sslcheck 0.9.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (42) hide show
  1. checksums.yaml +7 -0
  2. data/.gitignore +14 -0
  3. data/.rspec +3 -0
  4. data/.travis.yml +6 -0
  5. data/Gemfile +4 -0
  6. data/LICENSE.txt +22 -0
  7. data/README.md +177 -0
  8. data/Rakefile +14 -0
  9. data/acceptance/acceptance_helper.rb +1 -0
  10. data/acceptance/checking_certificates_spec.rb +23 -0
  11. data/acceptance/client_spec.rb +67 -0
  12. data/blinky_tests +3 -0
  13. data/lib/sslcheck.rb +20 -0
  14. data/lib/sslcheck/certificate.rb +121 -0
  15. data/lib/sslcheck/certificate_client.rb +10 -0
  16. data/lib/sslcheck/check.rb +65 -0
  17. data/lib/sslcheck/client.rb +68 -0
  18. data/lib/sslcheck/generic_error.rb +15 -0
  19. data/lib/sslcheck/parser.rb +96 -0
  20. data/lib/sslcheck/validator.rb +111 -0
  21. data/lib/sslcheck/validators/ca_bundle.rb +23 -0
  22. data/lib/sslcheck/validators/common_name.rb +27 -0
  23. data/lib/sslcheck/validators/errors.rb +15 -0
  24. data/lib/sslcheck/validators/expiration_date.rb +10 -0
  25. data/lib/sslcheck/validators/generic_validator.rb +15 -0
  26. data/lib/sslcheck/validators/issue_date.rb +10 -0
  27. data/lib/sslcheck/version.rb +3 -0
  28. data/run_acceptance_on_ci +7 -0
  29. data/sentinal +10 -0
  30. data/spec/ca_bundle_validator_spec.rb +24 -0
  31. data/spec/cert_fixtures.rb +814 -0
  32. data/spec/certificate_spec.rb +134 -0
  33. data/spec/check_spec.rb +172 -0
  34. data/spec/common_name_validator_spec.rb +40 -0
  35. data/spec/expiration_date_validator_spec.rb +36 -0
  36. data/spec/issue_date_validator_spec.rb +36 -0
  37. data/spec/parser_spec.rb +0 -0
  38. data/spec/response_spec.rb +13 -0
  39. data/spec/spec_helper.rb +100 -0
  40. data/spec/validator_spec.rb +84 -0
  41. data/sslcheck.gemspec +26 -0
  42. metadata +165 -0
@@ -0,0 +1,134 @@
1
+ require 'spec_helper'
2
+
3
+ module SSLCheck
4
+ describe Certificate do
5
+ before(:each) do
6
+ @sut = Certificate.new(VALID_CERT)
7
+ end
8
+ describe 'to_h' do
9
+ it 'should easily turn into a hash' do
10
+ clock = class_double(DateTime, :now => DateTime.parse("2014-12-31 00:00:00"))
11
+ sut = Certificate.new(VALID_CERT, clock)
12
+ actual_hash = sut.to_h
13
+ expected_hash = {
14
+ :common_name => "www.npboards.com",
15
+ :organization_unit => "Domain Control Validated",
16
+ :not_before => DateTime.parse("Tue, 17 Jun 2014 18:16:01 +0000"),
17
+ :not_after => DateTime.parse("Tue, 17 Jun 2015 18:16:01 +0000"),
18
+ :issued => true,
19
+ :expired => false,
20
+ :issuer => {
21
+ :common_name => "Go Daddy Secure Certificate Authority - G2",
22
+ :country => "US",
23
+ :state => "Arizona",
24
+ :locality => "Scottsdale",
25
+ :organization => "GoDaddy.com, Inc."
