sepafm 1.1.8 → 1.1.9
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.rubocop.yml +8 -6
- data/Rakefile +1 -1
- data/lib/sepa/application_request.rb +12 -18
- data/lib/sepa/application_response.rb +0 -2
- data/lib/sepa/attribute_checks.rb +33 -28
- data/lib/sepa/banks/danske/danske_response.rb +9 -25
- data/lib/sepa/banks/danske/soap_danske.rb +1 -1
- data/lib/sepa/banks/nordea/nordea_response.rb +2 -16
- data/lib/sepa/banks/op/op_response.rb +5 -23
- data/lib/sepa/banks/samlink/samlink_response.rb +35 -0
- data/lib/sepa/banks/samlink/soap_samlink.rb +14 -0
- data/lib/sepa/certificates/samlink_certificate.pem +29 -0
- data/lib/sepa/certificates/samlink_root_certificate.pem +32 -0
- data/lib/sepa/client.rb +35 -8
- data/lib/sepa/error_messages.rb +16 -18
- data/lib/sepa/response.rb +7 -11
- data/lib/sepa/soap_builder.rb +7 -17
- data/lib/sepa/utilities.rb +4 -5
- data/lib/sepa/version.rb +1 -1
- data/lib/sepa/wsdl/wsdl_samlink_cert_production.xml +82 -0
- data/lib/sepa/wsdl/wsdl_samlink_cert_test.xml +82 -0
- data/lib/sepa/wsdl/wsdl_samlink_production.xml +160 -0
- data/lib/sepa/wsdl/wsdl_samlink_test.xml +160 -0
- data/lib/sepa/xml_schemas/samlink/CertApplicationRequest.xsd +105 -0
- data/lib/sepa/xml_schemas/samlink/CertApplicationResponse.xsd +88 -0
- data/lib/sepa/xml_templates/application_request/download_file.xml +0 -1
- data/lib/sepa/xml_templates/application_request/download_file_list.xml +0 -1
- data/lib/sepa/xml_templates/application_request/samlink/get_certificate.xml +12 -0
- data/lib/sepa/xml_templates/application_request/samlink/renew_certificate.xml +29 -0
- data/lib/sepa/xml_templates/soap/samlink/get_certificate.xml +14 -0
- data/lib/sepa/xml_templates/soap/samlink/renew_certificate.xml +14 -0
- data/lib/sepafm.rb +43 -31
- data/readme.md +1 -0
- data/sepafm.gemspec +2 -2
- data/test/custom_assertions.rb +30 -28
- data/test/sepa/banks/danske/danske_cert_response_test.rb +13 -10
- data/test/sepa/banks/danske/danske_generic_soap_builder_test.rb +9 -31
- data/test/sepa/banks/danske/danske_get_bank_cert_test.rb +4 -5
- data/test/sepa/banks/danske/danske_response_test.rb +2 -3
- data/test/sepa/banks/danske/responses/create_cert_corrupted.xml +15 -0
- data/test/sepa/banks/nordea/nordea_application_request_test.rb +4 -6
- data/test/sepa/banks/nordea/nordea_application_response_test.rb +14 -15
- data/test/sepa/banks/nordea/nordea_cert_request_soap_builder_test.rb +1 -3
- data/test/sepa/banks/nordea/nordea_generic_soap_builder_test.rb +6 -16
- data/test/sepa/banks/nordea/nordea_response_test.rb +11 -11
- data/test/sepa/banks/op/op_cert_application_request_test.rb +1 -1
- data/test/sepa/banks/op/op_cert_request_soap_builder_test.rb +0 -1
- data/test/sepa/banks/op/op_response_test.rb +2 -2
- data/test/sepa/banks/samlink/responses/dfl.xml +21 -0
- data/test/sepa/banks/samlink/responses/gc_error_30.xml +21 -0
- data/test/sepa/banks/samlink/responses/rc.xml +21 -0
- data/test/sepa/banks/samlink/samlink_application_request_test.rb +36 -0
- data/test/sepa/banks/samlink/samlink_cert_application_request_test.rb +13 -0
- data/test/sepa/banks/samlink/samlink_cert_request_soap_builder_test.rb +13 -0
- data/test/sepa/banks/samlink/samlink_generic_soap_builder_test.rb +34 -0
- data/test/sepa/banks/samlink/samlink_renew_cert_application_request_test.rb +36 -0
- data/test/sepa/banks/samlink/samlink_renew_cert_request_soap_builder_test.rb +26 -0
- data/test/sepa/banks/samlink/samlink_response_test.rb +71 -0
- data/test/sepa/client_test.rb +32 -6
- data/test/sepa/fixtures.rb +169 -7
- data/test/sepa/sepa_test.rb +1 -1
- data/test/test_helper.rb +8 -7
- data/test_client/data/certs_example.rb +9 -9
- data/test_client/data/params_example.rb +18 -19
- data/test_client/test_client.rb +6 -0
- metadata +41 -5
@@ -2,12 +2,12 @@ require 'test_helper'
|
|
2
2
|
|
3
3
|
class OpResponseTest < ActiveSupport::TestCase
|
4
4
|
test "fails with invalid params" do
|
5
|
-
a = Sepa::OpResponse.new(
|
5
|
+
a = Sepa::OpResponse.new(response: "Jees", command: "not")
|
6
6
|
refute a.valid?
