Sha256: 3d45756ea56ecdc259ebb212d929dcf89bad3a34444bf7d534c1639968f66f0e
Contents?: true
Size: 1.63 KB
Versions: 1
Compression:
Stored size: 1.63 KB
Contents
require 'spec_helper' require 'certmeister/policy/key_bits' describe Certmeister::Policy::KeyBits do subject { Certmeister::Policy::KeyBits.new(4096) } it "may be configured with a minimum key size in bits" do expect { Certmeister::Policy::KeyBits.new("hamster") }.to raise_error(ArgumentError, "invalid minimum key size") expect { Certmeister::Policy::KeyBits.new(4096) }.to_not raise_error end it "defaults to #{Certmeister::Policy::KeyBits::DEFAULT_MIN_KEY_BITS} bits minimum key size" do expect(described_class.new.min_key_bits).to eql Certmeister::Policy::KeyBits::DEFAULT_MIN_KEY_BITS end it "demands a request" do expect { subject.authenticate }.to raise_error(ArgumentError) end it "refuses to authenticate a request with a missing pem" do response = subject.authenticate({anything: 'something'}) expect(response).to_not be_authenticated expect(response.error).to eql "missing pem" end it "refuses to authenticate an invalid request" do pem = File.read('fixtures/kbits_1024.csr') response = subject.authenticate({pem: pem}) expect(response).to_not be_authenticated expect(response.error).to eql "weak key" end it "refuses to authenticate a request for a key with too few bits" do pem = File.read('fixtures/kbits_1024.csr') response = subject.authenticate({pem: pem}) expect(response).to_not be_authenticated expect(response.error).to eql "weak key" end it "authenticates a request for a key with sufficient bits" do pem = File.read('fixtures/kbits_4096.csr') response = subject.authenticate({pem: pem}) expect(response).to be_authenticated end end
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
certmeister-2.2.0 | spec/certmeister/policy/key_bits_spec.rb |