Skip to content

Commit

Permalink
Update QE Security tests' metadata
Browse files Browse the repository at this point in the history
  • Loading branch information
paolostivanin committed Oct 3, 2022
1 parent daa8ae6 commit 78f1189
Show file tree
Hide file tree
Showing 50 changed files with 50 additions and 50 deletions.
2 changes: 1 addition & 1 deletion lib/krb5crypt.pm
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
# SPDX-License-Identifier: GPL-2.0-or-later
#
# Summary: Public variables and functions for krb5 cryptographic testing
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>

package krb5crypt;

Expand Down
2 changes: 1 addition & 1 deletion lib/ntlm_auth.pm
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
# SPDX-License-Identifier: FSFAP

# Summary: Basic variable setting for ntlm auth installer
# Maintainer: rfan1 <richard.fan@suse.com>
# Maintainer: QE Security <none@suse.de>

package ntlm_auth;

Expand Down
2 changes: 1 addition & 1 deletion lib/openscaptest.pm
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
# SPDX-License-Identifier: GPL-2.0-or-later

# Summary: Base module for openSCAP test cases
# Maintainer: llzhao <llzhao@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#37006

package openscaptest;
Expand Down
2 changes: 1 addition & 1 deletion lib/opensslca.pm
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
# certificates to secure an intranet website, or
# for issuing certificates to clients to allow them
# to authenticate to a server
# Maintainer: rfan1 <richard.fan@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#88513, tc#1768672

package opensslca;
Expand Down
2 changes: 1 addition & 1 deletion lib/services/389ds_server.pm
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@

# Summary: Package for 389ds_server service tests
#
# Maintainer: rfan1 <richard.fan@suse.com>
# Maintainer: QE Security <none@suse.de>

package services::389ds_server;
use base "opensusebasetest";
Expand Down
2 changes: 1 addition & 1 deletion lib/services/389ds_sssd_client.pm
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@

# Summary: Package for 389ds sssd client service tests
#
# Maintainer: rfan1 <richard.fan@suse.com>
# Maintainer: QE Security <none@suse.de>

package services::389ds_sssd;
use base 'opensusebasetest';
Expand Down
2 changes: 1 addition & 1 deletion lib/web_browser.pm
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
# SPDX-License-Identifier: GPL-2.0-or-later

# Summary: common functions for FIPS web browser tests
# Maintainer: llzhao <llzhao@suse.com>
# Maintainer: QE Security <none@suse.de>

package web_browser;

Expand Down
2 changes: 1 addition & 1 deletion tests/console/aide_check.pm
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@
# 3. Check the difference between datebase and file system
# 4. Modified the file system and run aide check again
#
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#64364, poo#102032, tc#1744128

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/console/apache_ssl.pm
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
# Summary: Enable SSL module on Apache2 server
# calls setup_apache2 with mode = SSL (lib/apachetest.pm)
#
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#65375, poo#67309, poo#101782

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/console/clamav.pm
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@
# original location and executed on its own dedicated test suites, qam-clamav
# for maintenance and extra_tests_clamav in functional.
#
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: TC1595169, poo#46880, poo#65375, poo#80182

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/console/cryptsetup.pm
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
# Summary: FIPS: cryptsetup
# Attempt to verify the command of cryptsetup whether can be worked in FIPS mode
#
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: tc#1528909, poo#101575


Expand Down
2 changes: 1 addition & 1 deletion tests/console/curl_https.pm
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@
# - switch to normal user
# - connect to a website using https (retry multiple times in case of failure)
#
# Maintainer: Dominique Leuenberger <[email protected]>, Ben Chou <bchou@suse.com>
# Maintainer: Dominique Leuenberger <[email protected]>, QE Security <none@suse.de>
# Tags: poo#106011, poo#109840

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/console/fetchmail_ssl.pm
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
# Note: fetchmail connects to a remote mail server (running dovecot)
# and fetch mails to localhost, then deliver mails (by postfix) to
# local mailbox.
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>

use base "consoletest";
use strict;
Expand Down
2 changes: 1 addition & 1 deletion tests/console/gpg.pm
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@
# - Check test file signature
# - Cleanup
#
# Maintainer: Petr Cervinka <[email protected]>, Ben Chou <bchou@suse.com>
# Maintainer: Petr Cervinka <[email protected]>, QE Security <none@suse.de>
# Tags: poo#65375, poo#97685, poo#104556

