summaryrefslogtreecommitdiffstats
path: root/tests/dogtag/acceptance/legacy/subca-tests/crls/subca-ag-crls.sh
diff options
context:
space:
mode:
Diffstat (limited to 'tests/dogtag/acceptance/legacy/subca-tests/crls/subca-ag-crls.sh')
-rwxr-xr-xtests/dogtag/acceptance/legacy/subca-tests/crls/subca-ag-crls.sh306
1 files changed, 306 insertions, 0 deletions
diff --git a/tests/dogtag/acceptance/legacy/subca-tests/crls/subca-ag-crls.sh b/tests/dogtag/acceptance/legacy/subca-tests/crls/subca-ag-crls.sh
new file mode 100755
index 000000000..6a06ec48f
--- /dev/null
+++ b/tests/dogtag/acceptance/legacy/subca-tests/crls/subca-ag-crls.sh
@@ -0,0 +1,306 @@
+#!/bin/bash
+# vim: dict=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k
+# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+#
+# runtest.sh of /CoreOS/rhcs/acceptance/legacy/subca-tests/crls/subca-ag-crls.sh
+# Description: SUBCA Agent CRL tests
+# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+#
+# Author: Roshni Pattath <rpattath@redhat.com>
+#
+# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+#
+# Copyright (c) 2013 Red Hat, Inc. All rights reserved.
+#
+# This copyrighted material is made available to anyone wishing
+# to use, modify, copy, or redistribute it subject to the terms
+# and conditions of the GNU General Public License version 2.
+#
+# This program is distributed in the hope that it will be
+# useful, but WITHOUT ANY WARRANTY; without even the implied
+# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
+# PURPOSE. See the GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public
+# License along with this program; if not, write to the Free
+# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+# Boston, MA 02110-1301, USA.
+#
+# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+# Include rhts environment
+. /usr/bin/rhts-environment.sh
+. /usr/share/beakerlib/beakerlib.sh
+. /opt/rhqa_pki/rhcs-shared.sh
+. /opt/rhqa_pki/pki-cert-cli-lib.sh
+. /opt/rhqa_pki/env.sh
+. /opt/rhqa_pki/pki-auth-plugin-lib.sh
+
+run_agent-subca-crls_tests()
+{
+ local cs_Type=$1
+ local cs_Role=$2
+
+ # Creating Temporary Directory for ca-agent-crls tests
+ rlPhaseStartSetup "pki_console_internaldb Temporary Directory"
+ rlRun "TmpDir=\`mktemp -d\`" 0 "Creating tmp directory"
+ rlRun "pushd $TmpDir"
+ rlPhaseEnd
+
+ # Local Variables
+ get_topo_stack $cs_Role $TmpDir/topo_file
+ if [ $cs_Role="MASTER" ]; then
+ SUBCA_INST=$(cat $TmpDir/topo_file | grep MY_SUBCA | cut -d= -f2)
+ elif [ $cs_Role="SUBCA2" || $cs_Role="SUBCA1" ]; then
+ SUBCA_INST=$(cat $TmpDir/topo_file | grep MY_CA | cut -d= -f2)
+ fi
+ local target_unsecure_port=$(eval echo \$${SUBCA_INST}_UNSECURE_PORT)
+ local target_secure_port=$(eval echo \$${SUBCA_INST}_SECURE_PORT)
+ local tmp_ca_agent=$SUBCA_INST\_agentV
+ local tmp_ca_admin=$SUBCA_INST\_adminV
+ local tmp_ca_port=$(eval echo \$${SUBCA_INST}_UNSECURE_PORT)
+ local tmp_ca_host=$(eval echo \$${cs_Role})
+ local valid_agent_cert=$SUBCA_INST\_agentV
+ local valid_admin_cert=$SUBCA_INST\_adminV
+ local cert_find_info="$TmpDir/cert_find_info"
+ local TEMP_NSS_DB="$TmpDir/nssdb"
+ local TEMP_NSS_DB_PWD="redhat"
+ local cert_info="$TmpDir/cert_info"
