summaryrefslogtreecommitdiffstats
path: root/tests/dogtag/acceptance/legacy/subca-tests/publishing/subca-ad-publishing.sh
diff options
context:
space:
mode:
Diffstat (limited to 'tests/dogtag/acceptance/legacy/subca-tests/publishing/subca-ad-publishing.sh')
-rwxr-xr-xtests/dogtag/acceptance/legacy/subca-tests/publishing/subca-ad-publishing.sh1024
1 files changed, 1024 insertions, 0 deletions
diff --git a/tests/dogtag/acceptance/legacy/subca-tests/publishing/subca-ad-publishing.sh b/tests/dogtag/acceptance/legacy/subca-tests/publishing/subca-ad-publishing.sh
new file mode 100755
index 000000000..5503eee9e
--- /dev/null
+++ b/tests/dogtag/acceptance/legacy/subca-tests/publishing/subca-ad-publishing.sh
@@ -0,0 +1,1024 @@
+#!/bin/bash
+# vim: dict=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k
+# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+#
+# runtest.sh of /CoreOS/rhcs/acceptance/legacy/subca_tests/publishing/subca-ad-publishing.sh
+# Description: SUBCA publishing tests
+# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+#
+# Author: Roshni Pattath <rpattath@redhat.com>
+#
+# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+#
+# Copyright (c) 2013 Red Hat, Inc. All rights reserved.
+#
+# This copyrighted material is made available to anyone wishing
+# to use, modify, copy, or redistribute it subject to the terms
+# and conditions of the GNU General Public License version 2.
+#
+# This program is distributed in the hope that it will be
+# useful, but WITHOUT ANY WARRANTY; without even the implied
+# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
+# PURPOSE. See the GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public
+# License along with this program; if not, write to the Free
+# Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+# Boston, MA 02110-1301, USA.
+#
+# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+# Include rhts environment
+. /usr/bin/rhts-environment.sh
+. /usr/share/beakerlib/beakerlib.sh
+. /opt/rhqa_pki/rhcs-shared.sh
+. /opt/rhqa_pki/pki-cert-cli-lib.sh
+. /opt/rhqa_pki/env.sh
+
+run_admin-subca-publishing_tests()
+{
+ local cs_Type=$1
+ local cs_Role=$2
+
+ # Creating Temporary Directory for ca-admin-internaldb tests
+ rlPhaseStartSetup "pki_console_internaldb Temporary Directory"
+ rlRun "TmpDir=\`mktemp -d\`" 0 "Creating tmp directory"
+ rlRun "pushd $TmpDir"
+ rlPhaseEnd
+
+ # Local Variables
+ get_topo_stack $cs_Role $TmpDir/topo_file
+ if [ $cs_Role="MASTER" ]; then
+ SUBCA_INST=$(cat $TmpDir/topo_file | grep MY_SUBCA | cut -d= -f2)
+ elif [ $cs_Role="SUBCA2" || $cs_Role="SUBCA1" ]; then
+ SUBCA_INST=$(cat $TmpDir/topo_file | grep MY_CA | cut -d= -f2)
+ fi
+ local target_unsecure_port=$(eval echo \$${SUBCA_INST}_UNSECURE_PORT)
+ local target_secure_port=$(eval echo \$${SUBCA_INST}_SECURE_PORT)
+ local tmp_ca_admin=$SUBCA_INST\_adminV
+ local tmp_ca_port=$(eval echo \$${SUBCA_INST}_UNSECURE_PORT)
+ local tmp_ca_host=$(eval echo \$${cs_Role})
+ local valid_admin_cert=$SUBCA_INST\_adminV
+ local ldap_host=`hostname`
+ local ldap_port=$(eval echo \$${SUBCA_INST}_LDAP_PORT)
+ local ldap_bind=$(eval echo \$${SUBCA_INST}_LDAP_ROOTDN)
+ local ldap_bind_pwd=$(eval echo \$${SUBCA_INST}_LDAP_ROOTDNPWD)
+ local ldap_secure="false"
+ local ldap_prompt="CA LDAP Publishing"
+ local ldap_authtype="BasicAuth"
+ local valid_admin_user=$SUBCA_INST\_adminV
+ local valid_admin_user_password=$SUBCA_INST\_adminV_password
+
+ rlPhaseStartTest "pki_console_enable_publishing-001:SUBCA - Admin Interface - Enable Publishing"
+ header_001="$TmpDir/subca_pub_001.txt"
+ local admin_out="$TmpDir/admin_out_enablepub"
+ rlLog "Enable Publishing"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_001 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_PROCESS&OP_SCOPE=ldap&RS_ID=RS_ID_CONFIG&publishingEnable=true&enable=true&ldapconn.host=$ldap_host&ldapconn.port=$ldap_port&ldapConn.secureConn=$ldap_secure&ldapauth.bindPWPrompt=$ldap_prompt&ldapauth.bindDN=$ldap_bind&directoryManagerPwd=$ldap_bind_pwd&ldapconn.version=3&ldapauth.authtype=$ldap_authtype&ldapauth.clientCertNickname=&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Enable Publishing"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_001"
+ rlAssertGrep "Success" "$admin_out"
+ rlAssertNotGrep "Failure" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_read_publishing_config-002:SUBCA - Admin Interface - Read Publishing config"
+ header_002="$TmpDir/subca_pub_002.txt"
+ local admin_out="$TmpDir/admin_out_readpubconf"
+ rlLog "Read Publishing Config"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_002 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=ldap&RS_ID=RS_ID_CONFIG&publishingEnable=&enable=&ldapconn.host=&ldapconn.port=&ldapConn.secureConn=&ldapauth.bindPWPrompt=&ldapauth.bindDN=&directoryManagerPwd=&ldapconn.version=&ldapauth.authtype=&ldapauth.clientCertNickname=&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read Publishing Config"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_002"
+ ldapbindpromptout=$(echo $ldap_prompt | tr -d ' ')
+ rlAssertGrep "ldapconn.host=$ldap_host" "$admin_out"
+ rlAssertGrep "ldapconn.port=$ldap_port" "$admin_out"
+ rlAssertGrep "ldapConn.secureConn=$ldap_secure" "$admin_out"
+ rlAssertGrep "ldapauth.bindPWPrompt=$ldapbindpromptout" "$admin_out"
+ rlAssertGrep "ldapauth.bindDN=cn%3DDSManager" "$admin_out"
