github.com/Venafi/vcert/v5@v5.10.2/aruba/features/provision/cloudkeystore/provision_cloudkeystore.feature (about)

     1  @VAAS
     2  Feature: provision to cloud keystore
     3  
     4    As a user
     5    I want provision certificates to cloud keystore from Venafi Control Plane
     6  
     7    Background:
     8      And the default aruba exit timeout is 180 seconds
     9  
    10    Scenario Outline: Enroll certificate and execute provisioning for cloud keystore
    11      Given I enroll a random certificate with defined platform VCP with -csr service -no-prompt
    12      And I remember the output
    13      And I use previous Pickup ID to provision from VCP a certificate to cloudkeystore "<cloudkeystore>" setting keystore and provider names
    14      And I remember the output
    15        And the output should not contain "Warning: --platform not set. Attempting to best-guess platform from connection flags"
    16      And I grab cloud ID from output
    17      Then I clean up previous installed certificate from cloudkeystore
    18      Examples:
    19        | cloudkeystore    |
    20        | GOOGLE           |
    21        | AWS              |
    22        | AZURE            |
    23  
    24    Scenario Outline: Enroll certificate and execute provisioning for cloud keystore without Platform flags
    25      Given I enroll a random certificate with defined platform VCP with -csr service -no-prompt
    26      And I remember the output
    27      And I use previous Pickup ID to provision without set Platform flag from VCP a certificate to cloudkeystore "<cloudkeystore>" setting keystore and provider names
    28      And I remember the output
    29        And the output should contain "Warning: --platform not set. Attempting to best-guess platform from connection flags"
    30      And I grab cloud ID from output
    31      Then I clean up previous installed certificate from cloudkeystore
    32      Examples:
    33        | cloudkeystore    |
    34        | GOOGLE           |
    35        | AWS              |
    36        | AZURE            |
    37  
    38    Scenario Outline: Enroll certificate and execute provisioning for cloud keystore and get output in JSON
    39      Given I enroll a random certificate with defined platform VCP with -csr service -no-prompt
    40      And I remember the output
    41      And I use previous Pickup ID to provision from VCP a certificate to cloudkeystore "<cloudkeystore>" setting keystore and provider names with -format json
    42      And I remember the output
    43      And I grab cloud ID from JSON output
    44      Then I clean up previous installed certificate from cloudkeystore
    45      Examples:
    46        | cloudkeystore    |
    47        | GOOGLE           |
    48        | AWS              |
    49        | AZURE            |
    50  
    51    Scenario Outline: Enroll certificate, execute provisioning and then provisioning again for replace
    52      Given I enroll a random certificate with defined platform VCP with -csr service -no-prompt
    53      And I remember the output
    54      And I use previous Pickup ID to provision from VCP a certificate to cloudkeystore "<cloudkeystore>" setting keystore and provider names
    55      And I remember the output
    56        And the output should contain "cloudId:"
    57        And the output should contain "machineIdentityActionType: New"
    58      And I grab cloud ID from output
    59      Then I use previous Pickup ID and cloud ID to provision again
    60        And I remember the output
    61        And the output should contain the previous cloud ID
    62        And the output should contain "machineIdentityActionType: ReProvision"
    63      Then I clean up previous installed certificate from cloudkeystore
    64      Examples:
    65        | cloudkeystore    |
    66        | AWS              |
    67        | GOOGLE           |
    68        | AZURE            |
    69  
    70  
    71    Scenario Outline: Enroll certificate and execute provisioning for cloud keystore on GCM using certificate's scopes
    72        Given I enroll a random certificate with defined platform VCP with -csr service -no-prompt
    73        And I remember the output
    74        And I use previous Pickup ID to provision from VCP a certificate to cloudkeystore "<cloudkeystore>" setting keystore and provider names with -gcm-cert-scope DEFAULT
    75        And I remember the output
    76          And the output should not contain "Warning: --platform not set. Attempting to best-guess platform from connection flags"
    77        And I grab cloud ID from output
    78        Then I clean up previous installed certificate from cloudkeystore
    79        Examples:
    80          | cloudkeystore    |
    81          | GOOGLE           |