summaryrefslogtreecommitdiffstats
path: root/tests/dogtag
diff options
context:
space:
mode:
authorAsha Akkiangady <aakkiang@redhat.com>2014-10-01 16:38:31 -0400
committerAsha Akkiangady <aakkiang@redhat.com>2014-10-01 16:44:21 -0400
commit23b870e30b9ba5295baa41130147b7646c995975 (patch)
tree1d191acf90a7c4b9dc8639d5a867926d3140c761 /tests/dogtag
parentca56e09c764dae4c604b8c7e37128248968f314d (diff)
downloadpki-23b870e30b9ba5295baa41130147b7646c995975.tar.gz
pki-23b870e30b9ba5295baa41130147b7646c995975.tar.xz
pki-23b870e30b9ba5295baa41130147b7646c995975.zip
Fixed uid with i18n tests to expect error message.
pki-ca-user-add tests updated with host and port.
Diffstat (limited to 'tests/dogtag')
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-add.sh740
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-add-ca.sh315
2 files changed, 525 insertions, 530 deletions
diff --git a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-add.sh b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-add.sh
index 5e0cb995d..b1e30e02d 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-add.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-add.sh
@@ -40,13 +40,39 @@
. /opt/rhqa_pki/env.sh
########################################################################
-#pki-user-cli-user-ca.shn setup should be first executed prior to pki-ca-user-cli-ca-user-add.sh
+#pki-user-cli-role-user-create-tests should be first executed prior to pki-ca-user-cli-ca-user-add.sh
########################################################################
-########################################################################
-# Test Suite Globals
-########################################################################
run_pki-ca-user-cli-ca-user-add_tests(){
+ subsystemId=$1
+ SUBSYSTEM_TYPE=$2
+ MYROLE=$3
+ prefix=$subsystemId
+ if [ "$TOPO9" = "TRUE" ] ; then
+ ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
+ prefix=$subsystemId
+ CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ elif [ "$MYROLE" = "MASTER" ] ; then
+ if [[ $subsystemId == SUBCA* ]]; then
+ ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
+ prefix=$subsystemId
+ CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ else
+ ADMIN_CERT_LOCATION=$ROOTCA_ADMIN_CERT_LOCATION
+ prefix=ROOTCA
+ CLIENT_PKCS12_PASSWORD=$ROOTCA_CLIENT_PKCS12_PASSWORD
+ fi
+ else
+ ADMIN_CERT_LOCATION=$(eval echo \$${MYROLE}_ADMIN_CERT_LOCATION)
+ prefix=$MYROLE
+ CLIENT_PKCS12_PASSWORD=$(eval echo \$${MYROLE}_CLIENT_PKCS12_PASSWORD)
+ fi
+
+ SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
+ untrusted_cert_nickname=role_user_UTCA
+ untrusted_cert_db_location=$UNTRUSTED_CERT_DB_LOCATION
+ untrusted_cert_db_password=$UNTRUSTED_CERT_DB_PASSWORD
+
rlPhaseStartSetup "pki_ca_user_cli_ca_user_add-startup: Create temporary directory"
rlRun "TmpDir=\`mktemp -d\`" 0 "Creating tmp directory"
rlRun "pushd $TmpDir"
@@ -83,16 +109,14 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-001: Add a user to CA using CA_adminV"
user1=ca_agent2
user1fullname="Test ca_agent"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName=\"$user1fullname\" $user1"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$user1fullname\" $user1 > $TmpDir/pki-ca-user-add-001.out" \
0 \
- "Add user $user1 to CA_adminV"
+ "Add user $user1 to ${prefix}_adminV"
rlAssertGrep "Added user \"$user1\"" "$TmpDir/pki-ca-user-add-001.out"
rlAssertGrep "User ID: $user1" "$TmpDir/pki-ca-user-add-001.out"
rlAssertGrep "Full name: $user1fullname" "$TmpDir/pki-ca-user-add-001.out"
@@ -101,11 +125,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-002: Maximum length of user id"
user2=`cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 2048 | head -n 1`
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test \"$user2\" > $TmpDir/pki-ca-user-add-001_1.out" \
0 \
- "Added user using CA_adminV with maximum user id length"
+ "Added user using ${prefix}_adminV with maximum user id length"
actual_userid_string=`cat $TmpDir/pki-ca-user-add-001_1.out | grep 'User ID:' | xargs echo`
expected_userid_string="User ID: $user2"
if [[ $actual_userid_string = $expected_userid_string ]] ; then
@@ -119,11 +145,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-003: User id with # character"
user3=abc#
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test $user3 > $TmpDir/pki-ca-user-add-001_2.out" \
0 \
- "Added user using CA_adminV, user id with # character"
+ "Added user using ${prefix}_adminV, user id with # character"
rlAssertGrep "Added user \"$user3\"" "$TmpDir/pki-ca-user-add-001_2.out"
rlAssertGrep "User ID: $user3" "$TmpDir/pki-ca-user-add-001_2.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_2.out"
@@ -132,11 +160,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-004: User id with $ character"
user4=abc$
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test $user4 > $TmpDir/pki-ca-user-add-001_3.out" \
0 \
- "Added user using CA_adminV, user id with $ character"
+ "Added user using ${prefix}_adminV, user id with $ character"
rlAssertGrep "Added user \"$user4\"" "$TmpDir/pki-ca-user-add-001_3.out"
rlAssertGrep "User ID: abc\\$" "$TmpDir/pki-ca-user-add-001_3.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_3.out"
@@ -145,11 +175,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-005:User id with @ character"
user5=abc@
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test $user5 > $TmpDir/pki-ca-user-add-001_4.out " \
0 \
- "Added user using CA_adminV, user id with @ character"
+ "Added user using ${prefix}_adminV, user id with @ character"
rlAssertGrep "Added user \"$user5\"" "$TmpDir/pki-ca-user-add-001_4.out"
rlAssertGrep "User ID: $user5" "$TmpDir/pki-ca-user-add-001_4.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_4.out"
@@ -158,11 +190,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-006:User id with ? character"
user6=abc?
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test $user6 > $TmpDir/pki-ca-user-add-001_5.out " \
0 \
- "Added user using CA_adminV, user id with ? character"
+ "Added user using ${prefix}_adminV, user id with ? character"
rlAssertGrep "Added user \"$user6\"" "$TmpDir/pki-ca-user-add-001_5.out"
rlAssertGrep "User ID: $user6" "$TmpDir/pki-ca-user-add-001_5.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_5.out"
@@ -171,11 +205,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-007:User id as 0"
user7=0
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test $user7 > $TmpDir/pki-ca-user-add-001_6.out " \
0 \
- "Added user using CA_adminV, user id 0"
+ "Added user using ${prefix}_adminV, user id 0"
rlAssertGrep "Added user \"$user7\"" "$TmpDir/pki-ca-user-add-001_6.out"
rlAssertGrep "User ID: $user7" "$TmpDir/pki-ca-user-add-001_6.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_6.out"
@@ -184,11 +220,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-008:--email with maximum length"
email=`cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 2048 | head -n 1`
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --email=\"$email\" u1 > $TmpDir/pki-ca-user-add-001_7.out" \
0 \
- "Added user using CA_adminV with maximum --email length"
+ "Added user using ${prefix}_adminV with maximum --email length"
rlAssertGrep "Added user \"u1\"" "$TmpDir/pki-ca-user-add-001_7.out"
rlAssertGrep "User ID: u1" "$TmpDir/pki-ca-user-add-001_7.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_7.out"
@@ -204,11 +242,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-009:--email with maximum length and symbols"
email=`cat /dev/urandom | tr -dc 'a-zA-Z0-9!?@~#*^_+$' | fold -w 2048 | head -n 1`
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --email='$email' u2 > $TmpDir/pki-ca-user-add-001_8.out" \
0 \
- "Added user using CA_adminV with maximum --email length and character symbols in it"
+ "Added user using ${prefix}_adminV with maximum --email length and character symbols in it"
rlAssertGrep "Added user \"u2\"" "$TmpDir/pki-ca-user-add-001_8.out"
rlAssertGrep "User ID: u2" "$TmpDir/pki-ca-user-add-001_8.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_8.out"
@@ -223,11 +263,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-010:--email with # character"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --email=# u3 > $TmpDir/pki-ca-user-add-001_9.out" \
0 \
- "Added user using CA_adminV with --email # character"
+ "Added user using ${prefix}_adminV with --email # character"
rlAssertGrep "Added user \"u3\"" "$TmpDir/pki-ca-user-add-001_9.out"
rlAssertGrep "User ID: u3" "$TmpDir/pki-ca-user-add-001_9.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_9.out"
@@ -236,11 +278,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-011:--email with * character"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --email=* u4 > $TmpDir/pki-ca-user-add-001_10.out" \
0 \
- "Added user using CA_adminV with --email * character"
+ "Added user using ${prefix}_adminV with --email * character"
rlAssertGrep "Added user \"u4\"" "$TmpDir/pki-ca-user-add-001_10.out"
rlAssertGrep "User ID: u4" "$TmpDir/pki-ca-user-add-001_10.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_10.out"
@@ -249,11 +293,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-012:--email with $ character"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --email=$ u5 > $TmpDir/pki-ca-user-add-001_11.out" \
0 \
- "Added user using CA_adminV with --email $ character"
+ "Added user using ${prefix}_adminV with --email $ character"
rlAssertGrep "Added user \"u5\"" "$TmpDir/pki-ca-user-add-001_11.out"
rlAssertGrep "User ID: u5" "$TmpDir/pki-ca-user-add-001_11.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_11.out"
@@ -262,11 +308,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-013:--email as number 0"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --email=0 u6 > $TmpDir/pki-ca-user-add-001_12.out " \
0 \
- "Added user using CA_adminV with --email 0"
+ "Added user using ${prefix}_adminV with --email 0"
rlAssertGrep "Added user \"u6\"" "$TmpDir/pki-ca-user-add-001_12.out"
rlAssertGrep "User ID: u6" "$TmpDir/pki-ca-user-add-001_12.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_12.out"
@@ -276,11 +324,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-014:--state with maximum length"
state=`cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 2048 | head -n 1`
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --state=\"$state\" u7 > $TmpDir/pki-ca-user-add-001_13.out" \
