sepafm 1.1.5 → 1.1.6

Sign up to get free protection for your applications and to get access to all the features.
Files changed (42) hide show
  1. checksums.yaml +4 -4
  2. data/.rubocop.yml +3 -0
  3. data/lib/sepa/application_request.rb +17 -8
  4. data/lib/sepa/attribute_checks.rb +23 -26
  5. data/lib/sepa/banks/danske/danske_response.rb +29 -41
  6. data/lib/sepa/banks/danske/soap_danske.rb +30 -23
  7. data/lib/sepa/client.rb +8 -11
  8. data/lib/sepa/response.rb +13 -23
  9. data/lib/sepa/utilities.rb +2 -6
  10. data/lib/sepa/version.rb +1 -1
  11. data/lib/sepa/xml_schemas/danske_pki.xsd +1 -1
  12. data/lib/sepa/xml_templates/application_request/danske/renew_certificate.xml +33 -0
  13. data/lib/sepa/xml_templates/soap/danske/renew_certificate.xml +17 -0
  14. data/readme.md +3 -3
  15. data/sepafm.gemspec +4 -4
  16. data/test/custom_assertions.rb +21 -0
  17. data/test/sepa/banks/danske/danske_cert_soap_builder_test.rb +1 -5
  18. data/test/sepa/banks/danske/danske_certificate_application_request_test.rb +6 -8
  19. data/test/sepa/banks/danske/danske_generic_soap_builder_test.rb +7 -23
  20. data/test/sepa/banks/danske/danske_get_bank_cert_test.rb +3 -13
  21. data/test/sepa/banks/danske/danske_renew_cert_application_request_test.rb +32 -0
  22. data/test/sepa/banks/danske/danske_renew_cert_request_soap_builder_test.rb +41 -0
  23. data/test/sepa/banks/nordea/nordea_application_request_test.rb +4 -16
  24. data/test/sepa/banks/nordea/nordea_cert_application_request_test.rb +1 -5
  25. data/test/sepa/banks/nordea/nordea_cert_request_soap_builder_test.rb +1 -4
  26. data/test/sepa/banks/nordea/nordea_generic_soap_builder_test.rb +7 -23
  27. data/test/sepa/banks/nordea/nordea_renew_cert_application_request_test.rb +1 -10
  28. data/test/sepa/banks/nordea/nordea_renew_cert_request_soap_builder_test.rb +1 -10
  29. data/test/sepa/banks/op/op_application_request_test.rb +3 -30
  30. data/test/sepa/banks/op/op_cert_application_request_test.rb +1 -10
  31. data/test/sepa/banks/op/op_cert_request_soap_builder_test.rb +1 -10
  32. data/test/sepa/banks/op/op_generic_soap_builder_test.rb +2 -20
  33. data/test/sepa/client_test.rb +42 -66
  34. data/test/sepa/fixtures.rb +72 -23
  35. data/test/sepa/sepa_test.rb +1 -1
  36. data/test_client/test_client.rb +23 -18
  37. metadata +16 -19
  38. data/.travis.yml +0 -16
  39. data/test/sepa/banks/danske/keys/danske_encryption.crt +0 -24
  40. data/test/sepa/banks/danske/keys/encryption_pkcs.csr +0 -0
  41. data/test/sepa/banks/danske/keys/signing_pkcs.csr +0 -0
  42. data/test/sepa/banks/danske/keys/signing_private_key.pem +0 -27
@@ -4,12 +4,12 @@ class ClientTest < ActiveSupport::TestCase
4
4
  include Sepa::ErrorMessages
5
5
 
6
6
  def setup
7
-
8
7
  # Get params hashes from fixtures for different banks and for different request types
9
8
  @nordea_generic_params = nordea_generic_params
10
9
  @nordea_get_certificate_params = nordea_get_certificate_params
11
10
  @nordea_renew_certificate_params = nordea_get_certificate_params
12
11
  @danske_create_certificate_params = danske_create_certificate_params
12
+ @danske_renew_certificate_params = danske_renew_cert_params
13
13
  @danske_generic_params = danske_generic_params
14
14
 
15
15
  # Namespaces
@@ -49,7 +49,10 @@ class ClientTest < ActiveSupport::TestCase
49
49
  test "correct allowed commands for danske" do
50
50
  c = Sepa::Client.new(bank: :danske)
51
51
 
52
- commands = STANDARD_COMMANDS - [:get_user_info] + [:get_bank_certificate, :create_certificate]
52
+ commands = [
53
+ STANDARD_COMMANDS - [:get_user_info],
54
+ [:get_bank_certificate, :create_certificate, :renew_certificate],
55
+ ].flatten
53
56
 
54
57
  assert_same_items commands, c.allowed_commands
55
58
  end
@@ -212,11 +215,7 @@ class ClientTest < ActiveSupport::TestCase
212
215
  response = client.send_request
213
216
 
214
217
  assert response.doc.at_css('cor|getUserInfoin', cor: @cor)
215
-
216
- Dir.chdir(SCHEMA_PATH) do
217
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
218
- assert xsd.valid?(response.doc)
219
- end
218
+ assert_valid_against_schema 'soap.xsd', response.doc
220
219
  end
221
220
 
