cf-uaac 4.18.0 → 4.19.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/uaa/cli/curl.rb +5 -1
- data/spec/curl_spec.rb +15 -0
- data/version.txt +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 6f5bcc95b18627430a6f5b9ccadd06ee3b92efddea46ea9ddca029e3eb526670
|
4
|
+
data.tar.gz: 75969649441d6fcbc1cb157d9190f7fae1a85e8f0b647b7bc45b5ae072754b37
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 97c8133e46de3e2f540da53cb703850a0b0e371cafde2212bd4232afbab8515d1ab5fd4ec1f9bc51a241439055c7e7e7f4de751bce201e04bb6d77cf9cc1b1ba
|
7
|
+
data.tar.gz: 127661abd511141faef173f43c65753f0d84849cf2a423e868dc738ea1433b02a0cbd3e81d6cb998fffd34b8cdc33cb0caf3bb85ea59b37dca337c18556ddb92
|
data/lib/uaa/cli/curl.rb
CHANGED
@@ -27,9 +27,10 @@ module CF::UAA
|
|
27
27
|
define_option :data, "-d", "--data <data>", "data included in request body"
|
28
28
|
define_option :header, "-H", "--header <header>", "header to be included in the request"
|
29
29
|
define_option :insecure, "-k", "--insecure", "makes request without verifying SSL certificates"
|
30
|
+
define_option :cacert, "-C", "--cacert <ca_file>", "CA certificate to verify peer against"
|
30
31
|
define_option :bodyonly, "-b", "--bodyonly", "show body only in response"
|
31
32
|
|
32
|
-
desc "curl [path]", "CURL to a UAA endpoint", :request, :data, :header, :insecure , :bodyonly do |path|
|
33
|
+
desc "curl [path]", "CURL to a UAA endpoint", :request, :data, :header, :insecure , :bodyonly, :cacert do |path|
|
33
34
|
return say_command_help(["curl"]) unless path
|
34
35
|
|
35
36
|
uri = parse_uri(path)
|
@@ -65,6 +66,9 @@ module CF::UAA
|
|
65
66
|
http.use_ssl = true
|
66
67
|
if options[:insecure]
|
67
68
|
http.verify_mode = OpenSSL::SSL::VERIFY_NONE
|
69
|
+
elsif options[:cacert]
|
70
|
+
http.ca_file = File.expand_path(options[:cacert])
|
71
|
+
http.verify_mode = OpenSSL::SSL::VERIFY_PEER
|
68
72
|
end
|
69
73
|
end
|
70
74
|
request_class = Net::HTTP.const_get("#{options[:request][0]}#{options[:request][1..-1].downcase}")
|
data/spec/curl_spec.rb
CHANGED
@@ -37,6 +37,7 @@ module CF::UAA
|
|
37
37
|
Cli.output.string.should include "-d | --data <data>"
|
38
38
|
Cli.output.string.should include "-k | --insecure"
|
39
39
|
Cli.output.string.should include "-b | --bodyonly"
|
40
|
+
Cli.output.string.should include "-C | --cacert"
|
40
41
|
end
|
41
42
|
|
42
43
|
it "hits the URL on the UAA target" do
|
@@ -108,5 +109,19 @@ module CF::UAA
|
|
108
109
|
Cli.output.string.should_not include "ECONNRESET"
|
109
110
|
Cli.output.string.should include "200 OK"
|
110
111
|
end
|
112
|
+
|
113
|
+
it "makes insecure requests without the -k flag" do
|
114
|
+
Cli.run("curl https://example.com/")
|
115
|
+
|
116
|
+
Cli.output.string.should_not include "ECONNRESET"
|
117
|
+
Cli.output.string.should include "200 OK"
|
118
|
+
end
|
119
|
+
|
120
|
+
it "makes requests using invalid custom ca cert file with the -C flag" do
|
121
|
+
Cli.run("curl https://example.com/ -C ca.pem")
|
122
|
+
|
123
|
+
Cli.output.string.should_not include "200 OK"
|
124
|
+
Cli.output.string.should include "SSLError"
|
125
|
+
end
|
111
126
|
end
|
112
127
|
end
|
data/version.txt
CHANGED
@@ -1 +1 @@
|
|
1
|
-
4.
|
1
|
+
4.19.0
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: cf-uaac
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 4.
|
4
|
+
version: 4.19.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Dave Syer
|
@@ -12,7 +12,7 @@ authors:
|
|
12
12
|
autorequire:
|
13
13
|
bindir: bin
|
14
14
|
cert_chain: []
|
15
|
-
date: 2023-
|
15
|
+
date: 2023-12-04 00:00:00.000000000 Z
|
16
16
|
dependencies:
|
17
17
|
- !ruby/object:Gem::Dependency
|
18
18
|
name: cf-uaa-lib
|