|
7
7
|
end
|
8
8
|
|
9
9
|
test "complains if application response is not valid against schema" do
|
10
|
-
a = Sepa::OpResponse.new(
|
10
|
+
a = Sepa::OpResponse.new(response: "<ar>text</ar>", command: "notvalid")
|
11
11
|
refute a.valid?
|
12
12
|
end
|
13
13
|
end
|
@@ -0,0 +1,21 @@
|
|
1
|
+
<?xml version="1.0" encoding="ISO-8859-15"?>
|
2
|
+
<soapenv:Envelope xmlns:xalan="http://xml.apache.org/xslt" xmlns:date="http://exslt.org/dates-and-times" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:cor="http://bxd.fi/CorporateFileService" xmlns:mod="http://model.bxd.fi"><soapenv:Header><wsse:Security soapenv:mustUnderstand="1" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"><wsu:Timestamp wsu:Id="Timestamp-1e635849-b0a1-478b-b179-03a54003727e" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><wsu:Created>2016-10-11T10:40:09Z</wsu:Created><wsu:Expires>2016-10-11T10:45:09Z</wsu:Expires></wsu:Timestamp><wsse:BinarySecurityToken wsu:Id="SecurityToken-d37a6122-f1cc-47c8-9f3e-756358f12e4d" EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary" ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd">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</wsse:BinarySecurityToken><Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
|
3
|
+
<SignedInfo>
|
4
|
+
<CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
|
5
|
+
<SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
|
6
|
+
<Reference URI="#Timestamp-1e635849-b0a1-478b-b179-03a54003727e">
|
7
|
+
<Transforms>
|
8
|
+
<Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
|
9
|
+
</Transforms>
|
10
|
+
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
|
11
|
+
<DigestValue>wicEP3FYt3t8pm1ly9pOgRuK9/Q=</DigestValue>
|
12
|
+
</Reference>
|
13
|
+
<Reference URI="#Body-ab8ee705-d4f7-4958-9f40-370e2d8dfcf6">
|
14
|
+
<Transforms>
|
15
|
+
<Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
|
16
|
+
</Transforms>
|
17
|
+
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
|
18
|
+
<DigestValue>uhLYCrGfSz7/NVdFdwSHWxTSy5E=</DigestValue>
|
19
|
+
</Reference>
|
20
|
+
</SignedInfo>
|
21
|
+
<SignatureValue>MpVd8iLrl2v9hFPZxPURk7uK7IPyxIfwAhcxJGs+WNi+9rDGK4q3ooHQUKiYtzbd6ko6cIHLsujahEp7EM22TYG6U4HFYggq5e5thZBmaByKNB08cp1Z01/iHUQxGTMv7PwDgpX85VJ0LJIDI1xlwEjxeml306LRBO+Z8jSBwIH2/Z1jOmRc7f8AmDhJ5rpVRyro5vqkx9Ye27MFLle9P7z0yz+9mpB++89tLap9lKTruzYgDp5ASEGawUljoid4xSDI3r0AsHG2zubZFEXjQsVRUGLeeAvI+0+6ANp65ZRLb/dgD+ZOIJW2mTgmp0DreMH6yL/zWjV7tRlcLGFHRA==</SignatureValue><KeyInfo><wsse:SecurityTokenReference xmlns=""><wsse:Reference URI="#SecurityToken-d37a6122-f1cc-47c8-9f3e-756358f12e4d" ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3"/></wsse:SecurityTokenReference></KeyInfo></Signature></wsse:Security></soapenv:Header><soapenv:Body wsu:Id="Body-ab8ee705-d4f7-4958-9f40-370e2d8dfcf6" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><cor:downloadFileListout><mod:ResponseHeader><mod:SenderId>97506614</mod:SenderId><mod:RequestId>eef61dbf30916c7086fccb07ecb41e89f9</mod:RequestId><mod:Timestamp>2016-10-11T13:40:09+03:00</mod:Timestamp><mod:ResponseCode>00</mod:ResponseCode><mod:ResponseText>OK</mod:ResponseText><mod:ReceiverId/></mod:ResponseHeader><mod:ApplicationResponse>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</mod:ApplicationResponse></cor:downloadFileListout></soapenv:Body></soapenv:Envelope>
