sepafm 0.1.2 → 0.1.3

Sign up to get free protection for your applications and to get access to all the features.
Files changed (34) hide show
  1. checksums.yaml +4 -4
  2. data/lib/sepa/application_request.rb +29 -13
  3. data/lib/sepa/attribute_checks.rb +29 -29
  4. data/lib/sepa/banks/danske/danske_response.rb +49 -10
  5. data/lib/sepa/banks/danske/soap_danske.rb +7 -6
  6. data/lib/sepa/banks/nordea/nordea_response.rb +2 -4
  7. data/lib/sepa/client.rb +31 -11
  8. data/lib/sepa/error_messages.rb +2 -1
  9. data/lib/sepa/response.rb +18 -3
  10. data/lib/sepa/soap_builder.rb +52 -21
  11. data/lib/sepa/utilities.rb +4 -0
  12. data/lib/sepa/version.rb +1 -1
  13. data/lib/sepa/wsdl/wsdl_danske.xml +1 -1
  14. data/lib/sepa/xml_templates/application_request/download_file.xml +0 -1
  15. data/lib/sepa/xml_templates/application_request/download_file_list.xml +0 -1
  16. data/lib/sepa/xml_templates/application_request/upload_file.xml +0 -1
  17. data/lib/sepa/xml_templates/soap/download_file_list.xml +1 -1
  18. data/lib/sepa/xml_templates/soap/header.xml +6 -5
  19. data/lib/sepafm.rb +1 -0
  20. data/readme.md +3 -5
  21. data/sepafm.gemspec +5 -5
  22. data/test/sepa/banks/danske/danske_cert_response_test.rb +6 -6
  23. data/test/sepa/banks/danske/danske_cert_soap_builder_test.rb +16 -17
  24. data/test/sepa/banks/danske/danske_certificate_application_request_test.rb +16 -0
  25. data/test/sepa/banks/danske/danske_generic_soap_builder_test.rb +39 -43
  26. data/test/sepa/banks/nordea/nordea_application_request_test.rb +38 -18
  27. data/test/sepa/banks/nordea/nordea_cert_application_request_test.rb +12 -11
  28. data/test/sepa/banks/nordea/nordea_cert_request_soap_builder_test.rb +10 -10
  29. data/test/sepa/banks/nordea/nordea_generic_soap_builder_test.rb +14 -18
  30. data/test/sepa/banks/nordea/nordea_response_test.rb +1 -1
  31. data/test/sepa/client_test.rb +38 -25
  32. data/test/sepa/fixtures.rb +52 -22
  33. data/test/sepa/sepa_test.rb +1 -1
  34. metadata +27 -25
@@ -3,34 +3,34 @@ require 'test_helper'
3
3
  class NordeaCertRequestSoapBuilderTest < ActiveSupport::TestCase
4
4
 
5
5
  def setup
6
- @nordea_generic_params = nordea_cert_params
7
- @certrequest = Sepa::SoapBuilder.new(@nordea_generic_params)
6
+ @nordea_get_certificate_params = nordea_get_certificate_params
7
+ @certrequest = Sepa::SoapBuilder.new(@nordea_get_certificate_params)
8
8
  @xml = Nokogiri::XML(@certrequest.to_xml)
9
9
  end
10
10
 
11
11
  def test_should_initialize_with_proper_params
12
- assert Sepa::SoapBuilder.new(@nordea_generic_params)
12
+ assert Sepa::SoapBuilder.new(@nordea_get_certificate_params)
13
13
  end
14
14
 
15
15
  def test_should_get_error_if_command_missing
16
- @nordea_generic_params.delete(:command)
16
+ @nordea_get_certificate_params.delete(:command)
17
17
 
18
18
  assert_raises(ArgumentError) do
19
- Sepa::SoapBuilder.new(@nordea_generic_params)
19
+ Sepa::SoapBuilder.new(@nordea_get_certificate_params)
20
20
  end
21
21
  end
22
22
 
23
23
  def test_should_load_correct_template_with_get_certificate
24
- @nordea_generic_params[:command] = :get_certificate
25
- xml = Nokogiri::XML(Sepa::SoapBuilder.new(@nordea_generic_params).to_xml)
24
+ @nordea_get_certificate_params[:command] = :get_certificate
25
+ xml = Nokogiri::XML(Sepa::SoapBuilder.new(@nordea_get_certificate_params).to_xml)
26
26
 