0 \
- "Added user using CA_adminV with maximum --state length"
+ "Added user using ${prefix}_adminV with maximum --state length"
rlAssertGrep "Added user \"u7\"" "$TmpDir/pki-ca-user-add-001_13.out"
rlAssertGrep "User ID: u7" "$TmpDir/pki-ca-user-add-001_13.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_13.out"
@@ -296,11 +346,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-015:--state with maximum length and symbols"
state=`cat /dev/urandom | tr -dc 'a-zA-Z0-9!?@~#*^_+$' | fold -w 2048 | head -n 1`
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --state='$state' u8 > $TmpDir/pki-ca-user-add-001_14.out" \
0 \
- "Added user using CA_adminV with maximum --state length and character symbols in it"
+ "Added user using ${prefix}_adminV with maximum --state length and character symbols in it"
rlAssertGrep "Added user \"u8\"" "$TmpDir/pki-ca-user-add-001_14.out"
rlAssertGrep "User ID: u8" "$TmpDir/pki-ca-user-add-001_14.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_14.out"
@@ -315,11 +367,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-016:--state with # character"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --state=# u9 > $TmpDir/pki-ca-user-add-001_15.out" \
0 \
- "Added user using CA_adminV with --state # character"
+ "Added user using ${prefix}_adminV with --state # character"
rlAssertGrep "Added user \"u9\"" "$TmpDir/pki-ca-user-add-001_15.out"
rlAssertGrep "User ID: u9" "$TmpDir/pki-ca-user-add-001_15.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_15.out"
@@ -328,11 +382,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-017:--state with * character"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --state=* u10 > $TmpDir/pki-ca-user-add-001_16.out" \
0 \
- "Added user using CA_adminV with --state * character"
+ "Added user using ${prefix}_adminV with --state * character"
rlAssertGrep "Added user \"u10\"" "$TmpDir/pki-ca-user-add-001_16.out"
rlAssertGrep "User ID: u10" "$TmpDir/pki-ca-user-add-001_16.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_16.out"
@@ -341,11 +397,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-018:--state with $ character"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --state=$ u11 > $TmpDir/pki-ca-user-add-001_17.out" \
0 \
- "Added user using CA_adminV with --state $ character"
+ "Added user using ${prefix}_adminV with --state $ character"
rlAssertGrep "Added user \"u11\"" "$TmpDir/pki-ca-user-add-001_17.out"
rlAssertGrep "User ID: u11" "$TmpDir/pki-ca-user-add-001_17.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_17.out"
@@ -354,11 +412,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-019:--state as number 0"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --state=0 u12 > $TmpDir/pki-ca-user-add-001_18.out " \
0 \
- "Added user using CA_adminV with --state 0"
+ "Added user using ${prefix}_adminV with --state 0"
rlAssertGrep "Added user \"u12\"" "$TmpDir/pki-ca-user-add-001_18.out"
rlAssertGrep "User ID: u12" "$TmpDir/pki-ca-user-add-001_18.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_18.out"
@@ -368,11 +428,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-020:--phone with maximum length"
phone=`cat /dev/urandom | tr -dc '0-9' | fold -w 2048 | head -n 1`
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --phone=\"$phone\" u13 > $TmpDir/pki-ca-user-add-001_19.out" \
0 \
- "Added user using CA_adminV with maximum --phone length"
+ "Added user using ${prefix}_adminV with maximum --phone length"
rlAssertGrep "Added user \"u13\"" "$TmpDir/pki-ca-user-add-001_19.out"
rlAssertGrep "User ID: u13" "$TmpDir/pki-ca-user-add-001_19.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_19.out"
@@ -382,11 +444,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-021:--phone with maximum length and symbols"
phone=`cat /dev/urandom | tr -dc 'a-zA-Z0-9!?@~#*^_+$' | fold -w 2048 | head -n 1`
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --phone='$phone' usr1 > $TmpDir/pki-ca-user-add-001_20.out 2>&1"\
255 \
- "Should not be able to add user using CA_adminV with maximum --phone with character symbols in it"
+ "Should not be able to add user using ${prefix}_adminV with maximum --phone with character symbols in it"
rlAssertGrep "ClientResponseFailure: Error status 4XX" "$TmpDir/pki-ca-user-add-001_20.out"
rlAssertNotGrep "PKIException: LDAP error (21): error result" "$TmpDir/pki-ca-user-add-001_20.out"
rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/833#comment:1"
@@ -394,11 +458,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-022:--phone with # character"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --phone=# usr2 > $TmpDir/pki-ca-user-add-001_21.out 2>&1" \
255 \
- "Should not be able to add user using CA_adminV --phone with character #"
+ "Should not be able to add user using ${prefix}_adminV --phone with character #"
rlAssertGrep "ClientResponseFailure: Error status 4XX" "$TmpDir/pki-ca-user-add-001_21.out"
rlAssertNotGrep "PKIException: LDAP error (21): error result" "$TmpDir/pki-ca-user-add-001_21.out"
rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/833#comment:1"
@@ -406,11 +472,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-023:--phone with * character"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --phone=* usr3 > $TmpDir/pki-ca-user-add-001_22.out 2>&1" \
255 \
- "Should not be able to add user using CA_adminV --phone with character *"
+ "Should not be able to add user using ${prefix}_adminV --phone with character *"
rlAssertGrep "ClientResponseFailure: Error status 4XX" "$TmpDir/pki-ca-user-add-001_22.out"
rlAssertNotGrep "PKIException: LDAP error (21): error result" "$TmpDir/pki-ca-user-add-001_22.out"
rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/833#comment:1"
@@ -418,11 +486,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-024:--phone with $ character"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --phone=$ usr4 > $TmpDir/pki-ca-user-add-001_23.out 2>&1" \
255 \
- "Should not be able to add user using CA_adminV --phone with character $"
+ "Should not be able to add user using ${prefix}_adminV --phone with character $"
rlAssertGrep "ClientResponseFailure: Error status 4XX" "$TmpDir/pki-ca-user-add-001_23.out"
rlAssertNotGrep "PKIException: LDAP error (21): error result" "$TmpDir/pki-ca-user-add-001_23.out"
rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/833#comment:1"
@@ -430,11 +500,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-025:--phone as negative number -1230"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --phone=-1230 u14 > $TmpDir/pki-ca-user-add-001_24.out " \
0 \
- "Added user using CA_adminV with --phone -1230"
+ "Added user using ${prefix}_adminV with --phone -1230"
rlAssertGrep "Added user \"u14\"" "$TmpDir/pki-ca-user-add-001_24.out"
rlAssertGrep "User ID: u14" "$TmpDir/pki-ca-user-add-001_24.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_24.out"
@@ -443,11 +515,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-026:--type as Auditors"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --type=Auditors u15 > $TmpDir/pki-ca-user-add-001_25.out" \
0 \
- "Added user using CA_adminV with --type Auditors"
+ "Added user using ${prefix}_adminV with --type Auditors"
rlAssertGrep "Added user \"u15\"" "$TmpDir/pki-ca-user-add-001_25.out"
rlAssertGrep "User ID: u15" "$TmpDir/pki-ca-user-add-001_25.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_25.out"
@@ -456,11 +530,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-027:--type Certificate Manager Agents"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --type=\"Certificate Manager Agents\" u16 > $TmpDir/pki-ca-user-add-001_26.out" \
0 \
- "Added user using CA_adminV --type Certificate Manager Agents"
+ "Added user using ${prefix}_adminV --type Certificate Manager Agents"
rlAssertGrep "Added user \"u16\"" "$TmpDir/pki-ca-user-add-001_26.out"
rlAssertGrep "User ID: u16" "$TmpDir/pki-ca-user-add-001_26.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_26.out"
@@ -469,11 +545,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-028:--type Registration Manager Agents"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --type=\"Registration Manager Agents\" u17 > $TmpDir/pki-ca-user-add-001_27.out" \
0 \
- "Added user using CA_adminV with --type Registration Manager Agents"
+ "Added user using ${prefix}_adminV with --type Registration Manager Agents"
rlAssertGrep "Added user \"u17\"" "$TmpDir/pki-ca-user-add-001_27.out"
rlAssertGrep "User ID: u17" "$TmpDir/pki-ca-user-add-001_27.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_27.out"
@@ -482,11 +560,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-029:--type Subsytem Group"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --type=\"Subsytem Group\" u18 > $TmpDir/pki-ca-user-add-001_28.out" \
0 \
- "Added user using CA_adminV with --type Subsytem Group"
+ "Added user using ${prefix}_adminV with --type Subsytem Group"
rlAssertGrep "Added user \"u18\"" "$TmpDir/pki-ca-user-add-001_28.out"
rlAssertGrep "User ID: u18" "$TmpDir/pki-ca-user-add-001_28.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_28.out"
@@ -495,11 +575,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-030:--type Security Domain Administrators"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --type=\"Security Domain Administrators\" u19 > $TmpDir/pki-ca-user-add-001_29.out" \
0 \
- "Added user using CA_adminV with --type Security Domain Administrators"
+ "Added user using ${prefix}_adminV with --type Security Domain Administrators"
rlAssertGrep "Added user \"u19\"" "$TmpDir/pki-ca-user-add-001_29.out"
rlAssertGrep "User ID: u19" "$TmpDir/pki-ca-user-add-001_29.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_29.out"
@@ -508,11 +590,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-031:--type ClonedSubsystems"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --type=ClonedSubsystems u20 > $TmpDir/pki-ca-user-add-001_30.out" \
0 \
- "Added user using CA_adminV with --type ClonedSubsystems"
+ "Added user using ${prefix}_adminV with --type ClonedSubsystems"
rlAssertGrep "Added user \"u20\"" "$TmpDir/pki-ca-user-add-001_30.out"
rlAssertGrep "User ID: u20" "$TmpDir/pki-ca-user-add-001_30.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_30.out"
