sepafm 0.1.3 → 0.1.4

Sign up to get free protection for your applications and to get access to all the features.
Files changed (45) hide show
  1. checksums.yaml +4 -4
  2. data/lib/sepa/application_request.rb +1 -1
  3. data/lib/sepa/application_response.rb +15 -16
  4. data/lib/sepa/attribute_checks.rb +18 -25
  5. data/lib/sepa/banks/danske/danske_response.rb +65 -8
  6. data/lib/sepa/banks/danske/soap_danske.rb +1 -1
  7. data/lib/sepa/banks/nordea/nordea_response.rb +11 -0
  8. data/lib/sepa/certificates/danske_root_certificate.cer +25 -0
  9. data/lib/sepa/client.rb +35 -29
  10. data/lib/sepa/error_messages.rb +11 -0
  11. data/lib/sepa/response.rb +42 -20
  12. data/lib/sepa/soap_builder.rb +20 -38
  13. data/lib/sepa/utilities.rb +36 -11
  14. data/lib/sepa/version.rb +1 -1
  15. data/lib/sepafm.rb +10 -1
  16. data/readme.md +64 -28
  17. data/test/sepa/banks/danske/danske_cert_response_test.rb +41 -4
  18. data/test/sepa/banks/danske/danske_cert_soap_builder_test.rb +1 -1
  19. data/test/sepa/banks/danske/danske_generic_soap_builder_test.rb +6 -17
  20. data/test/sepa/banks/danske/danske_response_test.rb +97 -0
  21. data/test/sepa/banks/danske/keys/bank_encryption_cert.pem +17 -17
  22. data/test/sepa/banks/danske/keys/bank_signing_cert.pem +17 -17
  23. data/test/sepa/banks/danske/responses/create_cert.xml +14 -14
  24. data/test/sepa/banks/danske/responses/download_file_list.xml +42 -0
  25. data/test/sepa/banks/danske/responses/get_bank_cert.xml +14 -36
  26. data/test/sepa/banks/danske/responses/get_bank_certificate_not_ok.xml +2 -0
  27. data/test/sepa/banks/nordea/nordea_application_request_test.rb +3 -5
  28. data/test/sepa/banks/nordea/nordea_application_response_test.rb +25 -30
  29. data/test/sepa/banks/nordea/nordea_generic_soap_builder_test.rb +2 -2
  30. data/test/sepa/banks/nordea/nordea_response_test.rb +83 -17
  31. data/test/sepa/banks/nordea/responses/df_ktl.xml +20 -44
  32. data/test/sepa/banks/nordea/responses/dfl.xml +7 -6
  33. data/test/sepa/banks/nordea/responses/download_file_list_no_content.xml +21 -0
  34. data/test/sepa/banks/nordea/responses/gc.xml +21 -49
  35. data/test/sepa/banks/nordea/responses/invalid/body_altered.xml +21 -0
  36. data/test/sepa/banks/nordea/responses/invalid/timestamp_altered.xml +21 -0
  37. data/test/sepa/banks/nordea/responses/not_ok_response_code.xml +21 -0
  38. data/test/sepa/banks/nordea/responses/uf.xml +7 -6
  39. data/test/sepa/client_test.rb +134 -35
  40. data/test/sepa/fixtures.rb +8 -8
  41. data/test/sepa/sepa_test.rb +1 -1
  42. data/test/test_helper.rb +5 -1
  43. metadata +18 -6
  44. data/test/sepa/banks/nordea/responses/gbc.xml +0 -15
  45. /data/{test/sepa/banks/nordea/keys/root_cert.cer → lib/sepa/certificates/nordea_root_certificate.cer} +0 -0
@@ -0,0 +1,42 @@
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <soap:Envelope xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/"><soap:Header><wsse:Security soap:mustUnderstand="1" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"><wsu:Timestamp wsu:Id="Timestamp-a9ba5f55-8f03-42b2-82f2-abdd02151c21" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><wsu:Created>2012-08-04T12:53:12Z</wsu:Created><wsu:Expires>2012-08-04T13:06:54Z</wsu:Expires></wsu:Timestamp><wsse:BinarySecurityToken wsu:Id="SecurityToken-8dfe5037-07d2-4f4f-9ddf-88133497aa60" EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary" ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd">MIIEADCCAuigAwIBAgIFAMa3bfQwDQYJKoZIhvcNAQELBQAwgZgxEDAOBgNVBAMT
3
+ B0RCR1JPT1QxCzAJBgNVBAYTAkRLMRMwEQYDVQQHEwpDb3BlbmhhZ2VuMRAwDgYD
4
+ VQQIEwdEZW5tYXJrMRowGAYDVQQKExFEYW5za2UgQmFuayBHcm91cDEaMBgGA1UE
5
+ CxMRRGFuc2tlIEJhbmsgR3JvdXAxGDAWBgNVBAUTDzYxMTI2MjI4MTExMDAwMjAe
6
+ Fw0xNDA3MDcwMDAwMDBaFw0xNjA2MjYwMDAwMDBaMIGXMQ8wDQYDVQQDEwZEUFNJ
7
+ R04xCzAJBgNVBAYTAkRLMRMwEQYDVQQHEwpDb3BlbmhhZ2VuMRAwDgYDVQQIEwdE
8
+ ZW5tYXJrMRowGAYDVQQKExFEYW5za2UgQmFuayBHcm91cDEaMBgGA1UECxMRRGFu
9
+ c2tlIEJhbmsgR3JvdXAxGDAWBgNVBAUTDzYxMTI2MjI4MzkxMDAwNDCCASAwDQYJ
10
+ KoZIhvcNAQEBBQADggENADCCAQgCggEBAMTopJ9GZXRkKm4Rq9M92EawXIfSI7VL
11
+ 0sykOzLfBzrgYMpqJ7rFxJe7nzECw22TeQ/3m4Gjnhe8XVaKSUDbfYfWzWD44iiZ
12
+ fecMaDZYIyR3g7GMwQowfwTqHhSEjFgfzH3QuGH2KGmqycvyuNGsbWjzvDAov8Yf
13
+ 7F88A4aOkseISO3Vmt2ElKm+gs09z7pwak6OxegDu5ZySS39kpTvq1DK3w2vXkEQ
14
+ GJUYOnDG/723v/hK3GjxclViu1OGSga7UJApjm3ky4s9EWoumf/vLBAnqRp6biOK
15
+ nkGmOJEJlT00VWjaRoDarKOjgC7b/05Xp0ynDSOwqvTI92BdAQwfgEsCAQOjUjBQ
16
+ MB8GA1UdIwQYMBaAFIT65b/ekUlm38WKUsOzt7MgHMdtMB0GA1UdDgQWBBSh3exl
17
+ GZ8eC4EiAVvbxenmc9faUzAOBgNVHQ8BAf8EBAMCBsAwDQYJKoZIhvcNAQELBQAD
18
+ ggEBACjZJx8+UEcAYXJzstd+6E2wBNmmSvUTiuG7+Vws4+l4eqLLrHkhi66FOEwP
19
+ dnf5/t8k7h5ry61aEf+HdUcQuYRrf7hJPkFjxaMcMGss4uURjVt/R/GhWMgu6cYg