27
27
  assert xml.xpath('//cer:getCertificatein', 'cer' => 'http://bxd.fi/CertificateService').first
28
28
  end
29
29
 
30
30
  def test_should_raise_error_if_command_not_correct
31
- @nordea_generic_params[:command] = :wrong_command
31
+ @nordea_get_certificate_params[:command] = :wrong_command
32
32
  assert_raises(ArgumentError) do
33
- soap = Sepa::SoapBuilder.new(@nordea_generic_params).to_xml
33
+ soap = Sepa::SoapBuilder.new(@nordea_get_certificate_params).to_xml
34
34
  end
35
35
  end
36
36
 
@@ -52,7 +52,7 @@ class NordeaCertRequestSoapBuilderTest < ActiveSupport::TestCase
52
52
  ar_doc = Nokogiri::XML(decode(ar_node.content))
53
53
 
54
54
  assert ar_doc.respond_to?(:canonicalize)
55
- assert_equal ar_doc.at_css("CustomerId").content, @nordea_generic_params[:customer_id]
55
+ assert_equal ar_doc.at_css("CustomerId").content, @nordea_get_certificate_params[:customer_id]
56
56
  end
57
57
 
58
58
  def test_should_validate_against_schema
@@ -7,8 +7,8 @@ class NordeaGenericSoapBuilderTest < ActiveSupport::TestCase
7
7
 
8
8
  # Convert the keys here since the conversion is usually done by the client and these tests
9
9
  # bypass the client
10
- @nordea_generic_params[:private_key] = OpenSSL::PKey::RSA.new @nordea_generic_params[:private_key]
11
- @nordea_generic_params[:cert] = OpenSSL::X509::Certificate.new @nordea_generic_params[:cert]
10
+ @nordea_generic_params[:signing_private_key] = rsa_key @nordea_generic_params[:signing_private_key]
11
+ @nordea_generic_params[:signing_certificate] = OpenSSL::X509::Certificate.new @nordea_generic_params[:signing_certificate]
12
12
 
13
13
  @soap_request = Sepa::SoapBuilder.new(@nordea_generic_params)
14
14
  @doc = Nokogiri::XML(@soap_request.to_xml)
@@ -133,26 +133,24 @@ class NordeaGenericSoapBuilderTest < ActiveSupport::TestCase
133
133
  def test_cert_is_added_correctly
134
134
  wsse = 'http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd'
135
135
 
136
- added_cert = @doc.xpath(
136
+ added_certificate = @doc.xpath(
137
137
  "//wsse:BinarySecurityToken", 'wsse' => wsse
138
138
  ).first.content
139
139
 
140
- actual_cert = @nordea_generic_params.fetch(:cert).to_s
141
- actual_cert = actual_cert.split('-----BEGIN CERTIFICATE-----')[1]
142
- actual_cert = actual_cert.split('-----END CERTIFICATE-----')[0]
143
- actual_cert = actual_cert.gsub(/\s+/, "")
140
+ actual_certificate = @nordea_generic_params.fetch(:signing_certificate).to_s
141
+ actual_certificate = actual_certificate.split('-----BEGIN CERTIFICATE-----')[1]
142
+ actual_certificate = actual_certificate.split('-----END CERTIFICATE-----')[0]
143
+ actual_certificate = actual_certificate.gsub(/\s+/, "")
144
144
 
145
- assert_equal added_cert, actual_cert
145
+ assert_equal added_certificate, actual_certificate
146
146
  end
147
147
 
148
148
  def test_body_digest_is_calculated_correctly
149
149
  sha1 = OpenSSL::Digest::SHA1.new
150
150
 
151
151
  # Digest which is calculated from the body and added to the header
152
- added_digest = @doc.xpath(
153
- "//dsig:Reference[@URI='#sdf6sa7d86f87s6df786sd87f6s8fsda']/dsig:DigestValue",
154
- 'dsig' => 'http://www.w3.org/2000/09/xmldsig#'
155
- ).first.content
152
+ reference_node = @doc.css('dsig|Reference')[1]
153
+ added_digest = reference_node.at('dsig|DigestValue').content
156
154
 