+ local SSL_DIR=$CERTDB_DIR
+ local valid_admin_user=$SUBCA_INST\_adminV
+ local valid_admin_user_password=$SUBCA_INST\_adminV_password
+
+ rlPhaseStartTest "pki_subca_agent_display_crl_entire_crl-001:SUBCA - Agent Interface - Display Master CRL with entire CRL display type"
+ local test_out="$TmpDir/admin_out_displaycrl_entireCRL"
+ header_001="$TmpDir/subca_crls_001.txt"
+ crl_ip="MasterCRL"
+ crl_display_type="entireCRL"
+ rlLog "Display Master CRL with entire CRL display type"
+ rlRun "export SSL_DIR=$CERTDB_DIR"
+ rlRun "curl --cacert $CERTDB_DIR/ca_cert.pem \
+ --dump-header $header_001 \
+ -E \"$valid_agent_cert:$CERTDB_DIR_PASSWORD\" \
+ -d \"pageSize=50&crlIssuingPoint=$crl_ip&pageStart=1&crlDisplayType=$crl_display_type\" \
+ https://$tmp_ca_host:$target_secure_port/ca/agent/ca/displayCRL > $test_out"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_001"
+ rlAssertGrep "header.crlIssuingPoint = \"$crl_ip\"" "$test_out"
+ rlAssertGrep "header.crlDisplayType = \"$crl_display_type\"" "$test_out"
+ rlAssertGrep "Version:" "$test_out"
+ rlAssertGrep "Signature Algorithm:" "$test_out"
+ rlAssertGrep "Issuer:" "$test_out"
+ rlAssertGrep "Signature:" "$test_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_subca_agent_display_crl_cached_crl-002:SUBCA - Agent Interface - Display a newly added CRL with cached CRL display type"
+ local test_out="$TmpDir/admin_out_displaycrl_cachedCRL"
+ header_002="$TmpDir/subca_crls_002.txt"
+ crl_ip="testcrl"
+ crl_display_type="cachedCRL"
+ rlLog "Add a new CRL issuing point"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_002 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=crlIPs&RS_ID=$crl_ip&id=$crl_ip&description=$crl_ip&enable=true&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/caadmin > $test_out" 0 "Add crl issuing point"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_002"
+ rlLog " Display a newly added CRL with cached CRL display type"
+ rlRun "curl --cacert $CERTDB_DIR/ca_cert.pem \
+ --dump-header $header_002 \
+ -E \"$valid_agent_cert:$CERTDB_DIR_PASSWORD\" \
+ -d \"pageSize=50&crlIssuingPoint=$crl_ip&pageStart=1&crlDisplayType=$crl_display_type\" \
+ https://$tmp_ca_host:$target_secure_port/ca/agent/ca/displayCRL > $test_out"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_002"
+ rlAssertGrep "header.crlIssuingPoint = \"$crl_ip\"" "$test_out"
+ rlAssertGrep "header.crlDisplayType = \"$crl_display_type\"" "$test_out"
+ rlAssertGrep "Signature Algorithm:" "$test_out"
+ rlAssertGrep "Issuer:" "$test_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_subca_agent_display_crl_crl_header-003:SUBCA - Agent Interface - Display a CRL with CRL header display type"
+ local test_out="$TmpDir/admin_out_displaycrl_CRLHeader"
+ header_003="$TmpDir/subca_crls_003.txt"
+ crl_display_type="crlHeader"
+ rlLog " Display a CRL with CRL Header display type"
+ rlRun "curl --cacert $CERTDB_DIR/ca_cert.pem \
+ --dump-header $header_003 \
+ -E \"$valid_agent_cert:$CERTDB_DIR_PASSWORD\" \
+ -d \"pageSize=50&crlIssuingPoint=$crl_ip&pageStart=1&crlDisplayType=$crl_display_type\" \
