d4c16f51be
* Using ACME test container for acme_account integration test. * Removing dependency on setup_openssl. Waiting for controller and Pebble. * More tinkering. * Reducing number of tries. * One more try. * Another try. * Added acme_certificate tests. * Removed double key. * Added tests for acme_certificate_revoke. * Making task names more meaningful (during certificate generation). * Using newer test container which integrates letsencrypt/pebble#137. Adding test for revoking certificate by its private key. * Using new version of Pebble which limits the random auth delay. * Simplifying certificates for revocation tests. * Reworking acme_certificate tests (there are now more, but they are faster). * Test whether account_key_content works. * Preparing TLS-ALPN-01 support. * Using official Ansible image of testing container on quay.io. * Bumping version. * Bumping version of test container to 1.1.0. * Adjusting to new CI group names. * Pass ACME simulator IP as playbook variable. * Let test plugin wait for controller and CA endpoints to become active. * Refactor common setup parts of tests to setup_acme. * _ -> dummy * Moving common obtain-cert.yml to setup_acme.
64 lines
1.8 KiB
YAML
64 lines
1.8 KiB
YAML
---
|
|
- name: Check that certificate 1 is valid
|
|
assert:
|
|
that:
|
|
- cert_1_valid is not failed
|
|
- name: Check that certificate 1 contains correct SANs
|
|
assert:
|
|
that:
|
|
- "'DNS:example.com' in cert_1_text.stdout"
|
|
|
|
- name: Check that certificate 2 is valid
|
|
assert:
|
|
that:
|
|
- cert_2_valid is not failed
|
|
- name: Check that certificate 2 contains correct SANs
|
|
assert:
|
|
that:
|
|
- "'DNS:*.example.com' in cert_2_text.stdout"
|
|
- "'DNS:example.com' in cert_2_text.stdout"
|
|
|
|
- name: Check that certificate 3 is valid
|
|
assert:
|
|
that:
|
|
- cert_3_valid is not failed
|
|
- name: Check that certificate 3 contains correct SANs
|
|
assert:
|
|
that:
|
|
- "'DNS:*.example.com' in cert_3_text.stdout"
|
|
- "'DNS:example.org' in cert_3_text.stdout"
|
|
- "'DNS:t1.example.com' in cert_3_text.stdout"
|
|
|
|
- name: Check that certificate 4 is valid
|
|
assert:
|
|
that:
|
|
- cert_4_valid is not failed
|
|
- name: Check that certificate 4 contains correct SANs
|
|
assert:
|
|
that:
|
|
- "'DNS:example.com' in cert_4_text.stdout"
|
|
- "'DNS:t1.example.com' in cert_4_text.stdout"
|
|
- "'DNS:test.t2.example.com' in cert_4_text.stdout"
|
|
- "'DNS:example.org' in cert_4_text.stdout"
|
|
- "'DNS:test.example.org' in cert_4_text.stdout"
|
|
|
|
- name: Check that certificate 5 is valid
|
|
assert:
|
|
that:
|
|
- cert_5_valid is not failed
|
|
- name: Check that certificate 5 contains correct SANs
|
|
assert:
|
|
that:
|
|
- "'DNS:t2.example.com' in cert_5_text.stdout"
|
|
- name: Check that certificate 5 was not recreated on the first try
|
|
assert:
|
|
that:
|
|
- cert_5_recreate_1 == False
|
|
- name: Check that certificate 5 was recreated on the second try
|
|
assert:
|
|
that:
|
|
- cert_5_recreate_2 == True
|
|
- name: Check that certificate 5 was recreated on the third try
|
|
assert:
|
|
that:
|
|
- cert_5_recreate_3 == True
|