sepafm 1.1.5 → 1.1.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.rubocop.yml +3 -0
- data/lib/sepa/application_request.rb +17 -8
- data/lib/sepa/attribute_checks.rb +23 -26
- data/lib/sepa/banks/danske/danske_response.rb +29 -41
- data/lib/sepa/banks/danske/soap_danske.rb +30 -23
- data/lib/sepa/client.rb +8 -11
- data/lib/sepa/response.rb +13 -23
- data/lib/sepa/utilities.rb +2 -6
- data/lib/sepa/version.rb +1 -1
- data/lib/sepa/xml_schemas/danske_pki.xsd +1 -1
- data/lib/sepa/xml_templates/application_request/danske/renew_certificate.xml +33 -0
- data/lib/sepa/xml_templates/soap/danske/renew_certificate.xml +17 -0
- data/readme.md +3 -3
- data/sepafm.gemspec +4 -4
- data/test/custom_assertions.rb +21 -0
- data/test/sepa/banks/danske/danske_cert_soap_builder_test.rb +1 -5
- data/test/sepa/banks/danske/danske_certificate_application_request_test.rb +6 -8
- data/test/sepa/banks/danske/danske_generic_soap_builder_test.rb +7 -23
- data/test/sepa/banks/danske/danske_get_bank_cert_test.rb +3 -13
- data/test/sepa/banks/danske/danske_renew_cert_application_request_test.rb +32 -0
- data/test/sepa/banks/danske/danske_renew_cert_request_soap_builder_test.rb +41 -0
- data/test/sepa/banks/nordea/nordea_application_request_test.rb +4 -16
- data/test/sepa/banks/nordea/nordea_cert_application_request_test.rb +1 -5
- data/test/sepa/banks/nordea/nordea_cert_request_soap_builder_test.rb +1 -4
- data/test/sepa/banks/nordea/nordea_generic_soap_builder_test.rb +7 -23
- data/test/sepa/banks/nordea/nordea_renew_cert_application_request_test.rb +1 -10
- data/test/sepa/banks/nordea/nordea_renew_cert_request_soap_builder_test.rb +1 -10
- data/test/sepa/banks/op/op_application_request_test.rb +3 -30
- data/test/sepa/banks/op/op_cert_application_request_test.rb +1 -10
- data/test/sepa/banks/op/op_cert_request_soap_builder_test.rb +1 -10
- data/test/sepa/banks/op/op_generic_soap_builder_test.rb +2 -20
- data/test/sepa/client_test.rb +42 -66
- data/test/sepa/fixtures.rb +72 -23
- data/test/sepa/sepa_test.rb +1 -1
- data/test_client/test_client.rb +23 -18
- metadata +16 -19
- data/.travis.yml +0 -16
- data/test/sepa/banks/danske/keys/danske_encryption.crt +0 -24
- data/test/sepa/banks/danske/keys/encryption_pkcs.csr +0 -0
- data/test/sepa/banks/danske/keys/signing_pkcs.csr +0 -0
- data/test/sepa/banks/danske/keys/signing_private_key.pem +0 -27
data/test/sepa/client_test.rb
CHANGED
@@ -4,12 +4,12 @@ class ClientTest < ActiveSupport::TestCase
|
|
4
4
|
include Sepa::ErrorMessages
|
5
5
|
|
6
6
|
def setup
|
7
|
-
|
8
7
|
# Get params hashes from fixtures for different banks and for different request types
|
9
8
|
@nordea_generic_params = nordea_generic_params
|
10
9
|
@nordea_get_certificate_params = nordea_get_certificate_params
|
11
10
|
@nordea_renew_certificate_params = nordea_get_certificate_params
|
12
11
|
@danske_create_certificate_params = danske_create_certificate_params
|
12
|
+
@danske_renew_certificate_params = danske_renew_cert_params
|
13
13
|
@danske_generic_params = danske_generic_params
|
14
14
|
|
15
15
|
# Namespaces
|
@@ -49,7 +49,10 @@ class ClientTest < ActiveSupport::TestCase
|
|
49
49
|
test "correct allowed commands for danske" do
|
50
50
|
c = Sepa::Client.new(bank: :danske)
|
51
51
|
|
52
|
-
commands =
|
52
|
+
commands = [
|
53
|
+
STANDARD_COMMANDS - [:get_user_info],
|
54
|
+
[:get_bank_certificate, :create_certificate, :renew_certificate],
|
55
|
+
].flatten
|
53
56
|
|
54
57
|
assert_same_items commands, c.allowed_commands
|
55
58
|
end
|
@@ -212,11 +215,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
212
215
|
response = client.send_request
|
213
216
|
|
214
217
|
assert response.doc.at_css('cor|getUserInfoin', cor: @cor)
|
215
|
-
|
216
|
-
Dir.chdir(SCHEMA_PATH) do
|
217
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
218
|
-
assert xsd.valid?(response.doc)
|
219
|
-
end
|
218
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
220
219
|
end
|
221
220
|
|
222
221
|
test "should_send_proper_request_with_nordea_download_file_list" do
|
@@ -225,11 +224,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
225
224
|
response = client.send_request
|
226
225
|
|
227
226
|
assert response.doc.at_css('cor|downloadFileListin', cor: @cor)
|
228
|
-
|
229
|
-
Dir.chdir(SCHEMA_PATH) do
|
230
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
231
|
-
assert xsd.valid?(response.doc)
|
232
|
-
end
|
227
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
233
228
|
end
|
234
229
|
|
235
230
|
test "should_send_proper_request_with_nordea_download_file" do
|
@@ -238,11 +233,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
238
233