+ rlAssertGrep "directoryManagerPwd=" "$admin_out"
+ rlAssertGrep "ldapconn.version=3" "$admin_out"
+ rlAssertGrep "ldapauth.authtype=$ldap_authtype" "$admin_out"
+ rlAssertGrep "ldapauth.clientCertNickname=" "$admin_out"
+ rlAssertGrep "publishingEnable=true" "$admin_out"
+ rlAssertGrep "enable=true" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_list_all_mappers-003:SUBCA - Admin Interface - List all mappers"
+ header_003="$TmpDir/subca_pub_003.txt"
+ local admin_out="$TmpDir/admin_out_listmappers"
+ rlLog "List all mappers"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_003 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_SEARCH&OP_SCOPE=mapperRules&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "List all mappers"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_003"
+ rlAssertGrep "LdapCaCertMap=LdapCaSimpleMap:visible" "$admin_out"
+ rlAssertGrep "LdapUserCertMap=LdapSimpleMap:visible" "$admin_out"
+ rlAssertGrep "NoMap=NoMap:visible" "$admin_out"
+ rlAssertGrep "LdapCrlMap=LdapCaSimpleMap:visible" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_list_all_mapper_plugins-004:SUBCA - Admin Interface - List all mapper plugins"
+ local admin_out="$TmpDir/admin_out_listmapperplugin"
+ header_004="$TmpDir/subca_pub_004.txt"
+ rlLog "List all mapper plugin"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_004 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_SEARCH&OP_SCOPE=mapperImpls&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "List all mapper plugins"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_004"
+ rlAssertGrep "LdapEnhancedMap=com.netscape.cms.publish.mappers.LdapEnhancedMap%2CLdapEnhancedMap" "$admin_out"
+ rlAssertGrep "LdapSubjAttrMap=com.netscape.cms.publish.mappers.LdapCertSubjMap%2CLdapCertSubjMap" "$admin_out"
+ rlAssertGrep "NoMap=com.netscape.cms.publish.mappers.NoMap%2CNoMap" "$admin_out"
+ rlAssertGrep "LdapSimpleMap=com.netscape.cms.publish.mappers.LdapSimpleMap%2CLdapSimpleMap" "$admin_out"
+ rlAssertGrep "LdapCaSimpleMap=com.netscape.cms.publish.mappers.LdapCaSimpleMap%2CLdapCaSimpleMap" "$admin_out"
+ rlAssertGrep "LdapDNExactMap=com.netscape.cms.publish.mappers.LdapCertExactMap%2CLdapCertExactMap" "$admin_out"
+ rlAssertGrep "LdapDNCompsMap=com.netscape.cms.publish.mappers.LdapCertCompsMap%2CLdapCertCompsMap" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_read_mapper_rule-005:SUBCA - Admin Interface - Read a mapper rule"
+ local admin_out="$TmpDir/admin_out_readmaprule"
+ header_005="$TmpDir/subca_pub_005.txt"
+ searchrule="LdapUserCertMap"
+ rlLog "Read a mapper rule"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_005 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=mapperRules&RS_ID=$searchrule&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_005"
+ rlAssertGrep "implName=LdapSimpleMap" "$admin_out"
+ rlAssertGrep "dnPattern=" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_add_ldap_mapper-006:SUBCA - Admin Interface - Add CA ldap mapper"
+ local admin_out="$TmpDir/admin_out_addmapper"
+ header_006="$TmpDir/subca_pub_006.txt"
+ mapper_id="pub07"
+ dn_pattern="uid=\$req.HTTP_PARAMS.uid,ou=\$subj.ou,o=\$subj.o"
+ create_v2_ca_entry="false"
+ create_ca_entry="true"
+ mapper="LdapCaSimpleMap"
+ rlLog "Add a ldap mapper"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_006 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=mapperRules&RS_ID=$mapper_id&RULENAME=$mapper_id&implName=LdapCaSimpleMap&dnPattern=$dn_pattern&CAEntryV2=$create_v2_ca_entry&createCAEntry=$create_ca_entry&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add a ldap mapper"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_006"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" \
+ --dump-header $header_006 \
+ --basic --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_006"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ dnpattern1=$(echo $dn_pattern | sed -e 's/=/%3D/g' -e 's/,/%2C/g' -e 's/$req//g' -e 's/$subj//g')
+ rlAssertGrep "dnPattern=$dnpattern1" "$admin_out"
+ rlAssertGrep "createCAEntry=$create_ca_entry" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_edit_ldap_mapper-007:SUBCA - Admin Interface - Edit CA ldap mapper"
+ local admin_out="$TmpDir/admin_out_editmapper"
+ header_007="$TmpDir/subca_pub_007.txt"
+ dn_pattern="uid=\$req.HTTP_PARAMS.uid,ou=\$subj.ou,o=netscapecertificateserver"
+ rlLog "Edit a ldap mapper"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_007 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_MODIFY&OP_SCOPE=mapperRules&RS_ID=$mapper_id&RULENAME=$mapper_id&implName=LdapCaSimpleMap&dnPattern=$dn_pattern&CAEntryV2=$create_v2_ca_entry&createCAEntry=$create_ca_entry&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Edit a ldap mapper"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_007"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_007 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_007"
+ rlAssertGrep "netscapecertificateserver" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_007 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Delete mapper rule $mapper_id"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_007"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_add_ldap_dn_comps_mapper-008:SUBCA - Admin Interface - Add ldap dn comps mapper"
+ local admin_out="$TmpDir/admin_out_addldapdncomps"
