aboutsummaryrefslogtreecommitdiffstats
path: root/testing
Commit message (Collapse)AuthorAgeFilesLines
...
* testing: Don't check for the actual number of SWID tags in PDP scenariosTobias Brunner2014-10-072-8/+8
| | | | | The number of SWID tags varies depending on the base image, but lets assume the number is in the hundreds.
* testing: Make TNC scenarios agnostic to the actual Debian versionTobias Brunner2014-10-0718-45/+52
| | | | | The scenarios will work with new or old base images as long as the version in use is included as product in the master data (src/libimcv/imv/data.sql).
* testing: Make TKM related build recipes future-proofTobias Brunner2014-10-076-24/+36
| | | | | | | | The tkm scenarios recently failed due to a segmentation fault on my host because I had an old build of the tkm library already built in the build directory. Because the stamp file was not versioned the new release was never checked out or built and charon-tkm was linked against the old version causing a segmentation fault during key derivation.
* testing: Updated certificates and keys in sql scenariosAndreas Steffen2014-10-0635-121/+121
|
* Updated revoked certificate in ikev2/ocsp-revoked scenarioAndreas Steffen2014-10-052-42/+42
|
* The critical-extension scenarios need the old private keysAndreas Steffen2014-10-054-0/+108
|
* testing: Updated swanctl certificates and keysTobias Brunner2014-10-0314-292/+292
|
* testing: Wait a bit in swanctl scenarios before interacting with the daemonTobias Brunner2014-10-037-9/+16
|
* testing: Actually build swanctlTobias Brunner2014-10-031-1/+2
|
* testing: Make sure the whitelist plugin is ready before configuring itTobias Brunner2014-10-031-1/+3
|
* testing: Update PKCS#12 containersTobias Brunner2014-10-034-0/+0
|
* testing: Update PKCS#8 keysTobias Brunner2014-10-033-81/+81
|
* testing: Update public keys in DNSSEC scenariosTobias Brunner2014-10-033-0/+0
| | | | | The tests are successful even if the public keys are not stored locally, but an additional DNS query is required to fetch them.
* testing: Update public keys and certificates in DNS zoneTobias Brunner2014-10-031-64/+60
|
* testing: Update carols certificate in several test casesTobias Brunner2014-10-036-129/+129
|
* testing: Add some notes about how to reissue attribute certificatesMartin Willi2014-10-033-0/+61
|
* testing: Reissue attribute certificates for the new holder certificatesMartin Willi2014-10-038-72/+72
| | | | | | Due to the expired and reissued holder certificates of carol and dave, new attribute certificates are required to match the holder certificates serial in the ikev2/acert-{cached,fallback,inline} tests.
* configure: Load fetcher plugins after crypto base pluginsMartin Willi2014-09-24669-681/+676
| | | | | | | | | | Some fetcher plugins (such as curl) might build upon OpenSSL to implement HTTPS fetching. As we set (and can't unset) threading callbacks in our openssl plugin, we must ensure that OpenSSL functions don't get called after openssl plugin unloading. We achieve that by loading curl and all other fetcher plugins after the base crypto plugins, including openssl.
* testing: Use multiple jobs to install strongSwanTobias Brunner2014-09-191-1/+1
|
* testing: Add a script to build the current (or an arbitrary) source treeTobias Brunner2014-09-191-0/+65
| | | | | | | | | | | | | | This allows to (relatively) quickly (re-)build and install the current or an arbitrary strongSwan source tree within the root image. bindfs is used to bind mount the source directory using the regular user and group (only works if sudo is used to run the script) so that newly created files are not owned by root. As with building the root image in general the guests must not be running while executing this script. The guest images are automatically rebuilt after the root image has been updated so configuration files and other modifications in guests will be lost.
* testing: Add packages to rebuild strongSwan from the repositoryTobias Brunner2014-09-191-1/+2
|
* testing: Make strongSwan build recipe more configurableTobias Brunner2014-09-191-4/+13
|
* testing: Update certs and keys in tkm testsReto Buerki2014-09-176-0/+0
| | | | References #705.
* testing: Update x509-ada version to 0.1.1Reto Buerki2014-09-171-1/+1
| | | | Fixes #705.
* Generated new test certificatesAndreas Steffen2014-08-2876-351/+542
|
* testing: Make sure the kernel exists when startingTobias Brunner2014-08-251-0/+1
|
* Updated URL to swidGenerator in recipe5.2.0Andreas Steffen2014-07-091-1/+1
|
* Update KVM test framework to 3.15 guest kernel5.2.0rc1Andreas Steffen2014-06-272-3/+2086
|
* testing: Add sql/shunt-policies-nat-rw scenarioTobias Brunner2014-06-2618-0/+740
|
* testing: Add pfkey/shunt-policies-nat-rw scenarioTobias Brunner2014-06-2613-0/+175
|
* testing: Remove obsolete shunt-policies scenariosTobias Brunner2014-06-2624-688/+0
|
* Updated description of TNC scenarios concerning RFC 7171 PT-EAP supportAndreas Steffen2014-06-266-24/+30
|
* Removed django.db from swid scenariosAndreas Steffen2014-06-262-0/+0
|
* testing: Add ikev2/shunt-policies-nat-rw scenarioTobias Brunner2014-06-1912-0/+171
|
* testing: Remove ikev2/shunt-policies scenarioTobias Brunner2014-06-1910-166/+0
| | | | | This scenario doesn't really apply anymore (especially its use of drop policies).
* Added swanctl/net2net-route scenarioAndreas Steffen2014-06-189-0/+145
|
* Added swanctl/net2net-start scenarioAndreas Steffen2014-06-189-0/+140
|
* Minor changes in swanctl scenariosAndreas Steffen2014-06-187-5/+8
|
* Added swanctl --list-pols and swanctl --stats do scenario logAndreas Steffen2014-06-181-3/+12
|
* testing: Delete accidentally committed test casesTobias Brunner2014-06-1857-920/+0
|
* Added swanctl/rw-psk-fqdn and swanctl/rw-psk-ipv4 scenariosAndreas Steffen2014-06-1422-0/+441
|
* Single-line --raw mode simplifies evaltest of swanctl scenariosAndreas Steffen2014-06-145-92/+16
|
* Added swanctl/ip-pool-db scenarioAndreas Steffen2014-06-1111-0/+246
|
* Updated strongTNC configurationAndreas Steffen2014-06-118-12/+15
|
* Added swanctl/ip-pool scenarioAndreas Steffen2014-06-1011-0/+231
|
* Added swanctl/rw-cert scenarioAndreas Steffen2014-06-1011-0/+216
|
* Define default swanctl credentials in hosts directoryAndreas Steffen2014-06-1030-4/+383
|
* testing: Cache packages downloaded with pip for strongTNCTobias Brunner2014-06-021-2/+7
| | | | This way no network connections is required to rebuild the root/guest images.
* First swanctl scenario5.2.0dr5Andreas Steffen2014-06-0117-14/+515
|
* Test SWID REST API ins tnc/tnccs-20-pdp scenariosAndreas Steffen2014-05-3183-73/+1113
|