Skip to content

Commit

Permalink
Update ACME tests (#836)
Browse files Browse the repository at this point in the history
* Restrict remaining days to also work with short-lived profiles.

* Adjust boolean cases.

* Fix spelling error.

* Use larger key size for TLS-ALPN test certificate.
  • Loading branch information
felixfontein authored Jan 12, 2025
1 parent 2482505 commit 0723184
Show file tree
Hide file tree
Showing 17 changed files with 37 additions and 37 deletions.
24 changes: 12 additions & 12 deletions tests/integration/targets/acme_certificate/tasks/impl.yml
Original file line number Diff line number Diff line change
Expand Up @@ -77,7 +77,7 @@
modify_account: true
deactivate_authzs: false
force: false
remaining_days: 10
remaining_days: 1
terms_agreed: true
account_email: "[email protected]"
retrieve_all_alternates: true
Expand All @@ -104,7 +104,7 @@
modify_account: false
deactivate_authzs: true
force: false
remaining_days: 10
remaining_days: 1
terms_agreed: false
account_email: ""
acme_expected_root_number: 0
Expand Down Expand Up @@ -140,7 +140,7 @@
modify_account: false
deactivate_authzs: false
force: false
remaining_days: 10
remaining_days: 1
terms_agreed: false
account_email: ""
acme_expected_root_number: 0
Expand All @@ -167,7 +167,7 @@
modify_account: false
deactivate_authzs: true
force: true
remaining_days: 10
remaining_days: 1
terms_agreed: false
account_email: ""
acme_expected_root_number: 2
Expand All @@ -194,15 +194,15 @@
modify_account: false
deactivate_authzs: true
force: true
remaining_days: 10
remaining_days: 1
terms_agreed: false
account_email: ""
use_csr_content: true
- name: Store obtain results for cert 5a
set_fact:
cert_5a_obtain_results: "{{ certificate_obtain_result }}"
cert_5_alternate: "{{ 0 if select_crypto_backend == 'cryptography' else 0 }}"
- name: Obtain cert 5 (should not, since already there and valid for more than 10 days)
- name: Obtain cert 5 (should not, since already there and valid for more than 1 days)
include_tasks: obtain-cert.yml
vars:
certgen_title: Certificate 5, Iteration 2/4
Expand All @@ -215,7 +215,7 @@
modify_account: false
deactivate_authzs: true
force: false
remaining_days: 10
remaining_days: 1
terms_agreed: false
account_email: ""
use_csr_content: false
Expand Down Expand Up @@ -260,7 +260,7 @@
modify_account: false
deactivate_authzs: true
force: true
remaining_days: 10
remaining_days: 1
terms_agreed: false
account_email: ""
use_csr_content: false
Expand All @@ -283,7 +283,7 @@
modify_account: true
deactivate_authzs: false
force: false
remaining_days: 10
remaining_days: 1
terms_agreed: true
account_email: "[email protected]"
acme_expected_root_number: 0
Expand Down Expand Up @@ -319,7 +319,7 @@
modify_account: true
deactivate_authzs: false
force: false
remaining_days: 10
remaining_days: 1
terms_agreed: true
account_email: "[email protected]"
acme_expected_root_number: 2
Expand All @@ -339,7 +339,7 @@
certgen_title: Certificate 8
certificate_name: cert-8
key_type: rsa
rsa_bits: "{{ default_rsa_key_size }}"
rsa_bits: "{{ default_rsa_key_size_certificates }}"
subject_alt_name:
- "IP:127.0.0.1"
# IPv4 only since our test validation server doesn't work
Expand All @@ -351,7 +351,7 @@
modify_account: true
deactivate_authzs: false
force: false
remaining_days: 10
remaining_days: 1
terms_agreed: true
account_email: "[email protected]"
use_csr_content: true
Expand Down
6 changes: 3 additions & 3 deletions tests/integration/targets/acme_certificate/tests/validate.yml
Original file line number Diff line number Diff line change
Expand Up @@ -118,15 +118,15 @@
- name: Check that certificate 5 was not recreated on the first try
assert:
that:
- cert_5_recreate_1 == False
- cert_5_recreate_1 == false
- name: Check that certificate 5 was recreated on the second try
assert:
that:
- cert_5_recreate_2 == True
- cert_5_recreate_2 == true
- name: Check that certificate 5 was recreated on the third try
assert:
that:
- cert_5_recreate_3 == True
- cert_5_recreate_3 == true

