spec/fixtures/config_test_various.yaml in r509-0.8.1 vs spec/fixtures/config_test_various.yaml in r509-0.9

- old
+ new

@@ -1,100 +1,137 @@ pkcs12_ca: { - ca_cert: { - pkcs12: "test_ca.p12", - password: "r509" - } + ca_cert: { + pkcs12: "test_ca.p12", + password: "r509" + } } pkcs12_key_ca: { - ca_cert: { - pkcs12: "test_ca.p12", - password: "r509", - key: "test_ca.cer" - } + ca_cert: { + pkcs12: "test_ca.p12", + password: "r509", + key: "test_ca.cer" + } } pkcs12_cert_ca: { - ca_cert: { - pkcs12: "test_ca.p12", - password: "r509", - cert: "test_ca.cer" - } + ca_cert: { + pkcs12: "test_ca.p12", + password: "r509", + cert: "test_ca.cer" + } } pkcs12_engine_ca: { - ca_cert: { - pkcs12: "test_ca.p12", - password: "r509", - engine: "chil", - key_name: "r509_key" - } + ca_cert: { + pkcs12: "test_ca.p12", + password: "r509", + engine: "chil", + key_name: "r509_key" + } } cert_no_key_ca: { - ca_cert: { - cert: "test_ca.cer" - } + ca_cert: { + cert: "test_ca.cer" + } } missing_key_identifier_ca: { - ca_cert: { - cert: 'missing_key_identifier_ca.cer', - key: 'missing_key_identifier_ca.key' - }, - message_digest: 'SHA1', #SHA1, SHA256, SHA512 supported. MD5 too, but you really shouldn't use that unless you have a good reason - profiles: { - server: { - basic_constraints: "CA:FALSE", - key_usage: [digitalSignature,keyEncipherment], - extended_key_usage: [serverAuth], - certificate_policies: [ [ "policyIdentifier=2.16.840.1.9999999999.3.0"], [ "policyIdentifier=2.16.840.1.9999999999.1.2.3.4.1", "CPS.1=http://example.com/cps"] ] - } + ca_cert: { + cert: 'missing_key_identifier_ca.cer', + key: 'missing_key_identifier_ca.key' + }, + message_digest: 'SHA1', + profiles: { + server: { + basic_constraints: { "ca" : false }, + key_usage: [digitalSignature,keyEncipherment], + extended_key_usage: [serverAuth], } + } } multi_policy_ca: { - ca_cert: { - cert: 'test_ca.cer', - key: 'test_ca.key' - }, - message_digest: 'SHA1', #SHA1, SHA256, SHA512 supported. MD5 too, but you really shouldn't use that unless you have a good reason - profiles: { - server: { - basic_constraints: "CA:FALSE", - key_usage: [digitalSignature,keyEncipherment], - extended_key_usage: [serverAuth], - certificate_policies: [ [ "policyIdentifier=2.16.840.1.9999999999.3.0"], [ "policyIdentifier=2.16.840.1.9999999999.1.2.3.4.1", "CPS.1=http://example.com/cps"] ] + ca_cert: { + cert: 'test_ca.cer', + key: 'test_ca.key' + }, + message_digest: 'SHA1', + profiles: { + server: { + basic_constraints: { "ca" : false }, + key_usage: [digitalSignature,keyEncipherment], + extended_key_usage: [serverAuth], + certificate_policies: [ + { policy_identifier: "2.16.840.1.99999.21.234", + cps_uris: ["http://example.com/cps","http://haha.com"], + user_notices: [ { explicit_text: "this is a great thing", organization: "my org", notice_numbers: "1,2,3" } ] + }, + { policy_identifier: "2.16.840.1.99999.21.235", + cps_uris: ["http://example.com/cps2"], + user_notices: [ { explicit_text: "this is a bad thing", organization: "another org", notice_numbers: "3,2,1" },{ explicit_text: "another user notice"} ] } + ] } + } } ocsp_delegate_ca: { - ca_cert: { - cert: 'test_ca.cer' - }, - ocsp_cert: { - cert: 'test_ca_ocsp.cer', - key: 'test_ca_ocsp.key' - } + ca_cert: { + cert: 'test_ca.cer' + }, + ocsp_cert: { + cert: 'test_ca_ocsp.cer', + key: 'test_ca_ocsp.key' + } } ocsp_chain_ca: { - ca_cert: { - cert: 'test_ca.cer' - }, - ocsp_cert: { - cert: 'test_ca_ocsp.cer', - key: 'test_ca_ocsp.key' - }, - ocsp_chain: 'test_ca_ocsp_chain.txt' + ca_cert: { + cert: 'test_ca.cer' + }, + ocsp_cert: { + cert: 'test_ca_ocsp.cer', + key: 'test_ca_ocsp.key' + }, + ocsp_chain: 'test_ca_ocsp_chain.txt' } ocsp_pkcs12_ca: { - ca_cert: { - cert: 'test_ca.cer' - }, - ocsp_cert: { - pkcs12: 'test_ca_ocsp.p12', - password: 'r509' - } + ca_cert: { + cert: 'test_ca.cer' + }, + ocsp_cert: { + pkcs12: 'test_ca_ocsp.p12', + password: 'r509' + } } ocsp_engine_ca: { - ca_cert: { - cert: 'test_ca.cer' - }, - ocsp_cert: { - cert: 'test_ca_ocsp.cer', - engine: 'chil' + ca_cert: { + cert: 'test_ca.cer' + }, + ocsp_cert: { + cert: 'test_ca_ocsp.cer', + engine: 'chil' + } +} +all_eku_ca: { + ca_cert: { + cert: 'test_ca.cer', + key: 'test_ca.key' + }, + message_digest: 'SHA1', + profiles: { + smorgasbord: { + basic_constraints: { "ca" : false }, + key_usage: [digitalSignature,keyEncipherment], + extended_key_usage: [serverAuth,clientAuth,codeSigning,emailProtection,OCSPSigning,timeStamping], } + } +} +ocsp_no_check_ca: { + ca_cert: { + cert: 'test_ca.cer', + key: 'test_ca.key' + }, + message_digest: 'SHA1', + profiles: { + ocsp_no_check_delegate: { + basic_constraints: { "ca" : false }, + key_usage: [digitalSignature], + extended_key_usage: [OCSPSigning], + ocsp_no_check: true + } + } }