et_fake_acas_server 0.1.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.gitignore +12 -0
- data/.rspec +3 -0
- data/.ruby-version +1 -0
- data/.travis.yml +9 -0
- data/Gemfile +6 -0
- data/Gemfile.lock +62 -0
- data/LICENSE.txt +21 -0
- data/README.md +71 -0
- data/Rakefile +6 -0
- data/bin/console +14 -0
- data/bin/setup +8 -0
- data/et_fake_acas_server.gemspec +41 -0
- data/exe/et_fake_acas_server +6 -0
- data/lib/config.ru +3 -0
- data/lib/et_fake_acas_server.rb +7 -0
- data/lib/et_fake_acas_server/forms/certificate_lookup_form.rb +67 -0
- data/lib/et_fake_acas_server/server.rb +71 -0
- data/lib/et_fake_acas_server/version.rb +3 -0
- data/lib/et_fake_acas_server/xml_builders/found_xml_builder.rb +77 -0
- data/lib/et_fake_acas_server/xml_builders/internal_error_xml_builder.rb +70 -0
- data/lib/et_fake_acas_server/xml_builders/invalid_certificate_format_xml_builder.rb +68 -0
- data/lib/et_fake_acas_server/xml_builders/no_match_xml_builder.rb +68 -0
- data/lib/pdfs/76 EC (C) Certificate R000080.pdf +0 -0
- data/public/.keep +0 -0
- data/temp_x509/acas/privatekey.pem +15 -0
- data/temp_x509/acas/publickey.cer +16 -0
- data/temp_x509/et/privatekey.pem +15 -0
- data/temp_x509/et/publickey.cer +17 -0
- data/tmp/.keep +0 -0
- metadata +199 -0
checksums.yaml
ADDED
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
---
|
|
2
|
+
SHA256:
|
|
3
|
+
metadata.gz: 22a004a848cfc6cda21a2df8db41f508a00093c88ac6162fb7e642e29c107d43
|
|
4
|
+
data.tar.gz: 13bc923c3b42472eb45b697927ea977523b520621523182150f96022f151b1ce
|
|
5
|
+
SHA512:
|
|
6
|
+
metadata.gz: 65821503606cbaf99a2de8fb820a52260362cb1772f6968874bfaa9b4531f26f41b07ffb7f0df2c172f88ba4fe80a0af9cd670d8ff56b4a7e592cb0d7625e967
|
|
7
|
+
data.tar.gz: 4d7ee02cde30e34ddf6199c5eb9c65bf6206c47da1ac72b98f5c8c9232df79696759deec0d6f0863f9f9652b0c93860f5b5c68538b0f37f5103564a49a9f20e9
|
data/.gitignore
ADDED
data/.rspec
ADDED
data/.ruby-version
ADDED
|
@@ -0,0 +1 @@
|
|
|
1
|
+
2.5.1
|
data/.travis.yml
ADDED
|
@@ -0,0 +1,9 @@
|
|
|
1
|
+
deploy:
|
|
2
|
+
provider: rubygems
|
|
3
|
+
api_key:
|
|
4
|
+
secure: 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
|
|
5
|
+
gem: et_fake_acas_server
|
|
6
|
+
on:
|
|
7
|
+
tags: true
|
|
8
|
+
repo: hmcts/et_fake_acas_server
|
|
9
|
+
branch: develop
|
data/Gemfile
ADDED
data/Gemfile.lock
ADDED
|
@@ -0,0 +1,62 @@
|
|
|
1
|
+
PATH
|
|
2
|
+
remote: .
|
|
3
|
+
specs:
|
|
4
|
+
et_fake_acas_server (0.1.6)
|
|
5
|
+
activesupport (~> 5.2)
|
|
6
|
+
nokogiri (~> 1.8, >= 1.8.2)
|
|
7
|
+
puma (~> 3.12)
|
|
8
|
+
ruby-mcrypt (~> 0.2)
|
|
9
|
+
sinatra (~> 2.0, >= 2.0.3)
|
|
10
|
+
sinatra-contrib (~> 2.0)
|
|
11
|
+
|
|
12
|
+
GEM
|
|
13
|
+
remote: https://rubygems.org/
|
|
14
|
+
specs:
|
|
15
|
+
activesupport (5.2.3)
|
|
16
|
+
concurrent-ruby (~> 1.0, >= 1.0.2)
|
|
17
|
+
i18n (>= 0.7, < 2)
|
|
18
|
+
minitest (~> 5.1)
|
|
19
|
+
tzinfo (~> 1.1)
|
|
20
|
+
backports (3.14.0)
|
|
21
|
+
concurrent-ruby (1.1.5)
|
|
22
|
+
i18n (1.6.0)
|
|
23
|
+
concurrent-ruby (~> 1.0)
|
|
24
|
+
mini_portile2 (2.4.0)
|
|
25
|
+
minitest (5.11.3)
|
|
26
|
+
multi_json (1.13.1)
|
|
27
|
+
mustermann (1.0.3)
|
|
28
|
+
nokogiri (1.10.3)
|
|
29
|
+
mini_portile2 (~> 2.4.0)
|
|
30
|
+
puma (3.12.1)
|
|
31
|
+
rack (2.0.7)
|
|
32
|
+
rack-protection (2.0.5)
|
|
33
|
+
rack
|
|
34
|
+
rake (10.5.0)
|
|
35
|
+
ruby-mcrypt (0.2.0)
|
|
36
|
+
sinatra (2.0.5)
|
|
37
|
+
mustermann (~> 1.0)
|
|
38
|
+
rack (~> 2.0)
|
|
39
|
+
rack-protection (= 2.0.5)
|
|
40
|
+
tilt (~> 2.0)
|
|
41
|
+
sinatra-contrib (2.0.5)
|
|
42
|
+
backports (>= 2.8.2)
|
|
43
|
+
multi_json
|
|
44
|
+
mustermann (~> 1.0)
|
|
45
|
+
rack-protection (= 2.0.5)
|
|
46
|
+
sinatra (= 2.0.5)
|
|
47
|
+
tilt (>= 1.3, < 3)
|
|
48
|
+
thread_safe (0.3.6)
|
|
49
|
+
tilt (2.0.9)
|
|
50
|
+
tzinfo (1.2.5)
|
|
51
|
+
thread_safe (~> 0.1)
|
|
52
|
+
|
|
53
|
+
PLATFORMS
|
|
54
|
+
ruby
|
|
55
|
+
|
|
56
|
+
DEPENDENCIES
|
|
57
|
+
bundler (~> 1.16)
|
|
58
|
+
et_fake_acas_server!
|
|
59
|
+
rake (~> 10.0)
|
|
60
|
+
|
|
61
|
+
BUNDLED WITH
|
|
62
|
+
1.17.3
|
data/LICENSE.txt
ADDED
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
The MIT License (MIT)
|
|
2
|
+
|
|
3
|
+
Copyright (c) 2018 Gary Taylor
|
|
4
|
+
|
|
5
|
+
Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
6
|
+
of this software and associated documentation files (the "Software"), to deal
|
|
7
|
+
in the Software without restriction, including without limitation the rights
|
|
8
|
+
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
9
|
+
copies of the Software, and to permit persons to whom the Software is
|
|
10
|
+
furnished to do so, subject to the following conditions:
|
|
11
|
+
|
|
12
|
+
The above copyright notice and this permission notice shall be included in
|
|
13
|
+
all copies or substantial portions of the Software.
|
|
14
|
+
|
|
15
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
16
|
+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
17
|
+
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
18
|
+
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
19
|
+
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
20
|
+
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
21
|
+
THE SOFTWARE.
|
data/README.md
ADDED
|
@@ -0,0 +1,71 @@
|
|
|
1
|
+
# Et Fake Acas Server
|
|
2
|
+
|
|
3
|
+
This gem is used either as part of a test suite to provide dummy ACAS services, or as a standalone rack application that can
|
|
4
|
+
be used during development etc...
