summaryrefslogtreecommitdiffstats
path: root/tests
diff options
context:
space:
mode:
authorNiranjan Mallapadi <mrniranjan@redhat.com>2014-04-23 17:18:58 +0530
committerNiranjan Mallapadi <mrniranjan@redhat.com>2014-05-14 23:05:40 +0530
commit6cf464c3e4f90d6a87443c509b40316694b7ea77 (patch)
treedde40d297d1ee12e95d0a054eac00cdc0da8fc5e /tests
parent2ae351c99869731dfbda227ab9b19db088cb9c96 (diff)
downloadpki-6cf464c3e4f90d6a87443c509b40316694b7ea77.tar.gz
pki-6cf464c3e4f90d6a87443c509b40316694b7ea77.tar.xz
pki-6cf464c3e4f90d6a87443c509b40316694b7ea77.zip
Fix return codes in pki-cert-request-show
1. Modified script to return 1 for pki failed commands 2. For rlRun where there is no info, added messages 3. fix pki_cert_request_show-0012 where serialNumber verification was not correct. Fixed by using rlAssertEquals to verify serialNumber displayed and serial number stored in ldap 4. rename function name to have function names defined similar to user automation scripts 5. add i18n tests 6. cover as much certificate profiles possible
Diffstat (limited to 'tests')
-rwxr-xr-xtests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-request-show.sh585
1 files changed, 526 insertions, 59 deletions
diff --git a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-request-show.sh b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-request-show.sh
index e04ae1b78..ea6555ecd 100755
--- a/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-request-show.sh
+++ b/tests/dogtag/acceptance/cli-tests/pki-cert-cli/pki-cert-request-show.sh
@@ -6,7 +6,7 @@
# Description: PKI CERT CLI tests
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# The following pki cert cli commands needs to be tested:
-# pki-cert-request-submit
+# pki-cert-request-show
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#
# Author: Niranjan Mallapadi <mrniranjan@redhat.com>
@@ -38,7 +38,7 @@
. /opt/rhqa_pki/pki-cert-cli-lib.sh
. /opt/rhqa_pki/env.sh
-run_pki_cert_request_show()
+run_pki-cert-request-show-ca_tests()
{
# Creating Temporary Directory for pki cert-show
@@ -57,8 +57,10 @@ run_pki_cert_request_show()
local temp_cert_out="$TmpDir/cert-request.out"
local hex_invalid_upp_reqid=$(echo "obase=16;$invalid_requestid"|bc)
local hex_invalid_requestid=0x"${hex_invalid_upp_reqid,,}"
-
-
+ local TEMP_NSS_DB_PWD="redhat"
+ local exp="$TmpDir/expfile.out"
+ local expout="$TmpDir/exp_out"
+ local cert_info="$TmpDir/cert_info"
local temp_out="$TmpDir/cert-request-show.out"
# Config test of pki cert-request-show
@@ -66,13 +68,12 @@ run_pki_cert_request_show()
rlRun "pki cert-request-show --help > $TmpDir/cert-show.out 2>&1" 0 "pki cert-request-show --help"
rlAssertGrep "usage: cert-request-show <Request ID>" "$TmpDir/cert-show.out"
rlAssertNotGrep "Error: Unrecognized option: --help" "$TmpDir/cert-show.out"
- rlLog "FAIL :: https://engineering.redhat.com/trac/pki-tests/ticket/490"
rlPhaseEnd
# Create a Temporary NSS DB Directory and generate Certificate
rlPhaseStartSetup "Generating temporary Cert to be used pki cert-show automation Tests"
rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \"Idm User1\" \"IdmUser1\" \
- \"idmuser1@example.org\" \"Engineering\" \"Example.Inc\" "US" "--" "ret_reqstatus" "ret_requestid"" 0 "Generating Certificate Request"
+ \"idmuser1@example.org\" \"Engineering\" \"Example.Inc\" "US" "--" "ret_reqstatus" "ret_requestid"" 0 "Generating Certificate Request"
rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
--action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
@@ -80,9 +81,8 @@ run_pki_cert_request_show()
local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
rlPhaseEnd
-
# pki cert-request-show <valid requestId(decimal)
- rlPhaseStartTest "pki_cert_request_show-001: pki cert-request-show < valid requestid > should show Certificate Request Details"
+ rlPhaseStartTest "pki_cert_request_show-001: pki cert-request-show <valid requestid> should show certificate request details"
rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
rlAssertGrep "Type: enrollment" "$temp_out"
@@ -90,9 +90,9 @@ run_pki_cert_request_show()
rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
rlPhaseEnd
-
+
# pki cert-request-show <valid requestid(hexadecimal)>
- rlPhaseStartTest "pki_cert_request_show-002: pki cert-request-show <valid requestid(hexadecimal)> should Show Certificate Request details"