20
+ UIq0NHIMqdYH4dM/19qv7E+je2D3BuJOE3ucqe4Ywd+W2WP8HGlA3PkpMV78SPA9
21
+ N/Usg3VX2KVbdS3idTpSMpxQftjWXmJtef0KawvYmYOw7i+eazHmv5mgxhgCvJSC
22
+ PHN6oGS7v5AVVz9RCjSWEKIXZE0wRSLuTFYzt7/7CgRsdTVwpkFzn+ZJUAjYBPhZ
23
+ Q3Xn3p03DyCFsvtLxwE17UpUFUU=</wsse:BinarySecurityToken><Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
24
+ <SignedInfo>
25
+ <CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
26
+ <SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
27
+ <Reference URI="#Timestamp-a9ba5f55-8f03-42b2-82f2-abdd02151c21">
28
+ <Transforms>
29
+ <Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
30
+ </Transforms>
31
+ <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
32
+ <DigestValue>8aVWGI9oT6jNXSpLQmIgR19lSk0=</DigestValue>
33
+ </Reference>
34
+ <Reference URI="#Body-ddec4b9e-15b6-4f27-bd53-4c61da4502b3">
35
+ <Transforms>
36
+ <Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
37
+ </Transforms>
38
+ <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
39
+ <DigestValue>qKN2GS9i5fbc1OJVRDeovIgPULI=</DigestValue>
40
+ </Reference>
41
+ </SignedInfo>
42
+ <SignatureValue>a2lzc2EK</SignatureValue><KeyInfo><wsse:SecurityTokenReference xmlns=""><wsse:Reference URI="#SecurityToken-8dfe5037-07d2-4f4f-9ddf-88133497aa60" ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3"/></wsse:SecurityTokenReference></KeyInfo></Signature></wsse:Security></soap:Header><soap:Body wsu:Id="Body-ddec4b9e-15b6-4f27-bd53-4c61da4502b3" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><downloadFileListout xmlns="http://bxd.fi/CorporateFileService"><ResponseHeader xmlns="http://model.bxd.fi"><SenderId>123456</SenderId><RequestId>a1s2d31234</RequestId><Timestamp>2012-02-20T08:32:40.639086+01:00</Timestamp><ResponseCode>00</ResponseCode><ResponseText>OK</ResponseText><ReceiverId>DABADKKK</ReceiverId></ResponseHeader><ApplicationResponse xmlns="http://model.bxd.fi"><?xml version="1.0" encoding="UTF-8"?>
<xenc:EncryptedData xmlns:dsig="http://www.w3.org/2000/09/xmldsig#" xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" Type="http://www.w3.org/2001/04/xmlenc#Element">
  <xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#tripledes-cbc"/>
  <dsig:KeyInfo>
    <xenc:EncryptedKey Recipient="name:DanskeBankCryptCERT">
      <xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-1_5"/>
      <dsig:KeyInfo>
        <dsig:X509Data>
          <dsig:X509Certificate>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</dsig:X509Certificate>
        </dsig:X509Data>
      </dsig:KeyInfo>
      <xenc:CipherData>
        <xenc:CipherValue>Idx66y1FwUxbhro/VP1ThYaOHmeMv97c+vXHzClqDLccX2r72VpaWJIxJejk
G9qSxtkFbOKMEctYf9nqPMV63E+esm9irxqLMqgxlEHYGpdJzFuM6Ft47DTV
vDSVGn/lW7y5BeXaBexIMzSaMXku5DX8E+OODMxehTfdSzwpqM4cWLn5nVVt
5CwsepwfBwfdIdjwJ7AbvPx3UlLFMYhSDGEIM0vDw0d79lEaZp6WNydve61K
Aksg8umqEOGY2/zKkItB59aX+So8JK4ogo5JZX8HJoV4dmewZt/XKsqQ0UAM
P/csYGWi5TmRnCQ5YO1ZCnBxzMx5E23oW5EWwyPW9Q==
</xenc:CipherValue>
      </xenc:CipherData>
    </xenc:EncryptedKey>
  </dsig:KeyInfo>
  <xenc:CipherData>
    <xenc:CipherValue>RPshGiuyMyPr4r/gDfenmaV3RiKldcumBO2A5oeyUj0DH7sGaSnpda07xFjX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</xenc:CipherValue>
  </xenc:CipherData>
</xenc:EncryptedData>
</ApplicationResponse></downloadFileListout></soap:Body></soap:Envelope>
@@ -1,37 +1,15 @@
1
1
  <?xml version="1.0" encoding="UTF-8"?>
2
- <soapenv:Envelope xmlns:xd="http://www.w3.org/2000/09/xmldsig#" xmlns:elem="http://danskebank.dk/PKI/PKIFactoryService/elements" xmlns:pkif="http://danskebank.dk/PKI/PKIFactoryService" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
3
- <soapenv:Header/>
4
- <soapenv:Body>
5
- <GetBankCertificateOut xmlns="http://danskebank.dk/PKI/PKIFactoryService">
6
- <pkif:ResponseHeader xmlns="">
7
- <pkif:SenderId>360817</pkif:SenderId>
8
- <pkif:CustomerId>360817</pkif:CustomerId>
9
- <pkif:RequestId>b90999d5c0</pkif:RequestId>
10
- <pkif:Timestamp>2014-06-11T08:21:11Z</pkif:Timestamp>
11
- <pkif:InterfaceVersion>1</pkif:InterfaceVersion>
12
- </pkif:ResponseHeader>
13
- <pkie:GetBankCertificateResponse xmlns="" xmlns:pkie="http://danskebank.dk/PKI/PKIFactoryService/elements" xml:id="response">
14
- <pkie:ReturnCode>00</pkie:ReturnCode>
15
- <pkie:ReturnText>OK</pkie:ReturnText>
16