|
|
5
|
+
|
|
6
|
+
## Installation
|
|
7
|
+
|
|
8
|
+
### If used as part of a test suite
|
|
9
|
+
|
|
10
|
+
Add this line to your application's Gemfile:
|
|
11
|
+
|
|
12
|
+
```ruby
|
|
13
|
+
gem 'et_fake_acas_server'
|
|
14
|
+
```
|
|
15
|
+
|
|
16
|
+
And then execute:
|
|
17
|
+
|
|
18
|
+
$ bundle
|
|
19
|
+
|
|
20
|
+
### If used standalone
|
|
21
|
+
|
|
22
|
+
Or install it yourself as:
|
|
23
|
+
|
|
24
|
+
$ gem install et_fake_acas_server
|
|
25
|
+
|
|
26
|
+
and run it using
|
|
27
|
+
|
|
28
|
+
```
|
|
29
|
+
|
|
30
|
+
et_fake_acas_server
|
|
31
|
+
|
|
32
|
+
```
|
|
33
|
+
## Usage
|
|
34
|
+
|
|
35
|
+
## Usage During Testing
|
|
36
|
+
|
|
37
|
+
The server is pre programmed to respond with all 4 of the different response types depending on the first
|
|
38
|
+
part of the certificate number requested. The numbers after the slashes etc.. do not matter
|
|
39
|
+
|
|
40
|
+
These are as follows (note, the 'R' can also be 'NE' or 'MU')
|
|
41
|
+
|
|
42
|
+
R000200/18/68 - Returns a 'No Match'
|
|
43
|
+
|
|
44
|
+
R000201/18/68 - Returns an 'Invalid Certificate Format'
|
|
45
|
+
|
|
46
|
+
R000500/18/68 - Returns an 'Internal Error'
|
|
47
|
+
|
|
48
|
+
R000100/18/68 - Returns a valid certificate
|
|
49
|
+
|
|
50
|
+
and anything else returns a 'Found' response
|
|
51
|
+
|
|
52
|
+
## Development
|
|
53
|
+
|
|
54
|
+
This has no test suite - nor is it supposed to have else we would be testing test code which seems over the top.
|
|
55
|
+
To prove it is working, use the api project (https://github.com/ministryofjustice/et_api) which uses it as part of
|
|
56
|
+
its test suite.
|
|
57
|
+
|
|
58
|
+
## Environment Variables
|
|
59
|
+
|
|
60
|
+
The following environment variables can be changed to alter the defaults
|
|
61
|
+
|
|
62
|
+
ACAS_PRIVATE_KEY_FILE
|
|
63
|
+
ET_PUBLIC_KEY_FILE
|
|
64
|
+
|
|
65
|
+
## Contributing
|
|
66
|
+
|
|
67
|
+
Bug reports and pull requests are welcome on GitHub at https://github.com/[USERNAME]/et_fake_acas_server.
|
|
68
|
+
|
|
69
|
+
## License
|
|
70
|
+
|
|
71
|
+
The gem is available as open source under the terms of the [MIT License](https://opensource.org/licenses/MIT).
|
data/Rakefile
ADDED
data/bin/console
ADDED
|
@@ -0,0 +1,14 @@
|
|
|
1
|
+
#!/usr/bin/env ruby
|
|
2
|
+
|
|
3
|
+
require "bundler/setup"
|
|
4
|
+
require "et_fake_acas_server"
|
|
5
|
+
|
|
6
|
+
# You can add fixtures and/or initialization code here to make experimenting
|
|
7
|
+
# with your gem easier. You can also use a different console, if you like.
|
|
8
|
+
|
|
9
|
+
# (If you use this, don't forget to add pry to your Gemfile!)
|
|
10
|
+
# require "pry"
|
|
11
|
+
# Pry.start
|
|
12
|
+
|
|
13
|
+
require "irb"
|
|
14
|
+
IRB.start(__FILE__)
|
data/bin/setup
ADDED
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
|
|
2
|
+
lib = File.expand_path("../lib", __FILE__)
|
|
3
|
+
$LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
|
|
4
|
+
require "et_fake_acas_server/version"
|
|
5
|
+
|
|
6
|
+
Gem::Specification.new do |spec|
|
|
7
|
+
spec.name = "et_fake_acas_server"
|
|
8
|
+
spec.version = EtFakeAcasServer::VERSION
|
|
9
|
+
spec.authors = ["Gary Taylor"]
|
|
10
|
+
spec.email = ["gary.taylor@hmcts.net"]
|
|
11
|
+
|
|
12
|
+
spec.summary = %q{Employment Tribunal (govuk) fake acas server}
|
|
13
|
+
spec.description = %q{Standalone fake acas server for use during dev and test of the employment tribunal system}
|
|
14
|
+
spec.homepage = "https://github.com/ministryofjustice/et_api"
|
|
15
|
+
spec.license = "MIT"
|
|
16
|
+
|
|
17
|
+
# Prevent pushing this gem to RubyGems.org. To allow pushes either set the 'allowed_push_host'
|
|
18
|
+
# to allow pushing to a single host or delete this section to allow pushing to any host.
|
|
19
|
+
if spec.respond_to?(:metadata)
|
|
20
|
+
spec.metadata["allowed_push_host"] = "http://mygemserver.com"
|
|
21
|
+
else
|
|
22
|
+
raise "RubyGems 2.0 or newer is required to protect against " \
|
|
23
|
+
"public gem pushes."
|
|
24
|
+
end
|
|
25
|
+
|
|
26
|
+
spec.files = `git ls-files -z`.split("\x0").reject do |f|
|
|
27
|
+
f.match(%r{^(test|spec|features)/})
|
|
28
|
+
end
|
|
29
|
+
spec.bindir = "exe"
|
|
30
|
+
spec.executables = spec.files.grep(%r{^exe/}) { |f| File.basename(f) }
|
|
31
|
+
spec.require_paths = ["lib"]
|
|
32
|
+
|
|
33
|
+
spec.add_development_dependency "bundler", "~> 1.16"
|
|
34
|
+
spec.add_development_dependency "rake", "~> 10.0"
|
|
35
|
+
spec.add_dependency 'puma', '~> 3.12'
|
|
36
|
+
spec.add_dependency 'sinatra-contrib', '~> 2.0'
|
|
37
|
+
spec.add_dependency 'sinatra', '~> 2.0', '>= 2.0.3'
|
|
38
|
+
spec.add_dependency 'nokogiri', '~> 1.8', '>= 1.8.2'
|
|
39
|
+
spec.add_dependency 'activesupport', '~> 5.2'
|
|
40
|
+
spec.add_dependency 'ruby-mcrypt', '~> 0.2'
|
|
41
|
+
end
|
data/lib/config.ru
ADDED
|
@@ -0,0 +1,67 @@
|
|
|
1
|
+
require 'nokogiri'
|
|
2
|
+
require 'base64'
|
|
3
|
+
require 'active_support/core_ext/string'
|
|
4
|
+