@@ -521,11 +605,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-032:--type Trusted Managers"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --type=\"Trusted Managers\" u21 > $TmpDir/pki-ca-user-add-001_31.out" \
0 \
- "Added user using CA_adminV with --type Trusted Managers"
+ "Added user using ${prefix}_adminV with --type Trusted Managers"
rlAssertGrep "Added user \"u21\"" "$TmpDir/pki-ca-user-add-001_31.out"
rlAssertGrep "User ID: u21" "$TmpDir/pki-ca-user-add-001_31.out"
rlAssertGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_31.out"
@@ -534,11 +620,13 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-033:--type Dummy Group"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --type=\"Dummy Group\" u25 > $TmpDir/pki-ca-user-add-001_33.out 2>&1 " \
- 1 \
- "Adding user using CA_adminV with --type Dummy Group"
+ 1,255 \
+ "Adding user using ${prefix}_adminV with --type Dummy Group"
rlAssertNotGrep "Added user \"u25\"" "$TmpDir/pki-ca-user-add-001_33.out"
rlAssertNotGrep "User ID: u25" "$TmpDir/pki-ca-user-add-001_33.out"
rlAssertNotGrep "Full name: test" "$TmpDir/pki-ca-user-add-001_33.out"
@@ -549,8 +637,10 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-034: Add a duplicate user to CA"
command="pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"New user\" $user1 > $TmpDir/pki-ca-user-add-002.out 2>&1 "
rlLog "Command=$command"
@@ -560,16 +650,12 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseEnd
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-035: Add a user to CA with -t option"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -t ca \
- ca-user-add --fullName=\"$user1fullname\" u22"
-
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
-t ca \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$user1fullname\" u22 > $TmpDir/pki-ca-user-add-003.out" \
0 \
"Add user u22 to CA"
@@ -579,16 +665,12 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseEnd
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-036: Add a user -- missing required option user id"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -t ca \
- ca-user-add --fullName=\"$user1fullname\" "
-
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
-t ca \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$user1fullname\" > $TmpDir/pki-ca-user-add-004.out" \
255 \
"Add user -- missing required option user id"
@@ -597,11 +679,12 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-037: Add a user -- missing required option --fullName"
command="pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
-t ca \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add $user1 > $TmpDir/pki-ca-user-add-005.out 2>&1"
- rlLog "Executing: $command"
errmsg="Error: Missing required option: fullName"
errorcode=255
rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - Add a user -- missing required option --fullName"
@@ -613,22 +696,12 @@ run_pki-ca-user-cli-ca-user-add_tests(){
phone="1234567890"
state="NC"
type="Administrators"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -t ca \
- ca-user-add --fullName=\"$user1fullname\" \
- --email $email \
- --password $user_password \
- --phone $phone \
- --state $state \
- --type $type \
- u23"
-
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
-t ca \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$user1fullname\" \
--email $email \
--password $user_password \
@@ -654,21 +727,12 @@ run_pki-ca-user-cli-ca-user-add_tests(){
user_password="admin2Password"
phone="1234567890"
state="NC"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -t ca \
- ca-user-add --fullName=\"$userfullname\" \
- --email $email \
- --password $user_password \
- --phone $phone \
- --state $state \
- $user"
-
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
-t ca \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$userfullname\" \
--email $email \
--password $user_password \
@@ -676,22 +740,19 @@ run_pki-ca-user-cli-ca-user-add_tests(){
--state $state \
$user > $TmpDir/pki-ca-user-add-006.out " \
0 \
- "Add user $user using CA_adminV"
+ "Add user $user using ${prefix}_adminV"
rlAssertGrep "Added user \"u24\"" "$TmpDir/pki-ca-user-add-006.out"
rlAssertGrep "User ID: u24" "$TmpDir/pki-ca-user-add-006.out"
rlAssertGrep "Full name: $userfullname" "$TmpDir/pki-ca-user-add-006.out"
rlAssertGrep "Email: $email" "$TmpDir/pki-ca-user-add-006.out"
rlAssertGrep "Phone: $phone" "$TmpDir/pki-ca-user-add-006.out"
rlAssertGrep "State: $state" "$TmpDir/pki-ca-user-add-006.out"
- rlLog "pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -t ca \
- group-member-add Administrators $user"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
-t ca \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
group-member-add Administrators $user > $TmpDir/pki-ca-user-add-007_1.out" \
0 \
"Add user $user to Administrators group"
@@ -700,16 +761,20 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlAssertGrep "User: $user" "$TmpDir/pki-ca-user-add-007_1.out"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
-t ca \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
group-member-find Administrators > $TmpDir/pki-ca-user-add-007.out" \
0 \
"Show pki group-member-find Administrators"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
-t ca \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
group-member-add \"Certificate Manager Agents\" $user > $TmpDir/pki-ca-user-add-007_1_1.out" \
0 \
"Add user $user to Administrators group"
@@ -718,9 +783,11 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlAssertGrep "User: $user" "$TmpDir/pki-ca-user-add-007_1_1.out"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
-t ca \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
group-member-find \"Certificate Manager Agents\" > $TmpDir/pki-ca-user-add-007_2.out" \
0 \
"Show pki group-member-find Administrators"
@@ -731,14 +798,18 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-040: Add user with --password less than 8 characters"
userpw="pass"
rlLog "Executing: pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$user1fullname\" --password=$userpw $user1 > $TmpDir/pki-ca-user-add-008.out 2>&1"
expmsg="PKIException: The password must be at least 8 characters"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
-t ca \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$user1fullname\" --password=$userpw $user1 > $TmpDir/pki-ca-user-add-008.out 2>&1" \
255 \
"Add a user --must be at least 8 characters --password"
@@ -747,13 +818,11 @@ run_pki-ca-user-cli-ca-user-add_tests(){
##### Tests to add users using revoked cert#####
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-041: Should not be able to add user using a revoked cert CA_adminR"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n CA_adminR \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName=\"$user1fullname\" $user1"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminR \
+ -n ${prefix}_adminR \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$user1fullname\" $user1 > $TmpDir/pki-ca-user-add-revoke-adminR-002.out 2>&1" \
255 \
"Should not be able to add user $user1 using a user having revoked cert"
@@ -761,13 +830,11 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseEnd
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-042: Should not be able to add user using a agent with revoked cert CA_agentR"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n CA_agentR \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName=\"$user1fullname\" $user1"
rlRun "pki -d $CERTDB_DIR \
- -n CA_agentR \
+ -n ${prefix}_agentR \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$user1fullname\" $user1 > $TmpDir/pki-ca-user-add-revoke-agentR-002.out 2>&1" \
255 \
"Should not be able to add user $user1 using a user having revoked cert"
@@ -777,28 +844,24 @@ run_pki-ca-user-cli-ca-user-add_tests(){
##### Tests to add users using an agent user#####
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-043: Should not be able to add user using a valid agent CA_agentV user"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n CA_agentV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName=\"$user1fullname\" $user1"
rlRun "pki -d $CERTDB_DIR \
- -n CA_agentV \
+ -n ${prefix}_agentV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$user1fullname\" $user1 > $TmpDir/pki-ca-user-add-agentV-002.out 2>&1" \
255 \
"Should not be able to add user $user1 using a agent cert"
- rlAssertGrep "ForbiddenException: Authorization failed on resource: certServer.ca.users, operation: execute" "$TmpDir/pki-ca-user-add-agentV-002.out"
+ rlAssertGrep "ForbiddenException: Authorization Error" "$TmpDir/pki-ca-user-add-agentV-002.out"
rlPhaseEnd
- ##### Tests to add users using CA_adminUTCA and CA_agentUTCA user's certificate will be issued by an untrusted CA #####
+ ##### Tests to add users using CA_agentUTCA user's certificate will be issued by an untrusted CA #####
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-044: Should not be able to add user using a CA_agentUTCA user"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n CA_agentR \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName=\"$user1fullname\" $user1"
- rlRun "pki -d $CERTDB_DIR \
- -n CA_agentR \
- -c $CERTDB_DIR_PASSWORD \
+ rlRun "pki -d $UNTRUSTED_CERT_DB_LOCATION \
+ -n $untrusted_cert_nickname \
+ -c $UNTRUSTED_CERT_DB_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$user1fullname\" $user1 > $TmpDir/pki-ca-user-add-agentR-002.out 2>&1" \
255 \
"Should not be able to add user $user1 using a agent cert"
@@ -811,12 +874,16 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlRun "date --set='+2 days'" 0 "Set System date 2 days ahead"
rlRun "date"
rlLog "Executing: pki -d $CERTDB_DIR \
- -n CA_adminE \
+ -n ${prefix}_adminE \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$user1fullname\" $user1"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminE \
+ -n ${prefix}_adminE \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$user1fullname\" $user1 > $TmpDir/pki-ca-user-add-adminE-002.out 2>&1" \
255 \
"Should not be able to add user $user1 using a agent cert"
@@ -831,12 +898,16 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlRun "date --set='+2 days'" 0 "Set System date 2 days ahead"
rlRun "date"
rlLog "Executing: pki -d $CERTDB_DIR \
- -n CA_agentE \
+ -n ${prefix}_agentE \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$user1fullname\" $user1"
rlRun "pki -d $CERTDB_DIR \
- -n CA_agentE \