|
@@ -0,0 +1,21 @@
|
|
1
|
+
<?xml version="1.0" encoding="UTF-8"?>
|
2
|
+
<soapenv:Envelope xmlns:cer="http://mlp.op.fi/OPCertificateService" xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"><soapenv:Header><wsse:Security xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd" soapenv:mustUnderstand="1"><wsu:Timestamp wsu:Id="Timestamp-1990f76a-05a4-4d2a-ab24-8c505f8542b6" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><wsu:Created>2016-10-18T11:25:50Z</wsu:Created><wsu:Expires>2016-10-18T11:30:50Z</wsu:Expires></wsu:Timestamp><wsse:BinarySecurityToken wsu:Id="SecurityToken-1388caea-ea63-4c54-acc1-b48cd11c7874" EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary" ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd">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</wsse:BinarySecurityToken><Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
|
3
|
+
<SignedInfo>
|
4
|
+
<CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
|
5
|
+
<SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
|
6
|
+
<Reference URI="#Timestamp-1990f76a-05a4-4d2a-ab24-8c505f8542b6">
|
7
|
+
<Transforms>
|
8
|
+
<Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
|
9
|
+
</Transforms>
|
10
|
+
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
|
11
|
+
<DigestValue>Kbv3040EAHfnlTpIzaAGCdt+xtA=</DigestValue>
|
12
|
+
</Reference>
|
13
|
+
<Reference URI="#Body-ed3563c5-a136-46a4-b593-b10392442d8f">
|
14
|
+
<Transforms>
|
15
|
+
<Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
|
16
|
+
</Transforms>
|
17
|
+
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
|
18
|
+
<DigestValue>sj2wtXrWFXye6ZYW9nm3tfETe/M=</DigestValue>
|
19
|
+
</Reference>
|
20
|
+
</SignedInfo>
|
21
|
+
<SignatureValue>EqPAaF6kiMsVbSCHTZ2PyQiBDccjyH4DWaQhgOaPlgKNCPsM/VSzr0nlL02LgwR87JSl1WtTX+BfX3UA1QCSdp2tAXVZG1eCfl6v+SObMaQMo63e2IlAPM+oKjxiJeU1hzxMFFYHhGBDWVW3d2erXXdjqcPiF7H27C/UzqecV59LV53o+S0Bm3bvz4uhkQ/F5da5pGexnF65gczRzd8+VHrAsEwqa5L59EQoIxyJOyBHXBaHAzYfDTCAe88ApGqEs2RwEtoME/3Myq+cbVceGyopSjYHSWG0SIC/y5QWMTbVLXxY5CGd3PrvNa5rMjcILTXQ+2HWRqzb68uG+86Gxg==</SignatureValue><KeyInfo><wsse:SecurityTokenReference xmlns=""><wsse:Reference URI="#SecurityToken-1388caea-ea63-4c54-acc1-b48cd11c7874" ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3"/></wsse:SecurityTokenReference></KeyInfo></Signature></wsse:Security></soapenv:Header><soapenv:Body wsu:Id="Body-ed3563c5-a136-46a4-b593-b10392442d8f" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><cer:getCertificateout><cer:ResponseHeader><cer:SenderId>97506614</cer:SenderId><cer:RequestId>5328c11a27c31e9e26e8264121d6bde12b</cer:RequestId><cer:Timestamp>2016-10-18T14:25:50+03:00</cer:Timestamp><cer:ResponseCode>30</cer:ResponseCode><cer:ResponseText>Asiakkaan palvelusopimuksen tarkistuksessa virhe:A00</cer:ResponseText></cer:ResponseHeader><cer:ApplicationResponse>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</cer:ApplicationResponse></cer:getCertificateout></soapenv:Body></soapenv:Envelope>
|
@@ -0,0 +1,21 @@
|
|
1
|
+
<?xml version="1.0" encoding="UTF-8"?>
|
2
|
+