module EtFakeAcasServer
|
|
5
|
+
class CertificateLookupForm
|
|
6
|
+
def initialize(xml, private_key_file: )
|
|
7
|
+
self.xml = xml
|
|
8
|
+
self.private_key = OpenSSL::PKey::RSA.new(File.read(private_key_file))
|
|
9
|
+
end
|
|
10
|
+
|
|
11
|
+
def validate
|
|
12
|
+
validate_digest
|
|
13
|
+
validate_signature
|
|
14
|
+
end
|
|
15
|
+
|
|
16
|
+
def certificate_number
|
|
17
|
+
parsed_values[:ec_certificate_number]
|
|
18
|
+
end
|
|
19
|
+
|
|
20
|
+
private
|
|
21
|
+
|
|
22
|
+
def parsed_values
|
|
23
|
+
@parsed_values ||= begin
|
|
24
|
+
doc = Nokogiri::XML(xml)
|
|
25
|
+
doc.xpath('//env:Envelope/env:Body/tns:GetECCertificate/tns:request').children.inject({}) do |acc, child|
|
|
26
|
+
decoded = Base64.decode64(child.text)
|
|
27
|
+
decrypted = private_key.private_decrypt(decoded, OpenSSL::PKey::RSA::PKCS1_OAEP_PADDING)
|
|
28
|
+
acc[child.name.underscore.to_sym] = decrypted
|
|
29
|
+
acc
|
|
30
|
+
end
|
|
31
|
+
end
|
|
32
|
+
end
|
|
33
|
+
|
|
34
|
+
def validate_digest
|
|
35
|
+
doc = Nokogiri::XML(xml)
|
|
36
|
+
node = doc.xpath('//env:Envelope/env:Header/wsse:Security/wsu:Timestamp', doc.collect_namespaces).first
|
|
37
|
+
digest_value = Base64.encode64(OpenSSL::Digest::SHA1.digest(node.canonicalize(Nokogiri::XML::XML_C14N_EXCLUSIVE_1_0))).strip
|
|
38
|
+
|
|
39
|
+
ns = doc.collect_namespaces
|
|
40
|
+
ns['xmlns:ds'] = ns.delete('xmlns')
|
|
41
|
+
provided_digest_value = doc.at_xpath('//env:Envelope/env:Header/wsse:Security/ds:Signature/ds:SignedInfo/ds:Reference/ds:DigestValue', ns).text
|
|
42
|
+
if digest_value != provided_digest_value
|
|
43
|
+
raise 'Wrong digest value'
|
|
44
|
+
end
|
|
45
|
+
|
|
46
|
+
end
|
|
47
|
+
|
|
48
|
+
def validate_signature
|
|
49
|
+
doc = Nokogiri::XML(xml)
|
|
50
|
+
ns = doc.collect_namespaces
|
|
51
|
+
ns['xmlns:ds'] = ns.delete('xmlns')
|
|
52
|
+
signed_info_node = doc.at_xpath('//env:Envelope/env:Header/wsse:Security/ds:Signature/ds:SignedInfo', ns)
|
|
53
|
+
signature_value_node = doc.at_xpath('//env:Envelope/env:Header/wsse:Security/ds:Signature/ds:SignatureValue', ns)
|
|
54
|
+
signature_value = Base64.decode64(signature_value_node.text)
|
|
55
|
+
security_token_url = doc.at_xpath('//env:Envelope/env:Header/wsse:Security/ds:Signature/ds:KeyInfo/wsse:SecurityTokenReference/wsse:Reference', ns)['URI'][1..-1]
|
|
56
|
+
certificate_value = doc.at_xpath("//env:Envelope/env:Header/wsse:Security/wsse:BinarySecurityToken[@wsu:Id='#{security_token_url}']", ns).text.strip
|
|
57
|
+
our_certificate = OpenSSL::X509::Certificate.new Base64.decode64(certificate_value)
|
|
58
|
+
document = signed_info_node.canonicalize(Nokogiri::XML::XML_C14N_EXCLUSIVE_1_0)
|
|
59
|
+
unless our_certificate.public_key.verify(OpenSSL::Digest::SHA1.new, signature_value, document)
|
|
60
|
+
raise 'Invalid signature'
|
|
61
|
+
end
|
|
62
|
+
|
|
63
|
+
end
|
|
64
|
+
|
|
65
|
+
attr_accessor :xml, :private_key
|
|
66
|
+
end
|
|
67
|
+
end
|
|
@@ -0,0 +1,71 @@
|
|
|
1
|
+
require 'sinatra/base'
|
|
2
|
+
require 'sinatra/custom_logger'
|
|
3
|
+
require 'logger'
|
|
4
|
+
require 'et_fake_acas_server/forms/certificate_lookup_form'
|
|
5
|
+
require 'et_fake_acas_server/xml_builders/found_xml_builder'
|
|
6
|
+
require 'et_fake_acas_server/xml_builders/no_match_xml_builder'
|
|
7
|
+
require 'et_fake_acas_server/xml_builders/internal_error_xml_builder'
|
|
8
|
+
require 'et_fake_acas_server/xml_builders/invalid_certificate_format_xml_builder'
|
|
9
|
+
require 'active_support/core_ext/numeric/time'
|
|
10
|
+
|
|
11
|
+
|
|
12
|
+
module EtFakeAcasServer
|
|
13
|
+
class Server < Sinatra::Base
|
|
14
|
+
def initialize(*)
|
|
15
|
+
super
|
|
16
|
+
self.private_key_file = ENV.fetch('ACAS_PRIVATE_KEY_FILE', File.absolute_path(File.join('..', '..', 'temp_x509', 'acas', 'privatekey.pem'), __dir__))
|
|
17
|
+
self.et_public_key_file = ENV.fetch('ET_PUBLIC_KEY_FILE', File.absolute_path(File.join('..', '..', 'temp_x509', 'et', 'publickey.cer'), __dir__))
|
|
18
|
+
end
|
|
19
|
+
|
|
20
|
+
configure :development, :production do
|
|
21
|
+
logger = Logger.new(STDOUT)
|
|
22
|
+
logger.level = Logger::DEBUG
|
|
23
|
+
set :logger, logger
|
|
24
|
+
end
|
|
25
|
+
|
|
26
|
+
post '/Lookup/ECService.svc' do
|
|
27
|
+
form = CertificateLookupForm.new(request.body.read, private_key_file: private_key_file)
|
|
28
|
+
request.body.rewind
|
|
29
|
+
form.validate
|
|
30
|
+
case form.certificate_number
|
|
31
|
+
when /\A(R|NE|MU)000200/ then
|
|
32
|
+
xml_builder_for_no_match(form).to_xml
|
|
33
|
+
when /\A(R|NE|MU)000201/ then
|
|
34
|
+
xml_builder_for_invalid_certificate_format(form).to_xml
|
|
35
|
+
when /\A(R|NE|MU)000500/ then
|
|
36
|
+
xml_builder_for_internal_error(form).to_xml
|
|
37
|
+
else
|
|
38
|
+
xml_builder_for_found(form).to_xml
|
|
39
|
+
end
|
|
40
|
+
end
|
|
41
|
+
|
|
42
|
+
private
|
|
43
|
+
|
|
44
|
+
attr_accessor :private_key_file, :et_public_key_file
|
|
45
|
+
|
|
46
|
+
def xml_builder_for_found(form)
|
|
47
|