- <pkie:BankEncryptionCert>MIIEATCCAumgAwIBAgIFAQjv8bMwDQYJKoZIhvcNAQELBQAwgZgxEDAOBgNVBAMTB0RCR1JPT1QxCzAJBgNVBAYTAkRLMRMwEQYDVQQHEwpDb3BlbmhhZ2VuMRAwDgYDVQQIEwdEZW5tYXJrMRowGAYDVQQKExFEYW5za2UgQmFuayBHcm91cDEaMBgGA1UECxMRRGFuc2tlIEJhbmsgR3JvdXAxGDAWBgNVBAUTDzYxMTI2MjI4MTExMDAwMjAeFw0xMjA4MDEwMDAwMDBaFw0xNDEwMzEwMDAwMDBaMIGYMRAwDgYDVQQDEwdEUENSWVBUMQswCQYDVQQGEwJESzETMBEGA1UEBxMKQ29wZW5oYWdlbjEQMA4GA1UECBMHRGVubWFyazEaMBgGA1UEChMRRGFuc2tlIEJhbmsgR3JvdXAxGjAYBgNVBAsTEURhbnNrZSBCYW5rIEdyb3VwMRgwFgYDVQQFEw82MTEyNjIyODQ5MTAwMDMwggEgMA0GCSqGSIb3DQEBAQUAA4IBDQAwggEIAoIBAQC/kHrOvHOueBsit9drxIHpaD7mXINypXS/l9PbbOZ0lZKVEfW9gtG8xk9XggsPXHJMF/PXpG6mveXvPu9WW/XpryAUqGfvYsC7Px3ixaJb2EMOL+2mJYd0v5HKg5RuYkQ82k3K01hMNEGYs0OotjNVAimQcTLtVPDGBjK5BUAiwady9LpI6afo7roJWnRmsvSvinDgBqswnfCvUfSfM8cZyhnLLC2uj1kBHAD/5xpllmS3aq1M8LqFkBYcCE5PdPmFWhGUumZ/Y5qLjDgcPMAPvUaKLqOsh22jvPCZ0pm17eV0bSQzWe5e0zkgCYAepuFRazSlkJQYBdS47Mp68dY5AgEDo1IwUDAfBgNVHSMEGDAWgBSE+uW/3pFJZt/FilLDs7ezIBzHbTAdBgNVHQ4EFgQUP6wHVNOmznu212c08M3oeYjeXW4wDgYDVR0PAQH/BAQDAgQwMA0GCSqGSIb3DQEBCwUAA4IBAQAvJBfPug+ixGL/zWUnKMweV80atZXMjHJEn4mOE+iUkCNONLImMMt6MXJysnJViL1gL5xMrka6A62PLLsVkl79kxDDbzXMPfGt5/mB9L7CMpyzaID0acDii3rsZwT3Wxpnate6wowN4zpmXgpCpTDGbxjuVRiOArsjQblerhfxnD/UAieZ1IWozIANs6SVms/TuOB+bODUr06ITxBkDJhizOJxjsXRIAtwZvvrH4qGjJz5qFcPb3nz4TxwswU8X6yvbtqF+q4aAKPA6ZydnGZFQSoSzNJtcF28T1ItxEHN3+xyQqXpTgFviiuL277LaAl9YUFFnSgeh7GiFitWJPfD</pkie:BankEncryptionCert>
17
- <pkie:BankSigningCert>MIIEADCCAuigAwIBAgIFAMa3bfMwDQYJKoZIhvcNAQELBQAwgZgxEDAOBgNVBAMTB0RCR1JPT1QxCzAJBgNVBAYTAkRLMRMwEQYDVQQHEwpDb3BlbmhhZ2VuMRAwDgYDVQQIEwdEZW5tYXJrMRowGAYDVQQKExFEYW5za2UgQmFuayBHcm91cDEaMBgGA1UECxMRRGFuc2tlIEJhbmsgR3JvdXAxGDAWBgNVBAUTDzYxMTI2MjI4MTExMDAwMjAeFw0xMjA4MDEwMDAwMDBaFw0xNDEwMzEwMDAwMDBaMIGXMQ8wDQYDVQQDEwZEUFNJR04xCzAJBgNVBAYTAkRLMRMwEQYDVQQHEwpDb3BlbmhhZ2VuMRAwDgYDVQQIEwdEZW5tYXJrMRowGAYDVQQKExFEYW5za2UgQmFuayBHcm91cDEaMBgGA1UECxMRRGFuc2tlIEJhbmsgR3JvdXAxGDAWBgNVBAUTDzYxMTI2MjI4MzkxMDAwMzCCASAwDQYJKoZIhvcNAQEBBQADggENADCCAQgCggEBAL1zYMqPk/6klEpL5wo+vWAo3MmxPz4wq9wuLAHpPUhJ4ZpHmncNsdmqSSXT6U4mxTY8tzKvz4ZdTDljp+5J6OxOl1B7av3V7hlHtfGb7wozsBAya2JOoPrLxc+ajapslbduiEvdhW9ZLKvn/n7rQ9sZzHA6GyGKQk8lfvKK+OjMylA86XyxApasFD/0eIDnzUJHth3UpPoQTJAlB7h7d4CKc/QG9tFv900AAi4R/Tmy9TRai7fVCkXz7y4qRXN+M7NIhDGAsCmtM6oSuDqjv3lh10nD7XELTxTvcbpq5xHLt9yknwjiM2ivc4XudDMgC7ESoH6vaJSUcbC17+wa6IUCAQOjUjBQMB8GA1UdIwQYMBaAFIT65b/ekUlm38WKUsOzt7MgHMdtMB0GA1UdDgQWBBQHbPgey2TInIKC7xbag8AZG25qnTAOBgNVHQ8BAf8EBAMCBsAwDQYJKoZIhvcNAQELBQADggEBAFl3WfGkVElIeUXjQsr8uQFXhkSbrI14F6mRIkUpCTa9Px/UUfw1HQNVn4Tyep30JmfsFN91Yj387jiZDzoeMYeiVI32wyZkao7rC3Z4YhAfUdPdVFZqO1k2gOgoZ49nyLKVS+GlyuzeLQVBnFE7f3sbpgDTRzd8o58W5VncHuzmSj/IVe8ZwRQ4bm3cHlKTQpRnyz5x7UJjp08fH6KOUal8DVsOaQKoo+jWIsPPir58b/QZsxIRL4uq3qqQt5udrbZqyltRsyxUpgomIN5irCn7Wgr+iYwNLhzXYwxKvwKsNRS7isEAZuyfH9fNarBRP4p72g+225NB0itQ73Xo7pg=</pkie:BankSigningCert>
18
- <pkie:BankRootCert>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</pkie:BankRootCert>
19
- <pkie:RequestId/>
20
- <Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
21
- <SignedInfo>
22
- <CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
23
- <SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
24
- <Reference URI="#response">
25
- <Transforms>
26
- <Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
27
- <Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
28
- </Transforms>
29
- <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
30
- <DigestValue>hlJfqr9mI7Z3VePrAg3Pklb9ABk=</DigestValue>
31
- </Reference>
32
- </SignedInfo>
33
- <SignatureValue>G8A9IL/ZKjcT8B4gTvUQm+yDBQRh3TfUXxvhi1CtdjfvpVCOpsjH+E1Q6BTKC2ngcBdPMuP0Yp6wZhOH0EvQu9apqWtZeKvDY8AUGWM8HxglnhEQNrvzw2Z+LMHKeg5PIdG6YMjOcmNu7chy5E9NhUmhj9ic8hJOiCE00vjiv+I2YeQC6EJ6J7UjIgJWtMlsgzvuz5jhKmvYDh3MYSmfeuHTbm8QEM7f83UgmFw2UXuN/q5ahMxJlH28Ix3WGHZ5OFjSioKT125hbz5AQ6JEry8E6qiEkSLtLfmiYnv9zNqIItcm9TVgurqoKAZObzkCcADs+hoNEHXbE3CvNHUvog==</SignatureValue><KeyInfo><X509Data><X509Certificate>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</X509Certificate><X509IssuerSerial><X509IssuerName>serialNumber=611262281110002, OU=Danske Bank Group, O=Danske Bank Group, ST=Denmark, L=Copenhagen, C=DK, CN=DBGROOT</X509IssuerName><X509SerialNumber>3333910003</X509SerialNumber></X509IssuerSerial></X509Data></KeyInfo></Signature>
34
- </pkie:GetBankCertificateResponse>
35
- </GetBankCertificateOut>
36
- </soapenv:Body>
37
- </soapenv:Envelope>
2
