--- /dev/null
+{
+ "cmpv2Servers": [
+ {
+ "caName": "TEST",
+ "url": "http://127.0.0.1/ejbca/publicweb/cmp/cmp",
+ "issuerDN": "CN=ManagementCA",
+ "caMode": "CLIENT",
+ "authentication": {
+ "iak": "xxx",
+ "rv": "yyy"
+ }
+ },
+ {
+ "caName": "TEST2",
+ "url": "http://127.0.0.1/ejbca/publicweb/cmp/cmpRA",
+ "issuerDN": "CN=ManagementCA2",
+ "caMode": "RA",
+ "authentication": {
+ "iak": "xxx",
+ "rv": "yyy"
+ }
+ }
+ ]
+}
#!/bin/bash
#
-# Copyright 2017 ZTE Corporation.
+# Copyright 2020 Nokia.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
echo AAFCERT_IMAGE=${AAFCERT_IMAGE}
+# ------------------------------------
+# Resolve path to cmp servers configuration
+
+SCRIPT=`realpath $0`
+CURRENT_WORKDIR_PATH=`dirname $SCRIPT`
+
+CONFIGURATION_FILE="cmpServers.json"
+if test -f "$CURRENT_WORKDIR_PATH/plans/aaf/certservice/$CONFIGURATION_FILE"; then
+ CONFIGURATION_PATH="$CURRENT_WORKDIR_PATH/plans/aaf/certservice/$CONFIGURATION_FILE"
+else test -f "$CURRENT_WORKDIR_PATH/$CONFIGURATION_FILE";
+ CONFIGURATION_PATH=$CURRENT_WORKDIR_PATH/$CONFIGURATION_FILE
+fi
+echo "Use configuration from: $CONFIGURATION_PATH"
+# -------------------------------------
+
# Start AAF Cert Srevice
-docker run -p 8080:8080 -d --name aafcert ${AAFCERT_IMAGE}
+docker run -p 8080:8080 -d --mount type=bind,source=${CONFIGURATION_PATH},target=/etc/onap/aaf/certservice/cmpServers.json --name aafcert ${AAFCERT_IMAGE}
AAFCERT_IP=`get-instance-ip.sh aafcert`
export AAFCERT_IP=${AAFCERT_IP}
*** Settings ***
-Documentation Run healthcheck
+Documentation AAF test case scenarios
Library RequestsLibrary
Resource ./resources/cert-service-keywords.robot
AAF Cert Service API Send Valid CSR and Valid PK
[Tags] AAF-CERT-SERVICE
- [Documentation] Send request to /v1/certificate/test endpoint and expect 200
+ [Documentation] Send request to ${CERT_PATH} endpoint and expect 200
Send Get Request with Header And Validate Response ${CERT_PATH} ${VALID_CSR_FILE} ${VALID_PK_FILE} 200
AAF Cert Service API Send Valid CSR and Valid PK to Wrong Path
AAF Cert Service API Send Request without Header
[Tags] AAF-CERT-SERVICE
- [Documentation] Send request to /v1/certificate/ endpoint and expect 400
+ [Documentation] Send request without header to ${CERT_PATH} endpoint and expect 400
Send Get Request And Validate Response ${CERT_PATH} 400
AAF Cert Service API Send Invalid CSR and Valid PK
[Tags] AAF-CERT-SERVICE
- [Documentation] Send request to /v1/certificate/test endpoint and expect 400
+ [Documentation] Send request to ${CERT_PATH} endpoint and expect 400
Send Get Request with Header And Validate Response ${CERT_PATH} ${INVALID_CSR_FILE} ${VALID_PK_FILE} 400
AAF Cert Service API Send Valid CSR and Invalid PK
[Tags] AAF-CERT-SERVICE
- [Documentation] Send request to /v1/certificate/test endpoint and expect 400
- Send Get Request with Header And Validate Response ${CERT_PATH} ${VALID_CSR_FILE} ${INVALID_PK_FILE} 400
\ No newline at end of file
+ [Documentation] Send request to ${CERT_PATH} endpoint and expect 400
+ Send Get Request with Header And Validate Response ${CERT_PATH} ${VALID_CSR_FILE} ${INVALID_PK_FILE} 400
*** Variables ***
${AAFCERT_URL} http://%{AAFCERT_IP}:8080
-${CAName} test
+${CAName} TEST
${CERT_PATH} /v1/certificate/${CAName}
${VALID_CSR_FILE} %{WORKSPACE}/tests/aaf/certservice/assets/valid.csr
${VALID_PK_FILE} %{WORKSPACE}/tests/aaf/certservice/assets/valid.key