+ header_008="$TmpDir/subca_pub_008.txt"
+ mapper_id="pub09"
+ filter_comps="mail"
+ dn_comps="uid"
+ base_dn="o=redhat-ldapdncompsmap"
+ mapper="LdapDNCompsMap"
+ rlLog "Add ldap dn comps mapper"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_008 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=mapperRules&RS_ID=$mapper_id&RULENAME=$mapper_id&implName=$mapper&filterComps=$filter_comps&dnComps=$dn_comps&baseDN=$base_dn&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add ldap dn comps mapper"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_008"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_008 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_008"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ basedn1=$(echo $base_dn | sed 's/=/%3D/g')
+ rlAssertGrep "baseDN=$basedn1" "$admin_out"
+ rlAssertGrep "dnComps=$dn_comps" "$admin_out"
+ rlAssertGrep "filterComps=$filter_comps" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_edit_ldap_dn_comps_mapper-009:SUBCA - Admin Interface - Edit ldap dn comps mapper"
+ local admin_out="$TmpDir/admin_out_editldapdncomps"
+ header_009="$TmpDir/subca_pub_009.txt"
+ base_dn="o=redhat-ldapdncompsmap-edit"
+ rlLog "Edit ldap dn comps mapper"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_009 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_MODIFY&OP_SCOPE=mapperRules&RS_ID=$mapper_id&RULENAME=$mapper_id&implName=$mapper&filterComps=$filter_comps&dnComps=$dn_comps&baseDN=$base_dn&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add ldap dn comps mapper"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_009"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_009 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_009"
+ rlAssertGrep "redhat-ldapdncompsmap-edit" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_009 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Delete mapper rule $mapper_id"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_009"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_add_ldap_dn_exact_mapper-010:SUBCA - Admin Interface - Add ldap dn exact mapper"
+ local admin_out="$TmpDir/admin_out_addldapdnexact"
+ header_010="$TmpDir/subca_pub_010.txt"
+ mapper_id="pub11"
+ mapper="LdapDNExactMap"
+ rlLog "Add ldap dn exact mapper"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_010 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=mapperRules&RS_ID=$mapper_id&RULENAME=$mapper_id&implName=$mapper&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add ldap dn exact mapper"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_010"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_010 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_010"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_010 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Delete mapper rule $mapper_id"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_010"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_add_ldap_enhanced_mapper-011:SUBCA - Admin Interface - Add ldap enhanced mapper"
+ local admin_out="$TmpDir/admin_out_addldapenhanced"
+ header_011="$TmpDir/subca_pub_011.txt"
+ mapper_id="pub12"
+ mapper="LdapEnhancedMap"
+ dn_pattern="uid=\$req.HTTP_PARAMS.uid,ou=\$subj.ou,o=netscapecertificateserver"
+ attr_pattern="\$req.HTTP_PARAMS.csrRequestorEmail"
+ attr_num="1"
+ create_entry="true"
+ attr_name="mail"
+ rlLog "Add ldap enhanced mapper"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_011 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=mapperRules&RS_ID=$mapper_id&RULENAME=$mapper_id&implName=$mapper&dnPattern=$dn_pattern&attrPattern0=$attr_pattern&attrNum=$attr_num&createEntry=$create_entry&attrName0=$attr_name&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add ldap enhanced mapper"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_011"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_011 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_011"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ dnpattern1=$(echo $dn_pattern | sed -e 's/=/%3D/g' -e 's/,/%2C/g' -e 's/$req//g' -e 's/$subj//g')
+ rlAssertGrep "dnPattern=$dnpattern1" "$admin_out"
+ rlAssertGrep "createEntry=$create_entry" "$admin_out"
+ rlAssertGrep "attrNum=$attr_num" "$admin_out"
+ rlAssertGrep "attrName0=$attr_name" "$admin_out"
+ attrpattern1=$(echo $attr_pattern | sed 's/$req//g')
+ rlAssertGrep "attrPattern0=$attrpattern1" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_edit_ldap_enhanced_mapper-012:SUBCA - Admin Interface - Edit ldap enhanced mapper"
+ local admin_out="$TmpDir/admin_out_editldapenhanced"
+ header_012="$TmpDir/subca_pub_012.txt"
+ dn_pattern="uid=\$req.HTTP_PARAMS.uid,ou=\$subj.ou,o=netscapecertificateserver-e"
+ rlLog "Edit ldap enhanced mapper"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_012 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_MODIFY&OP_SCOPE=mapperRules&RS_ID=$mapper_id&RULENAME=$mapper_id&implName=$mapper&dnPattern=$dn_pattern&attrPattern0=$attr_pattern&attrNum=$attr_num&createEntry=$create_entry&attrName0=$attrName&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Edit ldap enhanced mapper"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_012"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_012 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_012"