+ -n ${prefix}_agentE \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$user1fullname\" $user1 > $TmpDir/pki-ca-user-add-agentE-002.out 2>&1" \
255 \
"Should not be able to add user $user1 using a agent cert"
@@ -848,42 +919,36 @@ run_pki-ca-user-cli-ca-user-add_tests(){
##### Tests to add users using audit users#####
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-047: Should not be able to add user using a CA_auditV"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n CA_auditV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName=\"$user1fullname\" $user1"
rlRun "pki -d $CERTDB_DIR \
- -n CA_auditV \
+ -n ${prefix}_auditV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$user1fullname\" $user1 > $TmpDir/pki-ca-user-add-auditV-002.out 2>&1" \
255 \
"Should not be able to add user $user1 using a audit cert"
- rlAssertGrep "ForbiddenException: Authorization failed on resource: certServer.ca.users, operation: execute" "$TmpDir/pki-ca-user-add-auditV-002.out"
+ rlAssertGrep "ForbiddenException: Authorization Error" "$TmpDir/pki-ca-user-add-auditV-002.out"
rlPhaseEnd
##### Tests to add users using operator user###
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-048: Should not be able to add user using a CA_operatorV"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n CA_operatorV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName=\"$user1fullname\" $user1"
rlRun "pki -d $CERTDB_DIR \
- -n CA_operatorV \
+ -n ${prefix}_operatorV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$user1fullname\" $user1 > $TmpDir/pki-ca-user-add-operatorV-002.out 2>&1" \
255 \
"Should not be able to add user $user1 using a operator cert"
- rlAssertGrep "ForbiddenException: Authorization failed on resource: certServer.ca.users, operation: execute" "$TmpDir/pki-ca-user-add-operatorV-002.out"
+ rlAssertGrep "ForbiddenException: Authorization Error" "$TmpDir/pki-ca-user-add-operatorV-002.out"
rlPhaseEnd
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-049: Should not be able to add user using a cert created from a untrusted CA CA_adminUTCA"
- rlLog "Executing: pki -d /tmp/untrusted_cert_db \
- -n CA_adminUTCA \
- -c Password \
- ca-user-add --fullName=\"$user1fullname\" $user1"
- rlRun "pki -d /tmp/untrusted_cert_db \
- -n CA_adminUTCA \
- -c Password \
+ rlRun "pki -d $UNTRUSTED_CERT_DB_LOCATION \
+ -n $untrusted_cert_nickname \
+ -c $UNTRUSTED_CERT_DB_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=\"$user1fullname\" $user1 > $TmpDir/pki-ca-user-add-adminUTCA-002.out 2>&1" \
255 \
"Should not be able to add user $user1 using a untrusted cert"
@@ -893,15 +958,19 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-050: user id length exceeds maximum limit defined in the schema"
user_length_exceed_max=`cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 10000 | head -n 1`
rlLog "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test \"$user_length_exceed_max\""
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test \"$user_length_exceed_max\" > $TmpDir/pki-ca-user-add-001_50.out 2>&1" \
255 \
- "Adding user using CA_adminV with user id length exceed maximum defined in ldap schema"
+ "Adding user using ${prefix}_adminV with user id length exceed maximum defined in ldap schema"
rlAssertGrep "ClientResponseFailure: ldap can't save, exceeds max length" "$TmpDir/pki-ca-user-add-001_50.out"
rlAssertNotGrep "ClientResponseFailure: Error status 500 Internal Server Error returned" "$TmpDir/pki-ca-user-add-001_50.out"
rlAssertNotGrep "ProcessingException: Unable to invoke request" "$TmpDir/pki-ca-user-add-001_50.out"
@@ -910,13 +979,11 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-051: fullname with i18n characters"
rlLog "ca-user-add fullname Örjan Äke with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName='Örjan Äke' u26"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName='Örjan Äke' u26 > $TmpDir/pki-ca-user-add-001_51.out 2>&1" \
0 \
"Adding u26 with full name Örjan Äke"
@@ -927,13 +994,11 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-052: fullname with i18n characters"
rlLog "ca-user-add fullname Éric Têko with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName='Éric Têko' u27"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName='Éric Têko' u27 > $TmpDir/pki-ca-user-add-001_52.out 2>&1" \
0 \
"Adding u27 with full Éric Têko"
@@ -944,26 +1009,22 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-053: fullname with i18n characters"
rlLog "ca-user-add fullname éénentwintig dvidešimt with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName='éénentwintig dvidešimt' u28"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName='éénentwintig dvidešimt' u28 > $TmpDir/pki-ca-user-add-001_53.out 2>&1" \
0 \
"Adding fullname éénentwintig dvidešimt with i18n characters"
rlAssertGrep "Added user \"u28\"" "$TmpDir/pki-ca-user-add-001_53.out"
rlAssertGrep "Full name: éénentwintig dvidešimt" "$TmpDir/pki-ca-user-add-001_53.out"
rlAssertGrep "User ID: u28" "$TmpDir/pki-ca-user-add-001_53.out"
- rlLog "pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-show u28"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-show u28 > $TmpDir/pki-ca-user-add-001_53_2.out 2>&1" \
0 \
"Show user u28 with fullname éénentwintig dvidešimt in i18n characters"
@@ -973,21 +1034,21 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-054: fullname with i18n characters"
rlLog "ca-user-add fullname kakskümmend üks with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName='kakskümmend üks' u29"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName='kakskümmend üks' u29 > $TmpDir/pki-ca-user-add-001_54.out 2>&1" \
0 \
"Adding fillname kakskümmend üks with i18n characters"
rlAssertGrep "Added user \"u29\"" "$TmpDir/pki-ca-user-add-001_54.out"
rlAssertGrep "Full name: kakskümmend üks" "$TmpDir/pki-ca-user-add-001_54.out"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-show u29 > $TmpDir/pki-ca-user-add-001_54_2.out" \
0 \
"Show user u29 with fullname kakskümmend üks in i18n characters"
@@ -997,21 +1058,21 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-055: fullname with i18n characters"
rlLog "ca-user-add fullname двадцять один тридцять with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName='двадцять один тридцять' u30"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName='двадцять один тридцять' u30 > $TmpDir/pki-ca-user-add-001_55.out 2>&1" \
0 \
"Adding fillname двадцять один тридцять with i18n characters"
rlAssertGrep "Added user \"u30\"" "$TmpDir/pki-ca-user-add-001_55.out"
rlAssertGrep "Full name: двадцять один тридцять" "$TmpDir/pki-ca-user-add-001_55.out"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-show u30 > $TmpDir/pki-ca-user-add-001_55_2.out" \
0 \
"Show user u30 with fullname двадцять один тридцять in i18n characters"
@@ -1019,59 +1080,51 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlAssertGrep "Full name: двадцять один тридцять" "$TmpDir/pki-ca-user-add-001_55_2.out"
rlPhaseEnd
- rlPhaseStartTest "pki_ca_user_cli_ca_user_add-056: user id with i18n characters"
+ rlPhaseStartTest "pki_ca_user_cli_ca_user_add-056: should not be able to add user id with i18n characters"
rlLog "ca-user-add userid ÖrjanÄke with i18n characters"
rlLog "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test 'ÖrjanÄke'"
- rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName=test 'ÖrjanÄke' > $TmpDir/pki-ca-user-add-001_56.out 2>&1" \
- 0 \
- "Adding uid ÖrjanÄke with i18n characters"
- rlAssertGrep "Added user \"ÖrjanÄke\"" "$TmpDir/pki-ca-user-add-001_56.out"
- rlAssertGrep "User ID: ÖrjanÄke" "$TmpDir/pki-ca-user-add-001_56.out"
- rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ command="pki -d $CERTDB_DIR \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
- ca-user-show 'ÖrjanÄke' > $TmpDir/pki-ca-user-add-001_56_2.out" \
- 0 \
- "Show user 'ÖrjanÄke'"
- rlAssertGrep "User \"ÖrjanÄke\"" "$TmpDir/pki-ca-user-add-001_56_2.out"
- rlAssertGrep "User ID: ÖrjanÄke" "$TmpDir/pki-ca-user-add-001_56_2.out"
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
+ ca-user-add --fullName=test 'ÖrjanÄke' "
+ errmsg="IncorrectUserIdException"
+ errorcode=255
+ rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Adding uid ÖrjanÄke with i18n characters"
+ rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/860"
rlPhaseEnd
- rlPhaseStartTest "pki_ca_user_cli_ca_user_add-057: userid with i18n characters"
+ rlPhaseStartTest "pki_ca_user_cli_ca_user_add-057: should not be able to add userid with i18n characters"
rlLog "ca-user-add userid ÉricTêko with i18n characters"
rlLog "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test 'ÉricTêko'"
- rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName=test 'ÉricTêko' > $TmpDir/pki-ca-user-add-001_57.out 2>&1" \
- 0 \
- "Adding user id ÉricTêko with i18n characters"
- rlAssertGrep "Added user \"ÉricTêko\"" "$TmpDir/pki-ca-user-add-001_57.out"
- rlAssertGrep "User ID: ÉricTêko" "$TmpDir/pki-ca-user-add-001_57.out"
- rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ command="pki -d $CERTDB_DIR \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
- ca-user-show 'ÉricTêko' > $TmpDir/pki-ca-user-add-001_57_2.out" \
- 0 \
- "Show user 'ÉricTêko'"
- rlAssertGrep "User \"ÉricTêko\"" "$TmpDir/pki-ca-user-add-001_57_2.out"
- rlAssertGrep "User ID: ÉricTêko" "$TmpDir/pki-ca-user-add-001_57_2.out"
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
+ ca-user-add --fullName=test 'ÉricTêko' "
+ errmsg="IncorrectUserIdException"
+ errorcode=255
+ rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Adding user id ÉricTêko with i18n characters"
+ rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/860"
rlPhaseEnd
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-058: email address with i18n characters"
rlLog "ca-user-add email address negyvenkettő@qetestsdomain.com with i18n characters"
- command="pki -d $CERTDB_DIR -n CA_adminV -c $CERTDB_DIR_PASSWORD ca-user-add --fullName=test --email='negyvenkettő@qetestsdomain.com' u31"
+ command="pki -d $CERTDB_DIR -n ${prefix}_adminV -c $CERTDB_DIR_PASSWORD--h $SUBSYSTEM_HOST -p $(eval echo \$${subsystemId}_UNSECURE_PORT) ca-user-add --fullName=test --email='negyvenkettő@qetestsdomain.com' u31"
rlLog "Executing $command"
- errmsg="PKIException: Unable to add user"
+ errmsg="IncorrectPasswordException: Incorrect client security database password."
