#!/bin/bash # vim: dict=/usr/share/beakerlib/dictionary.vim cpt=.,w,b,u,t,i,k # ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ # # runtest.sh of /CoreOS/dogtag/acceptance/cli-tests/pki-kra-group-cli # Description: PKI kra-group-add CLI tests # ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ # The following pki cli commands needs to be tested: # pki-kra-group-cli-kra-group-add Add group to pki subsystems. # ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ # # Authors: Roshni Pattath # # ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ # # Copyright (c) 2013 Red Hat, Inc. All rights reserved. # # This copyrighted material is made available to anyone wishing # to use, modify, copy, or redistribute it subject to the terms # and conditions of the GNU General Public License version 2. # # This program is distributed in the hope that it will be # useful, but WITHOUT ANY WARRANTY; without even the implied # warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR # PURPOSE. See the GNU General Public License for more details. # # You should have received a copy of the GNU General Public # License along with this program; if not, write to the Free # Software Foundation, Inc., 51 Franklin Street, Fifth Floor, # Boston, MA 02110-1301, USA. # # ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ # Include rhts environment . /usr/share/beakerlib/beakerlib.sh . /opt/rhqa_pki/rhcs-shared.sh . /opt/rhqa_pki/pki-cert-cli-lib.sh . /opt/rhqa_pki/env.sh ######################################################################## #create-role-users.sh should be first executed prior to pki-kra-group-cli-kra-group-add.sh ######################################################################## ######################################################################## # Test Suite Globals ######################################################################## run_pki-kra-group-cli-kra-group-add_tests(){ subsystemId=$1 SUBSYSTEM_TYPE=$2 MYROLE=$3 caId=$4 KRA_HOST=$(eval echo \$${MYROLE}) KRA_PORT=$(eval echo \$${subsystemId}_UNSECURE_PORT) CA_PORT=$(eval echo \$${caId}_UNSECURE_PORT) eval ${subsystemId}_adminV_user=${subsystemId}_adminV eval ${subsystemId}_adminR_user=${subsystemId}_adminR eval ${subsystemId}_adminE_user=${subsystemId}_adminE eval ${subsystemId}_adminUTCA_user=${subsystemId}_adminUTCA eval ${subsystemId}_agentV_user=${subsystemId}_agentV eval ${subsystemId}_agentR_user=${subsystemId}_agentR eval ${subsystemId}_agentE_user=${subsystemId}_agentE eval ${subsystemId}_auditV_user=${subsystemId}_auditV eval ${subsystemId}_operatorV_user=${subsystemId}_operatorV #### Create Temporary directory #### rlPhaseStartSetup "pki_kra_group_cli_kra_group_add-startup: Create temporary directory" rlRun "TmpDir=\`mktemp -d\`" 0 "Creating tmp directory" rlRun "pushd $TmpDir" rlPhaseEnd local TEMP_NSS_DB="$TmpDir/nssdb" local TEMP_NSS_DB_PASSWD="redhat123" #### pki kra-group configuration test #### rlPhaseStartTest "pki_kra_group_cli-configtest: pki kra-group --help configuration test" rlRun "pki kra-group --help > $TmpDir/pki_kra_group_cfg.out 2>&1" \ 0 \ "pki kra-group --help" rlAssertGrep "kra-group-find Find groups" "$TmpDir/pki_kra_group_cfg.out" rlAssertGrep "kra-group-show Show group" "$TmpDir/pki_kra_group_cfg.out" rlAssertGrep "kra-group-add Add group" "$TmpDir/pki_kra_group_cfg.out" rlAssertGrep "kra-group-mod Modify group" "$TmpDir/pki_kra_group_cfg.out" rlAssertGrep "kra-group-del Remove group" "$TmpDir/pki_kra_group_cfg.out" rlAssertGrep "kra-group-member Group member management commands" "$TmpDir/pki_kra_group_cfg.out" rlAssertNotGrep "Error: Invalid module \"kra-group---help\"." "$TmpDir/pki_kra_group_cfg.out" rlPhaseEnd #### pki kra-group-add configuration test #### rlPhaseStartTest "pki_kra_group_cli_kra_group_add-configtest: pki kra-group-add configuration test" rlRun "pki kra-group-add --help > $TmpDir/pki_kra_group_add_cfg.out 2>&1" \ 0 \ "pki kra-group-add --help" rlAssertGrep "usage: kra-group-add \[OPTIONS...