+ rlAssertGrep "netscapecertificateserver-e" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_012 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Delete mapper rule $mapper_id"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_012"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_add_ldap_simple_mapper-013:SUBCA - Admin Interface - Add ldap simple mapper"
+ header_013="$TmpDir/subca_pub_013.txt"
+ local admin_out="$TmpDir/admin_out_addldapsimple"
+ mapper_id="pub14"
+ mapper="LdapSimpleMap"
+ dn_pattern="uid=\$req.HTTP_PARAMS.uid,ou=\$subj.ou,o=netscapecertificateserver"
+ rlLog "Add ldap simple mapper"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_013 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=mapperRules&RS_ID=$mapper_id&RULENAME=$mapper_id&implName=$mapper&dnPattern=$dn_pattern&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add ldap simple mapper"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_013"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_013 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_013"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ dnpattern1=$(echo $dn_pattern | sed -e 's/=/%3D/g' -e 's/,/%2C/g' -e 's/$req//g' -e 's/$subj//g')
+ rlAssertGrep "dnPattern=$dnpattern1" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_edit_ldap_simple_mapper-014:SUBCA - Admin Interface - Edit ldap simple mapper"
+ local admin_out="$TmpDir/admin_out_editldapsimple"
+ header_014="$TmpDir/subca_pub_014.txt"
+ mapper_id="pub14"
+ dn_pattern="uid=\$req.HTTP_PARAMS.uid,ou=\$subj.ou,o=netscapecertificateserver-e"
+ rlLog "Edit ldap simple mapper"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_014 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_MODIFY&OP_SCOPE=mapperRules&RS_ID=$mapper_id&RULENAME=$mapper_id&implName=$mapper&dnPattern=$dn_pattern&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Edit ldap simple mapper"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_014"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_014 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_014"
+ rlAssertGrep "netscapecertificateserver-e" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_014 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Delete mapper rule $mapper_id"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_014"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_add_ldap_subj_attr_mapper-015:SUBCA - Admin Interface - Add ldap subj attr mapper"
+ local admin_out="$TmpDir/admin_out_addldapsubjattr"
+ header_015="$TmpDir/subca_pub_015.txt"
+ mapper_id="pub16"
+ mapper="LdapSubjAttrMap"
+ search_base="o=redhat"
+ cert_subj_name_attr="certSubjectName"
+ rlLog "Add ldap subj attr mapper"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_015 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=mapperRules&RS_ID=$mapper_id&RULENAME=$mapper_id&implName=$mapper&searchBase=$search_base&certSubjNameAttr=$cert_subj_name_attr&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add ldap subj attr mapper"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_015"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_015 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_015"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlAssertGrep "certSubjNameAttr=$cert_subj_name_attr" "$admin_out"
+ searchbase1=$(echo $search_base | sed 's/=/%3D/g')
+ rlAssertGrep "searchBase=$searchbase1" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_edit_ldap_subj_attr_mapper-016:SUBCA - Admin Interface - Edit ldap subj attr mapper"
+ local admin_out="$TmpDir/admin_out_editldapsubjattr"
+ header_016="$TmpDir/subca_pub_016.txt"
+ search_base="o=redhat-subjattr"
+ rlLog "Edit ldap subj attr mapper"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_016 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_MODIFY&OP_SCOPE=mapperRules&RS_ID=$mapper_id&RULENAME=$mapper_id&implName=$mapper&searchBase=$search_base&certSubjNameAttr=$cert_subj_name_attr&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Edit ldap subj attr mapper"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_016"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_016 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_016"
+ rlAssertGrep "redhat-subjattr" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_016 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Delete mapper rule $mapper_id"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_016"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_add_ldap_no_map-017:SUBCA - Admin Interface - Add ldap no map"
+ local admin_out="$TmpDir/admin_out_addldapnomap"
+ header_017="$TmpDir/subca_pub_017.txt"
+ mapper_id="pub18"
+ mapper="NoMap"
+ rlLog "Add ldap no map"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_017 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=mapperRules&RS_ID=$mapper_id&RULENAME=$mapper_id&implName=$mapper&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add ldap no map"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_017"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_read_ldap_no_map-018:SUBCA - Admin Interface - Read ldap no map"
+ local admin_out="$TmpDir/admin_out_readldapnomap"
+ header_018="$TmpDir/subca_pub_018.txt"