|
response = client.send_request
|
239
234
|
|
240
235
|
assert response.doc.at_css('cor|downloadFilein', cor: @cor)
|
241
|
-
|
242
|
-
Dir.chdir(SCHEMA_PATH) do
|
243
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
244
|
-
assert xsd.valid?(response.doc)
|
245
|
-
end
|
236
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
246
237
|
end
|
247
238
|
|
248
239
|
test "should_send_proper_request_with_nordea_upload_file" do
|
@@ -251,11 +242,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
251
242
|
response = client.send_request
|
252
243
|
|
253
244
|
assert response.doc.at_css('cor|uploadFilein', cor: @cor)
|
254
|
-
|
255
|
-
Dir.chdir(SCHEMA_PATH) do
|
256
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
257
|
-
assert xsd.valid?(response.doc)
|
258
|
-
end
|
245
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
259
246
|
end
|
260
247
|
|
261
248
|
test 'should send proper request with nordea get certificate' do
|
@@ -263,11 +250,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
263
250
|
response = client.send_request
|
264
251
|
|
265
252
|
assert response.doc.at_css('cer|getCertificatein')
|
266
|
-
|
267
|
-
Dir.chdir(SCHEMA_PATH) do
|
268
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
269
|
-
assert xsd.valid?(response.doc)
|
270
|
-
end
|
253
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
271
254
|
end
|
272
255
|
|
273
256
|
test 'sends a proper request with nordea renew certificate' do
|
@@ -275,17 +258,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
275
258
|
response = client.send_request
|
276
259
|
|
277
260
|
assert response.doc.at('cer|getCertificatein')
|
278
|
-
|
279
|
-
errors = []
|
280
|
-
|
281
|
-
Dir.chdir(SCHEMA_PATH) do
|
282
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
283
|
-
xsd.validate(response.doc).each do |error|
|
284
|
-
errors << error
|
285
|
-
end
|
286
|
-
end
|
287
|
-
|
288
|
-
assert errors.empty?, "The following schema validations failed:\n#{errors.join("\n")}"
|
261
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
289
262
|
end
|
290
263
|
|
291
264
|
test 'should send proper request with danske download file list' do
|
@@ -293,10 +266,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
293
266
|
client = Sepa::Client.new(@danske_generic_params)
|
294
267
|
response = client.send_request
|
295
268
|
|
296
|
-
|
297
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
298
|
-
assert xsd.valid?(response.doc)
|
299
|
-
end
|
269
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
300
270
|
end
|
301
271
|
|
302
272
|
test 'should send proper request with danske download file' do
|
@@ -304,49 +274,55 @@ class ClientTest < ActiveSupport::TestCase
|
|
304
274
|
client = Sepa::Client.new(@danske_generic_params)
|
305
275
|
response = client.send_request
|
306
276
|
|
307
|
-
|
308
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
309
|
-
assert xsd.valid?(response.doc)
|
310
|
-
end
|
277
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
311
278
|
end
|
312
279
|
|
313
280
|
test 'should send proper request with danske upload file' do
|
314
281
|
client = Sepa::Client.new(@danske_generic_params)
|
315
282
|
response = client.send_request
|
316
283
|
|
317
|
-
|
318
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
319
|
-
assert xsd.valid?(response.doc)
|
320
|
-
end
|
284
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
321
285
|
end
|
322
286
|
|
323
287
|
test 'should send proper request with danske create certificate' do
|
324
288
|
client = Sepa::Client.new(@danske_create_certificate_params)
|
325
289
|
response = client.send_request
|
326
290
|
|
327
|
-
|
328
|
-
xsd = Nokogiri::XML::Schema(IO.read('soap.xsd'))
|
329
|
-
assert xsd.valid?(response.doc)
|
330
|
-
end
|
291
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
331
292
|
end
|
332
293
|
|
294
|
+
test 'sends a proper request with danske renew certificate' do
|
295
|
+
client = Sepa::Client.new(@danske_renew_certificate_params)
|
296
|
+
response = client.send_request
|
333
297
|
|
334
|
-
|
335
|
-
|
336
|
-
|
298
|
+
assert response.doc.at('pkif|RenewCertificateIn', pkif: 'http://danskebank.dk/PKI/PKIFactoryService')
|
299
|
+
assert_valid_against_schema 'soap.xsd', response.doc
|
300
|
+
end
|
337
301
|
|
338
|
-
|
339
|
-
|
340
|
-
|
302
|
+
test "signing csr is checked correctly with danske cert requests" do
|
303
|
+
[
|
304
|
+
@danske_create_certificate_params,
|
305
|
+
@danske_renew_certificate_params,
|
306
|
+
].each do |params|
|
307
|
+
params.delete(:signing_csr)
|
308
|
+
|
309
|
+
sepa = Sepa::Client.new(params)
|
310
|
+
refute sepa.valid?
