sepafm 1.1.5 → 1.1.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (42) hide show
  1. checksums.yaml +4 -4
  2. data/.rubocop.yml +3 -0
  3. data/lib/sepa/application_request.rb +17 -8
  4. data/lib/sepa/attribute_checks.rb +23 -26
  5. data/lib/sepa/banks/danske/danske_response.rb +29 -41
  6. data/lib/sepa/banks/danske/soap_danske.rb +30 -23
  7. data/lib/sepa/client.rb +8 -11
  8. data/lib/sepa/response.rb +13 -23
  9. data/lib/sepa/utilities.rb +2 -6
  10. data/lib/sepa/version.rb +1 -1
  11. data/lib/sepa/xml_schemas/danske_pki.xsd +1 -1
  12. data/lib/sepa/xml_templates/application_request/danske/renew_certificate.xml +33 -0
  13. data/lib/sepa/xml_templates/soap/danske/renew_certificate.xml +17 -0
  14. data/readme.md +3 -3
  15. data/sepafm.gemspec +4 -4
  16. data/test/custom_assertions.rb +21 -0
  17. data/test/sepa/banks/danske/danske_cert_soap_builder_test.rb +1 -5
  18. data/test/sepa/banks/danske/danske_certificate_application_request_test.rb +6 -8
  19. data/test/sepa/banks/danske/danske_generic_soap_builder_test.rb +7 -23
  20. data/test/sepa/banks/danske/danske_get_bank_cert_test.rb +3 -13
  21. data/test/sepa/banks/danske/danske_renew_cert_application_request_test.rb +32 -0
  22. data/test/sepa/banks/danske/danske_renew_cert_request_soap_builder_test.rb +41 -0
  23. data/test/sepa/banks/nordea/nordea_application_request_test.rb +4 -16
  24. data/test/sepa/banks/nordea/nordea_cert_application_request_test.rb +1 -5
  25. data/test/sepa/banks/nordea/nordea_cert_request_soap_builder_test.rb +1 -4
  26. data/test/sepa/banks/nordea/nordea_generic_soap_builder_test.rb +7 -23
  27. data/test/sepa/banks/nordea/nordea_renew_cert_application_request_test.rb +1 -10
  28. data/test/sepa/banks/nordea/nordea_renew_cert_request_soap_builder_test.rb +1 -10
  29. data/test/sepa/banks/op/op_application_request_test.rb +3 -30
  30. data/test/sepa/banks/op/op_cert_application_request_test.rb +1 -10
  31. data/test/sepa/banks/op/op_cert_request_soap_builder_test.rb +1 -10
  32. data/test/sepa/banks/op/op_generic_soap_builder_test.rb +2 -20
  33. data/test/sepa/client_test.rb +42 -66
  34. data/test/sepa/fixtures.rb +72 -23
  35. data/test/sepa/sepa_test.rb +1 -1
  36. data/test_client/test_client.rb +23 -18
  37. metadata +16 -19
  38. data/.travis.yml +0 -16
  39. data/test/sepa/banks/danske/keys/danske_encryption.crt +0 -24
  40. data/test/sepa/banks/danske/keys/encryption_pkcs.csr +0 -0
  41. data/test/sepa/banks/danske/keys/signing_pkcs.csr +0 -0
  42. data/test/sepa/banks/danske/keys/signing_private_key.pem +0 -27
@@ -4,12 +4,12 @@ class ClientTest < ActiveSupport::TestCase
4
4
  include Sepa::ErrorMessages
5
5
 
6
6
  def setup
7
-
8
7
  # Get params hashes from fixtures for different banks and for different request types
9
8
  @nordea_generic_params = nordea_generic_params
10
9
  @nordea_get_certificate_params = nordea_get_certificate_params
11
10
  @nordea_renew_certificate_params = nordea_get_certificate_params
12
11
  @danske_create_certificate_params = danske_create_certificate_params
12
+ @danske_renew_certificate_params = danske_renew_cert_params
13
13
  @danske_generic_params = danske_generic_params
14
14
 
15
15
  # Namespaces
@@ -49,7 +49,10 @@ class ClientTest < ActiveSupport::TestCase
49
49
  test "correct allowed commands for danske" do
50
50
  c = Sepa::Client.new(bank: :danske)
51
51
 
52
- commands = STANDARD_COMMANDS - [:get_user_info] + [:get_bank_certificate, :create_certificate]
52
+ commands = [
53
+ STANDARD_COMMANDS - [:get_user_info],
54
+ [:get_bank_certificate, :create_certificate, :renew_certificate],
55
+ ].flatten
53
56
 
54
57
  assert_same_items commands, c.allowed_commands
55
58
  end
@@ -212,11 +215,7 @@ class ClientTest < ActiveSupport::TestCase
212
215
  response = client.send_request
213
216
 
214
217
  assert response.doc.at_css('cor|getUserInfoin', cor: @cor)
215
-
216
- Dir.chdir(SCHEMA_PATH) do
217
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
218
- assert xsd.valid?(response.doc)
219
- end
218
+ assert_valid_against_schema 'soap.xsd', response.doc
220
219
  end
221
220
 