157
155
  body_node = @doc.xpath(
158
156
  "//env:Body", 'env' => 'http://schemas.xmlsoap.org/soap/envelope/'
@@ -195,10 +193,8 @@ class NordeaGenericSoapBuilderTest < ActiveSupport::TestCase
195
193
  def test_header_timestamps_digest_is_calculated_correctly
196
194
  sha1 = OpenSSL::Digest::SHA1.new
197
195
 
198
- added_digest = @doc.xpath(
199
- "//dsig:Reference[@URI='#dsfg8sdg87dsf678g6dsg6ds7fg']/dsig:DigestValue",
200
- 'dsig' => 'http://www.w3.org/2000/09/xmldsig#'
201
- ).first.content
196
+ reference_node = @doc.css('dsig|Reference')[0]
197
+ added_digest = reference_node.at('dsig|DigestValue').content
202
198
 
203
199
  wsu = 'http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd'
204
200
 
@@ -218,7 +214,7 @@ class NordeaGenericSoapBuilderTest < ActiveSupport::TestCase
218
214
 
219
215
  def test_signature_is_calculated_correctly
220
216
  sha1 = OpenSSL::Digest::SHA1.new
221
- private_key = @nordea_generic_params.fetch(:private_key)
217
+ signing_private_key = @nordea_generic_params.fetch(:signing_private_key)
222
218
 
223
219
  added_signature = @doc.xpath(
224
220
  "//dsig:SignatureValue", 'dsig' => 'http://www.w3.org/2000/09/xmldsig#'
@@ -234,7 +230,7 @@ class NordeaGenericSoapBuilderTest < ActiveSupport::TestCase
234
230
  )
235
231
 
236
232
  actual_signature = encode(
237
- private_key.sign(sha1, signed_info_node)
233
+ signing_private_key.sign(sha1, signed_info_node)
238
234
  ).gsub(/\s+/, "")
239
235
 
240
236
  assert_equal actual_signature, added_signature
@@ -131,7 +131,7 @@ class NordeaResponseTest < ActiveSupport::TestCase
131
131
 
132
132
  test 'certificate can be extracted from get certificate response' do
133
133
  assert_nothing_raised do
134
- OpenSSL::X509::Certificate.new decode(@gc.own_signing_cert)
134
+ OpenSSL::X509::Certificate.new @gc.own_signing_certificate
135
135
  end
136
136
  end
137
137
 
@@ -7,8 +7,9 @@ class ClientTest < ActiveSupport::TestCase
7
7
 
8
8
  # Get params hashes from fixtures for different banks and for different request types
9
9
  @nordea_generic_params = nordea_generic_params
10
- @nordea_cert_params = nordea_cert_params
11
- @danske_cert_params = danske_cert_params
10
+ @nordea_get_certificate_params = nordea_get_certificate_params
11
+ @danske_create_certificate_params = danske_create_certificate_params
12
+ @danske_generic_params = danske_generic_params
12
13
 
13
14
  # Namespaces
14
15
  @cor = 'http://bxd.fi/CorporateFileService'
@@ -28,7 +29,7 @@ class ClientTest < ActiveSupport::TestCase
28
29
  end
29
30
 
30
31
  test "should be valid with required params" do
31
- sepa = Sepa::Client.new @danske_cert_params
32
+ sepa = Sepa::Client.new @danske_create_certificate_params
32
33
  assert sepa.valid?, sepa.errors.messages
33
34
  end
34
35
 
@@ -38,10 +39,10 @@ class ClientTest < ActiveSupport::TestCase
38
39
  refute sepa.valid?, sepa.errors.messages
39
40
  end
40
41
 
41
- test "banks supported commands" do
42
- @nordea_cert_params[:bank] = :danske
43
- @nordea_cert_params[:command] = :get_certificate
44
- sepa = Sepa::Client.new @nordea_cert_params
42
+ test 'commands differ by bank' do
43
+ @nordea_get_certificate_params[:bank] = :danske
44
+ @nordea_get_certificate_params[:command] = :get_certificate
45
+ sepa = Sepa::Client.new @nordea_get_certificate_params
45
46
  refute sepa.valid?, sepa.errors.messages
46
47
  end
47
48
 
@@ -49,7 +50,7 @@ class ClientTest < ActiveSupport::TestCase
49
50
  wrong_pks = ['Im not a key', :leppakerttu, nil]
50
51
 
