sepafm 1.1.5 → 1.1.6
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.rubocop.yml +3 -0
- data/lib/sepa/application_request.rb +17 -8
- data/lib/sepa/attribute_checks.rb +23 -26
- data/lib/sepa/banks/danske/danske_response.rb +29 -41
- data/lib/sepa/banks/danske/soap_danske.rb +30 -23
- data/lib/sepa/client.rb +8 -11
- data/lib/sepa/response.rb +13 -23
- data/lib/sepa/utilities.rb +2 -6
- data/lib/sepa/version.rb +1 -1
- data/lib/sepa/xml_schemas/danske_pki.xsd +1 -1
- data/lib/sepa/xml_templates/application_request/danske/renew_certificate.xml +33 -0
- data/lib/sepa/xml_templates/soap/danske/renew_certificate.xml +17 -0
- data/readme.md +3 -3
- data/sepafm.gemspec +4 -4
- data/test/custom_assertions.rb +21 -0
- data/test/sepa/banks/danske/danske_cert_soap_builder_test.rb +1 -5
- data/test/sepa/banks/danske/danske_certificate_application_request_test.rb +6 -8
- data/test/sepa/banks/danske/danske_generic_soap_builder_test.rb +7 -23
- data/test/sepa/banks/danske/danske_get_bank_cert_test.rb +3 -13
- data/test/sepa/banks/danske/danske_renew_cert_application_request_test.rb +32 -0
- data/test/sepa/banks/danske/danske_renew_cert_request_soap_builder_test.rb +41 -0
- data/test/sepa/banks/nordea/nordea_application_request_test.rb +4 -16
- data/test/sepa/banks/nordea/nordea_cert_application_request_test.rb +1 -5
- data/test/sepa/banks/nordea/nordea_cert_request_soap_builder_test.rb +1 -4
- data/test/sepa/banks/nordea/nordea_generic_soap_builder_test.rb +7 -23
- data/test/sepa/banks/nordea/nordea_renew_cert_application_request_test.rb +1 -10
- data/test/sepa/banks/nordea/nordea_renew_cert_request_soap_builder_test.rb +1 -10
- data/test/sepa/banks/op/op_application_request_test.rb +3 -30
- data/test/sepa/banks/op/op_cert_application_request_test.rb +1 -10
- data/test/sepa/banks/op/op_cert_request_soap_builder_test.rb +1 -10
- data/test/sepa/banks/op/op_generic_soap_builder_test.rb +2 -20
- data/test/sepa/client_test.rb +42 -66
- data/test/sepa/fixtures.rb +72 -23
- data/test/sepa/sepa_test.rb +1 -1
- data/test_client/test_client.rb +23 -18
- metadata +16 -19
- data/.travis.yml +0 -16
- data/test/sepa/banks/danske/keys/danske_encryption.crt +0 -24
- data/test/sepa/banks/danske/keys/encryption_pkcs.csr +0 -0
- data/test/sepa/banks/danske/keys/signing_pkcs.csr +0 -0
- data/test/sepa/banks/danske/keys/signing_private_key.pem +0 -27
data/test/sepa/client_test.rb
CHANGED
@@ -4,12 +4,12 @@ class ClientTest < ActiveSupport::TestCase
|
|
4
4
|
include Sepa::ErrorMessages
|
5
5
|
|
6
6
|
def setup
|
7
|
-
|
8
7
|
# Get params hashes from fixtures for different banks and for different request types
|
9
8
|
@nordea_generic_params = nordea_generic_params
|
10
9
|
@nordea_get_certificate_params = nordea_get_certificate_params
|
11
10
|
@nordea_renew_certificate_params = nordea_get_certificate_params
|
12
11
|
@danske_create_certificate_params = danske_create_certificate_params
|
12
|
+
@danske_renew_certificate_params = danske_renew_cert_params
|
13
13
|
@danske_generic_params = danske_generic_params
|
14
14
|
|
15
15
|
# Namespaces
|
@@ -49,7 +49,10 @@ class ClientTest < ActiveSupport::TestCase
|
|
49
49
|
test "correct allowed commands for danske" do
|
50
50
|
c = Sepa::Client.new(bank: :danske)
|
51
51
|
|
52
|
-
commands =
|
52
|
+
commands = [
|
53
|
+
STANDARD_COMMANDS - [:get_user_info],
|
54
|
+
[:get_bank_certificate, :create_certificate, :renew_certificate],
|
55
|
+
].flatten
|
53
56
|
|
54
57
|
assert_same_items commands, c.allowed_commands
|
55
58
|
end
|
@@ -212,11 +215,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
212
215
|
response = client.send_request
|
213
216
|
|
214
217
|
assert response.doc.at_css('cor|getUserInfoin', cor: @cor)
|
215
|
-
|
216
|
-
Dir.chdir(SCHEMA_PATH) do
|
217
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
218
|
-
assert xsd.valid?(response.doc)
|
219
|
-
end
|
218
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
220
219
|
end
|
221
220
|
|
222
221
|
test "should_send_proper_request_with_nordea_download_file_list" do
|
@@ -225,11 +224,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
225
224
|
response = client.send_request
|
226
225
|
|
227
226
|
assert response.doc.at_css('cor|downloadFileListin', cor: @cor)
|
228
|
-
|
229
|
-
Dir.chdir(SCHEMA_PATH) do
|
230
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
231
|
-
assert xsd.valid?(response.doc)
|
232
|
-
end
|
227
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
233
228
|
end
|
234
229
|
|
235
230
|
test "should_send_proper_request_with_nordea_download_file" do
|
@@ -238,11 +233,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
238
