spec/fixtures.rb in r509-0.10.0 vs spec/fixtures.rb in r509-1.0

- old
+ new

@@ -1,26 +1,27 @@ require 'spec_helper' require 'pathname' require 'r509/io_helpers' +# Contains constants and other values for testing purposes module TestFixtures extend R509::IOHelpers FIXTURES_PATH = Pathname.new(__FILE__).dirname + "fixtures" def self.read_fixture(filename) read_data((FIXTURES_PATH + filename).to_s) end - #Trustwave cert for langui.sh + # Trustwave cert for langui.sh CERT = read_fixture('cert1.pem') CERT_INHIBIT = read_fixture('cert_inhibit.pem') CERT_POLICY_CONSTRAINTS = read_fixture('cert_policy_constraints.pem') CERT_NAME_CONSTRAINTS = read_fixture('cert_name_constraints.pem') - #Trustwave root cert + # Trustwave root cert STCA_CERT = read_fixture('stca.pem') CERT_PUBLIC_KEY_MODULUS = read_fixture('cert1_public_key_modulus.txt') # cert without key usage @@ -39,15 +40,14 @@ DSA_KEY = read_fixture('dsa_key.pem') # this CSR has unknown OIDs, which we should successfully parse out into Subject CSR_UNKNOWN_OID = read_fixture('unknown_oid.csr') - - #san cert from self-signed CA for langui.sh + # san cert from self-signed CA for langui.sh CERT_SAN = read_fixture('cert_san.pem') - #Another san cert for langui.sh, but differentiating between the CN and + # Another san cert for langui.sh, but differentiating between the CN and # SANs. CERT_SAN2 = read_fixture('cert_san2.pem') CERT_DER = read_fixture('cert1.der') @@ -134,14 +134,14 @@ TEST_CA_CRL_KEY = read_fixture('test_ca_crl.key') TEST_CA_SUBROOT_CERT = read_fixture('test_ca_subroot.cer') TEST_CA_SUBROOT_KEY = read_fixture('test_ca_subroot.key') - #this chain contains 2 certs. root and OCSP delegate - #in a prod environment you'd really only need the delegate - #since the root would be present in the root store of the - #client, but I wanted to test > 1 + # this chain contains 2 certs. root and OCSP delegate + # in a prod environment you'd really only need the delegate + # since the root would be present in the root store of the + # client, but I wanted to test > 1 TEST_CA_OCSP_CHAIN = read_fixture('test_ca_ocsp_chain.txt') TEST_CA_OCSP_RESPONSE = read_fixture('test_ca_ocsp_response.der') TEST_CA_SUBROOT_OCSP_RESPONSE = read_fixture('test_ca_subroot_ocsp_response.der') @@ -153,17 +153,18 @@ OCSP_TEST_CERT2 = read_fixture('ocsptest2.r509.local.pem') STCA_OCSP_REQUEST = read_fixture('stca_ocsp_request.der') STCA_OCSP_RESPONSE = read_fixture('stca_ocsp_response.der') - CRL_LIST_FILE = (FIXTURES_PATH+'crl_list_file.txt').to_s + CRL_LIST_FILE = (FIXTURES_PATH + 'crl_list_file.txt').to_s CRL_REASON = read_fixture("crl_with_reason.pem") HMACSHA512_SIG = read_fixture("hmacsha512.sig") HMACSHA1_SIG = read_fixture("hmacsha1.sig") + CRL_LIST_SQLITE = read_fixture("crl_list.sql") def self.test_ca_cert R509::Cert.new(:cert => TEST_CA_CERT, :key => TEST_CA_KEY) end def self.test_ca_crl_delegate @@ -182,57 +183,73 @@ R509::Cert.new(:cert => TEST_CA_SUBROOT_CERT, :key => TEST_CA_SUBROOT_KEY) end def self.test_ca_server_profile R509::Config::CertProfile.new( - :basic_constraints => R509::Cert::Extensions::BasicConstraints.new({:ca => false }), - :key_usage => R509::Cert::Extensions::KeyUsage.new(:value => ["digitalSignature","keyEncipherment"]), + :basic_constraints => R509::Cert::Extensions::BasicConstraints.new(:ca => false), + :key_usage => R509::Cert::Extensions::KeyUsage.new(:value => ["digitalSignature", "keyEncipherment"]), :extended_key_usage => R509::Cert::Extensions::ExtendedKeyUsage.new(:value => ["serverAuth"]), - :certificate_policies => R509::Cert::Extensions::CertificatePolicies.new(:value => [ + :certificate_policies => R509::Cert::Extensions::CertificatePolicies.new( + :value => [ { :policy_identifier => "2.16.840.1.12345.1.2.3.4.1", - :cps_uris => ["http://example.com/cps","http://other.com/cps"], - :user_notices => [ {:explicit_text => "thing", :organization => "my org", :notice_numbers => [1,2,3,4]} ] - } - ]) + :cps_uris => ["http://example.com/cps", "http://other.com/cps"], + :user_notices => [ + { + :explicit_text => "thing", + :organization => "my org", + :notice_numbers => [1, 2, 3, 4] + } + ] + } + ] + ) ) - end