222
221
  test "should_send_proper_request_with_nordea_download_file_list" do
@@ -225,11 +224,7 @@ class ClientTest < ActiveSupport::TestCase
225
224
  response = client.send_request
226
225
 
227
226
  assert response.doc.at_css('cor|downloadFileListin', cor: @cor)
228
-
229
- Dir.chdir(SCHEMA_PATH) do
230
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
231
- assert xsd.valid?(response.doc)
232
- end
227
+ assert_valid_against_schema 'soap.xsd', response.doc
233
228
  end
234
229
 
235
230
  test "should_send_proper_request_with_nordea_download_file" do
@@ -238,11 +233,7 @@ class ClientTest < ActiveSupport::TestCase
238
233
  response = client.send_request
239
234
 
240
235
  assert response.doc.at_css('cor|downloadFilein', cor: @cor)
241
-
242
- Dir.chdir(SCHEMA_PATH) do
243
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
244
- assert xsd.valid?(response.doc)
245
- end
236
+ assert_valid_against_schema 'soap.xsd', response.doc
246
237
  end
247
238
 
248
239
  test "should_send_proper_request_with_nordea_upload_file" do
@@ -251,11 +242,7 @@ class ClientTest < ActiveSupport::TestCase
251
242
  response = client.send_request
252
243
 
253
244
  assert response.doc.at_css('cor|uploadFilein', cor: @cor)
254
-
255
- Dir.chdir(SCHEMA_PATH) do
256
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
257
- assert xsd.valid?(response.doc)
258
- end
245
+ assert_valid_against_schema 'soap.xsd', response.doc
259
246
  end
260
247
 
261
248
  test 'should send proper request with nordea get certificate' do
@@ -263,11 +250,7 @@ class ClientTest < ActiveSupport::TestCase
263
250
  response = client.send_request
264
251
 
265
252
  assert response.doc.at_css('cer|getCertificatein')
266
-
267
- Dir.chdir(SCHEMA_PATH) do
268
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
269
- assert xsd.valid?(response.doc)
270
- end
253
+ assert_valid_against_schema 'soap.xsd', response.doc
271
254
  end
272
255
 
273
256
  test 'sends a proper request with nordea renew certificate' do
@@ -275,17 +258,7 @@ class ClientTest < ActiveSupport::TestCase
275
258
  response = client.send_request
276
259
 
277
260
  assert response.doc.at('cer|getCertificatein')
278
-
279
- errors = []
280
-
281
- Dir.chdir(SCHEMA_PATH) do
282
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
283
- xsd.validate(response.doc).each do |error|
284
- errors << error
285
- end
286
- end
287
-
288
- assert errors.empty?, "The following schema validations failed:\n#{errors.join("\n")}"
261
+ assert_valid_against_schema 'soap.xsd', response.doc
289
262
  end
290
263
 
291
264
  test 'should send proper request with danske download file list' do
@@ -293,10 +266,7 @@ class ClientTest < ActiveSupport::TestCase
293
266
  client = Sepa::Client.new(@danske_generic_params)
294
267
  response = client.send_request
295
268
 
296
- Dir.chdir(SCHEMA_PATH) do
297
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
298
- assert xsd.valid?(response.doc)
299
- end
269
+ assert_valid_against_schema 'soap.xsd', response.doc
300
270
  end
301
271
 
302
272
  test 'should send proper request with danske download file' do
@@ -304,49 +274,55 @@ class ClientTest < ActiveSupport::TestCase
304
274
  client = Sepa::Client.new(@danske_generic_params)
305
275
  response = client.send_request
306
276
 
307
- Dir.chdir(SCHEMA_PATH) do
308
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
309
- assert xsd.valid?(response.doc)
310
- end
277
+ assert_valid_against_schema 'soap.xsd', response.doc
311
278
  end
312
279
 
313
280
  test 'should send proper request with danske upload file' do
314
281
  client = Sepa::Client.new(@danske_generic_params)
315
282
  response = client.send_request
316
283
 
317
- Dir.chdir(SCHEMA_PATH) do
318
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
319
- assert xsd.valid?(response.doc)
320
- end
284
+ assert_valid_against_schema 'soap.xsd', response.doc
321
285
  end
322
286
 
323
287
  test 'should send proper request with danske create certificate' do
324
288
  client = Sepa::Client.new(@danske_create_certificate_params)
325
289
  response = client.send_request
326
290
 
327
- Dir.chdir(SCHEMA_PATH) do
328
- xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
329
- assert xsd.valid?(response.doc)
330
- end
291
+ assert_valid_against_schema 'soap.xsd', response.doc
331
292
  end
332
293
 
294
+ test 'sends a proper request with danske renew certificate' do
295
+ client = Sepa::Client.new(@danske_renew_certificate_params)
296
+ response = client.send_request
333
297
 
334
- test "should_check_signing_cert_request_with_create_certificate" do
335
- @danske_create_certificate_params[:command] = :create_certificate
336
- @danske_create_certificate_params.delete(:signing_csr)
298
+ assert response.doc.at('pkif|RenewCertificateIn', pkif: 'http://danskebank.dk/PKI/PKIFactoryService')
299
+ assert_valid_against_schema 'soap.xsd', response.doc
300
+ end
337
301
 