222
221
  test "should_send_proper_request_with_nordea_download_file_list" do
@@ -225,11 +224,7 @@ class ClientTest < ActiveSupport::TestCase
225
224
  response = client.send_request
226
225
 
227
226
  assert response.doc.at_css('cor|downloadFileListin', cor: @cor)
228
-
229
- Dir.chdir(SCHEMA_PATH) do
230
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
231
- assert xsd.valid?(response.doc)
232
- end
227
+ assert_valid_against_schema 'soap.xsd', response.doc
233
228
  end
234
229
 
235
230
  test "should_send_proper_request_with_nordea_download_file" do
@@ -238,11 +233,7 @@ class ClientTest < ActiveSupport::TestCase
238
233
  response = client.send_request
239
234
 
240
235
  assert response.doc.at_css('cor|downloadFilein', cor: @cor)
241
-
242
- Dir.chdir(SCHEMA_PATH) do
243
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
244
- assert xsd.valid?(response.doc)
245
- end
236
+ assert_valid_against_schema 'soap.xsd', response.doc
246
237
  end
247
238
 
248
239
  test "should_send_proper_request_with_nordea_upload_file" do
@@ -251,11 +242,7 @@ class ClientTest < ActiveSupport::TestCase
251
242
  response = client.send_request
252
243
 
253
244
  assert response.doc.at_css('cor|uploadFilein', cor: @cor)
254
-
255
- Dir.chdir(SCHEMA_PATH) do
256
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
257
- assert xsd.valid?(response.doc)
258
- end
245
+ assert_valid_against_schema 'soap.xsd', response.doc
259
246
  end
260
247
 
261
248
  test 'should send proper request with nordea get certificate' do
@@ -263,11 +250,7 @@ class ClientTest < ActiveSupport::TestCase
263
250
  response = client.send_request
264
251
 
265
252
  assert response.doc.at_css('cer|getCertificatein')
266
-
267
- Dir.chdir(SCHEMA_PATH) do
268
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
269
- assert xsd.valid?(response.doc)
270
- end
253
+ assert_valid_against_schema 'soap.xsd', response.doc
271
254
  end
272
255
 
273
256
  test 'sends a proper request with nordea renew certificate' do
@@ -275,17 +258,7 @@ class ClientTest < ActiveSupport::TestCase
275
258
  response = client.send_request
276
259
 
277
260
  assert response.doc.at('cer|getCertificatein')
278
-
279
- errors = []
280
-
281
- Dir.chdir(SCHEMA_PATH) do
282
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
283
- xsd.validate(response.doc).each do |error|
284
- errors << error
285
- end
286
- end
287
-
288
- assert errors.empty?, "The following schema validations failed:\n#{errors.join("\n")}"
261
+ assert_valid_against_schema 'soap.xsd', response.doc
289
262
  end
290
263
 
291
264
  test 'should send proper request with danske download file list' do
@@ -293,10 +266,7 @@ class ClientTest < ActiveSupport::TestCase
293
266
  client = Sepa::Client.new(@danske_generic_params)
294
267
  response = client.send_request
295
268
 
296
- Dir.chdir(SCHEMA_PATH) do
297
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
298
- assert xsd.valid?(response.doc)
299
- end
269
+ assert_valid_against_schema 'soap.xsd', response.doc
300
270
  end
301
271
 
302
272
  test 'should send proper request with danske download file' do
@@ -304,49 +274,55 @@ class ClientTest < ActiveSupport::TestCase
304
274
  client = Sepa::Client.new(@danske_generic_params)
305
275
  response = client.send_request
306
276
 
307
- Dir.chdir(SCHEMA_PATH) do
308
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
309
- assert xsd.valid?(response.doc)
310
- end
277
+ assert_valid_against_schema 'soap.xsd', response.doc
311
278
  end
312
279
 
313
280
  test 'should send proper request with danske upload file' do
314
281
  client = Sepa::Client.new(@danske_generic_params)
315
282
  response = client.send_request
316
283
 
317
- Dir.chdir(SCHEMA_PATH) do
318
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
319
- assert xsd.valid?(response.doc)
320
- end
284
+ assert_valid_against_schema 'soap.xsd', response.doc
321
285
  end
322
286
 
323
287
  test 'should send proper request with danske create certificate' do
324
288
  client = Sepa::Client.new(@danske_create_certificate_params)
325
289
  response = client.send_request
326
290
 
327
- Dir.chdir(SCHEMA_PATH) do
328
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
329
- assert xsd.valid?(response.doc)
330
- end
291
+ assert_valid_against_schema 'soap.xsd', response.doc
331
292
  end
332
293
 
294
+ test 'sends a proper request with danske renew certificate' do
295
+ client = Sepa::Client.new(@danske_renew_certificate_params)
296
+ response = client.send_request
333
297
 
334
- test "should_check_signing_cert_request_with_create_certificate" do
335
- @danske_create_certificate_params[:command] = :create_certificate
336
- @danske_create_certificate_params.delete(:signing_csr)
298
+ assert response.doc.at('pkif|RenewCertificateIn', pkif: 'http://danskebank.dk/PKI/PKIFactoryService')
299
+ assert_valid_against_schema 'soap.xsd', response.doc
300
+ end
337
301
 