|
311
|
+
assert_includes sepa.errors.messages.to_s, SIGNING_CERT_REQUEST_ERROR_MESSAGE
|
312
|
+
end
|
341
313
|
end
|
342
314
|
|
343
|
-
test "
|
344
|
-
|
345
|
-
|
315
|
+
test "encryption csr is checked correctly with danske cert requests" do
|
316
|
+
[
|
317
|
+
@danske_create_certificate_params,
|
318
|
+
@danske_renew_certificate_params,
|
319
|
+
].each do |params|
|
320
|
+
params.delete(:encryption_csr)
|
346
321
|
|
347
|
-
|
348
|
-
|
349
|
-
|
322
|
+
sepa = Sepa::Client.new(params)
|
323
|
+
refute sepa.valid?
|
324
|
+
assert_includes sepa.errors.messages.to_s, ENCRYPTION_CERT_REQUEST_ERROR_MESSAGE
|
325
|
+
end
|
350
326
|
end
|
351
327
|
|
352
328
|
test "should_check_pin_with_create_certificate" do
|
data/test/sepa/fixtures.rb
CHANGED
@@ -1,33 +1,26 @@
|
|
1
1
|
def danske_generic_params
|
2
2
|
keys_path = "#{ROOT_PATH}/test/sepa/banks/danske/keys"
|
3
3
|
|
4
|
-
|
5
|
-
|
6
|
-
|
7
|
-
|
8
|
-
encryption_private_key = File.read encryption_private_key_path
|
9
|
-
|
10
|
-
signing_certificate_path = "#{keys_path}/own_signing_cert.pem"
|
11
|
-
own_signing_certificate = File.read signing_certificate_path
|
12
|
-
|
13
|
-
encryption_certificate_path = "#{keys_path}/own_enc_cert.pem"
|
14
|
-
bank_encryption_certificate = File.read encryption_certificate_path
|
4
|
+
signing_private_key = File.read("#{keys_path}/signing_key.pem")
|
5
|
+
encryption_private_key = File.read("#{keys_path}/enc_private_key.pem")
|
6
|
+
own_signing_certificate = File.read("#{keys_path}/own_signing_cert.pem")
|
7
|
+
bank_encryption_certificate = File.read("#{keys_path}/own_enc_cert.pem")
|
15
8
|
|
16
9
|
{
|
17
10
|
bank: :danske,
|
18
|
-
signing_private_key: signing_private_key,
|
19
|
-
encryption_private_key: encryption_private_key,
|
20
11
|
command: :upload_file,
|
21
12
|
customer_id: '360817',
|
22
13
|
environment: 'test',
|
23
|
-
bank_encryption_certificate: bank_encryption_certificate,
|
24
|
-
own_signing_certificate: own_signing_certificate,
|
25
14
|
language: 'FI',
|
26
15
|
status: 'ALL',
|
27
16
|
target_id: 'DABAFIHH',
|
28
17
|
file_type: 'pain.001.001.02',
|
29
18
|
content: encode('kissa'),
|
30
19
|
file_reference: '11111111A12006030329501800000014',
|
20
|
+
own_signing_certificate: own_signing_certificate,
|
21
|
+
bank_encryption_certificate: bank_encryption_certificate,
|
22
|
+
signing_private_key: signing_private_key,
|
23
|
+
encryption_private_key: encryption_private_key,
|
31
24
|
}
|
32
25
|
end
|
33
26
|
|
@@ -378,13 +371,69 @@ CsajqZag/Aoxv/Y=
|
|
378
371
|
bank_encryption_certificate = File.read "#{DANSKE_TEST_KEYS_PATH}own_enc_cert.pem"
|
379
372
|
|
380
373
|
{
|
381
|
-
|
382
|
-
|
383
|
-
|
384
|
-
|
385
|
-
|
386
|
-
|
387
|
-
|
388
|
-
|
374
|
+
bank: :danske,
|
375
|
+
bank_encryption_certificate: bank_encryption_certificate,
|
376
|
+
command: :create_certificate,
|
377
|
+
customer_id: '360817',
|
378
|
+
environment: :test,
|
379
|
+
encryption_csr: encryption_csr,
|
380
|
+
signing_csr: signing_csr,
|
381
|
+
pin: '1234',
|
382
|
+
}
|
383
|
+
end
|
384
|
+
|
385
|
+
def danske_renew_cert_params
|
386
|
+
keys_path = "#{ROOT_PATH}/test/sepa/banks/danske/keys"
|
387
|
+
|
388