errorcode=255
rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - Adding email negyvenkettő@qetestsdomain.com with i18n characters"
rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/860"
@@ -1079,30 +1132,29 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-059: email address with i18n characters"
rlLog "ca-user-add email address četrdesmitdivi@qetestsdomain.com with i18n characters"
- command="pki -d $CERTDB_DIR -n CA_adminV -c $CERTDB_DIR_PASSWORD ca-user-add --fullName=test --email='četrdesmitdivi@qetestsdomain.com' u32"
+ command="pki -d $CERTDB_DIR -n ${prefix}_adminV -c $CERTDB_DIR_PASSWORD-h $SUBSYSTEM_HOST -p $(eval echo \$${subsystemId}_UNSECURE_PORT) ca-user-add --fullName=test --email='četrdesmitdivi@qetestsdomain.com' u32"
rlLog "Executing $command"
- errmsg="PKIException: Unable to add user"
+ errmsg="IncorrectPasswordException: Incorrect client security database password."
errorcode=255
rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - Adding email četrdesmitdivi@qetestsdomain.com with i18n characters"
- rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/860"
rlPhaseEnd
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-060: password with i18n characters"
rlLog "ca-user-add password šimtaskolmkümmend with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName=test --password='šimtaskolmkümmend' u31"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --password='šimtaskolmkümmend' u31 > $TmpDir/pki-ca-user-add-001_60.out 2>&1" \
0 \
"Adding password šimtaskolmkümmend with i18n characters"
rlAssertGrep "Added user \"u31\"" "$TmpDir/pki-ca-user-add-001_60.out"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-show u31 > $TmpDir/pki-ca-user-add-001_60_2.out" \
0 \
"Show user u31 with password šimtaskolmkümmend in i18n characters"
@@ -1111,20 +1163,20 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-061: password with i18n characters"
rlLog "ca-user-add password двадцяттридцять with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName=test --password='двадцяттридцять' u32"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --password='двадцяттридцять' u32 > $TmpDir/pki-ca-user-add-001_61.out 2>&1" \
0 \
"Adding password двадцяттридцять with i18n characters"
rlAssertGrep "Added user \"u32\"" "$TmpDir/pki-ca-user-add-001_61.out"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-show u32 > $TmpDir/pki-ca-user-add-001_61_2.out" \
0 \
"Show user u32 with password двадцяттридцять in i18n characters"
@@ -1133,21 +1185,21 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-062: type with i18n characters"
rlLog "ca-user-add type tjugo-tvåhetvenhét with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName=test --type='tjugo-tvåhetvenhét' u33"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --type='tjugo-tvåhetvenhét' u33 > $TmpDir/pki-ca-user-add-001_62.out 2>&1" \
0 \
"Adding type tjugo-tvåhetvenhét with i18n characters"
rlAssertGrep "Added user \"u33\"" "$TmpDir/pki-ca-user-add-001_62.out"
rlAssertGrep "Type: tjugo-tvåhetvenhét" "$TmpDir/pki-ca-user-add-001_62.out"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-show u33 > $TmpDir/pki-ca-user-add-001_62_2.out" \
0 \
"Show user u33 with type tjugo-tvåhetvenhét in i18n characters"
@@ -1157,21 +1209,21 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-063: type with i18n characters"
rlLog "ca-user-add type мiльйонтридцять with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName=test --type='мiльйонтридцять' u34"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --type='мiльйонтридцять' u34 > $TmpDir/pki-ca-user-add-001_63.out 2>&1" \
0 \
"Adding type мiльйонтридцять with i18n characters"
rlAssertGrep "Added user \"u34\"" "$TmpDir/pki-ca-user-add-001_63.out"
rlAssertGrep "Type: мiльйонтридцять" "$TmpDir/pki-ca-user-add-001_63.out"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-show u34 > $TmpDir/pki-ca-user-add-001_63_2.out" \
0 \
"Show user u34 with type мiльйонтридцять in i18n characters"
@@ -1181,21 +1233,21 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-064: state with i18n characters"
rlLog "ca-user-add state čå with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName=test --state='čå' u35"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --state='čå' u35 > $TmpDir/pki-ca-user-add-001_64.out 2>&1" \
0 \
"Adding state 'čå' with i18n characters"
rlAssertGrep "Added user \"u35\"" "$TmpDir/pki-ca-user-add-001_64.out"
rlAssertGrep "State: čå" "$TmpDir/pki-ca-user-add-001_64.out"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-show u35 > $TmpDir/pki-ca-user-add-001_64_2.out" \
0 \
"Show user u35 with state čå in i18n characters"
@@ -1205,21 +1257,21 @@ run_pki-ca-user-cli-ca-user-add_tests(){
rlPhaseStartTest "pki_ca_user_cli_ca_user_add-065: state with i18n characters"
rlLog "ca-user-add state йč with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-add --fullName=test --state='йč' u36"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test --state='йč' u36 > $TmpDir/pki-ca-user-add-001_65.out 2>&1" \
0 \
"Adding state 'йč' with i18n characters"
rlAssertGrep "Added user \"u36\"" "$TmpDir/pki-ca-user-add-001_65.out"
rlAssertGrep "State: йč" "$TmpDir/pki-ca-user-add-001_65.out"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-show u36 > $TmpDir/pki-ca-user-add-001_65_2.out" \
0 \
"Show user u36 with state йč in i18n characters"
@@ -1234,26 +1286,30 @@ run_pki-ca-user-cli-ca-user-add_tests(){
local ret_requestid
local valid_serialNumber
local temp_out="$TmpDir/usercert-show.out"
+ local requestdn
+ local prefix_value
rlRun "create_cert_request $TEMP_NSS_DB Password pkcs10 rsa 2048 \"pki User1\" \"pkiUser1\" \
- \"pkiuser1@example.org\" \"Engineering\" \"Example.Inc\" "US" "--" "ret_reqstatus" "ret_requestid"" 0 "Generating pkcs10 Certificate Request"
- rlLog "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"CA_agentV\" ca-cert-request-review $ret_requestid \
+ \"pkiuser1@example.org\" \"Engineering\" \"Example.Inc\" \"US\" \"--\" \"ret_reqstatus\" \"ret_requestid\" $SUBSYSTEM_HOST \"$(eval echo \$${subsystemId}_UNSECURE_PORT)\" \"$requestdn\" \"$prefix_value\" " 0 "Generating pkcs10 Certificate Request"
+ rlLog "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"${prefix}_agentV\" -h $SUBSYSTEM_HOST -p $(eval echo \$${subsystemId}_UNSECURE_PORT) ca-cert-request-review $ret_requestid \
--action approve 1"
- rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"CA_agentV\" ca-cert-request-review $ret_requestid \
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"${prefix}_agentV\" -h $SUBSYSTEM_HOST -p $(eval echo \$${subsystemId}_UNSECURE_PORT) ca-cert-request-review $ret_requestid \
--action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
- rlLog "pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
- rlRun "pki cert-request-show $ret_requestid > $TmpDir/usercert-show1.out"
+ rlLog "pki -h $SUBSYSTEM_HOST -p $(eval echo \$${subsystemId}_UNSECURE_PORT) cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ rlRun "pki -h $SUBSYSTEM_HOST -p $(eval echo \$${subsystemId}_UNSECURE_PORT) cert-request-show $ret_requestid > $TmpDir/usercert-show1.out"
valid_serialNumber=`cat $TmpDir/usercert-show1.out | grep 'Certificate ID' | sed 's/ //g' | cut -d: -f2`
rlLog "valid_serialNumber=$valid_serialNumber"
#Import user certs to $TEMP_NSS_DB
- rlRun "pki cert-show $valid_serialNumber --encoded > $temp_out" 0 "command pki cert-show $valid_serialNumber --encoded"
+ rlRun "pki -h $SUBSYSTEM_HOST -p $(eval echo \$${subsystemId}_UNSECURE_PORT) cert-show $valid_serialNumber --encoded > $temp_out" 0 "command pki cert-show $valid_serialNumber --encoded"
rlRun "certutil -d $TEMP_NSS_DB -A -n pkiUser1 -i $temp_out -t \"u,u,u\""
local expfile="$TmpDir/expfile_pkiuser1.out"
rlLog "Executing: pki -d $TEMP_NSS_DB \
-n pkiUser1 \
-c Password \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-add --fullName=test_user u39"
- echo "spawn -noecho pki -d $TEMP_NSS_DB -n pkiUser1 -c Password ca-user-add --fullName=test_user u39" > $expfile
+ echo "spawn -noecho pki -d $TEMP_NSS_DB -n pkiUser1 -c Password -h $SUBSYSTEM_HOST -p $(eval echo \$${subsystemId}_UNSECURE_PORT) ca-user-add --fullName=test_user u39" > $expfile
echo "expect \"WARNING: UNTRUSTED ISSUER encountered on 'CN=$HOSTNAME,O=$CA_DOMAIN Security Domain' indicates a non-trusted CA cert 'CN=CA Signing Certificate,O=$CA_DOMAIN Security Domain'
Import CA certificate (Y/n)? \"" >> $expfile
echo "send -- \"Y\r\"" >> $expfile
@@ -1266,27 +1322,95 @@ Import CA certificate (Y/n)? \"" >> $expfile
rlAssertGrep "PKIException: Unauthorized" "$TmpDir/pki-ca-user-add-pkiUser1-002.out"
rlPhaseEnd
+ rlPhaseStartTest "pki_ca_user_cli_ca_user_add-067: Should not be able to add user using Normal user credential"
+ local pki_user="idm1_user_1"
+ local pki_user_fullName="Idm1 User 1"
+ local pki_pwd="Secret123"
+ rlLog "Create user $pki_user"
+ rlRun "pki -d $CERTDB_DIR \
+ -n \"${prefix}_adminV\" \
+ -c $CERTDB_DIR_PASSWORD -h $SUBSYSTEM_HOST -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
+ ca-user-add $pki_user \
+ --fullName \"$pki_user_fullName\" \
+ --password $pki_pwd" 0 "Create $pki_user User"
+ local TEMP_NSS_DB="$TmpDir/nssdb"
+ rlLog "Executing: pki -d $CERTDB_DIR \
+ -c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
+ -u $pki_user \
+ -w $pki_pwd \
+ ca-user-add --fullName=test_user u39"
+ command="pki -d $CERTDB_DIR \
+ -c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
+ -u $pki_user \
+ -w $pki_pwd \
+ ca-user-add --fullName=test_user u39"
+ errmsg="ForbiddenException: Authentication method not allowed."
