diff options
author | Niranjan Mallapadi <mrniranjan@redhat.com> | 2014-11-10 17:11:03 +0530 |
---|---|---|
committer | Niranjan Mallapadi <mrniranjan@redhat.com> | 2014-11-10 17:17:31 +0530 |
commit | 1ae687619c2685c2522027b225a8c2ec900744ae (patch) | |
tree | 52bd5541ae49e0c0e7b0b82d7cd464cd5354c370 /tests | |
parent | 697a7450776a111fab7e35cc4414236e762d4bd2 (diff) | |
download | pki-1ae687619c2685c2522027b225a8c2ec900744ae.tar.gz pki-1ae687619c2685c2522027b225a8c2ec900744ae.tar.xz pki-1ae687619c2685c2522027b225a8c2ec900744ae.zip |
Add pki ca-profile-add Automation
Diffstat (limited to 'tests')
-rwxr-xr-x | tests/dogtag/acceptance/cli-tests/pki-ca-profile-cli/pki-ca-profile-cli-add.sh | 1707 |
1 files changed, 1707 insertions, 0 deletions
diff --git a/tests/dogtag/acceptance/cli-tests/pki-ca-profile-cli/pki-ca-profile-cli-add.sh b/tests/dogtag/acceptance/cli-tests/pki-ca-profile-cli/pki-ca-profile-cli-add.sh new file mode 100755 index 000000000..c1a6348a9 --- /dev/null +++ b/tests/dogtag/acceptance/cli-tests/pki-ca-profile-cli/pki-ca-profile-cli-add.sh @@ -0,0 +1,1707 @@ +#!/bin/bash +# vim: dict=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k +# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +# +# runtest.sh of /CoreOS/rhcs/acceptance/cli-tests/pki-ca-profile-cli +# Description: PKI CA PROFILE CLI tests +# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +# The following pki key cli commands needs to be tested: +# pki ca-profile-add +# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +# +# Author: Niranjan Mallapadi <mniranja@redhat.com> +# +# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +# +# Copyright (c) 2013 Red Hat, Inc. All rights reserved. +# +# This copyrighted material is made available to anyone wishing +# to use, modify, copy, or redistribute it subject to the terms +# and conditions of the GNU General Public License version 2. +# +# This program is distributed in the hope that it will be +# useful, but WITHOUT ANY WARRANTY; without even the implied +# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR +# PURPOSE. See the GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public +# License along with this program; if not, write to the Free +# Software Foundation, Inc., 51 Franklin Street, Fifth Floor, +# Boston, MA 02110-1301, USA. +# +# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +# Include rhts environment +. /usr/bin/rhts-environment.sh +. /usr/share/beakerlib/beakerlib.sh +. /opt/rhqa_pki/rhcs-shared.sh +. /opt/rhqa_pki/pki-cert-cli-lib.sh +. /opt/rhqa_pki/env.sh + +run_pki-ca-profile-add_tests() +{ + local cs_Type=$1 + local cs_Role=$2 + + # Creating Temporary Directory for pki ca-profile-add + rlPhaseStartSetup "pki key-show Temporary Directory" + rlRun "TmpDir=\`mktemp -d\`" 0 "Creating tmp directory" + rlRun "export PYTHONPATH=$PYTHONPATH:/opt/rhqa_pki/" + rlRun "pushd $TmpDir" + rlPhaseEnd + + # Local Variables + get_topo_stack $cs_Role $TmpDir/topo_file + local CA_INST=$(cat $TmpDir/topo_file | grep MY_CA | cut -d= -f2) + local target_unsecure_port=$(eval echo \$${CA_INST}_UNSECURE_PORT) + local target_secure_port=$(eval echo \$${CA_INST}_SECURE_PORT) + local tmp_ca_agent=$CA_INST\_agentV + local tmp_ca_admin=$CA_INST\_adminV + local tmp_ca_port=$(eval echo \$${CA_INST}_UNSECURE_PORT) + local tmp_ca_host=$(eval echo \$${cs_Role}) + local valid_agent_cert=$CA_INST\_agentV + local valid_audit_cert=$CA_INST\_auditV + local valid_operator_cert=$CA_INST\_operatorV + local valid_admin_cert=$CA_INST\_adminV + local revoked_agent_cert=$CA_INST\_agentR + local revoked_admin_cert=$CA_INST\_adminR + local expired_admin_cert=$CA_INST\_adminE + local expired_agent_cert=$CA_INST\_agentE + local TEMP_NSS_DB="$TmpDir/nssdb" + local TEMP_NSS_DB_PWD="redhat" + local cert_info="$TmpDir/cert_info" + local ca_profile_out="$TmpDir/ca-profile-out" + local cert_out="$TmpDir/cert-show.out" + local rand=$RANDOM + local tmp_junk_data=$(openssl rand -base64 50 | perl -p -e 's/\n//') + + rlPhaseStartTest "pki_ca_profile_config_test: pki ca-profile-add --help configuration test" + rlRun "pki ca-profile-add --help > $ca_profile_out" 0 "pki ca-profile-add --help" + rlAssertGrep "usage: ca-profile-add <file> \[OPTIONS...\]" "$ca_profile_out" + rlAssertGrep " --help Show help options" "$ca_profile_out" + + rlPhaseStartTest "pki_ca_profile_add-001: Create a user profile xml and add the profile" + local profile="caUserCert$RANDOM" + local pki_user="pki_foo_bar1" + local pki_user_fullName="pki1 Foo Bar1" + local profilename="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli --new user --profileId $profile --profilename \"$profilename\" --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlLog "Enable $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out" + rlLog "Verify by creating a user cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$pki_user_fullName\" \ + subject_uid:$pki_user \ + subject_email:$pki_user@example.org \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + rlAssertGrep "Enabled profile \"$profile\"" "$ca_profile_out" + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-002: Create custom user profile which is valid for 15 days with a graceperiod of 5 days before and after" + local profile="caUserCert$RANDOM" + local pki_user="pki_foo_bar2" + local pki_user_fullName="pki1 Foo Bar2" + local profilename="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user --profileId "$profile" \ + --profilename=\"$profilename\" \ + --notBefore 5 \ + --notAfter 5 \ + --validfor 15 \ + --maxvalidity 30 \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlLog "Enable $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out" + rlLog "Verify by creating a user cert using the profile" + rlAssertGrep "Enabled profile \"$profile\"" "$ca_profile_out" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$pki_user_fullName\" \ + subject_uid:$pki_user \ + subject_email:$pki_user@example.org \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + local NotAfterDate=$(date +"%A, %B %d, %Y" --date "15 days") + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlAssertGrep "Not After: $NotAfterDate" "$cert_out" + rlLog "Verify by changing the date to 5 Days before the expiry date" + local cur_date=$(date -u) + local end_date=$(certutil -L -d $TEMP_NSS_DB_PWD -n \"$pki_user_fullName\" | grep "Not After" | awk -F ": " '{print $2}') + rlLog "Current Date/Time: $(date)" + rlLog "Current Date/Time: before modifying using chrony $(date)" + rlRun "chronyc -a 'manual on' 1> $TmpDir/chrony.out" 0 "Set chrony to manual mode" + rlAssertGrep "200 OK" "$TmpDir/chrony.out" + rlLog "Move system to $end_date - 5 day ahead" + rlRun "chronyc -a -m 'offline' 'settime $end_date - 5 day' 'makestep' 'manual reset' 1> $TmpDir/chrony.out" + rlAssertGrep "200 OK" "$TmpDir/chrony.out" + rlLog "Date after modifying using chrony: $(date)" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + cert-request-profile-show caManualRenewal --output $TmpDir/$cert_serialNumber-renewal.xml" 0 "Get caManualRenewal profile xml" + local STRIP_HEX=$(echo $cert_serialNumber | cut -dx -f2) + local CONV_UPP_VAL=${STRIP_HEX^^} + local decimal_valid_serialNumber=$(echo "ibase=16;$CONV_UPP_VAL"|bc) + rlLog "Modify caManualRenewal profile xml to add serial Number $cert_serialNumber to be submitted for renewal" + rlRun "xmlstarlet ed -L -u \"CertEnrollmentRequest/SerialNumber\" -v $decimal_valid_serialNumber $TmpDir/$cert_serialNumber-renewal.xml" + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-request-submit $TmpDir/$cert_serialNumber-renewal.xml 1> $TmpDir/pki-cert-request-submit.out" 0 "Submit renewal request" + local REQUEST_ID=$(cat $TmpDir/pki-cert-request-submit.out | grep "Request ID" | awk -F ": " '{print $2}') + rlAssertGrep "Request ID: $REQUEST_ID" "$TmpDir/pki-cert-request-submit.out" + local REQUEST_SUBMIT_STATUS=$(cat $TmpDir/pki-cert-request-submit.out | grep "Operation Result" | awk -F ": " '{print $2}') + rlAssertGrep "Type: renewal" "$TmpDir/pki-cert-request-submit.out" + rlAssertGrep "Request Status: pending" "$TmpDir/pki-cert-request-submit.out" + rlAssertGrep "Operation Result: success" "$TmpDir/pki-cert-request-submit.out" + rlLog "Set the date back to its original date & time" + rlRun "chronyc -a -m 'settime $cur_date + 10 seconds' 'makestep' 'manual reset' 'online' 1> $TmpDir/chrony.out" + rlAssertGrep "200 OK" "$TmpDir/chrony.out" + rlLog "Current Date/Time after setting system date back using chrony $(date)" + rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/999" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-003: Create a user profile which adds key Encipher and decipher extensions" + local profile="caUserCert$RANDOM" + local pki_user="pki_foo_bar3" + local pki_user_fullName="pki1 Foo Bar3" + local profilename="$profile Enrollment Profile" + rlLog "Create Profile $profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --keyusageextensions \"keyUsageCritical,keyUsageDigitalSignature,keyUsageNonRepudiation,keyUsageKeyEncipherment,keyUsageEncipherOnly\" \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add Profile $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlLog "Enable $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out" + rlLog "Verify by creating a user cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$pki_user_fullName\" \ + subject_uid:$pki_user \ + subject_email:$pki_user@example.org \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlAssertGrep "Identifier: Key Usage: - 2.5.29.15" "$cert_out" + rlAssertGrep "Key Encipherment" "$cert_out" + rlAssertGrep "Encipher Only" "$cert_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-004: Create a user profile which adds Netscape Extensions nsCertSSLClient and nsCertEmail" + local profile="caUserCert$RANDOM" + local pki_user="pki_foo_bar4" + local pki_user_fullName="pki1 Foo Bar4" + local profilename="$profile Enrollment Profile" + rlLog "Create Profile $profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --netscapeextensions \"nsCertCritical,nsCertSSLClient,nsCertEmail\" \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add Profile $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlLog "Enable $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out" + rlLog "Verify by creating a user cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$pki_user_fullName\" \ + subject_uid:$pki_user \ + subject_email:$pki_user@example.org \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlAssertGrep "Identifier: Netscape Certificate Type - 2.16.840.1.113730.1.1" "$cert_out" + rlAssertGrep "SSL Client" "$cert_out" + rlAssertGrep "Secure Email" "$cert_out" + rlPhaseEnd + + + rlPhaseStartTest "pki_ca_profile_add-005: Create a user profile with subject Name pattern UID=QAGROUP-.