Library RequestsLibrary
Library HttpLibrary.HTTP
Library Collections
+Library Process
+Library DateTime
Library ../libraries/CertClientManager.py ${MOUNT_PATH} ${TRUSTSTORE_PATH}
Library ../libraries/P12ArtifactsValidator.py ${MOUNT_PATH}
Library ../libraries/JksArtifactsValidator.py ${MOUNT_PATH}
Library ../libraries/PemArtifactsValidator.py ${MOUNT_PATH}
+Library ../libraries/ResponseParser.py
*** Keywords ***
List Should Contain Certificates
[Documentation] Verify if list contains certificates
[Arguments] @{list}
- :FOR ${content} IN @{list}
- \ Should Contain ${content} BEGIN CERTIFICATE
- \ Should Contain ${content} END CERTIFICATE
+ FOR ${content} IN @{list}
+ Should Contain ${content} BEGIN CERTIFICATE
+ Should Contain ${content} END CERTIFICATE
+ END
Send Get Request with Header And Expect Error
[Documentation] Send request to passed url and validate received response
${resp}= Post Request ${https_valid_cert_session} ${path}
Should Be Equal As Strings ${resp.status_code} ${resp_code}
+Send Initialization Request And Key Update Request And Expect Success
+ [Documentation] Send initialization request and then key update request to passed urls and validate received response
+ [Arguments] ${path} ${update_path} ${csr_file} ${pk_file} ${update_csr_file} ${update_pk_file}
+ ${start_time}= Get Current Timestamp For Docker Log
+ Send Initialization Request And Update Request And Check Status Code ${path} ${update_path} ${csr_file} ${pk_file}
+ ... ${update_csr_file} ${update_pk_file} 200
+ Verify Key Update Request Sent By Cert Service ${start_time}
+
+Send Initialization Request And Certification Request And Expect Success
+ [Documentation] Send initialization request and then certification request to passed urls and validate received response
+ [Arguments] ${path} ${update_path} ${csr_file} ${pk_file} ${update_csr_file} ${update_pk_file}
+ ${start_time}= Get Current Timestamp For Docker Log
+ Send Initialization Request And Update Request And Check Status Code ${path} ${update_path} ${csr_file} ${pk_file}
+ ... ${update_csr_file} ${update_pk_file} 200
+ Verify Certification Request Sent By Cert Service ${start_time}
+
+Send Initialization Request And Update Request And Check Status Code
+ [Documentation] Send certificate update request and check status code
+ [Arguments] ${path} ${update_path} ${csr_file} ${pk_file} ${update_csr_file} ${update_pk_file} ${expected_status_code}
+ ${old_cert}= Send Certificate Initialization Request And Return Certificate ${path} ${csr_file} ${pk_file}
+ ${resp}= Send Certificate Update Request And Return Response ${update_path} ${update_csr_file} ${update_pk_file} ${old_cert} ${pk_file}
+ Should Be Equal As Strings ${resp.status_code} ${expected_status_code}
+
+Send Certificate Initialization Request And Return Certificate
+ [Documentation] Send certificate initialization request and return base64 encoded certificate from response
+ [Arguments] ${path} ${csr_file} ${pk_file}
+ [Return] ${base64Certificate}
+ ${resp}= Send Get Request with Header ${path} ${csr_file} ${pk_file}
+ ${json}= Parse Json ${resp.content}
+ ${base64Certificate}= Parse Response ${json}
+
+Send Certificate Update Request And Return Response
+ [Documentation] Send certificate update request and return response code
+ [Arguments] ${path} ${csr_file} ${pk_file} ${old_cert} ${old_pk_file}
+ [Return] ${resp}
+ ${headers}= Create Header for Certificate Update ${csr_file} ${pk_file} ${old_cert} ${old_pk_file}
+ ${resp}= Get Request ${https_valid_cert_session} ${path} headers=${headers}
+
+Create Header for Certificate Update
+ [Documentation] Create header with CSR and PK, OLD_CERT and OLD_PK
+ [Arguments] ${csr_file} ${pk_file} ${old_cert} ${old_pk_file}
+ [Return] ${headers}
+ ${csr}= Get Data From File ${csr_file}
+ ${pk}= Get Data From File ${pk_file}
+ ${old_pk}= Get Data From File ${old_pk_file}
+ ${headers}= Create Dictionary CSR=${csr} PK=${pk} OLD_CERT=${old_cert} OLD_PK=${old_pk}
+
+Verify Key Update Request Sent By Cert Service
+ [Documentation] Verify that request was key update request
+ [Arguments] ${start_time}
+ ${result}= Run Process docker logs oomcert-service --since ${start_time} shell=yes
+ Should Contain ${result.stdout} ${EXPECTED_KUR_LOG}
+
+Verify Certification Request Sent By Cert Service
+ [Documentation] Verify that request was certification request
+ [Arguments] ${start_time}
+ ${result}= Run Process docker logs oomcert-service --since ${start_time} shell=yes
+ Should Contain ${result.stdout} ${EXPECTED_CR_LOG}
+
+Get Current Timestamp For Docker Log
+ [Documentation] Gets current timestamp valid for docker
+ [Return] ${timestamp}
+ ${timestamp}= Get Current Date result_format=%Y-%m-%dT%H:%M:%S.%f
+
Run Cert Service Client And Validate PKCS12 File Creation And Client Exit Code
[Documentation] Run Cert Service Client Container And Validate Exit Code
[Arguments] ${env_file} ${expected_exit_code}
+ [Teardown] Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path
${exit_code}= Run Client Container ${DOCKER_CLIENT_IMAGE} ${CLIENT_CONTAINER_NAME} ${env_file} ${CERT_SERVICE_ADDRESS}${CERT_SERVICE_ENDPOINT} ${CERT_SERVICE_NETWORK}