+ rlPhaseStartTest "pki_cert_request_show-002: pki cert-request-show <valid requestid> should show certificate request details"
rlRun "pki cert-request-show $hex_valid_requestid > $temp_out" 0 "Executing pki cert-request-show $hex_valid_reqid"
rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
rlAssertGrep "Type: enrollment" "$temp_out"
@@ -100,33 +100,153 @@ run_pki_cert_request_show()
rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
rlPhaseEnd
+
+ # pki cert-request-show <valid renewal_requestid>
+ rlPhaseStartTest "pki_cert_request_show-003: pki cert-request-show should show request details of approved renewal requests"
+ local profile=caUserCert
+ rlLog "Generate cert with validity period of 1 Day"
+ rlRun "generate_modified_cert validity_period:\"1 Day\" tmp_nss_db:$TEMP_NSS_DB tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \
+ req_type:pkcs10 algo:rsa key_size:2048 subject_cn:\"Foo User1\" uid:FooUser1 email:FooUser1@example.org \
+ ou:Foo_Example_IT org:Foobar.Org country:US archive:false host:$(hostname) port:8080 \
+ profile:$profile cert_db:$CERTDB_DIR cert_db_pwd:$CERTDB_DIR_PASSWORD admin_nick:\"$CA_agentV_user\" \
+ cert_info:$cert_info expect_data:$exp"
+ local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2)
+ rlRun "pki cert-request-profile-show caManualRenewal --output $TmpDir/$cert_serialNumber-renewal.xml" 0 "Get caManualRenewal profile xml"
+ local STRIP_HEX=$(echo $cert_serialNumber | cut -dx -f2)
+ local CONV_UPP_VAL=${STRIP_HEX^^}
+ local decimal_valid_serialNumber=$(echo "ibase=16;$CONV_UPP_VAL"|bc)
+ rlLog "Modify caManualRenewal profile xml to add serial Number $cert_serialNumber to be submitted for renewal"
+ rlRun "xmlstarlet ed -L -u \"CertEnrollmentRequest/SerialNumber\" -v $decimal_valid_serialNumber $TmpDir/$cert_serialNumber-renewal.xml"
+ rlRun "pki cert-request-submit $TmpDir/$cert_serialNumber-renewal.xml 1> $TmpDir/pki-cert-request-submit.out" 0 "Submit renewal request"
+ local REQUEST_ID=$(cat $TmpDir/pki-cert-request-submit.out | grep "Request ID" | awk -F ": " '{print $2}')
+ rlAssertGrep "Request ID: $REQUEST_ID" "$TmpDir/pki-cert-request-submit.out"
+ local REQUEST_SUBMIT_STATUS=$(cat $TmpDir/pki-cert-request-submit.out | grep "Operation Result" | awk -F ": " '{print $2}')
+ rlAssertGrep "Type: renewal" "$TmpDir/pki-cert-request-submit.out"
+ rlAssertGrep "Operation Result: success" "$TmpDir/pki-cert-request-submit.out"
+ rlRun "pki cert-request-show $REQUEST_ID > $temp_out" 0 "View a renewal request"
+ rlAssertGrep "Certificate request \"$REQUEST_ID\"" "$temp_out"
+ rlAssertGrep "Type: renewal" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlRun "pki -d $CERTDB_DIR \
+ -c $CERTDB_DIR_PASSWORD \
+ -n \"$CA_agentV_user\" \
+ ca-cert-request-review $REQUEST_ID \
+ --action approve 1> $TmpDir/$REQUEST_ID-pkcs10-approve-out" 0 "As $CA_agentV_user Approve certificate request $REQUEST_ID"
+ rlAssertGrep "Approved certificate request $REQUEST_ID" "$TmpDir/$REQUEST_ID-pkcs10-approve-out"
+ rlRun "pki cert-request-show $REQUEST_ID > $temp_out" 0 "View a renewal request"
+ rlAssertGrep "Certificate request \"$REQUEST_ID\"" "$temp_out"
+ rlAssertGrep "Type: renewal" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlPhaseEnd
+
+ # pki cert-request-show <valid renewal_requestid>
+ rlPhaseStartTest "pki_cert_request_show-004: pki cert-request-show should show request details of rejected renewal requests"
+ local profile=caUserCert
+ rlLog "Generate cert with validity period of 1 Day"
+ rlRun "generate_modified_cert validity_period:\"1 Day\" tmp_nss_db:$TEMP_NSS_DB tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \
+ req_type:pkcs10 algo:rsa key_size:2048 subject_cn:\"Foo User2\" uid:FooUser2 email:FooUser2@example.org \
+ ou:Foo_Example_IT org:Foobar.Org country:US archive:false host:$(hostname) port:8080 \
+ profile:$profile cert_db:$CERTDB_DIR cert_db_pwd:$CERTDB_DIR_PASSWORD admin_nick:\"$CA_agentV_user\" \
+ cert_info:$cert_info expect_data:$exp"
+ local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2)
+ rlRun "pki cert-request-profile-show caManualRenewal --output $TmpDir/$cert_serialNumber-renewal.xml" 0 "Get caManualRenewal profile xml"
+ local STRIP_HEX=$(echo $cert_serialNumber | cut -dx -f2)
+ local CONV_UPP_VAL=${STRIP_HEX^^}
+ local decimal_valid_serialNumber=$(echo "ibase=16;$CONV_UPP_VAL"|bc)
