1
0
mirror of https://github.com/laurivosandi/certidude synced 2024-12-22 08:15:18 +00:00

tests: Correct tests for hourly and daily cronjobs

This commit is contained in:
Lauri Võsandi 2018-05-25 08:55:39 +00:00
parent 1bbbf24373
commit 68d4af15dc

View File

@ -163,6 +163,7 @@ def clean_server():
"/etc/certidude/builder.conf", "/etc/certidude/builder.conf",
"/etc/certidude/profile.conf", "/etc/certidude/profile.conf",
"/var/log/certidude.log", "/var/log/certidude.log",
"/etc/cron.daily/certidude",
"/etc/cron.hourly/certidude", "/etc/cron.hourly/certidude",
"/etc/systemd/system/certidude.service", "/etc/systemd/system/certidude.service",
"/etc/nginx/sites-available/ca.conf", "/etc/nginx/sites-available/ca.conf",
@ -277,7 +278,6 @@ def test_cli_setup_authority():
assert_cleanliness() assert_cleanliness()
assert os.path.exists("/var/lib/certidude/signed/ca.example.lan.pem"), "provisioning failed" assert os.path.exists("/var/lib/certidude/signed/ca.example.lan.pem"), "provisioning failed"
assert not os.path.exists("/etc/cron.hourly/certidude")
# Make sure nginx is running # Make sure nginx is running
assert os.system("nginx -t") == 0, "invalid nginx configuration" assert os.system("nginx -t") == 0, "invalid nginx configuration"
@ -1328,6 +1328,7 @@ def test_cli_setup_authority():
assert not os.path.exists("/var/lib/certidude/ca_key.pem") assert not os.path.exists("/var/lib/certidude/ca_key.pem")
assert os.system("certidude setup authority --skip-packages -o 'Demola LLC'") == 0 assert os.system("certidude setup authority --skip-packages -o 'Demola LLC'") == 0
assert os.path.exists("/var/lib/certidude/ca_key.pem") assert os.path.exists("/var/lib/certidude/ca_key.pem")
assert os.path.exists("/etc/cron.daily/certidude")
assert os.path.exists("/etc/cron.hourly/certidude") assert os.path.exists("/etc/cron.hourly/certidude")
@ -1344,10 +1345,6 @@ def test_cli_setup_authority():
assert os.system("sed -e 's/kerberos subnets =.*/kerberos subnets = 0.0.0.0\\/0/g' -i /etc/certidude/server.conf") == 0 assert os.system("sed -e 's/kerberos subnets =.*/kerberos subnets = 0.0.0.0\\/0/g' -i /etc/certidude/server.conf") == 0
# Update server credential cache # Update server credential cache
assert os.system("sed -e 's/dc1/ca/g' -i /etc/cron.hourly/certidude") == 0
with open("/etc/cron.hourly/certidude") as fh:
cronjob = fh.read()
assert "ldap/ca.example.lan" in cronjob, cronjob
assert os.system("/etc/cron.hourly/certidude") == 0 assert os.system("/etc/cron.hourly/certidude") == 0
assert os.path.exists("/run/certidude/krb5cc") assert os.path.exists("/run/certidude/krb5cc")
assert os.stat("/run/certidude/krb5cc").st_uid != 0, "Incorrect persmissions for /run/certidude/krb5cc" assert os.stat("/run/certidude/krb5cc").st_uid != 0, "Incorrect persmissions for /run/certidude/krb5cc"
@ -1510,8 +1507,6 @@ def test_cli_setup_authority():
result = runner.invoke(cli, ['list', '-srv']) result = runner.invoke(cli, ['list', '-srv'])
assert not result.exception, result.output assert not result.exception, result.output
result = runner.invoke(cli, ['expire'])
assert not result.exception, result.output
pid_certidude = int(open("/run/certidude/server.pid").read()) pid_certidude = int(open("/run/certidude/server.pid").read())
assert os.system("systemctl stop certidude") == 0 assert os.system("systemctl stop certidude") == 0