diff options
Diffstat (limited to 'tests/dogtag/acceptance/legacy/tks-tests/internaldb/tks-ad-internaldb.sh')
-rwxr-xr-x | tests/dogtag/acceptance/legacy/tks-tests/internaldb/tks-ad-internaldb.sh | 140 |
1 files changed, 140 insertions, 0 deletions
diff --git a/tests/dogtag/acceptance/legacy/tks-tests/internaldb/tks-ad-internaldb.sh b/tests/dogtag/acceptance/legacy/tks-tests/internaldb/tks-ad-internaldb.sh new file mode 100755 index 000000000..a8c38f25d --- /dev/null +++ b/tests/dogtag/acceptance/legacy/tks-tests/internaldb/tks-ad-internaldb.sh @@ -0,0 +1,140 @@ +#!/bin/bash +# vim: dict=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k +# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +# +# runtest.sh of /CoreOS/rhcs/acceptance/legacy/ocsp-tests/tks-ad-internaldb.sh +# Description: TKS Admin internaldb tests +# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +# The following legacy test is being tested: +# TKS Admin Internaldb tests +# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +# +# Author: Niranjan Mallapadi <mniranja@redhat.com> +# +# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +# +# Copyright (c) 2013 Red Hat, Inc. All rights reserved. +# +# This copyrighted material is made available to anyone wishing +# to use, modify, copy, or redistribute it subject to the terms +# and conditions of the GNU General Public License version 2. +# +# This program is distributed in the hope that it will be +# useful, but WITHOUT ANY WARRANTY; without even the implied +# warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR +# PURPOSE. See the GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public +# License along with this program; if not, write to the Free +# Software Foundation, Inc., 51 Franklin Street, Fifth Floor, +# Boston, MA 02110-1301, USA. +# +# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +# Include rhts environment +. /usr/bin/rhts-environment.sh +. /usr/share/beakerlib/beakerlib.sh +. /opt/rhqa_pki/rhcs-shared.sh +. /opt/rhqa_pki/pki-cert-cli-lib.sh +. /opt/rhqa_pki/pki-auth-plugin-lib.sh +. /opt/rhqa_pki/env.sh + +run_admin-tks-internaldb_tests() +{ + local cs_Type=$1 + local cs_Role=$2 + + # Creating Temporary Directory for legacy test + rlPhaseStartSetup "Create Temporary Directory" + rlRun "TmpDir=\`mktemp -d\`" 0 "Creating tmp directory" + rlRun "pushd $TmpDir" + rlPhaseEnd + + # Local Variables + get_topo_stack $cs_Role $TmpDir/topo_file + local CA_INST=$(cat $TmpDir/topo_file | grep MY_CA | cut -d= -f2) + local TKS_INST=$(cat $TmpDir/topo_file | grep MY_TKS | cut -d= -f2) + local tomcat_name=$(eval echo \$${TKS_INST}_TOMCAT_INSTANCE_NAME) + local target_unsecure_port=$(eval echo \$${TKS_INST}_UNSECURE_PORT) + local target_secure_port=$(eval echo \$${TKS_INST}_SECURE_PORT) + local tmp_ca_port=$(eval echo \$${CA_INST}_UNSECURE_PORT) + local tmp_tks_host=$(eval echo \$${cs_Role}) + local tmp_ca_host=$(eval echo \$${cs_Role}) + local valid_ca_agent_cert=$CA_INST\_agentV + local valid_agent=$TKS_INST\_agentV + local valid_agent_pwd=$TKS_INST\_agentV_password + local valid_audit=$TKS_INST\_auditV + local valid_audit_pwd=$TKS_INST\_auditV_password + local valid_operator=$TKS_INST\_operatorV + local valid_operator_pwd=$TKS_INST\_operatorV_password + local valid_admin=$TKS_INST\_adminV + local valid_admin_pwd=$TKS_INST\_adminV_password + local revoked_agent=$TKS_INST\_agentR + local revoked_admin=$TKS_INST\_adminR + local expired_admin=$TKS_INST\_adminE + local expired_agent=$TKS_INST\_agentE + local admin_out="$TmpDir/admin_out" + local TEMP_NSS_DB="$TmpDir/nssdb" + local TEMP_NSS_DB_PWD="redhat" + + rlPhaseStartTest "pki_tks_ad-internaldb-001: TKS Console: List Internaldb" + local OP_TYPE='OP_READ' + local OP_SCOPE='ldap' + local RS_ID='RS_ID_CONFIG' + local test_out=internaldb.out + rlLog "curl --capath $CERTDB_DIR \ + --dump-header $admin_out \ + --basic --user "$valid_admin:$valid_admin_pwd" \ + -d \"OP_TYPE=$OP_TYPE&OP_SCOPE=$OP_SCOPE&RS_ID=$RS_ID&ldapconn.host=&ldapconn.port=&ldapauth.bindDN=&ldapconn.version=&\" -k \"https://$tmp_tks_host:$target_secure_port/tks/server\" > $TmpDir/$test_out" + rlRun "curl --capath $CERTDB_DIR \ + --dump-header $admin_out \ + --basic --user "$valid_admin:$valid_admin_pwd" \ + -d \"OP_TYPE=$OP_TYPE&OP_SCOPE=$OP_SCOPE&RS_ID=$RS_ID&ldapconn.host=&ldapconn.port=&ldapauth.bindDN=&ldapconn.version=&\" -k \"https://$tmp_tks_host:$target_secure_port/tks/server\" > $TmpDir/$test_out" + rlAssertGrep "HTTP/1.1 200 OK" "$admin_out" + rlRun "process_curl_output $TmpDir/$test_out" 0 "Process curl output file" + rlAssertGrep "ldapconn.host=localhost" "$TmpDir/$test_out" + rlAssertGrep "ldapconn.port=$(eval echo \$${TKS_INST}_LDAP_PORT)" "$TmpDir/$test_out" + rlAssertGrep "ldapauth.bindDN=cn=DirectoryManager" "$TmpDir/$test_out" + rlPhaseEnd + + rlPhaseStartTest "pki_tks_ad-internaldb-002: TKS Console: Edit Internaldb" + rlLog "Edit Internal DB" + local OP_TYPE='OP_MODIFY' + local OP_SCOPE='ldap' + local RS_ID='RS_ID_CONFIG' + local ldaphost="$(hostname)" + local ldapport=$(eval echo \$${TKS_INST}_LDAP_PORT) + local ldapbindDN='cn=Directory Manager' + local ldapversion='3' + local maxConns='15' + local minConns='3' + local test_out=internaldb.out + rlLog "curl --capath $CERTDB_DIR \ + --dump-header $admin_out \ + --basic --user "$valid_admin:$valid_admin_pwd" \ + -d \"OP_TYPE=$OP_TYPE&OP_SCOPE=$OP_SCOPE&RS_ID=$RS_ID&ldapconn.host=$ldaphost&ldapconn.port=$ldapport&ldapauth.bindDN=$ldapbindDN&ldapconn.version=$ldapversion&maxConns=$maxConns&minConns=$minConns\" -k \"https://$tmp_tks_host:$target_secure_port/tks/server\" > $TmpDir/$test_out" + rlRun "curl --capath $CERTDB_DIR \ + --dump-header $admin_out \ + --basic --user "$valid_admin:$valid_admin_pwd" \ + -d \"OP_TYPE=$OP_TYPE&OP_SCOPE=$OP_SCOPE&RS_ID=$RS_ID&ldapconn.host=$ldaphost&ldapconn.port=$ldapport&ldapauth.bindDN=$ldapbindDN&ldapconn.version=$ldapversion&maxConns=$maxConns&minConns=$minConns\" -k \"https://$tmp_tks_host:$target_secure_port/tks/server\" > $TmpDir/$test_out" + rlAssertGrep "HTTP/1.1 200 OK" "$admin_out" + rlRun "curl --capath $CERTDB_DIR \ + --dump-header $admin_out \ + --basic --user "$valid_admin:$valid_admin_pwd" \ + -d \"OP_TYPE=OP_READ&OP_SCOPE=$OP_SCOPE&RS_ID=$RS_ID&ldapconn.host=&ldapconn.port=&ldapauth.bindDN=&ldapconn.version=&\" -k \"https://$tmp_tks_host:$target_secure_port/tks/server\" > $TmpDir/$test_out" + rlAssertGrep "HTTP/1.1 200 OK" "$admin_out" + rlRun "process_curl_output $TmpDir/$test_out" 0 "Process curl output file" + rlAssertGrep "ldapconn.host=$ldaphost" "$TmpDir/$test_out" + rlAssertGrep "ldapconn.port=$ldapport" "$TmpDir/$test_out" + rlAssertGrep "ldapauth.bindDN=cn=DirectoryManager" "$TmpDir/$test_out" + rlRun "curl --capath $CERTDB_DIR \ + --dump-header $admin_out \ + --basic --user "$valid_admin:$valid_admin_pwd" \ + -d \"OP_TYPE=OP_MODIFY&OP_SCOPE=$OP_SCOPE&RS_ID=$RS_ID&ldapconn.host=localhost&ldapconn.port=$ldapport&ldapauth.bindDN=$ldapbindDN&ldapconn.version=$ldapversion&maxConns=$maxConns&minConns=$minConns\" -k \"https://$tmp_tks_host:$target_secure_port/tks/server\" > $TmpDir/$test_out" + rlPhaseEnd + + rlPhaseStartCleanup "Delete temporary dir" + rlRun "popd" + rlRun "rm -r $TmpDir" 0 "Removing tmp directory" + rlPhaseEnd +} |