autosign 0.1.1 → 1.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,93 +0,0 @@
1
- Feature: Generate autosign key
2
- In order to sign puppet certificates automatically
3
- I want to generate autosign keys programatically
4
- So I don't have to use static strings as keys
5
-
6
- Scenario: Generate new token
7
- Given a pre-shared key of "secret"
8
- And a hostname of "foo.example.com"
9
- And a file named "autosign.conf" with:
10
- """
11
- ---
12
- jwt_token:
13
- validity: '7200'
14
- secret: 'secret'
15
- """
16
- When I run `chmod 600 autosign.conf`
17
- And I run `autosign --config autosign.conf generate foo.example.com`
18
- Then the output should contain "Autosign token for: foo.example.com"
19
- And the output should contain "valid until"
20
- And the exit status should be 0
21
-
22
- Scenario: Generate new token using the --bare flag
23
- Given a pre-shared key of "secret"
24
- And a hostname of "foo.example.com"
25
- And a file named "autosign.conf" with:
26
- """
27
- ---
28
- jwt_token:
29
- validity: '7200'
30
- secret: 'secret'
31
- """
32
- When I run `chmod 600 autosign.conf`
33
- And I run `autosign --config autosign.conf generate --bare foo.example.com`
34
- Then the output should be a JSON web token
35
- And the output should not contain "Autosign token for: foo.example.com"
36
- And the output should not contain "valid until"
37
- And the exit status should be 0
38
-
39
- Scenario: Generate new reusable token
40
- Given a pre-shared key of "secret"
41
- And a hostname of "foo.example.com"
42
- And a file named "autosign.conf" with:
43
- """
44
- ---
45
- jwt_token:
46
- validity: '7200'
47
- secret: 'secret'
48
- """
49
- When I run `chmod 600 autosign.conf`
50
- When I run `autosign --config autosign.conf generate foo.example.com --reusable`
51
- Then the output should contain "Autosign token for: foo.example.com"
52
- And the output should contain "valid until"
53
- And the exit status should be 0
54
-
55
- Scenario: Validate a token
56
- Given a pre-shared key of "secret"
57
- And a hostname of "foo.example.com"
58
- And a file named "autosign.conf" with:
59
- """
60
- ---
61
- jwt_token:
62
- secret: 'secret'
63
- """
64
- When I run `chmod 600 autosign.conf`
65
- When I run `autosign --config autosign.conf validate --certname "foo.example.com" "eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzUxMiJ9.eyJkYXRhIjoie1wiY2VydG5hbWVcIjpcImZvby5leGFtcGxlLmNvbVwiLFwicmVxdWVzdGVyXCI6XCJEYW5pZWxzLU1hY0Jvb2stUHJvLTIubG9jYWxcIixcInJldXNhYmxlXCI6ZmFsc2UsXCJ2YWxpZGZvclwiOjI5OTk5OTk5OSxcInV1aWRcIjpcIjlkYTA0Yzc4LWQ5NjUtNDk2OC04MWNjLWVhM2RjZDllZjVjMFwifSIsImV4cCI6IjE3MzY0NjYxMzAifQ.PJwY8rIunVyWi_lw0ypFclME0jx3Vd9xJIQSyhN3VUmul3V8u4Tp9XwDgoAu9DVV0-WEG2Tfxs6F8R6Fn71Ndg"`
