X-Git-Url: https://gerrit.onap.org/r/gitweb?a=blobdiff_plain;f=tests%2Foom-platform-cert-service%2Fcertservice%2Fresources%2Fcert-service-keywords.robot;h=4d05af744adfa6a311e4f9e8ec5328559a05064f;hb=2e07e35b23e1e3f3d2373def701b110cba92295d;hp=fea210b5167f4ceb823b241c48bb2e0191bf3bcb;hpb=b7a057e8017b7899de26f977fa3841882035200b;p=integration%2Fcsit.git diff --git a/tests/oom-platform-cert-service/certservice/resources/cert-service-keywords.robot b/tests/oom-platform-cert-service/certservice/resources/cert-service-keywords.robot index fea210b5..4d05af74 100644 --- a/tests/oom-platform-cert-service/certservice/resources/cert-service-keywords.robot +++ b/tests/oom-platform-cert-service/certservice/resources/cert-service-keywords.robot @@ -5,10 +5,13 @@ Resource ./cert-service-properties.robot Library RequestsLibrary Library HttpLibrary.HTTP Library Collections +Library Process +Library DateTime Library ../libraries/CertClientManager.py ${MOUNT_PATH} ${TRUSTSTORE_PATH} Library ../libraries/P12ArtifactsValidator.py ${MOUNT_PATH} Library ../libraries/JksArtifactsValidator.py ${MOUNT_PATH} Library ../libraries/PemArtifactsValidator.py ${MOUNT_PATH} +Library ../libraries/ResponseParser.py *** Keywords *** @@ -63,9 +66,10 @@ Check Message Recieved On Success List Should Contain Certificates [Documentation] Verify if list contains certificates [Arguments] @{list} - :FOR ${content} IN @{list} - \ Should Contain ${content} BEGIN CERTIFICATE - \ Should Contain ${content} END CERTIFICATE + FOR ${content} IN @{list} + Should Contain ${content} BEGIN CERTIFICATE + Should Contain ${content} END CERTIFICATE + END Send Get Request with Header And Expect Error [Documentation] Send request to passed url and validate received response @@ -87,49 +91,113 @@ Send Post Request And Validate Response ${resp}= Post Request ${https_valid_cert_session} ${path} Should Be Equal As Strings ${resp.status_code} ${resp_code} +Send Initialization Request And Key Update Request And Expect Success + [Documentation] Send initialization request and then key update request to passed urls and validate received response + [Arguments] ${path} ${update_path} ${csr_file} ${pk_file} ${update_csr_file} ${update_pk_file} + ${start_time}= Get Current Timestamp For Docker Log + Send Initialization Request And Update Request And Check Status Code ${path} ${update_path} ${csr_file} ${pk_file} + ... ${update_csr_file} ${update_pk_file} 200 + Verify Key Update Request Sent By Cert Service ${start_time} + +Send Initialization Request And Certification Request And Expect Success + [Documentation] Send initialization request and then certification request to passed urls and validate received response + [Arguments] ${path} ${update_path} ${csr_file} ${pk_file} ${update_csr_file} ${update_pk_file} + ${start_time}= Get Current Timestamp For Docker Log + Send Initialization Request And Update Request And Check Status Code ${path} ${update_path} ${csr_file} ${pk_file} + ... ${update_csr_file} ${update_pk_file} 200 + Verify Certification Request Sent By Cert Service ${start_time} + +Send Initialization Request And Update Request And Check Status Code + [Documentation] Send certificate update request and check status code + [Arguments] ${path} ${update_path} ${csr_file} ${pk_file} ${update_csr_file} ${update_pk_file} ${expected_status_code} + ${old_cert}= Send Certificate Initialization Request And Return Certificate ${path} ${csr_file} ${pk_file} + ${resp}= Send Certificate Update Request And Return Response ${update_path} ${update_csr_file} ${update_pk_file} ${old_cert} ${pk_file} + Should Be Equal As Strings ${resp.status_code} ${expected_status_code} + +Send Certificate Initialization Request And Return Certificate + [Documentation] Send certificate initialization request and return base64 encoded certificate from