spec/fixtures/config_test_various.yaml in r509-0.9.2 vs spec/fixtures/config_test_various.yaml in r509-0.10.0

- old
+ new

@@ -1,138 +1,148 @@ -pkcs12_ca: { - ca_cert: { - pkcs12: "test_ca.p12", - password: "r509" - } -} -pkcs12_key_ca: { - ca_cert: { - pkcs12: "test_ca.p12", - password: "r509", - key: "test_ca.cer" - } -} -pkcs12_cert_ca: { - ca_cert: { - pkcs12: "test_ca.p12", - password: "r509", - cert: "test_ca.cer" - } -} -pkcs12_engine_ca: { - ca_cert: { - pkcs12: "test_ca.p12", - password: "r509", - engine: "chil", - key_name: "r509_key" - } -} -cert_no_key_ca: { - ca_cert: { - cert: "test_ca.cer" - } -} -missing_key_identifier_ca: { - ca_cert: { - cert: 'missing_key_identifier_ca.cer', - key: 'missing_key_identifier_ca.key' - }, - message_digest: 'SHA1', - profiles: { - server: { - basic_constraints: { "ca" : false }, - key_usage: [digitalSignature,keyEncipherment], - extended_key_usage: [serverAuth], - } - } -} -multi_policy_ca: { - ca_cert: { - cert: 'test_ca.cer', - key: 'test_ca.key' - }, - message_digest: 'SHA1', - profiles: { - server: { - basic_constraints: { "ca" : false }, - key_usage: [digitalSignature,keyEncipherment], - extended_key_usage: [serverAuth], - certificate_policies: [ - { policy_identifier: "2.16.840.1.99999.21.234", - cps_uris: ["http://example.com/cps","http://haha.com"], - user_notices: [ { explicit_text: "this is a great thing", organization: "my org", notice_numbers: "1,2,3" } ] - }, - { policy_identifier: "2.16.840.1.99999.21.235", - cps_uris: ["http://example.com/cps2"], - user_notices: [ { explicit_text: "this is a bad thing", organization: "another org", notice_numbers: "3,2,1" },{ explicit_text: "another user notice"} ] - }, - { policy_identifier: "2.16.840.1.99999.0" } - ] - } - } -} -ocsp_delegate_ca: { - ca_cert: { - cert: 'test_ca.cer' - }, - ocsp_cert: { - cert: 'test_ca_ocsp.cer', - key: 'test_ca_ocsp.key' - } -} -ocsp_chain_ca: { - ca_cert: { - cert: 'test_ca.cer' - }, - ocsp_cert: { - cert: 'test_ca_ocsp.cer', - key: 'test_ca_ocsp.key' - }, - ocsp_chain: 'test_ca_ocsp_chain.txt' -} -ocsp_pkcs12_ca: { - ca_cert: { - cert: 'test_ca.cer' - }, - ocsp_cert: { - pkcs12: 'test_ca_ocsp.p12', - password: 'r509' - } -} -ocsp_engine_ca: { - ca_cert: { - cert: 'test_ca.cer' - }, - ocsp_cert: { - cert: 'test_ca_ocsp.cer', - engine: 'chil' - } -} -all_eku_ca: { - ca_cert: { - cert: 'test_ca.cer', - key: 'test_ca.key' - }, - message_digest: 'SHA1', - profiles: { - smorgasbord: { - basic_constraints: { "ca" : false }, - key_usage: [digitalSignature,keyEncipherment], - extended_key_usage: [serverAuth,clientAuth,codeSigning,emailProtection,OCSPSigning,timeStamping], - } - } -} -ocsp_no_check_ca: { - ca_cert: { - cert: 'test_ca.cer', - key: 'test_ca.key' - }, - message_digest: 'SHA1', - profiles: { - ocsp_no_check_delegate: { - basic_constraints: { "ca" : false }, - key_usage: [digitalSignature], - extended_key_usage: [OCSPSigning], +--- +pkcs12_ca: + ca_cert: + pkcs12: test_ca.p12 + password: r509 +pkcs12_key_ca: + ca_cert: + pkcs12: test_ca.p12 + password: r509 + key: test_ca.cer +pkcs12_cert_ca: + ca_cert: + pkcs12: test_ca.p12 + password: r509 + cert: test_ca.cer +pkcs12_engine_ca: + ca_cert: + pkcs12: test_ca.p12 + password: r509 + engine: + :so_path: '/some/path' + :id: chil + key_name: r509_key +cert_no_key_ca: + ca_cert: + cert: test_ca.cer +missing_key_identifier_ca: + ca_cert: + cert: missing_key_identifier_ca.cer + key: missing_key_identifier_ca.key + profiles: + server: + basic_constraints: + ca: false + key_usage: + - digitalSignature + - keyEncipherment + extended_key_usage: + - serverAuth +multi_policy_ca: + ca_cert: + cert: test_ca.cer + key: test_ca.key + profiles: + server: + basic_constraints: + :ca: false + key_usage: + - digitalSignature + - keyEncipherment + extended_key_usage: + - serverAuth + certificate_policies: + - :policy_identifier: 2.16.840.1.99999.21.234 + :cps_uris: + - http://example.com/cps + - http://haha.com + :user_notices: + - :explicit_text: this is a great thing + :organization: my org + :notice_numbers: '1,2,3' + - :policy_identifier: 2.16.840.1.99999.21.235 + :cps_uris: + - http://example.com/cps2 + :user_notices: + - :explicit_text: this is a bad thing + :organization: another org + :notice_numbers: '3,2,1' + - :explicit_text: another user notice + - :policy_identifier: 2.16.840.1.99999.0 +ocsp_delegate_ca: + ca_cert: + cert: test_ca.cer + ocsp_cert: + cert: test_ca_ocsp.cer + key: test_ca_ocsp.key +ocsp_chain_ca: + ca_cert: + cert: test_ca.cer + ocsp_cert: + cert: test_ca_ocsp.cer + key: test_ca_ocsp.key + ocsp_chain: test_ca_ocsp_chain.txt +ocsp_pkcs12_ca: + ca_cert: + cert: test_ca.cer + ocsp_cert: + pkcs12: test_ca_ocsp.p12 + password: r509 +ocsp_engine_ca: + ca_cert: + cert: test_ca.cer + ocsp_cert: + cert: test_ca_ocsp.cer + engine: + :so_path: '/some/path' + :id: chil +crl_delegate_ca: + ca_cert: + cert: test_ca.cer + crl_cert: + cert: test_ca_crl.cer + key: test_ca_crl.key +crl_pkcs12_ca: + ca_cert: + cert: test_ca.cer + crl_cert: + pkcs12: test_ca_crl.p12 + password: r509 +crl_engine_ca: + ca_cert: + cert: test_ca.cer + crl_cert: + cert: test_ca_crl.cer + engine: + :so_path: '/some/path' + :id: chil +all_eku_ca: + ca_cert: + cert: test_ca.cer + key: test_ca.key + profiles: + smorgasbord: + basic_constraints: + :ca: false + key_usage: + - digitalSignature + - keyEncipherment + extended_key_usage: + - serverAuth + - clientAuth + - codeSigning + - emailProtection + - OCSPSigning + - timeStamping +ocsp_no_check_ca: + ca_cert: + cert: test_ca.cer + key: test_ca.key + profiles: + ocsp_no_check_delegate: + basic_constraints: + :ca: false + key_usage: + - digitalSignature + extended_key_usage: + - OCSPSigning ocsp_no_check: true - } - } -}