66
- Then the output should contain "token validated successfully"
67
- And the exit status should be 0
68
-
69
- Scenario: Not validate a bad token
70
- Given a pre-shared key of "secret"
71
- And a hostname of "foo.example.com"
72
- And a file named "autosign.conf" with:
73
- """
74
- ---
75
- jwt_token:
76
- secret: 'secret'
77
- """
78
- When I run `chmod 600 autosign.conf`
79
- When I run `autosign --config autosign.conf validate --certname "foo.example.com" "invalid_token"`
80
- Then the exit status should be 1
81
-
82
- Scenario: Not validate an expired token
83
- Given a pre-shared key of "secret"
84
- And a hostname of "foo.example.com"
85
- And a file named "autosign.conf" with:
86
- """
87
- ---
88
- jwt_token:
89
- secret: 'secret'
90
- """
91
- When I run `chmod 600 autosign.conf`
92
- When I run `autosign --config autosign.conf validate --certname "foo.example.com" "eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzUxMiJ9.eyJkYXRhIjoie1wiY2VydG5hbWVcIjpcImZvby5leGFtcGxlLmNvbVwiLFwicmVxdWVzdGVyXCI6XCJEYW5pZWxzLU1hY0Jvb2stUHJvLTIubG9jYWxcIixcInJldXNhYmxlXCI6ZmFsc2UsXCJ2YWxpZGZvclwiOjEsXCJ1dWlkXCI6XCJlNjI1Y2I1Ny02NzY5LTQwMzQtODNiZS0zNzkxNmQ5YmMxMDRcIn0iLCJleHAiOiIxNDM2NDY2MzAyIn0.UXEDEbRqEWx5SdSpQjfowU56JubY5Yz2QN6cckby2es-g2P_n2lyAS6AwFeliBXyCDyVUelIT3g1QP4TdB9EEA"`
93
- Then the exit status should be 1
@@ -1,44 +0,0 @@
1
- When(/^I get help for "([^"]*)"$/) do |app_name|
2
- @app_name = app_name
3
- step %(I run `#{app_name} help`)
4
- end
5
-
6
- Given(/^a pre\-shared key of "([^"]*)"$/) do |presharedkey|
7
- @psk = presharedkey
8
- end
9
-
10
- Given(/^a hostname of "([^"]*)"$/) do |host|
11
- @hostname = host
12
- end
13
-
14
- Given(/^the current time is (\d+)$/) do |time|
15
- @current_time = time
16
- end
17
-
18
- Given(/^a static token file containing:$/) do |multiline|
19
- @static_token_file = multiline
20
- end
21
-
22
- Given(/^a mocked "\/(\S*)" directory$/)do |directory|
23
- dir_name = File.join(File.expand_path(current_dir), "etc")
24
- FileUtils.mkdir_p dir_name
25
- set_env 'ETCROOT', dir_name
26
- # create_dir("etc")
27
- end
28
-
29
- Then(/^a "\/(\S*)" (?:file|directory) should exist$/) do |file|
30
- #expect(File.exist?(File.join(File.expand_path(current_dir), file))).to be true
31
- fullpath = File.join(File.expand_path(current_dir), file)
32
- FileUtils.mkdir_p fullpath
33
- $world.puts "path: " + fullpath
34
- expect(File.exist?(file)).to be true
35
- end
36
-
37
- #When(/^I pipe in the file "(.*?)"$/) do |file|
38
- # in_current_dir do
39
- # File.open(file, 'r').each_line do |line|
40
- # _write_interactive(line)
41
- # end
42
- # end
43
- # @interactive.stdin.close()
44
- #end
@@ -1,17 +0,0 @@