* and rejects if pattern doesn't match" + local profile="caUserCert$RANDOM" + local pki_user="pki_foo_bar5" + local pki_user_fullName="pki1 Foo Bar5" + local profilename="$profile Enrollment Profile" + rlLog "Create Profile $profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --subjectNamePattern UID=QAGROUP-.* \ + --outputfile $TmpDir/$profile\.xml" 0 "Add Profile with Subject Name Pattern CN.*" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out" 0 "Add Profile $TmpDir/$profile\.xml" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out" 0 "Enable profile $profile" + rlLog "Verify by creating a user cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$pki_user_fullName\" \ + subject_uid:QAGROUP-$pki_user \ + subject_email:$pki_user@example.org \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" 0 "Generate Cert with UID=QAGROUP-$pki_user" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlLog "Generate Certificate Request which doesn't satisfy Subject Name Pattern" + rlRun "create_new_cert_request \ + dir:$TEMP_NSS_DB \ + pass:$TEMP_NSS_DB_PWD \ + req_type:pkcs10 \ + algo:rsa \ + size:2048 \ + cn:\"Test User1\" \ + uid:TestUser1 \ + email:testuser1@example.org \ + ou: \ + org: \ + country: \ + archive:false \ + myreq:$TEMP_NSS_DB/testuser1-request.pem \ + subj:$TEMP_NSS_DB/testuser1-request-dn.txt" 0 "Create New Certificate request which doesn't satisfy subject Name Pattern UID=QAGROUP-.*" + rlRun "submit_new_request dir:$TEMP_NSS_DB \ + pass:$TEMP_NSS_DB_PWD \ + cahost:$tmp_ca_host \ + nickname:\"$valid_agent_cert\" \ + protocol: \ + port:$tmp_ca_port \ + url: \ + username: \ + userpwd: \ + profile:$profile \ + myreq:$TEMP_NSS_DB/testuser1-request.pem \ + subj:$TEMP_NSS_DB/testuser1-request-dn.txt \ + out:$TEMP_NSS_DB/testuser1-request-result.txt" 0 "Submit Request for Approval" + rlAssertGrep "Request Status: rejected" "$TEMP_NSS_DB/testuser1-request-result.txt" + rlAssertGrep "Operation Result: success" "$TEMP_NSS_DB/testuser1-request-result.txt" + rlPhaseEnd + + + rlPhaseStartTest "pki_ca_profile_add-006: Create a user profile with dc=cracker,dc=org added to Subject DN by default" + local profile="caUserCert$RANDOM" + local pki_user="pki_foo_bar6" + local pki_user_fullName="pki1 Foo Bar6" + local profilename="$profile Enrollment Profile" + rlLog "Create Profile $profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --subjectNamePattern "UID=[^,]+,.+" \ + --subjectNameDefault UID=\\\$request.req_subject_name.uid$,dc=cracker,dc=org \ + --outputfile $TmpDir/$profile\.xml" 0 "Create Profile xml which adds dc=cracker,dc=org to the subject DN" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out" 0 "Add Profile $TmpDir/$profile\.xml" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out" 0 "Enable profile $profile" + rlLog "Verify by creating a user cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$pki_user_fullName\" \ + subject_uid:$pki_user \ + subject_email:$pki_user@example.org \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" 0 "Generate Cert with UID=QAGROUP-$pki_user" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlPhaseEnd + + + rlPhaseStartTest "pki_ca_profile_add-007: Create a user profile which adds CRL extension with URL https://pki.example.org/fullCRL" + local profile="caUserCert$RANDOM" + local pki_user="pki_foo_bar7" + local pki_user_fullName="pki1 Foo Bar7" + local profilename="$profile Enrollment Profile" + rlLog "Create Profile $profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --crlextension \"https://pki.example.org/fullCRL\" \ + --outputfile $TmpDir/$profile\.xml" 0 "Create Profile xml which adds CRL Extension" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out" 0 "Add Profile $TmpDir/$profile\.xml" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out" 0 "Enable profile $profile" + rlLog "Verify by creating a user cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$pki_user_fullName\" \ + subject_uid:$pki_user \ + subject_email:$pki_user@example.org \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" 0 "Generate Cert with UID=QAGROUP-$pki_user" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlAssertGrep "Distribution Point: \[URIName: https://pki.example.org/fullCRL\]" "$cert_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-008: Create a user profile which SubjectAlt Name Extension having Requestor Email" + local profile="caUserCert$RANDOM" + local pki_user="pki_foo_bar8" + local pki_user_fullName="pki1 Foo Bar8" + local profilename="$profile Enrollment Profile" + rlLog "Create Profile $profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --altType RFC822Name \ + --altPattern \\\$request.requestor_email$ \ + --outputfile $TmpDir/$profile\.xml" 0 "Create Profile xml which adds Requestor Email address in Subject Alt Name." + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out" 0 "Add Profile $TmpDir/$profile\.xml" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out" 0 "Enable profile $profile" + rlLog "Verify by creating a user cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$pki_user_fullName\" \ + subject_uid:$pki_user \ + subject_email:$pki_user@example.org \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" 0 "Generate Cert with UID=QAGROUP-$pki_user" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlAssertGrep "RFC822Name: $pki_user@example.org" "$cert_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-009: Create a smime profile xml and add the profile" + local profile="caUserSMIMEcapCert$RANDOM" + local pki_user="pki_foo_bar9" + local pki_user_fullName="pki1 Foo Bar9" + rlRun "python -m PkiLib.pkiprofilecli --new smime --profileId $profile --output $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlLog "Enable $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out" + rlAssertGrep "Enabled profile \"$profile\"" "$ca_profile_out" + rlLog "Verify by creating a user cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$pki_user_fullName\" \ + subject_uid:$pki_user \ + subject_email:$pki_user@example.org \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0010: Create a custom server profile xml and add the profile" + local profile="caServerCert$RANDOM" + local subject_name="test$RANDOM-1.example.org" + local profile_name="Manual Custom PKI Server $RANDOM Certificate Enrollment" + rlRun "python -m PkiLib.pkiprofilecli --new server --profileId $profile --profilename \"$profile_name\" --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlLog "Enable $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out" + rlAssertGrep "Enabled profile \"$profile\"" "$ca_profile_out" + rlLog "Verify by creating a user cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$subject_name\" \ + subject_uid:\ + subject_email: \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlPhaseEnd + + + rlPhaseStartTest "pki_ca_profile_add-0011: Create a custom server profile which rejects request if subject DN doesn't have *.otherexample.org" + local profile="caServerCert$RANDOM" + local subject_name="test.otherexample.org" + local profile_name="FooBar otherexample.org Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli --new server --profileId $profile --subjectNamePattern \"CN=.*\.otherexample\.org.*\" --profilename \"$profile_name\" --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out 2>&1" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlLog "Enable $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out 2>&1" + rlAssertGrep "Enabled profile \"$profile\"" "$ca_profile_out" + rlLog "Verify by creating a CA cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$subject_name\" \ + subject_uid:\ + subject_email: \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlLog "Generate Certificate Request which doesn't satisfy Subject Name Pattern" + local subject_name="test.cracker.org" + rlRun "create_new_cert_request \ + dir:$TEMP_NSS_DB \ + pass:$TEMP_NSS_DB_PWD \ + req_type:pkcs10 \ + algo:rsa \ + size:2048 \ + cn:$subject_name \ + uid: \ + email: \ + ou: \ + org: \ + country: \ + archive:false \ + myreq:$TEMP_NSS_DB/$subject-csr.pem \ + subj:$TEMP_NSS_DB/$subect-dn.txt" 0 "Create New Certificate request which doesn't satisfy subject Name Pattern .otherexample.org" + rlRun "submit_new_request dir:$TEMP_NSS_DB \ + pass:$TEMP_NSS_DB_PWD \ + cahost:$tmp_ca_host \ + nickname:\"$valid_agent_cert\" \ + protocol: \ + port:$tmp_ca_port \ + url: \ + username: \ + userpwd: \ + profile:$profile \ + myreq:$TEMP_NSS_DB/$subject-csr.pem \ + subj:$TEMP_NSS_DB/$subject-dn.txt \ + out:$TEMP_NSS_DB/$subject-result.txt" 0 "Submit Request for Approval" + rlAssertGrep "Request Status: rejected" "$TEMP_NSS_DB/$subject-result.txt" + rlAssertGrep "Operation Result: success" "$TEMP_NSS_DB/$subject-result.txt" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0012: Create a server profile which adds Netscape Extensions nsCertSSlClient and nsCertEmail" + local profile="caServerCert$RANDOM" + local subject_name="testServer$RANDOM-1.example.org" + local profile_name="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli --new server \ + --profileId $profile \ + --profilename \"$profile_name\" \ + --netscapeextensions \"nsCertCritical,nsCertSSLClient,nsCertEmail\" \ + --outputfile $TmpDir/$profile\.xml" 0 "Add Profile with Netscape Certificate Extensions" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out 2>&1" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlLog "Enable $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out 2>&1" + rlAssertGrep "Enabled profile \"$profile\"" "$ca_profile_out" + rlLog "Verify by creating a CA cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$subject_name\" \ + subject_uid:\ + subject_email: \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2-) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlAssertGrep "Identifier: Netscape Certificate Type - 2.16.840.1.113730.1.1" "$cert_out" + rlAssertGrep "SSL Client" "$cert_out" + rlAssertGrep "Secure Email" "$cert_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0013: Create a custom server profile with subject Name pattern having CN=[^,]+,.+ and adding dc=example,dc=org by default to subject DN" + local profile="caServerCert$RANDOM" + local subject_name="John Smith" + local profile_name="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new server \ + --profileId $profile \ + --subjectNamePattern CN=[^,]+,.