\]" "$TmpDir/pki_kra_group_add_cfg.out" rlAssertGrep "\--description Description" "$TmpDir/pki_kra_group_add_cfg.out" rlAssertGrep "\--help Show help options" "$TmpDir/pki_kra_group_add_cfg.out" rlPhaseEnd ##### Tests to add KRA groups using a user of admin group with a valid cert#### rlPhaseStartTest "pki_kra_group_cli_kra_group_add-001: Add a group to KRA using KRA_adminV" group1=new_group1 group_desc1="New Group1" rlLog "Executing: pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description=\"$group_desc1\" $group1" rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description=\"$group_desc1\" $group1 > $TmpDir/pki-kra-group-add-001.out" \ 0 \ "Add group $group1 to KRA" rlAssertGrep "Added group \"$group1\"" "$TmpDir/pki-kra-group-add-001.out" rlAssertGrep "Group ID: $group1" "$TmpDir/pki-kra-group-add-001.out" rlAssertGrep "Description: $group_desc1" "$TmpDir/pki-kra-group-add-001.out" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-002:maximum length of group id" group2=$(openssl rand -hex 2048 | perl -p -e 's/\n//') rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description=\"Test Group\" \"$group2\" > $TmpDir/pki-kra-group-add-001_1.out" \ 0 \ "Added group using CA_adminV with maximum group id length" actual_groupid_string=`cat $TmpDir/pki-kra-group-add-001_1.out | grep 'Group ID:' | xargs echo` expected_groupid_string="Group ID: $group2" if [[ $actual_groupid_string = $expected_groupid_string ]] ; then rlPass "Group ID: $group2 found" else rlFail "Group ID: $group2 not found" fi rlAssertGrep "Description: Test Group" "$TmpDir/pki-kra-group-add-001_1.out" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-003:Group id with # character" group3=abc# rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description test $group3 > $TmpDir/pki-kra-group-add-001_2.out" \ 0 \ "Added group using KRA_adminV, group id with # character" rlAssertGrep "Added group \"$group3\"" "$TmpDir/pki-kra-group-add-001_2.out" rlAssertGrep "Group ID: $group3" "$TmpDir/pki-kra-group-add-001_2.out" rlAssertGrep "Description: test" "$TmpDir/pki-kra-group-add-001_2.out" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-004:Group id with $ character" group4=abc$ rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description=test $group4 > $TmpDir/pki-kra-group-add-001_3.out" \ 0 \ "Added group using KRA_adminV, group id with $ character" rlAssertGrep "Added group \"$group4\"" "$TmpDir/pki-kra-group-add-001_3.out" rlAssertGrep "Group ID: abc\\$" "$TmpDir/pki-kra-group-add-001_3.out" rlAssertGrep "Description: test" "$TmpDir/pki-kra-group-add-001_3.out" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-005:Group id with @ character" group5=abc@ rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description=test $group5 > $TmpDir/pki-kra-group-add-001_4.out " \ 0 \ "Added group using KRA_adminV, group id with @ character" rlAssertGrep "Added group \"$group5\"" "$TmpDir/pki-kra-group-add-001_4.out" rlAssertGrep "Group ID: $group5" "$TmpDir/pki-kra-group-add-001_4.out" rlAssertGrep "Description: test" "$TmpDir/pki-kra-group-add-001_4.out" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-006:Group id with ? character" group6=abc? rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description=test $group6 > $TmpDir/pki-kra-group-add-001_5.out " \ 0 \ "Added group using KRA_adminV, group id with ? character" rlAssertGrep "Added group \"$group6\"" "$TmpDir/pki-kra-group-add-001_5.out" rlAssertGrep "Group ID: $group6" "$TmpDir/pki-kra-group-add-001_5.out" rlAssertGrep "Description: test" "$TmpDir/pki-kra-group-add-001_5.out" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-007:Group id as 0" group7=0 rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description=test $group7 > $TmpDir/pki-kra-group-add-001_6.out " \ 0 \ "Added group using KRA_adminV, group id 0" rlAssertGrep "Added group \"$group7\"" "$TmpDir/pki-kra-group-add-001_6.out" rlAssertGrep "Group ID: $group7" "$TmpDir/pki-kra-group-add-001_6.out" rlAssertGrep "Description: test" "$TmpDir/pki-kra-group-add-001_6.out" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-008:--description with maximum length" groupdesc=$(openssl rand -hex 2048 | perl -p -e 's/\n//') rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description=\"$groupdesc\" g1 2>&1> $TmpDir/pki-kra-group-add-001_7.out" \ 0 \ "Added group using KRA_adminV with maximum --description length" rlAssertGrep "Added group \"g1\"" "$TmpDir/pki-kra-group-add-001_7.out" rlAssertGrep "Group ID: g1" "$TmpDir/pki-kra-group-add-001_7.out" rlAssertGrep "Description: $groupdesc" "$TmpDir/pki-kra-group-add-001_7.out" actual_desc_string=`cat $TmpDir/pki-kra-group-add-001_7.out | grep Description: | xargs echo` expected_desc_string="Description: $groupdesc" if [[ $actual_desc_string = $expected_desc_string ]] ; then rlPass "Description: $groupdesc found" else rlFail "Description: $groupdesc not found" fi rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-009:--desccription with maximum length and symbols" rand_groupdesc=$(openssl rand -base64 2048 | perl -p -e 's/\n//') groupdesc=$(echo $rand_groupdesc | sed 's/\///g') rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description='$groupdesc' g2 > $TmpDir/pki-kra-group-add-001_8.out" \ 0 \ "Added group using CA_adminV with maximum --desc length and character symbols in it" rlAssertGrep "Added group \"g2\"" "$TmpDir/pki-kra-group-add-001_8.out" rlAssertGrep "Group ID: g2" "$TmpDir/pki-kra-group-add-001_8.out" actual_desc_string=`cat $TmpDir/pki-kra-group-add-001_8.out | grep Description: | xargs echo` expected_desc_string="Description: $groupdesc" if [[ $actual_desc_string = $expected_desc_string ]] ; then rlPass "Description: $groupdesc found" else rlFail "Description: $groupdesc not found" fi rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-010: Add a duplicate group to CA" command="pki -d $CERTDB_DIR -n $(eval echo \$${subsystemId}_adminV_user) -c $CERTDB_DIR_PASSWORD -h $KRA_HOST -p $KRA_PORT kra-group-add --description='Duplicate Group' $group1" errmsg="ConflictingOperationException: Entry already exists." errorcode=255 rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - pki group-add should fail on an attempt to add a duplicate group" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-011: Add a group to KRA with -t option" desc="Test Group" rlLog "Executing: pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ -t kra \ kra-group-add --description=\"$desc\" g3" rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ -t kra \ kra-group-add --description=\"$desc\" g3 > $TmpDir/pki-kra-group-add-0011.out" \ 0 \ "Add group g3 to CA" rlAssertGrep "Added group \"g3\"" "$TmpDir/pki-kra-group-add-0011.out" rlAssertGrep "Group ID: g3" "$TmpDir/pki-kra-group-add-0011.out" rlAssertGrep "Description: $desc" "$TmpDir/pki-kra-group-add-0011.out" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-012: Add a group -- missing required option group id" command="pki -d $CERTDB_DIR -n $(eval echo \$${subsystemId}_adminV_user) -c $CERTDB_DIR_PASSWORD -h $KRA_HOST -p $KRA_PORT kra-group-add --description='$group1'" errmsg="Error: No Group ID specified." errorcode=255 rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - Add Group -- missing required option group id" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-013: Add