+
data = OpenStruct.new claimant_name: 'Claimant’s Name',
|
|
48
|
+
respondent_name: 'Respondent’s Name',
|
|
49
|
+
date_of_issue: Time.parse('1 December 2017 12:00:00'),
|
|
50
|
+
date_of_receipt: Time.parse('1 January 2017 12:00:00'),
|
|
51
|
+
certificate_number: form.certificate_number,
|
|
52
|
+
message: 'CertificateFound',
|
|
53
|
+
method_of_issue: 'Email',
|
|
54
|
+
certificate_file: File.absolute_path(File.join('..', 'pdfs', '76 EC (C) Certificate R000080.pdf'), __dir__)
|
|
55
|
+
FoundXmlBuilder.new(form, rsa_et_certificate_path: et_public_key_file).builder(data)
|
|
56
|
+
end
|
|
57
|
+
|
|
58
|
+
def xml_builder_for_no_match(form)
|
|
59
|
+
NoMatchXmlBuilder.new(form, rsa_et_certificate_path: et_public_key_file).builder
|
|
60
|
+
end
|
|
61
|
+
|
|
62
|
+
def xml_builder_for_internal_error(form)
|
|
63
|
+
InternalErrorXmlBuilder.new(form, rsa_et_certificate_path: et_public_key_file).builder
|
|
64
|
+
end
|
|
65
|
+
|
|
66
|
+
def xml_builder_for_invalid_certificate_format(form)
|
|
67
|
+
InvalidCertificateFormatXmlBuilder.new(form, rsa_et_certificate_path: et_public_key_file).builder
|
|
68
|
+
end
|
|
69
|
+
end
|
|
70
|
+
end
|
|
71
|
+
|
|
@@ -0,0 +1,77 @@
|
|
|
1
|
+
require 'base64'
|
|
2
|
+
require 'openssl'
|
|
3
|
+
require 'mcrypt'
|
|
4
|
+
|
|
5
|
+
module EtFakeAcasServer
|
|
6
|
+
class FoundXmlBuilder
|
|
7
|
+
def initialize(form, rsa_et_certificate_path:)
|
|
8
|
+
self.form = form
|
|
9
|
+
self.rsa_et_certificate = OpenSSL::X509::Certificate.new File.read(rsa_et_certificate_path)
|
|
10
|
+
end
|
|
11
|
+
|
|
12
|
+
def key
|
|
13
|
+
@key ||= '12345678901234567890123456789012'
|
|
14
|
+
end
|
|
15
|
+
|
|
16
|
+
def iv
|
|
17
|
+
@iv ||= '12345678901234567890123456789012'
|
|
18
|
+
end
|
|
19
|
+
|
|
20
|
+
def builder(data)
|
|
21
|
+
Nokogiri::XML::Builder.new do |xml|
|
|
22
|
+
namespaces = {
|
|
23
|
+
'xmlns:s' => 'http://schemas.xmlsoap.org/soap/envelope',
|
|
24
|
+
'xmlns:u' => 'http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd'
|
|
25
|
+
}
|
|
26
|
+
xml['s'].Envelope(namespaces) do
|
|
27
|
+
xml['s'].Header do
|
|
28
|
+
xml.ActivityId("e67a4d86-e096-4a35-aa3a-2b3a8ffaaa54", 'CorrelationId': '03973d23-3c39-4359-aa69-4d37b922fb60', xmlns: 'http://schemas.microsoft.com/2004/09/ServiceModel/Diagnostics')
|
|
29
|
+
xml['o'].Security('s:mustUnderstand': '1', 'xmlns:o': 'http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd') do
|
|
30
|
+
xml['u'].Timestamp('u:Id': '_0') do
|
|
31
|
+
xml['u'].Created '2014-03-03T10:15.01.251Z'
|
|
32
|
+
xml['u'].Expires '2014-03-03T10:20:01.251Z'
|
|
33
|
+
end
|
|
34
|
+
end
|
|
35
|
+
end
|
|
36
|
+
xml['s'].Body do
|
|
37
|
+
xml.GetECCertificateResponse(xmlns: 'https://ec.acas.org.uk/lookup/') do
|
|
38
|
+
xml.GetECCertificateResult('xmlns:a': 'http://schemas.datacontract.org/2004/07/Acas.CertificateLookup.EcLookupService', 'xmlns:i': 'http://www.w3.org/2001/XMLSchema-instance') do
|
|
39
|
+
xml['a'].Certificate Base64.encode64(aes_encrypt(Base64.encode64(File.read(data.certificate_file))))
|
|
40
|
+
xml['a'].ClaimantName Base64.encode64(aes_encrypt(data.claimant_name))
|
|
41
|
+
xml['a'].CurrentDateTime Base64.encode64(aes_encrypt(Time.now.strftime('%d/%m/%Y %H:%M:%S')))
|
|
42
|
+
xml['a'].DateOfIssue Base64.encode64(aes_encrypt(data.date_of_issue.strftime('%d/%m/%Y %H:%M:%S')))
|
|
43
|
+
xml['a'].DateOfReceipt Base64.encode64(aes_encrypt(data.date_of_receipt.strftime('%d/%m/%Y %H:%M:%S')))
|
|
44
|
+
xml['a'].ECCertificateNumber Base64.encode64(aes_encrypt(data.certificate_number))
|
|
45
|
+
xml['a'].IV Base64.encode64(rsa_encrypt(Base64.encode64(iv)))
|
|
46
|
+
xml['a'].Key Base64.encode64(rsa_encrypt(Base64.encode64(key)))
|
|
47
|
+
xml['a'].Message Base64.encode64(aes_encrypt(data.message))
|
|
48
|
+
xml['a'].MethodOfIssue Base64.encode64(aes_encrypt(data.method_of_issue))
|
|
49
|
+
xml['a'].RespondentName Base64.encode64(aes_encrypt(data.respondent_name))
|
|
50
|
+
xml['a'].ResponseCode Base64.encode64(aes_encrypt('100'))
|
|
51
|
+
xml['a'].ServiceVersion Base64.encode64(aes_encrypt('1.0'))
|
|
52
|
+
end
|
|
53
|
+
end
|
|
54
|
+
end
|
|
55
|
+
end
|
|
56
|
+
end
|
|
57
|
+
|
|
58
|
+
end
|
|
59
|
+
|
|
60
|
+
private
|
|
61
|
+
|
|
62
|
+
attr_accessor :rsa_et_certificate, :form
|
|
63
|
+
|
|
64
|
+
def aes_encrypt(value)
|
|
65
|
+
encrypt_cipher = build_encrypt_cipher
|
|
66
|
+
encrypt_cipher.encrypt(String.new(value, encoding: 'ascii-8bit'))
|
|
67
|
+
end
|
|
68
|
+
|
|
69
|
+
def build_encrypt_cipher
|
|
70
|
+
Mcrypt.new(:rijndael_256, :cbc, key, iv, :pkcs7)
|
|
71
|
+
end
|
|
72
|
+
|
|
73
|
+
def rsa_encrypt(value)
|
|
74
|
+
rsa_et_certificate.public_key.public_encrypt(value, OpenSSL::PKey::RSA::PKCS1_OAEP_PADDING)
|
|
75
|
+
end
|
|
76
|
+
end
|
|
77
|
+
end
|
|
@@ -0,0 +1,70 @@
|
|
|
1
|
+
require 'base64'
|
|
2
|
+
require 'openssl'
|
|
3
|
+
require 'mcrypt'
|
|
4
|
+
|
|
5
|
+
module EtFakeAcasServer
|
|
6
|
+
class InternalErrorXmlBuilder
|
