github.com/Venafi/vcert/v5@v5.10.2/aruba/features/provision/cloudkeystore/provision_cloudkeystore.feature (about) 1 @VAAS 2 Feature: provision to cloud keystore 3 4 As a user 5 I want provision certificates to cloud keystore from Venafi Control Plane 6 7 Background: 8 And the default aruba exit timeout is 180 seconds 9 10 Scenario Outline: Enroll certificate and execute provisioning for cloud keystore 11 Given I enroll a random certificate with defined platform VCP with -csr service -no-prompt 12 And I remember the output 13 And I use previous Pickup ID to provision from VCP a certificate to cloudkeystore "<cloudkeystore>" setting keystore and provider names 14 And I remember the output 15 And the output should not contain "Warning: --platform not set. Attempting to best-guess platform from connection flags" 16 And I grab cloud ID from output 17 Then I clean up previous installed certificate from cloudkeystore 18 Examples: 19 | cloudkeystore | 20 | GOOGLE | 21 | AWS | 22 | AZURE | 23 24 Scenario Outline: Enroll certificate and execute provisioning for cloud keystore without Platform flags 25 Given I enroll a random certificate with defined platform VCP with -csr service -no-prompt 26 And I remember the output 27 And I use previous Pickup ID to provision without set Platform flag from VCP a certificate to cloudkeystore "<cloudkeystore>" setting keystore and provider names 28 And I remember the output 29 And the output should contain "Warning: --platform not set. Attempting to best-guess platform from connection flags" 30 And I grab cloud ID from output 31 Then I clean up previous installed certificate from cloudkeystore 32 Examples: 33 | cloudkeystore | 34 | GOOGLE | 35 | AWS | 36 | AZURE | 37 38 Scenario Outline: Enroll certificate and execute provisioning for cloud keystore and get output in JSON 39 Given I enroll a random certificate with defined platform VCP with -csr service -no-prompt 40 And I remember the output 41 And I use previous Pickup ID to provision from VCP a certificate to cloudkeystore "<cloudkeystore>" setting keystore and provider names with -format json 42 And I remember the output 43 And I grab cloud ID from JSON output 44 Then I clean up previous installed certificate from cloudkeystore 45 Examples: 46 | cloudkeystore | 47 | GOOGLE | 48 | AWS | 49 | AZURE | 50 51 Scenario Outline: Enroll certificate, execute provisioning and then provisioning again for replace 52 Given I enroll a random certificate with defined platform VCP with -csr service -no-prompt 53 And I remember the output 54 And I use previous Pickup ID to provision from VCP a certificate to cloudkeystore "<cloudkeystore>" setting keystore and provider names 55 And I remember the output 56 And the output should contain "cloudId:" 57 And the output should contain "machineIdentityActionType: New" 58 And I grab cloud ID from output 59 Then I use previous Pickup ID and cloud ID to provision again 60 And I remember the output 61 And the output should contain the previous cloud ID 62 And the output should contain "machineIdentityActionType: ReProvision" 63 Then I clean up previous installed certificate from cloudkeystore 64 Examples: 65 | cloudkeystore | 66 | AWS | 67 | GOOGLE | 68 | AZURE | 69 70 71 Scenario Outline: Enroll certificate and execute provisioning for cloud keystore on GCM using certificate's scopes 72 Given I enroll a random certificate with defined platform VCP with -csr service -no-prompt 73 And I remember the output 74 And I use previous Pickup ID to provision from VCP a certificate to cloudkeystore "<cloudkeystore>" setting keystore and provider names with -gcm-cert-scope DEFAULT 75 And I remember the output 76 And the output should not contain "Warning: --platform not set. Attempting to best-guess platform from connection flags" 77 And I grab cloud ID from output 78 Then I clean up previous installed certificate from cloudkeystore 79 Examples: 80 | cloudkeystore | 81 | GOOGLE |