mirror of
https://github.com/laurivosandi/certidude
synced 2024-11-05 04:48:12 +00:00
52 lines
1.6 KiB
Python
52 lines
1.6 KiB
Python
import os
|
|
import pwd
|
|
import pytest
|
|
from click.testing import CliRunner
|
|
from certidude.cli import entry_point as cli
|
|
|
|
runner = CliRunner()
|
|
|
|
def user_check(name='certidude'):
|
|
try:
|
|
pwd.getpwnam(name)
|
|
return False
|
|
except KeyError:
|
|
pass
|
|
return True
|
|
|
|
def test_cli_setup_authority():
|
|
# Authority setup
|
|
# TODO: parent, common-name, country, state, locality
|
|
# {authority,certificate,revocation-list}-lifetime
|
|
# organization, organizational-unit
|
|
# pkcs11
|
|
# {crl-distribution,ocsp-responder}-url
|
|
# email-address
|
|
# inbox, outbox
|
|
with runner.isolated_filesystem():
|
|
result = runner.invoke(cli, ['setup', 'authority', 'ca'])
|
|
|
|
assert not result.exception
|
|
# Check whether required files were generated
|
|
for f in ('ca_key.pem', 'ca_crt.pem', 'ca_crl.pem',
|
|
'serial', 'openssl.cnf.example'):
|
|
assert os.path.isfile(os.path.join('ca', f))
|
|
for d in ('requests', 'revoked', 'signed'):
|
|
assert os.path.isdir(os.path.join('ca', d))
|
|
|
|
def test_cli_setup_authority_invalid_name():
|
|
with runner.isolated_filesystem():
|
|
result = runner.invoke(cli, ['setup', 'authority'])
|
|
assert result.exception
|
|
|
|
result = runner.invoke(cli, ['setup', 'authority', '""'])
|
|
assert result.exception
|
|
|
|
def test_cli_setup_authority_overwrite():
|
|
with runner.isolated_filesystem():
|
|
result = runner.invoke(cli, ['setup', 'authority', 'foo'])
|
|
assert not result.exception
|
|
|
|
result = runner.invoke(cli, ['setup', 'authority', 'foo'])
|
|
assert result.exception
|