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:cer="http://mlp.op.fi/OPCertificateService"><soapenv:Header><wsse:Security soapenv:mustUnderstand="1" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"><wsu:Timestamp wsu:Id="Timestamp-704b7a59-26f1-4c98-8e07-1343d0756d10" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><wsu:Created>2016-10-11T09:50:52Z</wsu:Created><wsu:Expires>2016-10-11T09:55:52Z</wsu:Expires></wsu:Timestamp><wsse:BinarySecurityToken wsu:Id="SecurityToken-2a7e4d0b-7553-4411-8bb3-2ac0852d9a5d" EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary" ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd">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</wsse:BinarySecurityToken><Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
|
3
|
+
<SignedInfo>
|
4
|
+
<CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
|
5
|
+
<SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
|
6
|
+
<Reference URI="#Timestamp-704b7a59-26f1-4c98-8e07-1343d0756d10">
|
7
|
+
<Transforms>
|
8
|
+
<Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
|
9
|
+
</Transforms>
|
10
|
+
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
|
11
|
+
<DigestValue>l94AUEJKBYfBav3eg4exvrnk3W8=</DigestValue>
|
12
|
+
</Reference>
|
13
|
+
<Reference URI="#Body-28d64256-6d10-4d7f-978c-ad1d5a365703">
|
14
|
+
<Transforms>
|
15
|
+
<Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
|
16
|
+
</Transforms>
|
17
|
+
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
|
18
|
+
<DigestValue>awonHWTg8xIIp9kRdDyIXe+zdO4=</DigestValue>
|
19
|
+
</Reference>
|
20
|
+
</SignedInfo>
|
21
|
+
<SignatureValue>auqxzZS3n5032JsiJpITUkR6YgBhumzOcZ+UH+PqAMfvmPSrHX+Ku1N2YZ10MNfxN1JWopWdqSMDtihs3joqwNYfB4atLgzPnwgGTXun0dupj9zjwB7S9Cyln0fyqCeSdSrCZIZo9cD0ndDp+XrtPo+A/j0QHEE1CGJEh3ncL6Lq35Jn31ozJba9mwYJTAARjnVSgLnstLomSm3o5hqlR74qh382h7kILHf1TDlmu/YbE6hDTAh1SURxFn32p6fdXTHFlIq8Wx+f1/uou6MhjFGHbxVZBCTsEjvq9Jbg9z75vUBicWHT5rFA4c44PbBJdDXIgbvm6XoWLIEfPmuEAQ==</SignatureValue><KeyInfo><wsse:SecurityTokenReference xmlns=""><wsse:Reference URI="#SecurityToken-2a7e4d0b-7553-4411-8bb3-2ac0852d9a5d" ValueType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509v3"/></wsse:SecurityTokenReference></KeyInfo></Signature></wsse:Security></soapenv:Header><soapenv:Body wsu:Id="Body-28d64256-6d10-4d7f-978c-ad1d5a365703" xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"><cer:getCertificateout><cer:ResponseHeader><cer:SenderId>97506614</cer:SenderId><cer:RequestId>856a0222fc24b908c69be8095e67d8dc7a</cer:RequestId><cer:Timestamp>2016-10-11T12:50:52+03:00</cer:Timestamp><cer:ResponseCode>0</cer:ResponseCode><cer:ResponseText>OK</cer:ResponseText></cer:ResponseHeader><cer:ApplicationResponse><?xml version="1.0" encoding="UTF-8"?>
<ns2:CertApplicationResponse xmlns:ns2="http://op.fi/mlp/xmldata/"><ns2:CustomerId>97506614</ns2:CustomerId><Timestamp xmlns="http://op.fi/mlp/xmldata/">2016-10-11T12:50:50.232+03:00</Timestamp><ResponseCode xmlns="http://op.fi/mlp/xmldata/">0</ResponseCode><ResponseText xmlns="http://op.fi/mlp/xmldata/">OK</ResponseText><Certificates xmlns="http://op.fi/mlp/xmldata/"><Certificate><Name>SURNAME=97506614, CN=Devlab Oy, O=Aineistopalvelut-Samlink, C=FI</Name><Certificate>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</Certificate><CertificateFormat>X509</CertificateFormat></Certificate></Certificates><Signature xmlns="http://www.w3.org/2000/09/xmldsig#">
<SignedInfo>
  <CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"/>
  <SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
  <Reference URI="">
    <Transforms>