+ rlLog "Add ldap no map"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_018 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read ldap no map"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_018"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_delete_ldap_no_map-019:SUBCA - Admin Interface - Delete ldap no map"
+ local admin_out="$TmpDir/admin_out_deleteldapnomap"
+ header_019="$TmpDir/subca_pub_019.txt"
+ rlLog "Delete ldap no map"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_019 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Delete ldap no map"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_019"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_019 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=mapperRules&RS_ID=$mapper_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Read ldap no map"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_019"
+ rlAssertNotGrep "$mapper" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_add_file_based_publisher-020:SUBCA - Admin Interface - Add file based publisher"
+ local admin_out="$TmpDir/admin_out_addfilebasedpub"
+ header_020="$TmpDir/subca_pub_020.txt"
+ pub_id="pub24"
+ mapper="FileBasedPublisher"
+ file_b64="true"
+ file_dir="/tmp"
+ file_der="true"
+ rlLog "Add file based publisher"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_020 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=publisherRules&RS_ID=$pub_id&RULENAME=$pub_id&implName=$mapper&Filename.b64=$file_b64&directory=$file_dir&Filename.der=$file_der&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add file based publisher"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_020"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_020 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=publisherRules&RS_ID=$pub_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_020"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ filedir1=$(echo $file_dir | sed 's/\//%2F/g')
+ rlAssertGrep "directory=$filedir1" "$admin_out"
+ rlAssertGrep "Filename.der=$file_der" "$admin_out"
+ rlAssertGrep "Filename.b64=$file_b64" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_edit_file_based_publisher-021:SUBCA - Admin Interface - Edit file based publisher"
+ local admin_out="$TmpDir/admin_out_editfilebasedpub"
+ header_021="$TmpDir/subca_pub_021.txt"
+ file_dir="/usr"
+ rlLog "Add file based publisher"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_021 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_MODIFY&OP_SCOPE=publisherRules&RS_ID=$pub_id&RULENAME=$pub_id&implName=$mapper&Filename.b64=$file_b64&directory=$file_dir&Filename.der=$file_der&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add file based publisher"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_021"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_021 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=publisherRules&RS_ID=$pub_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Read a publisher"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_021"
+ filedir1=$(echo $file_dir | sed 's/\//%2F/g')
+ rlAssertGrep "directory=$filedir1" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_021 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=publisherRules&RS_ID=$pub_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Delete publisher $pub_id"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_021"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_add_ldap_cacert_publisher-022:SUBCA - Admin Interface - Add Ldap cacert publisher"
+ local admin_out="$TmpDir/admin_out_addldapcacertpub"
+ header_022="$TmpDir/subca_pub_022.txt"
+ pub_id="pub26"
+ mapper="LdapCaCertPublisher"
+ caObjectClass="certificationAuthority"
+ caCertAttr="caCertificate;binary"
+ rlLog "Add ldap ca cert publisher"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_022 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=publisherRules&RS_ID=$pub_id&RULENAME=$pub_id&implName=$mapper&caObjectClass=$caObjectClass&caCertAttr=$caCertAttr&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add Ldap ca cert publisher"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_022"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_022 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=publisherRules&RS_ID=$pub_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_022"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ certAttr1=$(echo $caCertAttr | sed 's/;/:/g')
+ rlAssertGrep "caCertAttr=$certAttr1" "$admin_out"
+ rlAssertGrep "caObjectClass=$caObjectClass" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_022 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=publisherRules&RS_ID=$pub_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Delete publisher $pub_id"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_022"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_add_ldap_certificate_pair_publisher-023:SUBCA - Admin Interface - Add Ldap certificate pair publisher"
+ local admin_out="$TmpDir/admin_out_addldapcertpairpub"
+ header_023="$TmpDir/subca_pub_023.txt"
+ pub_id="pub27"
+ mapper="LdapCertificatePairPublisher"
+ caObjectClass="certificationAuthority"
+ crossCertPairAttr="crossCertificatePair;binary"
