mirror of
https://github.com/laurivosandi/certidude
synced 2024-12-22 16:25:17 +00:00
tests: Add tests for NetworkManager config files
This commit is contained in:
parent
14b5761a36
commit
1bbbf24373
@ -21,6 +21,56 @@ coverage.process_startup()
|
|||||||
UA_FEDORA_FIREFOX = "Mozilla/5.0 (X11; Fedora; Linux x86_64) " \
|
UA_FEDORA_FIREFOX = "Mozilla/5.0 (X11; Fedora; Linux x86_64) " \
|
||||||
"AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36"
|
"AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36"
|
||||||
|
|
||||||
|
NM_OPENVPN = """
|
||||||
|
type = vpn
|
||||||
|
|
||||||
|
[vpn]
|
||||||
|
service-type = org.freedesktop.NetworkManager.openvpn
|
||||||
|
connection-type = tls
|
||||||
|
comp-lzo = no
|
||||||
|
cert-pass-flags = 0
|
||||||
|
tap-dev = no
|
||||||
|
remote-cert-tls = server
|
||||||
|
remote = vpn.example.lan
|
||||||
|
key = /etc/certidude/authority/ca.example.lan/client_key.pem
|
||||||
|
cert = /etc/certidude/authority/ca.example.lan/client_cert.pem
|
||||||
|
ca = /etc/certidude/authority/ca.example.lan/ca_cert.pem
|
||||||
|
tls-cipher = TLS-ECDHE-ECDSA-WITH-AES-256-GCM-SHA384
|
||||||
|
cipher = AES-128-GCM
|
||||||
|
auth = SHA384
|
||||||
|
port = 1194
|
||||||
|
|
||||||
|
[ipv4]
|
||||||
|
method = auto
|
||||||
|
never-default = true
|
||||||
|
|
||||||
|
[ipv6]
|
||||||
|
method = auto
|
||||||
|
|
||||||
|
"""
|
||||||
|
|
||||||
|
NM_STRONGSWAN = """
|
||||||
|
type = vpn
|
||||||
|
|
||||||
|
[vpn]
|
||||||
|
service-type = org.freedesktop.NetworkManager.strongswan
|
||||||
|
encap = no
|
||||||
|
virtual = yes
|
||||||
|
method = key
|
||||||
|
ipcomp = no
|
||||||
|
address = ipsec.example.lan
|
||||||
|
userkey = /etc/certidude/authority/ca.example.lan/client_key.pem
|
||||||
|
usercert = /etc/certidude/authority/ca.example.lan/client_cert.pem
|
||||||
|
certificate = /etc/certidude/authority/ca.example.lan/ca_cert.pem
|
||||||
|
ike = aes256-sha384-prfsha384-ecp384
|
||||||
|
esp = aes128gcm16-aes128gmac-ecp384
|
||||||
|
proposal = yes
|
||||||
|
|
||||||
|
[ipv4]
|
||||||
|
method = auto
|
||||||
|
|
||||||
|
"""
|
||||||
|
|
||||||
smtp=None
|
smtp=None
|
||||||
inbox=[]
|
inbox=[]
|
||||||
|
|
||||||
@ -824,7 +874,9 @@ def test_cli_setup_authority():
|
|||||||
assert not os.path.exists("/run/certidude/ca.example.lan.pid"), result.output
|
assert not os.path.exists("/run/certidude/ca.example.lan.pid"), result.output
|
||||||
assert "Writing certificate to:" in result.output, result.output
|
assert "Writing certificate to:" in result.output, result.output
|
||||||
assert os.path.exists("/etc/NetworkManager/system-connections/OpenVPN to vpn.example.lan")
|
assert os.path.exists("/etc/NetworkManager/system-connections/OpenVPN to vpn.example.lan")
|
||||||
|
with open("/etc/NetworkManager/system-connections/OpenVPN to vpn.example.lan") as fh:
|
||||||
|
buf = fh.read()
|
||||||
|
assert buf.endswith(NM_OPENVPN), buf
|
||||||
|
|
||||||
# Issue token, needs legit router ^
|
# Issue token, needs legit router ^
|
||||||
os.system("certidude token issue userbot")
|
os.system("certidude token issue userbot")
|
||||||
@ -858,6 +910,7 @@ def test_cli_setup_authority():
|
|||||||
|
|
||||||
assert os.system("certidude enroll --skip-self") == 0
|
assert os.system("certidude enroll --skip-self") == 0
|
||||||
|
|
||||||
|
|
||||||
########################
|
########################
|
||||||
# Test image builder ###
|
# Test image builder ###
|
||||||
########################
|
########################
|
||||||
@ -1133,6 +1186,9 @@ def test_cli_setup_authority():
|
|||||||
assert not os.path.exists("/run/certidude/ca.example.lan.pid"), result.output
|
assert not os.path.exists("/run/certidude/ca.example.lan.pid"), result.output
|
||||||
assert "Writing certificate to:" in result.output, result.output
|
assert "Writing certificate to:" in result.output, result.output
|
||||||
assert os.path.exists("/etc/NetworkManager/system-connections/IPSec to ipsec.example.lan")
|
assert os.path.exists("/etc/NetworkManager/system-connections/IPSec to ipsec.example.lan")
|
||||||
|
with open("/etc/NetworkManager/system-connections/IPSec to ipsec.example.lan") as fh:
|
||||||
|
buf = fh.read()
|
||||||
|
assert buf.endswith(NM_STRONGSWAN), buf
|
||||||
|
|
||||||
######################################
|
######################################
|
||||||
### Test revocation on client side ###
|
### Test revocation on client side ###
|
||||||
|
Loading…
Reference in New Issue
Block a user