+ errorcode=255
+ rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Adding user using Normal user credential"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_ca_user_cli_ca_user_add-068: Should not be able to add user using invalid user credential"
+ local invalid_pki_user=test1
+ local invalid_pki_user_pwd=Secret123
+ rlLog "Executing: pki -d $CERTDB_DIR \
+ -c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
+ -u $invalid_pki_user \
+ -w $invalid_pki_user_pwd \
+ user-add --fullName=test_user u39"
+ command="pki -d $CERTDB_DIR \
+ -c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
+ -u $invalid_pki_user \
+ -w $invalid_pki_user_pwd \
+ user-add --fullName=test_user u39"
+ errmsg="PKIException: Unauthorized"
+ errorcode=255
+ rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Adding user using Normal user credential"
+ rlPhaseEnd
rlPhaseStartTest "pki_ca_user_cli_user_cleanup: Deleting users"
- #===Deleting users created using CA_adminV cert===#
+ #===Deleting users created using ${prefix}_adminV cert===#
i=1
while [ $i -lt 37 ] ; do
+ rlLog "pki -d $CERTDB_DIR \
+ -n ${prefix}_adminV \
+ -c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
+ ca-user-del u$i"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-del u$i > $TmpDir/pki-user-del-ca-user-00$i.out" \
0 \
"Deleted user u$i"
rlAssertGrep "Deleted user \"u$i\"" "$TmpDir/pki-user-del-ca-user-00$i.out"
let i=$i+1
done
- #===Deleting users(symbols) created using CA_adminV cert===#
+ #===Deleting users(symbols) created using ${prefix}_adminV cert===#
j=1
while [ $j -lt 8 ] ; do
eval usr=\$user$j
+ rlLog "pki -d $CERTDB_DIR \
+ -n ${prefix}_adminV \
+ -c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
+ ca-user-del '$usr'"
rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
ca-user-del '$usr' > $TmpDir/pki-user-del-ca-user-symbol-00$j.out" \
0 \
"Deleted user $usr"
@@ -1299,22 +1423,18 @@ Import CA certificate (Y/n)? \"" >> $expfile
fi
let j=$j+1
done
- #===Deleting i18n users created using CA_adminV cert===#
- rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
- -c $CERTDB_DIR_PASSWORD \
- ca-user-del 'ÖrjanÄke' > $TmpDir/pki-user-del-ca-user-i18n_1.out" \
- 0 \
- "Deleted user ÖrjanÄke"
- rlAssertGrep "Deleted user \"ÖrjanÄke\"" "$TmpDir/pki-user-del-ca-user-i18n_1.out"
- rlRun "pki -d $CERTDB_DIR \
- -n CA_adminV \
+ #Deleting user idm_user_1
+ local pki_user="idm1_user_1"
+ rlRun "pki -d $CERTDB_DIR \
+ -n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
- ca-user-del 'ÉricTêko' > $TmpDir/pki-user-del-ca-user-i18n_2.out" \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
+ ca-user-del $pki_user > $TmpDir/pki-user-del-user-ca-2_1.out" \
0 \
- "Deleted user ÉricTêko"
- rlAssertGrep "Deleted user \"ÉricTêko\"" "$TmpDir/pki-user-del-ca-user-i18n_2.out"
+ "Deleted user $pki_user"
+ rlAssertGrep "Deleted user \"$pki_user\"" "$TmpDir/pki-user-del-user-ca-2_1.out"
#Delete temporary directory
rlRun "popd"
diff --git a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-add-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-add-ca.sh
index 9c3f873d2..76f40cabc 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-add-ca.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-add-ca.sh
@@ -73,13 +73,13 @@ run_pki-user-cli-user-add-ca_tests(){
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
untrusted_cert_nickname=role_user_UTCA
- rlPhaseStartSetup "pki_user_cli_user_add-ca-startup: Create temporary directory"
- rlRun "TmpDir=\`mktemp -d\`" 0 "Creating tmp directory"
- rlRun "pushd $TmpDir"
- rlPhaseEnd
+ lPhaseStartSetup "pki_user_cli_user_add-ca-startup: Create temporary directory"
+ rlRun "TmpDir=\`mktemp -d\`" 0 "Creating tmp directory"
+ rlRun "pushd $TmpDir"
+ rlPhaseEnd
- rlPhaseStartTest "pki_user_cli-configtest: pki user --help configuration test"
- rlRun "pki user --help > $TmpDir/pki_user_cfg.out 2>&1" \
+ rlPhaseStartTest "pki_user_cli-configtest: pki user --help configuration test"
+ rlRun "pki user --help > $TmpDir/pki_user_cfg.out 2>&1" \
0 \
"pki user --help"
rlAssertGrep "user-find Find users" "$TmpDir/pki_user_cfg.out"
@@ -90,7 +90,7 @@ run_pki-user-cli-user-add-ca_tests(){
rlAssertGrep "user-cert User certificate management commands" "$TmpDir/pki_user_cfg.out"
rlAssertGrep "user-membership User membership management commands" "$TmpDir/pki_user_cfg.out"
rlAssertNotGrep "Error: Invalid module \"user---help\"." "$TmpDir/pki_user_cfg.out"
- rlPhaseEnd
+ rlPhaseEnd
rlPhaseStartTest "pki_user_cli_user_add-configtest: pki user-add configuration test"
rlRun "pki user-add --help > $TmpDir/pki_user_add_cfg.out 2>&1" \
@@ -626,7 +626,7 @@ run_pki-user-cli-user-add-ca_tests(){
-h $SUBSYSTEM_HOST \
-p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
user-add --fullName=test --type=\"Dummy Group\" u25 > $TmpDir/pki-user-add-ca-001_33.out 2>&1 " \
- 1 \
+ 1,255 \
"Adding user using ${prefix}_adminV with --type Dummy Group"
rlAssertNotGrep "Added user \"u25\"" "$TmpDir/pki-user-add-ca-001_33.out"
rlAssertNotGrep "User ID: u25" "$TmpDir/pki-user-add-ca-001_33.out"
@@ -644,21 +644,12 @@ run_pki-user-cli-user-add-ca_tests(){
-p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
user-add --fullName=\"New user\" $user1 > $TmpDir/pki-user-add-ca-002.out 2>&1 "
- rlLog "Command=$command"
expmsg="ConflictingOperationException: Entry already exists."