def self.test_ca_server_profile_with_subject_item_policy subject_item_policy = R509::Config::SubjectItemPolicy.new( - "CN" => { :policy => "required"}, - "O" => { :policy => "optional"}, - "ST" => { :policy => "required"}, - "C" => { :policy => "required"}, - "OU" => { :policy => "optional"} + "CN" => { :policy => "required" }, + "O" => { :policy => "optional" }, + "ST" => { :policy => "required" }, + "C" => { :policy => "required" }, + "OU" => { :policy => "optional" } ) R509::Config::CertProfile.new( - :basic_constraints => R509::Cert::Extensions::BasicConstraints.new({:ca => false }), - :key_usage => R509::Cert::Extensions::KeyUsage.new(:value => ["digitalSignature","keyEncipherment"]), + :basic_constraints => R509::Cert::Extensions::BasicConstraints.new(:ca => false), + :key_usage => R509::Cert::Extensions::KeyUsage.new(:value => ["digitalSignature", "keyEncipherment"]), :extended_key_usage => R509::Cert::Extensions::ExtendedKeyUsage.new(:value => ["serverAuth"]), - :certificate_policies => R509::Cert::Extensions::CertificatePolicies.new(:value => [ - { :policy_identifier => "2.16.840.1.12345.1.2.3.4.1", - :cps_uris => ["http://example.com/cps","http://other.com/cps"], - :user_notices => [ {:explicit_text => "thing", :organization => "my org", :notice_numbers => [1,2,3,4]} ] - } - ]), + :certificate_policies => R509::Cert::Extensions::CertificatePolicies.new( + :value => [ + { + :policy_identifier => "2.16.840.1.12345.1.2.3.4.1", + :cps_uris => ["http://example.com/cps", "http://other.com/cps"], + :user_notices => [ + { + :explicit_text => "thing", + :organization => "my org", + :notice_numbers => [1, 2, 3, 4] + } + ] + } + ] + ), :subject_item_policy => subject_item_policy ) end def self.test_ca_subroot_profile R509::Config::CertProfile.new( - :basic_constraints => {:ca => true, :path_length => 0 }, - :key_usage => {:value => ["keyCertSign","cRLSign"]}, + :basic_constraints => { :ca => true, :path_length => 0 }, + :key_usage => { :value => ["keyCertSign", "cRLSign"] }, :certificate_policies => nil) end def self.test_ca_ocspsigner_profile R509::Config::CertProfile.new( :basic_constraints => { :ca => false }, - :key_usage => {:value => ["digitalSignature"]}, - :extended_key_usage => {:value => ["OCSPSigning"]}, + :key_usage => { :value => ["digitalSignature"] }, + :extended_key_usage => { :value => ["OCSPSigning"] }, :certificate_policies => nil) end # @return [R509::Config::CAConfig] def self.test_ca_config @@ -240,11 +257,11 @@ crl_list_sio.set_encoding("BINARY") if crl_list_sio.respond_to?(:set_encoding) crl_number_sio = StringIO.new crl_number_sio.set_encoding("BINARY") if crl_number_sio.respond_to?(:set_encoding) opts = { - :ca_cert => test_ca_cert(), + :ca_cert => test_ca_cert, :ocsp_start_skew_seconds => 3600, :ocsp_validity_hours => 48, :crl_list_file => crl_list_sio, :crl_number_file => crl_number_sio } @@ -264,11 +281,11 @@ crl_list_sio.set_encoding("BINARY") if crl_list_sio.respond_to?(:set_encoding) crl_number_sio = StringIO.new crl_number_sio.set_encoding("BINARY") if crl_number_sio.respond_to?(:set_encoding) opts = { - :ca_cert => test_ca_cert(), + :ca_cert => test_ca_cert, :ocsp_start_skew_seconds => 3600, :ocsp_validity_hours => 48, :crl_list_file => crl_list_sio, :crl_number_file => crl_number_sio } @@ -280,11 +297,11 @@ crl_list_sio.set_encoding("BINARY") if crl_list_sio.respond_to?(:set_encoding) crl_number_sio = StringIO.new crl_number_sio.set_encoding("BINARY") if crl_number_sio.respond_to?(:set_encoding) opts = { - :ca_cert => test_ca_ec_cert(), + :ca_cert => test_ca_ec_cert, :ocsp_start_skew_seconds => 3600, :ocsp_validity_hours => 48, :crl_list_file => crl_list_sio, :crl_number_file => crl_number_sio } @@ -296,10 +313,10 @@ crl_list_sio.set_encoding("BINARY") if crl_list_sio.respond_to?(:set_encoding) crl_number_sio = StringIO.new crl_number_sio.set_encoding("BINARY") if crl_number_sio.respond_to?(:set_encoding) opts = { - :ca_cert => test_ca_dsa_cert(), + :ca_cert => test_ca_dsa_cert, :ocsp_start_skew_seconds => 3600, :ocsp_validity_hours => 48, :crl_list_file => crl_list_sio, :crl_number_file => crl_number_sio }