Compare commits
No commits in common. "c9-beta" and "c9s" have entirely different histories.
16
.gitignore
vendored
16
.gitignore
vendored
@ -1 +1,15 @@
|
|||||||
SOURCES/jackson-modules-base-2.14.1.tar.gz
|
/results_*
|
||||||
|
/*.src.rpm
|
||||||
|
|
||||||
|
/jackson-modules-base-2.9.8.tar.gz
|
||||||
|
/jackson-modules-base-2.10.0.tar.gz
|
||||||
|
/jackson-modules-base-2.10.1.tar.gz
|
||||||
|
/jackson-modules-base-2.10.2.tar.gz
|
||||||
|
/jackson-modules-base-2.10.3.tar.gz
|
||||||
|
/jackson-modules-base-2.10.4.tar.gz
|
||||||
|
/jackson-modules-base-2.11.0.tar.gz
|
||||||
|
/jackson-modules-base-2.11.1.tar.gz
|
||||||
|
/jackson-modules-base-2.11.2.tar.gz
|
||||||
|
/jackson-modules-base-2.11.3.tar.gz
|
||||||
|
/jackson-modules-base-2.11.4.tar.gz
|
||||||
|
/jackson-modules-base-2.14.1.tar.gz
|
||||||
|
@ -1 +1 @@
|
|||||||
11b1d5daee50c58f13038bfd92ae28ad86ad428a SOURCES/jackson-modules-base-2.14.1.tar.gz
|
11b1d5daee50c58f13038bfd92ae28ad86ad428a jackson-modules-base-2.14.1.tar.gz
|
||||||
|
7
gating.yaml
Normal file
7
gating.yaml
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
# recipients: rhcs-team
|
||||||
|
--- !Policy
|
||||||
|
product_versions:
|
||||||
|
- rhel-9
|
||||||
|
decision_context: osci_compose_gate
|
||||||
|
rules:
|
||||||
|
- !PassingTestCaseRule {test_case_name: osci.brew-build.tier0.functional}
|
1
sources
Normal file
1
sources
Normal file
@ -0,0 +1 @@
|
|||||||
|
SHA512 (jackson-modules-base-2.14.1.tar.gz) = d87d5917c2d0df93537aaf6b2cfd452530e677ef318a6c3b7ac2f82c5221f9958699c534d5dbe87f2fc17f833e1dfca83ccb775e6001bf89db2e8c94c437faf0
|
25
tests/roles/Test_Setup/files/ca.cfg
Normal file
25
tests/roles/Test_Setup/files/ca.cfg
Normal file
@ -0,0 +1,25 @@
|
|||||||
|
[DEFAULT]
|
||||||
|
pki_server_database_password=Secret.123
|
||||||
|
|
||||||
|
[CA]