- block:
- name: Check that certificate 6 is valid
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@
- name: Create private keys
openssl_privatekey:
path: '{{ remote_tmp_dir }}/{{ item.name }}.key'
size: '{{ default_rsa_key_size_certifiates }}'
size: '{{ default_rsa_key_size_certificates }}'
loop: '{{ certificates }}'

- name: Generate certificates
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -120,7 +120,7 @@

- name: Check failure when no intermediate certificate can be found
certificate_complete_chain:
input_chain: '{{ lookup("file", "cert2.pem", rstrip=True) }}'
input_chain: '{{ lookup("file", "cert2.pem", rstrip=true) }}'
intermediate_certificates:
- '{{ remote_tmp_dir }}/files/cert1-chain.pem'
root_certificates:
Expand All @@ -135,7 +135,7 @@

- name: Check failure when infinite loop is found
certificate_complete_chain:
input_chain: '{{ lookup("file", "cert1-fullchain.pem", rstrip=True) }}'
input_chain: '{{ lookup("file", "cert1-fullchain.pem", rstrip=true) }}'
intermediate_certificates:
- '{{ remote_tmp_dir }}/files/roots.pem'
root_certificates:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@
- "['organizationalUnitName', 'Crypto Department'] in result.subject_ordered"
- "['organizationalUnitName', 'ACME Department'] in result.subject_ordered"
- result.public_key_type == 'RSA'
- result.public_key_data.size == (default_rsa_key_size_certifiates | int)
- result.public_key_data.size == (default_rsa_key_size_certificates | int)
- "result.subject_alt_name == [
'DNS:www.ansible.com',
'DNS:' ~ ('öç' if cryptography_version.stdout is version('2.1', '<') else 'xn--7ca3a') ~ '.com',
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,14 +16,14 @@
- name: Generate privatekey
openssl_privatekey:
path: '{{ remote_tmp_dir }}/privatekey.pem'
size: '{{ default_rsa_key_size_certifiates }}'
size: '{{ default_rsa_key_size_certificates }}'

- name: Generate privatekey with password
openssl_privatekey:
path: '{{ remote_tmp_dir }}/privatekeypw.pem'
passphrase: hunter2
select_crypto_backend: cryptography
size: '{{ default_rsa_key_size_certifiates }}'
size: '{{ default_rsa_key_size_certificates }}'

- name: Generate CSR 1
openssl_csr:
Expand Down
2 changes: 1 addition & 1 deletion tests/integration/targets/openssl_pkcs12/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@
- name: Generate private keys
openssl_privatekey:
path: '{{ remote_tmp_dir }}/ansible_pkey{{ item }}.pem'
size: '{{ default_rsa_key_size_certifiates }}'
size: '{{ default_rsa_key_size_certificates }}'
loop: "{{ range(1, 4) | list }}"

- name: Generate privatekey with password
Expand Down
2 changes: 1 addition & 1 deletion tests/integration/targets/setup_openssl/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -121,4 +121,4 @@

- name: Print default key sizes
debug:
msg: "Default RSA key size: {{ default_rsa_key_size }} (for certificates: {{ default_rsa_key_size_certifiates }})"
msg: "Default RSA key size: {{ default_rsa_key_size }} (for certificates: {{ default_rsa_key_size_certificates }})"
2 changes: 1 addition & 1 deletion tests/integration/targets/setup_openssl/vars/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
# SPDX-License-Identifier: GPL-3.0-or-later

default_rsa_key_size: 1024
default_rsa_key_size_certifiates: >-
default_rsa_key_size_certificates: >-
{{
2048 if
(ansible_os_family == "RedHat" and ansible_facts.distribution_major_version | int >= 8) or
Expand Down
4 changes: 2 additions & 2 deletions tests/integration/targets/x509_certificate/tasks/ownca.yml
Original file line number Diff line number Diff line change
Expand Up @@ -6,14 +6,14 @@
- name: (OwnCA, {{select_crypto_backend}}) Generate CA privatekey
openssl_privatekey:
path: '{{ remote_tmp_dir }}/ca_privatekey.pem'
size: '{{ default_rsa_key_size_certifiates }}'
size: '{{ default_rsa_key_size_certificates }}'

- name: (OwnCA, {{select_crypto_backend}}) Generate CA privatekey with passphrase
openssl_privatekey:
path: '{{ remote_tmp_dir }}/ca_privatekey_pw.pem'
passphrase: hunter2
select_crypto_backend: cryptography
size: '{{ default_rsa_key_size_certifiates }}'
size: '{{ default_rsa_key_size_certificates }}'