51
52
  wrong_pks.each do |wrong_pk|
52
- @nordea_generic_params[:private_key] = wrong_pk
53
+ @nordea_generic_params[:signing_private_key] = wrong_pk
53
54
  sepa = Sepa::Client.new @nordea_generic_params
54
55
  refute sepa.valid?, sepa.errors.messages
55
56
  end
@@ -59,7 +60,7 @@ class ClientTest < ActiveSupport::TestCase
59
60
  wrong_certs = ['Im not a cert', 99, :leppakerttu, nil]
60
61
 
61
62
  wrong_certs.each do |wrong_cert|
62
- @nordea_generic_params[:cert] = wrong_cert
63
+ @nordea_generic_params[:signing_certificate] = wrong_cert
63
64
  sepa = Sepa::Client.new @nordea_generic_params
64
65
  refute sepa.valid?, sepa.errors.messages
65
66
  end
@@ -77,7 +78,7 @@ class ClientTest < ActiveSupport::TestCase
77
78
  end
78
79
 
79
80
  test "environment is checked" do
80
- wrong_envs = ["not proper", 5, :protuction]
81
+ wrong_envs = ["not proper", :protuction]
81
82
 
82
83
  wrong_envs.each do |wrong_env|
83
84
  @nordea_generic_params[:environment] = wrong_env
@@ -90,7 +91,7 @@ class ClientTest < ActiveSupport::TestCase
90
91
  test 'environment defaults to production' do
91
92
  @nordea_generic_params.delete :environment
92
93
  sepa = Sepa::Client.new @nordea_generic_params
93
- assert sepa.environment == 'PRODUCTION'
94
+ assert sepa.environment == :production
94
95
  assert sepa.valid?
95
96
  end
96
97
 
@@ -211,11 +212,11 @@ class ClientTest < ActiveSupport::TestCase
211
212
  end
212
213
 
213
214
  test "should_initialize_with_proper_cert_params" do
214
- assert Sepa::Client.new(@nordea_cert_params)
215
+ assert Sepa::Client.new(@nordea_get_certificate_params)
215
216
  end
216
217
 
217
218
  test "should_send_proper_request_with_get_certificate" do
218
- client = Sepa::Client.new(@nordea_cert_params)
219
+ client = Sepa::Client.new(@nordea_get_certificate_params)
219
220
  response = client.send_request
220
221
 
221
222
  assert response.doc.at_css('cer|getCertificatein')
@@ -227,37 +228,37 @@ class ClientTest < ActiveSupport::TestCase
227
228
  end
228
229
 
229
230
  test "should_check_signing_cert_request_with_create_certificate" do
230
- @danske_cert_params[:command] = :create_certificate
231
- @danske_cert_params.delete(:signing_cert_pkcs10)
231
+ @danske_create_certificate_params[:command] = :create_certificate
232
+ @danske_create_certificate_params.delete(:signing_csr)
232
233
 
233
- sepa = Sepa::Client.new(@danske_cert_params)
234
+ sepa = Sepa::Client.new(@danske_create_certificate_params)
234
235
  refute sepa.valid?
235
236
  assert_includes sepa.errors.messages.to_s, SIGNING_CERT_REQUEST_ERROR_MESSAGE
236
237
  end
237
238
 
238
239
  test "should_check_encryption_cert_request_with_create_certificate" do
239
- @danske_cert_params[:command] = :create_certificate
240
- @danske_cert_params.delete(:encryption_cert_pkcs10)
240
+ @danske_create_certificate_params[:command] = :create_certificate
241
+ @danske_create_certificate_params.delete(:encryption_csr)
241
242
 
242
- sepa = Sepa::Client.new(@danske_cert_params)
243
+ sepa = Sepa::Client.new(@danske_create_certificate_params)
243
244
  refute sepa.valid?
244
245
  assert_includes sepa.errors.messages.to_s, ENCRYPTION_CERT_REQUEST_ERROR_MESSAGE
245
246
  end
246
247
 
247
248
  test "should_check_pin_with_create_certificate" do
248
- @danske_cert_params[:command] = :create_certificate
249
- @danske_cert_params.delete(:pin)
249
+ @danske_create_certificate_params[:command] = :create_certificate
250
+ @danske_create_certificate_params.delete(:pin)
250
251
 
251
- sepa = Sepa::Client.new(@danske_cert_params)
252
+ sepa = Sepa::Client.new(@danske_create_certificate_params)
252
253
  refute sepa.valid?
253
254
  assert_includes sepa.errors.messages.to_s, PIN_ERROR_MESSAGE
254
255
  end
255
256
 