1
- require 'aruba/cucumber'
2
-
3
-
4
- ENV['PATH'] = "#{File.expand_path(File.dirname(__FILE__) + '/../../bin')}#{File::PATH_SEPARATOR}#{ENV['PATH']}"
5
- LIB_DIR = File.join(File.expand_path(File.dirname(__FILE__)),'..','..','lib')
6
-
7
- Before do
8
- # Using "announce" causes massive warnings on 1.9.2
9
- @puts = true
10
- @original_rubylib = ENV['RUBYLIB']
11
- ENV['RUBYLIB'] = LIB_DIR + File::PATH_SEPARATOR + ENV['RUBYLIB'].to_s
12
- $world = self
13
- end
14
-
15
- After do
16
- ENV['RUBYLIB'] = @original_rubylib
17
- end
@@ -1,22 +0,0 @@
1
- Feature: Validate autosign key
2
- In order to sign puppet certificates automatically
3
- I want to validate autosign keys programatically
4
- So that I only grant access to allowed systems without needing manual authorization
5
-
6
- Scenario: Validate a certificate signing request
7
- Given I set the environment variables to:
8
- | variable | value |
9
- | AUTOSIGN_TESTMODE | true |
10
- | AUTOSIGN_TEST_SECRET | secret |
11
- | AUTOSIGN_TEST_LOGLEVEL | info |
12
- | AUTOSIGN_TEST_JOURNALFILE | /tmp/autosign_journal |
13
- When I run `rm -f /tmp/autosign_journal`
14
- And I run `autosign-validator i-7672fe81` interactively
15
- And I pipe in the file "../../fixtures/i-7672fe81.pem"
16
- Then the output should contain "token validated successfully"
17
- Then the exit status should be 0
18
-
19
- Scenario: Do not validate a certificate signing request whose certname does not match the certificate
20
- When I run `autosign-validator wrong-certname.example.com` interactively
21
- And I pipe in the file "../../fixtures/i-7672fe81.pem"
22
- Then the exit status should be 1
@@ -1,34 +0,0 @@
1
- -----BEGIN CERTIFICATE REQUEST-----
2
- MIIF9jCCA94CAQAwFTETMBEGA1UEAwwKaS03NjcyZmU4MTCCAiIwDQYJKoZIhvcN
3
- AQEBBQADggIPADCCAgoCggIBAKKhHBbqjeZUoeOoeeM2x3OT0CgbwN/GQfpKkuYc
4
- 8WowPKyRqqYnyMuQmEq4g7E5VwCkNWJYhbz+dwqmg+xCetKMD6LXd2y2ro2XmqIp
5
- QTlEj833Voi3ULiesbqaY3tRZbJ/VyeycjgcClyqXA6JCwgvI3o92imXQSJanNRe
6
- XN4MWPRkunAKqPahJyQ+++Oov+vBlS6RJdQGa1+2+qi18f323UJlwYeCDvV6psKi
7
- FRMIBgJVKbuRMC1E381/MXr/J8WQK4IGbJP6oDeOGQujDwRYw6+byrx9Xbi2fvpA
8
- T0ff4+9aAfBatkBG9O8ZGPxUMk//nPKo78qwEZWo1cCsWXdPZyEafu4uNi7B5nQf
9
- EAwYofM3Igh6F5tHXmi/IyqNHIubfLJwrR/RFZW41zEyAqTTRcQxZsXR0bqTuFIm
10
- ki0q7+6E9hPfG9bo2ux4rC5ttmmlEYELdRmpicfybB0S0w4JxVu+qNY4wVnQc2KS
11
- 6Sdif4EA3F+pvi21q0Nil8Xwp2xzdp7HDnTevZm/lKYyDv5XIhhAbCb3MVHuSRg1
12
- WBEp0YScn4wju1XUwrczgT2FZx9PQ6Pqb8kWvED988tLE8yULqMpMHeDF/goNNJb
13
- X9I521XSOLTPsKOALGeVt13CafO/Kuji+uQDXvj4hNUjIc49wvm30Gdng0IWnXsx
14
- srXbAgMBAAGgggGaMIIBlgYJKoZIhvcNAQkHMYIBhxOCAYNleUowZVhBaU9pSktW
15
- MVFpTENKaGJHY2lPaUpJVXpVeE1pSjkuZXlKa1lYUmhJam9pZTF3aVkyVnlkRzVo
16