+ <soapenv:Envelope xmlns:xd="http://www.w3.org/2000/09/xmldsig#" xmlns:elem="http://danskebank.dk/PKI/PKIFactoryService/elements" xmlns:pkif="http://danskebank.dk/PKI/PKIFactoryService" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Header/><soapenv:Body><GetBankCertificateOut xmlns="http://danskebank.dk/PKI/PKIFactoryService"><pkif:ResponseHeader xmlns=""><pkif:SenderId>360817</pkif:SenderId><pkif:CustomerId>360817</pkif:CustomerId><pkif:RequestId>72882ae6c0</pkif:RequestId><pkif:Timestamp>2014-08-06T11:00:03Z</pkif:Timestamp><pkif:InterfaceVersion>1</pkif:InterfaceVersion></pkif:ResponseHeader><pkie:GetBankCertificateResponse xml:id="response" xmlns="" xmlns:pkie="http://danskebank.dk/PKI/PKIFactoryService/elements"><pkie:ReturnCode>00</pkie:ReturnCode><pkie:ReturnText>OK</pkie:ReturnText><pkie:BankEncryptionCert>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</pkie:BankEncryptionCert><pkie:BankSigningCert>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</pkie:BankSigningCert><pkie:BankRootCert>MIIEPzCCAyegAwIBAgIEQjoxcjANBgkqhkiG9w0BAQsFADCBmDEQMA4GA1UEAxMHREJHUk9PVDELMAkGA1UEBhMCREsxEzARBgNVBAcTCkNvcGVuaGFnZW4xEDAOBgNVBAgTB0Rlbm1hcmsxGjAYBgNVBAoTEURhbnNrZSBCYW5rIEdyb3VwMRowGAYDVQQLExFEYW5za2UgQmFuayBHcm91cDEYMBYGA1UEBRMPNjExMjYyMjgxMTEwMDAyMB4XDTEwMTAyNzAwMDAwMFoXDTIwMTAyNzAwMDAwMFowgZgxEDAOBgNVBAMTB0RCR1JPT1QxCzAJBgNVBAYTAkRLMRMwEQYDVQQHEwpDb3BlbmhhZ2VuMRAwDgYDVQQIEwdEZW5tYXJrMRowGAYDVQQKExFEYW5za2UgQmFuayBHcm91cDEaMBgGA1UECxMRRGFuc2tlIEJhbmsgR3JvdXAxGDAWBgNVBAUTDzYxMTI2MjI4MTExMDAwMjCCASAwDQYJKoZIhvcNAQEBBQADggENADCCAQgCggEBAKWRtTRCXNEn5Hj+tA0vVg8VKUi/HnFgioZW/eyaF4gWvR4PNXXJJOS31VNHnb2SQHPLt3ac+5icH7vLu/OtS5rvnDiDFMg+TomVDrur6RtlsZNLnihZiaSaooI49+ERTz6vcCjST7xbfhmC03LUhE8eBKI1U70cx/lQ55UQKZvIAIbCVaZEks95VS4uJpwnU4M8glNIVGSvJhIUj/LIkSIcqBiryq/t9FRVtRl1gVhwKdi8A5O9hp4t3dBIdOanaup2UEL4lp7izzgt2rkMeuyQ1ZjHsN7LmDsfjoFcYx/8CID9LBwRCN2p+YCuoWUjuorrdU/2eit2lNh6ypiF6WECAQOjgZAwgY0wHQYDVR0OBBYEFIT65b/ekUlm38WKUsOzt7MgHMdtMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEBMEgGA1UdHwRBMD8wPaA7oDmGN2h0dHA6Ly9vbmxpbmUuZGFuc2tlYmFuay5jb20vcGtpL0RCR1JPT1RfMTExMTExMDAwMi5jcmwwDQYJKoZIhvcNAQELBQADggEBAFjnBPCos7jMMLc3FqyQUMt/HJGKgJDrhYiPZBo9njGkH52Urryqw1sbT3wXA1NuzbjHE3xTUD+5jNPCncYqML9xqQjSQkBcb9eJfHZ+asiclsO38cSn2qriJPIrCREPOpRVqrGQRbZQhmDiB198hpAdLp38khJon/gXbR7u9e0rN8MIM4sXn+lFuQIWiPuv+3llGSoLlIxJnjiQQ9FDjhwN5U+N1N2aHaLc5AHu4X/qRutLCy7AYUJZMPBoakPLscYceW2Ztvx4VAyOXgHDdvmz0Bd58XWOs1A9bNMZFeYAB14D9yQRCkXYLhr6sm8HuyqaIkGChFpNb+Gf8gcPvtw=</pkie:BankRootCert><pkie:RequestId/><Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
3
+ <SignedInfo>
4
+ <CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
5
+ <SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
6
+ <Reference URI="#response">
7
+ <Transforms>
8
+ <Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
9
+ <Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
10
+ </Transforms>
11
+ <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
12
+ <DigestValue>MfXr7Uymp/9jlZfW4t+z/OTYTaU=</DigestValue>
13
+ </Reference>
14
+ </SignedInfo>
15
+ <SignatureValue>ujjgaemh9ppalpaqWcwbZ6Nvk218fpJJFsw2iuUbE1qdLMk47f8Z7Sii1siZG3V81jguC+8TDhoJp9H2OdACPB5qwol7vVG4Jev0q8mJNmkxJ9P5wXOJskxTELQ9OsdqzTKyAPTxjfQBsSGAISc0lAL66ART0CPvcnlGflttXtInRuGH2zk24AmIq0Ibe8OWb9c9bl43jHAe9G/0avt41ovngmwc5EaTrVEIhPWTemOYoWEARLo+YCjirPpJ93N6z9lGOk0VN5xVAJwNjOoi/wOu69wDzdbzlv19IbWI2IXJT7PDweLFWFPBupFJ+DfNvNzJeUemPTPXiRjHasn4dg==</SignatureValue><KeyInfo><X509Data><X509Certificate>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</X509Certificate><X509IssuerSerial><X509IssuerName>serialNumber=611262281110002, OU=Danske Bank Group, O=Danske Bank Group, ST=Denmark, L=Copenhagen, C=DK, CN=DBGROOT</X509IssuerName><X509SerialNumber>3333910004</X509SerialNumber></X509IssuerSerial></X509Data></KeyInfo></Signature></pkie:GetBankCertificateResponse></GetBankCertificateOut></soapenv:Body></soapenv:Envelope>
@@ -0,0 +1,2 @@
1
+ <?xml version="1.0" encoding="UTF-8"?>
2
+ <env:Envelope xmlns:env="http://schemas.xmlsoap.org/soap/envelope/" xmlns:pkif="http://danskebank.dk/PKI/PKIFactoryService"><env:Body><pkif:PKIFactoryServiceFault><pkif:CustomerId>(&amp;*(*</pkif:CustomerId><pkif:SenderId>(&amp;*(*</pkif:SenderId><pkif:RequestId>0182e1866b</pkif:RequestId><pkif:Timestamp>2014-08-06T11:02:12Z</pkif:Timestamp><pkif:InterfaceVersion>1</pkif:InterfaceVersion><pkif:ReturnCode>07</pkif:ReturnCode><pkif:ReturnText>Schema validation error.</pkif:ReturnText><pkif:AdditionalReturnText>http://127.0.0.1:8887/services/PkiService: cvc-simple-type 1: element {http://danskebank.dk/PKI/PKIFactoryService}SenderId value '(&amp;*(*' is not a valid instance of type {http://danskebank.dk/PKI/PKIFactoryService/elements}CustomerIdType</pkif:AdditionalReturnText></pkif:PKIFactoryServiceFault></env:Body></env:Envelope>
@@ -7,7 +7,7 @@ class NordeaApplicationRequestTest < ActiveSupport::TestCase
7
7
  # Convert the keys here since the conversion is usually done by the client and these tests
8
8
  # bypass the client
9
9
  @nordea_generic_params[:signing_private_key] = rsa_key @nordea_generic_params[:signing_private_key]
10
- @nordea_generic_params[:signing_certificate] = OpenSSL::X509::Certificate.new @nordea_generic_params[:signing_certificate]
10
+ @nordea_generic_params[:own_signing_certificate] = x509_certificate @nordea_generic_params[:own_signing_certificate]
11
11
 