338
- sepa = Sepa::Client.new(@danske_create_certificate_params)
339
- refute sepa.valid?
340
- assert_includes sepa.errors.messages.to_s, SIGNING_CERT_REQUEST_ERROR_MESSAGE
302
+ test "signing csr is checked correctly with danske cert requests" do
303
+ [
304
+ @danske_create_certificate_params,
305
+ @danske_renew_certificate_params,
306
+ ].each do |params|
307
+ params.delete(:signing_csr)
308
+
309
+ sepa = Sepa::Client.new(params)
310
+ refute sepa.valid?
311
+ assert_includes sepa.errors.messages.to_s, SIGNING_CERT_REQUEST_ERROR_MESSAGE
312
+ end
341
313
  end
342
314
 
343
- test "should_check_encryption_cert_request_with_create_certificate" do
344
- @danske_create_certificate_params[:command] = :create_certificate
345
- @danske_create_certificate_params.delete(:encryption_csr)
315
+ test "encryption csr is checked correctly with danske cert requests" do
316
+ [
317
+ @danske_create_certificate_params,
318
+ @danske_renew_certificate_params,
319
+ ].each do |params|
320
+ params.delete(:encryption_csr)
346
321
 
347
- sepa = Sepa::Client.new(@danske_create_certificate_params)
348
- refute sepa.valid?
349
- assert_includes sepa.errors.messages.to_s, ENCRYPTION_CERT_REQUEST_ERROR_MESSAGE
322
+ sepa = Sepa::Client.new(params)
323
+ refute sepa.valid?
324
+ assert_includes sepa.errors.messages.to_s, ENCRYPTION_CERT_REQUEST_ERROR_MESSAGE
325
+ end
350
326
  end
351
327
 
352
328
  test "should_check_pin_with_create_certificate" do
@@ -1,33 +1,26 @@
1
1
  def danske_generic_params
2
2
  keys_path = "#{ROOT_PATH}/test/sepa/banks/danske/keys"
3
3
 
4
- signing_private_key_path = "#{keys_path}/signing_key.pem"
5
- signing_private_key = File.read signing_private_key_path
6
-
7
- encryption_private_key_path = "#{keys_path}/enc_private_key.pem"
8
- encryption_private_key = File.read encryption_private_key_path
9
-
10
- signing_certificate_path = "#{keys_path}/own_signing_cert.pem"
11
- own_signing_certificate = File.read signing_certificate_path
12
-
13
- encryption_certificate_path = "#{keys_path}/own_enc_cert.pem"
14
- bank_encryption_certificate = File.read encryption_certificate_path
4
+ signing_private_key = File.read("#{keys_path}/signing_key.pem")
5
+ encryption_private_key = File.read("#{keys_path}/enc_private_key.pem")
6
+ own_signing_certificate = File.read("#{keys_path}/own_signing_cert.pem")
7
+ bank_encryption_certificate = File.read("#{keys_path}/own_enc_cert.pem")
15
8
 
16
9
  {
17
10
  bank: :danske,
18
- signing_private_key: signing_private_key,
19
- encryption_private_key: encryption_private_key,
20
11
  command: :upload_file,
21
12
  customer_id: '360817',
22
13
  environment: 'test',
23
- bank_encryption_certificate: bank_encryption_certificate,
24
- own_signing_certificate: own_signing_certificate,
25
14
  language: 'FI',
26
15
  status: 'ALL',
27
16
  target_id: 'DABAFIHH',
28
17
  file_type: 'pain.001.001.02',
29
18
  content: encode('kissa'),
30
19
  file_reference: '11111111A12006030329501800000014',
20
+ own_signing_certificate: own_signing_certificate,
21
+ bank_encryption_certificate: bank_encryption_certificate,
22
+ signing_private_key: signing_private_key,
23
+ encryption_private_key: encryption_private_key,
31
24
  }
32
25
  end
33
26
 
@@ -378,13 +371,69 @@ CsajqZag/Aoxv/Y=
378
371
  bank_encryption_certificate = File.read "#{DANSKE_TEST_KEYS_PATH}own_enc_cert.pem"
379
372
 