      <Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
      <Transform Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"/>
    </Transforms>
    <DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
    <DigestValue>dvIvjCIP6WCWjdVXIa0EWekZUXQ=</DigestValue>
  </Reference>
</SignedInfo>
    <SignatureValue>ZD0Gba9oc0b7QeaI8qCIHDctbuKixrfVGmTc7tSyLXpEBPqVy50MFU2jkU/aNvbGEqRO/MYzA5i12KQ2EBaYyMag+iokVhGKLbEAo31jKjJtzd0ipHQnHjbAh7e23A1xT1dVMmkj6wz5a/izh7NTrdYevSH42lIWVMu1XZ1mXZghheb4w3auxE0KeFdcZrjOsLIjUYN6wq4EX8vhqTGE22LESNAavzblt56JeKHu2fqJ1S2qOsgrZdBOAAOBdJxWR7Cwnue83PQVdJSqndCA0R8FWWqh/IpBNIxeLhgrat1ri9bsOXSUsrvzHlE8nXMXMccA0Jkf4jrqQIsn7egUCw==</SignatureValue><KeyInfo><X509Data><X509Certificate>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</X509Certificate><X509IssuerSerial><X509IssuerName>CN=Samlink System Test Customer CA, O=Samlink, C=FI</X509IssuerName><X509SerialNumber>1950041681138739041286794098252326719</X509SerialNumber></X509IssuerSerial></X509Data></KeyInfo></Signature></ns2:CertApplicationResponse></cer:ApplicationResponse></cer:getCertificateout></soapenv:Body></soapenv:Envelope>
|
@@ -0,0 +1,36 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
class SamlinkApplicationRequestTest < ActiveSupport::TestCase
|
4
|
+
setup do
|
5
|
+
@params = samlink_generic_params
|
6
|
+
|
7
|
+
# Convert the keys here since the conversion is usually done by the client and these tests
|
8
|
+
# bypass the client
|
9
|
+
@params[:signing_private_key] = rsa_key @params[:signing_private_key]
|
10
|
+
@params[:own_signing_certificate] = x509_certificate @params[:own_signing_certificate]
|
11
|
+
|
12
|
+
ar_file = Sepa::SoapBuilder.new(@params).application_request
|
13
|
+
|
14
|
+
@params[:command] = :download_file_list
|
15
|
+
ar_list = Sepa::SoapBuilder.new(@params).application_request
|
16
|
+
|
17
|
+
@params[:command] = :upload_file
|
18
|
+
ar_up = Sepa::SoapBuilder.new(@params).application_request
|
19
|
+
|
20
|
+
@doc_file = Nokogiri::XML(ar_file.to_xml)
|
21
|
+
@doc_list = Nokogiri::XML(ar_list.to_xml)
|
22
|
+
@doc_up = Nokogiri::XML(ar_up.to_xml)
|
23
|
+
end
|
24
|
+
|
25
|
+
test 'download file validates against schema' do
|
26
|
+
assert_valid_against_schema 'application_request.xsd', @doc_file
|
27
|
+
end
|
28
|
+
|
29
|
+
test 'upload file validates against schema' do
|
30
|
+
assert_valid_against_schema 'application_request.xsd', @doc_up
|
31
|
+
end
|
32
|
+
|
33
|
+
test 'download file list validates against schema' do
|
34
|
+
assert_valid_against_schema 'application_request.xsd', @doc_list
|
35
|
+
end
|
36
|
+
end
|
@@ -0,0 +1,13 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
class SamlinkCertApplicationRequestTest < ActiveSupport::TestCase
|
4
|
+
setup do
|
5
|
+
@params = samlink_get_certificate_params
|
6
|
+
@ar = Sepa::SoapBuilder.new(@params).application_request
|
7
|
+
@xml = Nokogiri::XML(@ar.to_xml)
|
8
|
+
end
|
9
|
+
|
10
|
+
test "validates against schema" do
|
11
|
+
assert_valid_against_schema 'samlink/CertApplicationRequest.xsd', @xml
|
12
|
+
end
|
13
|
+
end
|
@@ -0,0 +1,13 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
class SamlinkCertRequestSoapBuilderTest < ActiveSupport::TestCase
|
4
|
+
setup do
|
5
|
+
@params = samlink_get_certificate_params
|
6
|
+
@request = Sepa::SoapBuilder.new(@params)
|
