summaryrefslogtreecommitdiffstats
path: root/tests
diff options
context:
space:
mode:
authorAsha Akkiangady <aakkiang@redhat.com>2015-04-27 20:49:42 -0400
committerAsha Akkiangady <aakkiang@redhat.com>2015-04-27 20:57:51 -0400
commitef0efaa14c65f2a19569851b6b07b6bc79eaa7f0 (patch)
tree5ef7671b82c31b50f4ab5d7e0ecb55a5640cf9ce /tests
parentc9ba4610f25f16878186901ac9d52c602910e590 (diff)
downloadpki-ef0efaa14c65f2a19569851b6b07b6bc79eaa7f0.tar.gz
pki-ef0efaa14c65f2a19569851b6b07b6bc79eaa7f0.tar.xz
pki-ef0efaa14c65f2a19569851b6b07b6bc79eaa7f0.zip
Added script to keep subsystem installed status
written to env.sh and CA pki user clis check for CA install status before execution.
Diffstat (limited to 'tests')
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-add.sh18
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-add.sh14
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-delete.sh13
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-find.sh14
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-show.sh14
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert.sh19
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-del.sh20
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-find.sh18
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-membership-add.sh19
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-membership-del.sh18
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-membership-find.sh18
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-mod.sh14
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-show.sh19
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-add-ca.sh18
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-add-ca.sh24
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-ca.sh18
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-delete-ca.sh13
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-find-ca.sh15
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-show-ca.sh15
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-del-ca.sh17
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-find-ca.sh19
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-membership-add-ca.sh19
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-membership-del-ca.sh17
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-membership-find-ca.sh18
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-mod-ca.sh17
-rwxr-xr-xtests/dogtag/acceptance/quickinstall/rhcs-install-lib.sh109
-rwxr-xr-xtests/dogtag/acceptance/quickinstall/rhcs-install.sh7
-rw-r--r--tests/dogtag/shared/env.sh25
28 files changed, 390 insertions, 179 deletions
diff --git a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-add.sh b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-add.sh
index f59a31189..f172cfe03 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-add.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-add.sh
@@ -48,26 +48,24 @@ run_pki-ca-user-cli-ca-user-add_tests(){
SUBSYSTEM_TYPE=$2
MYROLE=$3
prefix=$subsystemId
+ ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
- ADMIN_CERT_LOCATION=$ROOTCA_ADMIN_CERT_LOCATION
prefix=ROOTCA
- CLIENT_PKCS12_PASSWORD=$ROOTCA_CLIENT_PKCS12_PASSWORD
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
- ADMIN_CERT_LOCATION=$(eval echo \$${MYROLE}_ADMIN_CERT_LOCATION)
prefix=$MYROLE
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${MYROLE}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
+ if [ "$ca_instance_created" = "TRUE" ] ; then
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
untrusted_cert_nickname=role_user_UTCA
@@ -1451,5 +1449,7 @@ Import CA certificate (Y/n)? \"" >> $expfile
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+ else
+ rlLog "CA instance is not installed"
+ fi
}
-
diff --git a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-add.sh b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-add.sh
index fe7bb6942..1a3c9ead5 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-add.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-add.sh
@@ -53,21 +53,27 @@ run_pki-ca-user-cli-user-cert-add_tests(){
subsystemId=$1
SUBSYSTEM_TYPE=$2
MYROLE=$3
+ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
prefix=ROOTCA
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
else
prefix=$MYROLE
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
-CA_HOST=$(eval echo \$${MYROLE})
-CA_PORT=$(eval echo \$${subsystemId}_UNSECURE_PORT)
+if [ "$ca_instance_created" = "TRUE" ] ; then
+ CA_HOST=$(eval echo \$${MYROLE})
+ CA_PORT=$(eval echo \$${subsystemId}_UNSECURE_PORT)
##### Create a temporary directory to save output files and initializing host/port variables #####
rlPhaseStartSetup "pki_user_cli_user_cert-add-ca-startup: Create temporary directory and initializing host/port variables"
rlRun "TmpDir=\`mktemp -d\`" 0 "Creating tmp directory"
@@ -2433,5 +2439,7 @@ rlPhaseStartTest "pki_user_cli_user_cleanup: Deleting role users"
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+else
+ rlLog "CA instance is not installed"
+fi
}
-
diff --git a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-delete.sh b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-delete.sh
index df9f0edb8..608d1671b 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-delete.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-delete.sh
@@ -53,21 +53,27 @@ run_pki-ca-user-cli-ca-user-cert-delete_tests(){
subsystemId=$1
SUBSYSTEM_TYPE=$2
MYROLE=$3
+ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
prefix=ROOTCA
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
prefix=$MYROLE
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
-CA_HOST=$(eval echo \$${MYROLE})
-CA_PORT=$(eval echo \$${subsystemId}_UNSECURE_PORT)
+if [ "$ca_instance_created" = "TRUE" ] ; then
+ CA_HOST=$(eval echo \$${MYROLE})
+ CA_PORT=$(eval echo \$${subsystemId}_UNSECURE_PORT)
##### Create temporary directory to save output files#####
rlPhaseStartSetup "pki_user_cli_user_cert-del-ca-startup: Create temporary directory"
rlRun "TmpDir=\`mktemp -d\`" 0 "Creating tmp directory"
@@ -997,4 +1003,7 @@ rlPhaseStartTest "pki_user_cli_user_cleanup: Deleting role users"
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+else
+ rlLog "CA instance is not installed"
+fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-find.sh b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-find.sh
index 5d26ada1a..d6344ecd9 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-find.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-find.sh
@@ -53,21 +53,26 @@ run_pki-ca-user-cli-ca-user-cert-find_tests(){
subsystemId=$1
SUBSYSTEM_TYPE=$2
MYROLE=$3
-
+ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
prefix=ROOTCA
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
prefix=$MYROLE
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
-CA_HOST=$(eval echo \$${MYROLE})
-CA_PORT=$(eval echo \$${subsystemId}_UNSECURE_PORT)
+if [ "$ca_instance_created" = "TRUE" ] ; then
+ CA_HOST=$(eval echo \$${MYROLE})
+ CA_PORT=$(eval echo \$${subsystemId}_UNSECURE_PORT)
#####Create temporary dir to save the output files#####
rlPhaseStartSetup "pki_user_cli_user_cert-find-ca-startup: Create temporary directory"
@@ -1065,4 +1070,7 @@ rlPhaseStartTest "pki_user_cli_user_cleanup: Deleting role users"
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+else
+ rlLog "CA instance is not installed"
+fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-show.sh b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-show.sh
index 3a8079a3b..d993cf5da 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-show.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert-show.sh
@@ -53,21 +53,26 @@ run_pki-ca-user-cli-ca-user-cert-show_tests(){
subsystemId=$1
SUBSYSTEM_TYPE=$2
MYROLE=$3
-
+ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
prefix=ROOTCA
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
prefix=$MYROLE
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
-CA_HOST=$(eval echo \$${MYROLE})
-CA_PORT=$(eval echo \$${subsystemId}_UNSECURE_PORT)
+if [ "$ca_instance_created" = "TRUE" ] ; then
+ CA_HOST=$(eval echo \$${MYROLE})
+ CA_PORT=$(eval echo \$${subsystemId}_UNSECURE_PORT)
##### Create temporary directory to save output files #####
rlPhaseStartSetup "pki_user_cli_user_cert-show-ca-startup: Create temporary directory"
@@ -1069,4 +1074,7 @@ rlPhaseStartTest "pki_user_cli_user_cleanup: Deleting role users"
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+else
+ rlLog "CA instance is not created"
+fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert.sh b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert.sh
index 5727863cf..d8732d482 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-cert.sh
@@ -44,27 +44,23 @@ run_pki-ca-user-cert()
subsystemId=$1
SUBSYSTEM_TYPE=$2
MYROLE=$3
-
+ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
- ADMIN_CERT_LOCATION=$ROOTCA_ADMIN_CERT_LOCATION
prefix=ROOTCA
- CLIENT_PKCS12_PASSWORD=$ROOTCA_CLIENT_PKCS12_PASSWORD
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
- ADMIN_CERT_LOCATION=$(eval echo \$${MYROLE}_ADMIN_CERT_LOCATION)
prefix=$MYROLE
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${MYROLE}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
-
+if [ "$ca_instance_created" = "TRUE" ] ; then
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
rlPhaseStartSetup "Create Temporary Directory "
@@ -94,4 +90,7 @@ SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
rlPhaseStartCleanup "pki user-cert cleanup: Delete temp dir"
rlRun "popd"
rlPhaseEnd
+else
+ rlLog "CA instance is not installed"
+fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-del.sh b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-del.sh
index cdf219a3b..39b2ce3f6 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-del.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-del.sh
@@ -47,25 +47,24 @@ run_pki-ca-user-cli-ca-user-del_tests(){
SUBSYSTEM_TYPE=$2
MYROLE=$3
prefix=$subsystemId
+ ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
- ADMIN_CERT_LOCATION=$ROOTCA_ADMIN_CERT_LOCATION
prefix=ROOTCA
- CLIENT_PKCS12_PASSWORD=$ROOTCA_CLIENT_PKCS12_PASSWORD
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
- ADMIN_CERT_LOCATION=$(eval echo \$${MYROLE}_ADMIN_CERT_LOCATION)
prefix=$MYROLE
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${MYROLE}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
+
+ if [ "$ca_instance_created" = "TRUE" ] ; then
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
untrusted_cert_nickname=role_user_UTCA
@@ -121,7 +120,7 @@ run_pki-ca-user-cli-ca-user-del_tests(){
0 \
"Deleted user u$i"
rlAssertGrep "Deleted user \"u$i\"" "$TmpDir/pki-user-del-ca-user1-00$i.out"
- command="pki -d $CERTDB_DIR -n ${prefix}_adminV -c $CERTDB_DIR_PASSWORD -h $SUBSYSTEM_HOST -p $(eval echo \$${subsystemId}_UNSECURE_PORT) user-show u$i"
+ command="pki -d $CERTDB_DIR -n ${prefix}_adminV -c $CERTDB_DIR_PASSWORD -h $SUBSYSTEM_HOST -p $(eval echo \$${subsystemId}_UNSECURE_PORT) user-show u$i"
errmsg="UserNotFoundException: User u$i not found"
errorcode=255
rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - deleted user should not exist"
@@ -677,4 +676,7 @@ Import CA certificate (Y/n)? \"" >> $expfile
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+ else
+ rlLog "CA instance is not installed"
+ fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-find.sh b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-find.sh
index 68738b185..4a9c4008c 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-find.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-find.sh
@@ -45,27 +45,24 @@ run_pki-ca-user-cli-ca-user-find_tests(){
subsystemId=$1
SUBSYSTEM_TYPE=$2
MYROLE=$3
-
+ ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
- ADMIN_CERT_LOCATION=$ROOTCA_ADMIN_CERT_LOCATION
prefix=ROOTCA
- CLIENT_PKCS12_PASSWORD=$ROOTCA_CLIENT_PKCS12_PASSWORD
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
- ADMIN_CERT_LOCATION=$(eval echo \$${MYROLE}_ADMIN_CERT_LOCATION)
prefix=$MYROLE
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${MYROLE}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
+ if [ "$ca_instance_created" = "TRUE" ] ; then
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
untrusted_cert_nickname=role_user_UTCA
user1=ca_agent2
@@ -733,4 +730,7 @@ Import CA certificate (Y/n)? \"" >> $expfile
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+ else
+ rlLog "CA instance is not installed"
+ fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-membership-add.sh b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-membership-add.sh
index ae6e7fbe6..b1eec8f96 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-membership-add.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-membership-add.sh
@@ -47,27 +47,23 @@ run_pki-ca-user-cli-ca-user-membership-add_tests(){
SUBSYSTEM_TYPE=$2
MYROLE=$3
prefix=$subsystemId
-
+ ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
- ADMIN_CERT_LOCATION=$ROOTCA_ADMIN_CERT_LOCATION
prefix=ROOTCA
- CLIENT_PKCS12_PASSWORD=$ROOTCA_CLIENT_PKCS12_PASSWORD
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
- ADMIN_CERT_LOCATION=$(eval echo \$${MYROLE}_ADMIN_CERT_LOCATION)
prefix=$MYROLE