233
|
response = client.send_request
|
239
234
|
|
240
235
|
assert response.doc.at_css('cor|downloadFilein', cor: @cor)
|
241
|
-
|
242
|
-
Dir.chdir(SCHEMA_PATH) do
|
243
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
244
|
-
assert xsd.valid?(response.doc)
|
245
|
-
end
|
236
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
246
237
|
end
|
247
238
|
|
248
239
|
test "should_send_proper_request_with_nordea_upload_file" do
|
@@ -251,11 +242,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
251
242
|
response = client.send_request
|
252
243
|
|
253
244
|
assert response.doc.at_css('cor|uploadFilein', cor: @cor)
|
254
|
-
|
255
|
-
Dir.chdir(SCHEMA_PATH) do
|
256
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
257
|
-
assert xsd.valid?(response.doc)
|
258
|
-
end
|
245
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
259
246
|
end
|
260
247
|
|
261
248
|
test 'should send proper request with nordea get certificate' do
|
@@ -263,11 +250,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
263
250
|
response = client.send_request
|
264
251
|
|
265
252
|
assert response.doc.at_css('cer|getCertificatein')
|
266
|
-
|
267
|
-
Dir.chdir(SCHEMA_PATH) do
|
268
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
269
|
-
assert xsd.valid?(response.doc)
|
270
|
-
end
|
253
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
271
254
|
end
|
272
255
|
|
273
256
|
test 'sends a proper request with nordea renew certificate' do
|
@@ -275,17 +258,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
275
258
|
response = client.send_request
|
276
259
|
|
277
260
|
assert response.doc.at('cer|getCertificatein')
|
278
|
-
|
279
|
-
errors = []
|
280
|
-
|
281
|
-
Dir.chdir(SCHEMA_PATH) do
|
282
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
283
|
-
xsd.validate(response.doc).each do |error|
|
284
|
-
errors << error
|
285
|
-
end
|
286
|
-
end
|
287
|
-
|
288
|
-
assert errors.empty?, "The following schema validations failed:\n#{errors.join("\n")}"
|
261
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
289
262
|
end
|
290
263
|
|
291
264
|
test 'should send proper request with danske download file list' do
|
@@ -293,10 +266,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
293
266
|
client = Sepa::Client.new(@danske_generic_params)
|
294
267
|
response = client.send_request
|
295
268
|
|
296
|
-
|
297
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
298
|
-
assert xsd.valid?(response.doc)
|
299
|
-
end
|
269
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
300
270
|
end
|
301
271
|
|
302
272
|
test 'should send proper request with danske download file' do
|
@@ -304,49 +274,55 @@ class ClientTest < ActiveSupport::TestCase
|
|
304
274
|
client = Sepa::Client.new(@danske_generic_params)
|
305
275
|
response = client.send_request
|
306
276
|
|
307
|
-
|
308
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
309
|
-
assert xsd.valid?(response.doc)
|
310
|
-
end
|
277
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
311
278
|
end
|
312
279
|
|
313
280
|
test 'should send proper request with danske upload file' do
|
314
281
|
client = Sepa::Client.new(@danske_generic_params)
|
315
282
|
response = client.send_request
|
316
283
|
|
317
|
-
|
318
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
319
|
-
assert xsd.valid?(response.doc)
|
320
|
-
end
|
284
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
321
285
|
end
|
322
286
|
|
323
287
|
test 'should send proper request with danske create certificate' do
|
324
288
|
client = Sepa::Client.new(@danske_create_certificate_params)
|
325
289
|
response = client.send_request
|
326
290
|
|
327
|
-
|
328
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
329
|
-
assert xsd.valid?(response.doc)
|
330
|
-
end
|
291
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
331
292
|
end
|
332
293
|
|
294
|
+
test 'sends a proper request with danske renew certificate' do
|
295
|
+
client = Sepa::Client.new(@danske_renew_certificate_params)
|
296
|
+
response = client.send_request
|
333
297
|
|
334
|
-
|
335
|
-
|
336
|
-
|
298
|
+
assert response.doc.at('pkif|RenewCertificateIn', pkif: 'http://danskebank.dk/PKI/PKIFactoryService')
|
299
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
300
|
+
end
|
337
301
|
|
338
|
-
|
339
|
-
|
340
|
-
|
302
|
+
test "signing csr is checked correctly with danske cert requests" do
|
303
|
+
[
|
304
|
+
@danske_create_certificate_params,
|
305
|
+
@danske_renew_certificate_params,
|
306
|
+
].each do |params|
|
307
|
+
params.delete(:signing_csr)
|
308
|
+
|
309
|
+
sepa = Sepa::Client.new(params)
|
310
|
+
refute sepa.valid?