256
257
  test "should_check_encryption_cert_with_create_certificate" do
257
- @danske_cert_params[:command] = :create_certificate
258
- @danske_cert_params.delete(:enc_cert)
258
+ @danske_create_certificate_params[:command] = :create_certificate
259
+ @danske_create_certificate_params.delete(:encryption_certificate)
259
260
 
260
- sepa = Sepa::Client.new(@danske_cert_params)
261
+ sepa = Sepa::Client.new(@danske_create_certificate_params)
261
262
  refute sepa.valid?
262
263
  assert_includes sepa.errors.messages.to_s, ENCRYPTION_CERT_ERROR_MESSAGE
263
264
  end
@@ -285,4 +286,16 @@ class ClientTest < ActiveSupport::TestCase
285
286
  Savon.observers.pop
286
287
  end
287
288
 
289
+ test 'encryption private key is checked when bank is danske' do
290
+ @danske_generic_params.delete :encryption_private_key
291
+ client = Sepa::Client.new @danske_generic_params
292
+ refute client.valid?
293
+ end
294
+
295
+ test 'encryption certificate is checked when bank is danske' do
296
+ @danske_generic_params.delete :encryption_certificate
297
+ client = Sepa::Client.new @danske_generic_params
298
+ refute client.valid?
299
+ end
300
+
288
301
  end
@@ -1,5 +1,38 @@
1
+ def danske_generic_params
2
+ keys_path = "#{ROOT_PATH}/test/sepa/banks/danske/keys"
3
+
4
+ signing_private_key_path = "#{keys_path}/signing_key.pem"
5
+ signing_private_key = File.read signing_private_key_path
6
+
7
+ encryption_private_key_path = "#{keys_path}/enc_private_key.pem"
8
+ encryption_private_key = File.read encryption_private_key_path
9
+
10
+ signing_certificate_path = "#{keys_path}/own_signing_cert.pem"
11
+ signing_certificate = File.read signing_certificate_path
12
+
13
+ encryption_certificate_path = "#{keys_path}/own_enc_cert.pem"
14
+ encryption_certificate = File.read encryption_certificate_path
15
+
16
+ {
17
+ bank: :danske,
18
+ signing_private_key: signing_private_key,
19
+ encryption_private_key: encryption_private_key,
20
+ command: :upload_file,
21
+ customer_id: '360817',
22
+ environment: 'test',
23
+ encryption_certificate: encryption_certificate,
24
+ signing_certificate: signing_certificate,
25
+ language: 'FI',
26
+ status: 'ALL',
27
+ target_id: 'DABAFIHH',
28
+ file_type: 'pain.001.001.02',
29
+ content: encode('kissa'),
30
+ file_reference: '11111111A12006030329501800000014',
31
+ }
32
+ end
33
+
1
34
  def nordea_generic_params
2
- cert = "-----BEGIN CERTIFICATE-----
35
+ signing_certificate = "-----BEGIN CERTIFICATE-----
3
36
  MIIDwTCCAqmgAwIBAgIEAX1JuTANBgkqhkiG9w0BAQUFADBkMQswCQYDVQQGEwJT
4
37
  RTEeMBwGA1UEChMVTm9yZGVhIEJhbmsgQUIgKHB1YmwpMR8wHQYDVQQDExZOb3Jk
5
38
  ZWEgQ29ycG9yYXRlIENBIDAxMRQwEgYDVQQFEws1MTY0MDYtMDEyMDAeFw0xMzA1
@@ -22,7 +55,7 @@ ydowAnqS9h9aQ6gedwbOdtkWmwKMDVXU6aRz9Gvk+JeYJhtpuP3OPNGbbC5L7NVd
22
55
  no+B6AtwxmG3ozd+mPcMeVuz6kKLAmQyIiBSrRNa5OrTkq/CUzxO9WUgTnm/Sri7
23
56
  zReR6mU=
24
57
  -----END CERTIFICATE-----"
25
- pkey = "-----BEGIN PRIVATE KEY-----
58
+ signing_private_key = "-----BEGIN PRIVATE KEY-----
26
59
  MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBAMLRRHwLWybhs0MM
27
60
  EbpmZL2IdgYxmFbADFHoirTp3t22UnorHwqvk16i9YCPS6H8ngEPSP7A5urS/NMq
28
61
  w+YmklKlZugO9/TLJqVv4smXFX+5rPMQDedRElIDempMGQlPaR+tp4CQ49oFLJLW
@@ -41,11 +74,11 @@ Sn4Uz7Zjk3UrBIbMYEv0u2mcCypwsb0nGE5/gzDPjGE9cxWW+rXARIs+sNQVClnh
41
74
 