+ rlLog "Add ldap certificate pair publisher"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_023 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=publisherRules&RS_ID=$pub_id&RULENAME=$pub_id&implName=$mapper&caObjectClass=$caObjectClass&crossCertPairAttr=$crossCertPairAttr&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add Ldap certificate pair publisher"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_023"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_023 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=publisherRules&RS_ID=$pub_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_023"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ crossCertPairAttr1=$(echo $crossCertPairAttr | sed 's/;/:/g')
+ rlAssertGrep "crossCertPairAttr=$crossCertPairAttr1" "$admin_out"
+ rlAssertGrep "caObjectClass=$caObjectClass" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_023 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=publisherRules&RS_ID=$pub_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Delete publisher $pub_id"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_023"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_add_ldap_crl_publisher-024:SUBCA - Admin Interface - Add Ldap crl publisher"
+ local admin_out="$TmpDir/admin_out_addldapcrlpub"
+ header_024="$TmpDir/subca_pub_024.txt"
+ pub_id="pub28"
+ mapper="LdapCrlPublisher"
+ crlAttr="certificateRevocationList;binary"
+ rlLog "Add ldap crl publisher"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_024 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=publisherRules&RS_ID=$pub_id&RULENAME=$pub_id&implName=$mapper&crlAttr=$crlAttr&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add ldap crl publisher"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_024"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_024 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=publisherRules&RS_ID=$pub_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_024"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ crlAttr1=$(echo $crlAttr | sed 's/;/:/g')
+ rlAssertGrep "crlAttr=$crlAttr1" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_024 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=publisherRules&RS_ID=$pub_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Delete publisher $pub_id"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_024"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_add_ldap_delta_crl_publisher-025:SUBCA - Admin Interface - Add Ldap delta crl publisher"
+ local admin_out="$TmpDir/admin_out_addldapdeltacrlpub"
+ header_025="$TmpDir/subca_pub_025.txt"
+ pub_id="pub29"
+ mapper="LdapDeltaCrlPublisher"
+ crlAttr="certificateRevocationList;binary"
+ rlLog "Add ldap delta crl publisher"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_025 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=publisherRules&RS_ID=$pub_id&RULENAME=$pub_id&implName=$mapper&crlAttr=$crlAttr&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add ldap delta crl publisher"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_025"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_025 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=publisherRules&RS_ID=$pub_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_025"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ crlAttr1=$(echo $crlAttr | sed 's/;/:/g')
+ rlAssertGrep "crlAttr=$crlAttr1" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_025 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=publisherRules&RS_ID=$pub_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Delete publisher $pub_id"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_025"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_add_ldap_user_cert_publisher-026:SUBCA - Admin Interface - Add Ldap user cert publisher"
+ local admin_out="$TmpDir/admin_out_addldapusercertpub"
+ header_026="$TmpDir/subca_pub_026.txt"
+ pub_id="pub30"
+ mapper="LdapUserCertPublisher"
+ certAttr="userCertificate;binary"
+ rlLog "Add ldap user cert publisher"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_026 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=publisherRules&RS_ID=$pub_id&RULENAME=$pub_id&implName=$mapper&certAttr=$certAttr&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add ldap user cert publisher"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_026"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_026 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=publisherRules&RS_ID=$pub_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_026"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ certAttr1=$(echo $certAttr | sed 's/;/:/g')
+ rlAssertGrep "certAttr=$certAttr1" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_026 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=publisherRules&RS_ID=$pub_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Delete publisher $pub_id"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_026"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_add_ocsp_publisher-027:SUBCA - Admin Interface - Add ocsp publisher"
+ local admin_out="$TmpDir/admin_out_addocsppub"
+ header_027="$TmpDir/subca_pub_027.txt"
+ pub_id="pub31"
+ mapper="OCSPPublisher"
+ ocsp_host="somehost"
+ ocsp_port="1234"
+ rlLog "Add ocsp publisher"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_027 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=publisherRules&RS_ID=$pub_id&RULENAME=$pub_id&implName=$mapper&host=$ocsp_host&port=$ocsp_port&path=/ocsp/addCRL&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add ocsp publisher"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_027"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_027 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=publisherRules&RS_ID=$pub_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_027"