a group -- missing required option --description" rlLog "pki -d $CERTDB_DIR -n $(eval echo \$${subsystemId}_adminV_user) -c $CERTDB_DIR_PASSWORD -h $KRA_HOST -p $KRA_PORT kra-group-add g7" rlRun "pki -d $CERTDB_DIR -n $(eval echo \$${subsystemId}_adminV_user) -c $CERTDB_DIR_PASSWORD -h $KRA_HOST -p $KRA_PORT kra-group-add g7 > $TmpDir/pki-kra-group-add-0013.out" 0 "Successfully added group without description option" rlAssertGrep "Added group \"g7\"" "$TmpDir/pki-kra-group-add-0013.out" rlAssertGrep "Group ID: g7" "$TmpDir/pki-kra-group-add-0013.out" rlPhaseEnd ##### Tests to add groups using revoked cert##### rlPhaseStartTest "pki_kra_group_cli_kra_group_add-014: Should not be able to add group using a revoked cert KRA_adminR" command="pki -d $CERTDB_DIR -n $(eval echo \$${subsystemId}_adminR_user) -c $CERTDB_DIR_PASSWORD -h $KRA_HOST -p $KRA_PORT kra-group-add --description='$desc' $group1" errmsg="PKIException: Unauthorized" errorcode=255 rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - Add Group -- using a revoked admin cert KRA_adminR" rlLog "PKI Ticket: https://fedorahosted.org/pki/ticket/1134" rlLog "PKI Ticket: https://fedorahosted.org/pki/ticket/1182" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-015: Should not be able to add group using a agent with revoked cert KRA_agentR" command="pki -d $CERTDB_DIR -n $(eval echo \$${subsystemId}_agentR_user) -c $CERTDB_DIR_PASSWORD -h $KRA_HOST -p $KRA_PORT kra-group-add --description='$desc' $group1" errmsg="PKIException: Unauthorized" errorcode=255 rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - Add Group -- using a revoked agent cert KRA_agentR" rlLog "PKI Ticket: https://fedorahosted.org/pki/ticket/1134" rlLog "PKI Ticket: https://fedorahosted.org/pki/ticket/1182" rlPhaseEnd ##### Tests to add groups using an agent user##### rlPhaseStartTest "pki_kra_group_cli_kra_group_add-016: Should not be able to add group using a valid agent KRA_agentV user" command="pki -d $CERTDB_DIR -n $(eval echo \$${subsystemId}_agentV_user) -c $CERTDB_DIR_PASSWORD -h $KRA_HOST -p $KRA_PORT kra-group-add --description='$desc' $group1" errmsg="ForbiddenException: Authorization Error" errorcode=255 rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - Add Group -- using a valid agent cert KRA_agentV" rlPhaseEnd ##### Tests to add groups using expired cert##### rlPhaseStartTest "pki_kra_group_cli_kra_group_add-017: Should not be able to add group using admin user with expired cert KRA_adminE" rlRun "date --set='next day'" 0 "Set System date a day ahead" rlRun "date --set='next day'" 0 "Set System date a day ahead" rlRun "date" command="pki -d $CERTDB_DIR -n $(eval echo \$${subsystemId}_adminE_user) -c $CERTDB_DIR_PASSWORD -h $KRA_HOST -p $KRA_PORT kra-group-add --description='$desc' $group1" errmsg="ForbiddenException: Authorization Error" errorcode=255 rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - Add Group -- using an expired admin cert KRA_adminE" rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/962" rlRun "date --set='2 days ago'" 0 "Set System back to the present day" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-018: Should not be able to add group using KRA_agentE cert" rlRun "date --set='next day'" 0 "Set System date a day ahead" rlRun "date --set='next day'" 0 "Set System date a day ahead" rlRun "date" command="pki -d $CERTDB_DIR -n $(eval echo \$${subsystemId}_agentE_user) -c $CERTDB_DIR_PASSWORD -h $KRA_HOST -p $KRA_PORT kra-group-add --description='$desc' $group1" errmsg="ForbiddenException: Authorization Error" errorcode=255 rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - Add Group -- using an expired agent cert KRA_agentE" rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/962" rlRun "date --set='2 days ago'" 0 "Set