- YldWY0lqcGNJbWt0TnpZM01tWmxPREZjSWl4Y0luSmxjWFZsYzNSbGNsd2lPbHdp
17
- UkdGdWFXVnNjeTFOWVdOQ2IyOXJMVkJ5YnkweUxteHZZMkZzWENJc1hDSnlaWFZ6
18
- WVdKc1pWd2lPbVpoYkhObExGd2lkbUZzYVdSbWIzSmNJam94TlRjMk9EQXdNREFz
19
- WENKMWRXbGtYQ0k2WENKbE16WmtNemt5T1MwNU5XVmxMVFF5TkRRdE9USXdaUzAw
20
- Tm1aaU4yWTRNVFUzWkRWY0luMGlMQ0psZUhBaU9pSXhOVGsxTVRjM05UYzBJbjAu
21
- Z2ZUcFVQTEdueHd0dmZNSDVDMHVjV3NYQnFyaEJEX0h2Q2lOSF85enZoRmFmSE1p
22
- al9uZzE0SzhGLU1NTGdRb0RCbG9PSnVralg4cWNraTVjRm1LS2cwDQYJKoZIhvcN
23
- AQELBQADggIBABneBgIDyCee43GXJGduaZKVVepGtfYsgmI3Uvq9AU+UNNrF56d/
24
- PhwsttTDC1V+vHBNuVq3hPgAb5TJ+f3DDT2v/3KenzAsOFRi0WEJ+iXjFRb4pJ8F
25
- cDsyyPgqTkAnIMTk1dnMvzP3yrROVqnE0XU/EvFv9aiWcFd8e/HSkWXQoo1SnTxp
26
- Ax6Dz673j9DBJwlg6yiFVvzO/styBAuVZBxA9r1VBUZUXqjmqQ36V8CJ+nATwoWt
27
- rKQDpz+jR3WoKtFm3IIctHOYzv2G0bUCOhALKPVqqaaXCLnlWS1T+a9IwkwsH5eN
28
- iOAb/NlSMO8vbXHyNV3zyNHEHGFzBgTYhQKJQvfPWPEpAG10jwvG5lY69wVev9+l
29
- 4rg841j7FNc4A6URyZ4rgKdr45LDZODNyCKgPEc+cU5dPjORbRISo5SAfIAol+yo
30
- vIrhs1Bgs3sltnhGu9MJn9ffIhLyNkzstPaxP1xg+6yRiMXFTYxeAICtljgCAIPf
31
- ZKngEMO5ZQUoVEW1TfyFYjkxbXDy76JbmgsLHPaFfDvXBJzquzKjDObAvBHx260Y
32
- SGV4B8i9/ckcNSApkamuayZNSpelbLkrnkVqJy9XE8cQUgjwv7n8FJQMi/lmbwk6
33
- NbdRflL16fC52CXimwJD+jmlmjK3nE7B3z96L41dV/vW/pzjXIKuKepH
34
- -----END CERTIFICATE REQUEST-----
@@ -1,102 +0,0 @@
1
- require 'coveralls'
2
- Coveralls.wear!
3
- # This file was generated by the `rspec --init` command. Conventionally, all
4
- # specs live under a `spec` directory, which RSpec adds to the `$LOAD_PATH`.
5
- # The generated `.rspec` file contains `--require spec_helper` which will cause
6
- # this file to always be loaded, without a need to explicitly require it in any
7
- # files.
8
- #
9
- # Given that it is always loaded, you are encouraged to keep this file as
10
- # light-weight as possible. Requiring heavyweight dependencies from this file
11
- # will add to the boot time of your test suite on EVERY test run, even for an
12
- # individual file that may not need all of that loaded. Instead, consider making
13
- # a separate helper file that requires the additional dependencies and performs
14
- # the additional setup, and require it from the spec files that actually need
15
- # it.
16
- #
17
- # The `.rspec` file also contains a few flags that are not defaults but that
18
- # users commonly want.
19
- #
20
- # See http://rubydoc.info/gems/rspec-core/RSpec/Core/Configuration
21
- #
22
- require_relative "../lib/autosign"
23
- @fixture_path = File.expand_path(File.join(__FILE__, '..', 'fixtures'))
24
-
25
- RSpec.configure do |config|
26
- # rspec-expectations config goes here. You can use an alternate
27
- # assertion/expectation library such as wrong or the stdlib/minitest
28
- # assertions if you prefer.