26
+ }
27
+ }
28
+
29
+ expect(actual_hash).to eq(expected_hash)
30
+ end
31
+ end
32
+ describe 'extensions' do
33
+ describe 'Subject Alternate Name' do
34
+ context "when it has as subject alternate name extension" do
35
+ it 'should expose the altername names as alternate common names' do
36
+ sut = Certificate.new(VALID_CERT)
37
+
38
+ expect(sut.alternate_common_names).to include("www.npboards.com")
39
+ expect(sut.alternate_common_names).to include("npboards.com")
40
+ end
41
+ end
42
+ context "when it only has one alternate name in the extension" do
43
+ it 'should expose only that name' do
44
+ ext = OpenSSL::X509::Extension.new "subjectAltName", "DNS:example.com"
45
+ cert = OpenSSL::X509::Certificate.new VALID_CERT
46
+
47
+ allow(cert).to receive(:extensions).and_return [ext]
48
+ sut = Certificate.new(cert)
49
+
50
+ expect(sut.alternate_common_names).to include("example.com")
51
+ expect(sut.alternate_common_names).to_not include("npboards.com")
52
+ expect(sut.alternate_common_names).to_not include("www.npboards.com")
53
+ end
54
+ end
55
+ context "when it has no subject alternate name extension" do
56
+ it 'should expose no alternate names' do
57
+ cert = OpenSSL::X509::Certificate.new VALID_CERT
58
+ allow(cert).to receive(:extensions).and_return []
59
+ sut = Certificate.new(cert)
60
+
61
+ expect(sut.alternate_common_names).to eq([])
62
+ end
63
+ end
64
+ end
65
+ end
66
+ describe "subject" do
67
+ it "should expose the certificate's subject" do
68
+ expect(@sut.subject).to eq "/OU=Domain Control Validated/CN=www.npboards.com"
69
+ end
70
+ it "should expose the common name on the certificate" do
71
+ expect(@sut.common_name).to eq "www.npboards.com"
72
+ end
73
+ it "should expose the organizational unit on the certificate" do
74
+ expect(@sut.organizational_unit).to eq "Domain Control Validated"
75
+ end
76
+ end
77
+ describe "issuer" do
78
+ it "should expose the certificate's issuer" do
79
+ expect(@sut.issuer).to eq "/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, Inc./OU=http://certs.godaddy.com/repository//CN=Go Daddy Secure Certificate Authority - G2"
80
+ end
81
+ it "should expose a friendly version of the issuer" do
82
+ expect(@sut.issued_by).to eq "Go Daddy Secure Certificate Authority - G2"
83
+ end
84
+ it "should expose the issuer's country" do
85
+ expect(@sut.issuer_country).to eq "US"
86
+ end
87
+ it "should expose the issuer's state" do
88
+ expect(@sut.issuer_state).to eq "Arizona"
89
+ end
90
+ it "should expose the issuer's locality" do
91
+ expect(@sut.issuer_locality).to eq "Scottsdale"
92
+ end
93
+ it "should expose the issuer's organization" do
94
+ expect(@sut.issuer_organization).to eq "GoDaddy.com, Inc."
95
+ end
96
+ it "should expose the issuer's common name" do
97
+ expect(@sut.issuer_common_name).to eq "Go Daddy Secure Certificate Authority - G2"
98
+ end
99
+ end
100
+ describe "public key" do
101
+ it "should expose the certificate's public key" do
102
+ expect(@sut.public_key).to be_a OpenSSL::PKey::RSA
103
+ end
104
+ end
105
+ describe "verify" do
106
+ it "should be able to verify a certificate with the public key of another" do
107
+ ca_bundle = Certificate.new(CA_BUNDLE)
108
+ expect(@sut.verify(ca_bundle)).to be
109
+ end
110
+ end
111
+ describe "dates" do
112
+ it "should expose the certificate's issue date" do
113
+ expect(@sut.not_before).to eq DateTime.parse("Tue, 17 Jun 2014 18:16:01 +0000")
114
+ end
115
+ it "should expose the certificate's expiry date" do
116