rlRun "$command" 255 "Add duplicate user"
rlAssertGrep "$expmsg" "$TmpDir/pki-user-add-ca-002.out"
rlPhaseEnd
rlPhaseStartTest "pki_user_cli_user_add-CA-035: Add a user to CA with -t option"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- -t ca \
- user-add --fullName=\"$user1fullname\" u22"
-
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
@@ -674,14 +665,6 @@ run_pki-user-cli-user-add-ca_tests(){
rlPhaseEnd
rlPhaseStartTest "pki_user_cli_user_add-CA-036: Add a user -- missing required option user id"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- -t ca \
- user-add --fullName=\"$user1fullname\" "
-
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
@@ -702,7 +685,6 @@ run_pki-user-cli-user-add-ca_tests(){
-p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
-t ca \
user-add $user1 > $TmpDir/pki-user-add-ca-005.out 2>&1"
- rlLog "Executing: $command"
errmsg="Error: Missing required option: fullName"
errorcode=255
rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - Add a user -- missing required option --fullName"
@@ -759,19 +741,6 @@ run_pki-user-cli-user-add-ca_tests(){
user_password="admin2Password"
phone="1234567890"
state="NC"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- -t ca \
- user-add --fullName=\"$userfullname\" \
- --email $email \
- --password $user_password \
- --phone $phone \
- --state $state \
- $user"
-
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
@@ -792,13 +761,6 @@ run_pki-user-cli-user-add-ca_tests(){
rlAssertGrep "Email: $email" "$TmpDir/pki-user-add-ca-006.out"
rlAssertGrep "Phone: $phone" "$TmpDir/pki-user-add-ca-006.out"
rlAssertGrep "State: $state" "$TmpDir/pki-user-add-ca-006.out"
- rlLog "pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- -t ca \
- group-member-add Administrators $user"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
@@ -849,12 +811,6 @@ run_pki-user-cli-user-add-ca_tests(){
rlPhaseStartTest "pki_user_cli_user_add-CA-040: Add user with --password less than 8 characters"
userpw="pass"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName=\"$user1fullname\" --password=$userpw $user1 > $TmpDir/pki-user-add-ca-008.out 2>&1"
expmsg="PKIException: The password must be at least 8 characters"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
@@ -870,12 +826,6 @@ run_pki-user-cli-user-add-ca_tests(){
##### Tests to add users using revoked cert#####
rlPhaseStartTest "pki_user_cli_user_add-CA-041: Should not be able to add user using a revoked cert CA_adminR"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n ${prefix}_adminR \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName=\"$user1fullname\" $user1"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminR \
-c $CERTDB_DIR_PASSWORD \
@@ -888,12 +838,6 @@ run_pki-user-cli-user-add-ca_tests(){
rlPhaseEnd
rlPhaseStartTest "pki_user_cli_user_add-CA-042: Should not be able to add user using a agent with revoked cert CA_agentR"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n ${prefix}_agentR \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName=\"$user1fullname\" $user1"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_agentR \
-c $CERTDB_DIR_PASSWORD \
@@ -908,12 +852,6 @@ run_pki-user-cli-user-add-ca_tests(){
##### Tests to add users using an agent user#####
rlPhaseStartTest "pki_user_cli_user_add-CA-043: Should not be able to add user using a valid agent CA_agentV user"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n ${prefix}_agentV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName=\"$user1fullname\" $user1"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_agentV \
-c $CERTDB_DIR_PASSWORD \
@@ -922,17 +860,11 @@ run_pki-user-cli-user-add-ca_tests(){
user-add --fullName=\"$user1fullname\" $user1 > $TmpDir/pki-user-add-ca-agentV-002.out 2>&1" \
255 \
"Should not be able to add user $user1 using a agent cert"
- rlAssertGrep "ForbiddenException: Authorization failed on resource: certServer.ca.users, operation: execute" "$TmpDir/pki-user-add-ca-agentV-002.out"
+ rlAssertGrep "ForbiddenException: Authorization Error" "$TmpDir/pki-user-add-ca-agentV-002.out"
rlPhaseEnd
##### Tests to add users using CA_agentUTCA user's certificate will be issued by an untrusted CA #####
rlPhaseStartTest "pki_user_cli_user_add-CA-044: Should not be able to add user using a CA_agentUTCA user"
- rlLog "Executing: pki -d $UNTRUSTED_CERT_DB_LOCATION \
- -n $untrusted_cert_nickname \
- -c $UNTRUSTED_CERT_DB_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName=\"$user1fullname\" $user1"
rlRun "pki -d $UNTRUSTED_CERT_DB_LOCATION \
-n $untrusted_cert_nickname \
-c $UNTRUSTED_CERT_DB_PASSWORD \
@@ -1015,12 +947,6 @@ run_pki-user-cli-user-add-ca_tests(){
##### Tests to add users using operator user###
rlPhaseStartTest "pki_user_cli_user_add-CA-048: Should not be able to add user using a CA_operatorV"
- rlLog "Executing: pki -d $CERTDB_DIR \
- -n ${prefix}_operatorV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName=\"$user1fullname\" $user1"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_operatorV \
-c $CERTDB_DIR_PASSWORD \
@@ -1029,7 +955,7 @@ run_pki-user-cli-user-add-ca_tests(){
user-add --fullName=\"$user1fullname\" $user1 > $TmpDir/pki-user-add-ca-operatorV-002.out 2>&1" \
255 \
"Should not be able to add user $user1 using a operator cert"
- rlAssertGrep "ForbiddenException: Authorization failed on resource: certServer.ca.users, operation: execute" "$TmpDir/pki-user-add-ca-operatorV-002.out"
+ rlAssertGrep "ForbiddenException: Authorization Error" "$TmpDir/pki-user-add-ca-operatorV-002.out"
rlPhaseEnd
rlPhaseStartTest "pki_user_cli_user_add-CA-049: Should not be able to add user using a cert created from a untrusted CA CA_adminUTCA"
@@ -1039,17 +965,14 @@ run_pki-user-cli-user-add-ca_tests(){
-h $SUBSYSTEM_HOST \
-p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
user-add --fullName=\"$user1fullname\" $user1"
- echo "spawn -noecho pki -d $UNTRUSTED_CERT_DB_LOCATION -n $untrusted_cert_nickname -c $UNTRUSTED_CERT_DB_PASSWORD -h $SUBSYSTEM_HOST -p $(eval echo \$${subsystemId}_UNSECURE_PORT) user-add --fullName=\"$user1fullname\" $user1" > $TmpDir/pki-user-add-ca-adminUTCA-002.out
- echo "expect \"WARNING: UNTRUSTED ISSUER encountered on 'CN=$HOSTNAME,O=$(eval echo \$${prefix}_DOMAIN) Security Domain' indicates a non-trusted CA cert 'CN=CA Signing Certificate,O=$(eval echo \$${prefix}_DOMAIN) Security Domain'
-Import CA certificate (Y/n)? \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
- echo "send -- \"Y\r\"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
- echo "expect \"CA server URI \[http://$HOSTNAME:8080/ca\]: \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
- echo "send -- \"http://$HOSTNAME:$(eval echo \$${prefix}_UNSECURE_PORT)/ca\r\"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
- echo "expect eof" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
- echo "catch wait result" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
- echo "exit [lindex \$result 3]" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
- rlRun "/usr/bin/expect -f $TmpDir/pki-user-add-ca-adminUTCA-002.out > $TmpDir/pki-user-add-ca-adminUTCA-003.out 2>&1" 1,255 "Should not be able to add $user using a untrusted cert"
-
+ rlRun "pki -d $UNTRUSTED_CERT_DB_LOCATION \
+ -n $untrusted_cert_nickname \
+ -c $UNTRUSTED_CERT_DB_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
+ user-add --fullName=\"$user1fullname\" $user1 > $TmpDir/pki-user-add-ca-adminUTCA-003.out 2>&1" \
+ 255 \
+ "Should not be able to add user $user1 using a untrusted cert"
rlAssertGrep "PKIException: Unauthorized" "$TmpDir/pki-user-add-ca-adminUTCA-003.out"
rlPhaseEnd
@@ -1077,12 +1000,6 @@ Import CA certificate (Y/n)? \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
rlPhaseStartTest "pki_user_cli_user_add-CA-051: fullname with i18n characters"
rlLog "user-add fullname Örjan Äke with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName='Örjan Äke' u26"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
@@ -1098,12 +1015,6 @@ Import CA certificate (Y/n)? \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
rlPhaseStartTest "pki_user_cli_user_add-CA-052: fullname with i18n characters"
rlLog "user-add fullname Éric Têko with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName='Éric Têko' u27"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
@@ -1119,12 +1030,6 @@ Import CA certificate (Y/n)? \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
rlPhaseStartTest "pki_user_cli_user_add-CA-053: fullname with i18n characters"
rlLog "user-add fullname éénentwintig dvidešimt with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName='éénentwintig dvidešimt' u28"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
@@ -1136,12 +1041,6 @@ Import CA certificate (Y/n)? \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
rlAssertGrep "Added user \"u28\"" "$TmpDir/pki-user-add-ca-001_53.out"
rlAssertGrep "Full name: éénentwintig dvidešimt" "$TmpDir/pki-user-add-ca-001_53.out"
rlAssertGrep "User ID: u28" "$TmpDir/pki-user-add-ca-001_53.out"
- rlLog "pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-show u28"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
@@ -1156,12 +1055,6 @@ Import CA certificate (Y/n)? \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
rlPhaseStartTest "pki_user_cli_user_add-CA-054: fullname with i18n characters"
rlLog "user-add fullname kakskümmend üks with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName='kakskümmend üks' u29"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
@@ -1186,12 +1079,6 @@ Import CA certificate (Y/n)? \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
rlPhaseStartTest "pki_user_cli_user_add-CA-055: fullname with i18n characters"
rlLog "user-add fullname двадцять один тридцять with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName='двадцять один тридцять' u30"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
@@ -1222,26 +1109,16 @@ Import CA certificate (Y/n)? \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
-h $SUBSYSTEM_HOST \
-p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
user-add --fullName=test 'ÖrjanÄke'"
- rlRun "pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName=test 'ÖrjanÄke' > $TmpDir/pki-user-add-ca-001_56.out 2>&1" \
- 0 \
- "Adding uid ÖrjanÄke with i18n characters"
- rlAssertGrep "Added user \"ÖrjanÄke\"" "$TmpDir/pki-user-add-ca-001_56.out"
- rlAssertGrep "User ID: ÖrjanÄke" "$TmpDir/pki-user-add-ca-001_56.out"
- rlRun "pki -d $CERTDB_DIR \
+ command="pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
-h $SUBSYSTEM_HOST \
-p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-show 'ÖrjanÄke' > $TmpDir/pki-user-add-ca-001_56_2.out" \
- 0 \
- "Show user 'ÖrjanÄke'"
- rlAssertGrep "User \"ÖrjanÄke\"" "$TmpDir/pki-user-add-ca-001_56_2.out"
- rlAssertGrep "User ID: ÖrjanÄke" "$TmpDir/pki-user-add-ca-001_56_2.out"
+ user-add --fullName=test 'ÖrjanÄke'"
+ errmsg="IncorrectUserIdException"
+ errorcode=255
+ rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Adding uid ÖrjanÄke with i18n characters"
+ rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/860"
rlPhaseEnd
rlPhaseStartTest "pki_user_cli_user_add-CA-057: userid with i18n characters"
@@ -1252,33 +1129,23 @@ Import CA certificate (Y/n)? \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
-h $SUBSYSTEM_HOST \
-p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
user-add --fullName=test 'ÉricTêko'"
- rlRun "pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName=test 'ÉricTêko' > $TmpDir/pki-user-add-ca-001_57.out 2>&1" \
- 0 \
- "Adding user id ÉricTêko with i18n characters"
- rlAssertGrep "Added user \"ÉricTêko\"" "$TmpDir/pki-user-add-ca-001_57.out"
- rlAssertGrep "User ID: ÉricTêko" "$TmpDir/pki-user-add-ca-001_57.out"
- rlRun "pki -d $CERTDB_DIR \
+ command="pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
-h $SUBSYSTEM_HOST \
-p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-show 'ÉricTêko' > $TmpDir/pki-user-add-ca-001_57_2.out" \
- 0 \
- "Show user 'ÉricTêko'"
- rlAssertGrep "User \"ÉricTêko\"" "$TmpDir/pki-user-add-ca-001_57_2.out"
- rlAssertGrep "User ID: ÉricTêko" "$TmpDir/pki-user-add-ca-001_57_2.out"
+ user-add --fullName=test 'ÉricTêko'"
+ errmsg="IncorrectUserIdException"
+ errorcode=255
+ rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Adding user id ÉricTêko with i18n characters"
+ rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/860"
rlPhaseEnd
rlPhaseStartTest "pki_user_cli_user_add-CA-058: email address with i18n characters"
rlLog "user-add email address negyvenkettő@qetestsdomain.com with i18n characters"
command="pki -d $CERTDB_DIR -n ${prefix}_adminV -c $CERTDB_DIR_PASSWORD -h $SUBSYSTEM_HOST -p $(eval echo \$${subsystemId}_UNSECURE_PORT) user-add --fullName=test --email='negyvenkettő@qetestsdomain.com' u31"
rlLog "Executing $command"
- errmsg="PKIException: Unable to add user"
+ errmsg="IncorrectPasswordException: Incorrect client security database password."
