Skip to content

Commit 4c65842

Browse files
committed
Fixed Policy Management exceptions test case
Fixed issues with the Policy Management exceptions test case, some exceptions changed with the addition of Contacts feature.
1 parent 092d9a7 commit 4c65842

1 file changed

Lines changed: 19 additions & 10 deletions

File tree

tests/test_pm.py

Lines changed: 19 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -563,7 +563,11 @@ def test_exceptions_vaas(self):
563563
elliptic_curves=["asd"],
564564
service_generated=True)
565565
ps.policy.key_pair = kp
566-
ps.policy.subject_alt_names = SubjectAltNames(dns_allowed=True, email_allowed=True)
566+
ps.policy.subject_alt_names = SubjectAltNames(
567+
dns_allowed=True,
568+
email_allowed=True,
569+
upn_allowed=True
570+
)
567571
s = Subject(orgs=["Venafi"],
568572
org_units=["QA Venafi"],
569573
localities=["Salt Lake City"],
@@ -583,18 +587,13 @@ def test_exceptions_vaas(self):
583587
ps.defaults.key_pair = dkp
584588

585589
# validate key pair values
586-
try:
587-
validate_ps_vaas(ps)
588-
except VenafiError as err:
589-
msg = "Key Type values exceeded. Only one Key Type is allowed by VaaS"
590-
self.assertEqual(err.args[0], msg)
591-
ps.policy.key_pair.key_types = ["foo"]
592590
try:
593591
validate_ps_vaas(ps)
594592
except VenafiError as err:
595593
msg = f"Key Type [{ps.policy.key_pair.key_types[0]}] is not supported by VaaS"
596594
self.assertEqual(err.args[0], msg)
597595
ps.policy.key_pair.key_types = ["RSA"]
596+
598597
try:
599598
validate_ps_vaas(ps)
600599
except VenafiError as err:
@@ -606,9 +605,9 @@ def test_exceptions_vaas(self):
606605
try:
607606
validate_ps_vaas(ps)
608607
except VenafiError as err:
609-
msg = "Subject Alt name [SubjAltNameEmailAllowed] is not allowed by VaaS"
608+
msg = "Subject Alt name [SubjAltNameUpnAllowed] is not allowed by VaaS"
610609
self.assertEqual(err.args[0], msg)
611-
ps.policy.subject_alt_names.email_allowed = False
610+
ps.policy.subject_alt_names.upn_allowed = False
612611

613612
# validate default subject values against policy values
614613
try:
@@ -617,24 +616,28 @@ def test_exceptions_vaas(self):
617616
msg = default_error_msg.format('Organization', ds.org, s.orgs)
618617
self.assertEqual(err.args[0], msg)
619618
ps.defaults.subject.org = s.orgs[0]
619+
620620
try:
621621
validate_ps_vaas(ps)
622622
except VenafiError as err:
623623
msg = default_error_msg.format('Org Units', ds.org_units, s.org_units)
624624
self.assertEqual(err.args[0], msg)
625625
ps.defaults.subject.org_units = s.org_units
626+
626627
try:
627628
validate_ps_vaas(ps)
628629
except VenafiError as err:
629630
msg = default_error_msg.format('Localities', ds.locality, s.localities)
630631
self.assertEqual(err.args[0], msg)
631632
ps.defaults.subject.locality = s.localities[0]
633+
632634
try:
633635
validate_ps_vaas(ps)
634636
except VenafiError as err:
635637
msg = default_error_msg.format('States', ds.state, s.states)
636638
self.assertEqual(err.args[0], msg)
637639
ps.defaults.subject.state = s.states[0]
640+
638641
try:
639642
validate_ps_vaas(ps)
640643
except VenafiError as err:
@@ -648,24 +651,28 @@ def test_exceptions_vaas(self):
648651
except VenafiError as err:
649652
msg = default_error_msg.format('Key Types', dkp.key_type, kp.key_types)
650653
self.assertEqual(err.args[0], msg)
654+
651655
ps.defaults.key_pair.key_type = kp.key_types[0]
652656
try:
653657
validate_ps_vaas(ps)
654658
except VenafiError as err:
655659
msg = default_error_msg.format('RSA Key Sizes', dkp.rsa_key_size, kp.rsa_key_sizes)
656660
self.assertEqual(err.args[0], msg)
661+
657662
ps.defaults.key_pair.rsa_key_size = kp.rsa_key_sizes[0]
658663
try:
659664
validate_ps_vaas(ps)
660665
except VenafiError as err:
661666
msg = default_error_msg.format('Elliptic Curves', dkp.elliptic_curve, kp.elliptic_curves)
662667
self.assertEqual(err.args[0], msg)
668+
663669
ps.defaults.key_pair.elliptic_curve = kp.elliptic_curves[0]
664670
try:
665671
validate_ps_vaas(ps)
666672
except VenafiError as err:
667673
msg = default_error_msg.format('Service Generated', dkp.service_generated, kp.service_generated)
668674
self.assertEqual(err.args[0], msg)
675+
669676
ps.defaults.key_pair.service_generated = kp.service_generated
670677

671678
# validate default values when policy is not defined
@@ -681,12 +688,14 @@ def test_exceptions_vaas(self):
681688
except VenafiError as err:
682689
msg = f"Default Key Type [{dkp2.key_type}] is not supported by VaaS"
683690
self.assertEqual(err.args[0], msg)
691+
684692
ps.defaults.key_pair.key_type = "RSA"
685693
try:
686694
validate_ps_vaas(ps)
687695
except VenafiError as err:
688-
msg = f"Default Key Size [{256}] is not supported by VaaS"
696+
msg = f"Default RSA Key Size [{256}] is not supported by VaaS"
689697
self.assertEqual(err.args[0], msg)
698+
690699
ps.defaults.key_pair.rsa_key_size = 4096
691700

692701

0 commit comments

Comments
 (0)