|
311
|
+
assert_includes sepa.errors.messages.to_s, SIGNING_CERT_REQUEST_ERROR_MESSAGE
|
312
|
+
end
|
341
313
|
end
|
342
314
|
|
343
|
-
test "
|
344
|
-
|
345
|
-
|
315
|
+
test "encryption csr is checked correctly with danske cert requests" do
|
316
|
+
[
|
317
|
+
@danske_create_certificate_params,
|
318
|
+
@danske_renew_certificate_params,
|
319
|
+
].each do |params|
|
320
|
+
params.delete(:encryption_csr)
|
346
321
|
|
347
|
-
|
348
|
-
|
349
|
-
|
322
|
+
sepa = Sepa::Client.new(params)
|
323
|
+
refute sepa.valid?
|
324
|
+
assert_includes sepa.errors.messages.to_s, ENCRYPTION_CERT_REQUEST_ERROR_MESSAGE
|
325
|
+
end
|
350
326
|
end
|
351
327
|
|
352
328
|
test "should_check_pin_with_create_certificate" do
|
data/test/sepa/fixtures.rb
CHANGED
@@ -1,33 +1,26 @@
|
|
1
1
|
def danske_generic_params
|
2
2
|
keys_path = "#{ROOT_PATH}/test/sepa/banks/danske/keys"
|
3
3
|
|
4
|
-
|
5
|
-
|
6
|
-
|
7
|
-
|
8
|
-
encryption_private_key = File.read encryption_private_key_path
|
9
|
-
|
10
|
-
signing_certificate_path = "#{keys_path}/own_signing_cert.pem"
|
11
|
-
own_signing_certificate = File.read signing_certificate_path
|
12
|
-
|
13
|
-
encryption_certificate_path = "#{keys_path}/own_enc_cert.pem"
|
14
|
-
bank_encryption_certificate = File.read encryption_certificate_path
|
4
|
+
signing_private_key = File.read("#{keys_path}/signing_key.pem")
|
5
|
+
encryption_private_key = File.read("#{keys_path}/enc_private_key.pem")
|
6
|
+
own_signing_certificate = File.read("#{keys_path}/own_signing_cert.pem")
|
7
|
+
bank_encryption_certificate = File.read("#{keys_path}/own_enc_cert.pem")
|
15
8
|
|
16
9
|
{
|
17
10
|
bank: :danske,
|
18
|
-
signing_private_key: signing_private_key,
|
19
|
-
encryption_private_key: encryption_private_key,
|
20
11
|
command: :upload_file,
|
21
12
|
customer_id: '360817',
|
22
13
|
environment: 'test',
|
23
|
-
bank_encryption_certificate: bank_encryption_certificate,
|
24
|
-
own_signing_certificate: own_signing_certificate,
|
25
14
|
language: 'FI',
|
26
15
|
status: 'ALL',
|
27
16
|
target_id: 'DABAFIHH',
|
28
17
|
file_type: 'pain.001.001.02',
|
29
18
|
content: encode('kissa'),
|
30
19
|
file_reference: '11111111A12006030329501800000014',
|
20
|
+
own_signing_certificate: own_signing_certificate,
|
21
|
+
bank_encryption_certificate: bank_encryption_certificate,
|
22
|
+
signing_private_key: signing_private_key,
|
23
|
+
encryption_private_key: encryption_private_key,
|
31
24
|
}
|
32
25
|
end
|
33
26
|
|
@@ -378,13 +371,69 @@ CsajqZag/Aoxv/Y=
|
|
378
371
|
bank_encryption_certificate = File.read "#{DANSKE_TEST_KEYS_PATH}own_enc_cert.pem"
|
379
372
|
|
380
373
|
{
|
381
|
-
|
382
|
-
|
383
|
-
|
384
|
-
|
385
|
-
|
386
|
-
|
387
|
-
|
388
|
-
|
374
|
+
bank: :danske,
|
375
|
+
bank_encryption_certificate: bank_encryption_certificate,
|
376
|
+
command: :create_certificate,
|
377
|
+
customer_id: '360817',
|
378
|
+
environment: :test,
|
379
|
+
encryption_csr: encryption_csr,
|
380
|
+
signing_csr: signing_csr,
|
381
|
+
pin: '1234',
|
382
|
+
}
|
383
|
+
end
|
384
|
+
|
385
|
+
def danske_renew_cert_params
|
386
|
+
keys_path = "#{ROOT_PATH}/test/sepa/banks/danske/keys"
|
387
|
+
|
388