+ rlAssertGrep "implName=$mapper" "$admin_out"
+ rlAssertGrep "host=$ocsp_host" "$admin_out"
+ rlAssertGrep "port=$ocsp_port" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_edit_ocsp_publisher-028:SUBCA - Admin Interface - Edit ocsp publisher"
+ local admin_out="$TmpDir/admin_out_editocsppub"
+ header_028="$TmpDir/subca_pub_028.txt"
+ ocsp_host="somehost.redhat.com"
+ rlLog "Edit ocsp publisher"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_028 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_MODIFY&OP_SCOPE=publisherRules&RS_ID=$pub_id&RULENAME=$pub_id&implName=$mapper&host=$ocsp_host&port=$ocsp_port&path=/ocsp/addCRL&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Edit ocsp publisher"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_028"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_028 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=publisherRules&RS_ID=$pub_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_028"
+ rlAssertGrep "host=$ocsp_host" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_delete_publisher-029:SUBCA - Admin Interface - Delete publisher"
+ local admin_out="$TmpDir/admin_out_deletepub"
+ header_029="$TmpDir/subca_pub_029.txt"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_029 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=publisherRules&RS_ID=$pub_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Delete publisher $pub_id"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_029"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_029 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=publisherRules&RS_ID=$pub_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read a mapper rule"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_029"
+ rlAssertNotGrep "implName=$mapper" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_list_all_publishing_rules-030:SUBCA - Admin Interface - List all publishing rules"
+ local admin_out="$TmpDir/admin_out_listpubrules"
+ header_030="$TmpDir/subca_pub_030.txt"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_030 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_SEARCH&OP_SCOPE=ruleRules&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "List all publishing rules"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_030"
+ rlAssertGrep "LdapXCertRule" "$admin_out"
+ rlAssertGrep "LdapCaCertRule" "$admin_out"
+ rlAssertGrep "LdapUserCertRule" "$admin_out"
+ rlAssertGrep "LdapCrlRule" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_add_publishing_rule_type_certs-031:SUBCA - Admin Interface - Add publishing rule - type certs"
+ local admin_out="$TmpDir/admin_out_addpubrulecerts"
+ header_031="$TmpDir/subca_pub_031.txt"
+ rule_id="rule35"
+ rule_predicate="HTTP_PARAMS.certType==client"
+ rule_enable="true"
+ rule_type="certs"
+ rule_publisher="LdapUserCertPublisher"
+ rule_mapper="LdapUserCertMap"
+ rlLog "Add publishing rule - type certs"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_031 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=ruleRules&RS_ID=$rule_id&RULENAME=$rule_id&implName=Rule&predicate=$rule_predicate&enable=$rule_enable&type=$rule_type&publisher=$rule_publisher&mapper=$rule_mapper&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add publishing rule - type certs"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_031"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_031 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=ruleRules&RS_ID=$rule_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read publishing rule $rule_id"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_031"
+ rlAssertGrep "implName=Rule" "$admin_out"
+ rlAssertGrep "type=$rule_type" "$admin_out"
+ rule_predict1=$(echo $rule_predict | sed 's/=/%3D/g')
+ rlAssertGrep "predicate=$rule_predict1" "$admin_out"
+ rlAssertGrep "enable=$rule_enable" "$admin_out"
+ rlAssertGrep "mapper=$rule_mapper" "$admin_out"
+ rlAssertGrep "publisher=$rule_publisher" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_031 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=ruleRules&RS_ID=$rule_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Delete publishing rule $rule_id"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_031"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_add_publishing_rule_type_cacert-032:SUBCA - Admin Interface - Add publishing rule - type cacert"
+ local admin_out="$TmpDir/admin_out_addpubrulecacert"
+ header_032="$TmpDir/subca_pub_032.txt"
+ rule_id="rule36"
+ rule_predicate="HTTP_PARAMS.certType==ca"
+ rule_enable="true"
+ rule_type="cacert"
+ rule_publisher="LdapCaCertPublisher"
+ rule_mapper="LdapCaCertMap"
+ rlLog "Add publishing rule - type cacert"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_032 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=ruleRules&RS_ID=$rule_id&RULENAME=$rule_id&implName=Rule&predicate=$rule_predicate&enable=$rule_enable&type=$rule_type&publisher=$rule_publisher&mapper=$rule_mapper&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add publishing rule - type cacert"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_032"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_032 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=ruleRules&RS_ID=$rule_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read publishing rule $rule_id"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_032"
