From 5e2d4ba7b1cffa7fcf29c952f3434cac8bf98952 Mon Sep 17 00:00:00 2001 From: Remigiusz Janeczek Date: Thu, 29 Jul 2021 12:48:18 +0200 Subject: [PATCH] CertService CSITs naming update Issue-ID: OOM-2752 Signed-off-by: Remigiusz Janeczek Change-Id: I509b05d5ec2eb64ab894d07e0d59fc07b9d66649 --- .../certservice/cert-service-test.robot | 28 +++++++++++----------- 1 file changed, 14 insertions(+), 14 deletions(-) diff --git a/tests/oom-platform-cert-service/certservice/cert-service-test.robot b/tests/oom-platform-cert-service/certservice/cert-service-test.robot index a0934541..c8ecb3ab 100644 --- a/tests/oom-platform-cert-service/certservice/cert-service-test.robot +++ b/tests/oom-platform-cert-service/certservice/cert-service-test.robot @@ -23,12 +23,12 @@ Check if application is ready [Documentation] Send request to /ready endpoint and expect 200 Send Get Request And Validate Response /ready 200 -Generate Certificate In RA Mode For CA Name +Generate Certificate In RA Endpoint For CA Name [Tags] OOM-CERT-SERVICE CERTIFICATE-INITIALIZATION [Documentation] Send request to ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} endpoint and expect 200 Send Get Request with Header And Expect Success ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} ${VALID_RA_CSR_FILE} ${VALID_RA_PK_FILE} -Generate Certificate with all Sans types In RA Mode For CA Name +Generate Certificate with all Sans types In RA Endpoint For CA Name [Tags] OOM-CERT-SERVICE CERTIFICATE-INITIALIZATION [Documentation] Send request to ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} endpoint and expect 200 Send Get Request with Header And Expect Success ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} ${VALID_RA_ALL_SANS_CSR_FILE} ${VALID_RA_ALL_SANS_PK_FILE} @@ -53,73 +53,73 @@ Report Bad Request Error When PK Is Not Valid [Documentation] Send request to ${CERT_SERVICE_ENDPOINT}${CLIENT_CA_NAME} endpoint and expect 400 Send Get Request with Header And Expect Error ${CERT_SERVICE_ENDPOINT}${CLIENT_CA_NAME} ${VALID_CLIENT_CSR_FILE} ${INVALID_PK_FILE} 400 -Update Certificate With Key Update Request In RA Mode Should Succeed +Update Certificate With Key Update Request In RA Endpoint Should Succeed [Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE [Documentation] Send Initialization Request to ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} then for received certificate send Key Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint and expect 200 Send Initialization Request And Key Update Request And Expect Success ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} ... ${VALID_IR_CSR_FOR_UPDATE} ${VALID_IR_KEY_FOR_UPDATE} ${VALID_KUR_CSR} ${VALID_KUR_KEY} -Update Certificate With Certification Request When Subject Changed In RA Mode Should Succeed +Update Certificate With Certification Request When Subject Changed In RA Endpoint Should Succeed [Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE [Documentation] Send Initialization Request to ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} then for received certificate send Key Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint and expect 200 Send Initialization Request And Certification Request And Expect Success ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} ... ${VALID_IR_CSR_FOR_UPDATE} ${VALID_IR_KEY_FOR_UPDATE} ${VALID_CR_CSR_CHANGED_SUBJECT} ${VALID_CR_KEY_CHANGED_SUBJECT} -Update Certificate With Certification Request When Sans Changed In RA Mode Should Succeed +Update Certificate With Certification Request When Sans Changed In RA Endpoint Should Succeed [Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE [Documentation] Send Initialization Request to ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} then for received certificate send Key Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint and expect 200 Send Initialization Request And Certification Request And Expect Success ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} ... ${VALID_IR_CSR_FOR_UPDATE} ${VALID_IR_KEY_FOR_UPDATE} ${VALID_CR_CSR_CHANGED_SANS} ${VALID_CR_KEY_CHANGED_SANS} -Update Certificate With Key Update Request In RA Mode Should Fail When Wrong Old Private Key Is Used +Update Certificate With Key Update Request In RA Endpoint Should Fail When Wrong Old Private Key Is Used [Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE [Documentation] Send Initialization Request to ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} then for received