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${MYROLE}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
-
+ if [ "$ca_instance_created" = "TRUE" ] ; then
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
untrusted_cert_nickname=role_user_UTCA
@@ -726,4 +722,7 @@ Import CA certificate (Y/n)? \"" >> $expfile
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+ else
+ rlLog "CA instance is not installed"
+ fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-membership-del.sh b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-membership-del.sh
index 150ba28b3..38865c3e5 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-membership-del.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-membership-del.sh
@@ -44,27 +44,26 @@ run_pki-ca-user-cli-ca-user-membership-del_tests(){
SUBSYSTEM_TYPE=$2
MYROLE=$3
prefix=$subsystemId
+ ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
- ADMIN_CERT_LOCATION=$ROOTCA_ADMIN_CERT_LOCATION
prefix=ROOTCA
- CLIENT_PKCS12_PASSWORD=$ROOTCA_CLIENT_PKCS12_PASSWORD
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
- ADMIN_CERT_LOCATION=$(eval echo \$${MYROLE}_ADMIN_CERT_LOCATION)
prefix=$MYROLE
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${MYROLE}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
+
+ if [ "$ca_instance_created" = "TRUE" ] ; then
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
untrusted_cert_nickname=role_user_UTCA
@@ -827,4 +826,7 @@ Import CA certificate (Y/n)? \"" >> $expfile
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+ else
+ rlLog "CA instance is not installed"
+ fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-membership-find.sh b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-membership-find.sh
index 8dbf4c72b..cc4beabf5 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-membership-find.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-membership-find.sh
@@ -47,27 +47,24 @@ run_pki-ca-user-cli-ca-user-membership-find_tests(){
SUBSYSTEM_TYPE=$2
MYROLE=$3
prefix=$subsystemId
-
+ ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
- ADMIN_CERT_LOCATION=$ROOTCA_ADMIN_CERT_LOCATION
prefix=ROOTCA
- CLIENT_PKCS12_PASSWORD=$ROOTCA_CLIENT_PKCS12_PASSWORD
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
- ADMIN_CERT_LOCATION=$(eval echo \$${MYROLE}_ADMIN_CERT_LOCATION)
prefix=$MYROLE
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${MYROLE}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
+ if [ "$ca_instance_created" = "TRUE" ] ; then
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
untrusted_cert_nickname=role_user_UTCA
@@ -749,4 +746,7 @@ run_pki-ca-user-cli-ca-user-membership-find_tests(){
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+ else
+ rlLog "CA subsystem not installed"
+ fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-mod.sh b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-mod.sh
index a096b8477..24bc249e2 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-mod.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-mod.sh
@@ -52,21 +52,26 @@ run_pki-ca-user-cli-ca-user-mod_tests(){
subsystemId=$1
SUBSYSTEM_TYPE=$2
MYROLE=$3
+ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
prefix=ROOTCA
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
prefix=$MYROLE
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
-
-CA_HOST=$(eval echo \$${MYROLE})
-CA_PORT=$(eval echo \$${subsystemId}_UNSECURE_PORT)
+ if [ "$ca_instance_created" = "TRUE" ] ; then
+ CA_HOST=$(eval echo \$${MYROLE})
+ CA_PORT=$(eval echo \$${subsystemId}_UNSECURE_PORT)
#####Create temporary dir to save the output files #####
rlPhaseStartSetup "pki_ca_user_cli_ca_user_mod-startup: Create temporary directory"
@@ -1088,4 +1093,7 @@ $i18nuser
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+ else
+ rlLog "CA instance not installed"
+ fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-show.sh b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-show.sh
index 06a695d37..1aab02361 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-show.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-ca-user-cli/pki-ca-user-cli-ca-user-show.sh
@@ -58,27 +58,23 @@ run_pki-ca-user-cli-ca-user-show_tests(){
SUBSYSTEM_TYPE=$2
MYROLE=$3
prefix=$subsystemId
-
+ ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
- ADMIN_CERT_LOCATION=$ROOTCA_ADMIN_CERT_LOCATION
prefix=ROOTCA
- CLIENT_PKCS12_PASSWORD=$ROOTCA_CLIENT_PKCS12_PASSWORD
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
- ADMIN_CERT_LOCATION=$(eval echo \$${MYROLE}_ADMIN_CERT_LOCATION)
prefix=$MYROLE
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${MYROLE}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
-
+ if [ "$ca_instance_created" = "TRUE" ] ; then
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
untrusted_cert_nickname=role_user_UTCA
@@ -1130,4 +1126,7 @@ Import CA certificate (Y/n)? \"" >> $expfile
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+ else
+ rlLog "CA instance not installed"
+ fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-add-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-add-ca.sh
index a07556ab7..b100cdbf7 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-add-ca.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-add-ca.sh
@@ -46,29 +46,28 @@ run_pki-user-cli-user-add-ca_tests(){
SUBSYSTEM_TYPE=$2
MYROLE=$3
prefix=$subsystemId
+ ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
- ADMIN_CERT_LOCATION=$ROOTCA_ADMIN_CERT_LOCATION
prefix=ROOTCA
- CLIENT_PKCS12_PASSWORD=$ROOTCA_CLIENT_PKCS12_PASSWORD
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
- ADMIN_CERT_LOCATION=$(eval echo \$${MYROLE}_ADMIN_CERT_LOCATION)
prefix=$MYROLE
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${MYROLE}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
untrusted_cert_nickname=role_user_UTCA
+ if [ "$ca_instance_created" = "TRUE" ] ; then
+
lPhaseStartSetup "pki_user_cli_user_add-ca-startup: Create temporary directory"
rlRun "TmpDir=\`mktemp -d\`" 0 "Creating tmp directory"
rlRun "pushd $TmpDir"
@@ -1462,4 +1461,7 @@ Import CA certificate (Y/n)? \"" >> $expfile
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+ else
+ rlLog "CA instance not created."
+ fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-add-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-add-ca.sh
index b1142cc4e..eef873cf6 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-add-ca.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-add-ca.sh
@@ -53,29 +53,28 @@ run_pki-user-cli-user-cert-add-ca_tests(){
subsystemId=$1
SUBSYSTEM_TYPE=$2
MYROLE=$3
+ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