+ \ + --subjectNameDefault CN=\\\$request.req_subject_name.cn$,dc=example,dc=org \ + --profilename \"$profile_name\" \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out 2>&1" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlLog "Enable $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out 2>&1" + rlAssertGrep "Enabled profile \"$profile\"" "$ca_profile_out" + rlLog "Verify by creating a CA cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$subject_name\" \ + subject_uid:\ + subject_email: \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + + rlPhaseStartTest "pki_ca_profile_add-0014: Create custom Server profile with Maximum validity period of 15 days with a graceperiod of 5 days before and after" + local profile="caServerCert$RANDOM" + local subject_name="foobar$RANDOM-1.example.org" + local profilename="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new server \ + --profileId "$profile" \ + --profilename=\"$profilename\" \ + --notBefore 5 \ + --notAfter 5 \ + --validfor 15 \ + --maxvalidity 30 \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlLog "Enable $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out" + rlLog "Verify by creating a user cert using the profile" + rlAssertGrep "Enabled profile \"$profile\"" "$ca_profile_out" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:$subject_name \ + subject_uid: \ + subject_email: \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + local NotAfterDate=$(date +"%A, %B %d, %Y" --date "15 days") + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlAssertGrep "Not After: $NotAfterDate" "$cert_out" + rlLog "Verify by changing the date to 5 Days before the expiry date" + local cur_date=$(date -u) + local end_date=$(certutil -L -d $TEMP_NSS_DB_PWD -n \"$pki_user_fullName\" | grep "Not After" | awk -F ": " '{print $2}') + rlLog "Current Date/Time: $(date)" + rlLog "Current Date/Time: before modifying using chrony $(date)" + rlRun "chronyc -a 'manual on' 1> $TmpDir/chrony.out" 0 "Set chrony to manual mode" + rlAssertGrep "200 OK" "$TmpDir/chrony.out" + rlLog "Move system to $end_date - 5 day ahead" + rlRun "chronyc -a -m 'offline' 'settime $end_date - 5 day' 'makestep' 'manual reset' 1> $TmpDir/chrony.out" + rlAssertGrep "200 OK" "$TmpDir/chrony.out" + rlLog "Date after modifying using chrony: $(date)" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + cert-request-profile-show caManualRenewal --output $TmpDir/$cert_serialNumber-renewal.xml" 0 "Get caManualRenewal profile xml" + local STRIP_HEX=$(echo $cert_serialNumber | cut -dx -f2) + local CONV_UPP_VAL=${STRIP_HEX^^} + local decimal_valid_serialNumber=$(echo "ibase=16;$CONV_UPP_VAL"|bc) + rlLog "Modify caManualRenewal profile xml to add serial Number $cert_serialNumber to be submitted for renewal" + rlRun "xmlstarlet ed -L -u \"CertEnrollmentRequest/SerialNumber\" -v $decimal_valid_serialNumber $TmpDir/$cert_serialNumber-renewal.xml" + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-request-submit $TmpDir/$cert_serialNumber-renewal.xml 1> $TmpDir/pki-cert-request-submit.out" 0 "Submit renewal request" + local REQUEST_ID=$(cat $TmpDir/pki-cert-request-submit.out | grep "Request ID" | awk -F ": " '{print $2}') + rlAssertGrep "Request ID: $REQUEST_ID" "$TmpDir/pki-cert-request-submit.out" + local REQUEST_SUBMIT_STATUS=$(cat $TmpDir/pki-cert-request-submit.out | grep "Operation Result" | awk -F ": " '{print $2}') + rlAssertGrep "Type: renewal" "$TmpDir/pki-cert-request-submit.out" + rlAssertGrep "Request Status: pending" "$TmpDir/pki-cert-request-submit.out" + rlAssertGrep "Operation Result: success" "$TmpDir/pki-cert-request-submit.out" + rlLog "Set the date back to its original date & time" + rlRun "chronyc -a -m 'settime $cur_date + 10 seconds' 'makestep' 'manual reset' 'online' 1> $TmpDir/chrony.out" + rlAssertGrep "200 OK" "$TmpDir/chrony.out" + rlLog "Current Date/Time after setting system date back using chrony $(date)" + rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/999" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0015: Create a server profile which adds key Encipher and decipher extensions" + local profile="caServerCert$RANDOM" + local subject_name="foobar$RANDOM-1.example.org" + local profilename="$profile Enrollment Profile" + rlLog "Create Profile $profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new server \ + --profileId $profile \ + --profilename \"$profilename\" \ + --keyusageextensions \"keyUsageCritical,keyUsageDigitalSignature,keyUsageNonRepudiation,keyUsageKeyEncipherment,keyUsageDataEncipherment,keyUsageEncipherOnly,keyUsageDecipherOnly\" \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add Profile $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlLog "Enable $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out" + rlLog "Verify by creating a user cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:$subject_name \ + subject_uid: \ + subject_email: \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlAssertGrep "Identifier: Key Usage: - 2.5.29.15" "$cert_out" + rlAssertGrep "Encipher Only" "$cert_out" + rlAssertGrep "Decipher Only" "$cert_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0016: Create a server profile which adds CRL extension with URL https://pki.example.org/fullCRL" + local profile="caServerCert$RANDOM" + local subject_name="foobar$RANDOM-1.example.org" + local profilename="$profile Enrollment Profile" + rlLog "Create Profile $profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new server \ + --profileId $profile \ + --profilename \"$profilename\" \ + --crlextension \"https://pki.example.org/fullCRL\" \ + --outputfile $TmpDir/$profile\.xml" 0 "Create Profile xml which adds CRL Extension" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out" 