|
+
signing_private_key = File.read("#{keys_path}/signing_key.pem")
|
389
|
+
encryption_private_key = File.read("#{keys_path}/enc_private_key.pem")
|
390
|
+
own_signing_certificate = File.read("#{keys_path}/own_signing_cert.pem")
|
391
|
+
bank_encryption_certificate = File.read("#{keys_path}/own_enc_cert.pem")
|
392
|
+
|
393
|
+
encryption_csr = "-----BEGIN CERTIFICATE REQUEST-----
|
394
|
+
MIICdzCCAV8CAQEwMjEPMA0GA1UEAwwGaGVtdWxpMR8wHQYKCZImiZPyLGQBGRYP
|
395
|
+
bnV1c2thbXVpa2t1bmVuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
|
396
|
+
5aHmVXcfogDqJ3kUfK8ARzdkQ/dm9j4rHbGNh4xmlKCMUwCmmo2LOKMKvviD7qwz
|
397
|
+
n1lDsPIClbmZaxc3vFlpNj5A6YVg7SpCU/Cx9RtTY+2vWQF29RWw5UktPDALIRNC
|
398
|
+
boKuNykWqbWhwW80YOO3MXlASw2EF2nfsxLGXNmiB7kKaxPrTsNV9CO4rVIrYJj5
|
399
|
+
2+1MZSEhEQn9H9VrKgCNlDN/6LCs/TnSC7Np1jOTjo5Nen95afE0KUEbSnMw8Ihw
|
400
|
+
ymOFF0zgxiCQ1kme5fYXqCZZJOU+zS3pKO/LdnULu6/uJ1D0JWjIwWBqEwTwMqhj
|
401
|
+
NnsJaoJiJJnQtuFcVIhXEQIDAQABoAAwDQYJKoZIhvcNAQEFBQADggEBAAlVfy+G
|
402
|
+
GUPYnTfrRoBvgSMz5dR7rynQe5wxHWTtk71xbODSIZNFUntYa4tSAzaIEp65FxTj
|
403
|
+
WyGlBZcdzCPd39DJtfxeiZ8q4UKx47VCt4jIzOSpM2jvGzlUpHnm2Eh9rQHqMRye
|
404
|
+
C4T49gWBEqsTvZL+hWE9dAQq4Y+P3h9UWr49bMQNbSxERw3fDzWvcEJsSq+4Ml12
|
405
|
+
+sPV+Euz5phCzqt15v+6jfqlEgGj27k3MlF+EglX0BWduGw4RxfoOdGQNBwdXPkz
|
406
|
+
db1f0XsYTW1NUYoL8O8uxzoNcysyBW/VGP01e2LXB8whWn4xtDtaLpyt/v4ow04V
|
407
|
+
9v3lfL5ZDl1gIEY=
|
408
|
+
-----END CERTIFICATE REQUEST-----"
|
409
|
+
|
410
|
+
signing_csr = "-----BEGIN CERTIFICATE REQUEST-----
|
411
|
+
MIICdzCCAV8CAQEwMjEPMA0GA1UEAwwGaGVtdWxpMR8wHQYKCZImiZPyLGQBGRYP
|
412
|
+
bnV1c2thbXVpa2t1bmVuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
|
413
|
+
y4zgajeMzFrBR4zsJ50qo4fxHWfjdCmI5nwLbKqKhSKB15JBdRmh/Wz0Gi1qOvER
|
414
|
+
x9wS5c/1pMr1ARcVUvz2425ZNV77AAQMGUZpLxP9N6QWK39u4VemoecdPfNYv/tt
|
415
|
+
qk1cJFO1aNNmIMrDzBZEzQH/Mf4QbiqsaSvuVay8mjVEW3she4FbcrhNnhlm3PS7
|
416
|
+
XOm0UF2TiCjrM4enCI2XhTzKnSxONiM8KubKEAEOXPDAYGRwn+dik30qYwT5kMbG
|
417
|
+
tzggHPsiwkBUDEcNeMuMGRKNxP3i03DA4wGSJZu3A61TcYVLihj9hEDnybe7Dw0h
|
418
|
+
eNmyqoqp/0gr89rxlAANNwIDAQABoAAwDQYJKoZIhvcNAQEFBQADggEBAEbyXe6f
|
419
|
+
aBGbaSldlIceYyxIXVqBRwVuE22vvk6to1f+QYrWj+4IexD0TBdfpcpKATnOjqEH
|
420
|
+
sbksB0HOKZmFDCqNZamw1458DtdtSPpOn5EyX9BX6K2hExmj5CV1vEORB8dQ4lBi
|
421
|
+
zjrpAOh422NQ3galu1vfrPVvRS8lN4t+zJUlBoCUwPlm5AmH88dJCXDHTxDrwxxv
|
422
|
+
6UPUROxE2p+1TyHueUmfMKvjySnt8IIfoEvz4q/EouIbL2lDJwXOwX+1fx4Rva6t
|
423
|
+
bx1hmt5Eihy1lORQR4PE4xaOP5TCqtxP0+snuGqRuBHhrDk4mowWEJbvFWlONT5H
|
424
|
+
CsajqZag/Aoxv/Y=
|
425
|
+
-----END CERTIFICATE REQUEST-----"
|
426
|
+
|
427
|
+
{
|
428
|
+
bank: :danske,
|
429
|
+
command: :renew_certificate,
|
430
|
+
signing_csr: signing_csr,
|
431
|
+
encryption_csr: encryption_csr,
|
432
|
+
customer_id: '360817',
|
433
|
+
environment: :test,
|
434
|
+
own_signing_certificate: own_signing_certificate,
|
435
|
+
bank_encryption_certificate: bank_encryption_certificate,
|
436
|
+
signing_private_key: signing_private_key,
|
437
|
+
encryption_private_key: encryption_private_key,
|
389
438
|
}
|
390
439
|
end
|
data/test/sepa/sepa_test.rb
CHANGED
data/test_client/test_client.rb
CHANGED
@@ -4,24 +4,29 @@ module Testing