42
75
  {
43
76
  bank: :nordea,
44
- private_key: pkey,
45
- cert: cert,
77
+ signing_private_key: signing_private_key,
78
+ signing_certificate: signing_certificate,
46
79
  command: :download_file,
47
80
  customer_id: '11111111',
48
- environment: 'PRODUCTION',
81
+ environment: 'production',
49
82
  status: 'NEW',
50
83
  target_id: '11111111A1',
51
84
  language: 'FI',
@@ -55,8 +88,8 @@ Sn4Uz7Zjk3UrBIbMYEv0u2mcCypwsb0nGE5/gzDPjGE9cxWW+rXARIs+sNQVClnh
55
88
  }
56
89
  end
57
90
 
58
- def nordea_cert_params
59
- csr = "-----BEGIN CERTIFICATE REQUEST-----
91
+ def nordea_get_certificate_params
92
+ signing_csr = "-----BEGIN CERTIFICATE REQUEST-----
60
93
  MIIBczCB3QIBADA0MRIwEAYDVQQDEwlEZXZsYWIgT3kxETAPBgNVBAUTCDExMTEx
61
94
  MTExMQswCQYDVQQGEwJGSTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAo9wU
62
95
  c2Ys5hSso4nEanbc+RIhL71aS6GBGiWAegXjhlyb6dpwigrZBFPw4u6UZV/Vq7Y7
@@ -71,10 +104,9 @@ jo2ekdSDdw8qxKyxj1piv8oYzMd4fCjCpL+WDZtq7mdLErVZ92gH
71
104
  bank: :nordea,
72
105
  command: :get_certificate,
73
106
  customer_id: '11111111',
74
- environment: 'TEST',
75
- csr: csr,
76
- pin: '1234567890',
77
- service: 'service'
107
+ environment: 'test',
108
+ signing_csr: signing_csr,
109
+ pin: '1234567890'
78
110
  }
79
111
  end
80
112
 
@@ -149,8 +181,7 @@ swU8X6yvbtqF+q4aAKPA6ZydnGZFQSoSzNJtcF28T1ItxEHN3+xyQqXpTgFviiuL
149
181
  bank: :danske,
150
182
  command: :create_certificate,
151
183
  customer_id: 'ABC123',
152
- environment: 'customertest',
153
- key_generator_type: 'software',
184
+ environment: 'test',
154
185
  encryption_cert_pkcs10: encryptpkcs,
155
186
  signing_cert_pkcs10: signingpkcs,
156
187
  enc_cert: danskebankencrypt,
@@ -163,8 +194,8 @@ swU8X6yvbtqF+q4aAKPA6ZydnGZFQSoSzNJtcF28T1ItxEHN3+xyQqXpTgFviiuL
163
194
  }
164
195
  end
165
196
 
166
- def danske_create_cert_params
167
- enc_cert_request = "-----BEGIN CERTIFICATE REQUEST-----
197
+ def danske_create_certificate_params
198
+ encryption_csr = "-----BEGIN CERTIFICATE REQUEST-----
168
199
  MIICdzCCAV8CAQEwMjEPMA0GA1UEAwwGaGVtdWxpMR8wHQYKCZImiZPyLGQBGRYP
169
200
  bnV1c2thbXVpa2t1bmVuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
170
201
  5aHmVXcfogDqJ3kUfK8ARzdkQ/dm9j4rHbGNh4xmlKCMUwCmmo2LOKMKvviD7qwz
@@ -181,7 +212,7 @@ db1f0XsYTW1NUYoL8O8uxzoNcysyBW/VGP01e2LXB8whWn4xtDtaLpyt/v4ow04V
181
212
  9v3lfL5ZDl1gIEY=
182
213
  -----END CERTIFICATE REQUEST-----"
183
214
 