380
373
  {
381
- bank: :danske,
382
- bank_encryption_certificate: bank_encryption_certificate,
383
- command: :create_certificate,
384
- customer_id: '360817',
385
- environment: 'test',
386
- encryption_csr: encryption_csr,
387
- signing_csr: signing_csr,
388
- pin: '1234',
374
+ bank: :danske,
375
+ bank_encryption_certificate: bank_encryption_certificate,
376
+ command: :create_certificate,
377
+ customer_id: '360817',
378
+ environment: :test,
379
+ encryption_csr: encryption_csr,
380
+ signing_csr: signing_csr,
381
+ pin: '1234',
382
+ }
383
+ end
384
+
385
+ def danske_renew_cert_params
386
+ keys_path = "#{ROOT_PATH}/test/sepa/banks/danske/keys"
387
+
388
+ signing_private_key = File.read("#{keys_path}/signing_key.pem")
389
+ encryption_private_key = File.read("#{keys_path}/enc_private_key.pem")
390
+ own_signing_certificate = File.read("#{keys_path}/own_signing_cert.pem")
391
+ bank_encryption_certificate = File.read("#{keys_path}/own_enc_cert.pem")
392
+
393
+ encryption_csr = "-----BEGIN CERTIFICATE REQUEST-----
394
+ MIICdzCCAV8CAQEwMjEPMA0GA1UEAwwGaGVtdWxpMR8wHQYKCZImiZPyLGQBGRYP
395
+ bnV1c2thbXVpa2t1bmVuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
396
+ 5aHmVXcfogDqJ3kUfK8ARzdkQ/dm9j4rHbGNh4xmlKCMUwCmmo2LOKMKvviD7qwz
397
+ n1lDsPIClbmZaxc3vFlpNj5A6YVg7SpCU/Cx9RtTY+2vWQF29RWw5UktPDALIRNC
398
+ boKuNykWqbWhwW80YOO3MXlASw2EF2nfsxLGXNmiB7kKaxPrTsNV9CO4rVIrYJj5
399
+ 2+1MZSEhEQn9H9VrKgCNlDN/6LCs/TnSC7Np1jOTjo5Nen95afE0KUEbSnMw8Ihw
400
+ ymOFF0zgxiCQ1kme5fYXqCZZJOU+zS3pKO/LdnULu6/uJ1D0JWjIwWBqEwTwMqhj
401
+ NnsJaoJiJJnQtuFcVIhXEQIDAQABoAAwDQYJKoZIhvcNAQEFBQADggEBAAlVfy+G
402
+ GUPYnTfrRoBvgSMz5dR7rynQe5wxHWTtk71xbODSIZNFUntYa4tSAzaIEp65FxTj
403
+ WyGlBZcdzCPd39DJtfxeiZ8q4UKx47VCt4jIzOSpM2jvGzlUpHnm2Eh9rQHqMRye
404
+ C4T49gWBEqsTvZL+hWE9dAQq4Y+P3h9UWr49bMQNbSxERw3fDzWvcEJsSq+4Ml12
405
+ +sPV+Euz5phCzqt15v+6jfqlEgGj27k3MlF+EglX0BWduGw4RxfoOdGQNBwdXPkz
406
+ db1f0XsYTW1NUYoL8O8uxzoNcysyBW/VGP01e2LXB8whWn4xtDtaLpyt/v4ow04V
407
+ 9v3lfL5ZDl1gIEY=
408
+ -----END CERTIFICATE REQUEST-----"
409
+
410
+ signing_csr = "-----BEGIN CERTIFICATE REQUEST-----
411
+ MIICdzCCAV8CAQEwMjEPMA0GA1UEAwwGaGVtdWxpMR8wHQYKCZImiZPyLGQBGRYP
412
+ bnV1c2thbXVpa2t1bmVuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
413
+ y4zgajeMzFrBR4zsJ50qo4fxHWfjdCmI5nwLbKqKhSKB15JBdRmh/Wz0Gi1qOvER
414
+ x9wS5c/1pMr1ARcVUvz2425ZNV77AAQMGUZpLxP9N6QWK39u4VemoecdPfNYv/tt
415
+ qk1cJFO1aNNmIMrDzBZEzQH/Mf4QbiqsaSvuVay8mjVEW3she4FbcrhNnhlm3PS7
416
+ XOm0UF2TiCjrM4enCI2XhTzKnSxONiM8KubKEAEOXPDAYGRwn+dik30qYwT5kMbG
417
+ tzggHPsiwkBUDEcNeMuMGRKNxP3i03DA4wGSJZu3A61TcYVLihj9hEDnybe7Dw0h
418
+ eNmyqoqp/0gr89rxlAANNwIDAQABoAAwDQYJKoZIhvcNAQEFBQADggEBAEbyXe6f
419
+ aBGbaSldlIceYyxIXVqBRwVuE22vvk6to1f+QYrWj+4IexD0TBdfpcpKATnOjqEH
420
+ sbksB0HOKZmFDCqNZamw1458DtdtSPpOn5EyX9BX6K2hExmj5CV1vEORB8dQ4lBi
421
+ zjrpAOh422NQ3galu1vfrPVvRS8lN4t+zJUlBoCUwPlm5AmH88dJCXDHTxDrwxxv
422
+ 6UPUROxE2p+1TyHueUmfMKvjySnt8IIfoEvz4q/EouIbL2lDJwXOwX+1fx4Rva6t
423
+ bx1hmt5Eihy1lORQR4PE4xaOP5TCqtxP0+snuGqRuBHhrDk4mowWEJbvFWlONT5H
424
+ CsajqZag/Aoxv/Y=
425
+ -----END CERTIFICATE REQUEST-----"
426
+
427
+ {
428
+ bank: :danske,
429
+ command: :renew_certificate,
430
+ signing_csr: signing_csr,
431
+ encryption_csr: encryption_csr,
432
+ customer_id: '360817',
433
+ environment: :test,
434
+ own_signing_certificate: own_signing_certificate,
435
+ bank_encryption_certificate: bank_encryption_certificate,
436
+ signing_private_key: signing_private_key,
437
+ encryption_private_key: encryption_private_key,
389
438
  }
390
439
  end
@@ -3,6 +3,6 @@ require 'test_helper'
3
3
  class TestSepa < ActiveSupport::TestCase
4
4
  test 'version is defined correctly' do
5
5
  refute_nil Sepa::VERSION
6
- assert_equal "1.1.5", Sepa::VERSION
6
+ assert_equal "1.1.6", Sepa::VERSION
7
7
  end
8
8
  end
@@ -4,24 +4,29 @@ module Testing
4
4
  require_relative "data/certs"
5
5
  require_relative "data/params"
6
6
 
