From 3f2a24bd5a0c68834edbf4bd48b8db161d8f51e7 Mon Sep 17 00:00:00 2001 From: Jameer Pathan <21165044+jameerpathan111@users.noreply.github.com> Date: Wed, 24 Apr 2024 10:53:29 +0200 Subject: [PATCH] Delete Certificates related tests as part of component refactor task --- tests/foreman/api/test_discoveredhost.py | 2 +- tests/foreman/api/test_operatingsystem.py | 2 +- tests/foreman/api/test_provisioning.py | 4 +- tests/foreman/sys/test_katello_certs_check.py | 41 +------------------ tests/upgrades/test_role.py | 7 ++++ 5 files changed, 13 insertions(+), 43 deletions(-) diff --git a/tests/foreman/api/test_discoveredhost.py b/tests/foreman/api/test_discoveredhost.py index 59783b9a8b6..976c1812e47 100644 --- a/tests/foreman/api/test_discoveredhost.py +++ b/tests/foreman/api/test_discoveredhost.py @@ -313,7 +313,7 @@ def test_positive_auto_provision_all( :expectedresults: All discovered hosts should be auto-provisioned successfully - :CaseAutomation: NotAutomated + :CaseAutomation: Automated :CaseImportance: High """ diff --git a/tests/foreman/api/test_operatingsystem.py b/tests/foreman/api/test_operatingsystem.py index 9e25a92e167..9263ca6b309 100644 --- a/tests/foreman/api/test_operatingsystem.py +++ b/tests/foreman/api/test_operatingsystem.py @@ -2,7 +2,7 @@ :Requirement: Provisioning -:CaseAutomation: NotAutomated +:CaseAutomation: Automated :CaseComponent: Provisioning diff --git a/tests/foreman/api/test_provisioning.py b/tests/foreman/api/test_provisioning.py index 7d67db042c6..64e65487f19 100644 --- a/tests/foreman/api/test_provisioning.py +++ b/tests/foreman/api/test_provisioning.py @@ -2,7 +2,7 @@ :Requirement: Provisioning -:CaseAutomation: NotAutomated +:CaseAutomation: Automated :CaseComponent: Provisioning @@ -733,4 +733,6 @@ def test_rhel_provisioning_using_realm(): 3. Host installs right version of RHEL 4. Satellite is able to run REX job on the host 5. Host is registered to Satellite and subscription status is 'Success' + + :CaseAutomation: NotAutomated """ diff --git a/tests/foreman/sys/test_katello_certs_check.py b/tests/foreman/sys/test_katello_certs_check.py index 820501f3713..4c4906e3925 100644 --- a/tests/foreman/sys/test_katello_certs_check.py +++ b/tests/foreman/sys/test_katello_certs_check.py @@ -157,28 +157,6 @@ def test_positive_validate_katello_certs_check_output(self, cert_setup_teardown) result = target_sat.execute(command) self.validate_output(result, cert_data) - @pytest.mark.tier1 - def test_katello_certs_check_output_wildcard_inputs(self, cert_setup_teardown): - """Validate that katello-certs-check generates correct output with wildcard certs. - - :id: 7f9da806-5b23-11eb-b7ea-d46d6dd3b5b2 - - :steps: - - 1. Get valid wildcard certs from generate_certs - 2. Run katello-certs-check with the required valid arguments - katello-certs-check -c CERT_FILE -k KEY_FILE -r REQ_FILE - -b CA_BUNDLE_FILE - 3. Assert the output has correct commands with options - - :expectedresults: katello-certs-check should generate correct commands - with options. - """ - cert_data, target_sat = cert_setup_teardown - command = 'katello-certs-check -c certs/wildcard.crt -k certs/wildcard.key -b certs/ca.crt' - result = target_sat.execute(command) - self.validate_output(result, cert_data) - @pytest.mark.parametrize(('error', 'cert_file', 'key_file', 'ca_file'), invalid_inputs) @pytest.mark.tier1 def test_katello_certs_check_output_invalid_input( @@ -234,7 +212,7 @@ def test_negative_check_expiration_of_certificate(self, cert_setup_teardown): :expectedresults: Checking expiration of certificate check should fail. - :CaseAutomation: NotAutomated + :CaseAutomation: Automated """ cert_data, target_sat = cert_setup_teardown hostname = target_sat.hostname @@ -275,20 +253,3 @@ def test_negative_validate_certificate_subject(self): :CaseAutomation: NotAutomated """ - - @pytest.mark.stubbed - @pytest.mark.tier1 - def test_negative_check_private_key_match(self): - """Validate private key match with certificate. - - :id: 358edbb3-08b0-47d7-856b-ce0d5ea95979 - - :steps: - - 1. Have KEY_FILE with invalid private key - 2. Run katello-certs-check with the required arguments - - :expectedresults: Private key match with the certificate should fail. - - :CaseAutomation: NotAutomated - """ diff --git a/tests/upgrades/test_role.py b/tests/upgrades/test_role.py index c2ee4b25d20..e28e0ab5763 100644 --- a/tests/upgrades/test_role.py +++ b/tests/upgrades/test_role.py @@ -165,6 +165,8 @@ def test_pre_default_role_added_permission(self, target_sat): :expectedresults: Permission is added to existing 'Default role'. + :CaseAutomation: Automated + """ default_role = target_sat.api.Role().search(query={'search': 'name="Default role"'})[0] subnet_filter = target_sat.api.Filter( @@ -183,6 +185,8 @@ def test_post_default_role_added_permission(self, target_sat): :expectedresults: The added permission in existing 'Default role' is intact post upgrade + + :CaseAutomation: Automated """ default_role = target_sat.api.Role().search(query={'search': 'name="Default role"'})[0] subnet_filter = target_sat.api.Filter().search( @@ -220,6 +224,7 @@ def test_pre_default_role_added_permission_with_filter(self, target_sat): :expectedresults: Permission with filter is added to existing 'Default role' + :CaseAutomation: Automated """ default_role = target_sat.api.Role().search(query={'search': 'name="Default role"'})[0] domain_filter = target_sat.api.Filter( @@ -241,6 +246,8 @@ def test_post_default_role_added_permission_with_filter(self, target_sat): :expectedresults: The added permission with filter in existing 'Default role' is intact post upgrade + + :CaseAutomation: Automated """ default_role = target_sat.api.Role().search(query={'search': 'name="Default role"'})[0] domain_filter = target_sat.api.Filter().search(