338
- sepa = Sepa::Client.new(@danske_create_certificate_params)
339
- refute sepa.valid?
340
- assert_includes sepa.errors.messages.to_s, SIGNING_CERT_REQUEST_ERROR_MESSAGE
302
+ test "signing csr is checked correctly with danske cert requests" do
303
+ [
304
+ @danske_create_certificate_params,
305
+ @danske_renew_certificate_params,
306
+ ].each do |params|
307
+ params.delete(:signing_csr)
308
+
309
+ sepa = Sepa::Client.new(params)
310
+ refute sepa.valid?
311
+ assert_includes sepa.errors.messages.to_s, SIGNING_CERT_REQUEST_ERROR_MESSAGE
312
+ end
341
313
  end
342
314
 
343
- test "should_check_encryption_cert_request_with_create_certificate" do
344
- @danske_create_certificate_params[:command] = :create_certificate
345
- @danske_create_certificate_params.delete(:encryption_csr)
315
+ test "encryption csr is checked correctly with danske cert requests" do
316
+ [
317
+ @danske_create_certificate_params,
318
+ @danske_renew_certificate_params,
319
+ ].each do |params|
320
+ params.delete(:encryption_csr)
346
321
 
347
- sepa = Sepa::Client.new(@danske_create_certificate_params)
348
- refute sepa.valid?
349
- assert_includes sepa.errors.messages.to_s, ENCRYPTION_CERT_REQUEST_ERROR_MESSAGE
322
+ sepa = Sepa::Client.new(params)
323
+ refute sepa.valid?
324
+ assert_includes sepa.errors.messages.to_s, ENCRYPTION_CERT_REQUEST_ERROR_MESSAGE
325
+ end
350
326
  end
351
327
 
352
328
  test "should_check_pin_with_create_certificate" do
@@ -1,33 +1,26 @@
1
1
  def danske_generic_params
2
2
  keys_path = "#{ROOT_PATH}/test/sepa/banks/danske/keys"
3
3
 
4
- signing_private_key_path = "#{keys_path}/signing_key.pem"
5
- signing_private_key = File.read signing_private_key_path
6
-
7
- encryption_private_key_path = "#{keys_path}/enc_private_key.pem"
8
- encryption_private_key = File.read encryption_private_key_path
9
-
10
- signing_certificate_path = "#{keys_path}/own_signing_cert.pem"
11
- own_signing_certificate = File.read signing_certificate_path
12
-
13
- encryption_certificate_path = "#{keys_path}/own_enc_cert.pem"
14
- bank_encryption_certificate = File.read encryption_certificate_path
4
+ signing_private_key = File.read("#{keys_path}/signing_key.pem")
5
+ encryption_private_key = File.read("#{keys_path}/enc_private_key.pem")
6
+ own_signing_certificate = File.read("#{keys_path}/own_signing_cert.pem")
7
+ bank_encryption_certificate = File.read("#{keys_path}/own_enc_cert.pem")
15
8
 
16
9
  {
17
10
  bank: :danske,
18
- signing_private_key: signing_private_key,
19
- encryption_private_key: encryption_private_key,
20
11
  command: :upload_file,
21
12
  customer_id: '360817',
22
13
  environment: 'test',
23
- bank_encryption_certificate: bank_encryption_certificate,
24
- own_signing_certificate: own_signing_certificate,
25
14
  language: 'FI',
26
15
  status: 'ALL',
27
16
  target_id: 'DABAFIHH',
28
17
  file_type: 'pain.001.001.02',
29
18
  content: encode('kissa'),
30
19
  file_reference: '11111111A12006030329501800000014',
20
+ own_signing_certificate: own_signing_certificate,
21
+ bank_encryption_certificate: bank_encryption_certificate,
22
+ signing_private_key: signing_private_key,
23
+ encryption_private_key: encryption_private_key,
31
24
  }
32
25
  end
33
26
 
@@ -378,13 +371,69 @@ CsajqZag/Aoxv/Y=
378
371
  bank_encryption_certificate = File.read "#{DANSKE_TEST_KEYS_PATH}own_enc_cert.pem"
379
372
 