+ rlLog "Modify caManualRenewal profile xml to add serial Number $cert_serialNumber to be submitted for renewal"
+ rlRun "xmlstarlet ed -L -u \"CertEnrollmentRequest/SerialNumber\" -v $decimal_valid_serialNumber $TmpDir/$cert_serialNumber-renewal.xml"
+ rlRun "pki cert-request-submit $TmpDir/$cert_serialNumber-renewal.xml 1> $TmpDir/pki-cert-request-submit.out" 0 "Submit renewal request"
+ local REQUEST_ID=$(cat $TmpDir/pki-cert-request-submit.out | grep "Request ID" | awk -F ": " '{print $2}')
+ rlAssertGrep "Request ID: $REQUEST_ID" "$TmpDir/pki-cert-request-submit.out"
+ local REQUEST_SUBMIT_STATUS=$(cat $TmpDir/pki-cert-request-submit.out | grep "Operation Result" | awk -F ": " '{print $2}')
+ rlAssertGrep "Type: renewal" "$TmpDir/pki-cert-request-submit.out"
+ rlAssertGrep "Operation Result: success" "$TmpDir/pki-cert-request-submit.out"
+ rlRun "pki cert-request-show $REQUEST_ID > $temp_out" 0 "View a renewal request"
+ rlAssertGrep "Certificate request \"$REQUEST_ID\"" "$temp_out"
+ rlAssertGrep "Type: renewal" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlRun "pki -d $CERTDB_DIR \
+ -c $CERTDB_DIR_PASSWORD \
+ -n \"$CA_agentV_user\" \
+ ca-cert-request-review $REQUEST_ID \
+ --action reject 1> $TmpDir/$REQUEST_ID-pkcs10-approve-out" 0 "As $CA_agentV_user Approve certificate request $REQUEST_ID"
+ rlAssertGrep "Rejected certificate request $REQUEST_ID" "$TmpDir/$REQUEST_ID-pkcs10-approve-out"
+ rlRun "pki cert-request-show $REQUEST_ID > $temp_out" 0 "View a renewal request"
+ rlAssertGrep "Certificate request \"$REQUEST_ID\"" "$temp_out"
+ rlAssertGrep "Type: renewal" "$temp_out"
+ rlAssertGrep "Request Status: rejected" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlPhaseEnd
+ # pki cert-request-show <valid renewal_requestid>
+ rlPhaseStartTest "pki_cert_request_show-005: pki cert-request-show should show request details of canceled renewal requests"
+ local profile=caUserCert
+ rlLog "Generate cert with validity period of 1 Day"
+ rlRun "generate_modified_cert validity_period:\"1 Day\" tmp_nss_db:$TEMP_NSS_DB tmp_nss_db_pwd:$TEMP_NSS_DB_PWD \
+ req_type:pkcs10 algo:rsa key_size:2048 subject_cn:\"Foo User3\" uid:FooUser3 email:FooUser3@example.org \
+ ou:Foo_Example_IT org:Foobar.Org country:US archive:false host:$(hostname) port:8080 \
+ profile:$profile cert_db:$CERTDB_DIR cert_db_pwd:$CERTDB_DIR_PASSWORD admin_nick:\"$CA_agentV_user\" \
+ cert_info:$cert_info expect_data:$exp"
+ local cert_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2)
+ rlRun "pki cert-request-profile-show caManualRenewal --output $TmpDir/$cert_serialNumber-renewal.xml" 0 "Get caManualRenewal profile xml"
+ local STRIP_HEX=$(echo $cert_serialNumber | cut -dx -f2)
+ local CONV_UPP_VAL=${STRIP_HEX^^}
+ local decimal_valid_serialNumber=$(echo "ibase=16;$CONV_UPP_VAL"|bc)
+ rlLog "Modify caManualRenewal profile xml to add serial Number $cert_serialNumber to be submitted for renewal"
+ rlRun "xmlstarlet ed -L -u \"CertEnrollmentRequest/SerialNumber\" -v $decimal_valid_serialNumber $TmpDir/$cert_serialNumber-renewal.xml"
+ rlRun "pki cert-request-submit $TmpDir/$cert_serialNumber-renewal.xml 1> $TmpDir/pki-cert-request-submit.out" 0 "Submit renewal request"
+ local REQUEST_ID=$(cat $TmpDir/pki-cert-request-submit.out | grep "Request ID" | awk -F ": " '{print $2}')
+ rlAssertGrep "Request ID: $REQUEST_ID" "$TmpDir/pki-cert-request-submit.out"
+ local REQUEST_SUBMIT_STATUS=$(cat $TmpDir/pki-cert-request-submit.out | grep "Operation Result" | awk -F ": " '{print $2}')
+ rlAssertGrep "Type: renewal" "$TmpDir/pki-cert-request-submit.out"
+ rlAssertGrep "Operation Result: success" "$TmpDir/pki-cert-request-submit.out"
+ rlRun "pki cert-request-show $REQUEST_ID > $temp_out" 0 "View a renewal request"
+ rlAssertGrep "Certificate request \"$REQUEST_ID\"" "$temp_out"
+ rlAssertGrep "Type: renewal" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlRun "pki -d $CERTDB_DIR \
+ -c $CERTDB_DIR_PASSWORD \
+ -n \"$CA_agentV_user\" \
+ ca-cert-request-review $REQUEST_ID \
+ --action cancel 1> $TmpDir/$REQUEST_ID-pkcs10-approve-out" 0 "As $CA_agentV_user Approve certificate request $REQUEST_ID"
+ rlAssertGrep "Canceled certificate request $REQUEST_ID" "$TmpDir/$REQUEST_ID-pkcs10-approve-out"
+ rlRun "pki cert-request-show $REQUEST_ID > $temp_out" 0 "View a renewal request"
+ rlAssertGrep "Certificate request \"$REQUEST_ID\"" "$temp_out"