|
||||||
|
pki_admin_email=caadmin@example.com
|
||||||
|
pki_admin_name=caadmin
|
||||||
|
pki_admin_nickname=caadmin
|
||||||
|
pki_admin_password=Secret.123
|
||||||
|
pki_admin_uid=caadmin
|
||||||
|
|
||||||
|
pki_client_database_password=Secret.123
|
||||||
|
pki_client_database_purge=False
|
||||||
|
pki_client_pkcs12_password=Secret.123
|
||||||
|
|
||||||
|
pki_ds_base_dn=dc=ca,dc=pki,dc=example,dc=com
|
||||||
|
pki_ds_database=ca
|
||||||
|
pki_ds_password=Secret.123
|
||||||
|
|
||||||
|
pki_security_domain_name=EXAMPLE
|
||||||
|
|
||||||
|
pki_ca_signing_nickname=ca_signing
|
||||||
|
pki_ocsp_signing_nickname=ca_ocsp_signing
|
||||||
|
pki_audit_signing_nickname=ca_audit_signing
|
||||||
|
pki_sslserver_nickname=sslserver
|
||||||
|
pki_subsystem_nickname=subsystem
|
24
tests/roles/Test_Setup/files/ds-create.sh
Normal file
24
tests/roles/Test_Setup/files/ds-create.sh
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
#!/bin/bash -ex
|
||||||
|
|
||||||
|
# This command needs to be executed as it pulls the machine name
|
||||||
|
# dynamically.
|
||||||
|
dscreate create-template /tmp/test_dir/ds.inf
|
||||||
|
|
||||||
|
sed -i \
|
||||||
|
-e "s/;instance_name = .*/instance_name = localhost/g" \
|
||||||
|
-e "s/;root_password = .*/root_password = Secret.123/g" \
|
||||||
|
-e "s/;suffix = .*/suffix = dc=example,dc=com/g" \
|
||||||
|
-e "s/;self_sign_cert = .*/self_sign_cert = False/g" \
|
||||||
|
/tmp/test_dir/ds.inf
|
||||||
|
|
||||||
|
dscreate from-file /tmp/test_dir/ds.inf
|
||||||
|
|
||||||
|
ldapadd -h $HOSTNAME -x -D "cn=Directory Manager" -w Secret.123 << EOF
|
||||||
|
dn: dc=example,dc=com
|
||||||
|
objectClass: domain
|
||||||
|
dc: example
|
||||||
|
|
||||||
|
dn: dc=pki,dc=example,dc=com
|
||||||
|
objectClass: domain
|
||||||
|
dc: pki
|
||||||
|
EOF
|
27
tests/roles/Test_Setup/files/kra.cfg
Normal file
27
tests/roles/Test_Setup/files/kra.cfg
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
[DEFAULT]
|
||||||
|
pki_server_database_password=Secret.123
|
||||||
|
|
||||||
|
[KRA]
|
||||||
|
pki_admin_email=kraadmin@example.com
|
||||||
|
pki_admin_name=kraadmin
|
||||||
|
pki_admin_nickname=kraadmin
|
||||||
|
pki_admin_password=Secret.123
|
||||||
|
pki_admin_uid=kraadmin
|
||||||
|
|
||||||
|
pki_client_database_password=Secret.123
|
||||||
|
pki_client_database_purge=False
|
||||||
|
pki_client_pkcs12_password=Secret.123
|
||||||
|
|
||||||
|
pki_ds_base_dn=dc=kra,dc=pki,dc=example,dc=com
|
||||||
|
pki_ds_database=kra
|
||||||
|
pki_ds_password=Secret.123
|
||||||
|
|
||||||
|
pki_security_domain_name=EXAMPLE
|
||||||
|
pki_security_domain_user=caadmin
|
||||||
|
pki_security_domain_password=Secret.123
|
||||||
|
|
||||||
|
pki_storage_nickname=kra_storage
|
||||||
|
pki_transport_nickname=kra_transport
|
||||||
|
pki_audit_signing_nickname=kra_audit_signing
|
||||||
|
pki_sslserver_nickname=sslserver
|
||||||
|
pki_subsystem_nickname=subsystem
|
26
tests/roles/Test_Setup/tasks/main.yml
Normal file
26
tests/roles/Test_Setup/tasks/main.yml
Normal file
@ -0,0 +1,26 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: Install jackson-modules-base
|
||||||
|
dnf:
|
||||||
|
name: >
|
||||||
|
pki-jackson-module-jaxb-annotations
|
||||||
|
|
||||||
|
- name: Install required packages
|
||||||
|
dnf:
|
||||||
|
name: >
|
||||||
|
389-ds-base, pki-ca, pki-kra
|
||||||
|
|
||||||
|
- name: Creates directory
|
||||||
|
file: path=/tmp/test_files state=directory
|
||||||
|
|
||||||
|
- name: Copying templates to /tmp folder
|
||||||
|
copy : src=. dest=/tmp/test_dir
|
||||||
|
|
||||||
|
- name: Setup DS Service
|
||||||
|
shell: sh /tmp/test_dir/ds-create.sh
|
||||||
|
|
||||||
|
- name: Install CA subsystem
|
||||||
|
shell: pkispawn -f /tmp/test_dir/ca.cfg -s CA -v
|
||||||
|
|
||||||
|
- name: Install KRA subsystem
|
||||||
|
shell: pkispawn -f /tmp/test_dir/kra.cfg -s KRA -v
|
29
tests/tests.yml
Normal file
29
tests/tests.yml
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
- hosts: localhost
|
||||||
|
remote_user: root
|
||||||
|
tags:
|
||||||
|
- classic
|
||||||
|
roles:
|
||||||
|
- role: Test_Setup
|
||||||
|
- role: standard-test-basic
|
||||||
|
tests:
|
||||||
|
- verify_spawn_ca:
|
||||||
|
dir: .
|
||||||
|
run: "curl http://localhost:8080/ca/admin/ca/getStatus | grep '<Status>running</Status>'"
|
||||||
|
- verify_spawn_kra:
|
||||||
|
dir: .
|
||||||
|
run: "curl http://localhost:8080/kra/admin/kra/getStatus | grep '<Status>running</Status>'"
|
||||||
|
- destroy_kra:
|
||||||
|
dir: .
|
||||||
|
run: "pkidestroy -i pki-tomcat -s KRA && sleep 5"
|
||||||
|
- verify_destroy_kra:
|
||||||
|
dir: .
|
||||||
|
run: "curl http://localhost:8080/kra/admin/kra/getStatus | grep 'HTTP Status 404'"
|
||||||
|
- destroy_ca:
|
||||||
|
dir: .
|
||||||
|
run: "pkidestroy -i pki-tomcat -s CA"
|
||||||
|
- verify_destroy_ca:
|
||||||
|
dir: .
|
||||||
|
run: "curl http://localhost:8080/ca/admin/ca/getStatus &> testfile.log || true && grep 'Connection refused' testfile.log"
|
||||||
|
required_packages:
|
||||||
|
- pki-ca
|
||||||
|
- pki-kra
|
Loading…
Reference in New Issue
Block a user