fast_security_test_kit 0.1.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml ADDED
@@ -0,0 +1,7 @@
1
+ ---
2
+ SHA256:
3
+ metadata.gz: 0d07a6497283837f61fe7a9b46bf0469d17ffb5569ce901666b158391ef4504e
4
+ data.tar.gz: b3a20292e0a2fbdbf3b620e28216df1fe995169aa4055af197021cc330026f08
5
+ SHA512:
6
+ metadata.gz: cfa4df7912db27fc406bf244259b8fb2f922b4b1e5a906698e25fff4e66e49d9a3b4d4f13301b577d2f25210b0134a5073809c0f491b9321e9abf0e3546976f3
7
+ data.tar.gz: fd4278cace417fcb33d24d9ab04ac788c28d5b458c07f46db4d5051bcc74b5bd22f63b41fdaf7d51adfd6c47ac8968f6e49b0b638f66be4f7a3743847c010111
data/LICENSE ADDED
@@ -0,0 +1,201 @@
1
+ Apache License
2
+ Version 2.0, January 2004
3
+ http://www.apache.org/licenses/
4
+
5
+ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
6
+
7
+ 1. Definitions.
8
+
9
+ "License" shall mean the terms and conditions for use, reproduction,
10
+ and distribution as defined by Sections 1 through 9 of this document.
11
+
12
+ "Licensor" shall mean the copyright owner or entity authorized by
13
+ the copyright owner that is granting the License.
14
+
15
+ "Legal Entity" shall mean the union of the acting entity and all
16
+ other entities that control, are controlled by, or are under common
17
+ control with that entity. For the purposes of this definition,
18
+ "control" means (i) the power, direct or indirect, to cause the
19
+ direction or management of such entity, whether by contract or
20
+ otherwise, or (ii) ownership of fifty percent (50%) or more of the
21
+ outstanding shares, or (iii) beneficial ownership of such entity.
22
+
23
+ "You" (or "Your") shall mean an individual or Legal Entity
24
+ exercising permissions granted by this License.
25
+
26
+ "Source" form shall mean the preferred form for making modifications,
27
+ including but not limited to software source code, documentation
28
+ source, and configuration files.
29
+
30
+ "Object" form shall mean any form resulting from mechanical
31
+ transformation or translation of a Source form, including but
32
+ not limited to compiled object code, generated documentation,
33
+ and conversions to other media types.
34
+
35
+ "Work" shall mean the work of authorship, whether in Source or
36
+ Object form, made available under the License, as indicated by a
37
+ copyright notice that is included in or attached to the work
38
+ (an example is provided in the Appendix below).
39
+
40
+ "Derivative Works" shall mean any work, whether in Source or Object
41
+ form, that is based on (or derived from) the Work and for which the
42
+ editorial revisions, annotations, elaborations, or other modifications
43
+ represent, as a whole, an original work of authorship. For the purposes
44
+ of this License, Derivative Works shall not include works that remain
45
+ separable from, or merely link (or bind by name) to the interfaces of,
46
+ the Work and Derivative Works thereof.
47
+
48
+ "Contribution" shall mean any work of authorship, including
49
+ the original version of the Work and any modifications or additions
50
+ to that Work or Derivative Works thereof, that is intentionally
51
+ submitted to Licensor for inclusion in the Work by the copyright owner
52
+ or by an individual or Legal Entity authorized to submit on behalf of
53
+ the copyright owner. For the purposes of this definition, "submitted"
54
+ means any form of electronic, verbal, or written communication sent
55
+ to the Licensor or its representatives, including but not limited to
56
+ communication on electronic mailing lists, source code control systems,
57
+ and issue tracking systems that are managed by, or on behalf of, the
58
+ Licensor for the purpose of discussing and improving the Work, but
59
+ excluding communication that is conspicuously marked or otherwise
60
+ designated in writing by the copyright owner as "Not a Contribution."
61
+
62
+ "Contributor" shall mean Licensor and any individual or Legal Entity
63
+ on behalf of whom a Contribution has been received by Licensor and
64
+ subsequently incorporated within the Work.
65
+
66
+ 2. Grant of Copyright License. Subject to the terms and conditions of
67
+ this License, each Contributor hereby grants to You a perpetual,
68
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
69
+ copyright license to reproduce, prepare Derivative Works of,
70
+ publicly display, publicly perform, sublicense, and distribute the
71
+ Work and such Derivative Works in Source or Object form.