29
- config.expect_with :rspec do |expectations|
30
- # This option will default to `true` in RSpec 4. It makes the `description`
31
- # and `failure_message` of custom matchers include text for helper methods
32
- # defined using `chain`, e.g.:
33
- # be_bigger_than(2).and_smaller_than(4).description
34
- # # => "be bigger than 2 and smaller than 4"
35
- # ...rather than:
36
- # # => "be bigger than 2"
37
- expectations.include_chain_clauses_in_custom_matcher_descriptions = true
38
- end
39
-
40
- # rspec-mocks config goes here. You can use an alternate test double
41
- # library (such as bogus or mocha) by changing the `mock_with` option here.
42
- config.mock_with :rspec do |mocks|
43
- # Prevents you from mocking or stubbing a method that does not exist on
44
- # a real object. This is generally recommended, and will default to
45
- # `true` in RSpec 4.
46
- mocks.verify_partial_doubles = true
47
- end
48
-
49
- # The settings below are suggested to provide a good initial experience
50
- # with RSpec, but feel free to customize to your heart's content.
51
- =begin
52
- # These two settings work together to allow you to limit a spec run
53
- # to individual examples or groups you care about by tagging them with
54
- # `:focus` metadata. When nothing is tagged with `:focus`, all examples
55
- # get run.
56
- config.filter_run :focus
57
- config.run_all_when_everything_filtered = true
58
-
59
- # Allows RSpec to persist some state between runs in order to support
60
- # the `--only-failures` and `--next-failure` CLI options. We recommend
61
- # you configure your source control system to ignore this file.
62
- config.example_status_persistence_file_path = "spec/examples.txt"
63
-
64
- # Limits the available syntax to the non-monkey patched syntax that is
65
- # recommended. For more details, see:
66
- # - http://myronmars.to/n/dev-blog/2012/06/rspecs-new-expectation-syntax
67
- # - http://www.teaisaweso.me/blog/2013/05/27/rspecs-new-message-expectation-syntax/
68
- # - http://myronmars.to/n/dev-blog/2014/05/notable-changes-in-rspec-3#new__config_option_to_disable_rspeccore_monkey_patching
69
- config.disable_monkey_patching!
70
-
71
- # This setting enables warnings. It's recommended, but in some cases may
72
- # be too noisy due to issues in dependencies.
73
- config.warnings = true
74
-
75
- # Many RSpec users commonly either run the entire suite or an individual
76
- # file, and it's useful to allow more verbose output when running an
77
- # individual spec file.
78
- if config.files_to_run.one?
79
- # Use the documentation formatter for detailed output,
80
- # unless a formatter has already been configured
81
- # (e.g. via a command-line flag).
82
- config.default_formatter = 'doc'
83
- end
84
-
85
- # Print the 10 slowest examples and example groups at the
86
- # end of the spec run, to help surface which specs are running
87
- # particularly slow.
88
- config.profile_examples = 10
89
-
90
- # Run specs in random order to surface order dependencies. If you find an
91
- # order dependency and want to debug it, you can fix the order by providing
92
- # the seed, which is printed after each run.
93
- # --seed 1234
94
- config.order = :random
95
-
96
- # Seed global randomization in this process using the `--seed` CLI option.
97
- # Setting this allows you to use `--seed` to deterministically reproduce
98
- # test failures related to randomization by passing the same `--seed` value
99
- # as the one that triggered the failure.