380
373
  {
381
- bank: :danske,
382
- bank_encryption_certificate: bank_encryption_certificate,
383
- command: :create_certificate,
384
- customer_id: '360817',
385
- environment: 'test',
386
- encryption_csr: encryption_csr,
387
- signing_csr: signing_csr,
388
- pin: '1234',
374
+ bank: :danske,
375
+ bank_encryption_certificate: bank_encryption_certificate,
376
+ command: :create_certificate,
377
+ customer_id: '360817',
378
+ environment: :test,
379
+ encryption_csr: encryption_csr,
380
+ signing_csr: signing_csr,
381
+ pin: '1234',
382
+ }
383
+ end
384
+
385
+ def danske_renew_cert_params
386
+ keys_path = "#{ROOT_PATH}/test/sepa/banks/danske/keys"
387
+
388
+ signing_private_key = File.read("#{keys_path}/signing_key.pem")
389
+ encryption_private_key = File.read("#{keys_path}/enc_private_key.pem")
390
+ own_signing_certificate = File.read("#{keys_path}/own_signing_cert.pem")
391
+ bank_encryption_certificate = File.read("#{keys_path}/own_enc_cert.pem")
392
+
393
+ encryption_csr = "-----BEGIN CERTIFICATE REQUEST-----
394
+ MIICdzCCAV8CAQEwMjEPMA0GA1UEAwwGaGVtdWxpMR8wHQYKCZImiZPyLGQBGRYP
395
+ bnV1c2thbXVpa2t1bmVuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
396
+ 5aHmVXcfogDqJ3kUfK8ARzdkQ/dm9j4rHbGNh4xmlKCMUwCmmo2LOKMKvviD7qwz
397
+ n1lDsPIClbmZaxc3vFlpNj5A6YVg7SpCU/Cx9RtTY+2vWQF29RWw5UktPDALIRNC
398
+ boKuNykWqbWhwW80YOO3MXlASw2EF2nfsxLGXNmiB7kKaxPrTsNV9CO4rVIrYJj5
399
+ 2+1MZSEhEQn9H9VrKgCNlDN/6LCs/TnSC7Np1jOTjo5Nen95afE0KUEbSnMw8Ihw
400
+ ymOFF0zgxiCQ1kme5fYXqCZZJOU+zS3pKO/LdnULu6/uJ1D0JWjIwWBqEwTwMqhj
401
+ NnsJaoJiJJnQtuFcVIhXEQIDAQABoAAwDQYJKoZIhvcNAQEFBQADggEBAAlVfy+G
402
+ GUPYnTfrRoBvgSMz5dR7rynQe5wxHWTtk71xbODSIZNFUntYa4tSAzaIEp65FxTj
403
+ WyGlBZcdzCPd39DJtfxeiZ8q4UKx47VCt4jIzOSpM2jvGzlUpHnm2Eh9rQHqMRye
404
+ C4T49gWBEqsTvZL+hWE9dAQq4Y+P3h9UWr49bMQNbSxERw3fDzWvcEJsSq+4Ml12
405
+ +sPV+Euz5phCzqt15v+6jfqlEgGj27k3MlF+EglX0BWduGw4RxfoOdGQNBwdXPkz
406
+ db1f0XsYTW1NUYoL8O8uxzoNcysyBW/VGP01e2LXB8whWn4xtDtaLpyt/v4ow04V
407
+ 9v3lfL5ZDl1gIEY=
408
+ -----END CERTIFICATE REQUEST-----"
409
+
410
+ signing_csr = "-----BEGIN CERTIFICATE REQUEST-----
411
+ MIICdzCCAV8CAQEwMjEPMA0GA1UEAwwGaGVtdWxpMR8wHQYKCZImiZPyLGQBGRYP
412
+ bnV1c2thbXVpa2t1bmVuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
413
+ y4zgajeMzFrBR4zsJ50qo4fxHWfjdCmI5nwLbKqKhSKB15JBdRmh/Wz0Gi1qOvER
414
+ x9wS5c/1pMr1ARcVUvz2425ZNV77AAQMGUZpLxP9N6QWK39u4VemoecdPfNYv/tt
415
+ qk1cJFO1aNNmIMrDzBZEzQH/Mf4QbiqsaSvuVay8mjVEW3she4FbcrhNnhlm3PS7
416
+ XOm0UF2TiCjrM4enCI2XhTzKnSxONiM8KubKEAEOXPDAYGRwn+dik30qYwT5kMbG
417
+ tzggHPsiwkBUDEcNeMuMGRKNxP3i03DA4wGSJZu3A61TcYVLihj9hEDnybe7Dw0h
418
+ eNmyqoqp/0gr89rxlAANNwIDAQABoAAwDQYJKoZIhvcNAQEFBQADggEBAEbyXe6f
419
+ aBGbaSldlIceYyxIXVqBRwVuE22vvk6to1f+QYrWj+4IexD0TBdfpcpKATnOjqEH
420
+ sbksB0HOKZmFDCqNZamw1458DtdtSPpOn5EyX9BX6K2hExmj5CV1vEORB8dQ4lBi
421
+ zjrpAOh422NQ3galu1vfrPVvRS8lN4t+zJUlBoCUwPlm5AmH88dJCXDHTxDrwxxv
422
+ 6UPUROxE2p+1TyHueUmfMKvjySnt8IIfoEvz4q/EouIbL2lDJwXOwX+1fx4Rva6t
423
+ bx1hmt5Eihy1lORQR4PE4xaOP5TCqtxP0+snuGqRuBHhrDk4mowWEJbvFWlONT5H
424
+ CsajqZag/Aoxv/Y=
425
+ -----END CERTIFICATE REQUEST-----"
426
+
427
+ {
428
+ bank: :danske,
429
+ command: :renew_certificate,
430
+ signing_csr: signing_csr,
431
+ encryption_csr: encryption_csr,
432
+ customer_id: '360817',
433
+ environment: :test,
434
+ own_signing_certificate: own_signing_certificate,
435
+ bank_encryption_certificate: bank_encryption_certificate,
436
+ signing_private_key: signing_private_key,
437
+ encryption_private_key: encryption_private_key,
389
438
  }
390
439
  end
@@ -3,6 +3,6 @@ require 'test_helper'
3
3
  class TestSepa < ActiveSupport::TestCase
4
4
  test 'version is defined correctly' do
5
5
  refute_nil Sepa::VERSION
6
- assert_equal "1.1.5", Sepa::VERSION
6
+ assert_equal "1.1.6", Sepa::VERSION
7
7
  end
8
8
  end
@@ -4,24 +4,29 @@ module Testing
4
4
  require_relative "data/certs"
5
5
  require_relative "data/params"
6
6
 