7
|
+
@xml = Nokogiri::XML(@request.to_xml)
|
8
|
+
end
|
9
|
+
|
10
|
+
test "validates against schema" do
|
11
|
+
assert_valid_against_schema 'soap.xsd', @xml
|
12
|
+
end
|
13
|
+
end
|
@@ -0,0 +1,34 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
class SamlinkGenericSoapBuilderTest < ActiveSupport::TestCase
|
4
|
+
def setup
|
5
|
+
@params = samlink_generic_params
|
6
|
+
|
7
|
+
# Convert the keys here since the conversion is usually done by the client and these tests
|
8
|
+
# bypass the client
|
9
|
+
@params[:signing_private_key] = rsa_key @params[:signing_private_key]
|
10
|
+
@params[:own_signing_certificate] = x509_certificate @params[:own_signing_certificate]
|
11
|
+
|
12
|
+
@soap_request = Sepa::SoapBuilder.new(@params)
|
13
|
+
@doc = Nokogiri::XML(@soap_request.to_xml)
|
14
|
+
end
|
15
|
+
|
16
|
+
def test_receiver_is_is_set_correctly
|
17
|
+
receiver_id_node = @doc.xpath('//bxd:ReceiverId', bxd: 'http://model.bxd.fi').first
|
18
|
+
assert_equal '11111111A1', receiver_id_node.content
|
19
|
+
end
|
20
|
+
|
21
|
+
test 'validates against schema' do
|
22
|
+
assert_valid_against_schema 'soap.xsd', @doc
|
23
|
+
end
|
24
|
+
|
25
|
+
test 'validates against ws security schema' do
|
26
|
+
wsse = 'http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd'
|
27
|
+
|
28
|
+
ws_node = @doc.xpath('//wsse:Security', wsse: wsse)
|
29
|
+
ws_node = ws_node.to_xml
|
30
|
+
ws_node = Nokogiri::XML(ws_node)
|
31
|
+
|
32
|
+
assert_valid_against_schema 'oasis-200401-wss-wssecurity-secext-1.0.xsd', ws_node
|
33
|
+
end
|
34
|
+
end
|
@@ -0,0 +1,36 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
class SamlinkRenewCertApplicationRequestTest < ActiveSupport::TestCase
|
4
|
+
setup do
|
5
|
+
@params = samlink_renew_certificate_params
|
6
|
+
|
7
|
+
# Convert the keys here since the conversion is usually done by the client and these tests
|
8
|
+
# bypass the client
|
9
|
+
@params[:own_signing_certificate] = x509_certificate(@params[:own_signing_certificate])
|
10
|
+
@params[:signing_private_key] = rsa_key(@params[:signing_private_key])
|
11
|
+
|
12
|
+
@doc = Nokogiri::XML(Sepa::SoapBuilder.new(@params).application_request.to_xml)
|
13
|
+
end
|
14
|
+
|
15
|
+
test "validates against schema" do
|
16
|
+
assert_valid_against_schema 'samlink/CertApplicationRequest.xsd', @doc
|
17
|
+
end
|
18
|
+
|
19
|
+
test "content is set correctly" do
|
20
|
+
assert_equal format_cert_request(@params[:signing_csr]), @doc.at_css("Content").content
|
21
|
+
end
|
22
|
+
|
23
|
+
test 'digest is calculated correctly' do
|
24
|
+
calculated_digest = @doc.at("xmlns|DigestValue", xmlns: 'http://www.w3.org/2000/09/xmldsig#').content
|
25
|
+
|
26
|
+
# Remove signature for calculating digest
|
27
|
+
@doc.at("xmlns|Signature", xmlns: 'http://www.w3.org/2000/09/xmldsig#').remove
|
28
|
+
|
29
|
+
# Calculate digest
|
30
|
+
sha1 = OpenSSL::Digest::SHA1.new
|
31
|
+
actual_digest = encode(sha1.digest(@doc.canonicalize))
|
32
|
+
|
33
|
+
# And then make sure the two are equal
|
34
|
+
assert_equal actual_digest.strip, calculated_digest.strip
|
35
|
+
end
|
36
|
+
end
|
@@ -0,0 +1,26 @@
|
|
1
|
+
require 'test_helper'
|
2
|
+
|
3
|
+
class SamlinkRenewCertRequestSoapBuilderTest < ActiveSupport::TestCase
|
4
|
+
setup do
|
5
|
+
@params = samlink_renew_certificate_params
|
6
|