+ expect(@sut.not_after).to eq DateTime.parse("Tue, 17 Jun 2015 18:16:01 +0000")
117
+ end
118
+ end
119
+ describe "expired?" do
120
+ it "should know if it has expired" do
121
+ clock = class_double(DateTime, :now => DateTime.parse("3000-01-01 00:00:00"))
122
+ @sut = Certificate.new(VALID_CERT, clock)
123
+ expect(@sut.expired?).to be
124
+ end
125
+ end
126
+ describe "issued?" do
127
+ it "should know if it has been issued" do
128
+ clock = class_double(DateTime, :now => DateTime.parse("3000-01-01 00:00:00"))
129
+ @sut = Certificate.new(VALID_CERT, clock)
130
+ expect(@sut.issued?).to be
131
+ end
132
+ end
133
+ end
134
+ end
@@ -0,0 +1,172 @@
1
+ require 'spec_helper'
2
+
3
+ module SSLCheck
4
+ describe Check do
5
+ before do
6
+ @peer_cert = SSLCheck::Certificate.new(VALID_CERT)
7
+ @ca_parent = SSLCheck::Certificate.new(CA_PARENT)
8
+ @ca_grand_parent = SSLCheck::Certificate.new(CA_GRAND_PARENT)
9
+ @ca_bundle = [@ca_parent, @ca_grand_parent]
10
+ end
11
+
12
+ it 'should not be failed by default' do
13
+ sut = Check.new(FakeClient.new)
14
+ expect(sut.failed?).to_not be
15
+ expect(sut.errors).to be_empty
16
+ end
17
+
18
+ it 'should be invalid by default' do
19
+ sut = Check.new(FakeClient.new)
20
+ expect(sut.valid?).to_not be
21
+ end
22
+
23
+ it 'should not be done checking by default' do
24
+ sut = Check.new(FakeClient.new)
25
+ expect(sut.checked?).to_not be
26
+ end
27
+
28
+ describe 'checking' do
29
+ it 'should tell the client to get the certs' do
30
+ fake_client = FakeClient.new
31
+ @sut = Check.new(fake_client, FakeValidator.new)
32
+ expect(fake_client).to receive(:get).with("www.example.com").and_return(FakeClientResponse.new)
33
+ @sut.check('www.example.com')
34
+ end
35
+
36
+ it 'should expose the certificates that were found' do
37
+ @sut = Check.new(FakeClient.new(FakeClientResponse.new(@peer_cert, @ca_bundle)), FakeValidator.new)
38
+ @sut.check('www.example.com')
39
+ expect(@sut.peer_cert).to be
40
+ expect(@sut.ca_bundle).to be
41
+ end
42
+
43
+ it 'should expose the hostname parsed from the URL' do
44
+ @sut = Check.new(FakeClient.new(FakeClientResponse.new(@peer_cert, @ca_bundle, "www.example.com")), FakeValidator.new)
45
+ @sut.check('www.example.com')
46
+ expect(@sut.host_name).to eq("www.example.com")
47
+ end
48
+
49
+ it 'should know when the check has completed' do
50
+ @sut = Check.new(FakeClient.new(FakeClientResponse.new(@peer_cert, @ca_bundle)), FakeValidator.new)
51
+ @sut.check('www.example.com')
52
+ expect(@sut.checked?).to be
53
+ end
54
+
55
+ it 'should know what URL was checked' do
56
+ @sut = Check.new(FakeClient.new(FakeClientResponse.new(@peer_cert, @ca_bundle)), FakeValidator.new)
57
+ @sut.check('www.example.com')
58
+ expect(@sut.url).to eq("www.example.com")
59
+ end
60
+
61
+ context "when there is an error checking the certificate" do
62
+ it 'should not be valid' do
63
+ error = SSLCheck::Errors::GenericError.new({:name => :invalid_uri, :message => "Invalid URI"})
64
+ @sut = Check.new(FakeClient.new(nil, [error]), FakeValidator.new)
65
+ @sut.check('www.example.com')
66
+ expect(@sut.valid?).to_not be
67
+ end
68
+ context "when the URI is malformed" do
69
+ it 'should add an error to the error list' do
70
+ error = SSLCheck::Errors::GenericError.new({:name => :invalid_uri, :message => "Invalid URI"})
71
+ validator = FakeValidator.new
72
+ @sut = Check.new(FakeClient.new(nil, [error]), validator)
73
+
74
+ expect(validator).to_not receive(:validate)
75
+ @sut.check('www.example.com')