7
- content_clients = {
8
- nordea_download_file: Sepa::Client.new(NORDEA_DOWNLOAD_FILE_PARAMS),
9
- nordea_download_file_list: Sepa::Client.new(NORDEA_DOWNLOAD_FILE_LIST_PARAMS),
10
- nordea_get_user_info: Sepa::Client.new(NORDEA_GET_USER_INFO_PARAMS),
11
- nordea_upload_file: Sepa::Client.new(NORDEA_UPLOAD_FILE_PARAMS),
12
- op_download_file: Sepa::Client.new(OP_DOWNLOAD_FILE_PARAMS),
13
- op_download_file_list: Sepa::Client.new(OP_DOWNLOAD_FILE_LIST_PARAMS),
14
- op_upload_file: Sepa::Client.new(OP_UPLOAD_FILE_PARAMS),
15
- }
16
-
17
- certificate_clients = {
18
- danske_create_cert: Sepa::Client.new(DANSKE_CREATE_CERT_PARAMS),
19
- danske_get_bank_cert: Sepa::Client.new(DANSKE_GET_BANK_CERT_PARAMS),
20
- nordea_get_certificate: Sepa::Client.new(NORDEA_GET_CERTIFICATE_PARAMS),
21
- nordea_renew_certificate: Sepa::Client.new(NORDEA_RENEW_CERTIFICATE_PARAMS),
22
- op_get_certificate: Sepa::Client.new(OP_GET_CERTIFICATE_PARAMS),
23
- op_get_service_certificates: Sepa::Client.new(OP_GET_SERVICE_CERTIFICATES_PARAMS),
24
- }
7
+ content_clients = [
8
+ :nordea_download_file,
9
+ :nordea_download_file_list,
10
+ :nordea_get_user_info,
11
+ :nordea_upload_file,
12
+ :op_download_file,
13
+ :op_download_file_list,
14
+ :op_upload_file,
15
+ ].each_with_object({}) do |i, a|
16
+ a[i] = Sepa::Client.new("#{i.to_s.upcase}_PARAMS".constantize)
17
+ end
18
+
19
+ certificate_clients = [
20
+ :danske_create_cert,
21
+ :danske_get_bank_cert,
22
+ :danske_renew_cert,
23
+ :nordea_get_certificate,
24
+ :nordea_renew_certificate,
25
+ :op_get_certificate,
26
+ :op_get_service_certificates,
27
+ ].each_with_object({}) do |i, a|
28
+ a[i] = Sepa::Client.new("#{i.to_s.upcase}_PARAMS".constantize)
29
+ end
25
30
 