errorcode=255
rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - Adding email negyvenkettő@qetestsdomain.com with i18n characters"
rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/860"
@@ -1288,7 +1155,7 @@ Import CA certificate (Y/n)? \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
rlLog "user-add email address četrdesmitdivi@qetestsdomain.com with i18n characters"
command="pki -d $CERTDB_DIR -n ${prefix}_adminV -c $CERTDB_DIR_PASSWORD -h $SUBSYSTEM_HOST -p $(eval echo \$${subsystemId}_UNSECURE_PORT) user-add --fullName=test --email='četrdesmitdivi@qetestsdomain.com' u32"
rlLog "Executing $command"
- errmsg="PKIException: Unable to add user"
+ errmsg="IncorrectPasswordException: Incorrect client security database password."
errorcode=255
rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - Adding email četrdesmitdivi@qetestsdomain.com with i18n characters"
rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/860"
@@ -1296,12 +1163,6 @@ Import CA certificate (Y/n)? \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
rlPhaseStartTest "pki_user_cli_user_add-CA-060: password with i18n characters"
rlLog "user-add password šimtaskolmkümmend with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName=test --password='šimtaskolmkümmend' u31"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
@@ -1324,12 +1185,6 @@ Import CA certificate (Y/n)? \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
rlPhaseStartTest "pki_user_cli_user_add-CA-061: password with i18n characters"
rlLog "user-add password двадцяттридцять with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName=test --password='двадцяттридцять' u32"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
@@ -1352,12 +1207,6 @@ Import CA certificate (Y/n)? \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
rlPhaseStartTest "pki_user_cli_user_add-CA-062: type with i18n characters"
rlLog "user-add type tjugo-tvåhetvenhét with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName=test --type='tjugo-tvåhetvenhét' u33"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
@@ -1382,12 +1231,6 @@ Import CA certificate (Y/n)? \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
rlPhaseStartTest "pki_user_cli_user_add-CA-063: type with i18n characters"
rlLog "user-add type мiльйонтридцять with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName=test --type='мiльйонтридцять' u34"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
@@ -1412,12 +1255,6 @@ Import CA certificate (Y/n)? \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
rlPhaseStartTest "pki_user_cli_user_add-CA-064: state with i18n characters"
rlLog "user-add state čå with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName=test --state='čå' u35"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
@@ -1442,12 +1279,6 @@ Import CA certificate (Y/n)? \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
rlPhaseStartTest "pki_user_cli_user_add-CA-065: state with i18n characters"
rlLog "user-add state йč with i18n characters"
- rlLog "pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-add --fullName=test --state='йč' u36"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
@@ -1478,9 +1309,9 @@ Import CA certificate (Y/n)? \"" >> $TmpDir/pki-user-add-ca-adminUTCA-002.out
local valid_serialNumber
local temp_out="$TmpDir/usercert-show.out"
rlLog "create_cert_request $TEMP_NSS_DB Password pkcs10 rsa 2048 \"pki User1\" \"pkiUser1\" \
- \"pkiuser1@example.org\" \"Engineering\" \"Example.Inc\" "US" "--" "ret_reqstatus" "ret_requestid" "$SUBSYSTEM_HOST" "$(eval echo \$${subsystemId}_UNSECURE_PORT)"" 0 "Generating pkcs10 Certificate Request"
+ \"pkiuser1@example.org\" \"Engineering\" \"Example.Inc\" \"US\" \"--\" \"ret_reqstatus\" \"ret_requestid\" \"$SUBSYSTEM_HOST\" \"$(eval echo \$${subsystemId}_UNSECURE_PORT)\" " 0 "Generating pkcs10 Certificate Request"
rlRun "create_cert_request $TEMP_NSS_DB Password pkcs10 rsa 2048 \"pki User1\" \"pkiUser1\" \
- \"pkiuser1@example.org\" \"Engineering\" \"Example.Inc\" "US" "--" "ret_reqstatus" "ret_requestid" "$SUBSYSTEM_HOST" "$(eval echo \$${subsystemId}_UNSECURE_PORT)"" 0 "Generating pkcs10 Certificate Request"
+ \"pkiuser1@example.org\" \"Engineering\" \"Example.Inc\" \"US\" \"--\" \"ret_reqstatus\" \"ret_requestid\" \"$SUBSYSTEM_HOST\" \"$(eval echo \$${subsystemId}_UNSECURE_PORT)\" " 0 "Generating pkcs10 Certificate Request"
rlLog "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"${prefix}_agentV\" -h $SUBSYSTEM_HOST -p $(eval echo \$${subsystemId}_UNSECURE_PORT) ca-cert-request-review $ret_requestid \
--action approve 1"
rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"${prefix}_agentV\" -h $SUBSYSTEM_HOST -p $(eval echo \$${subsystemId}_UNSECURE_PORT) ca-cert-request-review $ret_requestid \
@@ -1512,6 +1343,59 @@ Import CA certificate (Y/n)? \"" >> $expfile
rlRun "/usr/bin/expect -f $expfile > $TmpDir/pki-user-add-ca-pkiUser1-002.out 2>&1" 255 "Should not be able to add users using a user cert"
rlAssertGrep "PKIException: Unauthorized" "$TmpDir/pki-user-add-ca-pkiUser1-002.out"
rlPhaseEnd
+
+ rlPhaseStartTest "pki_user_cli_user_add-CA-067: Should not be able to add user using Normal user credential"
+ local pki_user="idm1_user_1"
+ local pki_user_fullName="Idm1 User 1"
+ local pki_pwd="Secret123"
+ rlLog "Create user $pki_user"
+ rlRun "pki -d $CERTDB_DIR \
+ -n \"${prefix}_adminV\" \
+ -c $CERTDB_DIR_PASSWORD -h $SUBSYSTEM_HOST -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
+ user-add $pki_user \
+ --fullName \"$pki_user_fullName\" \
+ --password $pki_pwd" 0 "Create $pki_user User"
+ local TEMP_NSS_DB="$TmpDir/nssdb"
+ rlLog "Executing: pki -d $CERTDB_DIR \
+ -c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
+ -u $pki_user \
+ -w $pki_pwd \
+ user-add --fullName=test_user u39"
+ command="pki -d $CERTDB_DIR \
+ -c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
+ -u $pki_user \
+ -w $pki_pwd \
+ user-add --fullName=test_user u39"
+ errmsg="ForbiddenException: Authentication method not allowed."
+ errorcode=255
+ rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Adding user using Normal user credential"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_user_cli_user_add-CA-068: Should not be able to add user using invalid user credential"
+ local invalid_pki_user=test1
+ local invalid_pki_user_pwd=Secret123
+ rlLog "Executing: pki -d $CERTDB_DIR \
+ -c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
+ -u $invalid_pki_user \
+ -w $invalid_pki_user_pwd \
+ user-add --fullName=test_user u39"
+ command="pki -d $CERTDB_DIR \
+ -c $CERTDB_DIR_PASSWORD \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
+ -u $invalid_pki_user \
+ -w $invalid_pki_user_pwd \
+ user-add --fullName=test_user u39"
+ errmsg="PKIException: Unauthorized"
+ errorcode=255
+ rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Adding user using Normal user credential"
+ rlPhaseEnd
rlPhaseStartTest "pki_user_cli_user_cleanup: Deleting users"
@@ -1550,29 +1434,20 @@ Import CA certificate (Y/n)? \"" >> $expfile
fi
let j=$j+1
done
- #===Deleting i18n users created using ${prefix}_adminV cert===#
+ #Deleting user idm_user_1
+ local pki_user="idm1_user_1"
rlRun "pki -d $CERTDB_DIR \
-n ${prefix}_adminV \
-c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-del 'ÖrjanÄke' > $TmpDir/pki-user-del-ca-user-i18n_1.out" \
+ -h $SUBSYSTEM_HOST \
+ -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
+ user-del $pki_user > $TmpDir/pki-user-del-user-ca-2_1.out" \
0 \
- "Deleted user ÖrjanÄke"
- rlAssertGrep "Deleted user \"ÖrjanÄke\"" "$TmpDir/pki-user-del-ca-user-i18n_1.out"
-
- rlRun "pki -d $CERTDB_DIR \
- -n ${prefix}_adminV \
- -c $CERTDB_DIR_PASSWORD \
- -h $SUBSYSTEM_HOST \
- -p $(eval echo \$${subsystemId}_UNSECURE_PORT) \
- user-del 'ÉricTêko' > $TmpDir/pki-user-del-ca-user-i18n_2.out" \
- 0 \
- "Deleted user ÉricTêko"
- rlAssertGrep "Deleted user \"ÉricTêko\"" "$TmpDir/pki-user-del-ca-user-i18n_2.out"
+ "Deleted user $pki_user"
+ rlAssertGrep "Deleted user \"$pki_user\"" "$TmpDir/pki-user-del-user-ca-2_1.out"
#Delete temporary directory
rlRun "popd"
- #rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
+ rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
}