12
12
  ar_file = Sepa::SoapBuilder.new(@nordea_generic_params).application_request
13
13
 
@@ -232,7 +232,7 @@ class NordeaApplicationRequestTest < ActiveSupport::TestCase
232
232
  "dsig|X509Certificate", 'dsig' => 'http://www.w3.org/2000/09/xmldsig#'
233
233
  ).content
234
234
 
235
- actual_certificate = @nordea_generic_params.fetch(:signing_certificate).to_s
235
+ actual_certificate = @nordea_generic_params.fetch(:own_signing_certificate).to_s
236
236
  actual_certificate = actual_certificate.split('-----BEGIN CERTIFICATE-----')[1]
237
237
  actual_certificate = actual_certificate.split('-----END CERTIFICATE-----')[0]
238
238
  actual_certificate.gsub!(/\s+/, "")
@@ -250,9 +250,7 @@ class NordeaApplicationRequestTest < ActiveSupport::TestCase
250
250
  test 'upload file should validate against schema' do
251
251
  Dir.chdir(SCHEMA_PATH) do
252
252
  xsd = Nokogiri::XML::Schema(IO.read('application_request.xsd'))
253
- xsd.validate(@doc_up).each do |error|
254
- puts error
255
- end
253
+ assert xsd.valid?(@doc_up)
256
254
  end
257
255
  end
258
256
 
@@ -34,10 +34,10 @@ class NordeaApplicationResponseTest < ActiveSupport::TestCase
34
34
  @gui = Sepa::NordeaResponse.new(options).application_response
35
35
  @gui_doc = xml_doc @gui
36
36
 
37
- @dfl_ar = Sepa::ApplicationResponse.new(@dfl)
38
- @uf_ar = Sepa::ApplicationResponse.new(@uf)
39
- @df_ar = Sepa::ApplicationResponse.new(@df_tito)
40
- @gui_ar = Sepa::ApplicationResponse.new(@gui)
37
+ @dfl_ar = Sepa::ApplicationResponse.new(@dfl, :nordea)
38
+ @uf_ar = Sepa::ApplicationResponse.new(@uf, :nordea)
39
+ @df_ar = Sepa::ApplicationResponse.new(@df_tito, :nordea)
40
+ @gui_ar = Sepa::ApplicationResponse.new(@gui, :nordea)
41
41
  end
42
42
 
43
43
  def test_templates_valid
@@ -48,12 +48,12 @@ class NordeaApplicationResponseTest < ActiveSupport::TestCase
48
48
  end
49
49
 
50
50
  def test_should_fail_if_initialized_with_invalid_xml
51
- as = Sepa::ApplicationResponse.new("Jees")
51
+ as = Sepa::ApplicationResponse.new("Jees", :nordea)
52
52
  refute as.valid?
53
53
  end
54
54
 
55
55
  def test_should_complain_if_ar_not_valid_against_schema
56
- as = Sepa::ApplicationResponse.new(Nokogiri::XML("<ar>text</ar>"))
56
+ as = Sepa::ApplicationResponse.new(Nokogiri::XML("<ar>text</ar>"), :nordea)
57
57
  refute as.valid?
58
58
  end
59
59
 
@@ -77,14 +77,14 @@ class NordeaApplicationResponseTest < ActiveSupport::TestCase
77
77
  customer_id_node = @dfl_doc.at_css('c2b|CustomerId')
78
78
  customer_id_node.content = customer_id_node.content[0..-2]
79
79
 
80
- refute Sepa::ApplicationResponse.new(@dfl_doc.to_s).hashes_match?
80
+ refute Sepa::ApplicationResponse.new(@dfl_doc.to_s, :nordea).hashes_match?
81
81
  end
82
82
 
83
83
  def test_invalid_uf_hash_check_should_not_verify
84
84
  timestamp_node = @uf_doc.at_css('c2b|Timestamp')
85
85
  timestamp_node.content = Time.now.iso8601
86
86
 
87
- refute Sepa::ApplicationResponse.new(@uf_doc.to_s).hashes_match?
87
+ refute Sepa::ApplicationResponse.new(@uf_doc.to_s, :nordea).hashes_match?
88
88
  end
89
89
 
90
90
  def test_invalid_df_hash_check_should_not_verify
@@ -95,7 +95,7 @@ class NordeaApplicationResponseTest < ActiveSupport::TestCase
95
95
 
96
96
  digest_value_node.content = digest_value_node.content[4..-1]
97
97
 
98
- refute Sepa::ApplicationResponse.new(@df_tito_doc.to_s).hashes_match?
98
+ refute Sepa::ApplicationResponse.new(@df_tito_doc.to_s, :nordea).hashes_match?
99
99
  end
100
100
 
101
101
  def test_invalid_gui_hash_check_should_not_verify
@@ -106,7 +106,7 @@ class NordeaApplicationResponseTest < ActiveSupport::TestCase
106
106
 
107
107
  digest_value_node.content = '1234' + digest_value_node.content
108
108
 
109
- refute Sepa::ApplicationResponse.new(@gui_doc.to_s).hashes_match?
109
+ refute Sepa::ApplicationResponse.new(@gui_doc.to_s, :nordea).hashes_match?
110
110
  end
111
111
 
112
112
  def test_proper_dfl_signature_should_verify
@@ -133,7 +133,7 @@ class NordeaApplicationResponseTest < ActiveSupport::TestCase
133
133
 