100
- Kernel.srand config.seed
101
- =end
102
- end
@@ -1,20 +0,0 @@
1
- require 'spec_helper'
2
-
3
- context Autosign::Config do
4
- describe 'basic use case' do
5
- let(:settings) { {} }
6
- let(:config) { Autosign::Config.new }
7
- it 'accepts a hash as the parameter' do
8
- expect { Autosign::Config.new(settings) }.to_not raise_error
9
- end
10
- it 'Returns hash' do
11
- expect(config.settings).to be_a(Hash)
12
- end
13
- it 'Settings contains general section' do
14
- expect(config.settings).to include(
15
- 'general' => be_a(Hash)
16
- )
17
- end
18
-
19
- end
20
- end
@@ -1,16 +0,0 @@
1
- require 'spec_helper'
2
-
3
- context Autosign::Decoder do
4
- describe '.decode_csr' do
5
- let(:csr) { File.read(File.join('fixtures', 'i-7672fe81.pem')) }
6
- it 'Accepts a CSR as the parameter' do
7
- expect { Autosign::Decoder.decode_csr(csr) }.to_not raise_error
8
- end
9
- it 'Extracts the challenge_password and common_name from a CSR' do
10
- expect(Autosign::Decoder.decode_csr(csr)).to eq({:challenge_password=>"eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzUxMiJ9.eyJkYXRhIjoie1wiY2VydG5hbWVcIjpcImktNzY3MmZlODFcIixcInJlcXVlc3RlclwiOlwiRGFuaWVscy1NYWNCb29rLVByby0yLmxvY2FsXCIsXCJyZXVzYWJsZVwiOmZhbHNlLFwidmFsaWRmb3JcIjoxNTc2ODAwMDAsXCJ1dWlkXCI6XCJlMzZkMzkyOS05NWVlLTQyNDQtOTIwZS00NmZiN2Y4MTU3ZDVcIn0iLCJleHAiOiIxNTk1MTc3NTc0In0.gfTpUPLGnxwtvfMH5C0ucWsXBqrhBD_HvCiNH_9zvhFafHMij_ng14K8F-MMLgQoDBloOJukjX8qcki5cFmKKg", :common_name=>"i-7672fe81"})
11
- end
12
- it 'Returns nil given an invalid CSR' do
13
- expect(Autosign::Decoder.decode_csr("not_a_csr")).to be_nil
14
- end
15
- end
16
- end
@@ -1,41 +0,0 @@
1
- require 'spec_helper'
2
- require 'securerandom'
3
-
4
- context Autosign::Journal do
5
- let(:settings) { {'journalfile' => '/tmp/test.journal'} }
6
- let(:journal) { Autosign::Journal.new(settings) }
7
- let(:uuid) { SecureRandom.uuid }
8
- let(:validto) { Time.now.to_i + 900 }
9
- let(:data) { {'arbitrary_hey' => 'value'} }
10
-
11
-
12
- context 'class methods' do
13
- describe '.new' do
14
- it 'accepts a hash as the parameter' do
15
- expect { Autosign::Journal.new(settings) }.to_not raise_error
16
- end
17
- end
18
- end
19
-
20
- context 'instance methods' do
21
- describe '.add' do
22
- it 'Returns hash' do
23
- expect(journal.settings).to be_a(Hash)
24
- end
25
- it 'adds an entry to the journal with a data hash' do
26
- expect(journal.add(uuid, validto, data)).to be true
27
- end
28
- it 'adds an entry to the journal without a data hash' do
29
- expect(journal.add(uuid, validto)).to be true
30
- end
31
- it 'fail when adding two duplicate entries to the journal' do
32
- expect(journal.add(uuid, validto, data)).to be true
33
- expect(journal.add(uuid, validto, data)).to be false
34
- end
35
- it 'fail when adding an invalid UUID to the journal' do
36
- expect(journal.add('invalid' + uuid, validto, data)).to be false
37
- end
38
- end
39
-
40
- end
41
- end
@@ -1,102 +0,0 @@
1
- require 'spec_helper'
2
- require 'securerandom'
3
-
4
- context Autosign::Token do
5
- let(:certname) { 'host.example.com' }
6
- let(:reusable) { false }
7
- let(:validfor) { rand(60..604800) }
8
- let(:requester) { 'Autosign::Token rspec_test' }
9
- let(:secret) { 'very_secret' }
10
- let(:token) { Autosign::Token.new(certname, reusable, validfor, requester, secret) }
11
- let(:reusable_token) { Autosign::Token.new(certname, true, validfor, requester, secret) }