+
|
7
|
+
# Convert the keys here since the conversion is usually done by the client and these tests
|
8
|
+
# bypass the client
|
9
|
+
@params[:own_signing_certificate] = x509_certificate(@params[:own_signing_certificate])
|
10
|
+
@params[:signing_private_key] = rsa_key(@params[:signing_private_key])
|
11
|
+
|
12
|
+
@doc = Nokogiri::XML(Sepa::SoapBuilder.new(@params).to_xml)
|
13
|
+
end
|
14
|
+
|
15
|
+
test "validates against schema" do
|
16
|
+
assert_valid_against_schema 'soap.xsd', @doc
|
17
|
+
end
|
18
|
+
|
19
|
+
test 'application request is inserted properly' do
|
20
|
+
ar_node = @doc.at("xmlns|ApplicationRequest", xmlns: 'http://mlp.op.fi/OPCertificateService')
|
21
|
+
ar_doc = Nokogiri::XML(decode(ar_node.content))
|
22
|
+
|
23
|
+
assert ar_doc.respond_to?(:canonicalize)
|
24
|
+
assert_equal @params[:customer_id], ar_doc.at_css("CustomerId").content
|
25
|
+
end
|
26
|
+
end
|
@@ -0,0 +1,71 @@
|
|
1
|
+
require "test_helper"
|
2
|
+
|
3
|
+
class SamlinkResponseTest < ActiveSupport::TestCase
|
4
|
+
setup do
|
5
|
+
@gc_error_30 = Sepa::SamlinkResponse.new(
|
6
|
+
response: File.read("#{SAMLINK_TEST_RESPONSE_PATH}/gc_error_30.xml"),
|
7
|
+
command: :get_certificate,
|
8
|
+
environment: :production,
|
9
|
+
)
|
10
|
+
|
11
|
+
@rc = Sepa::SamlinkResponse.new(
|
12
|
+
response: File.read("#{SAMLINK_TEST_RESPONSE_PATH}/rc.xml"),
|
13
|
+
command: :renew_certificate,
|
14
|
+
environment: :test,
|
15
|
+
)
|
16
|
+
|
17
|
+
@dfl = Sepa::SamlinkResponse.new(
|
18
|
+
response: File.read("#{SAMLINK_TEST_RESPONSE_PATH}/dfl.xml"),
|
19
|
+
command: :download_file_list,
|
20
|
+
environment: :test,
|
21
|
+
)
|
22
|
+
end
|
23
|
+
|
24
|
+
test '#response_code' do
|
25
|
+
assert_equal "30", @gc_error_30.response_code
|
26
|
+
assert_equal "00", @rc.response_code
|
27
|
+
assert_equal "00", @dfl.response_code
|
28
|
+
end
|
29
|
+
|
30
|
+
test '#response_text' do
|
31
|
+
assert_equal "Asiakkaan palvelusopimuksen tarkistuksessa virhe:A00", @gc_error_30.response_text
|
32
|
+
assert_equal "OK", @rc.response_text
|
33
|
+
assert_equal "OK", @dfl.response_text
|
34
|
+
end
|
35
|
+
|
36
|
+
test '#hashes_match' do
|
37
|
+
assert @gc_error_30.hashes_match?
|
38
|
+
assert @rc.hashes_match?
|
39
|
+
assert @dfl.hashes_match?
|
40
|
+
end
|
41
|
+
|
42
|
+
test '#signature_is_valid?' do
|
43
|
+
assert @gc_error_30.signature_is_valid?
|
44
|
+
assert @rc.signature_is_valid?
|
45
|
+
assert @dfl.signature_is_valid?
|
46
|
+
end
|
47
|
+
|
48
|
+
test '#certificate' do
|
49
|
+
assert_equal OpenSSL::X509::Certificate, @gc_error_30.certificate.class
|
50
|
+
assert_equal OpenSSL::X509::Certificate, @rc.certificate.class
|
51
|
+
assert_equal OpenSSL::X509::Certificate, @dfl.certificate.class
|
52
|
+
end
|
53
|
+
|
54
|
+
test '#application_response' do
|
55
|
+
refute_empty @gc_error_30.application_response
|
56
|
+
refute_empty @rc.application_response
|
57
|
+
refute_empty @dfl.application_response
|
58
|
+
end
|
59
|
+
|
60
|
+
test '#own_signing_certificate' do
|
61
|
+
assert_nil @gc_error_30.own_signing_certificate
|
62
|
+
assert_nothing_raised { x509_certificate @rc.own_signing_certificate }
|
63
|
+
assert_nil @dfl.own_signing_certificate
|
64
|
+
end
|
65
|
+
|
66
|
+
test '#certificate_is_trusted?' do
|
67
|
+
assert @gc_error_30.certificate_is_trusted?
