Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ipatests: check_subca should be more robust wrt key nickname #7232

Closed
wants to merge 2 commits into from

Conversation

flo-renaud
Copy link
Contributor

The test check_subca is using certutil -L -n nickname
or certutil -K -n nickname to find a cert or a key in a database
using its nickname.
Sometimes the key nickname contains the token (for instance
the cert nickname is "caSigningCert cert-pki-ca" but the key
nickname is "NSS Certificate DB:caSigningCert cert-pki-ca"),
and this make check_subca fail.

Rewrite the check_subca method so that it is more robust and
able to handle nicknames with token:nickname.

Fixes: https://pagure.io/freeipa/issue/9534

The test check_subca is using certutil -L -n nickname
or certutil -K -n nickname to find a cert or a key in a database
using its nickname.
Sometimes the key nickname contains the token (for instance
the cert nickname is "caSigningCert cert-pki-ca" but the key
nickname is "NSS Certificate DB:caSigningCert cert-pki-ca"),
and this make check_subca fail.

Rewrite the check_subca method so that it is more robust and
able to handle nicknames with token:nickname.

Fixes: https://pagure.io/freeipa/issue/9534

Signed-off-by: Florence Blanc-Renaud <flo@redhat.com>
@flo-renaud
Copy link
Contributor Author

The test is failing in a different step: add a subca on master, disable the subca on replica, delete the subca on replica. I opened dogtagpki/pki#4669 to track the issue on PKI side.

@flo-renaud
Copy link
Contributor Author

dogtagpki/pki#4669 has been fixed and we are now hitting a different issue. Running ipa ca-add in loop fails. Reported at dogtagpki/pki#4677

@flo-renaud
Copy link
Contributor Author

Closing this PR. The issue got resolved with f39 updates, see nightly PR#3435 from Feb 25, 2024 with the green report

@flo-renaud flo-renaud closed this Feb 28, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
1 participant