72
+
73
+ 3. Grant of Patent License. Subject to the terms and conditions of
74
+ this License, each Contributor hereby grants to You a perpetual,
75
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
76
+ (except as stated in this section) patent license to make, have made,
77
+ use, offer to sell, sell, import, and otherwise transfer the Work,
78
+ where such license applies only to those patent claims licensable
79
+ by such Contributor that are necessarily infringed by their
80
+ Contribution(s) alone or by combination of their Contribution(s)
81
+ with the Work to which such Contribution(s) was submitted. If You
82
+ institute patent litigation against any entity (including a
83
+ cross-claim or counterclaim in a lawsuit) alleging that the Work
84
+ or a Contribution incorporated within the Work constitutes direct
85
+ or contributory patent infringement, then any patent licenses
86
+ granted to You under this License for that Work shall terminate
87
+ as of the date such litigation is filed.
88
+
89
+ 4. Redistribution. You may reproduce and distribute copies of the
90
+ Work or Derivative Works thereof in any medium, with or without
91
+ modifications, and in Source or Object form, provided that You
92
+ meet the following conditions:
93
+
94
+ (a) You must give any other recipients of the Work or
95
+ Derivative Works a copy of this License; and
96
+
97
+ (b) You must cause any modified files to carry prominent notices
98
+ stating that You changed the files; and
99
+
100
+ (c) You must retain, in the Source form of any Derivative Works
101
+ that You distribute, all copyright, patent, trademark, and
102
+ attribution notices from the Source form of the Work,
103
+ excluding those notices that do not pertain to any part of
104
+ the Derivative Works; and
105
+
106
+ (d) If the Work includes a "NOTICE" text file as part of its
107
+ distribution, then any Derivative Works that You distribute must
108
+ include a readable copy of the attribution notices contained
109
+ within such NOTICE file, excluding those notices that do not
110
+ pertain to any part of the Derivative Works, in at least one
111
+ of the following places: within a NOTICE text file distributed
112
+ as part of the Derivative Works; within the Source form or
113
+ documentation, if provided along with the Derivative Works; or,
114
+ within a display generated by the Derivative Works, if and
115
+ wherever such third-party notices normally appear. The contents
116
+ of the NOTICE file are for informational purposes only and
117
+ do not modify the License. You may add Your own attribution
118
+ notices within Derivative Works that You distribute, alongside
119
+ or as an addendum to the NOTICE text from the Work, provided
120
+ that such additional attribution notices cannot be construed
121
+ as modifying the License.
122
+
123
+ You may add Your own copyright statement to Your modifications and
124
+ may provide additional or different license terms and conditions
125
+ for use, reproduction, or distribution of Your modifications, or
126
+ for any such Derivative Works as a whole, provided Your use,
127
+ reproduction, and distribution of the Work otherwise complies with
128
+ the conditions stated in this License.
129
+
130
+ 5. Submission of Contributions. Unless You explicitly state otherwise,
131
+ any Contribution intentionally submitted for inclusion in the Work
132
+ by You to the Licensor shall be under the terms and conditions of
133
+ this License, without any additional terms or conditions.
134
+ Notwithstanding the above, nothing herein shall supersede or modify
135
+ the terms of any separate license agreement you may have executed
136
+ with Licensor regarding such Contributions.
137
+
138
+ 6. Trademarks. This License does not grant permission to use the trade
139
+ names, trademarks, service marks, or product names of the Licensor,
140
+ except as required for reasonable and customary use in describing the
141
+ origin of the Work and reproducing the content of the NOTICE file.
142
+
143
+ 7. Disclaimer of Warranty. Unless required by applicable law or
144
+ agreed to in writing, Licensor provides the Work (and each
145
+ Contributor provides its Contributions) on an "AS IS" BASIS,
146
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
147
+ implied, including, without limitation, any warranties or conditions
148
+ of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
149
+ PARTICULAR PURPOSE. You are solely responsible for determining the
150
+ appropriateness of using or redistributing the Work and assume any
151
+ risks associated with Your exercise of permissions under this License.