7
- content_clients = {
8
- nordea_download_file: Sepa::Client.new(NORDEA_DOWNLOAD_FILE_PARAMS),
9
- nordea_download_file_list: Sepa::Client.new(NORDEA_DOWNLOAD_FILE_LIST_PARAMS),
10
- nordea_get_user_info: Sepa::Client.new(NORDEA_GET_USER_INFO_PARAMS),
11
- nordea_upload_file: Sepa::Client.new(NORDEA_UPLOAD_FILE_PARAMS),
12
- op_download_file: Sepa::Client.new(OP_DOWNLOAD_FILE_PARAMS),
13
- op_download_file_list: Sepa::Client.new(OP_DOWNLOAD_FILE_LIST_PARAMS),
14
- op_upload_file: Sepa::Client.new(OP_UPLOAD_FILE_PARAMS),
15
- }
16
-
17
- certificate_clients = {
18
- danske_create_cert: Sepa::Client.new(DANSKE_CREATE_CERT_PARAMS),
19
- danske_get_bank_cert: Sepa::Client.new(DANSKE_GET_BANK_CERT_PARAMS),
20
- nordea_get_certificate: Sepa::Client.new(NORDEA_GET_CERTIFICATE_PARAMS),
21
- nordea_renew_certificate: Sepa::Client.new(NORDEA_RENEW_CERTIFICATE_PARAMS),
22
- op_get_certificate: Sepa::Client.new(OP_GET_CERTIFICATE_PARAMS),
23
- op_get_service_certificates: Sepa::Client.new(OP_GET_SERVICE_CERTIFICATES_PARAMS),
24
- }
7
+ content_clients = [
8
+ :nordea_download_file,
9
+ :nordea_download_file_list,
10
+ :nordea_get_user_info,
11
+ :nordea_upload_file,
12
+ :op_download_file,
13
+ :op_download_file_list,
14
+ :op_upload_file,
15
+ ].each_with_object({}) do |i, a|
16
+ a[i] = Sepa::Client.new("#{i.to_s.upcase}_PARAMS".constantize)
17
+ end
18
+
19
+ certificate_clients = [
20
+ :danske_create_cert,
21
+ :danske_get_bank_cert,
22
+ :danske_renew_cert,
23
+ :nordea_get_certificate,
24
+ :nordea_renew_certificate,
25
+ :op_get_certificate,
26
+ :op_get_service_certificates,
27
+ ].each_with_object({}) do |i, a|
28
+ a[i] = Sepa::Client.new("#{i.to_s.upcase}_PARAMS".constantize)
29
+ end
25
30
 