+ rlAssertGrep "Type: renewal" "$temp_out"
+ rlAssertGrep "Request Status: canceled" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlPhaseEnd
+
# pki cert-request-show <invalid requestid(decimal)>
- rlPhaseStartTest "pki_cert_request_show-003: pki cert-request-show <invalid requestid(decimal)> Should fail to display any Request details"
- rlRun "pki cert-request-show $invalid_requestid 2> $temp_out" 0 "Executing pki cert-request-show $invalid_requestid"
+ rlPhaseStartTest "pki_cert_request_show-006: pki cert-request-show <invalid requestid(decimal)> should fail to display any request details"
+ rlRun "pki cert-request-show $invalid_requestid 2> $temp_out" 1,255 "Executing pki cert-request-show $invalid_requestid"
rlAssertGrep "RequestNotFoundException: Request ID $hex_invalid_requestid not found" "$temp_out"
rlPhaseEnd
-
+
#pki cert-request-show <invalid requestid(hexadecimal)>
- rlPhaseStartTest "pki_cert_request_show-004: pki cert-request-show <invalid requestid(hexadecimal)> Should fail to display any Request details"
- rlRun "pki cert-request-show $hex_invalid_requestid 2> $temp_out" 0 "Executing pki cert-request-show $hex_invalid_requestid"
+ rlPhaseStartTest "pki_cert_request_show-007: pki cert-request-show <invalid requestid> should fail to display any request details"
+ rlRun "pki cert-request-show $hex_invalid_requestid 2> $temp_out" 1,255 "Executing pki cert-request-show $hex_invalid_requestid"
rlAssertGrep "RequestNotFoundException: Request ID $hex_invalid_requestid not found" "$temp_out"
rlPhaseEnd
#pki cert-request-show <junk chracters>
- rlPhaseStartTest "pki_cert_request_show-005: pki cert-request-show <Junk Characters(decimal)> Should fail to display any Request details"
+ rlPhaseStartTest "pki_cert_request_show-008: pki cert-request-show <Junk Characters(decimal)> should fail to display any request details"
rlLog "Executing pki cert-request-show \"$junk_requestid~!@#$%^&*()_+|\""
- rlRun "pki cert-request-show \"$junk_requestid~\!@#$%^&*\(\)_+|\" 2> $temp_out" 0
+ rlRun "pki cert-request-show \"$junk_requestid~\!@#$%^&*\(\)_+|\" 2> $temp_out" 1,255
rlAssertGrep "Error: Invalid certificate request ID" "$temp_out"
rlPhaseEnd
#Pki cert-request-show Verify rejected Request Id is displayed correctly
- rlPhaseStartTest "pki_cert_request_show-006: Verify rejected RequestId's status is displayed as Rejected"
+ rlPhaseStartTest "pki_cert_request_show-009: Verify rejected RequestId's status is displayed as Rejected"
rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \
- \"Idm User2\" \"IdmUser2\" \"idmuser2@example.org\" \"MCP Division\" \"Example Org\" "US" "--" "ret_reqstatus" "ret_requestid"" \
- 0 "Request a New Certificate Request"
- rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" \
- ca-cert-request-review $ret_requestid --action reject 1> $temp_cert_out" 0 "As $CA_AgentV_user Reject Certificate request"
+ \"Idm User2\" \"IdmUser2\" \"idmuser2@example.org\" \"MCP Division\" \"Example Org\" \
+ "US" "--" "ret_reqstatus" "ret_requestid"" 0 "Request a New Certificate Request"
+ rlRun "pki -d $CERTDB_DIR \
+ -c $CERTDB_DIR_PASSWORD \
+ -n \"$CA_agentV_user\" \
+ ca-cert-request-review $ret_requestid \
+ --action reject 1> $temp_cert_out" 0 "As $CA_AgentV_user Reject Certificate request"
rlAssertGrep "Rejected certificate request $ret_requestid" "$temp_cert_out"
rlRun "pki cert-request-show $ret_requestid 1> $temp_out" 0 "Executing pki cert-request-show $ret_requestid"
rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
@@ -137,13 +257,14 @@ run_pki_cert_request_show()
rlPhaseEnd
#Pki cert-request-show Verify canceled Request Id is displayed correctly
-
- rlPhaseStartTest "pki_cert_request_show-007: Verify canceled RequestId's status is displayed as canceled"
+ rlPhaseStartTest "pki_cert_request_show-0010: Verify canceled RequestId's status is displayed as canceled"
rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \
- \"Idm User3\" \"IdmUser3\" \"idmuser3@example.org\" \"MAP Division\" \"Example Org\" "US" "--" "ret_reqstatus" "ret_requestid"" \
- 0 "Request for new certificate request"
- rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD \
- -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid --action cancel 1> $temp_cert_out" 0 "As $CA_agentV_user Cancel $ret_requestid"
+ \"Idm User3\" \"IdmUser3\" \"idmuser3@example.org\" \"MAP Division\" \"Example Org\" \
