @@ -153,8 +144,6 @@ def test_positive_hypervisor_id_option( :expectedresults: hypervisor_id option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ values = ['uuid', 'hostname'] diff --git a/tests/foreman/virtwho/cli/test_nutanix.py b/tests/foreman/virtwho/cli/test_nutanix.py index 501ed5f3df8..56138f5ab02 100644 --- a/tests/foreman/virtwho/cli/test_nutanix.py +++ b/tests/foreman/virtwho/cli/test_nutanix.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Virt-whoConfigurePlugin :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -66,8 +61,6 @@ def test_positive_deploy_configure_by_id( :expectedresults: Config can be created and deployed - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config['status'] == 'No Report Yet' @@ -109,8 +102,6 @@ def test_positive_deploy_configure_by_script( :expectedresults: Config can be created, fetch and deploy - :CaseLevel: Integration - :CaseImportance: High """ assert virtwho_config['status'] == 'No Report Yet' @@ -154,8 +145,6 @@ def test_positive_hypervisor_id_option( :expectedresults: hypervisor_id option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ values = ['uuid', 'hostname'] @@ -185,8 +174,6 @@ def test_positive_prism_central_deploy_configure_by_id_script( Config can be created and deployed The prism_central has been set in /etc/virt-who.d/vir-who.conf file - :CaseLevel: Integration - :CaseImportance: High """ form_data['prism-flavor'] = "central" @@ -241,8 +228,6 @@ def test_positive_prism_central_prism_central_option( :expectedresults: prism_central option can be updated. - :CaseLevel: Integration - :CaseImportance: Medium """ value = 'central' diff --git a/tests/foreman/virtwho/conftest.py b/tests/foreman/virtwho/conftest.py index 2e80c5b091e..432270b8730 100644 --- a/tests/foreman/virtwho/conftest.py +++ b/tests/foreman/virtwho/conftest.py @@ -49,6 +49,5 @@ def test_foo(session): with session: # your ui test steps here session.architecture.create({'name': 'bar'}) - """ return Session(test_name, module_user.login, module_user.password) diff --git a/tests/foreman/virtwho/ui/test_esx.py b/tests/foreman/virtwho/ui/test_esx.py index aefec297b0d..96e23b17975 100644 --- a/tests/foreman/virtwho/ui/test_esx.py +++ b/tests/foreman/virtwho/ui/test_esx.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Virt-whoConfigurePlugin :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from datetime import datetime @@ -79,8 +74,6 @@ def test_positive_deploy_configure_by_id(self, default_org, session, form_data): 4. Virtual sku can be generated and attached 5. Config can be deleted - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') @@ -116,8 +109,6 @@ def test_positive_deploy_configure_by_script(self, default_org, session, form_da 4. Virtual sku can be generated and attached 5. Config can be deleted - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') @@ -150,8 +141,6 @@ def test_positive_debug_option(self, default_org, session, form_data): 1. if debug is checked, VIRTWHO_DEBUG=1 in /etc/sysconfig/virt-who 2. if debug is unchecked, VIRTWHO_DEBUG=0 in /etc/sysconfig/virt-who - :CaseLevel: Integration - :CaseImportance: Medium """ name = gen_string('alpha') @@ -184,8 +173,6 @@ def test_positive_interval_option(self, default_org, session, form_data): VIRTWHO_INTERVAL can be changed in /etc/sysconfig/virt-who if the dropdown option is selected to Every 2/4/8/12/24 hours, Every 2/3 days. - :CaseLevel: Integration - :CaseImportance: Medium """ name = gen_string('alpha') @@ -225,8 +212,6 @@ def test_positive_hypervisor_id_option(self, default_org, session, form_data): hypervisor_id can be changed in virt-who-config-{}.conf if the dropdown option is selected to uuid/hwuuid/hostname. - :CaseLevel: Integration - :CaseImportance: Medium """ name = gen_string('alpha') @@ -259,8 +244,6 @@ def test_positive_filtering_option(self, default_org, session, form_data): 1. if filtering is selected to Whitelist, 'Filter hosts' can be set. 2. if filtering is selected to Blacklist, 'Exclude hosts' can be set. - :CaseLevel: Integration - :CaseImportance: Medium :BZ: 1735670 @@ -310,8 +293,6 @@ def test_positive_proxy_option(self, default_org, session, form_data): :expectedresults: http_proxy/https_proxy and NO_PROXY will be setting in /etc/sysconfig/virt-who. - :CaseLevel: Integration - :CaseImportance: Medium """ https_proxy, https_proxy_name, https_proxy_id = create_http_proxy(org=default_org) @@ -355,8 +336,6 @@ def test_positive_virtwho_roles(self, session): :expectedresults: 'Virt-who Manager', 'Virt-who Reporter', 'Virt-who Viewer' existing - :CaseLevel: Integration - :CaseImportance: Low """ roles = { @@ -387,7 +366,7 @@ def test_positive_virtwho_configs_widget(self, default_org, session, form_data): :id: 5d61ce00-a640-4823-89d4-7b1d02b50ea6 - :Steps: + :steps: 1. Create a Virt-who Configuration 2. Navigate Monitor -> Dashboard @@ -395,8 +374,6 @@ def test_positive_virtwho_configs_widget(self, default_org, session, form_data): :expectedresults: The widget is updated with all details. - :CaseLevel: Integration - :CaseImportance: Low """ org_name = gen_string('alpha') @@ -646,8 +623,6 @@ def test_positive_overview_label_name(self, default_org, form_data, session): :BZ: 1649928 - :CaseLevel: Integration - :customerscenario: true :CaseImportance: Medium @@ -712,8 +687,6 @@ def test_positive_last_checkin_status(self, default_org, form_data, session): :BZ: 1652323 - :CaseLevel: Integration - :customerscenario: true :CaseImportance: Medium @@ -753,8 +726,6 @@ def test_positive_deploy_configure_hypervisor_password_with_special_characters( :expectedresults: Config can be created and deployed without any error - :CaseLevel: Integration - :CaseImportance: High :BZ: 1870816,1959136 @@ -807,8 +778,6 @@ def test_positive_remove_env_option(self, default_org, form_data, target_sat, se the option "env=" should be removed from etc/virt-who.d/virt-who.conf /var/log/messages should not display warning message - :CaseLevel: Integration - :CaseImportance: Medium :BZ: 1834897 diff --git a/tests/foreman/virtwho/ui/test_hyperv.py b/tests/foreman/virtwho/ui/test_hyperv.py index 9ff86949c7c..0a600f723a2 100644 --- a/tests/foreman/virtwho/ui/test_hyperv.py +++ b/tests/foreman/virtwho/ui/test_hyperv.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Virt-whoConfigurePlugin :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -57,8 +52,6 @@ def test_positive_deploy_configure_by_id(self, default_org, session, form_data): 4. Virtual sku can be generated and attached 5. Config can be deleted - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') @@ -94,8 +87,6 @@ def test_positive_deploy_configure_by_script(self, default_org, session, form_da 4. Virtual sku can be generated and attached 5. Config can be deleted - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') @@ -128,8 +119,6 @@ def test_positive_hypervisor_id_option(self, default_org, session, form_data): hypervisor_id can be changed in virt-who-config-{}.conf if the dropdown option is selected to uuid/hwuuid/hostname. - :CaseLevel: Integration - :CaseImportance: Medium """ name = gen_string('alpha') diff --git a/tests/foreman/virtwho/ui/test_kubevirt.py b/tests/foreman/virtwho/ui/test_kubevirt.py index 9fea05c45fa..394d4e3aa4b 100644 --- a/tests/foreman/virtwho/ui/test_kubevirt.py +++ b/tests/foreman/virtwho/ui/test_kubevirt.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Virt-whoConfigurePlugin :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -55,8 +50,6 @@ def test_positive_deploy_configure_by_id(self, default_org, session, form_data): 4. Virtual sku can be generated and attached 5. Config can be deleted - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') @@ -92,8 +85,6 @@ def test_positive_deploy_configure_by_script(self, default_org, session, form_da 4. Virtual sku can be generated and attached 5. Config can be deleted - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') @@ -126,8 +117,6 @@ def test_positive_hypervisor_id_option(self, default_org, session, form_data): hypervisor_id can be changed in virt-who-config-{}.conf if the dropdown option is selected to uuid/hwuuid/hostname. - :CaseLevel: Integration - :CaseImportance: Medium """ name = gen_string('alpha') diff --git a/tests/foreman/virtwho/ui/test_libvirt.py b/tests/foreman/virtwho/ui/test_libvirt.py index 675d90a23f3..99d9b632966 100644 --- a/tests/foreman/virtwho/ui/test_libvirt.py +++ b/tests/foreman/virtwho/ui/test_libvirt.