Skip to content

Commit

Permalink
Delete Certificates related tests as part of component refactor task
Browse files Browse the repository at this point in the history
  • Loading branch information
jameerpathan111 committed Apr 24, 2024
1 parent b2d303c commit 3f2a24b
Show file tree
Hide file tree
Showing 5 changed files with 13 additions and 43 deletions.
2 changes: 1 addition & 1 deletion tests/foreman/api/test_discoveredhost.py
Original file line number Diff line number Diff line change
Expand Up @@ -313,7 +313,7 @@ def test_positive_auto_provision_all(
:expectedresults: All discovered hosts should be auto-provisioned
successfully
:CaseAutomation: NotAutomated
:CaseAutomation: Automated
:CaseImportance: High
"""
Expand Down
2 changes: 1 addition & 1 deletion tests/foreman/api/test_operatingsystem.py
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
:Requirement: Provisioning
:CaseAutomation: NotAutomated
:CaseAutomation: Automated
:CaseComponent: Provisioning
Expand Down
4 changes: 3 additions & 1 deletion tests/foreman/api/test_provisioning.py
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
:Requirement: Provisioning
:CaseAutomation: NotAutomated
:CaseAutomation: Automated
:CaseComponent: Provisioning
Expand Down Expand Up @@ -733,4 +733,6 @@ def test_rhel_provisioning_using_realm():
3. Host installs right version of RHEL
4. Satellite is able to run REX job on the host
5. Host is registered to Satellite and subscription status is 'Success'
:CaseAutomation: NotAutomated
"""
41 changes: 1 addition & 40 deletions tests/foreman/sys/test_katello_certs_check.py
Original file line number Diff line number Diff line change
Expand Up @@ -157,28 +157,6 @@ def test_positive_validate_katello_certs_check_output(self, cert_setup_teardown)
result = target_sat.execute(command)
self.validate_output(result, cert_data)

@pytest.mark.tier1
def test_katello_certs_check_output_wildcard_inputs(self, cert_setup_teardown):
"""Validate that katello-certs-check generates correct output with wildcard certs.
:id: 7f9da806-5b23-11eb-b7ea-d46d6dd3b5b2
:steps:
1. Get valid wildcard certs from generate_certs
2. Run katello-certs-check with the required valid arguments
katello-certs-check -c CERT_FILE -k KEY_FILE -r REQ_FILE
-b CA_BUNDLE_FILE
3. Assert the output has correct commands with options
:expectedresults: katello-certs-check should generate correct commands
with options.
"""
cert_data, target_sat = cert_setup_teardown
command = 'katello-certs-check -c certs/wildcard.crt -k certs/wildcard.key -b certs/ca.crt'
result = target_sat.execute(command)
self.validate_output(result, cert_data)

@pytest.mark.parametrize(('error', 'cert_file', 'key_file', 'ca_file'), invalid_inputs)
@pytest.mark.tier1
def test_katello_certs_check_output_invalid_input(
Expand Down Expand Up @@ -234,7 +212,7 @@ def test_negative_check_expiration_of_certificate(self, cert_setup_teardown):
:expectedresults: Checking expiration of certificate check should fail.
:CaseAutomation: NotAutomated
:CaseAutomation: Automated
"""
cert_data, target_sat = cert_setup_teardown
hostname = target_sat.hostname
Expand Down Expand Up @@ -275,20 +253,3 @@ def test_negative_validate_certificate_subject(self):
:CaseAutomation: NotAutomated
"""

@pytest.mark.stubbed
@pytest.mark.tier1
def test_negative_check_private_key_match(self):
"""Validate private key match with certificate.
:id: 358edbb3-08b0-47d7-856b-ce0d5ea95979
:steps:
1. Have KEY_FILE with invalid private key
2. Run katello-certs-check with the required arguments
:expectedresults: Private key match with the certificate should fail.
:CaseAutomation: NotAutomated
"""
7 changes: 7 additions & 0 deletions tests/upgrades/test_role.py
Original file line number Diff line number Diff line change
Expand Up @@ -165,6 +165,8 @@ def test_pre_default_role_added_permission(self, target_sat):
:expectedresults: Permission is added to existing 'Default role'.
:CaseAutomation: Automated
"""
default_role = target_sat.api.Role().search(query={'search': 'name="Default role"'})[0]
subnet_filter = target_sat.api.Filter(
Expand All @@ -183,6 +185,8 @@ def test_post_default_role_added_permission(self, target_sat):
:expectedresults: The added permission in existing 'Default role' is
intact post upgrade
:CaseAutomation: Automated
"""
default_role = target_sat.api.Role().search(query={'search': 'name="Default role"'})[0]
subnet_filter = target_sat.api.Filter().search(
Expand Down Expand Up @@ -220,6 +224,7 @@ def test_pre_default_role_added_permission_with_filter(self, target_sat):
:expectedresults: Permission with filter is added to existing
'Default role'
:CaseAutomation: Automated
"""
default_role = target_sat.api.Role().search(query={'search': 'name="Default role"'})[0]
domain_filter = target_sat.api.Filter(
Expand All @@ -241,6 +246,8 @@ def test_post_default_role_added_permission_with_filter(self, target_sat):
:expectedresults: The added permission with filter in existing
'Default role' is intact post upgrade
:CaseAutomation: Automated
"""
default_role = target_sat.api.Role().search(query={'search': 'name="Default role"'})[0]
domain_filter = target_sat.api.Filter().search(
Expand Down

0 comments on commit 3f2a24b

Please sign in to comment.