134
134
  signature_node.content = signature_node.content[4..-1]
135
135
 
136
- refute Sepa::ApplicationResponse.new(@dfl_doc.to_s).signature_is_valid?
136
+ refute Sepa::ApplicationResponse.new(@dfl_doc.to_s, :nordea).signature_is_valid?
137
137
  end
138
138
 
139
139
  def test_corrupted_signature_in_uf_should_fail_signature_verification
@@ -144,7 +144,7 @@ class NordeaApplicationResponseTest < ActiveSupport::TestCase
144
144
 
145
145
  signature_node.content = signature_node.content[0..-5]
146
146
 
147
- refute Sepa::ApplicationResponse.new(@uf_doc.to_s).signature_is_valid?
147
+ refute Sepa::ApplicationResponse.new(@uf_doc.to_s, :nordea).signature_is_valid?
148
148
  end
149
149
 
150
150
  def test_corrupted_signature_in_df_should_fail_signature_verification
@@ -155,7 +155,7 @@ class NordeaApplicationResponseTest < ActiveSupport::TestCase
155
155
 
156
156
  signature_node.content = 'a' + signature_node.content[1..-1]
157
157
 
158
- refute Sepa::ApplicationResponse.new(@df_tito_doc.to_s).signature_is_valid?
158
+ refute Sepa::ApplicationResponse.new(@df_tito_doc.to_s, :nordea).signature_is_valid?
159
159
  end
160
160
 
161
161
  def test_corrupted_signature_in_gui_should_fail_signature_verification
@@ -166,7 +166,7 @@ class NordeaApplicationResponseTest < ActiveSupport::TestCase
166
166
 
167
167
  signature_node.content = 'zombi' + signature_node.content[1..-1]
168
168
 
169
- refute Sepa::ApplicationResponse.new(@gui_doc.to_s).signature_is_valid?
169
+ refute Sepa::ApplicationResponse.new(@gui_doc.to_s, :nordea).signature_is_valid?
170
170
  end
171
171
 
172
172
  def test_should_raise_error_if_certificate_corrupted_in_dfl
@@ -178,7 +178,7 @@ class NordeaApplicationResponseTest < ActiveSupport::TestCase
178
178
  cert_node.content = cert_node.content[0..-5]
179
179
 
180
180
  assert_raises(OpenSSL::X509::CertificateError) do
181
- Sepa::ApplicationResponse.new(@dfl_doc.to_s).certificate
181
+ Sepa::ApplicationResponse.new(@dfl_doc.to_s, :nordea).certificate
182
182
  end
183
183
  end
184
184
 
@@ -191,7 +191,7 @@ class NordeaApplicationResponseTest < ActiveSupport::TestCase
191
191
  cert_node.content = cert_node.content[4..-1]
192
192
 
193
193
  assert_raises(OpenSSL::X509::CertificateError) do
194
- Sepa::ApplicationResponse.new(@uf_doc.to_s).certificate
194
+ Sepa::ApplicationResponse.new(@uf_doc.to_s, :nordea).certificate
195
195
  end
196
196
  end
197
197
 
@@ -204,7 +204,7 @@ class NordeaApplicationResponseTest < ActiveSupport::TestCase
204
204
  cert_node.content = "n5iw#{cert_node.content}"
205
205
 
206
206
  assert_raises(OpenSSL::X509::CertificateError) do
207
- Sepa::ApplicationResponse.new(@df_tito_doc.to_s).certificate
207
+ Sepa::ApplicationResponse.new(@df_tito_doc.to_s, :nordea).certificate
208
208
  end
209
209
  end
210
210
 
@@ -217,24 +217,19 @@ class NordeaApplicationResponseTest < ActiveSupport::TestCase
217
217
  cert_node.content = encode 'voivoi'
218
218
 
219
219
  assert_raises(OpenSSL::X509::CertificateError) do
220
- Sepa::ApplicationResponse.new(@gui_doc.to_s).certificate
220
+ Sepa::ApplicationResponse.new(@gui_doc.to_s, :nordea).certificate
221
221
  end
222
222
  end
223
223
 
224
- def test_cert_should_be_trusted_with_correct_root_cert
225
- root_cert = OpenSSL::X509::Certificate.new File.read("#{KEYS_PATH}/root_cert.cer")
226
- assert @dfl_ar.cert_is_trusted(root_cert)
227
- assert @uf_ar.cert_is_trusted(root_cert)
228
- assert @df_ar.cert_is_trusted(root_cert)
229
- assert @gui_ar.cert_is_trusted(root_cert)
224
+ test 'certificate is trusted with correct root certificate' do
225
+ assert @dfl_ar.certificate_is_trusted?
226
+ assert @uf_ar.certificate_is_trusted?
227
+ assert @df_ar.certificate_is_trusted?
228
+ assert @gui_ar.certificate_is_trusted?
230
229
  end
231
230
 
232
- def test_should_fail_if_wrong_root_cert
233
- not_root_cert = OpenSSL::X509::Certificate.new File.read("#{KEYS_PATH}/nordea.crt")
234
- assert_raises(SecurityError) { @dfl_ar.cert_is_trusted(not_root_cert) }
235
- assert_raises(SecurityError) { @uf_ar.cert_is_trusted(not_root_cert) }
236
- assert_raises(SecurityError) { @df_ar.cert_is_trusted(not_root_cert) }
237
- assert_raises(SecurityError) { @gui_ar.cert_is_trusted(not_root_cert) }
231
+ # TODO: Implement test
232
+ test 'certificate is not trusted with incorrect root certificate' do
238
233
  end
239
234
 
240
235
  test 'to_s works' do
@@ -8,7 +8,7 @@ class NordeaGenericSoapBuilderTest < ActiveSupport::TestCase
8
8
  # Convert the keys here since the conversion is usually done by the client and these tests
9
9
  # bypass the client
10
10
  @nordea_generic_params[:signing_private_key] = rsa_key @nordea_generic_params[:signing_private_key]
11
- @nordea_generic_params[:signing_certificate] = OpenSSL::X509::Certificate.new @nordea_generic_params[:signing_certificate]
11
+ @nordea_generic_params[:own_signing_certificate] = x509_certificate @nordea_generic_params[:own_signing_certificate]
12
12
 
13
13
  @soap_request = Sepa::SoapBuilder.new(@nordea_generic_params)
14
14
  @doc = Nokogiri::XML(@soap_request.to_xml)
@@ -137,7 +137,7 @@ class NordeaGenericSoapBuilderTest < ActiveSupport::TestCase
137
137
  "//wsse:BinarySecurityToken", 'wsse' => wsse
138
138
  ).first.content
139
139
 
