aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorRemigiusz Janeczek <remigiusz.janeczek@nokia.com>2021-07-29 12:48:18 +0200
committerRemigiusz Janeczek <remigiusz.janeczek@nokia.com>2021-07-29 12:48:18 +0200
commit5e2d4ba7b1cffa7fcf29c952f3434cac8bf98952 (patch)
tree4c6ceecd166e76ee2522c4863426db90b2457258
parent348fdf02830df41f082b7dbcf55eb84d4897649e (diff)
CertService CSITs naming update
Issue-ID: OOM-2752 Signed-off-by: Remigiusz Janeczek <remigiusz.janeczek@nokia.com> Change-Id: I509b05d5ec2eb64ab894d07e0d59fc07b9d66649
-rw-r--r--tests/oom-platform-cert-service/certservice/cert-service-test.robot28
1 files changed, 14 insertions, 14 deletions
diff --git a/tests/oom-platform-cert-service/certservice/cert-service-test.robot b/tests/oom-platform-cert-service/certservice/cert-service-test.robot
index a0934541..c8ecb3ab 100644
--- a/tests/oom-platform-cert-service/certservice/cert-service-test.robot
+++ b/tests/oom-platform-cert-service/certservice/cert-service-test.robot
@@ -23,12 +23,12 @@ Check if application is ready
[Documentation] Send request to /ready endpoint and expect 200
Send Get Request And Validate Response /ready 200
-Generate Certificate In RA Mode For CA Name
+Generate Certificate In RA Endpoint For CA Name
[Tags] OOM-CERT-SERVICE CERTIFICATE-INITIALIZATION
[Documentation] Send request to ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} endpoint and expect 200
Send Get Request with Header And Expect Success ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} ${VALID_RA_CSR_FILE} ${VALID_RA_PK_FILE}
-Generate Certificate with all Sans types In RA Mode For CA Name
+Generate Certificate with all Sans types In RA Endpoint For CA Name
[Tags] OOM-CERT-SERVICE CERTIFICATE-INITIALIZATION
[Documentation] Send request to ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} endpoint and expect 200
Send Get Request with Header And Expect Success ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} ${VALID_RA_ALL_SANS_CSR_FILE} ${VALID_RA_ALL_SANS_PK_FILE}
@@ -53,73 +53,73 @@ Report Bad Request Error When PK Is Not Valid
[Documentation] Send request to ${CERT_SERVICE_ENDPOINT}${CLIENT_CA_NAME} endpoint and expect 400
Send Get Request with Header And Expect Error ${CERT_SERVICE_ENDPOINT}${CLIENT_CA_NAME} ${VALID_CLIENT_CSR_FILE} ${INVALID_PK_FILE} 400
-Update Certificate With Key Update Request In RA Mode Should Succeed
+Update Certificate With Key Update Request In RA Endpoint Should Succeed
[Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE
[Documentation] Send Initialization Request to ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} then for received certificate send Key Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint and expect 200
Send Initialization Request And Key Update Request And Expect Success ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME}
... ${VALID_IR_CSR_FOR_UPDATE} ${VALID_IR_KEY_FOR_UPDATE} ${VALID_KUR_CSR} ${VALID_KUR_KEY}
-Update Certificate With Certification Request When Subject Changed In RA Mode Should Succeed
+Update Certificate With Certification Request When Subject Changed In RA Endpoint Should Succeed
[Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE
[Documentation] Send Initialization Request to ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} then for received certificate send Key Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint and expect 200
Send Initialization Request And Certification Request And Expect Success ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME}
... ${VALID_IR_CSR_FOR_UPDATE} ${VALID_IR_KEY_FOR_UPDATE} ${VALID_CR_CSR_CHANGED_SUBJECT} ${VALID_CR_KEY_CHANGED_SUBJECT}
-Update Certificate With Certification Request When Sans Changed In RA Mode Should Succeed
+Update Certificate With Certification Request When Sans Changed In RA Endpoint Should Succeed
[Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE
[Documentation] Send Initialization Request to ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} then for received certificate send Key Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint and expect 200
Send Initialization Request And Certification Request And Expect Success ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME}
... ${VALID_IR_CSR_FOR_UPDATE} ${VALID_IR_KEY_FOR_UPDATE} ${VALID_CR_CSR_CHANGED_SANS} ${VALID_CR_KEY_CHANGED_SANS}
-Update Certificate With Key Update Request In RA Mode Should Fail When Wrong Old Private Key Is Used
+Update Certificate With Key Update Request In RA Endpoint Should Fail When Wrong Old Private Key Is Used
[Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE
[Documentation] Send Initialization Request to ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} then for received certificate send Key Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint and expect 500
Send Initialization Request And Key Update Request With Wrong Old Private Key And Expect Error ${CERT_SERVICE_ENDPOINT}${RA_CA_NAME} ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME}
... ${VALID_IR_CSR_FOR_UPDATE} ${VALID_IR_KEY_FOR_UPDATE} ${VALID_KUR_CSR} ${VALID_KUR_KEY} ${INVALID_IR_KEY_FOR_UPDATE}
-Update Certificate In RA Mode Should Fail When OLD_CERT Header Is Incorrect
+Update Certificate In RA Endpoint Should Fail When OLD_CERT Header Is Incorrect
[Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE
[Documentation] Send Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint with wrong OLD_CERT header and expect 400
Send Update Request With Wrong Header And Expect Error ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME}
... ${VALID_KUR_CSR} ${VALID_KUR_KEY} ${INVALID_OLD_CERT_BASE64} ${VALID_IR_KEY_FOR_UPDATE}
-Update Certificate In RA Mode Should Fail When OLD_CERT Header Is Missing
+Update Certificate In RA Endpoint Should Fail When OLD_CERT Header Is Missing
[Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE
[Documentation] Send Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint with missing OLD_CERT header and expect 400
Send Update Request With Missing Header And Expect Error ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME}
... ${VALID_KUR_CSR} ${VALID_KUR_KEY} ${VALID_OLD_CERT_BASE64} ${VALID_IR_KEY_FOR_UPDATE} OLD_CERT
-Update Certificate In RA Mode Should Fail When OLD_PK Header Is Incorrect
+Update Certificate In RA Endpoint Should Fail When OLD_PK Header Is Incorrect
[Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE
[Documentation] Send Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint with wrong OLD_PK header and expect 400
Send Update Request With Wrong Header And Expect Error ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME}
... ${VALID_KUR_CSR} ${VALID_KUR_KEY} ${VALID_OLD_CERT_BASE64} ${INVALID_PK_FILE}
-Update Certificate In RA Mode Should Fail When OLD_PK Header Is Missing
+Update Certificate In RA Endpoint Should Fail When OLD_PK Header Is Missing
[Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE
[Documentation] Send Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint with missing OLD_PK header and expect 400
Send Update Request With Missing Header And Expect Error ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME}
... ${VALID_KUR_CSR} ${VALID_KUR_KEY} ${VALID_OLD_CERT_BASE64} ${VALID_IR_KEY_FOR_UPDATE} OLD_PK
-Update Certificate In RA Mode Should Fail When CSR Header Is Incorrect
+Update Certificate In RA Endpoint Should Fail When CSR Header Is Incorrect
[Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE
[Documentation] Send Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint with wrong CSR header and expect 400
Send Update Request With Wrong Header And Expect Error ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME}
... ${INVALID_CSR_FILE} ${VALID_KUR_KEY} ${VALID_OLD_CERT_BASE64} ${VALID_IR_KEY_FOR_UPDATE}
-Update Certificate In RA Mode Should Fail When CSR Header Is Missing
+Update Certificate In RA Endpoint Should Fail When CSR Header Is Missing
[Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE
[Documentation] Send Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint with missing CSR header and expect 400
Send Update Request With Missing Header And Expect Error ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME}
... ${VALID_KUR_CSR} ${VALID_KUR_KEY} ${VALID_OLD_CERT_BASE64} ${VALID_IR_KEY_FOR_UPDATE} CSR
-Update Certificate In RA Mode Should Fail When PK Header Is Incorrect
+Update Certificate In RA Endpoint Should Fail When PK Header Is Incorrect
[Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE
[Documentation] Send Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint with wrong PK header and expect 400
Send Update Request With Wrong Header And Expect Error ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME}
... ${VALID_KUR_CSR} ${INVALID_PK_FILE} ${VALID_OLD_CERT_BASE64} ${VALID_IR_KEY_FOR_UPDATE}
-Update Certificate In RA Mode Should Fail When PK Header Is Missing
+Update Certificate In RA Endpoint Should Fail When PK Header Is Missing
[Tags] OOM-CERT-SERVICE CERTIFICATE-UPDATE
[Documentation] Send Update Request to ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME} endpoint with missing PK header and expect 400
Send Update Request With Missing Header And Expect Error ${CERT_SERVICE_UPDATE_ENDPOINT}${RA_CA_NAME}