|
7
|
+
def initialize(form, rsa_et_certificate_path:)
|
|
8
|
+
self.form = form
|
|
9
|
+
self.rsa_et_certificate = OpenSSL::X509::Certificate.new File.read(rsa_et_certificate_path)
|
|
10
|
+
end
|
|
11
|
+
|
|
12
|
+
def key
|
|
13
|
+
@key ||= '12345678901234567890123456789012'
|
|
14
|
+
end
|
|
15
|
+
|
|
16
|
+
def iv
|
|
17
|
+
@iv ||= '12345678901234567890123456789012'
|
|
18
|
+
end
|
|
19
|
+
|
|
20
|
+
def builder
|
|
21
|
+
Nokogiri::XML::Builder.new do |xml|
|
|
22
|
+
namespaces = {
|
|
23
|
+
'xmlns:s' => 'http://schemas.xmlsoap.org/soap/envelope',
|
|
24
|
+
'xmlns:u' => 'http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd'
|
|
25
|
+
}
|
|
26
|
+
xml['s'].Envelope(namespaces) do
|
|
27
|
+
xml['s'].Header do
|
|
28
|
+
xml.ActivityId("e67a4d86-e096-4a35-aa3a-2b3a8ffaaa54", 'CorrelationId': '03973d23-3c39-4359-aa69-4d37b922fb60', xmlns: 'http://schemas.microsoft.com/2004/09/ServiceModel/Diagnostics')
|
|
29
|
+
xml['o'].Security('s:mustUnderstand': '1', 'xmlns:o': 'http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd') do
|
|
30
|
+
xml['u'].Timestamp('u:Id': '_0') do
|
|
31
|
+
xml['u'].Created '2014-03-03T10:15.01.251Z'
|
|
32
|
+
xml['u'].Expires '2014-03-03T10:20:01.251Z'
|
|
33
|
+
end
|
|
34
|
+
end
|
|
35
|
+
end
|
|
36
|
+
xml['s'].Body do
|
|
37
|
+
xml.GetECCertificateResponse(xmlns: 'https://ec.acas.org.uk/lookup/') do
|
|
38
|
+
xml.GetECCertificateResult('xmlns:a': 'http://schemas.datacontract.org/2004/07/Acas.CertificateLookup.EcLookupService', 'xmlns:i': 'http://www.w3.org/2001/XMLSchema-instance') do
|
|
39
|
+
xml['a'].CurrentDateTime Base64.encode64(aes_encrypt(Time.now.strftime('%d/%m/%Y %H:%M:%S')))
|
|
40
|
+
xml['a'].IV Base64.encode64(rsa_encrypt(Base64.encode64(iv)))
|
|
41
|
+
xml['a'].Key Base64.encode64(rsa_encrypt(Base64.encode64(key)))
|
|
42
|
+
xml['a'].Message Base64.encode64(aes_encrypt('An internal error has occured in ACAS'))
|
|
43
|
+
xml['a'].ResponseCode Base64.encode64(aes_encrypt('500'))
|
|
44
|
+
xml['a'].ServiceVersion Base64.encode64(aes_encrypt('1.0'))
|
|
45
|
+
end
|
|
46
|
+
end
|
|
47
|
+
end
|
|
48
|
+
end
|
|
49
|
+
end
|
|
50
|
+
|
|
51
|
+
end
|
|
52
|
+
|
|
53
|
+
private
|
|
54
|
+
|
|
55
|
+
attr_accessor :rsa_et_certificate, :form
|
|
56
|
+
|
|
57
|
+
def aes_encrypt(value)
|
|
58
|
+
encrypt_cipher = build_encrypt_cipher
|
|
59
|
+
encrypt_cipher.encrypt(value)
|
|
60
|
+
end
|
|
61
|
+
|
|
62
|
+
def build_encrypt_cipher
|
|
63
|
+
Mcrypt.new(:rijndael_256, :cbc, key, iv, :pkcs7)
|
|
64
|
+
end
|
|
65
|
+
|
|
66
|
+
def rsa_encrypt(value)
|
|
67
|
+
rsa_et_certificate.public_key.public_encrypt(value, OpenSSL::PKey::RSA::PKCS1_OAEP_PADDING)
|
|
68
|
+
end
|
|
69
|
+
end
|
|
70
|
+
end
|
|
@@ -0,0 +1,68 @@
|
|
|
1
|
+
require 'base64'
|
|
2
|
+
require 'openssl'
|
|
3
|
+
module EtFakeAcasServer
|
|
4
|
+
class InvalidCertificateFormatXmlBuilder
|
|
5
|
+
def initialize(form, rsa_et_certificate_path:)
|
|
6
|
+
self.form = form
|
|
7
|
+
self.rsa_et_certificate = OpenSSL::X509::Certificate.new File.read(rsa_et_certificate_path)
|
|
8
|
+
end
|
|
9
|
+
|
|
10
|
+
def key
|
|
11
|
+
@key ||= '12345678901234567890123456789012'
|
|
12
|
+
end
|
|
13
|
+
|
|
14
|
+
def iv
|
|
15
|
+
@iv ||= '12345678901234567890123456789012'
|
|
16
|
+
end
|
|
17
|
+
|
|
18
|
+
def builder
|
|
19
|
+
Nokogiri::XML::Builder.new do |xml|
|
|
20
|
+
namespaces = {
|
|
21
|
+
'xmlns:s' => 'http://schemas.xmlsoap.org/soap/envelope',
|
|
22
|
+
'xmlns:u' => 'http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd'
|
|
23
|
+
}
|
|
24
|
+
xml['s'].Envelope(namespaces) do
|
|
25
|
+
xml['s'].Header do
|
|
26
|
+
xml.ActivityId("e67a4d86-e096-4a35-aa3a-2b3a8ffaaa54", 'CorrelationId': '03973d23-3c39-4359-aa69-4d37b922fb60', xmlns: 'http://schemas.microsoft.com/2004/09/ServiceModel/Diagnostics')
|
|
27
|
+
xml['o'].Security('s:mustUnderstand': '1', 'xmlns:o': 'http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd') do
|
|
28
|
+
xml['u'].Timestamp('u:Id': '_0') do
|
|
29
|
+
xml['u'].Created '2014-03-03T10:15.01.251Z'
|
|
30
|
+
xml['u'].Expires '2014-03-03T10:20:01.251Z'
|
|
31
|
+
end
|
|
32
|
+
end
|
|
33
|
+
end
|
|
34
|
+
xml['s'].Body do
|
|
35
|
+
xml.GetECCertificateResponse(xmlns: 'https://ec.acas.org.uk/lookup/') do
|
|
36
|
+
xml.GetECCertificateResult('xmlns:a': 'http://schemas.datacontract.org/2004/07/Acas.CertificateLookup.EcLookupService', 'xmlns:i': 'http://www.w3.org/2001/XMLSchema-instance') do
|
|
37
|
+
xml['a'].CurrentDateTime Base64.encode64(aes_encrypt(Time.now.strftime('%d/%m/%Y %H:%M:%S')))
|
|
38
|
+
xml['a'].IV Base64.encode64(rsa_encrypt(Base64.encode64(iv)))
|
|
39
|
+
xml['a'].Key Base64.encode64(rsa_encrypt(Base64.encode64(key)))
|
|
40
|
+
xml['a'].Message Base64.encode64(aes_encrypt('Invalid certificate format'))
|
|
41
|
+
xml['a'].ResponseCode Base64.encode64(aes_encrypt('201'))
|
|
42
|
+
xml['a'].ServiceVersion Base64.encode64(aes_encrypt('1.0'))
|
|
43
|
+
end
|
|
44
|
+
end
|
|
45
|
+