- name: (OwnCA, {{select_crypto_backend}}) Generate CA CSR
openssl_csr:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
- name: (Removal, {{select_crypto_backend}}) Generate privatekey
openssl_privatekey:
path: '{{ remote_tmp_dir }}/removal_privatekey.pem'
size: '{{ default_rsa_key_size_certifiates }}'
size: '{{ default_rsa_key_size_certificates }}'

- name: (Removal, {{select_crypto_backend}}) Generate CSR
openssl_csr:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,14 +6,14 @@
- name: (Selfsigned, {{select_crypto_backend}}) Generate privatekey
openssl_privatekey:
path: '{{ remote_tmp_dir }}/privatekey.pem'
size: '{{ default_rsa_key_size_certifiates }}'
size: '{{ default_rsa_key_size_certificates }}'

- name: (Selfsigned, {{select_crypto_backend}}) Generate privatekey with password
openssl_privatekey:
path: '{{ remote_tmp_dir }}/privatekeypw.pem'
passphrase: hunter2
select_crypto_backend: cryptography
size: '{{ default_rsa_key_size_certifiates }}'
size: '{{ default_rsa_key_size_certificates }}'

- name: (Selfsigned, {{select_crypto_backend}}) Generate selfsigned certificate without CSR
x509_certificate:
Expand Down Expand Up @@ -138,7 +138,7 @@
- name: (Selfsigned, {{select_crypto_backend}}) Generate privatekey2
openssl_privatekey:
path: '{{ remote_tmp_dir }}/privatekey2.pem'
size: '{{ default_rsa_key_size_certifiates }}'
size: '{{ default_rsa_key_size_certificates }}'

- name: (Selfsigned, {{select_crypto_backend}}) Generate CSR2
openssl_csr:
Expand Down Expand Up @@ -200,7 +200,7 @@
- name: (Selfsigned, {{select_crypto_backend}}) Create private key 3
openssl_privatekey:
path: "{{ remote_tmp_dir }}/privatekey3.pem"
size: '{{ default_rsa_key_size_certifiates }}'
size: '{{ default_rsa_key_size_certificates }}'

- name: (Selfsigned, {{select_crypto_backend}}) Create CSR 3
openssl_csr:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@
- name: Generate privatekey
openssl_privatekey:
path: '{{ remote_tmp_dir }}/privatekey.pem'
size: '{{ default_rsa_key_size_certifiates }}'
size: '{{ default_rsa_key_size_certificates }}'

- name: Generate CSR 1
openssl_csr:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@
- "['organizationalUnitName', 'Crypto Department'] in result.subject_ordered"
- "['organizationalUnitName', 'ACME Department'] in result.subject_ordered"
- result.public_key_type == 'RSA'
- result.public_key_data.size == (default_rsa_key_size_certifiates | int)
- result.public_key_data.size == (default_rsa_key_size_certificates | int)
- "result.subject_alt_name == [
'DNS:www.ansible.com',
'DNS:' ~ ('öç' if cryptography_version.stdout is version('2.1', '<') else 'xn--7ca3a') ~ '.com',
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,14 +16,14 @@
- name: Generate privatekey
openssl_privatekey:
path: '{{ remote_tmp_dir }}/privatekey.pem'
size: '{{ default_rsa_key_size_certifiates }}'
size: '{{ default_rsa_key_size_certificates }}'

- name: Generate privatekey with password
openssl_privatekey:
path: '{{ remote_tmp_dir }}/privatekeypw.pem'
passphrase: hunter2
select_crypto_backend: cryptography
size: '{{ default_rsa_key_size_certifiates }}'
size: '{{ default_rsa_key_size_certificates }}'

- name: Generate CSR 1
openssl_csr:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
- name: "({{ select_crypto_backend }}) Generate privatekey"
openssl_privatekey:
path: '{{ remote_tmp_dir }}/{{ item }}.pem'
size: '{{ default_rsa_key_size_certifiates }}'
size: '{{ default_rsa_key_size_certificates }}'
loop:
- privatekey
- privatekey2
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@
- name: Prepare private key for backend autodetection test
openssl_privatekey:
path: '{{ remote_tmp_dir }}/privatekey_backend_selection.pem'
size: '{{ default_rsa_key_size_certifiates }}'
size: '{{ default_rsa_key_size_certificates }}'
- name: Run module with backend autodetection
x509_certificate_pipe:
provider: selfsigned
Expand Down

0 comments on commit 0723184

Please sign in to comment.