|
+
signing_private_key = File.read("#{keys_path}/signing_key.pem")
|
389
|
+
encryption_private_key = File.read("#{keys_path}/enc_private_key.pem")
|
390
|
+
own_signing_certificate = File.read("#{keys_path}/own_signing_cert.pem")
|
391
|
+
bank_encryption_certificate = File.read("#{keys_path}/own_enc_cert.pem")
|
392
|
+
|
393
|
+
encryption_csr = "-----BEGIN CERTIFICATE REQUEST-----
|
394
|
+
MIICdzCCAV8CAQEwMjEPMA0GA1UEAwwGaGVtdWxpMR8wHQYKCZImiZPyLGQBGRYP
|
395
|
+
bnV1c2thbXVpa2t1bmVuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
|
396
|
+
5aHmVXcfogDqJ3kUfK8ARzdkQ/dm9j4rHbGNh4xmlKCMUwCmmo2LOKMKvviD7qwz
|
397
|
+
n1lDsPIClbmZaxc3vFlpNj5A6YVg7SpCU/Cx9RtTY+2vWQF29RWw5UktPDALIRNC
|
398
|
+
boKuNykWqbWhwW80YOO3MXlASw2EF2nfsxLGXNmiB7kKaxPrTsNV9CO4rVIrYJj5
|
399
|
+
2+1MZSEhEQn9H9VrKgCNlDN/6LCs/TnSC7Np1jOTjo5Nen95afE0KUEbSnMw8Ihw
|
400
|
+
ymOFF0zgxiCQ1kme5fYXqCZZJOU+zS3pKO/LdnULu6/uJ1D0JWjIwWBqEwTwMqhj
|
401
|
+
NnsJaoJiJJnQtuFcVIhXEQIDAQABoAAwDQYJKoZIhvcNAQEFBQADggEBAAlVfy+G
|
402
|
+
GUPYnTfrRoBvgSMz5dR7rynQe5wxHWTtk71xbODSIZNFUntYa4tSAzaIEp65FxTj
|
403
|
+
WyGlBZcdzCPd39DJtfxeiZ8q4UKx47VCt4jIzOSpM2jvGzlUpHnm2Eh9rQHqMRye
|
404
|
+
C4T49gWBEqsTvZL+hWE9dAQq4Y+P3h9UWr49bMQNbSxERw3fDzWvcEJsSq+4Ml12
|
405
|
+
+sPV+Euz5phCzqt15v+6jfqlEgGj27k3MlF+EglX0BWduGw4RxfoOdGQNBwdXPkz
|
406
|
+
db1f0XsYTW1NUYoL8O8uxzoNcysyBW/VGP01e2LXB8whWn4xtDtaLpyt/v4ow04V
|
407
|
+
9v3lfL5ZDl1gIEY=
|
408
|
+
-----END CERTIFICATE REQUEST-----"
|
409
|
+
|
410
|
+
signing_csr = "-----BEGIN CERTIFICATE REQUEST-----
|
411
|
+
MIICdzCCAV8CAQEwMjEPMA0GA1UEAwwGaGVtdWxpMR8wHQYKCZImiZPyLGQBGRYP
|
412
|
+
bnV1c2thbXVpa2t1bmVuMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
|
413
|
+
y4zgajeMzFrBR4zsJ50qo4fxHWfjdCmI5nwLbKqKhSKB15JBdRmh/Wz0Gi1qOvER
|
414
|
+
x9wS5c/1pMr1ARcVUvz2425ZNV77AAQMGUZpLxP9N6QWK39u4VemoecdPfNYv/tt
|
415
|
+
qk1cJFO1aNNmIMrDzBZEzQH/Mf4QbiqsaSvuVay8mjVEW3she4FbcrhNnhlm3PS7
|
416
|
+
XOm0UF2TiCjrM4enCI2XhTzKnSxONiM8KubKEAEOXPDAYGRwn+dik30qYwT5kMbG
|
417
|
+
tzggHPsiwkBUDEcNeMuMGRKNxP3i03DA4wGSJZu3A61TcYVLihj9hEDnybe7Dw0h
|
418
|
+
eNmyqoqp/0gr89rxlAANNwIDAQABoAAwDQYJKoZIhvcNAQEFBQADggEBAEbyXe6f
|
419
|
+
aBGbaSldlIceYyxIXVqBRwVuE22vvk6to1f+QYrWj+4IexD0TBdfpcpKATnOjqEH
|
420
|
+
sbksB0HOKZmFDCqNZamw1458DtdtSPpOn5EyX9BX6K2hExmj5CV1vEORB8dQ4lBi
|
421
|
+
zjrpAOh422NQ3galu1vfrPVvRS8lN4t+zJUlBoCUwPlm5AmH88dJCXDHTxDrwxxv
|
422
|
+
6UPUROxE2p+1TyHueUmfMKvjySnt8IIfoEvz4q/EouIbL2lDJwXOwX+1fx4Rva6t
|
423
|
+
bx1hmt5Eihy1lORQR4PE4xaOP5TCqtxP0+snuGqRuBHhrDk4mowWEJbvFWlONT5H
|
424
|
+
CsajqZag/Aoxv/Y=
|
425
|
+
-----END CERTIFICATE REQUEST-----"
|
426
|
+
|
427
|
+
{
|
428
|
+
bank: :danske,
|
429
|
+
command: :renew_certificate,
|
430
|
+
signing_csr: signing_csr,
|
431
|
+
encryption_csr: encryption_csr,
|
432
|
+
customer_id: '360817',
|
433
|
+
environment: :test,
|
434
|
+
own_signing_certificate: own_signing_certificate,
|
435
|
+
bank_encryption_certificate: bank_encryption_certificate,
|
436
|
+
signing_private_key: signing_private_key,
|
437
|
+
encryption_private_key: encryption_private_key,
|
389
438
|
}
|
390
439
|
end
|
data/test/sepa/sepa_test.rb
CHANGED
data/test_client/test_client.rb
CHANGED
@@ -4,24 +4,29 @@ module Testing