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Virt-whoConfigurePlugin :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -56,8 +51,6 @@ def test_positive_deploy_configure_by_id(self, default_org, session, form_data): 4. Virtual sku can be generated and attached 5. Config can be deleted - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') @@ -93,8 +86,6 @@ def test_positive_deploy_configure_by_script(self, default_org, session, form_da 4. Virtual sku can be generated and attached 5. Config can be deleted - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') @@ -127,8 +118,6 @@ def test_positive_hypervisor_id_option(self, default_org, session, form_data): hypervisor_id can be changed in virt-who-config-{}.conf if the dropdown option is selected to uuid/hwuuid/hostname. - :CaseLevel: Integration - :CaseImportance: Medium """ name = gen_string('alpha') diff --git a/tests/foreman/virtwho/ui/test_nutanix.py b/tests/foreman/virtwho/ui/test_nutanix.py index 23bd5f1dd52..1b56c38bde6 100644 --- a/tests/foreman/virtwho/ui/test_nutanix.py +++ b/tests/foreman/virtwho/ui/test_nutanix.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Virt-whoConfigurePlugin :team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -58,8 +53,6 @@ def test_positive_deploy_configure_by_id(self, default_org, session, form_data): 4. Virtual sku can be generated and attached 5. Config can be deleted - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') @@ -95,8 +88,6 @@ def test_positive_deploy_configure_by_script(self, default_org, session, form_da 4. Virtual sku can be generated and attached 5. Config can be deleted - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') @@ -129,8 +120,6 @@ def test_positive_hypervisor_id_option(self, default_org, session, form_data): hypervisor_id can be changed in virt-who-config-{}.conf if the dropdown option is selected to uuid/hwuuid/hostname. - :CaseLevel: Integration - :CaseImportance: Medium """ name = gen_string('alpha') @@ -169,8 +158,6 @@ def test_positive_prism_central_deploy_configure_by_id_script( 5. Virtual sku can be generated and attached 6. Config can be deleted - :CaseLevel: Integration - :CaseImportance: High """ name = gen_string('alpha') @@ -214,8 +201,6 @@ def test_positive_prism_central_prism_flavor_option(self, default_org, session, prism_flavor can be changed in virt-who-config-{}.conf if the dropdown option is selected to prism central. - :CaseLevel: Integration - :CaseImportance: Medium """ name = gen_string('alpha') diff --git a/tests/upgrades/test_activation_key.py b/tests/upgrades/test_activation_key.py index 226a0cf0c98..11d37ccdab0 100644 --- a/tests/upgrades/test_activation_key.py +++ b/tests/upgrades/test_activation_key.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ActivationKeys :Team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest from requests.exceptions import HTTPError diff --git a/tests/upgrades/test_bookmarks.py b/tests/upgrades/test_bookmarks.py index a3f330e7569..b0d04cfa985 100644 --- a/tests/upgrades/test_bookmarks.py +++ b/tests/upgrades/test_bookmarks.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Search :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest @@ -34,7 +29,7 @@ def test_pre_create_public_disable_bookmark(self, request, target_sat): :id: preupgrade-13904b14-6340-4b85-a56f-98080cf50a92 - :Steps: + :steps: 1. Create public disabled bookmarks before the upgrade for all system entities using available bookmark data. @@ -71,7 +66,7 @@ def test_post_create_public_disable_bookmark(self, dependent_scenario_name, targ :id: postupgrade-13904b14-6340-4b85-a56f-98080cf50a92 - :Steps: + :steps: 1. Check the bookmark status after post-upgrade. 