System back to the present day" rlPhaseEnd ##### Tests to add groups using audit users##### rlPhaseStartTest "pki_kra_group_cli_kra_group_add-019: Should not be able to add group using a KRA_auditV" command="pki -d $CERTDB_DIR -n $(eval echo \$${subsystemId}_auditV_user) -c $CERTDB_DIR_PASSWORD -h $KRA_HOST -p $KRA_PORT kra-group-add --description='$desc' $group1" errmsg="ForbiddenException: Authorization Error" errorcode=255 rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - Add Group -- using a valid auditor cert KRA_auditorV" rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/962" rlPhaseEnd ##### Tests to add groups using operator user### rlPhaseStartTest "pki_kra_group_cli_kra_group_add-020: Should not be able to add group using a KRA_operatorV" command="pki -d $CERTDB_DIR -n $(eval echo \$${subsystemId}_operatorV_user) -c $CERTDB_DIR_PASSWORD -h $KRA_HOST -p $KRA_PORT kra-group-add --description='$desc' $group1" errmsg="ForbiddenException: Authorization Error" errorcode=255 rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - Add Group -- using KRA_operatorV" rlPhaseEnd ##### Tests to add groups using KRA_adminUTCA and KRA_agentUTCA user's certificate will be issued by an untrusted CA users##### rlPhaseStartTest "pki_kra_group_cli_kra_group_add-021: Should not be able to add group using a cert created from a untrusted CA" command="pki -d $UNTRUSTED_CERT_DB_LOCATION -n role_user_UTCA -c $UNTRUSTED_CERT_DB_PASSWORD -h $KRA_HOST -p $KRA_PORT kra-group-add --description='$desc' $group1" errmsg="PKIException: Unauthorized" errorcode=255 rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - Add Group -- using KRA_adminUTCA" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-022: group id length exceeds maximum limit defined in the schema" group_length_exceed_max=$(openssl rand -hex 10000 | perl -p -e 's/\n//') command="pki -d $CERTDB_DIR -n $(eval echo \$${subsystemId}_adminV_user) -c $CERTDB_DIR_PASSWORD -h $KRA_HOST -p $KRA_PORT kra-group-add --description=test '$group_length_exceed_max'" errmsg="ClientResponseFailure: ldap can't save, exceeds max length" errorcode=255 rlRun "verifyErrorMsg \"$command\" \"$errmsg\" \"$errorcode\"" 0 "Verify expected error message - Add Group -- group id exceeds max limit" rlLog "PKI Ticket:: https://fedorahosted.org/pki/ticket/842" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-023: description with i18n characters" rlLog "kra-group-add description Örjan Äke with i18n characters" rlLog "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description='Örjan Äke' g4" rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description='Örjan Äke' g4 > $TmpDir/pki-kra-group-add-001_51.out 2>&1" \ 0 \ "Adding g4 with description Örjan Äke" rlAssertGrep "Added group \"g4\"" "$TmpDir/pki-kra-group-add-001_51.out" rlAssertGrep "Group ID: g4" "$TmpDir/pki-kra-group-add-001_51.out" rlAssertGrep "Description: Örjan Äke" "$TmpDir/pki-kra-group-add-001_51.out" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-024: description with i18n characters" rlLog "kra-group-add description Éric Têko with i18n characters" rlLog "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description='Éric Têko' g5" rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description='Éric Têko' g5 > $TmpDir/pki-kra-group-add-001_52.out 2>&1" \ 0 \ "Adding g5 with description Éric Têko" rlAssertGrep "Added group \"g5\"" "$TmpDir/pki-kra-group-add-001_52.out" rlAssertGrep "Group ID: g5" "$TmpDir/pki-kra-group-add-001_52.out" rlAssertGrep "Description: Éric Têko" "$TmpDir/pki-kra-group-add-001_52.out" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-025: description with i18n characters" rlLog "kra-group-add description éénentwintig dvidešimt with i18n characters" rlLog "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description='éénentwintig dvidešimt' g6" rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description='éénentwintig dvidešimt' g6 > $TmpDir/pki-kra-group-add-001_53.out 2>&1" \ 0 \ "Adding description éénentwintig dvidešimt with i18n characters" rlAssertGrep "Added group \"g6\"" "$TmpDir/pki-kra-group-add-001_53.out" rlAssertGrep "Description: éénentwintig dvidešimt" "$TmpDir/pki-kra-group-add-001_53.out" rlAssertGrep "Group ID: g6" "$TmpDir/pki-kra-group-add-001_53.out" rlLog "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-show g6" rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-show g6 > $TmpDir/pki-kra-group-add-001_53_2.out 2>&1" \ 0 \ "Show group g6 with description éénentwintig dvidešimt in i18n characters" rlAssertGrep "Group \"g6\"" "$TmpDir/pki-kra-group-add-001_53_2.out" rlAssertGrep "Description: éénentwintig dvidešimt" "$TmpDir/pki-kra-group-add-001_53_2.out" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-026: group id with i18n characters" rlLog "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description=test 'ÖrjanÄke'" rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description=test 'ÖrjanÄke' > $TmpDir/pki-kra-group-add-001_56.out 2>&1" \ 0 \ "Adding gid ÖrjanÄke with i18n characters" rlAssertGrep "Added group \"ÖrjanÄke\"" "$TmpDir/pki-kra-group-add-001_56.out" rlAssertGrep "Group ID: ÖrjanÄke" "$TmpDir/pki-kra-group-add-001_56.out" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_add-027: groupid with i18n characters" rlLog "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description=test 'ÉricTêko'" rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-add --description=test 'ÉricTêko' > $TmpDir/pki-kra-group-add-001_57.out 2>&1" \ 0 \ "Adding group id ÉricTêko with i18n characters" rlAssertGrep "Added group \"ÉricTêko\"" "$TmpDir/pki-kra-group-add-001_57.out" rlAssertGrep "Group ID: ÉricTêko" "$TmpDir/pki-kra-group-add-001_57.out" rlPhaseEnd rlPhaseStartTest "pki_kra_group_cli_kra_group_cleanup: Deleting groups" #===Deleting groups created using KRA_adminV cert===# i=1 while [ $i -lt 8 ] ; do rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-del g$i > $TmpDir/pki-kra-group-del-group-00$i.out" \ 0 \ "Deleted group g$i" rlAssertGrep "Deleted group \"g$i\"" "$TmpDir/pki-kra-group-del-group-00$i.out" let i=$i+1 done #===Deleting groups(symbols) created using KRA_adminV cert===# j=1 while [ $j -lt 8 ] ; do eval grp=\$group$j rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-del '$grp' > $TmpDir/pki-kra-group-del-group-symbol-00$j.out" \ 0 \ "Deleted group $grp" actual_delete_group_string=`cat $TmpDir/pki-kra-group-del-group-symbol-00$j.out | grep 'Deleted group' | xargs echo` expected_delete_group_string="Deleted group $grp" if [[ $actual_delete_group_string = $expected_delete_group_string ]] ; then rlPass "Deleted group \"$grp\" found in $TmpDir/pki-kra-group-del-group-symbol-00$j.out" else rlFail "Deleted group \"$grp\" not found in $TmpDir/pki-kra-group-del-group-symbol-00$j.out" fi let j=$j+1 done #===Deleting i18n groups created using CA_adminV cert===# rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-del 'ÖrjanÄke' > $TmpDir/pki-kra-group-del-group-i18n_1.out" \ 0 \ "Deleted group ÖrjanÄke" rlAssertGrep "Deleted group \"ÖrjanÄke\"" "$TmpDir/pki-kra-group-del-group-i18n_1.out" rlRun "pki -d $CERTDB_DIR \ -n $(eval echo \$${subsystemId}_adminV_user) \ -c $CERTDB_DIR_PASSWORD \ -h $KRA_HOST \ -p $KRA_PORT \ kra-group-del 'ÉricTêko' > $TmpDir/pki-kra-group-del-group-i18n_2.out" \ 0 \ "Deleted group ÉricTêko" rlAssertGrep "Deleted group \"ÉricTêko\"" "$TmpDir/pki-kra-group-del-group-i18n_2.out" #Delete temporary directory rlRun "popd" rlRun "rm -r $TmpDir" 0 "Removing tmp directory" rlPhaseEnd }