|
|
4
4
|
require_relative "data/certs"
|
5
5
|
require_relative "data/params"
|
6
6
|
|
7
|
-
content_clients =
|
8
|
-
nordea_download_file
|
9
|
-
nordea_download_file_list
|
10
|
-
nordea_get_user_info
|
11
|
-
nordea_upload_file
|
12
|
-
op_download_file
|
13
|
-
op_download_file_list
|
14
|
-
op_upload_file
|
15
|
-
}
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
7
|
+
content_clients = [
|
8
|
+
:nordea_download_file,
|
9
|
+
:nordea_download_file_list,
|
10
|
+
:nordea_get_user_info,
|
11
|
+
:nordea_upload_file,
|
12
|
+
:op_download_file,
|
13
|
+
:op_download_file_list,
|
14
|
+
:op_upload_file,
|
15
|
+
].each_with_object({}) do |i, a|
|
16
|
+
a[i] = Sepa::Client.new("#{i.to_s.upcase}_PARAMS".constantize)
|
17
|
+
end
|
18
|
+
|
19
|
+
certificate_clients = [
|
20
|
+
:danske_create_cert,
|
21
|
+
:danske_get_bank_cert,
|
22
|
+
:danske_renew_cert,
|
23
|
+
:nordea_get_certificate,
|
24
|
+
:nordea_renew_certificate,
|
25
|
+
:op_get_certificate,
|
26
|
+
:op_get_service_certificates,
|
27
|
+
].each_with_object({}) do |i, a|
|
28
|
+
a[i] = Sepa::Client.new("#{i.to_s.upcase}_PARAMS".constantize)
|
29
|
+
end
|
25
30
|
|
26
31
|
content_clients.each do |name, client|
|
27
32
|
response = client.send_request
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: sepafm
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.1.
|
4
|
+
version: 1.1.6
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Joni Kanerva
|
@@ -10,7 +10,7 @@ authors:
|
|
10
10
|
autorequire:
|
11
11
|
bindir: bin
|
12
12
|
cert_chain: []
|
13
|
-
date: 2016-
|
13
|
+
date: 2016-07-12 00:00:00.000000000 Z
|
14
14
|
dependencies:
|
15
15
|
- !ruby/object:Gem::Dependency
|
16
16
|
name: activemodel
|
@@ -74,14 +74,14 @@ dependencies:
|
|
74
74
|
requirements:
|
75
75
|
- - "~>"
|
76
76
|
- !ruby/object:Gem::Version
|
77
|
-
version: '0.
|
77
|
+
version: '0.6'
|
78
78
|
type: :development
|
79
79
|
prerelease: false
|
80
80
|
version_requirements: !ruby/object:Gem::Requirement
|
81
81
|
requirements:
|
82
82
|
- - "~>"
|
83
83
|
- !ruby/object:Gem::Version
|
84
|
-
version: '0.
|
84
|
+
version: '0.6'
|
85
85
|
- !ruby/object:Gem::Dependency
|
86
86
|
name: dotenv
|
87
87
|
requirement: !ruby/object:Gem::Requirement
|
@@ -102,28 +102,28 @@ dependencies:
|
|
102
102
|
requirements:
|
103
103
|
- - "~>"
|
104
104
|
- !ruby/object:Gem::Version
|
105
|
-
version: '5.
|
105
|
+
version: '5.9'
|
106
106
|
type: :development
|
107
107
|
prerelease: false
|
108
108
|
version_requirements: !ruby/object:Gem::Requirement
|
109
109
|
requirements:
|
110
110
|
- - "~>"
|
111
111
|
- !ruby/object:Gem::Version
|
112
|
-
version: '5.
|
112
|
+
version: '5.9'
|
113
113
|
- !ruby/object:Gem::Dependency
|
114
114
|
name: rake
|
115
115
|
requirement: !ruby/object:Gem::Requirement
|
116
116
|
requirements:
|
117
117
|
- - "~>"
|
118
118
|
- !ruby/object:Gem::Version
|
119
|
-
version: '11.
|
119
|
+
version: '11.2'
|
120
120
|
type: :development
|
121
121
|
prerelease: false
|
122
122
|
version_requirements: !ruby/object:Gem::Requirement
|
123
123
|
requirements:
|
124
124
|
- - "~>"
|
125
125
|
- !ruby/object:Gem::Version
|
126
|
-
version: '11.