2. Remove the bookmark. @@ -105,7 +100,7 @@ def test_pre_create_public_enable_bookmark(self, request, target_sat): :id: preupgrade-93c419db-66b4-4c9a-a82a-a6a68703881f - :Steps: + :steps: 1. Create public enable bookmarks before the upgrade for all system entities using available bookmark data. 2. Check the bookmark attribute(controller, name, query public) status @@ -140,7 +135,7 @@ def test_post_create_public_enable_bookmark(self, dependent_scenario_name, targe :id: postupgrade-93c419db-66b4-4c9a-a82a-a6a68703881f - :Steps: + :steps: 1. Check the bookmark status after post-upgrade. 2. Remove the bookmark. diff --git a/tests/upgrades/test_capsule.py b/tests/upgrades/test_capsule.py index 8788105c074..c7cf63e9977 100644 --- a/tests/upgrades/test_capsule.py +++ b/tests/upgrades/test_capsule.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ForemanProxy :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import os diff --git a/tests/upgrades/test_classparameter.py b/tests/upgrades/test_classparameter.py index 2a123c7a8a8..b7f8d1c6ed1 100644 --- a/tests/upgrades/test_classparameter.py +++ b/tests/upgrades/test_classparameter.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Puppet :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import json diff --git a/tests/upgrades/test_client.py b/tests/upgrades/test_client.py index 8877550a29f..8ca57aa4586 100644 --- a/tests/upgrades/test_client.py +++ b/tests/upgrades/test_client.py @@ -7,17 +7,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts-Content :Team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/upgrades/test_contentview.py b/tests/upgrades/test_contentview.py index 2f50ee5db3d..9b7fa90bb56 100644 --- a/tests/upgrades/test_contentview.py +++ b/tests/upgrades/test_contentview.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ContentViews :Team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_alpha import pytest diff --git a/tests/upgrades/test_errata.py b/tests/upgrades/test_errata.py index caa4cf21fc5..ed2407d67c6 100644 --- a/tests/upgrades/test_errata.py +++ b/tests/upgrades/test_errata.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: ErrataManagement :Team: Phoenix-content -:TestType: Functional - :CaseImportance: Critical -:Upstream: No """ import pytest from wait_for import wait_for diff --git a/tests/upgrades/test_host.py b/tests/upgrades/test_host.py index 7e8f97c7a81..f1a8e845039 100644 --- a/tests/upgrades/test_host.py +++ b/tests/upgrades/test_host.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest @@ -113,9 +108,7 @@ def test_pre_create_gce_cr_and_host( :id: 889975f2-56ca-4584-95a7-21c513969630 - :CaseLevel: Component - - ::CaseImportance: Critical + :CaseImportance: Critical :steps: 1. Create a GCE Compute Resource diff --git a/tests/upgrades/test_hostcontent.py b/tests/upgrades/test_hostcontent.py index 172039c1930..0a6a60e2a9e 100644 --- a/tests/upgrades/test_hostcontent.py +++ b/tests/upgrades/test_hostcontent.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Hosts-Content :Team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/upgrades/test_hostgroup.py b/tests/upgrades/test_hostgroup.py index c09de90e186..a6d67a106db 100644 --- a/tests/upgrades/test_hostgroup.py +++ b/tests/upgrades/test_hostgroup.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: HostGroup :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest diff --git a/tests/upgrades/test_performance_tuning.py b/tests/upgrades/test_performance_tuning.py index 21843253ec1..b67d63c2daa 100644 --- a/tests/upgrades/test_performance_tuning.py +++ b/tests/upgrades/test_performance_tuning.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Installation :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import filecmp diff --git a/tests/upgrades/test_provisioningtemplate.py b/tests/upgrades/test_provisioningtemplate.py index b5bc11af363..9d681a56ead 100644 --- a/tests/upgrades/test_provisioningtemplate.py +++ b/tests/upgrades/test_provisioningtemplate.py @@ -8,13 +8,8 @@ :Team: Rocket -:TestType: Functional - -:CaseLevel: Integration - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest diff --git a/tests/upgrades/test_puppet.py b/tests/upgrades/test_puppet.py index e1f94712b61..b0c96394cc8 100644 --- a/tests/upgrades/test_puppet.py +++ b/tests/upgrades/test_puppet.