- ADMIN_CERT_LOCATION=$ROOTCA_ADMIN_CERT_LOCATION
prefix=ROOTCA
- CLIENT_PKCS12_PASSWORD=$ROOTCA_CLIENT_PKCS12_PASSWORD
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
else
- ADMIN_CERT_LOCATION=$(eval echo \$${MYROLE}_ADMIN_CERT_LOCATION)
prefix=$MYROLE
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${MYROLE}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
+if [ "$ca_instance_created" = "TRUE" ] ; then
+
##### Create a temporary directory to save output files #####
rlPhaseStartSetup "pki_user_cli_user_cert-add-ca-startup: Create temporary directory"
rlRun "TmpDir=\`mktemp -d\`" 0 "Creating tmp directory"
@@ -2684,9 +2683,10 @@ rlPhaseStartTest "pki_user_cli_user_cleanup: Deleting role users"
done
#Delete temporary directory
- #rlRun "popd"
- #rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
+ rlRun "popd"
+ rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
-
-
+ else
+ rlLog "CA subsystem is not installed"
+ fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-ca.sh
index 4d170a3b4..4c24bb7fa 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-ca.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-ca.sh
@@ -44,29 +44,26 @@ run_pki-user-cert()
subsystemId=$1
SUBSYSTEM_TYPE=$2
MYROLE=$3
-
+ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
- ADMIN_CERT_LOCATION=$ROOTCA_ADMIN_CERT_LOCATION
prefix=ROOTCA
- CLIENT_PKCS12_PASSWORD=$ROOTCA_CLIENT_PKCS12_PASSWORD
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
- ADMIN_CERT_LOCATION=$(eval echo \$${MYROLE}_ADMIN_CERT_LOCATION)
prefix=$MYROLE
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${MYROLE}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
+if [ "$ca_instance_created" = "TRUE" ] ; then
rlPhaseStartSetup "Create Temporary Directory "
rlRun "TmpDir=\`mktemp -d\`" 0 "Creating tmp directory"
rlRun "pushd $TmpDir"
@@ -94,4 +91,7 @@ SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
rlPhaseStartCleanup "pki user-cert cleanup: Delete temp dir"
rlRun "popd"
rlPhaseEnd
+ else
+ rlLog "CA subsystem is not installed"
+ fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-delete-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-delete-ca.sh
index 8b526a470..87f0cbc44 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-delete-ca.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-delete-ca.sh
@@ -45,21 +45,26 @@ run_pki-user-cli-user-cert-delete-ca_tests(){
subsystemId=$1
SUBSYSTEM_TYPE=$2
MYROLE=$3
-
+ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
prefix=ROOTCA
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
prefix=$MYROLE
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
+if [ "$ca_instance_created" = "TRUE" ] ; then
##### Create temporary directory to save output files #####
rlPhaseStartSetup "pki_user_cli_user_cert-del-ca-startup: Create temporary directory"
rlRun "TmpDir=\`mktemp -d\`" 0 "Creating tmp directory"
@@ -1034,7 +1039,9 @@ rlPhaseStartTest "pki_user_cli_user_cleanup: Deleting role users"
done
#Delete temporary directory
rlRun "popd"
- #rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
+ rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
-
+ else
+ rlLog "CA subsystem is not installed"
+ fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-find-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-find-ca.sh
index 6a24e9e93..cf81b334b 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-find-ca.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-find-ca.sh
@@ -47,21 +47,27 @@ run_pki-user-cli-user-cert-find-ca_tests(){
subsystemId=$1
SUBSYSTEM_TYPE=$2
MYROLE=$3
-
+ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
prefix=ROOTCA
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
prefix=$MYROLE
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
+if [ "$ca_instance_created" = "TRUE" ] ; then
+
#####Create temporary dir to save the output files #####
rlPhaseStartSetup "pki_user_cli_user_cert-find-ca-startup: Create temporary directory"
rlRun "TmpDir=\`mktemp -d\`" 0 "Creating tmp directory"
@@ -1075,7 +1081,10 @@ rlPhaseStartTest "pki_user_cli_user_cleanup: Deleting role users"
done
#Delete temporary directory
- #rlRun "popd"
- #rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
+ rlRun "popd"
+ rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+ else
+ rlLog "CA subsystem is not installed"
+ fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-show-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-show-ca.sh
index 5c512b69d..34487da16 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-show-ca.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-cert-show-ca.sh
@@ -46,21 +46,27 @@ run_pki-user-cli-user-cert-show-ca_tests(){
subsystemId=$1
SUBSYSTEM_TYPE=$2
MYROLE=$3
-
+ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
prefix=ROOTCA
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
prefix=$MYROLE
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
+if [ "$ca_instance_created" = "TRUE" ] ; then
+
##### Create temporary directory to save output files #####
rlPhaseStartSetup "pki_user_cli_user_cert-show-ca-startup: Create temporary directory"
rlRun "TmpDir=\`mktemp -d\`" 0 "Creating tmp directory"
@@ -1107,7 +1113,10 @@ rlPhaseStartTest "pki_user_cli_user_cleanup: Deleting role users"
done
#Delete temporary directory
- #rlRun "popd"
- #rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
+ rlRun "popd"
+ rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+ else
+ rlLog "CA instance not installed"
+ fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-del-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-del-ca.sh
index f13bbd35b..a9c9147e7 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-del-ca.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-del-ca.sh
@@ -47,27 +47,25 @@ run_pki-user-cli-user-del-ca_tests(){
SUBSYSTEM_TYPE=$2
MYROLE=$3
prefix=$subsystemId
+ ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
- ADMIN_CERT_LOCATION=$ROOTCA_ADMIN_CERT_LOCATION
prefix=ROOTCA
- CLIENT_PKCS12_PASSWORD=$ROOTCA_CLIENT_PKCS12_PASSWORD
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
- ADMIN_CERT_LOCATION=$(eval echo \$${MYROLE}_ADMIN_CERT_LOCATION)
prefix=$MYROLE
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${MYROLE}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
+ if [ "$ca_instance_created" = "TRUE" ] ; then
rlPhaseStartSetup "pki_user_cli_user_del-CA-ca-startup: Create temporary directory"
rlRun "TmpDir=\`mktemp -d\`" 0 "Creating tmp directory"
@@ -671,4 +669,7 @@ Import CA certificate (Y/n)? \"" >> $expfile
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+ else
+ rlLog "CA instance not installed"
+ fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-find-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-find-ca.sh
index 30d1104c9..428d6e742 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-find-ca.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-find-ca.sh
@@ -47,29 +47,27 @@ run_pki-user-cli-user-find-ca_tests(){
subsystemId=$1
SUBSYSTEM_TYPE=$2
MYROLE=$3
-
+ ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
- ADMIN_CERT_LOCATION=$ROOTCA_ADMIN_CERT_LOCATION
prefix=ROOTCA
- CLIENT_PKCS12_PASSWORD=$ROOTCA_CLIENT_PKCS12_PASSWORD
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
- ADMIN_CERT_LOCATION=$(eval echo \$${MYROLE}_ADMIN_CERT_LOCATION)
prefix=$MYROLE
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${MYROLE}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
untrusted_cert_nickname=role_user_UTCA
+
+if [ "$ca_instance_created" = "TRUE" ] ; then
user1=ca_agent2
user1fullname="Test ca_agent"
user2=abcdefghijklmnopqrstuvwxyx12345678
@@ -736,4 +734,7 @@ Import CA certificate (Y/n)? \"" >> $expfile
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+ else
+ rlLog "CA instance not installed"
+ fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-membership-add-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-membership-add-ca.sh
index 3771b1167..6046f1f56 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-membership-add-ca.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-membership-add-ca.sh
@@ -47,30 +47,27 @@ run_pki-user-cli-user-membership-add-ca_tests(){
subsystemId=$1
SUBSYSTEM_TYPE=$2
MYROLE=$3
-
+ ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
- ADMIN_CERT_LOCATION=$ROOTCA_ADMIN_CERT_LOCATION
prefix=ROOTCA
- CLIENT_PKCS12_PASSWORD=$ROOTCA_CLIENT_PKCS12_PASSWORD
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
- ADMIN_CERT_LOCATION=$(eval echo \$${MYROLE}_ADMIN_CERT_LOCATION)
prefix=$MYROLE
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${MYROLE}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
untrusted_cert_nickname=role_user_UTCA
+if [ "$ca_instance_created" = "TRUE" ] ; then
#Local variables
groupid1="Certificate Manager Agents"
groupid2="Registration Manager Agents"
@@ -728,5 +725,7 @@ Import CA certificate (Y/n)? \"" >> $expfile
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+ else
+ rlLog "CA instance not installed"
+ fi
}
-
diff --git a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-membership-del-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-membership-del-ca.sh
index 34c459669..e419c53bc 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-membership-del-ca.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-membership-del-ca.sh
@@ -44,27 +44,25 @@ run_pki-user-cli-user-membership-del-ca_tests(){
SUBSYSTEM_TYPE=$2
MYROLE=$3
prefix=$subsystemId
+ ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
- ADMIN_CERT_LOCATION=$ROOTCA_ADMIN_CERT_LOCATION
prefix=ROOTCA
- CLIENT_PKCS12_PASSWORD=$ROOTCA_CLIENT_PKCS12_PASSWORD
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
- ADMIN_CERT_LOCATION=$(eval echo \$${MYROLE}_ADMIN_CERT_LOCATION)
prefix=$MYROLE
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${MYROLE}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
+ if [ "$ca_instance_created" = "TRUE" ] ; then
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
untrusted_cert_nickname=role_user_UTCA
@@ -830,4 +828,7 @@ Import CA certificate (Y/n)? \"" >> $expfile
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+ else
+ rlLog "CA instance not installed"
+ fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-membership-find-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-membership-find-ca.sh
index e68a45d6a..f605edca6 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-membership-find-ca.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-membership-find-ca.sh
@@ -47,27 +47,24 @@ run_pki-user-cli-user-membership-find-ca_tests(){
SUBSYSTEM_TYPE=$2
MYROLE=$3
prefix=$subsystemId
-
+ ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
- ADMIN_CERT_LOCATION=$(eval echo \$${subsystemId}_ADMIN_CERT_LOCATION)
prefix=$subsystemId
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${subsystemId}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
- ADMIN_CERT_LOCATION=$ROOTCA_ADMIN_CERT_LOCATION
prefix=ROOTCA
- CLIENT_PKCS12_PASSWORD=$ROOTCA_CLIENT_PKCS12_PASSWORD
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
- ADMIN_CERT_LOCATION=$(eval echo \$${MYROLE}_ADMIN_CERT_LOCATION)
prefix=$MYROLE
- CLIENT_PKCS12_PASSWORD=$(eval echo \$${MYROLE}_CLIENT_PKCS12_PASSWORD)
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
+ if [ "$ca_instance_created" = "TRUE" ] ; then
SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
untrusted_cert_nickname=role_user_UTCA
@@ -750,4 +747,7 @@ run_pki-user-cli-user-membership-find-ca_tests(){
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+ else
+ rlLog "CA instance not installed"
+ fi
}
diff --git a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-mod-ca.sh b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-mod-ca.sh
index b8d50069e..b1bf013bc 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-mod-ca.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-user-cli/ca/pki-user-cli-user-mod-ca.sh
@@ -52,22 +52,28 @@ run_pki-user-cli-user-mod-ca_tests(){
subsystemId=$1
SUBSYSTEM_TYPE=$2
MYROLE=$3
-
+ca_instance_created="False"
if [ "$TOPO9" = "TRUE" ] ; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
elif [ "$MYROLE" = "MASTER" ] ; then
if [[ $subsystemId == SUBCA* ]]; then
prefix=$subsystemId
+ ca_instance_created=$(eval echo \$${subsystemId}_INSTANCE_CREATED_STATUS)
else
prefix=ROOTCA
+ ca_instance_created=$ROOTCA_INSTANCE_CREATED_STATUS
fi
else
prefix=$MYROLE
+ ca_instance_created=$(eval echo \$${MYROLE}_INSTANCE_CREATED_STATUS)
fi
-SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
-untrusted_cert_db_location=$UNTRUSTED_CERT_DB_LOCATION
-untrusted_cert_db_password=$UNTRUSTED_CERT_DB_PASSWORD
+if [ "$ca_instance_created" = "TRUE" ] ; then
+ SUBSYSTEM_HOST=$(eval echo \$${MYROLE})
+ untrusted_cert_db_location=$UNTRUSTED_CERT_DB_LOCATION
+ untrusted_cert_db_password=$UNTRUSTED_CERT_DB_PASSWORD
+
#####Create temporary dir to save the output files #####
rlPhaseStartSetup "pki_user_cli_user_mod-ca-startup: Create temporary directory"
@@ -1068,4 +1074,7 @@ $i18nuser
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
rlPhaseEnd
+ else
+ rlLog "CA instance not installed"
+ fi
}
diff --git a/tests/dogtag/acceptance/quickinstall/rhcs-install-lib.sh b/tests/dogtag/acceptance/quickinstall/rhcs-install-lib.sh
index 482b81b5f..b98a17c78 100755