26
31
  content_clients.each do |name, client|
27
32
  response = client.send_request
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: sepafm
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.1.5
4
+ version: 1.1.6
5
5
  platform: ruby
6
6
  authors:
7
7
  - Joni Kanerva
@@ -10,7 +10,7 @@ authors:
10
10
  autorequire:
11
11
  bindir: bin
12
12
  cert_chain: []
13
- date: 2016-05-13 00:00:00.000000000 Z
13
+ date: 2016-07-12 00:00:00.000000000 Z
14
14
  dependencies:
15
15
  - !ruby/object:Gem::Dependency
16
16
  name: activemodel
@@ -74,14 +74,14 @@ dependencies:
74
74
  requirements:
75
75
  - - "~>"
76
76
  - !ruby/object:Gem::Version
77
- version: '0.5'
77
+ version: '0.6'
78
78
  type: :development
79
79
  prerelease: false
80
80
  version_requirements: !ruby/object:Gem::Requirement
81
81
  requirements:
82
82
  - - "~>"
83
83
  - !ruby/object:Gem::Version
84
- version: '0.5'
84
+ version: '0.6'
85
85
  - !ruby/object:Gem::Dependency
86
86
  name: dotenv
87
87
  requirement: !ruby/object:Gem::Requirement
@@ -102,28 +102,28 @@ dependencies:
102
102
  requirements:
103
103
  - - "~>"
104
104
  - !ruby/object:Gem::Version
105
- version: '5.8'
105
+ version: '5.9'
106
106
  type: :development
107
107
  prerelease: false
108
108
  version_requirements: !ruby/object:Gem::Requirement
109
109
  requirements:
110
110
  - - "~>"
111
111
  - !ruby/object:Gem::Version
112
- version: '5.8'
112
+ version: '5.9'
113
113
  - !ruby/object:Gem::Dependency
114
114
  name: rake
115
115
  requirement: !ruby/object:Gem::Requirement
116
116
  requirements:
117
117
  - - "~>"
118
118
  - !ruby/object:Gem::Version
119
- version: '11.1'
119
+ version: '11.2'
120
120
  type: :development
121
121
  prerelease: false
122
122
  version_requirements: !ruby/object:Gem::Requirement
123
123
  requirements:
124
124
  - - "~>"
125
125
  - !ruby/object:Gem::Version
126
- version: '11.1'
126
+ version: '11.2'
127
127
  - !ruby/object:Gem::Dependency
128
128
  name: rubyntlm
129
129
  requirement: !ruby/object:Gem::Requirement
@@ -147,7 +147,6 @@ extra_rdoc_files: []
147
147
  files:
148
148
  - ".gitignore"
149
149
  - ".rubocop.yml"
150
- - ".travis.yml"
151
150
  - ".yardopts"
152
151
  - Gemfile
153
152
  - LICENSE
@@ -197,6 +196,7 @@ files:
197
196
  - lib/sepa/xml_schemas/xmldsig-core-schema.xsd
198
197
  - lib/sepa/xml_templates/application_request/danske/create_certificate.xml
199
198
  - lib/sepa/xml_templates/application_request/danske/get_bank_certificate.xml
199
+ - lib/sepa/xml_templates/application_request/danske/renew_certificate.xml
200
200
  - lib/sepa/xml_templates/application_request/download_file.xml
201
201
  - lib/sepa/xml_templates/application_request/download_file_list.xml
202
202
  - lib/sepa/xml_templates/application_request/encrypted_request.xml
@@ -208,6 +208,7 @@ files:
208
208
  - lib/sepa/xml_templates/application_request/upload_file.xml
209
209
  - lib/sepa/xml_templates/soap/danske/create_certificate.xml
210
210
  - lib/sepa/xml_templates/soap/danske/get_bank_certificate.xml
211
+ - lib/sepa/xml_templates/soap/danske/renew_certificate.xml
211
212
  - lib/sepa/xml_templates/soap/download_file.xml
212
213
  - lib/sepa/xml_templates/soap/download_file_list.xml
213
214
  - lib/sepa/xml_templates/soap/get_user_info.xml
@@ -226,18 +227,16 @@ files:
226
227
  - test/sepa/banks/danske/danske_certificate_application_request_test.rb
227
228
  - test/sepa/banks/danske/danske_generic_soap_builder_test.rb
228
229
  - test/sepa/banks/danske/danske_get_bank_cert_test.rb