|
|
4
4
|
require_relative "data/certs"
|
5
5
|
require_relative "data/params"
|
6
6
|
|
7
|
-
content_clients =
|
8
|
-
nordea_download_file
|
9
|
-
nordea_download_file_list
|
10
|
-
nordea_get_user_info
|
11
|
-
nordea_upload_file
|
12
|
-
op_download_file
|
13
|
-
op_download_file_list
|
14
|
-
op_upload_file
|
15
|
-
}
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
7
|
+
content_clients = [
|
8
|
+
:nordea_download_file,
|
9
|
+
:nordea_download_file_list,
|
10
|
+
:nordea_get_user_info,
|
11
|
+
:nordea_upload_file,
|
12
|
+
:op_download_file,
|
13
|
+
:op_download_file_list,
|
14
|
+
:op_upload_file,
|
15
|
+
].each_with_object({}) do |i, a|
|
16
|
+
a[i] = Sepa::Client.new("#{i.to_s.upcase}_PARAMS".constantize)
|
17
|
+
end
|
18
|
+
|
19
|
+
certificate_clients = [
|
20
|
+
:danske_create_cert,
|
21
|
+
:danske_get_bank_cert,
|
22
|
+
:danske_renew_cert,
|
23
|
+
:nordea_get_certificate,
|
24
|
+
:nordea_renew_certificate,
|
25
|
+
:op_get_certificate,
|
26
|
+
:op_get_service_certificates,
|
27
|
+
].each_with_object({}) do |i, a|
|
28
|
+
a[i] = Sepa::Client.new("#{i.to_s.upcase}_PARAMS".constantize)
|
29
|
+
end
|
25
30
|
|
26
31
|
content_clients.each do |name, client|
|
27
32
|
response = client.send_request
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: sepafm
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.1.
|
4
|
+
version: 1.1.6
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Joni Kanerva
|
@@ -10,7 +10,7 @@ authors:
|
|
10
10
|
autorequire:
|
11
11
|
bindir: bin
|
12
12
|
cert_chain: []
|
13
|
-
date: 2016-
|
13
|
+
date: 2016-07-12 00:00:00.000000000 Z
|
14
14
|
dependencies:
|
15
15
|
- !ruby/object:Gem::Dependency
|
16
16
|
name: activemodel
|
@@ -74,14 +74,14 @@ dependencies:
|
|
74
74
|
requirements:
|
75
75
|
- - "~>"
|
76
76
|
- !ruby/object:Gem::Version
|
77
|
-
version: '0.
|
77
|
+
version: '0.6'
|
78
78
|
type: :development
|
79
79
|
prerelease: false
|
80
80
|
version_requirements: !ruby/object:Gem::Requirement
|
81
81
|
requirements:
|
82
82
|
- - "~>"
|
83
83
|
- !ruby/object:Gem::Version
|
84
|
-
version: '0.
|
84
|
+
version: '0.6'
|
85
85
|
- !ruby/object:Gem::Dependency
|
86
86
|
name: dotenv
|
87
87
|
requirement: !ruby/object:Gem::Requirement
|
@@ -102,28 +102,28 @@ dependencies:
|
|
102
102
|
requirements:
|
103
103
|
- - "~>"
|
104
104
|
- !ruby/object:Gem::Version
|
105
|
-
version: '5.
|
105
|
+
version: '5.9'
|
106
106
|
type: :development
|
107
107
|
prerelease: false
|
108
108
|
version_requirements: !ruby/object:Gem::Requirement
|
109
109
|
requirements:
|
110
110
|
- - "~>"
|
111
111
|
- !ruby/object:Gem::Version
|
112
|
-
version: '5.
|
112
|
+
version: '5.9'
|
113
113
|
- !ruby/object:Gem::Dependency
|
114
114
|
name: rake
|
115
115
|
requirement: !ruby/object:Gem::Requirement
|
116
116
|
requirements:
|
117
117
|
- - "~>"
|
118
118
|
- !ruby/object:Gem::Version
|
119
|
-
version: '11.
|
119
|
+
version: '11.2'
|
120
120
|
type: :development
|
121
121
|
prerelease: false
|
122
122
|
version_requirements: !ruby/object:Gem::Requirement
|
123
123
|
requirements:
|
124
124
|
- - "~>"
|
125
125
|
- !ruby/object:Gem::Version
|
126
|
-
version: '11.