26
31
  content_clients.each do |name, client|
27
32
  response = client.send_request
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: sepafm
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.1.5
4
+ version: 1.1.6
5
5
  platform: ruby
6
6
  authors:
7
7
  - Joni Kanerva
@@ -10,7 +10,7 @@ authors:
10
10
  autorequire:
11
11
  bindir: bin
12
12
  cert_chain: []
13
- date: 2016-05-13 00:00:00.000000000 Z
13
+ date: 2016-07-12 00:00:00.000000000 Z
14
14
  dependencies:
15
15
  - !ruby/object:Gem::Dependency
16
16
  name: activemodel
@@ -74,14 +74,14 @@ dependencies:
74
74
  requirements:
75
75
  - - "~>"
76
76
  - !ruby/object:Gem::Version
77
- version: '0.5'
77
+ version: '0.6'
78
78
  type: :development
79
79
  prerelease: false
80
80
  version_requirements: !ruby/object:Gem::Requirement
81
81
  requirements:
82
82
  - - "~>"
83
83
  - !ruby/object:Gem::Version
84
- version: '0.5'
84
+ version: '0.6'
85
85
  - !ruby/object:Gem::Dependency
86
86
  name: dotenv
87
87
  requirement: !ruby/object:Gem::Requirement
@@ -102,28 +102,28 @@ dependencies:
102
102
  requirements:
103
103
  - - "~>"
104
104
  - !ruby/object:Gem::Version
105
- version: '5.8'
105
+ version: '5.9'
106
106
  type: :development
107
107
  prerelease: false
108
108
  version_requirements: !ruby/object:Gem::Requirement
109
109
  requirements:
110
110
  - - "~>"
111
111
  - !ruby/object:Gem::Version
112
- version: '5.8'
112
+ version: '5.9'
113
113
  - !ruby/object:Gem::Dependency
114
114
  name: rake
115
115
  requirement: !ruby/object:Gem::Requirement
116
116
  requirements:
117
117
  - - "~>"
118
118
  - !ruby/object:Gem::Version
119
- version: '11.1'
119
+ version: '11.2'
120
120
  type: :development
121
121
  prerelease: false
122
122
  version_requirements: !ruby/object:Gem::Requirement
123
123
  requirements:
124
124
  - - "~>"
125
125
  - !ruby/object:Gem::Version
126
- version: '11.1'
126
+ version: '11.2'
127
127
  - !ruby/object:Gem::Dependency
128
128
  name: rubyntlm
129
129
  requirement: !ruby/object:Gem::Requirement
@@ -147,7 +147,6 @@ extra_rdoc_files: []
147
147
  files:
148
148
  - ".gitignore"
149
149
  - ".rubocop.yml"
150
- - ".travis.yml"
151
150
  - ".yardopts"
152
151
  - Gemfile
153
152
  - LICENSE
@@ -197,6 +196,7 @@ files:
197
196
  - lib/sepa/xml_schemas/xmldsig-core-schema.xsd
198
197
  - lib/sepa/xml_templates/application_request/danske/create_certificate.xml
199
198
  - lib/sepa/xml_templates/application_request/danske/get_bank_certificate.xml
199
+ - lib/sepa/xml_templates/application_request/danske/renew_certificate.xml
200
200
  - lib/sepa/xml_templates/application_request/download_file.xml
201
201
  - lib/sepa/xml_templates/application_request/download_file_list.xml
202
202
  - lib/sepa/xml_templates/application_request/encrypted_request.xml
@@ -208,6 +208,7 @@ files:
208
208
  - lib/sepa/xml_templates/application_request/upload_file.xml
209
209
  - lib/sepa/xml_templates/soap/danske/create_certificate.xml
210
210
  - lib/sepa/xml_templates/soap/danske/get_bank_certificate.xml
211
+ - lib/sepa/xml_templates/soap/danske/renew_certificate.xml
211
212
  - lib/sepa/xml_templates/soap/download_file.xml
212
213
  - lib/sepa/xml_templates/soap/download_file_list.xml
213
214
  - lib/sepa/xml_templates/soap/get_user_info.xml
@@ -226,18 +227,16 @@ files:
226
227
  - test/sepa/banks/danske/danske_certificate_application_request_test.rb
227
228
  - test/sepa/banks/danske/danske_generic_soap_builder_test.rb
228
229
  - test/sepa/banks/danske/danske_get_bank_cert_test.rb