184
- signing_cert_request = "-----BEGIN CERTIFICATE REQUEST-----
215
+ signing_csr = "-----BEGIN CERTIFICATE REQUEST-----
185
216
  MIICdzCCAV8CAQEwMjEPMA0GA1UEAwwGaGVtdWxpMR8wHQYKCZImiZPyLGQBGRYP
186
217
  bnV1c2thbXVpa2t1bmVuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
187
218
  y4zgajeMzFrBR4zsJ50qo4fxHWfjdCmI5nwLbKqKhSKB15JBdRmh/Wz0Gi1qOvER
@@ -198,17 +229,16 @@ bx1hmt5Eihy1lORQR4PE4xaOP5TCqtxP0+snuGqRuBHhrDk4mowWEJbvFWlONT5H
198
229
  CsajqZag/Aoxv/Y=
199
230
  -----END CERTIFICATE REQUEST-----"
200
231
 
201
- enc_cert = File.read "#{DANSKE_TEST_KEYS_PATH}own_enc_cert.pem"
232
+ encryption_certificate = File.read "#{DANSKE_TEST_KEYS_PATH}own_enc_cert.pem"
202
233
 
203
234
  {
204
235
  bank: :danske,
205
- enc_cert: enc_cert,
236
+ encryption_certificate: encryption_certificate,
206
237
  command: :create_certificate,
207
238
  customer_id: '360817',
208
- environment: 'customertest',
209
- key_generator_type: 'software',
210
- encryption_cert_pkcs10: enc_cert_request,
211
- signing_cert_pkcs10: signing_cert_request,
239
+ environment: 'test',
240
+ encryption_csr: encryption_csr,
241
+ signing_csr: signing_csr,
212
242
  pin: '1234',
213
243
  }
214
244
  end
@@ -4,7 +4,7 @@ class TestSepa < ActiveSupport::TestCase
4
4
 
5
5
  def test_version_must_be_defined
6
6
  refute_nil Sepa::VERSION
7
- assert_equal "0.1.2", Sepa::VERSION
7
+ assert_equal "0.1.3", Sepa::VERSION
8
8
  end
9
9
 