|
126
|
+
version: '11.2'
|
127
127
|
- !ruby/object:Gem::Dependency
|
128
128
|
name: rubyntlm
|
129
129
|
requirement: !ruby/object:Gem::Requirement
|
@@ -147,7 +147,6 @@ extra_rdoc_files: []
|
|
147
147
|
files:
|
148
148
|
- ".gitignore"
|
149
149
|
- ".rubocop.yml"
|
150
|
-
- ".travis.yml"
|
151
150
|
- ".yardopts"
|
152
151
|
- Gemfile
|
153
152
|
- LICENSE
|
@@ -197,6 +196,7 @@ files:
|
|
197
196
|
- lib/sepa/xml_schemas/xmldsig-core-schema.xsd
|
198
197
|
- lib/sepa/xml_templates/application_request/danske/create_certificate.xml
|
199
198
|
- lib/sepa/xml_templates/application_request/danske/get_bank_certificate.xml
|
199
|
+
- lib/sepa/xml_templates/application_request/danske/renew_certificate.xml
|
200
200
|
- lib/sepa/xml_templates/application_request/download_file.xml
|
201
201
|
- lib/sepa/xml_templates/application_request/download_file_list.xml
|
202
202
|
- lib/sepa/xml_templates/application_request/encrypted_request.xml
|
@@ -208,6 +208,7 @@ files:
|
|
208
208
|
- lib/sepa/xml_templates/application_request/upload_file.xml
|
209
209
|
- lib/sepa/xml_templates/soap/danske/create_certificate.xml
|
210
210
|
- lib/sepa/xml_templates/soap/danske/get_bank_certificate.xml
|
211
|
+
- lib/sepa/xml_templates/soap/danske/renew_certificate.xml
|
211
212
|
- lib/sepa/xml_templates/soap/download_file.xml
|
212
213
|
- lib/sepa/xml_templates/soap/download_file_list.xml
|
213
214
|
- lib/sepa/xml_templates/soap/get_user_info.xml
|
@@ -226,18 +227,16 @@ files:
|
|
226
227
|
- test/sepa/banks/danske/danske_certificate_application_request_test.rb
|
227
228
|
- test/sepa/banks/danske/danske_generic_soap_builder_test.rb
|
228
229
|
- test/sepa/banks/danske/danske_get_bank_cert_test.rb
|
230
|
+
- test/sepa/banks/danske/danske_renew_cert_application_request_test.rb
|
231
|
+
- test/sepa/banks/danske/danske_renew_cert_request_soap_builder_test.rb
|
229
232
|
- test/sepa/banks/danske/danske_response_test.rb
|
230
233
|
- test/sepa/banks/danske/keys/bank_encryption_cert.pem
|
231
234
|
- test/sepa/banks/danske/keys/bank_root_cert.pem
|
232
235
|
- test/sepa/banks/danske/keys/bank_signing_cert.pem
|
233
|
-
- test/sepa/banks/danske/keys/danske_encryption.crt
|
234
236
|
- test/sepa/banks/danske/keys/enc_private_key.pem
|
235
|
-
- test/sepa/banks/danske/keys/encryption_pkcs.csr
|
236
237
|
- test/sepa/banks/danske/keys/own_enc_cert.pem
|
237
238
|
- test/sepa/banks/danske/keys/own_signing_cert.pem
|
238
239
|
- test/sepa/banks/danske/keys/signing_key.pem
|
239
|
-
- test/sepa/banks/danske/keys/signing_pkcs.csr
|
240
|
-
- test/sepa/banks/danske/keys/signing_private_key.pem
|
241
240
|
- test/sepa/banks/danske/responses/create_cert.xml
|
242
241
|
- test/sepa/banks/danske/responses/download_file_list.xml
|
243
242
|
- test/sepa/banks/danske/responses/get_bank_cert.xml
|
@@ -289,7 +288,7 @@ required_ruby_version: !ruby/object:Gem::Requirement
|
|
289
288
|
requirements:
|
290
289
|
- - ">="
|
291
290
|
- !ruby/object:Gem::Version
|
292
|
-
version: 2.
|
291
|
+
version: 2.2.5
|
293
292