0 "Add Profile $TmpDir/$profile\.xml" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out" 0 "Enable profile $profile" + rlLog "Verify by creating a user cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:$subject_name \ + subject_uid: \ + subject_email: \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" 0 + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlAssertGrep "Distribution Point: \[URIName: https://pki.example.org/fullCRL\]" "$cert_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0017: Create a server profile which SubjectAlt Name Extension having DNSName foobar.example.org" + local profile="caServerCert$RANDOM" + local subject_name="foobar$RANDOM-1.example.org" + local profilename="$profile Enrollment Profile" + rlLog "Create Profile $profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new server \ + --profileId $profile \ + --profilename \"$profilename\" \ + --altType DNSName \ + --altPattern www.foobar.example.org \ + --outputfile $TmpDir/$profile\.xml" 0 "Create Profile xml which adds DNSName foobar.example.org to subjectAltName." + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out" 0 "Add Profile $TmpDir/$profile\.xml" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out" 0 "Enable profile $profile" + rlLog "Verify by creating a user cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:$subject_name \ + subject_uid: \ + subject_email: \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" 0 + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlAssertGrep "DNSName: www.foobar.example.org" "$cert_out" + rlPhaseEnd + + + rlPhaseStartTest "pki_ca_profile_add-0018: Create a custom DualCert Profile xml and add the profile xml" + local profile="caDualCert$RANDOM" + local pki_user="pki_foo_bar10" + local pki_user_fullName="pki1 Foo Bar10" + local profilename="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli --new dualcert --profileId $profile --profilename \"$profilename\" --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlLog "Enable $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out" + rlLog "Verify by creating a user cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:crmf \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$pki_user_fullName\" \ + subject_uid:$pki_user \ + subject_email:$pki_user@example.org \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:true \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + rlAssertGrep "Enabled profile \"$profile\"" "$ca_profile_out" + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0019: Create a custom CA profile xml and add the profile" + local profile="caCACert$RANDOM" + local subject_name="FooBar CA1" + local profile_name="FooBar CA1 Profile" + rlRun "python -m PkiLib.pkiprofilecli --new ca --profileId $profile --profilename \"$profile_name\" --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out 2>&1" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlLog "Enable $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out 2>&1" + rlAssertGrep "Enabled profile \"$profile\"" "$ca_profile_out" + rlLog "Verify by creating a CA cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$subject_name\" \ + subject_uid:\ + subject_email: \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlAssertGrep "Basic Constraints - 2.5.29.19" "$cert_out" + rlAssertGrep "Is CA: yes" "$cert_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0020: Create a CA profile which adds Netscape Extensions nsCertSSLCA, nsCertEmailCA" + local profile="caCACert$RANDOM" + local subject_name="FooBar CA2" + local profile_name="FooBar CA2 Profile" + rlRun "python -m PkiLib.pkiprofilecli --new ca \ + --profileId $profile --netscapeextensions \"nsCertCritical,nsCertSSLCA,nsCertEmailCA\" \ + --profilename \"$profile_name\" \ + --outputfile $TmpDir/$profile\.xml" 0 "Add Profile with Netscape Certificate Extensions" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out 2>&1" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlLog "Enable $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out 2>&1" + rlAssertGrep "Enabled profile \"$profile\"" "$ca_profile_out" + rlLog "Verify by creating a CA cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$subject_name\" \ + subject_uid:\ + subject_email: \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlAssertGrep "Basic Constraints - 2.5.29.19" "$cert_out" + rlAssertGrep "Is CA: yes" "$cert_out" + rlAssertGrep "Identifier: Netscape Certificate Type - 2.16.840.1.113730.1.1" "$cert_out" + rlAssertGrep "Secure Email CA" "$cert_out" + rlAssertGrep "SSL CA" "$cert_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0021: Create a CA profile which adds CRL extension with URL https://pki.example.org/fullCRL" + local profile="caCACert$RANDOM" + local subject_name="FooBar CA3" + local profile_name="FooBar CA3 Profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new ca \ + --profileId $profile \ + --crlextension \"https://pki.example.org/fullCRL\" \ + --profilename \"$profile_name\" \ + --outputfile $TmpDir/$profile\.xml" 0 "Add Profile with Netscape Certificate Extensions" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out" 0 "Add Profile $TmpDir/$profile\.xml" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-enable $profile > $ca_profile_out" 0 "Enable profile $profile" + rlLog "Verify by creating a user cert using the