response + [Arguments] ${path} ${csr_file} ${pk_file} + [Return] ${base64Certificate} + ${resp}= Send Get Request with Header ${path} ${csr_file} ${pk_file} + ${json}= Parse Json ${resp.content} + ${base64Certificate}= Parse Response ${json} + +Send Certificate Update Request And Return Response + [Documentation] Send certificate update request and return response code + [Arguments] ${path} ${csr_file} ${pk_file} ${old_cert} ${old_pk_file} + [Return] ${resp} + ${headers}= Create Header for Certificate Update ${csr_file} ${pk_file} ${old_cert} ${old_pk_file} + ${resp}= Get Request ${https_valid_cert_session} ${path} headers=${headers} + +Create Header for Certificate Update + [Documentation] Create header with CSR and PK, OLD_CERT and OLD_PK + [Arguments] ${csr_file} ${pk_file} ${old_cert} ${old_pk_file} + [Return] ${headers} + ${csr}= Get Data From File ${csr_file} + ${pk}= Get Data From File ${pk_file} + ${old_pk}= Get Data From File ${old_pk_file} + ${headers}= Create Dictionary CSR=${csr} PK=${pk} OLD_CERT=${old_cert} OLD_PK=${old_pk} + +Verify Key Update Request Sent By Cert Service + [Documentation] Verify that request was key update request + [Arguments] ${start_time} + ${result}= Run Process docker logs oomcert-service --since ${start_time} shell=yes + Should Contain ${result.stdout} ${EXPECTED_KUR_LOG} + +Verify Certification Request Sent By Cert Service + [Documentation] Verify that request was certification request + [Arguments] ${start_time} + ${result}= Run Process docker logs oomcert-service --since ${start_time} shell=yes + Should Contain ${result.stdout} ${EXPECTED_CR_LOG} + +Get Current Timestamp For Docker Log + [Documentation] Gets current timestamp valid for docker + [Return] ${timestamp} + ${timestamp}= Get Current Date result_format=%Y-%m-%dT%H:%M:%S.%f + Run Cert Service Client And Validate PKCS12 File Creation And Client Exit Code [Documentation] Run Cert Service Client Container And Validate Exit Code [Arguments] ${env_file} ${expected_exit_code} + [Teardown] Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path ${exit_code}= Run Client Container ${DOCKER_CLIENT_IMAGE} ${CLIENT_CONTAINER_NAME} ${env_file} ${CERT_SERVICE_ADDRESS}${CERT_SERVICE_ENDPOINT} ${CERT_SERVICE_NETWORK} ${can_open}= Can Open Keystore And Truststore With Pass - Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path Should Be Equal As Strings ${exit_code} ${expected_exit_code} Client return: ${exitcode} exit code, but expected: ${expected_exit_code} Should Be True ${can_open} Cannot Open Keystore/TrustStore by passpshase Run Cert Service Client And Validate JKS File Creation And Client Exit Code [Documentation] Run Cert Service Client Container And Validate Exit Code [Arguments] ${env_file} ${expected_exit_code} + [Teardown] Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path ${exit_code}= Run Client Container ${DOCKER_CLIENT_IMAGE} ${CLIENT_CONTAINER_NAME} ${env_file} ${CERT_SERVICE_ADDRESS}${CERT_SERVICE_ENDPOINT} ${CERT_SERVICE_NETWORK} ${can_open}= Can Open Keystore And Truststore With Pass Jks - Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path Should Be Equal As Strings ${exit_code} ${expected_exit_code} Client return: ${exitcode} exit code, but expected: ${expected_exit_code} Should Be True ${can_open} Cannot Open Keystore/TrustStore by passpshase Run Cert Service Client And Validate PKCS12 Files Contain Expected Data [Documentation] Run Cert Service Client Container And Validate PKCS12 Files Contain Expected Data [Arguments] ${env_file} ${expected_exit_code} + [Teardown] Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path_with_data ${exit_code}= Run Client Container ${DOCKER_CLIENT_IMAGE} ${CLIENT_CONTAINER_NAME} ${env_file} ${CERT_SERVICE_ADDRESS}${CERT_SERVICE_ENDPOINT} ${CERT_SERVICE_NETWORK} ${data} ${isEqual}= Get And Compare