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
294
293
|
requirements:
|
295
294
|
- - ">="
|
@@ -297,7 +296,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
297
296
|
version: '0'
|
298
297
|
requirements: []
|
299
298
|
rubyforge_project:
|
300
|
-
rubygems_version: 2.6.
|
299
|
+
rubygems_version: 2.6.6
|
301
300
|
signing_key:
|
302
301
|
specification_version: 4
|
303
302
|
summary: SEPA Financial Messages
|
@@ -308,18 +307,16 @@ test_files:
|
|
308
307
|
- test/sepa/banks/danske/danske_certificate_application_request_test.rb
|
309
308
|
- test/sepa/banks/danske/danske_generic_soap_builder_test.rb
|
310
309
|
- test/sepa/banks/danske/danske_get_bank_cert_test.rb
|
310
|
+
- test/sepa/banks/danske/danske_renew_cert_application_request_test.rb
|
311
|
+
- test/sepa/banks/danske/danske_renew_cert_request_soap_builder_test.rb
|
311
312
|
- test/sepa/banks/danske/danske_response_test.rb
|
312
313
|
- test/sepa/banks/danske/keys/bank_encryption_cert.pem
|
313
314
|
- test/sepa/banks/danske/keys/bank_root_cert.pem
|
314
315
|
- test/sepa/banks/danske/keys/bank_signing_cert.pem
|
315
|
-
- test/sepa/banks/danske/keys/danske_encryption.crt
|
316
316
|
- test/sepa/banks/danske/keys/enc_private_key.pem
|
317
|
-
- test/sepa/banks/danske/keys/encryption_pkcs.csr
|
318
317
|
- test/sepa/banks/danske/keys/own_enc_cert.pem
|
319
318
|
- test/sepa/banks/danske/keys/own_signing_cert.pem
|
320
319
|
- test/sepa/banks/danske/keys/signing_key.pem
|
321
|
-
- test/sepa/banks/danske/keys/signing_pkcs.csr
|
322
|
-
- test/sepa/banks/danske/keys/signing_private_key.pem
|
323
320
|
- test/sepa/banks/danske/responses/create_cert.xml
|
324
321
|
- test/sepa/banks/danske/responses/download_file_list.xml
|
325
322
|
- test/sepa/banks/danske/responses/get_bank_cert.xml
|
data/.travis.yml
DELETED
@@ -1,16 +0,0 @@
|
|
1
|
-
language: ruby
|
2
|
-
sudo: false
|
3
|
-
rvm:
|
4
|
-
- 2.1.7
|
5
|
-
- 2.2.3
|
6
|
-
notifications:
|
7
|
-
email: false
|
8
|
-
flowdock:
|
9
|
-
secure: "pzq6Pl9RVGycf0gxE4Cewh8LlQs3fbAKxpzhz2OWMghYkMDci9yk9qFcjl9AJ3h8XUU/2lgCdtpQmCJM3reW4zc/1goK3kQxRemIThwaBeonW5sKmPzD/TOGSzvmBGnEO7olXsOZBGiWvNnzQ4sWIzv8VjCOkFrEWabRkfEvzfg="
|
10
|
-
addons:
|
11
|
-
code_climate:
|
12
|
-
repo_token:
|
13
|
-
secure: "Wpl0vRyUgEfrvlF35U8LAgpvPttB/+r3lLJhpdGAtFrdDhCgtJJt/qFadWVLcyewGosYBd5XJWZvI6hTARTgmL3imlVdwoZRBu+flUQr3lv3nDVQPMPKnYj9iFi/zLKGR3nnM7k/d85Bm8rNIPw5w+iAE/Z8cTu5YrHqZ+XlxwI="
|
14
|
-
script:
|
15
|
-
- bundle install
|
16
|
-
- bundle exec rake
|
@@ -1,24 +0,0 @@
|
|
1
|
-
-----BEGIN CERTIFICATE-----
|
2
|
-
MIIEATCCAumgAwIBAgIFAQjv8bMwDQYJKoZIhvcNAQELBQAwgZgxEDAOBgNVBAMT
|
3
|
-
B0RCR1JPT1QxCzAJBgNVBAYTAkRLMRMwEQYDVQQHEwpDb3BlbmhhZ2VuMRAwDgYD
|
4
|
-
VQQIEwdEZW5tYXJrMRowGAYDVQQKExFEYW5za2UgQmFuayBHcm91cDEaMBgGA1UE
|
5
|
-
CxMRRGFuc2tlIEJhbmsgR3JvdXAxGDAWBgNVBAUTDzYxMTI2MjI4MTExMDAwMjAe
|
6
|
-
Fw0xMjA4MDEwMDAwMDBaFw0xNDEwMzEwMDAwMDBaMIGYMRAwDgYDVQQDEwdEUENS
|
7
|
-
WVBUMQswCQYDVQQGEwJESzETMBEGA1UEBxMKQ29wZW5oYWdlbjEQMA4GA1UECBMH
|
8
|
-
RGVubWFyazEaMBgGA1UEChMRRGFuc2tlIEJhbmsgR3JvdXAxGjAYBgNVBAsTEURh
|
9
|
-