152
+
153
+ 8. Limitation of Liability. In no event and under no legal theory,
154
+ whether in tort (including negligence), contract, or otherwise,
155
+ unless required by applicable law (such as deliberate and grossly
156
+ negligent acts) or agreed to in writing, shall any Contributor be
157
+ liable to You for damages, including any direct, indirect, special,
158
+ incidental, or consequential damages of any character arising as a
159
+ result of this License or out of the use or inability to use the
160
+ Work (including but not limited to damages for loss of goodwill,
161
+ work stoppage, computer failure or malfunction, or any and all
162
+ other commercial damages or losses), even if such Contributor
163
+ has been advised of the possibility of such damages.
164
+
165
+ 9. Accepting Warranty or Additional Liability. While redistributing
166
+ the Work or Derivative Works thereof, You may choose to offer,
167
+ and charge a fee for, acceptance of support, warranty, indemnity,
168
+ or other liability obligations and/or rights consistent with this
169
+ License. However, in accepting such obligations, You may act only
170
+ on Your own behalf and on Your sole responsibility, not on behalf
171
+ of any other Contributor, and only if You agree to indemnify,
172
+ defend, and hold each Contributor harmless for any liability
173
+ incurred by, or claims asserted against, such Contributor by reason
174
+ of your accepting any such warranty or additional liability.
175
+
176
+ END OF TERMS AND CONDITIONS
177
+
178
+ APPENDIX: How to apply the Apache License to your work.
179
+
180
+ To apply the Apache License to your work, attach the following
181
+ boilerplate notice, with the fields enclosed by brackets "{}"
182
+ replaced with your own identifying information. (Don't include
183
+ the brackets!) The text should be enclosed in the appropriate
184
+ comment syntax for the file format. We also recommend that a
185
+ file or class name and description of purpose be included on the
186
+ same "printed page" as the copyright notice for easier
187
+ identification within third-party archives.
188
+
189
+ Copyright {yyyy} {name of copyright owner}
190
+
191
+ Licensed under the Apache License, Version 2.0 (the "License");
192
+ you may not use this file except in compliance with the License.
193
+ You may obtain a copy of the License at
194
+
195
+ http://www.apache.org/licenses/LICENSE-2.0
196
+
197
+ Unless required by applicable law or agreed to in writing, software
198
+ distributed under the License is distributed on an "AS IS" BASIS,
199
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
200
+ See the License for the specific language governing permissions and
201
+ limitations under the License.
@@ -0,0 +1,384 @@
1
+ # coding: utf-8
2
+ require 'jwt'
3
+
4
+ module FASTSecurity
5
+ class DiscoveryGroup < Inferno::TestGroup
6
+ include Inferno::DSL::Assertions
7
+
8
+ title 'FAST Discovery'
9
+ description %(
10
+ Verify that server configuration is made available and conforms with [the
11
+ discovery
12
+ requirements](https://build.fhir.org/ig/HL7/fhir-udap-security-ig/discovery.html).
13
+ )
14
+ id :discovery_group
15
+
16
+ run_as_group
17
+
18
+ def assert_array_of_strings(config, field)
19
+ values = config[field]
20
+ assert values.is_a?(Array),
21
+ "`#{field}` should be an Array, but found #{values.class.name}"
22
+ non_string_values = values.select { |value| !value.is_a?(String) }
23
+ assert non_string_values.blank?,
24
+ "`#{field}` should be an Array of strings, " \
25
+ "but found #{non_string_values.map(&:class).map(&:name).join(', ')}"
26
+ end
27
+
28
+ test do
29
+ title 'UDAP Well-Known configuration is available'
30
+ description %(
31
+ The metadata returned from `{baseURL}/.well-known/udap` **SHALL**
32
+ represent the server’s capabilities with respect to the UDAP workflows
33
+ described in this guide.
