Tests/Integration/MSFT_CertReq.Integration.Tests.ps1
<#
IMPORTANT INFORMATION: Running these tests requires access to a AD CS Certificate Authority. These integration tests are configured to use credentials to connect to the CA. Therefore, automation of these tests shouldn't be performed using a production CA. #> $script:DSCModuleName = 'CertificateDsc' $script:DSCResourceName = 'MSFT_CertReq' <# These tests can only be run if a CA is available and configured to be used on the computer running these tests. This is usually required to be a domain joined computer. #> $CertUtilResult = & "$env:SystemRoot\system32\certutil.exe" @('-dump') $Result = ([regex]::matches($CertUtilResult,'Name:[ \t]+`([\sA-Za-z0-9._-]+)''','IgnoreCase')) if ([String]::IsNullOrEmpty($Result)) { Describe "$($script:DSCResourceName)_Integration" { It 'should complete integration tests' { } -Skip } return } # if # Integration Test Template Version: 1.1.0 [System.String] $script:moduleRoot = Split-Path -Parent (Split-Path -Parent $PSScriptRoot) if ( (-not (Test-Path -Path (Join-Path -Path $script:moduleRoot -ChildPath 'DSCResource.Tests'))) -or ` (-not (Test-Path -Path (Join-Path -Path $script:moduleRoot -ChildPath 'DSCResource.Tests\TestHelper.psm1'))) ) { & git @('clone','https://github.com/PowerShell/DscResource.Tests.git',(Join-Path -Path $script:moduleRoot -ChildPath '\DSCResource.Tests\')) } Import-Module (Join-Path -Path $script:moduleRoot -ChildPath 'DSCResource.Tests\TestHelper.psm1') -Force $TestEnvironment = Initialize-TestEnvironment ` -DSCModuleName $script:DSCModuleName ` -DSCResourceName $script:DSCResourceName ` -TestType Integration # Using try/finally to always cleanup even if something awful happens. try { $ConfigFile = Join-Path -Path $PSScriptRoot -ChildPath "$($script:DSCResourceName).config.ps1" . $ConfigFile Describe "$($script:DSCResourceName)_Integration" { BeforeAll { # This will fail if the machine does not have a CA Configured. $certUtilResult = & "$env:SystemRoot\system32\certutil.exe" @('-dump') $caServerFQDN = ([regex]::matches($certUtilResult,'Server:[ \t]+`([A-Za-z0-9._-]+)''','IgnoreCase')).Groups[1].Value $caRootName = ([regex]::matches($certUtilResult,'Name:[ \t]+`([\sA-Za-z0-9._-]+)''','IgnoreCase')).Groups[1].Value $exportable = $true $providerName = '"Microsoft RSA SChannel Cryptographic Provider"' $oid = '1.3.6.1.5.5.7.3.1' $keyUsage = '0xa0' $dns1 = 'contoso.com' $dns2 = 'fabrikam.com' $subjectAltName = "dns=$dns1&dns=$dns2" $friendlyName = "$($script:DSCResourceName) Integration Test" $paramsRsaCmcRequest = @{ keyLength = '2048' subject = "$($script:DSCResourceName)_Test" certificateTemplate = 'WebServer' keyType = 'RSA' RequestType = 'CMC' } $paramsEcdhPkcs10Request = @{ keyLength = '521' subject = "$($script:DSCResourceName)_Test2" providerName = '"Microsoft Software Key Storage Provider"' certificateTemplate = 'WebServer' keyType = 'ECDH' RequestType = 'PKCS10' } <# If automated testing with a real CA can be performed then the credentials should be obtained non-interactively. Do not do this in a production environment. #> $Credential = Get-Credential # This is to allow the testing of certreq with domain credentials $configData = @{ AllNodes = @( @{ NodeName = 'localhost' Subject = $paramsRsaCmcRequest.subject CAServerFQDN = $caServerFQDN CARootName = $caRootName Credential = $credential KeyLength = $paramsRsaCmcRequest.keyLength Exportable = $exportable ProviderName = $providerName OID = $oid KeyUsage = $keyUsage CertificateTemplate = $paramsRsaCmcRequest.certificateTemplate SubjectAltName = $subjectAltName FriendlyName = $friendlyName KeyType = $paramsRsaCmcRequest.keyType RequestType = $paramsRsaCmcRequest.requestType PsDscAllowDomainUser = $true PsDscAllowPlainTextPassword = $true } ) } $configDataTest2 = @{ AllNodes = @( @{ NodeName = 