140
- actual_certificate = @nordea_generic_params.fetch(:signing_certificate).to_s
140
+ actual_certificate = @nordea_generic_params.fetch(:own_signing_certificate).to_s
141
141
  actual_certificate = actual_certificate.split('-----BEGIN CERTIFICATE-----')[1]
142
142
  actual_certificate = actual_certificate.split('-----END CERTIFICATE-----')[0]
143
143
  actual_certificate = actual_certificate.gsub(/\s+/, "")
@@ -39,6 +39,30 @@ class NordeaResponseTest < ActiveSupport::TestCase
39
39
  command: :get_certificate
40
40
  }
41
41
  @gc = Sepa::NordeaResponse.new options
42
+
43
+ options = {
44
+ response: File.read("#{NORDEA_TEST_RESPONSE_PATH}/not_ok_response_code.xml"),
45
+ command: :download_file_list
46
+ }
47
+ @not_ok_response_code_response = Sepa::NordeaResponse.new options
48
+
49
+ options = {
50
+ response: File.read("#{NORDEA_TEST_RESPONSE_PATH}/download_file_list_no_content.xml"),
51
+ command: :download_file_list
52
+ }
53
+ @response_with_code_24 = Sepa::NordeaResponse.new options
54
+
55
+ options = {
56
+ response: File.read("#{NORDEA_TEST_RESPONSE_PATH}/invalid/timestamp_altered.xml"),
57
+ command: :download_file_list
58
+ }
59
+ @timestamp_altered = Sepa::NordeaResponse.new options
60
+
61
+ options = {
62
+ response: File.read("#{NORDEA_TEST_RESPONSE_PATH}/invalid/body_altered.xml"),
63
+ command: :upload_file
64
+ }
65
+ @body_altered = Sepa::NordeaResponse.new options
42
66
  end
43
67
 
44
68
  def test_should_be_valid
@@ -51,37 +75,69 @@ class NordeaResponseTest < ActiveSupport::TestCase
51
75
  end
52
76
 
53
77
  def test_should_fail_with_improper_params
54
- a = Sepa::Response.new({ response: "Jees", command: 'not'})
78
+ a = Sepa::NordeaResponse.new({ response: "Jees", command: 'not'})
55
79
  refute a.valid?
56
80
  end
57
81
 
58
82
  def test_should_complain_if_ar_not_valid_against_schema
59
- a = Sepa::Response.new({ response: "<ar>text</ar>", command: 'notvalid' })
83
+ a = Sepa::NordeaResponse.new({ response: "<ar>text</ar>", command: 'notvalid' })
60
84
  refute a.valid?
61
85
  end
62
86
 
63
- def test_hashes_match_works
64
- assert @gui.hashes_match?
87
+ test 'hashes should match with correct responses' do
88
+ assert @df_ktl.hashes_match?
89
+ assert @df_tito.hashes_match?
65
90
  assert @dfl.hashes_match?
91
+ assert @response_with_code_24
92
+ assert @gc.hashes_match?
93
+ assert @gui.hashes_match?
94
+ assert @not_ok_response_code_response.hashes_match?
66
95
  assert @uf.hashes_match?
67
- assert @df_tito.hashes_match?
68
96
  end
69
97
 
70
- def test_cert_check_should_work
71
- keys_path = File.expand_path('../keys', __FILE__)
72
- root_cert = OpenSSL::X509::Certificate.new File.read("#{keys_path}/root_cert.cer")
73
- not_root_cert = OpenSSL::X509::Certificate.new File.read("#{keys_path}/nordea.crt")
98
+ test 'response should be valid if hashes match and otherwise valid' do
99
+ assert @df_ktl.valid?
100
+ assert @df_tito.valid?
101
+ assert @dfl.valid?
102
+ assert @response_with_code_24
103
+ assert @gc.valid?
104
+ assert @gui.valid?
105
+ assert @uf.valid?
106
+ end
74
107
 
75
- assert @dfl.cert_is_trusted(root_cert)
76
- assert_raises(SecurityError) do
77
- @dfl.cert_is_trusted(not_root_cert)
78
- end
108
+ test 'hashes should not match with incorrect responses' do
109
+ refute @timestamp_altered.hashes_match?
110
+ refute @body_altered.hashes_match?
79
111
  end
80
112
 
81
- def test_signature_check_should_work
113
+ test 'response should not be valid if hashes dont match' do
114
+ refute @timestamp_altered.valid?
115
+ refute @body_altered.valid?
116
+ end
117
+
118
+ test 'certificate verifying against root certificate works' do
119
+ assert @dfl.certificate_is_trusted?
120
+ end
121
+
122
+ # TODO: Implement test
123
+ test 'response should not be valid when wrong certificate is embedded in soap' do
124
+
125
+ end
126
+
127
+ test 'signature should verify with correct responses' do
128
+ assert @df_ktl.signature_is_valid?
129
+ assert @df_tito.signature_is_valid?
82
130
  assert @dfl.signature_is_valid?
83
- @dfl.doc.at('xmlns|SignatureValue', 'xmlns' => DSIG).content = "kissa"
84
- refute @dfl.signature_is_valid?
131
+ assert @response_with_code_24.signature_is_valid?
132
+ assert @gc.signature_is_valid?
133
+ assert @gui.signature_is_valid?
134
+ assert @not_ok_response_code_response.signature_is_valid?
135
+ assert @uf.signature_is_valid?
136
+ end
137
+
138
+ test 'signature should not verify if its integrity has been compromised' do
139
+ refute @timestamp_altered.signature_is_valid?
140
+ refute @body_altered.signature_is_valid?
85
141
  end
86
142
 
87
143
  test 'to_s works' do
@@ -131,8 +187,18 @@ class NordeaResponseTest < ActiveSupport::TestCase
131
187
 
132
188
  test 'certificate can be extracted from get certificate response' do
133
189
  assert_nothing_raised do
134
- OpenSSL::X509::Certificate.new @gc.own_signing_certificate
190
+ x509_certificate @gc.own_signing_certificate
135
191
  end
136
192
  end
137
193
 