34
+ )
35
+
36
+ input :url
37
+ output :config_json
38
+ makes_request :config
39
+
40
+ run do
41
+ get("#{url.strip.chomp('/')}/.well-known/udap", name: :config)
42
+ assert_response_status(200)
43
+ assert_valid_json(response[:body])
44
+ output config_json: response[:body]
45
+ end
46
+ end
47
+
48
+ test do
49
+ title 'udap_versions_supported field'
50
+ description %(
51
+ `udap_versions_supported` must contain a fixed array with one string
52
+ element: `["1"]`
53
+ )
54
+
55
+ input :config_json
56
+
57
+ run do
58
+ assert_valid_json(config_json)
59
+ config = JSON.parse(config_json)
60
+ assert config['udap_versions_supported'] == ['1'],
61
+ "`udap_versions_supported` field must contain an array with one string element '1'"
62
+ end
63
+ end
64
+
65
+ test do
66
+ title 'udap_certifications_supported field'
67
+ description %(
68
+ If present, `udap_certifications_supported` is an array of zero or more
69
+ certification URIs
70
+ )
71
+
72
+ input :config_json
73
+
74
+ run do
75
+ assert_valid_json(config_json)
76
+ config = JSON.parse(config_json)
77
+
78
+ omit_if !config.key?('udap_certifications_supported')
79
+
80
+ assert_array_of_strings(config, 'udap_certifications_supported')
81
+
82
+ non_uri_values =
83
+ config['udap_certifications_supported']
84
+ .select { |value| !value.match?(URI.regexp) }
85
+
86
+ assert non_uri_values.blank?,
87
+ '`udap_certifacations_supported` should be an Array of URI strings, ' \
88
+ "but found #{non_uri_values.map(&:class).map(&:name).join(', ')}"
89
+ end
90
+ end
91
+
92
+ test do
93
+ title 'udap_certifications_required field'
94
+ description %(
95
+ If present, `udap_certifications_required` is an array of zero or more
96
+ certification URIs
97
+ )
98
+
99
+ input :config_json
100
+
101
+ run do
102
+ assert_valid_json(config_json)
103
+ config = JSON.parse(config_json)
104
+
105
+ omit_if !config.key?('udap_certifications_required')
106
+
107
+ assert_array_of_strings(config, 'udap_certifications_required')
108
+
109
+ non_uri_values =
110
+ config['udap_certifications_required']
111
+ .select { |value| !value.match?(URI.regexp) }
112
+
113
+ assert non_uri_values.blank?,
114
+ '`udap_certifacations_required` should be an Array of URI strings, ' \
115
+ "but found #{non_uri_values.map(&:class).map(&:name).join(', ')}"
116
+ end
117
+ end
118
+
119
+ test do
120
+ title 'grant_types_supported field'
121
+ description %(
122
+ If present, `grant_types_supported` is an array of one or more
123
+ grant types
124
+ )
125
+
126
+ input :config_json
127
+
128
+ run do
129
+ assert_valid_json(config_json)
130
+ config = JSON.parse(config_json)
131
+
132
+ omit_if !config.key?('grant_types_supported')
133
+
134
+ assert_array_of_strings(config, 'grant_types_supported')
135
+
136
+ grant_types = config['grant_types_supported']
137
+
138
+ if grant_types.include?('refresh_token')
139
+ assert grant_types.include?('authorization_code'),
140
+ 'The `refresh_token` grant type **SHALL** only be included if the ' \
141
+ '`authorization_code` grant type is also included.'