10
10
  end
metadata CHANGED
@@ -1,31 +1,31 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: sepafm
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.1.2
4
+ version: 0.1.3
5
5
  platform: ruby
6
6
  authors:
7
7
  - Joni Kanerva
8
8
  - Mika Myllynen
9
- - Tommi Jarvinen
9
+ - Tommi Järvinen
10
10
  autorequire:
11
11
  bindir: bin
12
12
  cert_chain: []
13
- date: 2014-07-04 00:00:00.000000000 Z
13
+ date: 2014-07-31 00:00:00.000000000 Z
14
14
  dependencies:
15
15
  - !ruby/object:Gem::Dependency
16
- name: savon
16
+ name: activemodel
17
17
  requirement: !ruby/object:Gem::Requirement
18
18
  requirements:
19
19
  - - "~>"
20
20
  - !ruby/object:Gem::Version
21
- version: '2.5'
21
+ version: '4.1'
22
22
  type: :runtime
23
23
  prerelease: false
24
24
  version_requirements: !ruby/object:Gem::Requirement
25
25
  requirements:
26
26
  - - "~>"
27
27
  - !ruby/object:Gem::Version
28
- version: '2.5'
28
+ version: '4.1'
29
29
  - !ruby/object:Gem::Dependency
30
30
  name: nokogiri
31
31
  requirement: !ruby/object:Gem::Requirement
@@ -41,89 +41,89 @@ dependencies:
41
41
  - !ruby/object:Gem::Version
42
42
  version: '1.6'
43
43
  - !ruby/object:Gem::Dependency
44
- name: activemodel
44
+ name: savon
45
45
  requirement: !ruby/object:Gem::Requirement
46
46
  requirements:
47
47
  - - "~>"
48
48
  - !ruby/object:Gem::Version
49
- version: '4.1'
49
+ version: '2.5'
50
50
  type: :runtime
51
51
  prerelease: false
52
52
  version_requirements: !ruby/object:Gem::Requirement
53
53
  requirements:
54
54
  - - "~>"
55
55
  - !ruby/object:Gem::Version
56
- version: '4.1'
56
+ version: '2.5'
57
57
  - !ruby/object:Gem::Dependency
58
- name: minitest
58
+ name: bundler
59
59
  requirement: !ruby/object:Gem::Requirement
60
60
  requirements:
61
61
  - - "~>"
62
62
  - !ruby/object:Gem::Version
63
- version: '5.3'
64
- type: :runtime
63
+ version: '1.6'
64
+ type: :development
65
65
  prerelease: false
66
66
  version_requirements: !ruby/object:Gem::Requirement
67
67
  requirements:
68
68
  - - "~>"
69
69
  - !ruby/object:Gem::Version
70
- version: '5.3'
70
+ version: '1.6'
71
71
  - !ruby/object:Gem::Dependency
72
- name: bundler
72
+ name: codeclimate-test-reporter
73
73
  requirement: !ruby/object:Gem::Requirement
74
74
  requirements:
75
75
  - - "~>"
76
76
  - !ruby/object:Gem::Version
77
- version: '1.6'
77
+ version: '0.3'
78
78
  type: :development
79
79
  prerelease: false
80
80
  version_requirements: !ruby/object:Gem::Requirement
81
81
  requirements:
82
82
  - - "~>"
83
83
  - !ruby/object:Gem::Version
84
- version: '1.6'
84
+ version: '0.3'
85
85
  - !ruby/object:Gem::Dependency
86
- name: rake
86
+ name: dotenv
87
87
  requirement: !ruby/object:Gem::Requirement
88
88
  requirements:
89
89
  - - "~>"
90
90
  - !ruby/object:Gem::Version
91
- version: '10.3'
91
+ version: '0.11'
92
92
  type: :development
93
93
  prerelease: false
94
94
  version_requirements: !ruby/object:Gem::Requirement
95
95
  requirements:
96
96
  - - "~>"
97
97
  - !ruby/object:Gem::Version
98
- version: '10.3'
98
+ version: '0.11'
99
99
  - !ruby/object:Gem::Dependency
100
- name: codeclimate-test-reporter
100
+ name: minitest
101
101
  requirement: !ruby/object:Gem::Requirement
102
102
  requirements:
103
103
  - - "~>"
104
104
  - !ruby/object:Gem::Version
105
- version: '0.3'
105
+ version: '5.3'
106
106
  type: :development
107
107
  prerelease: false
108
108
  version_requirements: !ruby/object:Gem::Requirement
109
109
  requirements:
110
110
  - - "~>"
111
111
  - !ruby/object:Gem::Version
112
- version: '0.3'
112
+ version: '5.3'
113
113
  - !ruby/object:Gem::Dependency
114
- name: dotenv
114
+ name: rake
115
115
  requirement: !ruby/object:Gem::Requirement
116
116
  requirements:
117
117
  - - "~>"
118
118
  - !ruby/object:Gem::Version
119
- version: '0.11'
119
+ version: '10.3'
120
120
  type: :development
121
121
  prerelease: false
122
122
  version_requirements: !ruby/object:Gem::Requirement
123
123
  requirements:
124
124
  - - "~>"
125
125
  - !ruby/object:Gem::Version
126
- version: '0.11'
126
+ version: '10.3'
127
127
  - !ruby/object:Gem::Dependency
128
128
  name: rubyntlm
129
129
  requirement: !ruby/object:Gem::Requirement
@@ -202,6 +202,7 @@ files:
202
202
  - sepafm.gemspec
203
203
  - test/sepa/banks/danske/danske_cert_response_test.rb
204
204
  - test/sepa/banks/danske/danske_cert_soap_builder_test.rb
205
+ - test/sepa/banks/danske/danske_certificate_application_request_test.rb
205
206
  - test/sepa/banks/danske/danske_generic_soap_builder_test.rb
206
207
  - test/sepa/banks/danske/danske_get_bank_cert_test.rb
207
208
  - test/sepa/banks/danske/keys/bank_encryption_cert.pem
@@ -266,6 +267,7 @@ summary: SEPA Financial Messages
266
267
  test_files:
267
268
  - test/sepa/banks/danske/danske_cert_response_test.rb
268
269
  - test/sepa/banks/danske/danske_cert_soap_builder_test.rb
270
+ - test/sepa/banks/danske/danske_certificate_application_request_test.rb
269
271
  - test/sepa/banks/danske/danske_generic_soap_builder_test.rb
270
272
  - test/sepa/banks/danske/danske_get_bank_cert_test.rb
271
273
  - test/sepa/banks/danske/keys/bank_encryption_cert.pem