--- a/tests/dogtag/acceptance/quickinstall/rhcs-install-lib.sh
+++ b/tests/dogtag/acceptance/quickinstall/rhcs-install-lib.sh
@@ -185,6 +185,16 @@ rhcs_install_RootCA() {
echo "export ROOTCA_SERVER_ROOT=/var/lib/pki/$ROOTCA_TOMCAT_INSTANCE_NAME/ca" >> /opt/rhqa_pki/env.sh
mkdir -p $CLIENT_PKCS12_DIR
mv /var/lib/pki/$ROOTCA_TOMCAT_INSTANCE_NAME/alias/ca_backup_keys.p12 $CLIENT_PKCS12_DIR
+
+ #Update Instance creation status to env.sh
+ rlLog "Executing: pkidaemon status tomcat"
+ rlRun "pkidaemon status tomcat > /tmp/ROOTCA_instance_status.txt 2>&1"
+ exp_result1="$ROOTCA_TOMCAT_INSTANCE_NAME is running"
+ exp_result2="Secure Admin URL = https://$(hostname):$ROOTCA_SECURE_PORT/ca/services"
+ if [ $(grep $exp_result1 /tmp/ROOTCA_instance_status.txt | wc -l) -gt 0 ] && [ $(grep $exp_result2 /tmp/ROOTCA_instance_status.txt | wc -l) -gt 0 ] ; then
+ rlLog " ROOTCA instance created successfully"
+ sed -i s/^ROOTCA_INSTANCE_CREATED_STATUS=False/ROOTCA_INSTANCE_CREATED_STATUS=TRUE/g /opt/rhqa_pki/env.sh
+ fi
rlPhaseEnd
}
@@ -322,6 +332,16 @@ rhcs_install_kra() {
#echo "export KRA_SERVER_ROOT=/var/lib/pki/$(eval echo \$KRA${number}_TOMCAT_INSTANCE_NAME)/kra" >> /opt/rhqa_pki/env.sh
mkdir -p $CLIENT_PKCS12_DIR
mv /var/lib/pki/$(eval echo \$KRA${number}_TOMCAT_INSTANCE_NAME)/alias/kra_backup_keys.p12 $CLIENT_PKCS12_DIR
+
+ #Update Instance creation status to env.sh
+ rlLog "Executing: pkidaemon status tomcat"
+ rlRun "pkidaemon status tomcat > /tmp/KRA${number}_instance_status.txt 2>&1"
+ exp_result1="$(eval echo \$KRA${number}_TOMCAT_INSTANCE_NAME) is running"
+ exp_result2="Secure Admin URL = https://$(hostname):$(eval echo \$KRA${number}_SECURE_PORT)/kra/services"
+ if [ $(grep $exp_result1 /tmp/KRA${number}_instance_status.txt | wc -l) -gt 0 ] && [ $(grep $exp_result2 /tmp/KRA${number}_instance_status.txt | wc -l) -gt 0 ] ; then
+ rlLog "KRA${number} instance creation successful"
+ sed -i s/^KRA${number}_INSTANCE_CREATED_STATUS=False/KRA${number}_INSTANCE_CREATED_STATUS=TRUE/g /opt/rhqa_pki/env.sh
+ fi
rlPhaseEnd
}
@@ -453,6 +473,16 @@ rhcs_install_ocsp() {
# echo "export OCSP_SERVER_ROOT=/var/lib/pki/$(eval echo \$OCSP${number}_TOMCAT_INSTANCE_NAME)/ocsp" >> /opt/rhqa_pki/env.sh
mkdir -p $CLIENT_PKCS12_DIR
mv /var/lib/pki/$(eval echo \$OCSP${number}_TOMCAT_INSTANCE_NAME)/alias/ocsp_backup_keys.p12 $CLIENT_PKCS12_DIR
+
+ #Update Instance creation status to env.sh
+ rlLog "Executing: pkidaemon status tomcat"
+ rlRun "pkidaemon status tomcat > /tmp/OCSP${number}_instance_status.txt 2>&1"
+ exp_result1="$(eval echo \$OCSP${number}_TOMCAT_INSTANCE_NAME) is running"
+ exp_result2="Secure Admin URL = https://$(hostname):$(eval echo \$OCSP${number}_SECURE_PORT)/ocsp/services"
+ if [ $(grep $exp_result1 /tmp/OCSP${number}_instance_status.txt | wc -l) -gt 0 ] && [ $(grep $exp_result2 /tmp/OCSP${number}_instance_status.txt | wc -l) -gt 0 ] ; then
+ rlLog "OCSP${number} instance creation successful"
+ sed -i s/^OCSP${number}_INSTANCE_CREATED_STATUS=False/OCSP${number}_INSTANCE_CREATED_STATUS=TRUE/g /opt/rhqa_pki/env.sh
+ fi
rlPhaseEnd
}
###########################################################
@@ -575,6 +605,16 @@ rhcs_install_tks() {
# echo "export TKS_SERVER_ROOT=/var/lib/pki/$(eval echo \$TKS${number}_TOMCAT_INSTANCE_NAME)/tks" >> /opt/rhqa_pki/env.sh
mkdir -p $CLIENT_PKCS12_DIR
mv /var/lib/pki/$(eval echo \$TKS${number}_TOMCAT_INSTANCE_NAME)/alias/tks_backup_keys.p12 $CLIENT_PKCS12_DIR
+
+ #Update Instance creation status to env.sh
+ rlLog "Executing: pkidaemon status tomcat"
+ rlRun "pkidaemon status tomcat > /tmp/TKS${number}_instance_status.txt 2>&1"
+ exp_result1="$(eval echo \$TKS${number}_TOMCAT_INSTANCE_NAME) is running"
+ exp_result2="Secure Admin URL = https://$(hostname):$(eval echo \$TKS${number}_SECURE_PORT)/ocsp/services"
+ if [ $(grep $exp_result1 /tmp/TKS${number}_instance_status.txt | wc -l) -gt 0 ] && [ $(grep $exp_result2 /tmp/TKS${number}_instance_status.txt | wc -l) -gt 0 ] ; then
+ rlLog "TKS${number} instance creation successful"
+ sed -i s/^TKS${number}_INSTANCE_CREATED_STATUS=False/TKS${number}_INSTANCE_CREATED_STATUS=TRUE/g /opt/rhqa_pki/env.sh
+ fi
rlPhaseEnd
}
@@ -707,6 +747,16 @@ rhcs_install_tps() {
# echo "export TKS_SERVER_ROOT=/var/lib/pki/$(eval echo \$TKS${number}_TOMCAT_INSTANCE_NAME)/tks" >> /opt/rhqa_pki/env.sh
mkdir -p $CLIENT_PKCS12_DIR
mv /var/lib/pki/$(eval echo \$TPS${number}_TOMCAT_INSTANCE_NAME)/alias/tps_backup_keys.p12 $CLIENT_PKCS12_DIR
+
+ #Update Instance creation status to env.sh
+ rlLog "Executing: pkidaemon status tomcat"
+ rlRun "pkidaemon status tomcat > /tmp/TPS${number}_instance_status.txt 2>&1"
+ exp_result1="$(eval echo \$TPS${number}_TOMCAT_INSTANCE_NAME) is running"
+ exp_result2="Secure Admin URL = https://$(hostname):$(eval echo \$TPS${number}_SECURE_PORT)/services"
+ if [ $(grep $exp_result1 /tmp/TPS${number}_instance_status.txt | wc -l) -gt 0 ] && [ $(grep $exp_result2 /tmp/TPS${number}_instance_status.txt | wc -l) -gt 0 ] ; then
+ rlLog "TPS${number} instance creation successful"
+ sed -i s/^TPS${number}_INSTANCE_CREATED_STATUS=False/TPS${number}_INSTANCE_CREATED_STATUS=TRUE/g /opt/rhqa_pki/env.sh
+ fi
rlPhaseEnd
}
@@ -822,6 +872,16 @@ rhcs_install_cloneCA()
exp_message5_1="https://$HOSTNAME_CLONE:$(eval echo \$CLONE_CA${number}_SECURE_PORT)/ca"
rlAssertGrep "$exp_message5_1" "$INSTANCE_CREATE_OUT"
#echo "export CA_SERVER_ROOT=/var/lib/pki/$(eval echo \$CLONE_CA${number}_TOMCAT_INSTANCE_NAME)/ca" >> /opt/rhqa_pki/env.sh
+
+ #Update Instance creation status to env.sh
+ rlLog "Executing: pkidaemon status tomcat"
+ rlRun "pkidaemon status tomcat > /tmp/CLONE_CA${number}_instance_status.txt 2>&1"
+ exp_result1="$(eval echo \$CLONE_CA${number}_TOMCAT_INSTANCE_NAME) is running"
+ exp_result2="Secure Admin URL = https://$(hostname):$(eval echo \$CLONE_CA${number}_SECURE_PORT)/services"
+ if [ $(grep $exp_result1 /tmp/CLONE_CA${number}_instance_status.txt | wc -l) -gt 0 ] && [ $(grep $exp_result2 /tmp/CLONE_CA${number}_instance_status.txt | wc -l) -gt 0 ] ; then
+ rlLog "CLONE_CA${number} instance creation successful"
+ sed -i s/^CLONE_CA${number}_INSTANCE_CREATED_STATUS=False/CLONE_CA${number}_INSTANCE_CREATED_STATUS=TRUE/g /opt/rhqa_pki/env.sh
+ fi
rlPhaseEnd
}
@@ -964,6 +1024,16 @@ rhcs_install_SubCA(){
#echo "export CA_SERVER_ROOT=/var/lib/pki/$(eval echo \$SUBCA${number}_TOMCAT_INSTANCE_NAME)/ca" >> /opt/rhqa_pki/env.sh
mkdir -p $CLIENT_PKCS12_DIR
mv /var/lib/pki/$(eval echo \$SUBCA${number}_TOMCAT_INSTANCE_NAME)/alias/ca_backup_keys.p12 $CLIENT_PKCS12_DIR
+
+ #Update Instance creation status to env.sh
+ rlLog "Executing: pkidaemon status tomcat"