142
+ end
143
+ end
144
+ end
145
+
146
+ test do
147
+ title 'scopes_supported field'
148
+ description %(
149
+ If present, `scopes_supported` is an array of one or more
150
+ strings containing scopes
151
+ )
152
+
153
+ input :config_json
154
+
155
+ run do
156
+ assert_valid_json(config_json)
157
+ config = JSON.parse(config_json)
158
+
159
+ omit_if !config.key?('scopes_supported')
160
+
161
+ assert_array_of_strings(config, 'scopes_supported')
162
+ end
163
+ end
164
+
165
+ test do
166
+ title 'authorization_endpoint field'
167
+ description %(
168
+ If present, `authorization_endpoint` is a string containing the URL of
169
+ the Authorization Server's authorization endpoint
170
+ )
171
+
172
+ input :config_json
173
+
174
+ run do
175
+ assert_valid_json(config_json)
176
+ config = JSON.parse(config_json)
177
+
178
+ omit_if !config.key?('authorization_endpoint')
179
+
180
+ endpoint = config['authorization_endpoint']
181
+
182
+ assert endpoint.is_a?(String),
183
+ "`authorization_endpoint` should be a String, but found #{endpoint.class.name}"
184
+ assert endpoint.match?(URI.regexp), "`#{endpoint}` is not a valid URI"
185
+ end
186
+ end
187
+
188
+ test do
189
+ title 'token_endpoint field'
190
+ description %(
191
+ If present, `token_endpoint` is a string containing the URL of
192
+ the Authorization Server's token endpoint
193
+ )
194
+
195
+ input :config_json
196
+
197
+ run do
198
+ assert_valid_json(config_json)
199
+ config = JSON.parse(config_json)
200
+
201
+ omit_if !config.key?('token_endpoint')
202
+
203
+ endpoint = config['token_endpoint']
204
+
205
+ assert endpoint.is_a?(String),
206
+ "`token_endpoint` should be a String, but found #{endpoint.class.name}"
207
+ assert endpoint.match?(URI.regexp), "`#{endpoint}` is not a valid URI"
208
+ end
209
+ end
210
+
211
+ test do
212
+ title 'token_endpoint_auth_methods_supported field'
213
+ description %(
214
+ If present, `token_endpoint_auth_methods_supported` must contain a fixed
215
+ array with one string element: `["private_key_jwt"]`
216
+ )
217
+
218
+ input :config_json
219
+
220
+ run do
221
+ assert_valid_json(config_json)
222
+ config = JSON.parse(config_json)
223
+
224
+ omit_if !config.key?('token_endpoint_auth_methods_supported')
225
+
226
+ assert config['token_endpoint_auth_methods_supported'] == ['private_key_jwt'],
227
+ "`token_endpoint_auth_methods_supported` field must contain an array " \
228
+ "with one string element 'private_key_jwt'"
229
+ end
230
+ end
231
+
232
+ test do
233
+ title 'token_endpoint_auth_signing_alg_values_supported field'
234
+ description %(
235
+ If present, `token_endpoint_auth_signing_alg_values_supported` is an
236
+ array of one or more strings identifying signature algorithms
237
+ )
238
+
239
+ input :config_json
240
+
241
+ run do
242
+ assert_valid_json(config_json)
243
+ config = JSON.parse(config_json)
244
+
245
+ omit_if !config.key?('token_endpoint_auth_signing_alg_values_supported')
246
+
247
+ assert_array_of_strings(config, 'token_endpoint_auth_signing_alg_values_supported')
248
+ end
249
+ end
250
+
251
+ test do
252
+ title 'registration_endpoint field'
253
+ description %(
254
+ If present, `registration_endpoint` is a string containing the URL of
255
+ the Authorization Server's registration endpoint
256
+ )
257
+
258
+ input :config_json
259
+
260
+ run do
261
+ assert_valid_json(config_json)
262
+ config = JSON.parse(config_json)
263
+
264
+ omit_if !config.key?('registration_endpoint')
265
+
266
+ endpoint = config['registration_endpoint']
267
+
268
+ assert endpoint.is_a?(String),
269
+ "`registration_endpoint` should be a String, but found #{endpoint.class.name}"
270
+ assert endpoint.match?(URI.regexp), "`#{endpoint}` is not a valid URI"
271
+ end
272
+ end
273
+
274
+ test do
275
+ title 'registration_endpoint_jwt_signing_alg_values_supported field'
276
+ description %(
277
+ If present, `registration_endpoint_jwt_signing_alg_values_supported` is
278
+ an array of one or more strings identifying signature algorithms
279
+ )
280
+
281
+ input :config_json
282
+
283
+ run do
284
+ assert_valid_json(config_json)
285
+ config = JSON.parse(config_json)
286
+
287
+ omit_if !config.key?('registration_endpoint_jwt_signing_alg_values_supported')
288
+
289
+ assert_array_of_strings(config, 'registration_endpoint_jwt_signing_alg_values_supported')
290
+ end
291
+ end
292
+
293
+ test do
294
+ title 'signed_metadata field'
295
+ description %(
296
+ If present, `signed_metadata` is a string containing a JWT
297
+ )
298
+
299
+ input :config_json
300
+ output :signed_metadata_jwt
301
+
302
+ run do
303
+ assert_valid_json(config_json)
304
+ config = JSON.parse(config_json)
305
+
306
+ omit_if !config.key?('signed_metadata')
307
+ jwt = config['signed_metadata']
308
+
309
+ assert jwt.is_a?(String), "`signed_metadata` should be a String, but found #{jwt.class.name}"
310
+ output signed_metadata_jwt: jwt
311
+
312
+ jwt_regex = %r{^[A-Za-z0-9-_=]+\.[A-Za-z0-9-_=]+\.?[A-Za-z0-9-_.+/=]*$}
313
+
314
+ assert jwt.match?(jwt_regex), '`signed_metadata` is not a valid JWT'
315
+ end
316
+ end
317
+
318
+ test do
319
+ title 'signed_metadata contents'
320
+ description %(
321
+ Validate the contents of the `signed_metadata` header, signature, and
322
+ contents.