profile" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$subject_name\" \ + subject_uid: \ + subject_email: \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" 0 + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + local cert_subject=$(cat $cert_info | grep cert_subject | cut -d- -f2) + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --pretty > $cert_out" + rlAssertGrep "Serial Number: $cert_serialNumber" "$cert_out" + rlAssertGrep "Issuer: CN=PKI $CA_INST Signing Cert,O=redhat" "$cert_out" + rlAssertGrep "Subject: $cert_subject" "$cert_out" + rlAssertGrep "Status: VALID" "$cert_out" + rlAssertGrep "Basic Constraints - 2.5.29.19" "$cert_out" + rlAssertGrep "Is CA: yes" "$cert_out" + rlAssertGrep "Distribution Point: \[URIName: https://pki.example.org/fullCRL\]" "$cert_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0022: Adding Profile xml using admin cert should pass" + local profile="caUserCert$RANDOM" + local profilename="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out" 0 "Adding Profile using $valid_admin_cert" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0023: Adding Profile xml using agent cert should fail" + local profile="caUserCert$RANDOM" + local profilename="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_agent_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out 2>&1" 255,1 "Adding Profile using $valid_agent_cert" + rlAssertGrep "ForbiddenException: Authorization Error" "$ca_profile_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0024: Adding Profile xml using Revoked Admin cert should fail" + local profile="caUserCert$RANDOM" + local profilename="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $revoked_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out 2>&1" 255,1 "Adding Profile using $revoked_admin_cert" + rlAssertGrep "PKIException: Unauthorized" "$ca_profile_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0025: Adding Profile xml using Revoked Agent cert should fail" + local profile="caUserCert$RANDOM" + local profilename="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $revoked_agent_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out 2>&1" 255,1 "Adding Profile using $revoked_agent_cert" + rlAssertGrep "PKIException: Unauthorized" "$ca_profile_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0026: Adding Profile xml using Expired Agent cert should fail" + local cur_date=$(date -u) + local end_date=$(certutil -L -d $CERTDB_DIR -n $expired_agent_cert | grep "Not After" | awk -F ": " '{print $2}') + rlLog "Current Date/Time: $(date)" + rlLog "Current Date/Time: before modifying using chrony $(date)" + rlRun "chronyc -a 'manual on' 1> $TmpDir/chrony.out" 0 "Set chrony to manual mode" + rlAssertGrep "200 OK" "$TmpDir/chrony.out" + rlLog "Move system to $end_date + 1 day ahead" + rlRun "chronyc -a -m 'offline' 'settime $end_date + 1 day' 'makestep' 'manual reset' 1> $TmpDir/chrony.out" + rlAssertGrep "200 OK" "$TmpDir/chrony.out" + rlLog "Date after modifying using chrony: $(date)" + local profile="caUserCert$RANDOM" + local profilename="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $expired_agent_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out 2>&1" 255,1 "Adding Profile using $expired_agent_cert" + rlAssertGrep "ProcessingException: Unable to invoke request" "$ca_profile_out" + rlLog "Set the date back to its original date & time" + rlRun "chronyc -a -m 'settime $cur_date + 10 seconds' 'makestep' 'manual reset' 'online' 1> $TmpDir/chrony.out" + rlAssertGrep "200 OK" "$TmpDir/chrony.out" + rlLog "Current Date/Time after setting system date back using chrony $(date)" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0027: Adding Profile xml using Expired Admin cert should fail" + local cur_date=$(date -u) + local end_date=$(certutil -L -d $CERTDB_DIR -n $expired_admin_cert | grep "Not After" | awk -F ": " '{print $2}') + rlLog "Current Date/Time: $(date)" + rlLog "Current Date/Time: before modifying using chrony $(date)" + rlRun "chronyc -a 'manual on' 1> $TmpDir/chrony.out" 0 "Set chrony to manual mode" + rlAssertGrep "200 OK" "$TmpDir/chrony.out" + rlLog "Move system to $end_date + 1 day ahead" + rlRun "chronyc -a -m 'offline' 'settime $end_date + 1 day' 'makestep' 'manual reset' 1> $TmpDir/chrony.out" + rlAssertGrep "200 OK" "$TmpDir/chrony.out" + rlLog "Date after modifying using chrony: $(date)" + local profile="caUserCert$RANDOM" + local profilename="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $expired_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out 2>&1" 255,1 "Adding Profile using $expired_admin_cert" + rlAssertGrep "ProcessingException: Unable to invoke request" "$ca_profile_out" + rlLog "Set the date back to its original date & time" + rlRun "chronyc -a -m 'settime $cur_date + 10 seconds' 'makestep' 'manual reset' 'online' 1> $TmpDir/chrony.out" + rlAssertGrep "200 OK" "$TmpDir/chrony.out" + rlLog "Current Date/Time after setting system date back using chrony $(date)" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0028: Adding Profile xml using Audit cert should fail" + local profile="caUserCert$RANDOM" + local profilename="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_audit_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out 2>&1" 255,1 "Adding Profile using $valid_audit_cert" + rlAssertGrep "ForbiddenException: Authorization