|
126
|
+
version: '11.2'
|
127
127
|
- !ruby/object:Gem::Dependency
|
128
128
|
name: rubyntlm
|
129
129
|
requirement: !ruby/object:Gem::Requirement
|
@@ -147,7 +147,6 @@ extra_rdoc_files: []
|
|
147
147
|
files:
|
148
148
|
- ".gitignore"
|
149
149
|
- ".rubocop.yml"
|
150
|
-
- ".travis.yml"
|
151
150
|
- ".yardopts"
|
152
151
|
- Gemfile
|
153
152
|
- LICENSE
|
@@ -197,6 +196,7 @@ files:
|
|
197
196
|
- lib/sepa/xml_schemas/xmldsig-core-schema.xsd
|
198
197
|
- lib/sepa/xml_templates/application_request/danske/create_certificate.xml
|
199
198
|
- lib/sepa/xml_templates/application_request/danske/get_bank_certificate.xml
|
199
|
+
- lib/sepa/xml_templates/application_request/danske/renew_certificate.xml
|
200
200
|
- lib/sepa/xml_templates/application_request/download_file.xml
|
201
201
|
- lib/sepa/xml_templates/application_request/download_file_list.xml
|
202
202
|
- lib/sepa/xml_templates/application_request/encrypted_request.xml
|
@@ -208,6 +208,7 @@ files:
|
|
208
208
|
- lib/sepa/xml_templates/application_request/upload_file.xml
|
209
209
|
- lib/sepa/xml_templates/soap/danske/create_certificate.xml
|
210
210
|
- lib/sepa/xml_templates/soap/danske/get_bank_certificate.xml
|
211
|
+
- lib/sepa/xml_templates/soap/danske/renew_certificate.xml
|
211
212
|
- lib/sepa/xml_templates/soap/download_file.xml
|
212
213
|
- lib/sepa/xml_templates/soap/download_file_list.xml
|
213
214
|
- lib/sepa/xml_templates/soap/get_user_info.xml
|
@@ -226,18 +227,16 @@ files:
|
|
226
227
|
- test/sepa/banks/danske/danske_certificate_application_request_test.rb
|
227
228
|
- test/sepa/banks/danske/danske_generic_soap_builder_test.rb
|
228
229
|
- test/sepa/banks/danske/danske_get_bank_cert_test.rb
|
230
|
+
- test/sepa/banks/danske/danske_renew_cert_application_request_test.rb
|
231
|
+
- test/sepa/banks/danske/danske_renew_cert_request_soap_builder_test.rb
|
229
232
|
- test/sepa/banks/danske/danske_response_test.rb
|
230
233
|
- test/sepa/banks/danske/keys/bank_encryption_cert.pem
|
231
234
|
- test/sepa/banks/danske/keys/bank_root_cert.pem
|
232
235
|
- test/sepa/banks/danske/keys/bank_signing_cert.pem
|
233
|
-
- test/sepa/banks/danske/keys/danske_encryption.crt
|
234
236
|
- test/sepa/banks/danske/keys/enc_private_key.pem
|
235
|
-
- test/sepa/banks/danske/keys/encryption_pkcs.csr
|
236
237
|
- test/sepa/banks/danske/keys/own_enc_cert.pem
|
237
238
|
- test/sepa/banks/danske/keys/own_signing_cert.pem
|
238
239
|
- test/sepa/banks/danske/keys/signing_key.pem
|
239
|
-
- test/sepa/banks/danske/keys/signing_pkcs.csr
|
240
|
-
- test/sepa/banks/danske/keys/signing_private_key.pem
|
241
240
|
- test/sepa/banks/danske/responses/create_cert.xml
|
242
241
|
- test/sepa/banks/danske/responses/download_file_list.xml
|
243
242
|
- test/sepa/banks/danske/responses/get_bank_cert.xml
|
@@ -289,7 +288,7 @@ required_ruby_version: !ruby/object:Gem::Requirement
|
|
289
288
|
requirements:
|
290
289
|
- - ">="
|
291
290
|
- !ruby/object:Gem::Version
|
292
|
-
version: 2.
|
291
|
+
version: 2.2.5
|
293
292