+ "US" "--" "ret_reqstatus" "ret_requestid"" 0 "Request for new certificate request"
+ rlRun "pki -d $CERTDB_DIR \
+ -c $CERTDB_DIR_PASSWORD \
+ -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action cancel 1> $temp_cert_out" 0 "As $CA_agentV_user Cancel $ret_requestid"
rlAssertGrep "Canceled certificate request $ret_requestid" "$temp_cert_out"
rlRun "pki cert-request-show $ret_requestid 1> $temp_out" 0 "Executing pki cert-request-show $ret_requestid"
rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
@@ -154,12 +275,14 @@ run_pki_cert_request_show()
rlPhaseEnd
#Pki cert-request-show Verify Updated Request Id is displayed as pending
- rlPhaseStartTest "pki_cert_request_show-008: Verify updated RequestID's status is displayed as pending"
+ rlPhaseStartTest "pki_cert_request_show-0011: Verify updated RequestID's status is displayed as pending"
rlRun "create_cert_request $TEMP_NSS_DB redhat crmf rsa 2048 \
- \"Idm User4\" \"IdmUser4\" \"idmuser4@example.org\" \"MAP Division\" \"Example Org\" "US" "--" "ret_reqstatus" "ret_requestid"" \
- 0 "Request for new certificate request"
- rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD \
- -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid --action update 1> $temp_cert_out" 0 "As $CA_agentV_user update $ret_requestid"
+ \"Idm User4\" \"IdmUser4\" \"idmuser4@example.org\" \"MAP Division\" \"Example Org\" \
+ "US" "--" "ret_reqstatus" "ret_requestid"" 0 "Request for new certificate request"
+ rlRun "pki -d $CERTDB_DIR \
+ -c $CERTDB_DIR_PASSWORD \
+ -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action update 1> $temp_cert_out" 0 "As $CA_agentV_user update $ret_requestid"
rlAssertGrep "Updated certificate request $ret_requestid" "$temp_cert_out"
rlRun "pki cert-request-show $ret_requestid 1> $temp_out" 0 "Executing pki cert-request-show $ret_requestid"
rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
@@ -170,9 +293,11 @@ run_pki_cert_request_show()
rlPhaseEnd
#Pki cert-request-show Assign a Request Id & Verify request status is displayed as pending
- rlPhaseStartTest "pki_cert_request_show-009: Assign a Pending Request & Verify Assigned RequestID's status is displayed as pending"
- rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD \
- -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid --action assign 1> $temp_cert_out" 0 "As $CA_agentV_user Assign $ret_requestid"
+ rlPhaseStartTest "pki_cert_request_show-0012: Assign a Pending Request & Verify Assigned RequestID's status is displayed as pending"
+ rlRun "pki -d $CERTDB_DIR \
+ -c $CERTDB_DIR_PASSWORD \
+ -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action assign 1> $temp_cert_out" 0 "As $CA_agentV_user Assign $ret_requestid"
rlAssertGrep "Assigned certificate request $ret_requestid" "$temp_cert_out"
rlRun "pki cert-request-show $ret_requestid 1> $temp_out" 0 "Executing pki cert-request-show $ret_requestid"
rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
@@ -183,9 +308,11 @@ run_pki_cert_request_show()
rlPhaseEnd
#Pki cert-request-show Un-Assign a Pending Request & Verify request status is displayed as pending
- rlPhaseStartTest "pki_cert_request_show-0010: Assign a Pending Request & Verify Assigned RequestID's status is displayed as pending"
- rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD \
- -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid --action unassign 1> $temp_cert_out" 0 "As $CA_agentV_user Un-Assign $ret_requestid"
+ rlPhaseStartTest "pki_cert_request_show-0013: Un-Assign a Pending Request & Verify RequestID's status is displayed as pending"
+ rlRun "pki -d $CERTDB_DIR \
+ -c $CERTDB_DIR_PASSWORD \
+ -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action unassign 1> $temp_cert_out" 0 "As $CA_agentV_user Un-Assign $ret_requestid"
rlAssertGrep "Unassigned certificate request $ret_requestid" "$temp_cert_out"
rlRun "pki cert-request-show $ret_requestid 1> $temp_out" 0 "Executing pki cert-request-show $ret_requestid"
rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
@@ -196,9 +323,10 @@ run_pki_cert_request_show()
rlPhaseEnd
#pki cert-request-show Validate a pending request & verify request status is displayed as pending
- rlPhaseStartTest "pki_cert_request_show-0011: Validate a Pending Request & Verify Modified RequestID's status is displayed as pending"
- rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \
- \"$CA_agentV_user\" ca-cert-request-review $ret_requestid --action validate 1> $temp_cert_out" 0 "As $CA_agentV_user Validate $ret_requestid"
+ rlPhaseStartTest "pki_cert_request_show-0014: Validate a Pending Request & Verify Modified RequestID's status is displayed as pending"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD \
+ -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action validate 1> $temp_cert_out" 0 "As $CA_agentV_user Validate $ret_requestid"
rlAssertGrep "Validated certificate request $ret_requestid" "$temp_cert_out"
rlLog "Executing pki cert-request-show $ret_requestid"
rlRun "pki cert-request-show $ret_requestid 1> $temp_out" 0
@@ -208,29 +336,368 @@ run_pki_cert_request_show()
rlAssertGrep "Request Status: pending" "$temp_out"
rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
rlPhaseEnd
-
+
#pki cert-request-show Verify SerialNumber Displayed matches with SerialNumber assigned to Approved request
- rlPhaseStartTest "pki_cert_request_show-0012: Verify serialNumber displayed matches with serialNumber assigned to Approved request"
+ rlPhaseStartTest "pki_cert_request_show-0015: Verify serialNumber displayed matches with serialNumber assigned to Approved request"
rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \
- \"Idm User8\" \"IdmUser8\" \"idmuser8@example.org\" \"MNP Division\" \"Example Org\" "US" "--" "ret_reqstatus" "ret_requestid"" \
- 0 "Request for new certificate request"
- rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \
- \"$CA_agentV_user\" ca-cert-request-review $ret_requestid --action approve 1> $TmpDir/pki-approve-out" 0 "As $CA_agentV_user Approve the request"
+ \"Idm User8\" \"IdmUser8\" \"idmuser8@example.org\" \"MNP Division\" \"Example Org\" \
+ "US" "--" "ret_reqstatus" "ret_requestid"" 0 "Request for new certificate request"
+ rlRun "pki -d $CERTDB_DIR \
+ -c $CERTDB_DIR_PASSWORD \
+ -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "As $CA_agentV_user Approve the request"
rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
- local valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)
+ local valid_serialNumber=$(pki cert-request-show $ret_requestid | grep "Certificate ID" | sed 's/ //g' | cut -d: -f2)
+ local strip_hex_serialNo=$(echo $valid_serialNumber | cut -dx -f2)
+ local conv_upp_sno=${strip_hex_serialNo^^}
rlLog "Serial Number Displayed by pki cert-request-show $ret_requestid is $valid_serialNumber"
- rlLog "Run ldapsearch against CA Database to get the serial Number assigned to the approve Request $ret_requestid"
- local sno=$(ldapsearch -x -LLL -b \
- \"ou=certificateRepository,ou=ca,O=pki-tomcat-CA\" \
- -D \"$LDAP_ROOTDN\" -w $LDAP_ROOTDNPWD \
- -h $(hostname) -p $CA_LDAP_PORT \"(metainfo=requestID:$ret_requestid)\" cn | grep -v dn | awk -F ": " '{print $2}')
- if [ "$sno" == $(echo "ibase=10;$valid_serialNumber"|bc) ]; then
- rlLog "SerialNumber Matches with serialNumber assigned to Approved Request"
- else
- rlLog "FAIL :: SerialNumber displayed doesn't match with serialNumber assigned to Approved Request"
- fi
+ rlLog "Get the serial Number assigned to the approve Request $ret_requestid using ldapsearch"
+ local sno=$(ldapsearch -x -LLL \
+ -b "ou=certificateRepository,ou=ca,O=pki-tomcat-CA" \
+ -D "$LDAP_ROOTDN" -w $LDAP_ROOTDNPWD -h $(hostname) \
+ -p $CA_LDAP_PORT "(metainfo=requestID:$ret_requestid)" cn | grep -v dn | awk -F ": " '{print $2}')
+ local assigned_sno=$(echo "ibase=16;$conv_upp_sno"|bc)
+ rlLog "assigned_sno=$assigned_sno"
+ rlAssertEquals "Verify Displayed serialNumber Matches with serialNumber assigned to Approved Request" "$sno" "$assigned_sno"
rlPhaseEnd
+
+ rlPhaseStartTest "pki_cert_request_show-0016: Test-1 pki cert-request-show should show Certificate Request Details with i18n characters"
+ rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \"Örjan Äke\" \"Örjan Äke\" \
+ \"test@example.org\" \"Engineering\" \"Example.Inc\" "US" "caUserCert" "ret_reqstatus" "ret_requestid"" 0 "Generating Certificate Request"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_cert_request_show-0017: Test-2 pki cert-request-show should show Certificate Request Details with i18n characters"
+ rlRun "create_cert_request $TEMP_NSS_DB redhat crmf rsa 2048 \"Éric Têko\" \"EricTeko\" \