194
+ test 'response with a response code other than 00 or 24 is considered invalid' do
195
+ refute @not_ok_response_code_response.valid?
196
+ refute_empty @not_ok_response_code_response.errors.messages
197
+ end
198
+
199
+ test 'response with a response code of 24 is considered valid' do
200
+ assert @response_with_code_24.valid?
201
+ assert_empty @response_with_code_24.errors.messages
202
+ end
203
+
138
204
  end
@@ -1,45 +1,21 @@
1
1
  <?xml version="1.0" encoding="UTF-8"?>
2
- <soapenv:Envelope xmlns:mod="http://model.bxd.fi" xmlns:cor="http://bxd.fi/CorporateFileService" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
3
- <soapenv:Header>
4
- <wsse:Security xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" soapenv:mustUnderstand="1">
5
- <wsu:Timestamp xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" wsu:Id="Timestamp-90e1ab2c-3cd1-4880-847d-395658c73659">
6
- <wsu:Created>2014-06-10T13:31:48Z</wsu:Created>
7
- <wsu:Expires>2014-06-10T13:36:48Z</wsu:Expires>
8
- </wsu:Timestamp>
9
- <wsse:BinarySecurityToken xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" wsu:Id="SecurityToken-674b41de-bc40-4398-af35-f32a2d2fcb25" EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary" ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3">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</wsse:BinarySecurityToken>
10
- <Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
11
- <SignedInfo>
12
- <CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
13
- <SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
14
- <Reference URI="#Timestamp-90e1ab2c-3cd1-4880-847d-395658c73659">
15
- <Transforms>
16
- <Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
17
- </Transforms>
18
- <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
19
- <DigestValue>mXJGlPSht+Lvaoptu094uRk/JTs=</DigestValue>
20
- </Reference>
21
- <Reference URI="#Body-6f1f55ed-074a-48d4-b377-004ba63bc235">
22
- <Transforms>
23
- <Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
24
- </Transforms>
25
- <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
26
- <DigestValue>Te/Ko44e7exMi+5UKJykJR4LAnc=</DigestValue>
27
- </Reference>
28
- </SignedInfo>
29
- <SignatureValue>HereTQHOSxGrBP7dgd411/u0I3BDSnW3cYL4xPjdzvlsHl451WUH8uc3EQQtueZpxG7Ijnhu+XVXry/HAu9Xfr2ARct9XO1k/KTkXWOJtsiljVHQY94ox7Ku/QeunVy8l39XBClBhJczEehnHLwQfuNRpjVBXAgESj0NoyQ1c2M=</SignatureValue><KeyInfo><wsse:SecurityTokenReference xmlns=""><wsse:Reference URI="#SecurityToken-674b41de-bc40-4398-af35-f32a2d2fcb25" ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3"/></wsse:SecurityTokenReference></KeyInfo></Signature>
30
- </wsse:Security>
31
- </soapenv:Header>
32
- <soapenv:Body xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd" wsu:Id="Body-6f1f55ed-074a-48d4-b377-004ba63bc235">
33
- <cor:downloadFileout>
34
- <mod:ResponseHeader>
35
- <mod:SenderId>11111111</mod:SenderId>
36
- <mod:RequestId>c665330d3c25d6d0b0956b21762999e253</mod:RequestId>
37
- <mod:Timestamp>2014-06-10T15:31:48+02:00</mod:Timestamp>
38
- <mod:ResponseCode>00</mod:ResponseCode>
39
- <mod:ResponseText>OK.</mod:ResponseText>
40
- <mod:ReceiverId>11111111A1</mod:ReceiverId>
41
- </mod:ResponseHeader>
42
- <mod:ApplicationResponse><c2b:ApplicationResponse xmlns:c2b="http://bxd.fi/xmldata/"><c2b:CustomerId>11111111</c2b:CustomerId><c2b:Timestamp>2014-06-10T15:31:48+02:00</c2b:Timestamp><c2b:ResponseCode>00</c2b:ResponseCode><c2b:ResponseText>OK.</c2b:ResponseText><c2b:Encrypted>false</c2b:Encrypted><c2b:Compressed>false</c2b:Compressed><c2b:Content>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</c2b:Content><Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
<SignedInfo>
  <CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"/>
  <SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
  <Reference URI="">
    <Transforms>
      <Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
      <Transform Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"/>
    </Transforms>
    <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
    <DigestValue>cPgvNYGnujIKIk5tB99k+hd9NMs=</DigestValue>
  </Reference>
</SignedInfo>
    <SignatureValue>bcBLx3+q/+NZJf0eDWcL+jTPxjh3qBYi5Z9tzIZpJCleQPTbYpALM3lpQKV9YZ6h7oRgeyJEACbA86ESDNi6LgKANYJgc2EB/walTMPIgomYkAO07TPUytA/UApUInYA26M9IzjHT1oBGJqt4Pw7ixdF4w6/BaqrPbVN8kKkV0g=</SignatureValue><KeyInfo><X509Data><X509Certificate>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</X509Certificate><X509IssuerSerial><X509IssuerName>serialNumber=516406-0120, CN=Nordea Corporate Server CA 01, O=Nordea Bank AB (publ), C=SE</X509IssuerName><X509SerialNumber>22641694</X509SerialNumber></X509IssuerSerial></X509Data></KeyInfo></Signature></c2b:ApplicationResponse></mod:ApplicationResponse>
43
- </cor:downloadFileout>
44
- </soapenv:Body>
45
- </soapenv:Envelope>
2
+ <soapenv:Envelope xmlns:mod="http://model.bxd.fi" xmlns:cor="http://bxd.fi/CorporateFileService" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Header><wsse:Security soapenv:mustUnderstand="1" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"><wsu:Timestamp wsu:Id="Timestamp-1bfa8afa-2471-4057-b853-b9bb2f33320d" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><wsu:Created>2014-08-06T08:29:26Z</wsu:Created><wsu:Expires>2014-08-06T08:34:26Z</wsu:Expires></wsu:Timestamp><wsse:BinarySecurityToken wsu:Id="SecurityToken-46eb368f-eac3-43f5-953d-ba53587dfbe0" EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary" ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd">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</wsse:BinarySecurityToken><Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
3
+ <SignedInfo>
4
+ <CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
5
+ <SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
6
+ <Reference URI="#Timestamp-1bfa8afa-2471-4057-b853-b9bb2f33320d">
7
+ <Transforms>
8
+ <Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
9
+ </Transforms>
10
+ <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
11
+ <DigestValue>z03EPTGHNfagjl640D9AUHXwWMs=</DigestValue>
12
+ </Reference>
13
+ <Reference URI="#Body-0d136bf1-481f-453b-ab42-9dccc3ef648b">
14
+ <Transforms>
15
+ <Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
16
+ </Transforms>
17
+ <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
18
+ <DigestValue>RWs7OOFUvZL+jIP8znWPiw7NkDQ=</DigestValue>
19
+ </Reference>
20
+ </SignedInfo>
21
+ <SignatureValue>UMfTdBz6kLgZry4gOLRifKBJqigPWxQLvFLsbShfVtKtc1ssZ9PkJapLmi+kmum1yiHQCf2CALklirc8IMBDJqX+yqePfLByYEX5gvaabc9sDBux51+fRxNSWUutIO1kfSOuzK1J+M7lCFDcZHT9BpUu+dcm0gwopZ22V3EBoo4=</SignatureValue><KeyInfo><wsse:SecurityTokenReference xmlns=""><wsse:Reference URI="#SecurityToken-46eb368f-eac3-43f5-953d-ba53587dfbe0" ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3"/></wsse:SecurityTokenReference></KeyInfo></Signature></wsse:Security></soapenv:Header><soapenv:Body wsu:Id="Body-0d136bf1-481f-453b-ab42-9dccc3ef648b" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><cor:downloadFileout><mod:ResponseHeader><mod:SenderId>11111111</mod:SenderId><mod:RequestId>309dfb0f2c839a4595dbb700564919826f</mod:RequestId><mod:Timestamp>2014-08-06T10:29:26+02:00</mod:Timestamp><mod:ResponseCode>00</mod:ResponseCode><mod:ResponseText>OK.</mod:ResponseText><mod:ReceiverId>11111111A1</mod:ReceiverId></mod:ResponseHeader><mod:ApplicationResponse>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</mod:ApplicationResponse></cor:downloadFileout></soapenv:Body></soapenv:Envelope>