Skip to content

Commit

Permalink
minor adjustments
Browse files Browse the repository at this point in the history
  • Loading branch information
nqb committed Oct 25, 2021
1 parent 02c83a9 commit 3c05367
Show file tree
Hide file tree
Showing 3 changed files with 9 additions and 5 deletions.
2 changes: 1 addition & 1 deletion t/venom/nodes/wired_dot1x_eap_tls/run_sscep_on_node01.yml
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ testcases:
attributes = req_attributes
[ req_attributes ]
challengePassword = secret
challengePassword = {{.wired_dot1x_eap_tls_manual.certs.user.scep_challenge_password}}
# only CN is kept by pfpki
[ dn ]
Expand Down
4 changes: 3 additions & 1 deletion t/venom/test_suites/wired_dot1x_eap_tls_manual/TESTSUITE.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@
N/A

### Global config steps
1. Create dot1x_eap_tls role
1. Create dot1x_eap_tls_manual role

## Scenario steps
1. Create Root CA
Expand Down Expand Up @@ -40,6 +40,8 @@ N/A
1. Check Internet access *on* node01 (common)

TODO:
1. Install certificates (HTTP and RADIUS), generated by pfpki, using API (in
place of command line)
1. Revoke certificate
1. Kill wpasupplicant (common test suite)
1. Rerun wpasupplicant to have a reject authentication due to revoke certificate
Expand Down
8 changes: 5 additions & 3 deletions t/venom/test_suites/wired_dot1x_eap_tls_scep/TESTSUITE.md
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
# wired_dot1x_eap_tls_manual
# wired_dot1x_eap_tls_scep

## Requirements
N/A

### Global config steps
1. Create dot1x_eap_tls role
1. Create dot1x_eap_tls_scep role

## Scenario steps
1. Create Root CA
Expand All @@ -27,7 +27,7 @@ N/A
1. Perform Checkup (common test suite)
1. Configure 802.1X only and dynamic VLAN on dot1x interface on
switch01
1. Install Root CA on node01
1. Get CA and client certificates using SCEP on node01
1. Install user certificates (public certificate and private key) on node01
with following paths:
- ca_cert: /etc/wpa_supplicant/eap_tls/ca.pem
Expand All @@ -40,6 +40,8 @@ N/A
1. Check Internet access *on* node01 (common)

TODO:
1. Install certificates (HTTP and RADIUS), generated by pfpki, using API (in
place of command line)
1. Revoke certificate
1. Kill wpasupplicant (common test suite)
1. Rerun wpasupplicant to have a reject authentication due to revoke certificate
Expand Down

0 comments on commit 3c05367

Please sign in to comment.