+ "test@example.org" "Engineering" "Example.Inc" "US" "caDualCert" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generate cert request with i18n characters"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_cert_request_show-0018: Test-3 pki cert-request-show should show Certificate Request Details with i18n characters"
+ rlRun "create_cert_request $TEMP_NSS_DB redhat crmf rsa 2048 \"éénentwintig dvidešimt\" \"éénentwintig dvidešimt\" \
+ \"test@example.org\" \"Engineering\" \"Example.Inc\" "US" "caUserSMIMEcapCert" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generating Certificate Request"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_cert_request_show-0019: Test-4 pki cert-request-show should show Certificate Request Details with i18n characters"
+ rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \"kakskümmendüks.ÉricTêko.Têk\" \" \" \
+ \"test@example.org\" \"Engineering\" \"Example.Inc\" "US" "caServerCert" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generating Certificate Request"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_cert_request_show-0020: Test-5 pki cert-request-show should show Certificate Request Details with i18n characters"
+ rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \"двадцять один тридцять\" \"двадцять один тридцять\" \
+ \"test@example.org\" \"Engineering\" \"Example.Inc\" "US" "caUserCert" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generating Certificate Request"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_cert_request_show-0021: verify pki cert-request shows certificate request created for profile caUserSMIMEcapCert"
+ local profile=caUserSMIMEcapCert
+ rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \"Idm User1\" "IdmUser1" \
+ \"idmuser1@example.org\" \"Engineering\" \"Example.Inc\" "US" "$profile" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generating Certificate Request for profile $profile"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_cert_request_show-0022: verify pki cert-request shows certificate request created for profile caDualCert"
+ local profile=caDualCert
+ rlRun "create_cert_request $TEMP_NSS_DB redhat crmf rsa 2048 \"Idm User1\" "IdmUser1" \
+ \"idmuser1@example.org\" \"Engineering\" \"Example.Inc\" "US" "$profile" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generating Certificate Request for profile $profile"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+ rlPhaseStartTest "pki_cert_request_show-0023: verify pki cert-request shows certificate request created for profile caSignedLogCert"
+ local profile=caSignedLogCert
+ rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \"FooBar Audit Signing Certificate\" \" \" \
+ \" \" \"Engineering\" \"Example.Inc\" "US" "$profile" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generating Certificate Request for profile $profile"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_cert_request_show-0024: verify pki cert-request shows certificate request created for profile caServerCert"
+ local profile=caServerCert
+ rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \"FooBarServer1.example.org\" \" \" \
+ \" \" \"Engineering\" \"Example.Inc\" "US" "$profile" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generating Certificate Request for profile $profile"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_cert_request_show-0025: verify pki cert-request shows certificate request created for profile caTPSCert"
+ local profile=caTPSCert
+ rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \"FooBarServer2.example.org\" \" \" \
+ \" \" \"Engineering\" \"Example.Inc\" "US" "$profile" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generating Certificate Request for profile $profile"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_cert_request_show-0026: verify pki cert-request shows certificate request created for profile caTPSCert"
+ local profile=caTPSCert
+ rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \"FooBarServer2.example.org\" \" \" \
+ \" \" \"Engineering\" \"Example.Inc\" "US" "$profile" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generating Certificate Request for profile $profile"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_cert_request_show-0027: verify pki cert-request shows certificate request created for profile caSubsystemCert"
+ local profile=caSubsystemCert
+ rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \"ExampleCA Subsystem\" \" \" \