230
+ - test/sepa/banks/danske/danske_renew_cert_application_request_test.rb
231
+ - test/sepa/banks/danske/danske_renew_cert_request_soap_builder_test.rb
229
232
  - test/sepa/banks/danske/danske_response_test.rb
230
233
  - test/sepa/banks/danske/keys/bank_encryption_cert.pem
231
234
  - test/sepa/banks/danske/keys/bank_root_cert.pem
232
235
  - test/sepa/banks/danske/keys/bank_signing_cert.pem
233
- - test/sepa/banks/danske/keys/danske_encryption.crt
234
236
  - test/sepa/banks/danske/keys/enc_private_key.pem
235
- - test/sepa/banks/danske/keys/encryption_pkcs.csr
236
237
  - test/sepa/banks/danske/keys/own_enc_cert.pem
237
238
  - test/sepa/banks/danske/keys/own_signing_cert.pem
238
239
  - test/sepa/banks/danske/keys/signing_key.pem
239
- - test/sepa/banks/danske/keys/signing_pkcs.csr
240
- - test/sepa/banks/danske/keys/signing_private_key.pem
241
240
  - test/sepa/banks/danske/responses/create_cert.xml
242
241
  - test/sepa/banks/danske/responses/download_file_list.xml
243
242
  - test/sepa/banks/danske/responses/get_bank_cert.xml
@@ -289,7 +288,7 @@ required_ruby_version: !ruby/object:Gem::Requirement
289
288
  requirements:
290
289
  - - ">="
291
290
  - !ruby/object:Gem::Version
292
- version: 2.1.7
291
+ version: 2.2.5
293
292
  required_rubygems_version: !ruby/object:Gem::Requirement
294
293
  requirements:
295
294
  - - ">="
@@ -297,7 +296,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
297
296
  version: '0'
298
297
  requirements: []
299
298
  rubyforge_project:
300
- rubygems_version: 2.6.4
299
+ rubygems_version: 2.6.6
301
300
  signing_key:
302
301
  specification_version: 4
303
302
  summary: SEPA Financial Messages
@@ -308,18 +307,16 @@ test_files:
308
307
  - test/sepa/banks/danske/danske_certificate_application_request_test.rb
309
308
  - test/sepa/banks/danske/danske_generic_soap_builder_test.rb
310
309
  - test/sepa/banks/danske/danske_get_bank_cert_test.rb
310
+ - test/sepa/banks/danske/danske_renew_cert_application_request_test.rb
311
+ - test/sepa/banks/danske/danske_renew_cert_request_soap_builder_test.rb
311
312
  - test/sepa/banks/danske/danske_response_test.rb
312
313
  - test/sepa/banks/danske/keys/bank_encryption_cert.pem
313
314
  - test/sepa/banks/danske/keys/bank_root_cert.pem
314
315
  - test/sepa/banks/danske/keys/bank_signing_cert.pem
315
- - test/sepa/banks/danske/keys/danske_encryption.crt
316
316
  - test/sepa/banks/danske/keys/enc_private_key.pem
317
- - test/sepa/banks/danske/keys/encryption_pkcs.csr
318
317
  - test/sepa/banks/danske/keys/own_enc_cert.pem
319
318
  - test/sepa/banks/danske/keys/own_signing_cert.pem
320
319
  - test/sepa/banks/danske/keys/signing_key.pem
321
- - test/sepa/banks/danske/keys/signing_pkcs.csr
322
- - test/sepa/banks/danske/keys/signing_private_key.pem
323
320
  - test/sepa/banks/danske/responses/create_cert.xml
324
321
  - test/sepa/banks/danske/responses/download_file_list.xml
325
322
  - test/sepa/banks/danske/responses/get_bank_cert.xml
data/.travis.yml DELETED
@@ -1,16 +0,0 @@
1
- language: ruby
2
- sudo: false
3
- rvm:
4
- - 2.1.7
5
- - 2.2.3
6
- notifications:
7
- email: false
8
- flowdock:
9
- secure: "pzq6Pl9RVGycf0gxE4Cewh8LlQs3fbAKxpzhz2OWMghYkMDci9yk9qFcjl9AJ3h8XUU/2lgCdtpQmCJM3reW4zc/1goK3kQxRemIThwaBeonW5sKmPzD/TOGSzvmBGnEO7olXsOZBGiWvNnzQ4sWIzv8VjCOkFrEWabRkfEvzfg="
10
- addons:
11
- code_climate:
12
- repo_token:
13
- secure: "Wpl0vRyUgEfrvlF35U8LAgpvPttB/+r3lLJhpdGAtFrdDhCgtJJt/qFadWVLcyewGosYBd5XJWZvI6hTARTgmL3imlVdwoZRBu+flUQr3lv3nDVQPMPKnYj9iFi/zLKGR3nnM7k/d85Bm8rNIPw5w+iAE/Z8cTu5YrHqZ+XlxwI="