+ https://$tmp_ca_host:$target_secure_port/ca/agent/ca/displayCRL > $test_out"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_003"
+ rlAssertGrep "header.crlIssuingPoint = \"$crl_ip\"" "$test_out"
+ rlAssertGrep "header.crlDisplayType = \"$crl_display_type\"" "$test_out"
+ rlAssertGrep "Version:" "$test_out"
+ rlAssertGrep "Signature Algorithm:" "$test_out"
+ rlAssertGrep "Issuer:" "$test_out"
+ rlAssertGrep "Signature:" "$test_out"
+ rlPhaseEnd
+4
+ rlPhaseStartTest "pki_subca_agent_display_crl_base64-004:SUBCA - Agent Interface - Display a CRL with base64 encoded display type"
+ local test_out="$TmpDir/admin_out_displaycrl_base64"
+ header_004="$TmpDir/subca_crls_004.txt"
+ crl_display_type="base64Encoded"
+ rlLog " Display a CRL with base64 encoded display type"
+ rlRun "curl --cacert $CERTDB_DIR/ca_cert.pem \
+ --dump-header $header_004 \
+ -E \"$valid_agent_cert:$CERTDB_DIR_PASSWORD\" \
+ -d \"pageSize=50&crlIssuingPoint=$crl_ip&pageStart=1&crlDisplayType=$crl_display_type\" \
+ https://$tmp_ca_host:$target_secure_port/ca/agent/ca/displayCRL > $test_out"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_004"
+ rlAssertGrep "header.crlIssuingPoint = \"$crl_ip\"" "$test_out"
+ rlAssertGrep "header.crlDisplayType = \"$crl_display_type\"" "$test_out"
+ rlAssertGrep "BEGIN CERTIFICATE REVOCATION LIST" "$test_out"
+ rlAssertGrep "END CERTIFICATE REVOCATION LIST" "$test_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_subca_agent_update_crl-005:SUBCA - Agent Interface - Update CRL"
+ local test_out="$TmpDir/admin_out_updatecrl"
+ header_005="$TmpDir/subca_crls_005.txt"
+ local waitForUpdate="true"
+ local signatureAlgorithm="SHA256withRSA"
+ local crlNumber="1"
+ local crl_display_type="entireCRL"
+ rlLog " Display CRL and note the CRL number"
+ rlRun "curl --cacert $CERTDB_DIR/ca_cert.pem \
+ --dump-header $header_005 \
+ -E \"$valid_agent_cert:$CERTDB_DIR_PASSWORD\" \
+ -d \"pageSize=50&crlIssuingPoint=$crl_ip&pageStart=1&crlDisplayType=$crl_display_type\" \
+ https://$tmp_ca_host:$target_secure_port/ca/agent/ca/displayCRL > $test_out"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_005"
+ rlAssertGrep "header.crlNumber = \"$crlNumber\"" "$test_out"
+ rlLog "Update CRL"
+ rlRun "curl --cacert $CERTDB_DIR/ca_cert.pem \
+ --dump-header $header_005 \
+ -E \"$valid_agent_cert:$CERTDB_DIR_PASSWORD\" \
+ -d \"crlIssuingPoint=$crl_ip&waitForUpdate=$waitForUpdate&signatureAlgorithm=$signatureAlgorithm&\" \
+ https://$tmp_ca_host:$target_secure_port/ca/agent/ca/updateCRL > $test_out"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_005"
+ crlNumber=$((crlNumber + 1))
+ rlLog " Display CRL to verify the updated CRL number"
+ rlRun "curl --cacert $CERTDB_DIR/ca_cert.pem \
+ --dump-header $header_005 \
+ -E \"$valid_agent_cert:$CERTDB_DIR_PASSWORD\" \
+ -d \"pageSize=50&crlIssuingPoint=$crl_ip&pageStart=1&crlDisplayType=$crl_display_type\" \
+ https://$tmp_ca_host:$target_secure_port/ca/agent/ca/displayCRL > $test_out"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_005"
+ rlAssertGrep "header.crlNumber = \"$crlNumber\"" "$test_out"
+