323
+ )
324
+
325
+ input :signed_metadata_jwt, optional: true
326
+ input :config_json, :url
327
+
328
+ run do
329
+ omit_if signed_metadata_jwt.blank?
330
+
331
+ assert_valid_json(config_json)
332
+ config = JSON.parse(config_json)
333
+
334
+ token_body, token_header = JWT.decode(signed_metadata_jwt, nil, false)
335
+
336
+ assert token_header.key?('x5c'), 'JWT header does not contain `x5c` field'
337
+ assert token_header.key?('alg'), 'JWT header does not contain `alg` field'
338
+
339
+ cert = OpenSSL::X509::Certificate.new(Base64.decode64(token_header['x5c'].first))
340
+ # TODO: handle root certs and crls
341
+ JWT.decode(
342
+ signed_metadata_jwt,
343
+ cert.public_key,
344
+ true,
345
+ algorithm: token_header['alg']
346
+ )
347
+
348
+ ['iss', 'sub', 'exp', 'iat', 'jti'].each do |key|
349
+ assert token_body.key?(key), "JWT does not contain `#{key}` claim"
350
+ end
351
+
352
+ ['authorization_endpoint', 'token_endpoint', 'registration_endpoint']
353
+ .select { |key| config.key? key }
354
+ .each do |key|
355
+ assert token_body.key?(key), "JWT must contain `#{key}` claim if it is included in the unsigned metadata"
356
+ end
357
+
358
+ assert token_body['iss'] == url, "`iss` claim `#{token_body['iss']}` is not the same as server base url `#{url}`"
359
+ alt_name =
360
+ cert.extensions
361
+ .find { |extension| extension.oid == 'subjectAltName' }
362
+ .value
363
+ .delete_prefix('URI:')
364
+ assert token_body['iss'] == alt_name,
365
+ "`iss` claim `#{token_body['iss']}` does not match Subject Alternative Name extension " \
366
+ "from the `x5c` JWT header `#{alt_name}`"
367
+ assert token_body['iss'] == token_body['sub'],
368
+ "`iss` claim `#{token_body['iss']}` does not match `sub` claim `#{token_body['sub']}`"
369
+
370
+ ['iat', 'exp'].each do |key|
371
+ assert token_body[key].is_a?(Numeric), "Expected `#{key}` to be numeric, but found #{token_body[key].class.name}"
372
+ end
373
+ issue_time = Time.at(token_body['iat'])
374
+ expiration_time = Time.at(token_body['exp'])
375
+
376
+ assert expiration_time <= issue_time + 1.year, %(
377
+ `exp` is more than a year after `iat`'.