230
+ - test/sepa/banks/danske/danske_renew_cert_application_request_test.rb
231
+ - test/sepa/banks/danske/danske_renew_cert_request_soap_builder_test.rb
229
232
  - test/sepa/banks/danske/danske_response_test.rb
230
233
  - test/sepa/banks/danske/keys/bank_encryption_cert.pem
231
234
  - test/sepa/banks/danske/keys/bank_root_cert.pem
232
235
  - test/sepa/banks/danske/keys/bank_signing_cert.pem
233
- - test/sepa/banks/danske/keys/danske_encryption.crt
234
236
  - test/sepa/banks/danske/keys/enc_private_key.pem
235
- - test/sepa/banks/danske/keys/encryption_pkcs.csr
236
237
  - test/sepa/banks/danske/keys/own_enc_cert.pem
237
238
  - test/sepa/banks/danske/keys/own_signing_cert.pem
238
239
  - test/sepa/banks/danske/keys/signing_key.pem
239
- - test/sepa/banks/danske/keys/signing_pkcs.csr
240
- - test/sepa/banks/danske/keys/signing_private_key.pem
241
240
  - test/sepa/banks/danske/responses/create_cert.xml
242
241
  - test/sepa/banks/danske/responses/download_file_list.xml
243
242
  - test/sepa/banks/danske/responses/get_bank_cert.xml
@@ -289,7 +288,7 @@ required_ruby_version: !ruby/object:Gem::Requirement
289
288
  requirements:
290
289
  - - ">="
291
290
  - !ruby/object:Gem::Version
292
- version: 2.1.7
291
+ version: 2.2.5
293
292
  required_rubygems_version: !ruby/object:Gem::Requirement
294
293
  requirements:
295
294
  - - ">="
@@ -297,7 +296,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
297
296
  version: '0'
298
297
  requirements: []
299
298
  rubyforge_project:
300
- rubygems_version: 2.6.4
299
+ rubygems_version: 2.6.6
301
300
  signing_key:
302
301
  specification_version: 4
303
302
  summary: SEPA Financial Messages
@@ -308,18 +307,16 @@ test_files:
308
307
  - test/sepa/banks/danske/danske_certificate_application_request_test.rb
309
308
  - test/sepa/banks/danske/danske_generic_soap_builder_test.rb
310
309
  - test/sepa/banks/danske/danske_get_bank_cert_test.rb
310
+ - test/sepa/banks/danske/danske_renew_cert_application_request_test.rb
311
+ - test/sepa/banks/danske/danske_renew_cert_request_soap_builder_test.rb
311
312
  - test/sepa/banks/danske/danske_response_test.rb
312
313
  - test/sepa/banks/danske/keys/bank_encryption_cert.pem
313
314
  - test/sepa/banks/danske/keys/bank_root_cert.pem
314
315
  - test/sepa/banks/danske/keys/bank_signing_cert.pem
315
- - test/sepa/banks/danske/keys/danske_encryption.crt
316
316
  - test/sepa/banks/danske/keys/enc_private_key.pem
317
- - test/sepa/banks/danske/keys/encryption_pkcs.csr
318
317
  - test/sepa/banks/danske/keys/own_enc_cert.pem
319
318
  - test/sepa/banks/danske/keys/own_signing_cert.pem
320
319
  - test/sepa/banks/danske/keys/signing_key.pem
321
- - test/sepa/banks/danske/keys/signing_pkcs.csr
322
- - test/sepa/banks/danske/keys/signing_private_key.pem
323
320
  - test/sepa/banks/danske/responses/create_cert.xml
324
321
  - test/sepa/banks/danske/responses/download_file_list.xml
325
322
  - test/sepa/banks/danske/responses/get_bank_cert.xml
data/.travis.yml DELETED
@@ -1,16 +0,0 @@
1
- language: ruby
2
- sudo: false
3
- rvm:
4
- - 2.1.7
5
- - 2.2.3
6
- notifications:
7
- email: false
8
- flowdock:
9
- secure: "pzq6Pl9RVGycf0gxE4Cewh8LlQs3fbAKxpzhz2OWMghYkMDci9yk9qFcjl9AJ3h8XUU/2lgCdtpQmCJM3reW4zc/1goK3kQxRemIThwaBeonW5sKmPzD/TOGSzvmBGnEO7olXsOZBGiWvNnzQ4sWIzv8VjCOkFrEWabRkfEvzfg="
10
- addons:
11
- code_climate:
12
- repo_token:
13
- secure: "Wpl0vRyUgEfrvlF35U8LAgpvPttB/+r3lLJhpdGAtFrdDhCgtJJt/qFadWVLcyewGosYBd5XJWZvI6hTARTgmL3imlVdwoZRBu+flUQr3lv3nDVQPMPKnYj9iFi/zLKGR3nnM7k/d85Bm8rNIPw5w+iAE/Z8cTu5YrHqZ+XlxwI="
