def teardown_method(self): clr_env.clear_env('gw') clr_env.clear_met_acl('gw') fun.cmd(self.case1_step7["step2"][0], 'gw') fun.send(rbmExc, message.verifymod_DelAuthCert['DelAuthCert'], domain_rmb, base_path) clr_env.verifymod_teardown_met(base_path)
def teardown_method(self): clr_env.clear_met_acl() # 判断抓包程序是否停止,如果进程还在则停止 fun.pid_kill(self.cap_pcap1) fun.pid_kill(self.cap_pcap2) fun.pid_kill(self.cap_pcap3)
def setup_method(self): print('说明:CA测试涉及到的三个证书如下\n' '1.根证书/usr/local/ipauth/file/CAdb/cacert.pem md5值为c970dfa3234ed84ccac2e819a1276026有效期为2020/6/30 到 2023/6/30,若证书失效需替换\n' '2.认证服务设备端证书/usr/local/ipauth/file/ordinaryUser/app.crt有效期为2021/7/14 到 2023/7/14,若证书失效需替换\n' '3.客户端证书test2certandkey.pem有效期为2021/7/14 到 2023/7/14,,若证书失效需替换\n') clr_env.clear_env('gw') clr_env.clear_met_acl('gw')
def teardown_method(self): clr_env.clear_env('gw') clr_env.clear_met_acl('gw') fun.cmd("rm -f /opt/*txt*", 'c') re1 = fun.cmd("ls /opt/ |grep txt", 'c') print('客户端txt文件查询结果是:', re1) assert self.case_step2["step1"][0] not in re1
def teardown_method(self): clr_env.clear_env('gw') clr_env.clear_met_acl('gw') fun.cmd(self.case_step["step1"][0], 'c') fun.cmd(self.case_step["step1"][0], 's')
def teardown_method(self): clr_env.clear_env('gw') clr_env.clear_met_acl('gw') fun.send(rbmExc, message.verifymod_expired_DelAuthCert['DelAuthCert'], domain_rmb, base_path) fun.send(rbmExc, message.verifymod_DelAuthCert['DelAuthCert'], domain_rmb, base_path) clr_env.verifymod_teardown_met(base_path)
def teardown_method(self): clr_env.clear_env('gw') clr_env.clear_met_acl('gw') fun.cmd(self.case_step["step1"][0], 'c') fun.cmd(self.case_step["step1"][0], 's') fun.cmd("rm -f /opt/cipso*.txt", 'c') re1 = fun.cmd("ls /opt/ |grep txt", 'c') assert self.cipso_cat["txt"][0] not in re1
def teardown_method(self): clr_env.clear_met_acl() fun.pid_kill(self.cap_pcap1) fun.pid_kill(self.cap_pcap2) fun.pid_kill(self.cap_pcap3) fun.pid_kill(self.cap_pcap4) fun.pid_kill(self.cap_pcap5) fun.pid_kill(self.cap_pcap6) fun.pid_kill(self.cap_pcap7) fun.pid_kill(self.cap_pcap8)
def teardown_method(self): clr_env.clear_met_acl() fun.pid_kill(self.cap_pcap1, 'python', 's') fun.pid_kill(self.cap_pcap2, 'python', 's') fun.pid_kill(self.cap_pcap3, 'python', 's') fun.pid_kill(self.cap_pcap4, 'python', 's') fun.pid_kill(self.cap_pcap5, 'python', 's') fun.pid_kill(self.cap_pcap6, 'python', 's') fun.pid_kill(self.cap_pcap7, 'python', 's') fun.pid_kill(self.cap_pcap8, 'python', 's')
def teardown_method(self): clr_env.clear_env('gw') clr_env.clear_met_acl('gw') fun.cmd(self.case3_step3["step1"][0], 'gw') fun.cmd(self.case1_step6["step1"][1], 'gw') fun.send(rbmExc, message.verifymod_DelAuthCert['DelAuthCert'], domain_rmb, base_path) clr_env.verifymod_teardown_met(base_path) fun.cmd("rm -f /opt/verifymod*.txt", 'c') re1 = fun.cmd("ls /opt/ |grep txt", 'c') assert self.case3_step2["step2"][0] not in re1
def setup_method(self): clr_env.clear_met_acl()
def teardown_method(self): clr_env.clear_met_acl()
def teardown_method(self): clr_env.clear_met_acl() fun.iperf_kill()
def teardown_method(self): clr_env.clear_met_acl() fun.pid_kill(self.cap_pcap1, 'python', 's')
def teardown_method(self): clr_env.clear_env('gw') clr_env.clear_met_acl('gw') clr_env.verifymod_teardown_met(base_path)