378
+ * `iat`: #{token_body['iat']} - #{issue_time.iso8601}
379
+ * `exp`: #{token_body['exp']} - #{expiration_time.iso8601}
380
+ )
381
+ end
382
+ end
383
+ end
384
+ end
@@ -0,0 +1,11 @@
1
+ require_relative 'fast_security/discovery_group'
2
+
3
+ module FASTSecurity
4
+ class Suite < Inferno::TestSuite
5
+ id :fast_security
6
+ title 'FAST Security'
7
+ description 'Tests for FAST Security'
8
+
9
+ group from: :discovery_group
10
+ end
11
+ end
metadata ADDED
@@ -0,0 +1,132 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: fast_security_test_kit
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.1.0
5
+ platform: ruby
6
+ authors:
7
+ - Stephen MacVicar
8
+ autorequire:
9
+ bindir: bin
10
+ cert_chain: []
11
+ date: 2022-10-28 00:00:00.000000000 Z
12
+ dependencies:
13
+ - !ruby/object:Gem::Dependency
14
+ name: inferno_core
15
+ requirement: !ruby/object:Gem::Requirement
16
+ requirements:
17
+ - - ">="
18
+ - !ruby/object:Gem::Version
19
+ version: 0.4.2
20
+ type: :runtime
21
+ prerelease: false
22
+ version_requirements: !ruby/object:Gem::Requirement
23
+ requirements:
24
+ - - ">="
25
+ - !ruby/object:Gem::Version
26
+ version: 0.4.2
27
+ - !ruby/object:Gem::Dependency
28
+ name: jwt
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - "~>"
32
+ - !ruby/object:Gem::Version
33
+ version: 2.3.0
34
+ type: :runtime
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - "~>"
39
+ - !ruby/object:Gem::Version
40
+ version: 2.3.0
41
+ - !ruby/object:Gem::Dependency
42
+ name: database_cleaner-sequel
43
+ requirement: !ruby/object:Gem::Requirement
44
+ requirements:
45
+ - - "~>"
46
+ - !ruby/object:Gem::Version
47
+ version: '1.8'
48
+ type: :development
49
+ prerelease: false
50
+ version_requirements: !ruby/object:Gem::Requirement
51
+ requirements:
52
+ - - "~>"
53
+ - !ruby/object:Gem::Version
54
+ version: '1.8'
55
+ - !ruby/object:Gem::Dependency
56
+ name: factory_bot
57
+ requirement: !ruby/object:Gem::Requirement
58
+ requirements:
59
+ - - "~>"
60
+ - !ruby/object:Gem::Version
61
+ version: '6.1'
62
+ type: :development
63
+ prerelease: false
64
+ version_requirements: !ruby/object:Gem::Requirement
65
+ requirements:
66
+ - - "~>"
67
+ - !ruby/object:Gem::Version
68
+ version: '6.1'
69
+ - !ruby/object:Gem::Dependency
70
+ name: rspec
71
+ requirement: !ruby/object:Gem::Requirement
72
+ requirements:
73
+ - - "~>"
74
+ - !ruby/object:Gem::Version
75
+ version: '3.10'
76
+ type: :development
77
+ prerelease: false
78
+ version_requirements: !ruby/object:Gem::Requirement
79
+ requirements:
80
+ - - "~>"
81
+ - !ruby/object:Gem::Version
82
+ version: '3.10'
83
+ - !ruby/object:Gem::Dependency
84
+ name: webmock
85
+ requirement: !ruby/object:Gem::Requirement
86
+ requirements:
87
+ - - "~>"
88
+ - !ruby/object:Gem::Version
89
+ version: '3.11'
90
+ type: :development
91
+ prerelease: false
92
+ version_requirements: !ruby/object:Gem::Requirement
93
+ requirements:
94
+ - - "~>"
95
+ - !ruby/object:Gem::Version
96
+ version: '3.11'
97
+ description: FAST Security IG Test Kit
98
+ email:
99
+ - inferno@groups.mitre.org
100
+ executables: []
101
+ extensions: []
102
+ extra_rdoc_files: []
103
+ files:
104
+ - LICENSE
105
+ - lib/fast_security.rb
106
+ - lib/fast_security/discovery_group.rb
107
+ homepage: https://github.com/inferno-framework/fast-security-test-kit
108
+ licenses:
109
+ - Apache-2.0
110
+ metadata:
111
+ homepage_uri: https://github.com/inferno-framework/fast-security-test-kit
112
+ source_code_uri: https://github.com/inferno-framework/fast-security-test-kit
113
+ post_install_message:
114
+ rdoc_options: []
115
+ require_paths:
116
+ - lib
117
+ required_ruby_version: !ruby/object:Gem::Requirement
118
+ requirements:
119
+ - - ">="
120
+ - !ruby/object:Gem::Version
121
+ version: 3.1.2
122
+ required_rubygems_version: !ruby/object:Gem::Requirement
123
+ requirements:
124
+ - - ">="
125
+ - !ruby/object:Gem::Version
126
+ version: '0'
127
+ requirements: []
128
+ rubygems_version: 3.3.7
129
+ signing_key:
130
+ specification_version: 4
131
+ summary: FAST Security IG Test Kit
132
+ test_files: []