Error" "$ca_profile_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0029: Adding Profile xml using Operator cert should fail" + local profile="caUserCert$RANDOM" + local profilename="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -n $valid_operator_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out 2>&1" 255,1 "Adding Profile using $valid_operator_cert" + rlAssertGrep "ForbiddenException: Authorization Error" "$ca_profile_out" + rlPhaseEnd + + rlPhaseStartSetup "Create a Normal User with No Privileges and add cert" + local pki_user="idm1_user_$rand" + local pki_user_fullName="Idm1 User $rand" + local pki_pwd="Secret123" + local profile=caUserCert + rlLog "Create user $pki_user" + rlRun "pki -d $CERTDB_DIR \ + -h $tmp_ca_host \ + -p $tmp_ca_port \ + -n $valid_admin_cert \ + -c $CERTDB_DIR_PASSWORD \ + ca-user-add $pki_user \ + --fullName \"$pki_user_fullName\" \ + --password $pki_pwd" 0 "Create $pki_user User" + rlLog "Generate cert for user $pki_user" + rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB \ + tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \ + myreq_type:pkcs10 \ + algo:rsa \ + key_size:2048 \ + subject_cn:\"$pki_user_fullName\" \ + subject_uid:$pki_user \ + subject_email:$pki_user@example.org \ + subject_ou: \ + subject_o: \ + subject_c: \ + archive:false \ + req_profile:$profile \ + target_host:$tmp_ca_host \ + protocol: \ + port:$tmp_ca_port \ + cert_db_dir:$CERTDB_DIR \ + cert_db_pwd:$CERTDB_DIR_PASSWORD \ + certdb_nick:$valid_agent_cert \ + cert_info:$cert_info" + local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2) + rlLog "Get the $pki_user cert in a output file" + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show $cert_serialNumber --encoded --output $TEMP_NSS_DB/$pki_user-out.pem 1> $TEMP_NSS_DB/pki-cert-show.out" + rlAssertGrep "Certificate \"$cert_serialNumber\"" "$TEMP_NSS_DB/pki-cert-show.out" + rlRun "pki -h $tmp_ca_host -p $tmp_ca_port cert-show 0x1 --encoded --output $TEMP_NSS_DB/ca_cert.pem 1> $TEMP_NSS_DB/ca-cert-show.out" + rlAssertGrep "Certificate \"0x1\"" "$TEMP_NSS_DB/ca-cert-show.out" + rlLog "Add the $pki_user cert to $TEMP_NSS_DB NSS DB" + rlRun "pki -d $TEMP_NSS_DB \ + -h $tmp_ca_host \ + -p $tmp_ca_port \ + -c $TEMP_NSS_DB_PWD \ + -n "$pki_user" client-cert-import \ + --cert $TEMP_NSS_DB/$pki_user-out.pem 1> $TEMP_NSS_DB/pki-client-cert.out" + rlAssertGrep "Imported certificate \"$pki_user\"" "$TEMP_NSS_DB/pki-client-cert.out" + rlLog "Get CA cert imported to $TEMP_NSS_DB NSS DB" + rlRun "pki -d $TEMP_NSS_DB \ + -h $tmp_ca_host \ + -p $tmp_ca_port \ + -c $TEMP_NSS_DB_PWD \ + -n \"casigningcert\" client-cert-import \ + --ca-cert $TEMP_NSS_DB/ca_cert.pem 1> $TEMP_NSS_DB/pki-ca-cert.out" + rlAssertGrep "Imported certificate \"casigningcert\"" "$TEMP_NSS_DB/pki-ca-cert.out" + rlRun "pki -d $CERTDB_DIR \ + -h $tmp_ca_host \ + -p $tmp_ca_port \ + -n $valid_admin_cert \ + -c $CERTDB_DIR_PASSWORD \ + -t ca user-cert-add $pki_user \ + --input $TEMP_NSS_DB/$pki_user-out.pem 1> $TEMP_NSS_DB/pki_user_cert_add.out" 0 "Cert is added to the user $pki_user" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0030: Adding Profile xml using Normal cert should fail" + local profile="caUserCert$RANDOM" + local profilename="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $TEMP_NSS_DB \ + -c $TEMP_NSS_DB_PWD \ + -n $pki_user \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out 2>&1" 255,1 "Adding Profile using $pki_user cert" + rlAssertGrep "ProcessingException: Unable to invoke request" "$ca_profile_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0031: Executing pki ca-profile-add using https URI using Admin Cert" + local profile="caUserCert$RANDOM" + local profilename="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -U https://$tmp_ca_host:$target_secure_port \ + -n $valid_admin_cert \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out 2>&1" 0 "Adding Profile using $valid_agent_cert" + rlAssertGrep "Added profile $profile" "$ca_profile_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0032: Adding Profile xml using Normal user authencation should fail" + local profile="caUserCert$RANDOM" + local profilename="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -u $pki_user \ + -w $pki_pwd \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out 2>&1" 255,1 "Adding Profile using $pki_user cert" + rlAssertGrep "ForbiddenException: Authentication method not allowed" "$ca_profile_out" + rlPhaseEnd + + rlPhaseStartTest "pki_ca_profile_add-0033: Adding Profile xml using invalid user authentication should fail" + local profile="caUserCert$RANDOM" + local invalid_pki_user=test1 + local invalid_pki_user_pwd=Secret123 + local profilename="$profile Enrollment Profile" + rlRun "python -m PkiLib.pkiprofilecli \ + --new user \ + --profileId $profile \ + --profilename \"$profilename\" \ + --outputfile $TmpDir/$profile\.xml" + rlLog "Add $profile" + rlRun "pki -h $tmp_ca_host \ + -p $tmp_ca_port \ + -d $CERTDB_DIR \ + -c $CERTDB_DIR_PASSWORD \ + -u $invalid_pki_user \ + -w $invalid_pki_user_pwd \ + ca-profile-add $TmpDir/$profile\.xml > $ca_profile_out 2>&1" 255,1 "Adding Profile using $pki_user cert" + rlAssertGrep "PKIException: Unauthorized" "$ca_profile_out" + rlPhaseEnd + + rlPhaseStartCleanup "pki ca-profile-add cleanup: Delete temp dir" + rlRun "popd" + rlRun "rm -r $TmpDir" 0 "Removing tmp directory" + rlPhaseEnd + + +} |