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_005 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=crlIPs&RS_ID=$crl_ip&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/caadmin >> $test_out" 0 "Delete crl issuing point"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_005"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_subca_agent_update_ds-006:SUBCA - Agent Interface - Update DS"
+ local test_out="$TmpDir/admin_out_updateds"
+ header_006="$TmpDir/ca_crls_006.txt"
+ local dn_pattern="uid=\$subj.cn,ou=people,$(eval echo \$${SUBCA_INST}_DB_SUFFIX)"
+ local ldap_host=`hostname`
+ local ldap_port=$(eval echo \$${SUBCA_INST}_LDAP_PORT)
+ local ldap_bind=$(eval echo \$${SUBCA_INST}_LDAP_ROOTDN)
+ local ldap_bind_pwd=$(eval echo \$${SUBCA_INST}_LDAP_ROOTDNPWD)
+ local ldap_secure="false"
+ local ldap_prompt="CA LDAP Publishing"
+ local ldap_authtype="BasicAuth"
+ rlLog "Edit LDAP ca cert mapper"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_006 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_MODIFY&OP_SCOPE=mapperRules&RULENAME=LdapCaCertMap&createCAEntry=true&implName=LdapCaSimpleMap&dnPattern=$dn_pattern&RD_ID=LdapCaCertMap&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $test_out" 0 "Edit LdapCaCertMapper"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_006"
+ rlLog "Edit LDAP user cert mapper"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_006 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_MODIFY&OP_SCOPE=mapperRules&RULENAME=LdapUserCertMap&implName=LdapSimpleMap&dnPattern=$dn_pattern&RD_ID=LdapUserCertMap&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $test_out" 0 "Edit LdapUserCertMapper"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_006"
+ rlLog "Edit LDAP crl mapper"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_006 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_MODIFY&OP_SCOPE=mapperRules&RULENAME=LdapCrlMap&implName=LdapCaSimpleMap&dnPattern=$dn_pattern&RD_ID=LdapCrlMap&createCAEntry=true&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $test_out" 0 "Edit LdapCrlMapper"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_006"
+
+ rlLog "Enable Publishing with Basic Auth"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_006 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_PROCESS&OP_SCOPE=ldap&RD_ID=RD_ID_CONFIG&publishingEnable=true&enable=true&ldapconn.host=$ldap_host&ldapconn.port=$ldap_port&ldapconn.secureConn=$ldap_secure&ldapauth.bindPWPrompt=$ldap_prompt&ldapauth.bindDN=$ldap_bind&directoryManagerPwd=$ldap_bind_pwd&ldapconn.version=3&ldapauth.authtype=$ldap_authtype&ldapauth.clientCertNickname=&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $test_out" 0 "Enable Publishing with Basic Auth"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_006"
+ rlLog "Save LDAP auth config"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_006 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_MODIFY&OP_SCOPE=ldap&RD_ID=RD_ID_CONFIG&publishingEnable=true&enable=true&ldapconn.host=$ldap_host&ldapconn.port=$ldap_port&ldapconn.secureConn=$ldap_secure&ldapauth.bindPWPrompt=$ldap_prompt&ldapauth.bindDN=$ldap_bind&directoryManagerPwd=$ldap_bind_pwd&ldapconn.version=3&ldapauth.authtype=$ldap_authtype&ldapauth.clientCertNickname=&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $test_out" 0 "Save Ldap auth config"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_006"