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/console/ipsec_tools_h2h.pm
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
#
# Package: ipsec-tools iproute2
# Summary: Test Racoon host-to-host scenario
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>

use strict;
use warnings;
Expand Down
2 changes: 1 addition & 1 deletion tests/console/journald_fss.pm
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@
# Verify key should be generated,as well as a QR code
# No failed messages output
#
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#102038, poo#107485

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/console/libmicrohttpd.pm
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@

# Package: greenbone-security-assistant
# Summary: Case 1525263 - Verify libmicrohttpd via Greenbone Security Assistant
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>

use base "consoletest";
use strict;
Expand Down
2 changes: 1 addition & 1 deletion tests/console/links_https.pm
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
# Summary: Test with "FIPS" installed and enabled, the WWW browser "links"
# can access https web pages successfully.
#
# Maintainer: llzhao <llzhao@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#52289, tc#1621467, poo#65375

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/console/lynx_https.pm
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
# Summary: Test with "FIPS" installed and enabled, the WWW browser "lynx"
# can access https web pages successfully.
#
# Maintainer: llzhao <llzhao@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#52292, tc#1621466, poo#65375

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/console/mailx_ssl.pm
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
#
# Package: mailx
# Summary: Test mailx send/reveive mails with SSL enabled
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>

use base "consoletest";
use strict;
Expand Down
2 changes: 1 addition & 1 deletion tests/console/mutt_ssl.pm
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
#
# Package: mutt curl
# Summary: Test mutt mail agent with SSL enabled
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>

use base "consoletest";
use strict;
Expand Down
2 changes: 1 addition & 1 deletion tests/console/openvswitch_ssl.pm
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
# Package: python openvswitch
# Summary: The test to connect openvswitch to openflow with SSL enabled
#
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: TC1595181, poo#65375, poo#107134

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/console/postfix_tls.pm
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
# Note: The test case can be run separately for postfix sanity test,
# or run as stand-alone mail server (together with dovecot)
# in multi-machine test scenario if MAIL_SERVER var set.
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>

use base "consoletest";
use strict;
Expand Down
2 changes: 1 addition & 1 deletion tests/console/w3m_https.pm
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@
# Summary: Add w3m_https test case and fips test entry
# Add w3m_https.pm test case was located in console/w3m_https.pm
# Add w3m_https.pm test entry in load_fips_tests_web() in sle/main.pm
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>

use base "consoletest";
use strict;
Expand Down
2 changes: 1 addition & 1 deletion tests/console/wget_https.pm
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@

# Package: wget
# Summary: FIPS: wget
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: tc#1461937


Expand Down
2 changes: 1 addition & 1 deletion tests/feature/feature_console/suseconnect.pm
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
# SPDX-License-Identifier: FSFAP

# Summary: [316585] Drop suseRegister
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: tc#1480023

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/feature/feature_console/zypper_crit_sec_fix_only.pm
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@

# Summary: Test zypper can update critical security fixes only
# Tags: fate#318760, tc#1480288
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>

use base "consoletest";
use strict;
Expand Down
2 changes: 1 addition & 1 deletion tests/fips/curl_fips_rc4_seed.pm
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@
# Both RC4 and SEED are not approved cipher by FIPS140-2.
# In a fips enabled system, it will get a failed result if run curl command
# with RC4 and SEED ciphers.
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>

use base "consoletest";
use testapi;
Expand Down
2 changes: 1 addition & 1 deletion tests/fips/fips_install_separate_boot_verify.pm
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
# We need make sure FIPS is in enabled status;
# boot loader should add right boot partition.
#
# Maintainer: rfan1 <richard.fan@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#112028

use base 'opensusebasetest';
Expand Down
2 changes: 1 addition & 1 deletion tests/fips/fips_setup.pm
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
# ENV mode - selected by FIPS_ENV_MODE
# Global mode - setup fips=1 in kernel command line
#
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#39071, poo#105591, poo#105999, poo#109133