14
- script:
15
- - bundle install
16
- - bundle exec rake
@@ -1,24 +0,0 @@
1
- -----BEGIN CERTIFICATE-----
2
- MIIEATCCAumgAwIBAgIFAQjv8bMwDQYJKoZIhvcNAQELBQAwgZgxEDAOBgNVBAMT
3
- B0RCR1JPT1QxCzAJBgNVBAYTAkRLMRMwEQYDVQQHEwpDb3BlbmhhZ2VuMRAwDgYD
4
- VQQIEwdEZW5tYXJrMRowGAYDVQQKExFEYW5za2UgQmFuayBHcm91cDEaMBgGA1UE
5
- CxMRRGFuc2tlIEJhbmsgR3JvdXAxGDAWBgNVBAUTDzYxMTI2MjI4MTExMDAwMjAe
6
- Fw0xMjA4MDEwMDAwMDBaFw0xNDEwMzEwMDAwMDBaMIGYMRAwDgYDVQQDEwdEUENS
7
- WVBUMQswCQYDVQQGEwJESzETMBEGA1UEBxMKQ29wZW5oYWdlbjEQMA4GA1UECBMH
8
- RGVubWFyazEaMBgGA1UEChMRRGFuc2tlIEJhbmsgR3JvdXAxGjAYBgNVBAsTEURh
9
- bnNrZSBCYW5rIEdyb3VwMRgwFgYDVQQFEw82MTEyNjIyODQ5MTAwMDMwggEgMA0G
10
- CSqGSIb3DQEBAQUAA4IBDQAwggEIAoIBAQC/kHrOvHOueBsit9drxIHpaD7mXINy
11
- pXS/l9PbbOZ0lZKVEfW9gtG8xk9XggsPXHJMF/PXpG6mveXvPu9WW/XpryAUqGfv
12
- YsC7Px3ixaJb2EMOL+2mJYd0v5HKg5RuYkQ82k3K01hMNEGYs0OotjNVAimQcTLt
13
- VPDGBjK5BUAiwady9LpI6afo7roJWnRmsvSvinDgBqswnfCvUfSfM8cZyhnLLC2u
14
- j1kBHAD/5xpllmS3aq1M8LqFkBYcCE5PdPmFWhGUumZ/Y5qLjDgcPMAPvUaKLqOs
15
- h22jvPCZ0pm17eV0bSQzWe5e0zkgCYAepuFRazSlkJQYBdS47Mp68dY5AgEDo1Iw
16
- UDAfBgNVHSMEGDAWgBSE+uW/3pFJZt/FilLDs7ezIBzHbTAdBgNVHQ4EFgQUP6wH
17
- VNOmznu212c08M3oeYjeXW4wDgYDVR0PAQH/BAQDAgQwMA0GCSqGSIb3DQEBCwUA
18
- A4IBAQAvJBfPug+ixGL/zWUnKMweV80atZXMjHJEn4mOE+iUkCNONLImMMt6MXJy
19
- snJViL1gL5xMrka6A62PLLsVkl79kxDDbzXMPfGt5/mB9L7CMpyzaID0acDii3rs
20
- ZwT3Wxpnate6wowN4zpmXgpCpTDGbxjuVRiOArsjQblerhfxnD/UAieZ1IWozIAN
21
- s6SVms/TuOB+bODUr06ITxBkDJhizOJxjsXRIAtwZvvrH4qGjJz5qFcPb3nz4Txw
22
- swU8X6yvbtqF+q4aAKPA6ZydnGZFQSoSzNJtcF28T1ItxEHN3+xyQqXpTgFviiuL
23
- 277LaAl9YUFFnSgeh7GiFitWJPfD
24
- -----END CERTIFICATE-----
@@ -1,27 +0,0 @@
1
- -----BEGIN RSA PRIVATE KEY-----
2
- MIIEogIBAAKCAQEAy4zgajeMzFrBR4zsJ50qo4fxHWfjdCmI5nwLbKqKhSKB15JB
3
- dRmh/Wz0Gi1qOvERx9wS5c/1pMr1ARcVUvz2425ZNV77AAQMGUZpLxP9N6QWK39u
4
- 4VemoecdPfNYv/ttqk1cJFO1aNNmIMrDzBZEzQH/Mf4QbiqsaSvuVay8mjVEW3sh
5
- e4FbcrhNnhlm3PS7XOm0UF2TiCjrM4enCI2XhTzKnSxONiM8KubKEAEOXPDAYGRw
6
- n+dik30qYwT5kMbGtzggHPsiwkBUDEcNeMuMGRKNxP3i03DA4wGSJZu3A61TcYVL
7
- ihj9hEDnybe7Dw0heNmyqoqp/0gr89rxlAANNwIDAQABAoIBAHWasnqMF9xmPy/A
8
- 2xzUMLOFMqkjwgX2jXNljhA9xITBeDV9+jXXFoHetnZ9cNgXOoe3vm9rJOkOnln/
9
- 5UEqiNbEheRROUI8FGVyCgm6Sd4g/vIo0X5+7vayGnIVrFxXv3fa9HbEqpajNWmS
10
- 3WeIIj40fiZ7PTD5lN27FRwJDnslbMUwl/QSyJmWuiogZ/wR2oQmmTtFXRT7CGD6
11
- 4lJAnjIXpk5+A11qzw3B0C16jonF3EQzD2qdgjIJKNusYjrnaqP5EAvaqx/40sx2
12
- qoBBVB46AaoqBeQn4uDDRJGaZ3VL+4qCPFFfQ+WRYCBTK7W2jMf7RVom9DbkH2op
13
- FHn1ckECgYEA+WsZOazUreVdbBf6gdV/pM9IfN/7pP3i+/fopJe4xnLenwtH+5oF
14
- 4hhyflRejTIBsFi4Cz9zi/GqZFFTo33CXWI+qFcg5+0SWF/BROQYA5AXRnyl8zvE
15
- bVg6kwlULR7rcd0VDKHelqkGz5SUCnoYr458ZaDptK53Cbu0E1LEgGECgYEA0Ovs
16
- sQUBrzg2mNo3FZGjDtiIVYFji5X5t4X38lXgTORhq2xvPu7MftqmqijwfbC9+n8I
17
- wjuNXmLzodh13JDvE8cBUugNAsK1lJpHVWx0fheyGzwDiG8dwoRqFGvsLcB4BRWl
18
- k5pkpgmon4j1ZCM4zrYi7qICfOtY/3P9JjzI1JcCgYB5oN+JP53rOzmml77ih5Ga
19
- dja8JqHZoLGK/Cbn9ND3fVbQqjitGjwaOJ/EuTHumt819t2xJn0bVnsoNnyZ8p7Q
20
- 2TMC9pImZ3aVwARIqw6G1kJzbh+jEJdGV0shHuB8rGJWgWBda6ZXRA/9NFBJF6do
21
- HQzOpnyxTo7gITe8YJVQoQKBgBuiqYt86w0fdXFgpBqxSg1jrR0KYX2MWBzjlrmy
22
- jFn/d7/yNwDvG5PIHnWxtqYZo/enqCPxNrD+i9WjyWtkrItELrOlyFrOILDIe5kc
23
- IIixX7jkhl8cu6YIV/Pdlr8yj220wFM3AAtKiciYmEUnt5L4WsSQH54gj4Qy9pCB
24
- R9t/AoGAJRlYneV2guAZ+ba7E7zppvNa/8E78k6KKGpk3/LameGUjcCivZuXziXF
25
- DF5/ZRU4mxuDmKs9vg2e75eD729pnMdQDKYBS34DRWZHJwpQJlvQPR3hJbaEx/GZ
26
- 94+HtAa9MRBIcMFNzHEjm4oNlsj+X8UiW4R+4HQEjVWSBIQvYpY=
27
- -----END RSA PRIVATE KEY-----