end
|
|
46
|
+
end
|
|
47
|
+
end
|
|
48
|
+
|
|
49
|
+
end
|
|
50
|
+
|
|
51
|
+
private
|
|
52
|
+
|
|
53
|
+
attr_accessor :rsa_et_certificate, :form
|
|
54
|
+
|
|
55
|
+
def aes_encrypt(value)
|
|
56
|
+
encrypt_cipher = build_encrypt_cipher
|
|
57
|
+
encrypt_cipher.encrypt(value)
|
|
58
|
+
end
|
|
59
|
+
|
|
60
|
+
def build_encrypt_cipher
|
|
61
|
+
Mcrypt.new(:rijndael_256, :cbc, key, iv, :pkcs7)
|
|
62
|
+
end
|
|
63
|
+
|
|
64
|
+
def rsa_encrypt(value)
|
|
65
|
+
rsa_et_certificate.public_key.public_encrypt(value, OpenSSL::PKey::RSA::PKCS1_OAEP_PADDING)
|
|
66
|
+
end
|
|
67
|
+
end
|
|
68
|
+
end
|
|
@@ -0,0 +1,68 @@
|
|
|
1
|
+
require 'base64'
|
|
2
|
+
require 'openssl'
|
|
3
|
+
module EtFakeAcasServer
|
|
4
|
+
class NoMatchXmlBuilder
|
|
5
|
+
def initialize(form, rsa_et_certificate_path:)
|
|
6
|
+
self.form = form
|
|
7
|
+
self.rsa_et_certificate = OpenSSL::X509::Certificate.new File.read(rsa_et_certificate_path)
|
|
8
|
+
end
|
|
9
|
+
|
|
10
|
+
def key
|
|
11
|
+
@key ||= '12345678901234567890123456789012'
|
|
12
|
+
end
|
|
13
|
+
|
|
14
|
+
def iv
|
|
15
|
+
@iv ||= '12345678901234567890123456789012'
|
|
16
|
+
end
|
|
17
|
+
|
|
18
|
+
def builder
|
|
19
|
+
Nokogiri::XML::Builder.new do |xml|
|
|
20
|
+
namespaces = {
|
|
21
|
+
'xmlns:s' => 'http://schemas.xmlsoap.org/soap/envelope',
|
|
22
|
+
'xmlns:u' => 'http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd'
|
|
23
|
+
}
|
|
24
|
+
xml['s'].Envelope(namespaces) do
|
|
25
|
+
xml['s'].Header do
|
|
26
|
+
xml.ActivityId("e67a4d86-e096-4a35-aa3a-2b3a8ffaaa54", 'CorrelationId': '03973d23-3c39-4359-aa69-4d37b922fb60', xmlns: 'http://schemas.microsoft.com/2004/09/ServiceModel/Diagnostics')
|
|
27
|
+
xml['o'].Security('s:mustUnderstand': '1', 'xmlns:o': 'http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd') do
|
|
28
|
+
xml['u'].Timestamp('u:Id': '_0') do
|
|
29
|
+
xml['u'].Created '2014-03-03T10:15.01.251Z'
|
|
30
|
+
xml['u'].Expires '2014-03-03T10:20:01.251Z'
|
|
31
|
+
end
|
|
32
|
+
end
|
|
33
|
+
end
|
|
34
|
+
xml['s'].Body do
|
|
35
|
+
xml.GetECCertificateResponse(xmlns: 'https://ec.acas.org.uk/lookup/') do
|
|
36
|
+
xml.GetECCertificateResult('xmlns:a': 'http://schemas.datacontract.org/2004/07/Acas.CertificateLookup.EcLookupService', 'xmlns:i': 'http://www.w3.org/2001/XMLSchema-instance') do
|
|
37
|
+
xml['a'].CurrentDateTime Base64.encode64(aes_encrypt(Time.now.strftime('%d/%m/%Y %H:%M:%S')))
|
|
38
|
+
xml['a'].IV Base64.encode64(rsa_encrypt(Base64.encode64(iv)))
|
|
39
|
+
xml['a'].Key Base64.encode64(rsa_encrypt(Base64.encode64(key)))
|
|
40
|
+
xml['a'].Message Base64.encode64(aes_encrypt('Certificate not found'))
|
|
41
|
+
xml['a'].ResponseCode Base64.encode64(aes_encrypt('200'))
|
|
42
|
+
xml['a'].ServiceVersion Base64.encode64(aes_encrypt('1.0'))
|
|
43
|
+
end
|
|
44
|
+
end
|
|
45
|
+
end
|
|
46
|
+
end
|
|
47
|
+
end
|
|
48
|
+
|
|
49
|
+
end
|
|
50
|
+
|
|
51
|
+
private
|
|
52
|
+
|
|
53
|
+
attr_accessor :rsa_et_certificate, :form
|
|
54
|
+
|
|
55
|
+
def aes_encrypt(value)
|
|
56
|
+
encrypt_cipher = build_encrypt_cipher
|
|
57
|
+
encrypt_cipher.encrypt(value)
|
|
58
|
+
end
|
|
59
|
+
|
|
60
|
+
def build_encrypt_cipher
|
|
61
|
+
Mcrypt.new(:rijndael_256, :cbc, key, iv, :pkcs7)
|
|
62
|
+
end
|
|
63
|
+
|
|
64
|
+
def rsa_encrypt(value)
|
|
65
|
+
rsa_et_certificate.public_key.public_encrypt(value, OpenSSL::PKey::RSA::PKCS1_OAEP_PADDING)
|
|
66
|
+
end
|
|
67
|
+
end
|
|
68
|
+
end
|
|
Binary file
|
data/public/.keep
ADDED
|
File without changes
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
-----BEGIN RSA PRIVATE KEY-----
|
|
2
|
+
MIICXQIBAAKBgQCugdiVT7wF7Tbk62zgGoEqHdZ6l+7sG8XP63+gfhePdtTC+dYI
|
|
3
|
+
yN7UariubwmoyY3jHqHW8x1vNZnt/ByOdTXg/F+jlyZGvGQmatcu62nTcLlcmExe
|
|
4
|
+
KWppJoebMxu479PegbjhTAtrcjavXQzW33ps52QPJNj5QGMkutjeLqnPzwIDAQAB
|
|
5
|
+
AoGAKeXlEVxWgXnF30qjFl9muaz2TPLjm27DnLsnJmp/z6MxTCrd97f6wDdrZf4k
|
|
6
|
+
7JCP74LwSoKOg5/z+E66sH111Mxko2Iq30JfHDeESglcxUILVhHeUMHNFfwdwxD2
|
|
7
|
+
cxsIJ1sbltTQHZpcbCTOje3WkaVs3DDJDgkR09K1lfLAVhECQQDTmUP+PlOFttza
|
|
8
|
+
5yb7gqHqYIF5Yk3BvblaW05i9zSEPT4B9tjqTkPGfUwz4AvdAp+HxW9aW0B4OIa+
|
|
9
|
+
pTAAoKA3AkEA0yAWPc8mALzU1b3c/czkVEa62ubVIihe4t+BVdpcJUBT0RsskyZt
|
|
10
|
+
ila8xPGXvPkWeOkQL6q53rOwaOQ51NeRKQJAEz/cKaLt4joyeU+SAktuA25oGOzS
|
|
11
|
+
eg+Sbx/jT6mBg442t+MG9LnN/J6lcgqtyZtVe/qAGM44XTd3Opy4czYpnQJBAIBc
|
|
12
|
+
AMnBeMR4ChqNnZ99A9EtU4ulTi2/R7k91B+DbASF8K+witBIS88Q3yIKFIwjEQOg
|
|
13
|
+
B2RDs0/wBbAwGe0KxskCQQCV1FU5SGxVQTku6gJYFW9h2w564u2y04y4NDmqni0u
|
|
14
|
+
Hs+touGHy5nrQfHdimqrsLLtAsrNktlQ3UM+VH6WppCu
|
|
15
|
+
-----END RSA PRIVATE KEY-----
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
|
2
|
+
MIICmzCCAgQCCQD9PX+Bedbo+zANBgkqhkiG9w0BAQsFADCBkDELMAkGA1UEBhMC
|
|
3
|
+
VUsxFzAVBgNVBAgMDkdyZWF0ZXIgTG9uZG9uMQ8wDQYDVQQHDAZMb25kb24xDTAL
|
|
4
|
+
BgNVBAoMBEFDQVMxDTALBgNVBAsMBEFDQVMxFDASBgNVBAMMC2FjYXMub3JnLnVr
|
|
5
|
+
MSMwIQYJKoZIhvcNAQkBFhRzdXN0YWluaW5nQGhtY3RzLm5ldDAgFw0xODA2MDIw
|
|