+ \" \" \"Engineering\" \"Example.Inc\" "US" "$profile" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generating Certificate Request for profile $profile"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_cert_request_show-0028: verify pki cert-request shows certificate request created for profile caOtherCert"
+ local profile=caOtherCert
+ rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \"fooserver1.example.org\" \" \" \
+ \" \" \"Engineering\" \"Example.Inc\" "US" "$profile" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generating Certificate Request for profile $profile"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_cert_request_show-0029: verify pki cert-request shows certificate request created for profile caCACert"
+ local profile=caCACert
+ rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \"Example CA Certificate Authority\" \" \" \
+ \" \" \"Engineering\" \"Example.Inc\" "US" "$profile" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generating Certificate Request for profile $profile"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
+
+ rlPhaseStartTest "pki_cert_request_show-0030: verify pki cert-request shows certificate request created for profile caCrossSignedCACert"
+ local profile=caCrossSignedCACert
+ rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \"Example CA Cross Signed Certificate Manager\" \" \" \
+ \" \" \"Engineering\" \"Example.Inc\" "US" "$profile" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generating Certificate Request for profile $profile"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_cert_request_show-0031: verify pki cert-request shows certificate request created for profile caRACert"
+ local profile=caRACert
+ rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \"Example RA Authority\" \" \" \
+ \" \" \"Engineering\" \"Example.Inc\" "US" "$profile" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generating Certificate Request for profile $profile"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_cert_request_show-0032: verify pki cert-request shows certificate request created for profile caOCSPCert"
+ local profile=caOCSPCert
+ rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \"Example OCSP Manager Signing Certificate\" \" \" \
+ \" \" \"Engineering\" \"Example.Inc\" "US" "$profile" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generating Certificate Request for profile $profile"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_cert_request_show-0033: verify pki cert-request shows certificate request created for profile caStorageCert"
+ local profile=caStorageCert
+ rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \"Example Data Recovery Manager Storage Certificate\" \" \" \
+ \" \" \"Engineering\" \"Example.Inc\" "US" "$profile" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generating Certificate Request for profile $profile"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_cert_request_show-0034: verify pki cert-request shows certificate request created for profile caTransportCert"
+ local profile=caTransportCert
+ rlRun "create_cert_request $TEMP_NSS_DB redhat pkcs10 rsa 2048 \"Example Data Recovery Manager Transport Certificate\" \" \" \
+ \" \" \"Engineering\" \"Example.Inc\" "US" "$profile" "ret_reqstatus" \
+ "ret_requestid"" 0 "Generating Certificate Request for profile $profile"
+ rlRun "pki -d $CERTDB_DIR -c $CERTDB_DIR_PASSWORD -n \"$CA_agentV_user\" ca-cert-request-review $ret_requestid \
+ --action approve 1> $TmpDir/pki-approve-out" 0 "Approve Certificate requeset"
+ rlAssertGrep "Approved certificate request $ret_requestid" "$TmpDir/pki-approve-out"
+ rlRun "valid_serialNumber=$(pki cert-request-show $ret_requestid | grep \"Certificate ID\" | sed 's/ //g' | cut -d: -f2)"
+ local hex_valid_requestid=0x$(echo "obase=16;$ret_requestid"|bc)
+ rlRun "pki cert-request-show $ret_requestid > $temp_out" 0 "command pki cert-request-show $requestid"
+ rlAssertGrep "Certificate request \"$ret_requestid\"" "$temp_out"
+ rlAssertGrep "Type: enrollment" "$temp_out"
+ rlAssertGrep "Request Status: complete" "$temp_out"
+ rlAssertGrep "Operation Result: $ret_reqstatus" "$temp_out"
+ rlAssertGrep "Certificate ID: $valid_serialNumber" "$temp_out"
+ rlPhaseEnd
+
rlPhaseStartCleanup "pki cert-request-show cleanup: Delete temp dir"
rlRun "popd"
rlRun "rm -r $TmpDir" 0 "Removing tmp directory"