'localhost' Subject = $paramsEcdhPkcs10Request.subject CAServerFQDN = $caServerFQDN CARootName = $caRootName Credential = $credential KeyLength = $paramsEcdhPkcs10Request.keyLength Exportable = $exportable ProviderName = $paramsEcdhPkcs10Request.providerName OID = $oid KeyUsage = $keyUsage CertificateTemplate = $paramsEcdhPkcs10Request.certificateTemplate SubjectAltName = $subjectAltName FriendlyName = $friendlyName KeyType = $paramsEcdhPkcs10Request.keyType RequestType = $paramsEcdhPkcs10Request.requestType #UseMachineContext = $true PsDscAllowDomainUser = $true PsDscAllowPlainTextPassword = $true } ) } } Context 'When WebServer certificate does not exist, Testing with RSA KeyType and CMC RequestType' { It 'Should compile and apply the MOF without throwing' { { & "$($script:DSCResourceName)_Config" ` -OutputPath $TestDrive ` -ConfigurationData $configData Start-DscConfiguration -Path $TestDrive -ComputerName localhost -Wait -Verbose -Force } | Should -Not -Throw } It 'Should be able to call Get-DscConfiguration without throwing' { { Get-DscConfiguration -Verbose -ErrorAction Stop } | Should -Not -Throw } It 'Should have set the resource and all the parameters should match' { # Get the Certificate details $CertificateNew = Get-Childitem -Path Cert:\LocalMachine\My | Where-Object -FilterScript { $_.Subject -eq "CN=$($paramsRsaCmcRequest.subject)" -and ` $_.Issuer.split(',')[0] -eq "CN=$($caRootName)" } $CertificateNew.Subject | Should -Be "CN=$($paramsRsaCmcRequest.subject)" $CertificateNew.Issuer.split(',')[0] | Should -Be "CN=$($caRootName)" $CertificateNew.Publickey.Key.KeySize | Should -Be $paramsRsaCmcRequest.keyLength $CertificateNew.FriendlyName | Should -Be $friendlyName $CertificateNew.DnsNameList[0] | Should -Be $dns1 $CertificateNew.DnsNameList[1] | Should -Be $dns2 $CertificateNew.EnhancedKeyUsageList.ObjectId | Should -Be $oid } } Context 'When WebServer certificate does not exist, Testing with ECDH KeyType and PKCS10 RequestType' { It 'Should compile and apply the MOF without throwing' { { & "$($script:DSCResourceName)_Config" ` -OutputPath $TestDrive ` -ConfigurationData $configDataTest2 Start-DscConfiguration -Path $TestDrive -ComputerName localhost -Wait -Verbose -Force } | Should -Not -Throw } It 'Should be able to call Get-DscConfiguration without throwing' { { Get-DscConfiguration -Verbose -ErrorAction Stop } | Should -Not -Throw } It 'Should have set the resource and all the parameters should match' { # Get the Certificate details $CertificateNew = Get-Childitem -Path Cert:\LocalMachine\My | Where-Object -FilterScript { $_.Subject -eq "CN=$($paramsEcdhPkcs10Request.subject)" -and ` $_.Issuer.split(',')[0] -eq "CN=$($caRootName)" } # Removed check for key length becuase in the ECDH certificate PowerShell cannot see the length $CertificateNew.Subject | Should -Be "CN=$($paramsEcdhPkcs10Request.subject)" $CertificateNew.Issuer.split(',')[0] | Should -Be "CN=$($caRootName)" $CertificateNew.FriendlyName | Should -Be $friendlyName $CertificateNew.DnsNameList[0] | Should -Be $dns1 $CertificateNew.DnsNameList[1] | Should -Be $dns2 $CertificateNew.EnhancedKeyUsageList.ObjectId | Should -Be $oid } } AfterAll { # Cleanup $CertificateNew = Get-Childitem -Path Cert:\LocalMachine\My | Where-Object -FilterScript { $_.Subject -eq "CN=$($paramsRsaCmcRequest.subject)" -and ` $_.Issuer.split(',')[0] -eq "CN=$($caRootName)" } $CertificateNew2 = Get-Childitem -Path Cert:\LocalMachine\My | Where-Object -FilterScript { $_.Subject -eq "CN=$($paramsEcdhPkcs10Request.subject)" -and ` $_.Issuer.split(',')[0] -eq "CN=$($caRootName)" } Remove-Item ` -Path $CertificateNew.PSPath ` -Force ` -ErrorAction SilentlyContinue Remove-Item ` -Path $CertificateNew2.PSPath ` -Force ` -ErrorAction SilentlyContinue } } } finally { Restore-TestEnvironment -TestEnvironment $TestEnvironment } |