6
|
+
ODM0MzNaGA8yMTE4MDUwOTA4MzQzM1owgZAxCzAJBgNVBAYTAlVLMRcwFQYDVQQI
|
|
7
|
+
DA5HcmVhdGVyIExvbmRvbjEPMA0GA1UEBwwGTG9uZG9uMQ0wCwYDVQQKDARBQ0FT
|
|
8
|
+
MQ0wCwYDVQQLDARBQ0FTMRQwEgYDVQQDDAthY2FzLm9yZy51azEjMCEGCSqGSIb3
|
|
9
|
+
DQEJARYUc3VzdGFpbmluZ0BobWN0cy5uZXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0A
|
|
10
|
+
MIGJAoGBAK6B2JVPvAXtNuTrbOAagSod1nqX7uwbxc/rf6B+F4921ML51gjI3tRq
|
|
11
|
+
uK5vCajJjeMeodbzHW81me38HI51NeD8X6OXJka8ZCZq1y7radNwuVyYTF4pamkm
|
|
12
|
+
h5szG7jv096BuOFMC2tyNq9dDNbfemznZA8k2PlAYyS62N4uqc/PAgMBAAEwDQYJ
|
|
13
|
+
KoZIhvcNAQELBQADgYEAq61aJVc57jViAajOlUSHn3SuoeYSrrep4kIZ3aPPk2Nn
|
|
14
|
+
DGqtlr/NQdBsu+/LfbIR/bspoMrKFdBQTnBf/yY/lK+Mwnz/joDajyZU+zDmE/5v
|
|
15
|
+
EQRhkT6IaVINddzapGFqj4FeAjmJa6CiG1/TCMrHde//2i0ZRekwAVa/FJyT1Ag=
|
|
16
|
+
-----END CERTIFICATE-----
|
|
@@ -0,0 +1,15 @@
|
|
|
1
|
+
-----BEGIN RSA PRIVATE KEY-----
|
|
2
|
+
MIICXAIBAAKBgQChxxalWGC66xkC/qcM/IWIbteV4ELR4GJpRWYAokqZSzZCffWL
|
|
3
|
+
XX6QSNG7OysyeTiHrG7+I845zLO7khsgIHZQhvrb5uPZ6nhuWpSmfTdQPQ3ujFvt
|
|
4
|
+
MfB1AOr5jwe9Zk2NBJHPBdQ+rl31sTCouWaWrD7JhlO3JEvKhcawo0Y4XQIDAQAB
|
|
5
|
+
AoGAboY7vH7ipxETJ26e5kpnWEyR0P1D6WspEM6u32QBHzW5Pjgb1zjqzNxTHV1R
|
|
6
|
+
J8yViGuP8OS5cdeeO1mYWpyS917yaQCAsjufAFgxbsMLbfVFWj0dbPTVh7Mai8sl
|
|
7
|
+
BGGGXKZaFTulJB3UeVMN8LvPkZC/cEdi51toVR46t0LQxQECQQDRSL6WK7YkmQJl
|
|
8
|
+
jtexs40+OJ3DWXR98nJ7E7Y4wYJEa8UvvbJFfARBFUsAPhYsGag77o5e6ibHFti/
|
|
9
|
+
AxzoLxEhAkEAxeOm8bqPTs1jeg+o083bKlwPNom6CtntwLsU4KWsBIMYmBp5u4oq
|
|
10
|
+
yhawNKaqsW8dY88ZTQ/OAm+XtaKOG30zvQJAIr2fnZAOAU9A/ZjTp1T16lE9pxLv
|
|
11
|
+
aoTXiiTAh/VfaXo2VnF36V7n2eHt/FFSHun3alN0YL8fxsa9HiAnKUe+4QJARIu3
|
|
12
|
+
rzHNJCG23HgCJeO/j+u1hVGttMaKOWFUOQCKFkIGyeEZ26FfcwLq5EH7DF0N1B3P
|
|
13
|
+
iMb5uBRJe6wkB1eWDQJBAJDDdvy8RoHaV6sTIU7T9LD1a1ks0QpBjRJniBF2JZpm
|
|
14
|
+
0cS3VKUlqOIGtFObNBr0ti5jYutYc0DWGyTOzpVIm94=
|
|
15
|
+
-----END RSA PRIVATE KEY-----
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
|
2
|
+
MIICqTCCAhICCQDnxgNKADcb5jANBgkqhkiG9w0BAQsFADCBlzELMAkGA1UEBhMC
|
|
3
|
+
VUsxFzAVBgNVBAgMDkdyZWF0ZXIgTG9uZG9uMQ8wDQYDVQQHDAZMb25kb24xDjAM
|
|
4
|
+
BgNVBAoMBUhNQ1RTMRMwEQYDVQQLDApTdXN0YWluaW5nMRQwEgYDVQQDDAtobWN0
|
|
5
|
+
cy5jby51azEjMCEGCSqGSIb3DQEJARYUc3VzdGFpbmluZ0BobWN0cy5uZXQwIBcN
|
|
6
|
+
MTgwNjAyMDgzMzA5WhgPMjExODA1MDkwODMzMDlaMIGXMQswCQYDVQQGEwJVSzEX
|
|
7
|
+
MBUGA1UECAwOR3JlYXRlciBMb25kb24xDzANBgNVBAcMBkxvbmRvbjEOMAwGA1UE
|
|
8
|
+
CgwFSE1DVFMxEzARBgNVBAsMClN1c3RhaW5pbmcxFDASBgNVBAMMC2htY3RzLmNv
|
|
9
|
+
LnVrMSMwIQYJKoZIhvcNAQkBFhRzdXN0YWluaW5nQGhtY3RzLm5ldDCBnzANBgkq
|
|
10
|
+
hkiG9w0BAQEFAAOBjQAwgYkCgYEAoccWpVhguusZAv6nDPyFiG7XleBC0eBiaUVm
|
|
11
|
+
AKJKmUs2Qn31i11+kEjRuzsrMnk4h6xu/iPOOcyzu5IbICB2UIb62+bj2ep4blqU
|
|
12
|
+
pn03UD0N7oxb7THwdQDq+Y8HvWZNjQSRzwXUPq5d9bEwqLlmlqw+yYZTtyRLyoXG
|
|
13
|
+
sKNGOF0CAwEAATANBgkqhkiG9w0BAQsFAAOBgQBsGFAt/s7+q/pj8hMIdt7zD8S4
|
|
14
|
+
u/KE0ILm3nCY7dYa0ZOyDq8XtTLcdfA5eI+8YSJ8cgIf0p4+rlLb+5vhnJAlz/B0
|
|
15
|
+
3E13jswlAn27JFOu2JtAImKO5nJT9kj3Iwh/fwmk36FWuyuAtwPtrvqqJB2Rg/nP
|
|
16
|
+
ciaVf/Ku3qVmuWu92Q==
|
|
17
|
+
-----END CERTIFICATE-----
|
data/tmp/.keep
ADDED
|
File without changes
|
metadata
ADDED
|
@@ -0,0 +1,199 @@
|
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
|
2
|
+
name: et_fake_acas_server
|
|
3
|
+
version: !ruby/object:Gem::Version
|
|
4
|
+
version: 0.1.6
|
|
5
|
+
platform: ruby
|
|
6
|
+
authors:
|
|
7
|
+
- Gary Taylor
|
|
8
|
+
autorequire:
|
|
9
|
+
bindir: exe
|
|
10
|
+
cert_chain: []
|
|
11
|
+
date: 2019-05-09 00:00:00.000000000 Z
|
|
12
|
+
dependencies:
|
|
13
|
+
- !ruby/object:Gem::Dependency
|
|
14
|
+
name: bundler
|
|
15
|
+
requirement: !ruby/object:Gem::Requirement
|
|
16
|
+
requirements:
|
|
17
|
+
- - "~>"
|
|
18
|
+
- !ruby/object:Gem::Version
|
|
19
|
+
version: '1.16'
|
|
20
|
+
type: :development
|
|
21
|
+
prerelease: false
|
|
22
|
+
version_requirements: !ruby/object:Gem::Requirement
|
|
23
|
+
requirements:
|
|
24
|
+
- - "~>"
|
|
25
|
+
- !ruby/object:Gem::Version
|
|
26
|
+
version: '1.16'
|
|
27
|
+
- !ruby/object:Gem::Dependency
|
|
28
|
+
name: rake
|
|
29
|
+
requirement: !ruby/object:Gem::Requirement
|
|
30
|
+
requirements:
|
|
31
|
+
- - "~>"
|
|
32
|
+
- !ruby/object:Gem::Version
|
|
33
|
+
version: '10.0'
|
|
34
|
+
type: :development
|
|
35
|
+
prerelease: false
|
|
36
|
+
version_requirements: !ruby/object:Gem::Requirement
|
|
37
|
+
requirements:
|
|
38
|
+
- - "~>"
|
|
39
|
+
- !ruby/object:Gem::Version
|
|
40
|
+
version: '10.0'
|
|
41
|
+
- !ruby/object:Gem::Dependency
|
|
42
|
+
name: puma
|
|
43
|
+
requirement: !ruby/object:Gem::Requirement
|
|
44
|
+
requirements:
|
|
45
|
+
- - "~>"
|
|
46
|
+
- !ruby/object:Gem::Version
|
|
47
|
+
version: '3.12'
|
|
48
|
+
type: :runtime
|
|
49
|
+
prerelease: false
|
|
50
|
+
version_requirements: !ruby/object:Gem::Requirement
|
|
51
|
+
requirements:
|
|
52
|
+
- - "~>"
|
|
53
|
+
- !ruby/object:Gem::Version
|
|
54
|
+
version: '3.12'
|
|
55
|
+
- !ruby/object:Gem::Dependency
|
|
56
|
+
name: sinatra-contrib
|
|
57