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
294
293
|
requirements:
|
295
294
|
- - ">="
|
@@ -297,7 +296,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
297
296
|
version: '0'
|
298
297
|
requirements: []
|
299
298
|
rubyforge_project:
|
300
|
-
rubygems_version: 2.6.
|
299
|
+
rubygems_version: 2.6.6
|
301
300
|
signing_key:
|
302
301
|
specification_version: 4
|
303
302
|
summary: SEPA Financial Messages
|
@@ -308,18 +307,16 @@ test_files:
|
|
308
307
|
- test/sepa/banks/danske/danske_certificate_application_request_test.rb
|
309
308
|
- test/sepa/banks/danske/danske_generic_soap_builder_test.rb
|
310
309
|
- test/sepa/banks/danske/danske_get_bank_cert_test.rb
|
310
|
+
- test/sepa/banks/danske/danske_renew_cert_application_request_test.rb
|
311
|
+
- test/sepa/banks/danske/danske_renew_cert_request_soap_builder_test.rb
|
311
312
|
- test/sepa/banks/danske/danske_response_test.rb
|
312
313
|
- test/sepa/banks/danske/keys/bank_encryption_cert.pem
|
313
314
|
- test/sepa/banks/danske/keys/bank_root_cert.pem
|
314
315
|
- test/sepa/banks/danske/keys/bank_signing_cert.pem
|
315
|
-
- test/sepa/banks/danske/keys/danske_encryption.crt
|
316
316
|
- test/sepa/banks/danske/keys/enc_private_key.pem
|
317
|
-
- test/sepa/banks/danske/keys/encryption_pkcs.csr
|
318
317
|
- test/sepa/banks/danske/keys/own_enc_cert.pem
|
319
318
|
- test/sepa/banks/danske/keys/own_signing_cert.pem
|
320
319
|
- test/sepa/banks/danske/keys/signing_key.pem
|
321
|
-
- test/sepa/banks/danske/keys/signing_pkcs.csr
|
322
|
-
- test/sepa/banks/danske/keys/signing_private_key.pem
|
323
320
|
- test/sepa/banks/danske/responses/create_cert.xml
|
324
321
|
- test/sepa/banks/danske/responses/download_file_list.xml
|
325
322
|
- test/sepa/banks/danske/responses/get_bank_cert.xml
|
data/.travis.yml
DELETED
@@ -1,16 +0,0 @@
|
|
1
|
-
language: ruby
|
2
|
-
sudo: false
|
3
|
-
rvm:
|
4
|
-
- 2.1.7
|
5
|
-
- 2.2.3
|
6
|
-
notifications:
|
7
|
-
email: false
|
8
|
-
flowdock:
|
9
|
-
secure: "pzq6Pl9RVGycf0gxE4Cewh8LlQs3fbAKxpzhz2OWMghYkMDci9yk9qFcjl9AJ3h8XUU/2lgCdtpQmCJM3reW4zc/1goK3kQxRemIThwaBeonW5sKmPzD/TOGSzvmBGnEO7olXsOZBGiWvNnzQ4sWIzv8VjCOkFrEWabRkfEvzfg="
|
10
|
-
addons:
|
11
|
-
code_climate:
|
12
|
-
repo_token:
|
13
|
-
secure: "Wpl0vRyUgEfrvlF35U8LAgpvPttB/+r3lLJhpdGAtFrdDhCgtJJt/qFadWVLcyewGosYBd5XJWZvI6hTARTgmL3imlVdwoZRBu+flUQr3lv3nDVQPMPKnYj9iFi/zLKGR3nnM7k/d85Bm8rNIPw5w+iAE/Z8cTu5YrHqZ+XlxwI="
|
14
|
-
script:
|
15
|
-
- bundle install
|
16
|
-
- bundle exec rake
|
@@ -1,24 +0,0 @@
|
|
1
|
-
-----BEGIN CERTIFICATE-----
|
2
|
-
MIIEATCCAumgAwIBAgIFAQjv8bMwDQYJKoZIhvcNAQELBQAwgZgxEDAOBgNVBAMT
|
3
|
-
B0RCR1JPT1QxCzAJBgNVBAYTAkRLMRMwEQYDVQQHEwpDb3BlbmhhZ2VuMRAwDgYD
|
4
|
-
VQQIEwdEZW5tYXJrMRowGAYDVQQKExFEYW5za2UgQmFuayBHcm91cDEaMBgGA1UE
|
5
|
-
CxMRRGFuc2tlIEJhbmsgR3JvdXAxGDAWBgNVBAUTDzYxMTI2MjI4MTExMDAwMjAe
|
6
|
-
Fw0xMjA4MDEwMDAwMDBaFw0xNDEwMzEwMDAwMDBaMIGYMRAwDgYDVQQDEwdEUENS
|
7
|
-
WVBUMQswCQYDVQQGEwJESzETMBEGA1UEBxMKQ29wZW5oYWdlbjEQMA4GA1UECBMH
|
8
|
-
RGVubWFyazEaMBgGA1UEChMRRGFuc2tlIEJhbmsgR3JvdXAxGjAYBgNVBAsTEURh
|
9
|
-