12
- let(:signed_token) { token.sign }
13
- let(:wildcard_signed_token) { Autosign::Token.new('/.*\.example\.com/', reusable, validfor, requester, secret).sign }
14
- let(:expired_token) { Autosign::Token.new(certname, reusable, -1, requester, secret).sign }
15
- let(:reconstituted_token) { Autosign::Token.from_token(signed_token, secret) }
16
-
17
-
18
- context 'class methods' do
19
- describe '.new' do
20
- it 'accepts expected parameters' do
21
- expect { Autosign::Token.new(certname, reusable, validfor, requester, secret) }.to_not raise_error
22
- end
23
- end
24
- describe '.validate' do
25
- it 'validates a previously-generated token' do
26
- expect(Autosign::Token.validate(certname, signed_token, secret)).to be true
27
- end
28
- it 'validates a previously-generated wildcard token' do
29
- expect(Autosign::Token.validate(certname, wildcard_signed_token, secret)).to be true
30
- end
31
- it 'does not validate a previously-generated wildcard token when it does not match the hostname' do
32
- expect(Autosign::Token.validate('not_the_regex', wildcard_signed_token, secret)).to be false
33
- end
34
- it 'does not validate a token when the secret does not match' do
35
- expect(Autosign::Token.validate(certname, signed_token, 'wrong_secret')).to be false
36
- end
37
- it 'does not validate a token when the certname does not match' do
38
- expect(Autosign::Token.validate('wrong' + certname, signed_token, secret)).to be false
39
- end
40
- it 'does not validate an expired token' do
41
- expect(Autosign::Token.validate(certname, expired_token, secret)).to be false
42
- end
43
- end
44
- describe '.from_token' do
45
- it 'returns an Autosign::Token instance' do
46
- expect(Autosign::Token.from_token(signed_token, secret)).to be_a(Autosign::Token)
47
- end
48
- it 'has the same hash values as the original token' do
49
- expect(reconstituted_token.to_hash).to eq(token.to_hash)
50
- end
51
- end
52
- describe '.token_validto' do
53
- it 'returns an integer' do
54
- expect(Autosign::Token.token_validto(signed_token, secret)).to be_an(Integer)
55
- end
56
- it 'returns valid POSIX time' do
57
- expect(Time.at(Autosign::Token.token_validto(signed_token, secret))).to be_a(Time)
58
- end
59
- it 'returns time reasonable close to the current time' do
60
- expect(Time.at(Autosign::Token.token_validto(signed_token, secret)).between?(Time.now, Time.now + 604801)).to be true
61
- end
62
- end
63
- end
64
-
65
- context 'instance methods' do
66
- describe '.validto' do
67
- it 'returns an integer' do
68
- expect(token.validfor).to be_a(Integer)
69
- end
70
- it 'Returns validto time' do
71
- expect(token.validfor).to eq(validfor)
72
- end
73
- end
74
- describe '.reusable' do
75
- it 'returns the expected value' do
76
- expect(token.reusable).to be(reusable)
77
- expect(reusable_token.reusable).to be true
78
- end
79
- end
80
- describe '.to_hash' do
81
- it 'returns a hash' do
82
- expect(token.to_hash).to be_a(Hash)
83
- end
84
- it 'includes the expected certname, requester, reusable, validfor, and a uuid' do
85
- expect(token.to_hash).to include(
86
- "certname" => eq(certname),
87
- "requester" => eq(requester),
88
- "reusable" => eq(reusable),
89
- "validfor" => eq(validfor),
90
- "uuid" => be_a(String)
91
- )
92
- end
93
- end
94
- describe '.sign' do
95
- it 'returns a string' do
96
- expect(token.sign).to be_a(String)
97
- end
98
- end
99
-
100
-
101
- end
102
- end