+
+ rlLog "Generate a user cert and revoke the cert"
+ rlRun "generate_new_cert tmp_nss_db:$TEMP_NSS_DB tmp_nss_db_pwd:$TEMP_NSS_DB_PWD request_type:crmf \
+ algo:rsa key_size:2048 subject_cn:\"Test User\" subject_uid:testuser subject_email:testuser@example.org \
+ organizationalunit:Engineering organization:Example.Inc country:US archive:false req_profile:caUserCert \
+ target_host:$tmp_ca_host protocol: port:$target_unsecure_port cert_db_dir:$CERTDB_DIR cert_db_pwd:$CERTDB_DIR_PASSWORD \
+ certdb_nick:\"$valid_agent_cert\" cert_info:$cert_info"
+ local valid_crmf_serialNumber=$(cat $cert_info| grep cert_serialNumber | cut -d- -f2)
+ local valid_decimal_crmf_serialNumber=$(cat $cert_info| grep decimal_valid_serialNumber | cut -d- -f2)
+ rlLog "Display CRL"
+ rlRun "curl --cacert $CERTDB_DIR/ca_cert.pem \
+ --dump-header $header_006 \
+ -E \"$valid_agent_cert:$CERTDB_DIR_PASSWORD\" \
+ -d \"pageSize=50&crlIssuingPoint=MasterCRL&pageStart=1&crlDisplayType=entireCRL\" \
+ https://$tmp_ca_host:$target_secure_port/ca/agent/ca/displayCRL > $test_out"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_006"
+ rlAssertNotGrep "Serial Number: $valid_crmf_serialNumber" "$test_out"
+ rlRun "pki -d $CERTDB_DIR/ \
+ -n \"$valid_agent_cert\" \
+ -c $CERTDB_DIR_PASSWORD \
+ -h $tmp_ca_host \
+ -p $target_unsecure_port \
+ cert-revoke $valid_crmf_serialNumber --force"
+
+ rlRun "curl --cacert $CERTDB_DIR/ca_cert.pem \
+ --dump-header $header_006 \
+ -E \"$valid_agent_cert:$CERTDB_DIR_PASSWORD\" \
+ -d \"expiredTo=&updateCRL=yes&validFrom=&expiredFrom=&validTo=&revokedTo=&revokedFrom=&\" \
+ https://$tmp_ca_host:$target_secure_port/ca/agent/ca/updateDir > /tmp/updateds"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_006"
+ rlLog "Update CRL"
+ rlRun "curl --cacert $CERTDB_DIR/ca_cert.pem \
+ --dump-header $header_006 \
+ -E \"$valid_agent_cert:$CERTDB_DIR_PASSWORD\" \
+ -d \"crlIssuingPoint=MasterCRL&signatureAlgorithm=$signatureAlgorithm&\" \
+ https://$tmp_ca_host:$target_secure_port/ca/agent/ca/updateCRL > $test_out"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_006"
+ rlRun "curl --cacert $CERTDB_DIR/ca_cert.pem \
+ --dump-header $header_006 \
+ -E \"$valid_agent_cert:$CERTDB_DIR_PASSWORD\" \
+ -d \"pageSize=50&crlIssuingPoint=MasterCRL&pageStart=1&crlDisplayType=entireCRL\" \
+ https://$tmp_ca_host:$target_secure_port/ca/agent/ca/displayCRL > $test_out"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_006"
+ local STRIP_HEX=$(echo $valid_crmf_serialNumber | cut -dx -f2)
+ local CONV_UPP_VAL=${STRIP_HEX^^}
+ valid_serial="0x$CONV_UPP_VAL"
+ rlAssertGrep "Serial Number: $valid_serial" "$test_out"
+ rlPhaseEnd
+
+ rlPhaseStartSetup "pki_console_crlip_cleanup"
+ #Delete temporary directory
+ rlRun "popd"
+ rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
+ rlPhaseEnd
+}
+
+process_curl_output()
+{
+ output_file=$1
+ sed -i "s/\&/\n&/g" $output_file
+ sed -i "s/+//g" $output_file
+ sed -i "s/^&//g" $output_file
+ sed -i "s/%3A/":"/g" $output_file
+ sed -i "s/%3B/":"/g" $output_file
+}