+ rlRun "pkidaemon status tomcat > /tmp/SUBCA${number}_instance_status.txt 2>&1"
+ exp_result1="$SUBCA${number}_TOMCAT_INSTANCE_NAME is running"
+ exp_result2="Secure Admin URL = https://$(hostname):$SUBCA${number}_SECURE_PORT/ca/services"
+ if [ $(grep $exp_result1 /tmp/SUBCA${number}_instance_status.txt | wc -l) -gt 0 ] && [ $(grep $exp_result2 /tmp/SUBCA${number}_instance_status.txt | wc -l) -gt 0 ] ; then
+ rlLog "SUBCA${number} instance created successfully"
+ sed -i s/^SUBCA${number}_INSTANCE_CREATED_STATUS=False/SUBCA${number}_INSTANCE_CREATED_STATUS=TRUE/g /opt/rhqa_pki/env.sh
+ fi
rlPhaseEnd
}
@@ -1069,6 +1139,15 @@ rhcs_install_cloneKRA(){
rlAssertGrep "$exp_message8_1" "$INSTANCE_CREATE_OUT"
# echo "export KRA_SERVER_ROOT=/var/lib/pki/$(eval echo \$CLONE_KRA{number}_TOMCAT_INSTANCE_NAME)/kra" >> /opt/rhqa_pki/env.sh
+ #Update Instance creation status to env.sh
+ rlLog "Executing: pkidaemon status tomcat"
+ rlRun "pkidaemon status tomcat > /tmp/CLONE_KRA${number}_instance_status.txt 2>&1"
+ exp_result1="$(eval echo \$CLONE_KRA${number}_TOMCAT_INSTANCE_NAME) is running"
+ exp_result2="Secure Admin URL = https://$(hostname):$(eval echo \$CLONE_KRA${number}_SECURE_PORT)/services"
+ if [ $(grep $exp_result1 /tmp/CLONE_KRA${number}_instance_status.txt | wc -l) -gt 0 ] && [ $(grep $exp_result2 /tmp/CLONE_KRA${number}_instance_status.txt | wc -l) -gt 0 ] ; then
+ rlLog "CLONE_KRA${number} instance creation successful"
+ sed -i s/^CLONE_KRA${number}_INSTANCE_CREATED_STATUS=False/CLONE_KRA${number}_INSTANCE_CREATED_STATUS=TRUE/g /opt/rhqa_pki/env.sh
+ fi
rlPhaseEnd
}
@@ -1176,6 +1255,16 @@ rhcs_install_cloneOCSP(){
rlAssertGrep "$exp_message5_1" "$INSTANCE_CREATE_OUT"
#echo "export OCSP_SERVER_ROOT=/var/lib/pki/$(eval echo \$CLONE_OCSP${number}_TOMCAT_INSTANCE_NAME)/ocsp" >> /opt/rhqa_pki/env.sh
rlLog "https://fedorahosted.org/pki/ticket/1058"
+
+ #Update Instance creation status to env.sh
+ rlLog "Executing: pkidaemon status tomcat"
+ rlRun "pkidaemon status tomcat > /tmp/CLONE_OCSP${number}_instance_status.txt 2>&1"
+ exp_result1="$(eval echo \$CLONE_OCSP${number}_TOMCAT_INSTANCE_NAME) is running"
+ exp_result2="Secure Admin URL = https://$(hostname):$(eval echo \$CLONE_OCSP${number}_SECURE_PORT)/services"
+ if [ $(grep $exp_result1 /tmp/CLONE_OCSP${number}_instance_status.txt | wc -l) -gt 0 ] && [ $(grep $exp_result2 /tmp/CLONE_OCSP${number}_instance_status.txt | wc -l) -gt 0 ] ; then
+ rlLog "CLONE_OCSP${number} instance creation successful"
+ sed -i s/^CLONE_OCSP${number}_INSTANCE_CREATED_STATUS=False/CLONE_OCSP${number}_INSTANCE_CREATED_STATUS=TRUE/g /opt/rhqa_pki/env.sh
+ fi
rlPhaseEnd
}
@@ -1279,6 +1368,16 @@ rhcs_install_cloneTKS(){
rlAssertGrep "$exp_message5" "$INSTANCE_CREATE_OUT"
exp_message5_1="https://$(hostname):$(eval echo \$CLONE_TKS${number}_SECURE_PORT)/tks"
rlAssertGrep "$exp_message5_1" "$INSTANCE_CREATE_OUT"
+
+ #Update Instance creation status to env.sh
+ rlLog "Executing: pkidaemon status tomcat"
+ rlRun "pkidaemon status tomcat > /tmp/CLONE_TKS${number}_instance_status.txt 2>&1"
+ exp_result1="$(eval echo \$CLONE_TKS${number}_TOMCAT_INSTANCE_NAME) is running"
+ exp_result2="Secure Admin URL = https://$(hostname):$(eval echo \$CLONE_TKS${number}_SECURE_PORT)/services"
+ if [ $(grep $exp_result1 /tmp/CLONE_TKS${number}_instance_status.txt | wc -l) -gt 0 ] && [ $(grep $exp_result2 /tmp/CLONE_TKS${number}_instance_status.txt | wc -l) -gt 0 ] ; then
+ rlLog "CLONE_TKS${number} instance creation successful"
+ sed -i s/^CLONE_TKS${number}_INSTANCE_CREATED_STATUS=False/CLONE_TKS${number}_INSTANCE_CREATED_STATUS=TRUE/g /opt/rhqa_pki/env.sh
+ fi
rlPhaseEnd
}
@@ -1389,6 +1488,16 @@ rhcs_install_cloneTPS(){
rlAssertGrep "$exp_message5" "$INSTANCE_CREATE_OUT"
exp_message5_1="https://$(hostname):$(eval echo \$CLONE_TPS${number}_SECURE_PORT)/tks"
rlAssertGrep "$exp_message5_1" "$INSTANCE_CREATE_OUT"
+
+ #Update Instance creation status to env.sh
+ rlLog "Executing: pkidaemon status tomcat"
+ rlRun "pkidaemon status tomcat > /tmp/CLONE_TPS${number}_instance_status.txt 2>&1"
+ exp_result1="$(eval echo \$CLONE_TPS${number}_TOMCAT_INSTANCE_NAME) is running"
+ exp_result2="Secure Admin URL = https://$(hostname):$(eval echo \$CLONE_TPS${number}_SECURE_PORT)/services"
+ if [ $(grep $exp_result1 /tmp/CLONE_TPS${number}_instance_status.txt | wc -l) -gt 0 ] && [ $(grep $exp_result2 /tmp/CLONE_TPS${number}_instance_status.txt | wc -l) -gt 0 ] ; then
+ rlLog "CLONE_TPS${number} instance creation successful"
+ sed -i s/^CLONE_TPS${number}_INSTANCE_CREATED_STATUS=False/CLONE_TPS${number}_INSTANCE_CREATED_STATUS=TRUE/g /opt/rhqa_pki/env.sh
+ fi
rlPhaseEnd
}
###########################################################
diff --git a/tests/dogtag/acceptance/quickinstall/rhcs-install.sh b/tests/dogtag/acceptance/quickinstall/rhcs-install.sh
index dae68ac0e..b6685e936 100755
--- a/tests/dogtag/acceptance/quickinstall/rhcs-install.sh
+++ b/tests/dogtag/acceptance/quickinstall/rhcs-install.sh
@@ -56,9 +56,10 @@ run_rhcs_install_packages() {
#TESTCOUNT=1
COMMON_SERVER_PACKAGES="bind expect pki-console xmlstarlet dos2unix"
- RHELRHCS_PACKAGES="symkey mod-nss pki-native-tools redhat-pki-ca-ui redhat-pki-common-ui redhat-pki-console-ui redhat-pki-kra-ui redhat-pki-ocsp-ui redhat-pki-ra-ui redhat-pki-tks-ui redhat-pki-tps-ui"
+ #RHELRHCS_PACKAGES="symkey mod-nss pki-native-tools redhat-pki-ca-ui redhat-pki-common-ui redhat-pki-console-ui redhat-pki-kra-ui redhat-pki-ocsp-ui redhat-pki-ra-ui redhat-pki-tks-ui redhat-pki-tps-ui"
DOGTAG_PACKAGES="pki-tools pki-symkey dogtag-pki dogtag-pki-console-theme dogtag-pki-server-theme"
NTPDATE_PACKAGE="ntpdate"
+ DEPENDENT_PACKAGES="idm-console-framework pki-base pki-ca pki-console pki-kra pki-ocsp pki-server pki-symkey pki-tks pki-tools pki-tps tomcat resteasy-base-jackson-provider resteasy-base-jaxb-provider resteasy-base-jaxrs resteasy-base-jaxrs-api"
rlRun "setenforce 0"
cat /etc/redhat-release | grep "Fedora"
if [ $? -eq 0 ] ; then
@@ -127,7 +128,7 @@ run_rhcs_install_packages() {
run_install_subsystem_RootCA()
{
rlPhaseStartSetup "rhcs_install_subsystem_RootCA: Default install"
- ALL_PACKAGES="$COMMON_SERVER_PACKAGES $DOGTAG_PACKAGES $NTPDATE_PACKAGE"
+ ALL_PACKAGES="$COMMON_SERVER_PACKAGES $DOGTAG_PACKAGES $DEPENDENT_PACKAGES $NTPDATE_PACKAGE"
for item in $ALL_PACKAGES ; do
rpm -qa | grep $item
if [ $? -eq 0 ] ; then
@@ -136,7 +137,7 @@ run_install_subsystem_RootCA()
rlLog "ERROR: $item package is NOT installed"
rc=1
ROOTCA_INSTALLED=FALSE
- break
+ rlDie "$item is not installed"
fi
done
if [ $rc -eq 0 ] ; then
diff --git a/tests/dogtag/shared/env.sh b/tests/dogtag/shared/env.sh