|
+
requirement: !ruby/object:Gem::Requirement
|
|
58
|
+
requirements:
|
|
59
|
+
- - "~>"
|
|
60
|
+
- !ruby/object:Gem::Version
|
|
61
|
+
version: '2.0'
|
|
62
|
+
type: :runtime
|
|
63
|
+
prerelease: false
|
|
64
|
+
version_requirements: !ruby/object:Gem::Requirement
|
|
65
|
+
requirements:
|
|
66
|
+
- - "~>"
|
|
67
|
+
- !ruby/object:Gem::Version
|
|
68
|
+
version: '2.0'
|
|
69
|
+
- !ruby/object:Gem::Dependency
|
|
70
|
+
name: sinatra
|
|
71
|
+
requirement: !ruby/object:Gem::Requirement
|
|
72
|
+
requirements:
|
|
73
|
+
- - "~>"
|
|
74
|
+
- !ruby/object:Gem::Version
|
|
75
|
+
version: '2.0'
|
|
76
|
+
- - ">="
|
|
77
|
+
- !ruby/object:Gem::Version
|
|
78
|
+
version: 2.0.3
|
|
79
|
+
type: :runtime
|
|
80
|
+
prerelease: false
|
|
81
|
+
version_requirements: !ruby/object:Gem::Requirement
|
|
82
|
+
requirements:
|
|
83
|
+
- - "~>"
|
|
84
|
+
- !ruby/object:Gem::Version
|
|
85
|
+
version: '2.0'
|
|
86
|
+
- - ">="
|
|
87
|
+
- !ruby/object:Gem::Version
|
|
88
|
+
version: 2.0.3
|
|
89
|
+
- !ruby/object:Gem::Dependency
|
|
90
|
+
name: nokogiri
|
|
91
|
+
requirement: !ruby/object:Gem::Requirement
|
|
92
|
+
requirements:
|
|
93
|
+
- - "~>"
|
|
94
|
+
- !ruby/object:Gem::Version
|
|
95
|
+
version: '1.8'
|
|
96
|
+
- - ">="
|
|
97
|
+
- !ruby/object:Gem::Version
|
|
98
|
+
version: 1.8.2
|
|
99
|
+
type: :runtime
|
|
100
|
+
prerelease: false
|
|
101
|
+
version_requirements: !ruby/object:Gem::Requirement
|
|
102
|
+
requirements:
|
|
103
|
+
- - "~>"
|
|
104
|
+
- !ruby/object:Gem::Version
|
|
105
|
+
version: '1.8'
|
|
106
|
+
- - ">="
|
|
107
|
+
- !ruby/object:Gem::Version
|
|
108
|
+
version: 1.8.2
|
|
109
|
+
- !ruby/object:Gem::Dependency
|
|
110
|
+
name: activesupport
|
|
111
|
+
requirement: !ruby/object:Gem::Requirement
|
|
112
|
+
requirements:
|
|
113
|
+
- - "~>"
|
|
114
|
+
- !ruby/object:Gem::Version
|
|
115
|
+
version: '5.2'
|
|
116
|
+
type: :runtime
|
|
117
|
+
prerelease: false
|
|
118
|
+
version_requirements: !ruby/object:Gem::Requirement
|
|
119
|
+
requirements:
|
|
120
|
+
- - "~>"
|
|
121
|
+
- !ruby/object:Gem::Version
|
|
122
|
+
version: '5.2'
|
|
123
|
+
- !ruby/object:Gem::Dependency
|
|
124
|
+
name: ruby-mcrypt
|
|
125
|
+
requirement: !ruby/object:Gem::Requirement
|
|
126
|
+
requirements:
|
|
127
|
+
- - "~>"
|
|
128
|
+
- !ruby/object:Gem::Version
|
|
129
|
+
version: '0.2'
|
|
130
|
+
type: :runtime
|
|
131
|
+
prerelease: false
|
|
132
|
+
version_requirements: !ruby/object:Gem::Requirement
|
|
133
|
+
requirements:
|
|
134
|
+
- - "~>"
|
|
135
|
+
- !ruby/object:Gem::Version
|
|
136
|
+
version: '0.2'
|
|
137
|
+
description: Standalone fake acas server for use during dev and test of the employment
|
|
138
|
+
tribunal system
|
|
139
|
+
email:
|
|
140
|
+
- gary.taylor@hmcts.net
|
|
141
|
+
executables:
|
|
142
|
+
- et_fake_acas_server
|
|
143
|
+
extensions: []
|
|
144
|
+
extra_rdoc_files: []
|
|
145
|
+
files:
|
|
146
|
+
- ".gitignore"
|
|
147
|
+
- ".rspec"
|
|
148
|
+
- ".ruby-version"
|
|
149
|
+
- ".travis.yml"
|
|
150
|
+
- Gemfile
|
|
151
|
+
- Gemfile.lock
|
|
152
|
+
- LICENSE.txt
|
|
153
|
+
- README.md
|
|
154
|
+
- Rakefile
|
|
155
|
+
- bin/console
|
|
156
|
+
- bin/setup
|
|
157
|
+
- et_fake_acas_server.gemspec
|
|
158
|
+
- exe/et_fake_acas_server
|
|
159
|
+
- lib/config.ru
|
|
160
|
+
- lib/et_fake_acas_server.rb
|
|
161
|
+
- lib/et_fake_acas_server/forms/certificate_lookup_form.rb
|
|
162
|
+
- lib/et_fake_acas_server/server.rb
|
|
163
|
+
- lib/et_fake_acas_server/version.rb
|
|
164
|
+
- lib/et_fake_acas_server/xml_builders/found_xml_builder.rb
|
|
165
|
+
- lib/et_fake_acas_server/xml_builders/internal_error_xml_builder.rb
|
|
166
|
+
- lib/et_fake_acas_server/xml_builders/invalid_certificate_format_xml_builder.rb
|
|
167
|
+
- lib/et_fake_acas_server/xml_builders/no_match_xml_builder.rb
|
|
168
|
+
- lib/pdfs/76 EC (C) Certificate R000080.pdf
|
|
169
|
+
- public/.keep
|
|
170
|
+
- temp_x509/acas/privatekey.pem
|
|
171
|
+
- temp_x509/acas/publickey.cer
|
|
172
|
+
- temp_x509/et/privatekey.pem
|
|
173
|
+
- temp_x509/et/publickey.cer
|
|
174
|
+
- tmp/.keep
|
|
175
|
+
homepage: https://github.com/ministryofjustice/et_api
|
|
176
|
+
licenses:
|
|
177
|
+
- MIT
|
|
178
|
+
metadata:
|
|
179
|
+
allowed_push_host: http://mygemserver.com
|
|
180
|
+
post_install_message:
|
|
181
|
+
rdoc_options: []
|
|
182
|
+
require_paths:
|
|
183
|
+
- lib
|
|
184
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
|
185
|
+
requirements:
|
|
186
|
+
- - ">="
|
|
187
|
+
- !ruby/object:Gem::Version
|
|
188
|
+
version: '0'
|
|
189
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
|
190
|
+
requirements:
|
|
191
|
+
- - ">="
|
|
192
|
+
- !ruby/object:Gem::Version
|
|
193
|
+
version: '0'
|
|
194
|
+
requirements: []
|
|
195
|
+
rubygems_version: 3.0.3
|
|
196
|
+
signing_key:
|
|
197
|
+
specification_version: 4
|
|
198
|
+
summary: Employment Tribunal (govuk) fake acas server
|
|
199
|
+
test_files: []
|