certificate send Key Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint and expect 500 Send Initialization Request And Key Update Request With Wrong Old Private Key And Expect Error ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} ... ${VALID_IR_CSR_FOR_UPDATE} ${VALID_IR_KEY_FOR_UPDATE} ${VALID_KUR_CSR} ${VALID_KUR_KEY} ${INVALID_IR_KEY_FOR_UPDATE} -Update Certificate In RA Mode Should Fail When OLD_CERT Header Is Incorrect +Update Certificate In RA Endpoint Should Fail When OLD_CERT Header Is Incorrect [Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE [Documentation] Send Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint with wrong OLD_CERT header and expect 400 Send Update Request With Wrong Header And Expect Error ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} ... ${VALID_KUR_CSR} ${VALID_KUR_KEY} ${INVALID_OLD_CERT_BASE64} ${VALID_IR_KEY_FOR_UPDATE} -Update Certificate In RA Mode Should Fail When OLD_CERT Header Is Missing +Update Certificate In RA Endpoint Should Fail When OLD_CERT Header Is Missing [Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE [Documentation] Send Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint with missing OLD_CERT header and expect 400 Send Update Request With Missing Header And Expect Error ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} ... ${VALID_KUR_CSR} ${VALID_KUR_KEY} ${VALID_OLD_CERT_BASE64} ${VALID_IR_KEY_FOR_UPDATE} OLD_CERT -Update Certificate In RA Mode Should Fail When OLD_PK Header Is Incorrect +Update Certificate In RA Endpoint Should Fail When OLD_PK Header Is Incorrect [Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE [Documentation] Send Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint with wrong OLD_PK header and expect 400 Send Update Request With Wrong Header And Expect Error ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} ... ${VALID_KUR_CSR} ${VALID_KUR_KEY} ${VALID_OLD_CERT_BASE64} ${INVALID_PK_FILE} -Update Certificate In RA Mode Should Fail When OLD_PK Header Is Missing +Update Certificate In RA Endpoint Should Fail When OLD_PK Header Is Missing [Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE [Documentation] Send Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint with missing OLD_PK header and expect 400 Send Update Request With Missing Header And Expect Error ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} ... ${VALID_KUR_CSR} ${VALID_KUR_KEY} ${VALID_OLD_CERT_BASE64} ${VALID_IR_KEY_FOR_UPDATE} OLD_PK -Update Certificate In RA Mode Should Fail When CSR Header Is Incorrect +Update Certificate In RA Endpoint Should Fail When CSR Header Is Incorrect [Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE [Documentation] Send Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint with wrong CSR header and expect 400 Send Update Request With Wrong Header And Expect Error ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} ... ${INVALID_CSR_FILE} ${VALID_KUR_KEY} ${VALID_OLD_CERT_BASE64} ${VALID_IR_KEY_FOR_UPDATE} -Update Certificate In RA Mode Should Fail When CSR Header Is Missing +Update Certificate In RA Endpoint Should Fail When CSR Header Is Missing [Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE [Documentation] Send Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint with missing CSR header and expect 400 Send Update Request With Missing Header And Expect Error ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} ... ${VALID_KUR_CSR} ${VALID_KUR_KEY} ${VALID_OLD_CERT_BASE64} ${VALID_IR_KEY_FOR_UPDATE} CSR -Update Certificate In RA Mode Should Fail When PK Header Is Incorrect +Update Certificate In RA Endpoint Should Fail When PK Header Is Incorrect [Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE [Documentation] Send Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint with wrong PK header and expect 400 Send Update Request With Wrong Header And Expect Error ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} ... ${VALID_KUR_CSR} ${INVALID_PK_FILE} ${VALID_OLD_CERT_BASE64} ${VALID_IR_KEY_FOR_UPDATE} -Update Certificate In RA Mode Should Fail When PK Header Is Missing +Update Certificate In RA Endpoint Should Fail When PK Header Is Missing [Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE [Documentation] Send Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint with missing PK header and expect 400 Send Update Request With Missing Header And Expect Error ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} -- 2.16.6