index 6f8dd12cd..29bedd8cd 100644
--- a/tests/dogtag/shared/env.sh
+++ b/tests/dogtag/shared/env.sh
@@ -61,6 +61,7 @@ ROOTCA_DB_SUFFIX="dc=pki-ca"
ROOTCA_LDAP_INSTANCE_NAME=pki-ca-ldap
ROOTCA_CERTDB_DIR="/opt/rhqa_pki/rootca/certs_db"
ROOTCA_CERTDB_DIR_PASSWORD="Secret123"
+ROOTCA_INSTANCE_CREATED_STATUS=False
########End CA params########
######## KRA1 Params used by topology 2,3,4,5, 6 and 8###########
@@ -117,6 +118,7 @@ KRA1_DB_SUFFIX="dc=pki-kra1"
KRA1_LDAP_INSTANCE_NAME=pki-kra1-ldap
KRA1_CLIENT_PKCS12_PASSWORD="Secret123"
KRA1_BACKUP_PASSWORD="Secret123"
+KRA1_INSTANCE_CREATED_STATUS=False
####### End KRA1 params########
###### KRA 2 params used by topology 5 and 6####
@@ -174,6 +176,7 @@ KRA2_DB_SUFFIX="dc=pki-kra2"
KRA2_LDAP_INSTANCE_NAME=pki-kra2-ldap
KRA2_CLIENT_PKCS12_PASSWORD="Secret123"
KRA2_BACKUP_PASSWORD="Secret123"
+KRA2_INSTANCE_CREATED_STATUS=False
############## End KRA 2 Params######
############# KRA3 Params used by QUICKINSTALL and topology1 ############
@@ -231,6 +234,7 @@ KRA3_LDAP_INSTANCE_NAME=pki-kra3-ldap
KRA3_CLIENT_PKCS12_PASSWORD="Secret123"
KRA3_BACKUP_PASSWORD="Secret123"
KRA3_ADMIN_PASSWORD="Secret123"
+KRA3_INSTANCE_CREATED_STATUS=False
######### KRA3 Params################
##### OCSP1 Params -- used by topology 2, 3, 4, 5, 6 and 8 #############
@@ -281,6 +285,7 @@ OCSP1_DB_SUFFIX="dc=pki-ocsp1"
OCSP1_LDAP_INSTANCE_NAME=pki-ocsp1-ldap
OCSP1_BACKUP_PASSWORD="Secret123"
OCSP1_CLIENT_PKCS12_PASSWORD="Secret123"
+OCSP1_INSTANCE_CREATED_STATUS=False
###### End OCSP1 Params #########
######## OCSP2 Params ##########
@@ -331,6 +336,7 @@ OCSP2_DB_SUFFIX="dc=pki-ocsp2"
OCSP2_LDAP_INSTANCE_NAME=pki-ocsp2-ldap
OCSP2_BACKUP_PASSWORD="Secret123"
OCSP2_CLIENT_PKCS12_PASSWORD="Secret123"
+OCSP2_INSTANCE_CREATED_STATUS=False
##### End OCSP2 Params ##########
#####OCSP3 Params used in QUICKINSTALL and topology1#############
@@ -380,6 +386,7 @@ OCSP3_DB_SUFFIX="dc=pki-ocsp3"
OCSP3_LDAP_INSTANCE_NAME=pki-ocsp3-ldap
OCSP3_BACKUP_PASSWORD="Secret123"
OCSP3_CLIENT_PKCS12_PASSWORD="Secret123"
+OCSP3_INSTANCE_CREATED_STATUS=False
########End OCSP3 Params#####
######### TKS1 Parmams used in QUICKINSTALL and topology1 #########
@@ -423,6 +430,7 @@ TKS1_LDAP_INSTANCE_NAME=pki-tks1-ldap
TKS1_DB_SUFFIX="dc=pki-tks1"
TKS1_BACKUP_PASSWORD="Secret123"
TKS1_CLIENT_PKCS12_PASSWORD="Secret123"
+TKS1_INSTANCE_CREATED_STATUS=False
########End TKS Params#######
####### TKS2 Params - this set of params not used in any topology ##########
@@ -465,6 +473,7 @@ TKS2_DB_SUFFIX="dc=pki-tks2"
TKS2_BACKUP_PASSWORD="Secret123"
TKS2_ADMIN_PASSWORD="Secret123"
TKS2_CLIENT_PKCS12_PASSWORD=Secret123
+TKS2_INSTANCE_CREATED_STATUS=False
####### End TKS2 Params ######
######### TPS1 Parmams used in QUICKINSTALL and topology1 #########
@@ -510,6 +519,7 @@ TPS1_BACKUP_PASSWORD="Secret123"
TPS1_CLIENT_PKCS12_PASSWORD="Secret123"
TPS1_SERVER_KEYGEN=True
TPS1_AUTHDB_HOST="`hostname`"
+TPS1_INSTANCE_CREATED_STATUS=False
########End TPS Params#######
##### GENERIC PARAMS #####
@@ -610,6 +620,7 @@ SUBCA1_BACKUP_PASSWORD=Secret123
SUBCA1_CERTDB_DIR=$CLIENT_DIR/subca1_certs_db
SUBCA1_CERTDB_DIR_PASSWORD=Secret123
SUBCA1_CLIENT_DB_PURGE=True
+SUBCA1_INSTANCE_CREATED_STATUS=False
##### End of SUBCA1 params #######
###### SUBCA2 params - topology 3,4,5 and 6 #######
@@ -683,6 +694,7 @@ SUBCA2_BACKUP_PASSWORD=Secret123
SUBCA2_CERTDB_DIR=$CLIENT_DIR/subca2_certs_db
SUBCA2_CERTDB_DIR_PASSWORD=Secret123
SUBCA2_CLIENT_DB_PURGE=True
+SUBCA2_INSTANCE_CREATED_STATUS=False
######## End of SUBCA2 params #######
##### CLONE generic params #########
@@ -727,6 +739,7 @@ CLONE_CA1_LDAP_PORT=1901
CLONE_CA1_LDAP_INSTANCE_NAME=pki-cloneca1
CLONE_CA1_SECURE_CONN=False
CLONE_CA1_REMOVE_DATA=True
+CLONE_CA1_INSTANCE_CREATED_STATUS=False
##### End of CLONE_CA1 params #######
##### CLONE_KRA1 params -- used by QUICKINSTALL, topology 1 and 8 ########
@@ -755,6 +768,7 @@ CLONE_KRA1_SSL_SERVER_SIGNING_ALGORITHM=SHA512withRSA
CLONE_KRA1_SSL_SERVER_TOKEN=Internal
CLONE_KRA1_SSL_SERVER_NICKNAME=cloneca1sslservercert
CLONE_KRA1_SSL_SERVER_CERT_SUBJECT_NAME="cn=`hostname`,O=redhat"
+CLONE_KRA1_INSTANCE_CREATED_STATUS=False
##### End of CLONE_KRA1 params #######
@@ -786,6 +800,7 @@ CLONE_OCSP1_SSL_SERVER_SIGNING_ALGORITHM=SHA512withRSA
CLONE_OCSP1_SSL_SERVER_TOKEN=Internal
CLONE_OCSP1_SSL_SERVER_NICKNAME=cloneca1sslservercert
CLONE_OCSP1_SSL_SERVER_CERT_SUBJECT_NAME="cn=`hostname`,O=redhat"
+CLONE_OCSP1_INSTANCE_CREATED_STATUS=False
###### End of CLONE_OCSP1 #######
###### CLONE_TKS1 params -- used by QUICKINSTALL and topology 1 #########
@@ -815,6 +830,7 @@ CLONE_TKS1_SSL_SERVER_SIGNING_ALGORITHM=SHA512withRSA
CLONE_TKS1_SSL_SERVER_TOKEN=Internal
CLONE_TKS1_SSL_SERVER_NICKNAME=cloneca1sslservercert
CLONE_TKS1_SSL_SERVER_CERT_SUBJECT_NAME="cn=`hostname`,O=redhat"
+CLONE_TKS1_INSTANCE_CREATED_STATUS=False
##### End of CLONE_TKS1 params ######
###### CLONE_TPS1 params -- used by QUICKINSTALL and topology 1 #########
@@ -845,6 +861,7 @@ CLONE_TPS1_SSL_SERVER_TOKEN=Internal
CLONE_TPS1_SSL_SERVER_NICKNAME=cloneca1sslservercert
CLONE_TPS1_SSL_SERVER_CERT_SUBJECT_NAME="cn=`hostname`,O=redhat"
CLONE_TPS1_SERVER_KEYGEN=True
+CLONE_TPS1_INSTANCE_CREATED_STATUS=False
##### End of CLONE_TPS1 params ######
@@ -879,6 +896,7 @@ CLONE_CA2_ADMIN_SUBJECT_DN="cn=PKI CLONE2 Admin, O=redhat"
CLONE_CA2_ADMIN_CERT_NICKNAME=cloneca2admincert
CLONE_CA2_ADMIN_IMPORT_CERT=False
CLONE_CA2_DS_HOSTNAME=localhost
+CLONE_CA2_INSTANCE_CREATED_STATUS=False
###### End of CLONE_CA2 ########
@@ -895,6 +913,7 @@ CLONE_KRA2_DS_HOSTNAME=localhost
CLONE_KRA2_LDAP_PORT=3500
CLONE_KRA2_SECURE_CONN=False
CLONE_KRA2_REMOVE_DATA=True
+CLONE_KRA2_INSTANCE_CREATED_STATUS=False
###### End of CLONE_KRA2 params #######
@@ -912,6 +931,7 @@ CLONE_OCSP2_DS_HOSTNAME=localhost
CLONE_OCSP2_LDAP_PORT=3700
CLONE_OCSP2_SECURE_CONN=False
CLONE_OCSP2_REMOVE_DATA=True
+CLONE_OCSP2_INSTANCE_CREATED_STATUS=False
####### End of CLONE_OCSP2 params ########
##### CLONE_TKS2 params #######
@@ -924,13 +944,14 @@ CLONE_TKS2_ADMIN_EMAIL=example@redhat.com
CLONE_TKS2_ADMIN_DUAL_KEY=True
CLONE_TKS2_ADMIN_KEY_SIZE=2048
CLONE_TKS2_ADMIN_KEY_TYPE=rsa
-CLONE_TKS2_ADMIN_SUBJECT_DN="cn=PKI CLONE TKS2 ADMIN CLONE, O=redhat"
+CLONE_TKS2_ADMIN_SUBJECT_DN="cn=PKI CLONE TKS2 ADMIN CLONE, O=redhat"
CLONE_TKS2_ADMIN_CERT_NICKNAME=clonetks2admincert
CLONE_TKS2_ADMIN_PASSWORD=Secret123
CLONE_TKS2_DS_HOSTNAME=localhost
+CLONE_TKS2_INSTANCE_CREATED_STATUS=False
######## End of CLONE_TKS2 params #######
-######MS ADCS params#######
+###### Microsoft ADCS params #######
MS_ipaddr="10.13.129.103"
MS_username="CORP\\Administrator"
MS_password="Secret123"