@@ -174,24 +174,26 @@ jobs:
174
174
-D pki_admin_cert_path=${SHARED}/ocsp_admin.crt \
175
175
-v
176
176
177
+ - name : Check OCSP server status
178
+ run : |
179
+ docker exec ocsp pki-server status | tee output
180
+
181
+ # standalone OCSP should be a domain manager
182
+ echo "True" > expected
183
+ sed -n 's/^ *SD Manager: *\(.*\)$/\1/p' output > actual
184
+ diff expected actual
185
+
186
+ - name : Check OCSP system certs
187
+ run : |
177
188
docker exec ocsp pki-server cert-find
178
189
179
190
# TODO: Fix DogtagOCSPConnectivityCheck to work without CA
180
191
# - name: Run PKI healthcheck
181
192
# run: docker exec ocsp pki-healthcheck --failures-only
182
193
183
- - name : Check OCSP security domain
184
- run : |
185
- docker exec ocsp pki client-cert-import ca_signing --ca-cert ${SHARED}/ca_signing.crt
186
- docker exec ocsp pki securitydomain-show \
187
- > >(tee stdout) 2> >(tee stderr >&2) || true
188
-
189
- # standalone OCSP should not return security domain info
190
- echo "PKIException: Not Found" > expected
191
- diff expected stderr
192
-
193
194
- name : Check OCSP admin cert
194
195
run : |
196
+ docker exec ocsp pki client-cert-import ca_signing --ca-cert ${SHARED}/ca_signing.crt
195
197
docker exec ocsp pki pkcs12-import \
196
198
--pkcs12 /root/.dogtag/pki-tomcat/ocsp_admin_cert.p12 \
197
199
--pkcs12-password Secret.123
@@ -208,6 +210,30 @@ jobs:
208
210
echo "UserNotFoundException: User CA-ca.example.com-8443 not found" > expected
209
211
diff expected stderr
210
212
213
+ - name : Check OCSP security domain
214
+ run : |
215
+ # security domain should be enabled (i.e. securitydomain.select=new)
216
+ cat > expected << EOF
217
+ securitydomain.checkIP=false
218
+ securitydomain.checkinterval=300000
219
+ securitydomain.flushinterval=86400000
220
+ securitydomain.host=ocsp.example.com
221
+ securitydomain.httpport=8080
222
+ securitydomain.httpsadminport=8443
223
+ securitydomain.name=example.com Security Domain
224
+ securitydomain.select=new
225
+ securitydomain.source=ldap
226
+ EOF
227
+
228
+ docker exec ocsp pki-server ocsp-config-find | grep ^securitydomain. | sort | tee actual
229
+ diff expected actual
230
+
231
+ # TODO: Fix pki securitydomain-show to work with standalone OCSP
232
+ # docker exec ocsp pki securitydomain-show \
233
+ # > >(tee stdout) 2> >(tee stderr >&2) || true
234
+
235
+ # standalone OCSP should return security domain info
236
+
211
237
- name : Check OCSP publishing in CA
212
238
run : |
213
239
# OCSP publishing should not be configured
0 commit comments