def smime_profile(request): profile_path = prepare_config( SMIME_PROFILE_TEMPLATE, dict(ipadomain=api.env.domain, iparealm=api.env.realm)) tracker = CertprofileTracker(u'smime', store=True, desc=u"S/MIME certificate profile", profile=profile_path) return tracker.make_fixture(request)
def test_modify_smime_profile(self, smime_profile): updated_profile_path = prepare_config( SMIME_MOD_CONSTR_PROFILE_TEMPLATE, dict(ipadomain=api.env.domain, iparealm=api.env.realm)) with open(updated_profile_path) as f: updated_profile = unicode(f.read()) updates = {u'file': updated_profile} update_smime_profile = smime_profile.make_update_command(updates) update_smime_profile()
def xmlprofile(request): name = u'caIPAserviceCert_xml' profile_path = prepare_config( CA_IPA_SERVICE_XML_TEMPLATE, dict(ipadomain=api.env.domain, ipacertbase=IPA_CERT_SUBJ_BASE)) tracker = CertprofileTracker(name, store=True, desc=u'xml format profile', profile=profile_path) return tracker
def user_profile(request): name = 'caIPAserviceCert_mod' profile_path = prepare_config( CA_IPA_SERVICE_MODIFIED_TEMPLATE, dict(ipadomain=api.env.domain, ipacertbase=IPA_CERT_SUBJ_BASE)) tracker = CertprofileTracker(name, store=True, desc=u'Storing copy of a profile', profile=profile_path) return tracker.make_fixture(request)
def test_update_by_malformed_profile(self, user_profile): profile_path = prepare_config( CA_IPA_SERVICE_MODIFIED_MALFORMED_TEMPLATE, dict(ipadomain=api.env.domain, ipacertbase=IPA_CERT_SUBJ_BASE)) with open(profile_path, ) as f: profile_content = f.read() command = user_profile.make_update_command( dict(file=unicode(profile_content))) with pytest.raises(errors.ExecutionError): command()
def test_modify_smime_profile(self, smime_profile): updated_profile_path = prepare_config(SMIME_MOD_CONSTR_PROFILE_TEMPLATE, dict( ipadomain=api.env.domain, iparealm=api.env.realm)) with open(updated_profile_path) as f: updated_profile = unicode(f.read()) updates = {u'file': updated_profile} update_smime_profile = smime_profile.make_update_command(updates) update_smime_profile()
def xmlprofile(request): name = u'caIPAserviceCert_xml' profile_path = prepare_config( CA_IPA_SERVICE_XML_TEMPLATE, dict( ipadomain=api.env.domain, ipacertbase=IPA_CERT_SUBJ_BASE)) tracker = CertprofileTracker(name, store=True, desc=u'xml format profile', profile=profile_path) return tracker
def malformed(request): name = u'caIPAserviceCert_mal' profile_path = prepare_config( CA_IPA_SERVICE_MALFORMED_TEMPLATE, dict(ipadomain=api.env.domain, ipacertbase=IPA_CERT_SUBJ_BASE)) tracker = CertprofileTracker(name, store=True, desc=u'malformed profile', profile=profile_path) # Do not return with finalizer. There should be nothing to delete return tracker
def malformed(request): name = u'caIPAserviceCert_mal' profile_path = prepare_config( CA_IPA_SERVICE_MALFORMED_TEMPLATE, dict( ipadomain=api.env.domain, ipacertbase=IPA_CERT_SUBJ_BASE)) tracker = CertprofileTracker(name, store=True, desc=u'malformed profile', profile=profile_path) # Do not return with finalizer. There should be nothing to delete return tracker
def user_profile(request): name = 'caIPAserviceCert_mod' profile_path = prepare_config( CA_IPA_SERVICE_MODIFIED_TEMPLATE, dict( ipadomain=api.env.domain, ipacertbase=IPA_CERT_SUBJ_BASE)) tracker = CertprofileTracker( name, store=True, desc=u'Storing copy of a profile', profile=profile_path ) return tracker.make_fixture(request)
def test_update_by_malformed_profile(self, user_profile): profile_path = prepare_config( CA_IPA_SERVICE_MODIFIED_MALFORMED_TEMPLATE, dict( ipadomain=api.env.domain, ipacertbase=IPA_CERT_SUBJ_BASE)) with open(profile_path, ) as f: profile_content = f.read() command = user_profile.make_update_command( dict(file=unicode(profile_content))) with pytest.raises(errors.ExecutionError): command()
def generate_user_csr(username, domain=None): csr_values = dict(ipadomain=domain if domain else api.env.domain, username=username) with tempfile.NamedTemporaryFile(mode='w') as csr_file: run([ paths.OPENSSL, 'req', '-new', '-key', CERT_RSA_PRIVATE_KEY_PATH, '-out', csr_file.name, '-config', prepare_config(CERT_OPENSSL_CONFIG_TEMPLATE, csr_values) ]) with open(csr_file.name, 'r') as f: csr = unicode(f.read()) return csr
def generate_user_csr(username, domain=None): csr_values = dict( ipadomain=domain if domain else api.env.domain, username=username) with tempfile.NamedTemporaryFile(mode='w') as csr_file: run([paths.OPENSSL, 'req', '-new', '-key', CERT_RSA_PRIVATE_KEY_PATH, '-out', csr_file.name, '-config', prepare_config( CERT_OPENSSL_CONFIG_TEMPLATE, csr_values)]) with open(csr_file.name, 'r') as f: csr = unicode(f.read()) return csr