14
- script:
15
- - bundle install
16
- - bundle exec rake
@@ -1,24 +0,0 @@
1
- -----BEGIN CERTIFICATE-----
2
- MIIEATCCAumgAwIBAgIFAQjv8bMwDQYJKoZIhvcNAQELBQAwgZgxEDAOBgNVBAMT
3
- B0RCR1JPT1QxCzAJBgNVBAYTAkRLMRMwEQYDVQQHEwpDb3BlbmhhZ2VuMRAwDgYD
4
- VQQIEwdEZW5tYXJrMRowGAYDVQQKExFEYW5za2UgQmFuayBHcm91cDEaMBgGA1UE
5
- CxMRRGFuc2tlIEJhbmsgR3JvdXAxGDAWBgNVBAUTDzYxMTI2MjI4MTExMDAwMjAe
6
- Fw0xMjA4MDEwMDAwMDBaFw0xNDEwMzEwMDAwMDBaMIGYMRAwDgYDVQQDEwdEUENS
7
- WVBUMQswCQYDVQQGEwJESzETMBEGA1UEBxMKQ29wZW5oYWdlbjEQMA4GA1UECBMH
8
- RGVubWFyazEaMBgGA1UEChMRRGFuc2tlIEJhbmsgR3JvdXAxGjAYBgNVBAsTEURh
9
- bnNrZSBCYW5rIEdyb3VwMRgwFgYDVQQFEw82MTEyNjIyODQ5MTAwMDMwggEgMA0G
10
- CSqGSIb3DQEBAQUAA4IBDQAwggEIAoIBAQC/kHrOvHOueBsit9drxIHpaD7mXINy
11
- pXS/l9PbbOZ0lZKVEfW9gtG8xk9XggsPXHJMF/PXpG6mveXvPu9WW/XpryAUqGfv
12
- YsC7Px3ixaJb2EMOL+2mJYd0v5HKg5RuYkQ82k3K01hMNEGYs0OotjNVAimQcTLt
13
- VPDGBjK5BUAiwady9LpI6afo7roJWnRmsvSvinDgBqswnfCvUfSfM8cZyhnLLC2u
14
- j1kBHAD/5xpllmS3aq1M8LqFkBYcCE5PdPmFWhGUumZ/Y5qLjDgcPMAPvUaKLqOs
15
- h22jvPCZ0pm17eV0bSQzWe5e0zkgCYAepuFRazSlkJQYBdS47Mp68dY5AgEDo1Iw
16
- UDAfBgNVHSMEGDAWgBSE+uW/3pFJZt/FilLDs7ezIBzHbTAdBgNVHQ4EFgQUP6wH
17
- VNOmznu212c08M3oeYjeXW4wDgYDVR0PAQH/BAQDAgQwMA0GCSqGSIb3DQEBCwUA
18
- A4IBAQAvJBfPug+ixGL/zWUnKMweV80atZXMjHJEn4mOE+iUkCNONLImMMt6MXJy
19
- snJViL1gL5xMrka6A62PLLsVkl79kxDDbzXMPfGt5/mB9L7CMpyzaID0acDii3rs
20
- ZwT3Wxpnate6wowN4zpmXgpCpTDGbxjuVRiOArsjQblerhfxnD/UAieZ1IWozIAN
21
- s6SVms/TuOB+bODUr06ITxBkDJhizOJxjsXRIAtwZvvrH4qGjJz5qFcPb3nz4Txw
22
- swU8X6yvbtqF+q4aAKPA6ZydnGZFQSoSzNJtcF28T1ItxEHN3+xyQqXpTgFviiuL
23
- 277LaAl9YUFFnSgeh7GiFitWJPfD
24
- -----END CERTIFICATE-----
@@ -1,27 +0,0 @@
1
- -----BEGIN RSA PRIVATE KEY-----
2
- MIIEogIBAAKCAQEAy4zgajeMzFrBR4zsJ50qo4fxHWfjdCmI5nwLbKqKhSKB15JB
3
- dRmh/Wz0Gi1qOvERx9wS5c/1pMr1ARcVUvz2425ZNV77AAQMGUZpLxP9N6QWK39u
4
- 4VemoecdPfNYv/ttqk1cJFO1aNNmIMrDzBZEzQH/Mf4QbiqsaSvuVay8mjVEW3sh
5
- e4FbcrhNnhlm3PS7XOm0UF2TiCjrM4enCI2XhTzKnSxONiM8KubKEAEOXPDAYGRw
6
- n+dik30qYwT5kMbGtzggHPsiwkBUDEcNeMuMGRKNxP3i03DA4wGSJZu3A61TcYVL
7
- ihj9hEDnybe7Dw0heNmyqoqp/0gr89rxlAANNwIDAQABAoIBAHWasnqMF9xmPy/A
8
- 2xzUMLOFMqkjwgX2jXNljhA9xITBeDV9+jXXFoHetnZ9cNgXOoe3vm9rJOkOnln/
9
- 5UEqiNbEheRROUI8FGVyCgm6Sd4g/vIo0X5+7vayGnIVrFxXv3fa9HbEqpajNWmS
10
- 3WeIIj40fiZ7PTD5lN27FRwJDnslbMUwl/QSyJmWuiogZ/wR2oQmmTtFXRT7CGD6
11
- 4lJAnjIXpk5+A11qzw3B0C16jonF3EQzD2qdgjIJKNusYjrnaqP5EAvaqx/40sx2
12
- qoBBVB46AaoqBeQn4uDDRJGaZ3VL+4qCPFFfQ+WRYCBTK7W2jMf7RVom9DbkH2op
13
- FHn1ckECgYEA+WsZOazUreVdbBf6gdV/pM9IfN/7pP3i+/fopJe4xnLenwtH+5oF
14
- 4hhyflRejTIBsFi4Cz9zi/GqZFFTo33CXWI+qFcg5+0SWF/BROQYA5AXRnyl8zvE
15
- bVg6kwlULR7rcd0VDKHelqkGz5SUCnoYr458ZaDptK53Cbu0E1LEgGECgYEA0Ovs
16
- sQUBrzg2mNo3FZGjDtiIVYFji5X5t4X38lXgTORhq2xvPu7MftqmqijwfbC9+n8I
17
- wjuNXmLzodh13JDvE8cBUugNAsK1lJpHVWx0fheyGzwDiG8dwoRqFGvsLcB4BRWl
18
- k5pkpgmon4j1ZCM4zrYi7qICfOtY/3P9JjzI1JcCgYB5oN+JP53rOzmml77ih5Ga
19
- dja8JqHZoLGK/Cbn9ND3fVbQqjitGjwaOJ/EuTHumt819t2xJn0bVnsoNnyZ8p7Q
20
- 2TMC9pImZ3aVwARIqw6G1kJzbh+jEJdGV0shHuB8rGJWgWBda6ZXRA/9NFBJF6do
21
- HQzOpnyxTo7gITe8YJVQoQKBgBuiqYt86w0fdXFgpBqxSg1jrR0KYX2MWBzjlrmy
22
- jFn/d7/yNwDvG5PIHnWxtqYZo/enqCPxNrD+i9WjyWtkrItELrOlyFrOILDIe5kc
23
- IIixX7jkhl8cu6YIV/Pdlr8yj220wFM3AAtKiciYmEUnt5L4WsSQH54gj4Qy9pCB
24
- R9t/AoGAJRlYneV2guAZ+ba7E7zppvNa/8E78k6KKGpk3/LameGUjcCivZuXziXF
25
- DF5/ZRU4mxuDmKs9vg2e75eD729pnMdQDKYBS34DRWZHJwpQJlvQPR3hJbaEx/GZ
26
- 94+HtAa9MRBIcMFNzHEjm4oNlsj+X8UiW4R+4HQEjVWSBIQvYpY=
27
- -----END RSA PRIVATE KEY-----