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Puppet :Team: Rocket -:TestType: Functional - :CaseImportance: Medium -:Upstream: No """ import pytest diff --git a/tests/upgrades/test_remoteexecution.py b/tests/upgrades/test_remoteexecution.py index 78af475c8da..62d469e5bc9 100644 --- a/tests/upgrades/test_remoteexecution.py +++ b/tests/upgrades/test_remoteexecution.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: RemoteExecution :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/upgrades/test_repository.py b/tests/upgrades/test_repository.py index ea04b4218d5..63f13197a9a 100644 --- a/tests/upgrades/test_repository.py +++ b/tests/upgrades/test_repository.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Repositories :Team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/upgrades/test_role.py b/tests/upgrades/test_role.py index 2202ade883d..c2ee4b25d20 100644 --- a/tests/upgrades/test_role.py +++ b/tests/upgrades/test_role.py @@ -4,17 +4,12 @@ :CaseAutomation: NotAutomated -:CaseLevel: Acceptance - :CaseComponent: UsersRoles :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/upgrades/test_satellite_maintain.py b/tests/upgrades/test_satellite_maintain.py index a006c8ab714..03abb569e94 100644 --- a/tests/upgrades/test_satellite_maintain.py +++ b/tests/upgrades/test_satellite_maintain.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: SatelliteMaintain :Team: Platform -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import re diff --git a/tests/upgrades/test_satellitesync.py b/tests/upgrades/test_satellitesync.py index dcbc7866f86..ad9356d2f97 100644 --- a/tests/upgrades/test_satellitesync.py +++ b/tests/upgrades/test_satellitesync.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Component - :CaseComponent: InterSatelliteSync :Team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/upgrades/test_subnet.py b/tests/upgrades/test_subnet.py index 63813c06de2..0fbc2f38277 100644 --- a/tests/upgrades/test_subnet.py +++ b/tests/upgrades/test_subnet.py @@ -4,17 +4,12 @@ :CaseAutomation: NotAutomated -:CaseLevel: Acceptance - :CaseComponent: Networking :Team: Rocket -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/upgrades/test_subscription.py b/tests/upgrades/test_subscription.py index 9adb8710ffc..917952adaa1 100644 --- a/tests/upgrades/test_subscription.py +++ b/tests/upgrades/test_subscription.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: SubscriptionManagement :Team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from manifester import Manifester import pytest diff --git a/tests/upgrades/test_syncplan.py b/tests/upgrades/test_syncplan.py index ba14f9de831..5939c8e16dc 100644 --- a/tests/upgrades/test_syncplan.py +++ b/tests/upgrades/test_syncplan.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: SyncPlans :Team: Phoenix-content -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_choice import pytest diff --git a/tests/upgrades/test_user.py b/tests/upgrades/test_user.py index cd3a8e55297..b21da9b5ba1 100644 --- a/tests/upgrades/test_user.py +++ b/tests/upgrades/test_user.py @@ -4,17 +4,12 @@ :CaseAutomation: NotAutomated -:CaseLevel: Acceptance - :CaseComponent: UsersRoles :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ import pytest diff --git a/tests/upgrades/test_usergroup.py b/tests/upgrades/test_usergroup.py index aaa337d316f..0832602dbb3 100644 --- a/tests/upgrades/test_usergroup.py +++ b/tests/upgrades/test_usergroup.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: UsersRoles :Team: Endeavour -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest diff --git a/tests/upgrades/test_virtwho.py b/tests/upgrades/test_virtwho.py index f1b1d61df8f..0ca6c48408b 100644 --- a/tests/upgrades/test_virtwho.py +++ b/tests/upgrades/test_virtwho.py @@ -4,17 +4,12 @@ :CaseAutomation: Automated -:CaseLevel: Acceptance - :CaseComponent: Virt-whoConfigurePlugin :Team: Phoenix-subscriptions -:TestType: Functional - :CaseImportance: High -:Upstream: No """ from fauxfactory import gen_string import pytest