+ rlAssertGrep "implName=Rule" "$admin_out"
+ rlAssertGrep "type=$rule_type" "$admin_out"
+ rule_predict1=$(echo $rule_predict | sed 's/=/%3D/g')
+ rlAssertGrep "predicate=$rule_predict1" "$admin_out"
+ rlAssertGrep "enable=$rule_enable" "$admin_out"
+ rlAssertGrep "mapper=$rule_mapper" "$admin_out"
+ rlAssertGrep "publisher=$rule_publisher" "$admin_out"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_032 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=ruleRules&RS_ID=$rule_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher >> $admin_out" 0 "Delete publishing rule $rule_id"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_032"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_add_publishing_rule_type_crl-033:SUBCA - Admin Interface - Add publishing rule - type crl"
+ local admin_out="$TmpDir/admin_out_addpubrulecrl"
+ header_033="$TmpDir/subca_pub_033.txt"
+ rule_id="rule37"
+ rule_predicate="issuingPointId==MasterCRL"
+ rule_enable="true"
+ rule_type="crl"
+ rule_publisher="LdapCrlPublisher"
+ rule_mapper="LdapCrlMap"
+ rlLog "Add publishing rule - type cacert"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_033 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_ADD&OP_SCOPE=ruleRules&RS_ID=$rule_id&RULENAME=$rule_id&implName=Rule&predicate=$rule_predicate&enable=$rule_enable&type=$rule_type&publisher=$rule_publisher&mapper=$rule_mapper&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Add publishing rule - type crl"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_033"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_033 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=ruleRules&RS_ID=$rule_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read publishing rule $rule_id"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_033"
+ rlAssertGrep "implName=Rule" "$admin_out"
+ rlAssertGrep "type=$rule_type" "$admin_out"
+ rule_predict1=$(echo $rule_predict | sed 's/=/%3D/g')
+ rlAssertGrep "predicate=$rule_predict1" "$admin_out"
+ rlAssertGrep "enable=$rule_enable" "$admin_out"
+ rlAssertGrep "mapper=$rule_mapper" "$admin_out"
+ rlAssertGrep "publisher=$rule_publisher" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_read_publishing_rule-034:SUBCA - Admin Interface - Read publishing rule"
+ local admin_out="$TmpDir/admin_out_readpubrule"
+ header_034="$TmpDir/subca_pub_034.txt"
+ rlLog "Read publishing rule"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_034 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=ruleRules&RS_ID=$rule_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read publishing rule $rule_id"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_034"
+ rlAssertGrep "implName=Rule" "$admin_out"
+ rlAssertGrep "type=$rule_type" "$admin_out"
+ rule_predict1=$(echo $rule_predict | sed 's/=/%3D/g')
+ rlAssertGrep "predicate=$rule_predict1" "$admin_out"
+ rlAssertGrep "enable=$rule_enable" "$admin_out"
+ rlAssertGrep "mapper=$rule_mapper" "$admin_out"
+ rlAssertGrep "publisher=$rule_publisher" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_delete_publishing_rule-035:SUBCA - Admin Interface - Delete publishing rule"
+ local admin_out="$TmpDir/admin_out_deletepubrule"
+ header_035="$TmpDir/subca_pub_035.txt"
+ rlLog "Delete publishing rule"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_035 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_DELETE&OP_SCOPE=ruleRules&RS_ID=$rule_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Delete publishing rule $rule_id"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_035"
+
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_035 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_READ&OP_SCOPE=ruleRules&RS_ID=$rule_id&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Read publishing rule $rule_id"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_035"
+ rlAssertNotGrep "implName=Rule" "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartTest "pki_console_disable_publishing-036:SUBCA - Admin Interface - Disable Publishing"
+ local admin_out="$TmpDir/admin_out_disablepub"
+ header_036="$TmpDir/subca_pub_036.txt"
+ rlLog "Disable Publishing"
+ rlRun "curl --capath "$CERTDB_DIR" --basic \
+ --dump-header $header_036 \
+ --user "$valid_admin_user:$valid_admin_user_password" \
+ -d \"OP_TYPE=OP_PROCESS&OP_SCOPE=ldap&RS_ID=RS_ID_CONFIG&publishingEnable=false&enable=false&\" \
+ -k https://$tmp_ca_host:$target_secure_port/ca/capublisher > $admin_out" 0 "Disable Publishing"
+ rlRun "process_curl_output $admin_out" 0 "Process curl output file"
+ rlAssertGrep "HTTP/1.1 200 OK" "$header_036"
+ rlAssertGrep "stopped=Publishingisstopped." "$admin_out"
+ rlPhaseEnd
+
+ rlPhaseStartSetup "pki_console_crlip_cleanup"
+ #Delete temporary directory
+ rlRun "popd"
+ rlRun "rm -r $TmpDir" 0 "Removing tmp directory"
+ rlPhaseEnd
+}
+
+process_curl_output()
+{
+ output_file=$1
+ sed -i "s/\&/\n&/g" $output_file
+ sed -i "s/+//g" $output_file
+ sed -i "s/^&//g" $output_file
+ sed -i "s/%3A/":"/g" $output_file
+ sed -i "s/%3B/":"/g" $output_file
+}