bnNrZSBCYW5rIEdyb3VwMRgwFgYDVQQFEw82MTEyNjIyODQ5MTAwMDMwggEgMA0G
|
10
|
-
CSqGSIb3DQEBAQUAA4IBDQAwggEIAoIBAQC/kHrOvHOueBsit9drxIHpaD7mXINy
|
11
|
-
pXS/l9PbbOZ0lZKVEfW9gtG8xk9XggsPXHJMF/PXpG6mveXvPu9WW/XpryAUqGfv
|
12
|
-
YsC7Px3ixaJb2EMOL+2mJYd0v5HKg5RuYkQ82k3K01hMNEGYs0OotjNVAimQcTLt
|
13
|
-
VPDGBjK5BUAiwady9LpI6afo7roJWnRmsvSvinDgBqswnfCvUfSfM8cZyhnLLC2u
|
14
|
-
j1kBHAD/5xpllmS3aq1M8LqFkBYcCE5PdPmFWhGUumZ/Y5qLjDgcPMAPvUaKLqOs
|
15
|
-
h22jvPCZ0pm17eV0bSQzWe5e0zkgCYAepuFRazSlkJQYBdS47Mp68dY5AgEDo1Iw
|
16
|
-
UDAfBgNVHSMEGDAWgBSE+uW/3pFJZt/FilLDs7ezIBzHbTAdBgNVHQ4EFgQUP6wH
|
17
|
-
VNOmznu212c08M3oeYjeXW4wDgYDVR0PAQH/BAQDAgQwMA0GCSqGSIb3DQEBCwUA
|
18
|
-
A4IBAQAvJBfPug+ixGL/zWUnKMweV80atZXMjHJEn4mOE+iUkCNONLImMMt6MXJy
|
19
|
-
snJViL1gL5xMrka6A62PLLsVkl79kxDDbzXMPfGt5/mB9L7CMpyzaID0acDii3rs
|
20
|
-
ZwT3Wxpnate6wowN4zpmXgpCpTDGbxjuVRiOArsjQblerhfxnD/UAieZ1IWozIAN
|
21
|
-
s6SVms/TuOB+bODUr06ITxBkDJhizOJxjsXRIAtwZvvrH4qGjJz5qFcPb3nz4Txw
|
22
|
-
swU8X6yvbtqF+q4aAKPA6ZydnGZFQSoSzNJtcF28T1ItxEHN3+xyQqXpTgFviiuL
|
23
|
-
277LaAl9YUFFnSgeh7GiFitWJPfD
|
24
|
-
-----END CERTIFICATE-----
|
Binary file
|
Binary file
|
@@ -1,27 +0,0 @@
|
|
1
|
-
-----BEGIN RSA PRIVATE KEY-----
|
2
|
-
MIIEogIBAAKCAQEAy4zgajeMzFrBR4zsJ50qo4fxHWfjdCmI5nwLbKqKhSKB15JB
|
3
|
-
dRmh/Wz0Gi1qOvERx9wS5c/1pMr1ARcVUvz2425ZNV77AAQMGUZpLxP9N6QWK39u
|
4
|
-
4VemoecdPfNYv/ttqk1cJFO1aNNmIMrDzBZEzQH/Mf4QbiqsaSvuVay8mjVEW3sh
|
5
|
-
e4FbcrhNnhlm3PS7XOm0UF2TiCjrM4enCI2XhTzKnSxONiM8KubKEAEOXPDAYGRw
|
6
|
-
n+dik30qYwT5kMbGtzggHPsiwkBUDEcNeMuMGRKNxP3i03DA4wGSJZu3A61TcYVL
|
7
|
-
ihj9hEDnybe7Dw0heNmyqoqp/0gr89rxlAANNwIDAQABAoIBAHWasnqMF9xmPy/A
|
8
|
-
2xzUMLOFMqkjwgX2jXNljhA9xITBeDV9+jXXFoHetnZ9cNgXOoe3vm9rJOkOnln/
|
9
|
-
5UEqiNbEheRROUI8FGVyCgm6Sd4g/vIo0X5+7vayGnIVrFxXv3fa9HbEqpajNWmS
|
10
|
-
3WeIIj40fiZ7PTD5lN27FRwJDnslbMUwl/QSyJmWuiogZ/wR2oQmmTtFXRT7CGD6
|
11
|
-
4lJAnjIXpk5+A11qzw3B0C16jonF3EQzD2qdgjIJKNusYjrnaqP5EAvaqx/40sx2
|
12
|
-
qoBBVB46AaoqBeQn4uDDRJGaZ3VL+4qCPFFfQ+WRYCBTK7W2jMf7RVom9DbkH2op
|
13
|
-
FHn1ckECgYEA+WsZOazUreVdbBf6gdV/pM9IfN/7pP3i+/fopJe4xnLenwtH+5oF
|
14
|
-
4hhyflRejTIBsFi4Cz9zi/GqZFFTo33CXWI+qFcg5+0SWF/BROQYA5AXRnyl8zvE
|
15
|
-
bVg6kwlULR7rcd0VDKHelqkGz5SUCnoYr458ZaDptK53Cbu0E1LEgGECgYEA0Ovs
|
16
|
-
sQUBrzg2mNo3FZGjDtiIVYFji5X5t4X38lXgTORhq2xvPu7MftqmqijwfbC9+n8I
|
17
|
-
wjuNXmLzodh13JDvE8cBUugNAsK1lJpHVWx0fheyGzwDiG8dwoRqFGvsLcB4BRWl
|
18
|
-
k5pkpgmon4j1ZCM4zrYi7qICfOtY/3P9JjzI1JcCgYB5oN+JP53rOzmml77ih5Ga
|
19
|
-
dja8JqHZoLGK/Cbn9ND3fVbQqjitGjwaOJ/EuTHumt819t2xJn0bVnsoNnyZ8p7Q
|
20
|
-
2TMC9pImZ3aVwARIqw6G1kJzbh+jEJdGV0shHuB8rGJWgWBda6ZXRA/9NFBJF6do
|
21
|
-
HQzOpnyxTo7gITe8YJVQoQKBgBuiqYt86w0fdXFgpBqxSg1jrR0KYX2MWBzjlrmy
|
22
|
-
jFn/d7/yNwDvG5PIHnWxtqYZo/enqCPxNrD+i9WjyWtkrItELrOlyFrOILDIe5kc
|
23
|
-
IIixX7jkhl8cu6YIV/Pdlr8yj220wFM3AAtKiciYmEUnt5L4WsSQH54gj4Qy9pCB
|
24
|
-
R9t/AoGAJRlYneV2guAZ+ba7E7zppvNa/8E78k6KKGpk3/LameGUjcCivZuXziXF
|
25
|
-
DF5/ZRU4mxuDmKs9vg2e75eD729pnMdQDKYBS34DRWZHJwpQJlvQPR3hJbaEx/GZ
|
26
|
-
94+HtAa9MRBIcMFNzHEjm4oNlsj+X8UiW4R+4HQEjVWSBIQvYpY=
|
27
|
-
-----END RSA PRIVATE KEY-----
|