${can_open}= Can Open Keystore And Truststore With Pass
- Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path
Should Be Equal As Strings ${exit_code} ${expected_exit_code} Client return: ${exitcode} exit code, but expected: ${expected_exit_code}
Should Be True ${can_open} Cannot Open Keystore/TrustStore by passpshase
Run Cert Service Client And Validate JKS File Creation And Client Exit Code
[Documentation] Run Cert Service Client Container And Validate Exit Code
[Arguments] ${env_file} ${expected_exit_code}
+ [Teardown] Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path
${exit_code}= Run Client Container ${DOCKER_CLIENT_IMAGE} ${CLIENT_CONTAINER_NAME} ${env_file} ${CERT_SERVICE_ADDRESS}${CERT_SERVICE_ENDPOINT} ${CERT_SERVICE_NETWORK}
${can_open}= Can Open Keystore And Truststore With Pass Jks
- Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path
Should Be Equal As Strings ${exit_code} ${expected_exit_code} Client return: ${exitcode} exit code, but expected: ${expected_exit_code}
Should Be True ${can_open} Cannot Open Keystore/TrustStore by passpshase
Run Cert Service Client And Validate PKCS12 Files Contain Expected Data
[Documentation] Run Cert Service Client Container And Validate PKCS12 Files Contain Expected Data
[Arguments] ${env_file} ${expected_exit_code}
+ [Teardown] Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path_with_data
${exit_code}= Run Client Container ${DOCKER_CLIENT_IMAGE} ${CLIENT_CONTAINER_NAME} ${env_file} ${CERT_SERVICE_ADDRESS}${CERT_SERVICE_ENDPOINT} ${CERT_SERVICE_NETWORK}
${data} ${isEqual}= Get And Compare Data P12 ${env_file}
- Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path_with_data
Should Be Equal As Strings ${exit_code} ${expected_exit_code} Client return: ${exitcode} exit code, but expected: ${expected_exit_code}
Should Be True ${isEqual} Keystore doesn't contain ${data.expectedData}. Actual data is: ${data.actualData}
Run Cert Service Client And Validate JKS Files Contain Expected Data
[Documentation] Run Cert Service Client Container And Validate JKS Files Contain Expected Data
[Arguments] ${env_file} ${expected_exit_code}
+ [Teardown] Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path_with_data
${exit_code}= Run Client Container ${DOCKER_CLIENT_IMAGE} ${CLIENT_CONTAINER_NAME} ${env_file} ${CERT_SERVICE_ADDRESS}${CERT_SERVICE_ENDPOINT} ${CERT_SERVICE_NETWORK}
${data} ${isEqual}= Get And Compare Data Jks ${env_file}
- Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path_with_data
Should Be Equal As Strings ${exit_code} ${expected_exit_code} Client return: ${exitcode} exit code, but expected: ${expected_exit_code}
Should Be True ${isEqual} Keystore doesn't contain ${data.expectedData}. Actual data is: ${data.actualData}
Run Cert Service Client And Validate PEM Files Contain Expected Data
[Documentation] Run Cert Service Client Container And Validate PEM Files Contain Expected Data
[Arguments] ${env_file} ${expected_exit_code}
+ [Teardown] Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path_with_data
${exit_code}= Run Client Container ${DOCKER_CLIENT_IMAGE} ${CLIENT_CONTAINER_NAME} ${env_file} ${CERT_SERVICE_ADDRESS}${CERT_SERVICE_ENDPOINT} ${CERT_SERVICE_NETWORK}
${existNotEmpty}= Artifacts Exist And Are Not Empty
${data} ${isEqual}= Get And Compare Data Pem ${env_file}
- Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path_with_data
Should Be Equal As Strings ${exit_code} ${expected_exit_code} Client return: ${exitcode} exit code, but expected: ${expected_exit_code}
Should Be True ${existNotEmpty} PEM artifacts not created properly
Should Be True ${isEqual} Keystore doesn't contain ${data.expectedData}. Actual data is: ${data.actualData}
${exit_code}= Run Client Container ${DOCKER_CLIENT_IMAGE} ${CLIENT_CONTAINER_NAME} ${env_file} ${CERT_SERVICE_ADDRESS}${CERT_SERVICE_ENDPOINT} ${CERT_SERVICE_NETWORK}
${can_find_API_response}= Can Find Api Response In Logs ${CLIENT_CONTAINER_NAME}
${api_response_code}= Get Api Response From Logs ${CLIENT_CONTAINER_NAME}
- Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} negative_path
+ [Teardown] Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} negative_path
Should Be True ${can_find_API_response} Cannot Find API response in logs
Should Be Equal As Strings ${api_response_code} ${expected_api_response_code} API return ${api_response_code} but expected: ${expected_api_response_code}
Should Be Equal As Strings ${exit_code} ${expected_exit_code} Client return unexpected exit code return: ${exitcode} , but expected: ${expected_exit_code}
Run Cert Service Client And Validate Client Exit Code
[Documentation] Run Cert Service Client Container And Validate Exit Code
[Arguments] ${env_file} ${expected_exit_code}
+ [Teardown] Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} negative_path
${exit_code}= Run Client Container ${DOCKER_CLIENT_IMAGE} ${CLIENT_CONTAINER_NAME} ${env_file} ${CERT_SERVICE_ADDRESS}${CERT_SERVICE_ENDPOINT} ${CERT_SERVICE_NETWORK}
- Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} negative_path
Should Be Equal As Strings ${exit_code} ${expected_exit_code} Client return unexpected exit code return: ${exitcode} , but expected: ${expected_exit_code}