Data P12 ${env_file} - Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path_with_data Should Be Equal As Strings ${exit_code} ${expected_exit_code} Client return: ${exitcode} exit code, but expected: ${expected_exit_code} Should Be True ${isEqual} Keystore doesn't contain ${data.expectedData}. Actual data is: ${data.actualData} Run Cert Service Client And Validate JKS Files Contain Expected Data [Documentation] Run Cert Service Client Container And Validate JKS Files Contain Expected Data [Arguments] ${env_file} ${expected_exit_code} + [Teardown] Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path_with_data ${exit_code}= Run Client Container ${DOCKER_CLIENT_IMAGE} ${CLIENT_CONTAINER_NAME} ${env_file} ${CERT_SERVICE_ADDRESS}${CERT_SERVICE_ENDPOINT} ${CERT_SERVICE_NETWORK} ${data} ${isEqual}= Get And Compare Data Jks ${env_file} - Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path_with_data Should Be Equal As Strings ${exit_code} ${expected_exit_code} Client return: ${exitcode} exit code, but expected: ${expected_exit_code} Should Be True ${isEqual} Keystore doesn't contain ${data.expectedData}. Actual data is: ${data.actualData} Run Cert Service Client And Validate PEM Files Contain Expected Data [Documentation] Run Cert Service Client Container And Validate PEM Files Contain Expected Data [Arguments] ${env_file} ${expected_exit_code} + [Teardown] Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path_with_data ${exit_code}= Run Client Container ${DOCKER_CLIENT_IMAGE} ${CLIENT_CONTAINER_NAME} ${env_file} ${CERT_SERVICE_ADDRESS}${CERT_SERVICE_ENDPOINT} ${CERT_SERVICE_NETWORK} ${existNotEmpty}= Artifacts Exist And Are Not Empty ${data} ${isEqual}= Get And Compare Data Pem ${env_file} - Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} positive_path_with_data Should Be Equal As Strings ${exit_code} ${expected_exit_code} Client return: ${exitcode} exit code, but expected: ${expected_exit_code} Should Be True ${existNotEmpty} PEM artifacts not created properly Should Be True ${isEqual} Keystore doesn't contain ${data.expectedData}. Actual data is: ${data.actualData} @@ -140,7 +208,7 @@ Run Cert Service Client And Validate Http Response Code And Client Exit Code ${exit_code}= Run Client Container ${DOCKER_CLIENT_IMAGE} ${CLIENT_CONTAINER_NAME} ${env_file} ${CERT_SERVICE_ADDRESS}${CERT_SERVICE_ENDPOINT} ${CERT_SERVICE_NETWORK} ${can_find_API_response}= Can Find Api Response In Logs ${CLIENT_CONTAINER_NAME} ${api_response_code}= Get Api Response From Logs ${CLIENT_CONTAINER_NAME} - Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} negative_path + [Teardown] Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} negative_path Should Be True ${can_find_API_response} Cannot Find API response in logs Should Be Equal As Strings ${api_response_code} ${expected_api_response_code} API return ${api_response_code} but expected: ${expected_api_response_code} Should Be Equal As Strings ${exit_code} ${expected_exit_code} Client return unexpected exit code return: ${exitcode} , but expected: ${expected_exit_code} @@ -148,7 +216,7 @@ Run Cert Service Client And Validate Http Response Code And Client Exit Code Run Cert Service Client And Validate Client Exit Code [Documentation] Run Cert Service Client Container And Validate Exit Code [Arguments] ${env_file} ${expected_exit_code} + [Teardown] Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} negative_path ${exit_code}= Run Client Container ${DOCKER_CLIENT_IMAGE} ${CLIENT_CONTAINER_NAME} ${env_file} ${CERT_SERVICE_ADDRESS}${CERT_SERVICE_ENDPOINT} ${CERT_SERVICE_NETWORK} - Remove Client Container And Save Logs ${CLIENT_CONTAINER_NAME} negative_path Should Be Equal As Strings ${exit_code} ${expected_exit_code} Client return unexpected exit code return: ${exitcode} , but expected: ${expected_exit_code}