|
68
|
+
assert @rc.certificate_is_trusted?
|
69
|
+
assert @dfl.certificate_is_trusted?
|
70
|
+
end
|
71
|
+
end
|
data/test/sepa/client_test.rb
CHANGED
@@ -21,7 +21,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
21
21
|
end
|
22
22
|
|
23
23
|
test "correct banks are supported" do
|
24
|
-
assert_equal [:danske, :nordea, :op].sort, Sepa::Client::BANKS.sort
|
24
|
+
assert_equal [:danske, :nordea, :op, :samlink].sort, Sepa::Client::BANKS.sort
|
25
25
|
end
|
26
26
|
|
27
27
|
test "correct allowed commands for nordea" do
|
@@ -57,6 +57,17 @@ class ClientTest < ActiveSupport::TestCase
|
|
57
57
|
assert_same_items commands, c.allowed_commands
|
58
58
|
end
|
59
59
|
|
60
|
+
test "correct allowed commands for samlink" do
|
61
|
+
c = Sepa::Client.new(bank: :samlink)
|
62
|
+
|
63
|
+
commands = [
|
64
|
+
STANDARD_COMMANDS - [:get_user_info],
|
65
|
+
[:get_certificate, :renew_certificate],
|
66
|
+
].flatten
|
67
|
+
|
68
|
+
assert_same_items commands, c.allowed_commands
|
69
|
+
end
|
70
|
+
|
60
71
|
test "should initialize with attributes" do
|
61
72
|
assert Sepa::Client.new @nordea_generic_params
|
62
73
|
end
|
@@ -105,7 +116,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
105
116
|
end
|
106
117
|
|
107
118
|
test "customer id is correct" do
|
108
|
-
wrong_ids = ["a"*17, nil]
|
119
|
+
wrong_ids = ["a" * 17, nil]
|
109
120
|
|
110
121
|
wrong_ids.each do |wrong_id|
|
111
122
|
@nordea_generic_params[:customer_id] = wrong_id
|
@@ -149,7 +160,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
149
160
|
end
|
150
161
|
|
151
162
|
test 'target id is checked' do
|
152
|
-
wrong_ids = ["ready"*81, nil, false]
|
163
|
+
wrong_ids = ["ready" * 81, nil, false]
|
153
164
|
@nordea_generic_params[:command] = :upload_file
|
154
165
|
|
155
166
|
wrong_ids.each do |wrong_id|
|
@@ -171,7 +182,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
171
182
|
end
|
172
183
|
|
173
184
|
test "file type is checked" do
|
174
|
-
wrong_types = ["kalle"*36, nil, false]
|
185
|
+
wrong_types = ["kalle" * 36, nil, false]
|
175
186
|
|
176
187
|
wrong_types.each do |wrong_type|
|
177
188
|
[:upload_file, :download_file_list].each do |command|
|
@@ -361,7 +372,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
361
372
|
|
362
373
|
test "response should be invalid on savon exception" do
|
363
374
|
# Create an observer to fake sending requests to bank
|
364
|
-
observer = Class.new
|
375
|
+
observer = Class.new do
|
365
376
|
def notify(operation_name, builder, globals, locals)
|
366
377
|
@operation_name = operation_name
|
367
378
|
@builder = builder
|
@@ -369,7 +380,7 @@ class ClientTest < ActiveSupport::TestCase
|
|
369
380
|
@locals = locals
|
370
381
|
HTTPI::Response.new(500, {}, 'THE ERROR!')
|
371
382
|
end
|
372
|
-
|
383
|
+
end.new
|
373
384
|
|
374
385
|
Savon.observers << observer
|
375
386
|
|
@@ -425,4 +436,19 @@ class ClientTest < ActiveSupport::TestCase
|
|
425
436
|
refute client.valid?
|
426
437
|
refute_empty client.errors.messages
|
427
438
|
end
|
439
|
+
|
440
|
+
test 'savon options can be passed to client and accessed' do
|
441
|
+
client = Sepa::Client.new(@nordea_get_certificate_params)
|
442
|
+
|
443
|
+
assert client.respond_to?(:savon_options)
|
444
|
+
assert client.respond_to?(:savon_options=)
|
445
|
+
|
446
|
+
client.savon_options = {
|
447
|
+
globals: {
|
448
|
+
ssl_verify_mode: :none,
|
449
|
+
},
|
450
|
+
}
|
451
|
+
|
452
|
+
assert_nothing_raised { client.send_request }
|
453
|
+
end
|
428
454
|
end
|