use base 'opensusebasetest';
Expand Down
2 changes: 1 addition & 1 deletion tests/fips/gnutls/gnutls_base_check.pm
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
# Summary: SLES15SP2 and SLES15SP4 FIPS certification need to certify gnutls and libnettle
# In this case, will do some base check for gnutls
#
# Maintainer: rfan1 <richard.fan@suse.com>, Ben Chou <[email protected]>
# Maintainer: QE Security <none@suse.de>, Ben Chou <[email protected]>
# Tags: poo#63223, poo#102770, tc#1744099

use base 'consoletest';
Expand Down
2 changes: 1 addition & 1 deletion tests/fips/gnutls/gnutls_client.pm
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
# Package: gnutls
# Summary: SLES15SP2 FIPS certification, we need to certify gnutls and libnettle
# In this case, will test connecting the GnuTLS server from client
# Maintainer: rfan1 <richard.fan@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#63223, tc#1744099

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/fips/gnutls/gnutls_server.pm
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
# Package: gnutls
# Summary: SLES15SP2 FIPS certification, we need to certify gnutls and libnettle
# In this case, will configure GnuTLS server
# Maintainer: rfan1 <richard.fan@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#63223, tc#1744099

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/fips/libtool/liboauth.pm
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@
# or verify signatures using either NSS or OpenSSL for calculating
# the hash/signatures.
#
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#81260, tc#1767540

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/fips/mozilla_nss/apache_nssfips.pm
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
# SPDX-License-Identifier: FSFAP

# Summary: Enable NSS module for Apache2 server with NSSFips on
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>

use strict;
use warnings;
Expand Down
2 changes: 1 addition & 1 deletion tests/fips/mozilla_nss/firefox_nss.pm
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
# Package: MozillaFirefox
# Summary: FIPS mozilla-nss test for firefox : firefox_nss
#
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tag: poo#47018, poo#58079, poo#71458, poo#77140, poo#77143,
# poo#80754, poo#104314, poo#104989, poo#105343

Expand Down
2 changes: 1 addition & 1 deletion tests/fips/openssh/openssh_fips.pm
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@
# algorithm in fips mode, just like blowfish cipher
# or MD5 hash.
#
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: tc#1525228, poo#90458

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/fips/openssl/dirmngr_daemon.pm
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
# Package: gpg2
# Summary: Test dirmngr daemon and valid/revoked certificate
#
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#52430, poo#52937, tc#1729313, poo#65375

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/fips/openssl/dirmngr_setup.pm
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
# Summary: Setup dirmngr testing environment - create Root CA,
# testing ca, testing DER, and CRL
#
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#52430, poo#52937, tc#1729313

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/fips/openssl/openssl_fips_alglist.pm
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
# Summary: openssl should only list FIPS approved cryptographic functions
# while system is working in FIPS mode
#
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#44831, poo#65375, poo#101932, poo#111818

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/fips/openssl/openssl_fips_cipher.pm
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
# In fips mode, openssl only works with the FIPS
# approved Cihper algorithms: AES and DES3
#
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#44837

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/fips/openssl/openssl_fips_hash.pm
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@
# test cases for fips verificaton when FIPS_ENABLED is set, like
# the cases to verify opessl hash, cipher, or public key algorithms
#
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#44834, poo#64649, poo#64842, poo#104184

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/fips/openssl/openssl_pubkey_dsa.pm
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@
#
# According to openssl wiki, "dss1" digest method is not available in openssl-1.1-x any more
#
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>
# Tags: poo#47471, poo#48020

use base "consoletest";
Expand Down
2 changes: 1 addition & 1 deletion tests/fips/openssl/openssl_pubkey_rsa.pm
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@
#
# For DSA public key, test 1024/2048/3072 bits key pair generation,
# and message signing/verification.
# Maintainer: Ben Chou <bchou@suse.com>
# Maintainer: QE Security <none@suse.de>

use base "consoletest";
use testapi;
Expand Down
Loading

0 comments on commit 78f1189

Please sign in to comment.