bnNrZSBCYW5rIEdyb3VwMRgwFgYDVQQFEw82MTEyNjIyODQ5MTAwMDMwggEgMA0G
|
10
|
-
CSqGSIb3DQEBAQUAA4IBDQAwggEIAoIBAQC/kHrOvHOueBsit9drxIHpaD7mXINy
|
11
|
-
pXS/l9PbbOZ0lZKVEfW9gtG8xk9XggsPXHJMF/PXpG6mveXvPu9WW/XpryAUqGfv
|
12
|
-
YsC7Px3ixaJb2EMOL+2mJYd0v5HKg5RuYkQ82k3K01hMNEGYs0OotjNVAimQcTLt
|
13
|
-
VPDGBjK5BUAiwady9LpI6afo7roJWnRmsvSvinDgBqswnfCvUfSfM8cZyhnLLC2u
|
14
|
-
j1kBHAD/5xpllmS3aq1M8LqFkBYcCE5PdPmFWhGUumZ/Y5qLjDgcPMAPvUaKLqOs
|
15
|
-
h22jvPCZ0pm17eV0bSQzWe5e0zkgCYAepuFRazSlkJQYBdS47Mp68dY5AgEDo1Iw
|
16
|
-
UDAfBgNVHSMEGDAWgBSE+uW/3pFJZt/FilLDs7ezIBzHbTAdBgNVHQ4EFgQUP6wH
|
17
|
-
VNOmznu212c08M3oeYjeXW4wDgYDVR0PAQH/BAQDAgQwMA0GCSqGSIb3DQEBCwUA
|
18
|
-
A4IBAQAvJBfPug+ixGL/zWUnKMweV80atZXMjHJEn4mOE+iUkCNONLImMMt6MXJy
|
19
|
-
snJViL1gL5xMrka6A62PLLsVkl79kxDDbzXMPfGt5/mB9L7CMpyzaID0acDii3rs
|
20
|
-
ZwT3Wxpnate6wowN4zpmXgpCpTDGbxjuVRiOArsjQblerhfxnD/UAieZ1IWozIAN
|
21
|
-
s6SVms/TuOB+bODUr06ITxBkDJhizOJxjsXRIAtwZvvrH4qGjJz5qFcPb3nz4Txw
|
22
|
-
swU8X6yvbtqF+q4aAKPA6ZydnGZFQSoSzNJtcF28T1ItxEHN3+xyQqXpTgFviiuL
|
23
|
-
277LaAl9YUFFnSgeh7GiFitWJPfD
|
24
|
-
-----END CERTIFICATE-----
|
Binary file
|
Binary file
|
@@ -1,27 +0,0 @@
|
|
1
|
-
-----BEGIN RSA PRIVATE KEY-----
|
2
|
-
MIIEogIBAAKCAQEAy4zgajeMzFrBR4zsJ50qo4fxHWfjdCmI5nwLbKqKhSKB15JB
|
3
|
-
dRmh/Wz0Gi1qOvERx9wS5c/1pMr1ARcVUvz2425ZNV77AAQMGUZpLxP9N6QWK39u
|
4
|
-
4VemoecdPfNYv/ttqk1cJFO1aNNmIMrDzBZEzQH/Mf4QbiqsaSvuVay8mjVEW3sh
|
5
|
-
e4FbcrhNnhlm3PS7XOm0UF2TiCjrM4enCI2XhTzKnSxONiM8KubKEAEOXPDAYGRw
|
6
|
-
n+dik30qYwT5kMbGtzggHPsiwkBUDEcNeMuMGRKNxP3i03DA4wGSJZu3A61TcYVL
|
7
|
-
ihj9hEDnybe7Dw0heNmyqoqp/0gr89rxlAANNwIDAQABAoIBAHWasnqMF9xmPy/A
|
8
|
-
2xzUMLOFMqkjwgX2jXNljhA9xITBeDV9+jXXFoHetnZ9cNgXOoe3vm9rJOkOnln/
|
9
|
-
5UEqiNbEheRROUI8FGVyCgm6Sd4g/vIo0X5+7vayGnIVrFxXv3fa9HbEqpajNWmS
|
10
|
-
3WeIIj40fiZ7PTD5lN27FRwJDnslbMUwl/QSyJmWuiogZ/wR2oQmmTtFXRT7CGD6
|
11
|
-
4lJAnjIXpk5+A11qzw3B0C16jonF3EQzD2qdgjIJKNusYjrnaqP5EAvaqx/40sx2
|
12
|
-
qoBBVB46AaoqBeQn4uDDRJGaZ3VL+4qCPFFfQ+WRYCBTK7W2jMf7RVom9DbkH2op
|
13
|
-
FHn1ckECgYEA+WsZOazUreVdbBf6gdV/pM9IfN/7pP3i+/fopJe4xnLenwtH+5oF
|
14
|
-
4hhyflRejTIBsFi4Cz9zi/GqZFFTo33CXWI+qFcg5+0SWF/BROQYA5AXRnyl8zvE
|
15
|
-
bVg6kwlULR7rcd0VDKHelqkGz5SUCnoYr458ZaDptK53Cbu0E1LEgGECgYEA0Ovs
|
16
|
-
sQUBrzg2mNo3FZGjDtiIVYFji5X5t4X38lXgTORhq2xvPu7MftqmqijwfbC9+n8I
|
17
|
-
wjuNXmLzodh13JDvE8cBUugNAsK1lJpHVWx0fheyGzwDiG8dwoRqFGvsLcB4BRWl
|
18
|
-
k5pkpgmon4j1ZCM4zrYi7qICfOtY/3P9JjzI1JcCgYB5oN+JP53rOzmml77ih5Ga
|
19
|
-
dja8JqHZoLGK/Cbn9ND3fVbQqjitGjwaOJ/EuTHumt819t2xJn0bVnsoNnyZ8p7Q
|
20
|
-
2TMC9pImZ3aVwARIqw6G1kJzbh+jEJdGV0shHuB8rGJWgWBda6ZXRA/9NFBJF6do
|
21
|
-
HQzOpnyxTo7gITe8YJVQoQKBgBuiqYt86w0fdXFgpBqxSg1jrR0KYX2MWBzjlrmy
|
22
|
-
jFn/d7/yNwDvG5PIHnWxtqYZo/enqCPxNrD+i9WjyWtkrItELrOlyFrOILDIe5kc
|
23
|
-
IIixX7jkhl8cu6YIV/Pdlr8yj220wFM3AAtKiciYmEUnt5L4WsSQH54gj4Qy9pCB
|
24
|
-
R9t/AoGAJRlYneV2guAZ+ba7E7zppvNa/8E78k6KKGpk3/LameGUjcCivZuXziXF
|
25
|
-
DF5/ZRU4mxuDmKs9vg2e75eD729pnMdQDKYBS34DRWZHJwpQJlvQPR3hJbaEx/GZ
|
26
|
-
94+HtAa9MRBIcMFNzHEjm4oNlsj+X8UiW4R+4HQEjVWSBIQvYpY=
|
27
|
-
-----END RSA PRIVATE KEY-----
|