76
+ end
77
+ it 'should not try to validate the certificate' do
78
+ error = SSLCheck::Errors::GenericError.new({:name => :invalid_uri, :message => "Invalid URI"})
79
+ @sut = Check.new(FakeClient.new(nil, [error]))
80
+ @sut.check('www.example.com')
81
+ end
82
+ end
83
+ context "when there was an OpenSSL error" do
84
+ it 'should add an error to the error list' do
85
+ error = SSLCheck::Errors::GenericError.new({:name => :openssl_error, :message => "OpenSSL Verification Error"})
86
+ @sut = Check.new(FakeClient.new(nil, [error]))
87
+ @sut.check('www.example.com')
88
+ expect(@sut.errors).to eq([error])
89
+ expect(@sut.failed?).to be
90
+ end
91
+ end
92
+ end
93
+ end
94
+
95
+ describe 'validation' do
96
+ it 'should tell the validator to validate the peer certificate' do
97
+ validator = FakeValidator.new
98
+ @sut = Check.new(FakeClient.new(FakeClientResponse.new(@peer_cert, @ca_bundle)), validator)
99
+ expect(validator).to receive(:validate).with("www.example.com", @peer_cert, @ca_bundle)
100
+ @sut.check("www.example.com")
101
+ end
102
+ context "when the certificate is valid" do
103
+ it 'should have no errors' do
104
+ @sut = Check.new(FakeClient.new(FakeClientResponse.new(@peer_cert, @ca_bundle)), FakeValidator.new)
105
+ @sut.check('www.example.com')
106
+ expect(@sut.errors).to eq([])
107
+ end
108
+ it 'should be valid' do
109
+ @sut = Check.new(FakeClient.new(FakeClientResponse.new(@peer_cert, @ca_bundle)), FakeValidator.new)
110
+ @sut.check('www.example.com')
111
+ expect(@sut.valid?).to be
112
+ end
113
+ end
114
+ end
115
+ end
116
+ end
117
+
118
+ class FakeClient
119
+ def initialize(response=nil, errors=[])
120
+ @response = response || FakeClientResponse.new
121
+ @errors = errors
122
+ end
123
+ def get(url)
124
+ @response
125
+
126
+ @errors.each do |error|
127
+ @response.errors << error
128
+ end
129
+ @response
130
+ end
131
+ end
132
+
133
+ class FakeClientResponse
134
+ def initialize(peer_cert=nil, ca_bundle=nil, host_name=nil)
135
+ @peer_cert = peer_cert || SSLCheck::Certificate.new(VALID_CERT)
136
+ @ca_bundle = ca_bundle || [SSLCheck::Certificate.new(CA_PARENT), SSLCheck::Certificate.new(CA_GRAND_PARENT)]
137
+ @host_name = host_name || "www.example.com"
138
+ @errors = []
139
+ end
140
+
141
+ def peer_cert
142
+ @peer_cert
143
+ end
144
+
145
+ def ca_bundle
146
+ @ca_bundle
147
+ end
148
+
149
+ def host_name
150
+ @host_name
151
+ end
152
+
153
+ def errors
154
+ @errors
155
+ end
156
+ end
157
+
158
+
159
+ class FakeValidator
160
+ def initialize(valid=true, errors=[])
161
+ @valid = valid
162
+ @errors = errors
163
+ end
164
+
165
+ def validate(common_name, peer_cert, ca_bundle)
166
+ @valid
167
+ end
168
+
169
+ def errors
170
+ @errors
171
+ end
172
+ end
@@ -0,0 +1,40 @@
1
+ require 'spec_helper'
2
+
3
+ module SSLCheck
4
+ describe 'CommonNameValidatorSpec' do
5
+ before do
6
+ @cert = Certificate.new(VALID_CERT)
7
+ @ca_bundle = [Certificate.new(CA_PARENT), Certificate.new(CA_GRAND_PARENT)]
8
+ end
9
+ context "when the common name is valid" do
10
+ it 'should return nothing' do
11
+ sut = Validators::CommonName.new("npboards.com", @cert, @ca_bundle)
12
+ result = sut.validate
13
+ expect(result).to_not be
14
+ end
15
+ context "when the certificate was issued to a wildcard domain" do
16
+ it 'should return nothing' do
17
+ wildcard_cert = Certificate.new(WILDCARD_CERT)
18
+ sut = Validators::CommonName.new("example.squarespace.com", wildcard_cert, @ca_bundle)
19
+ result = sut.validate
20
+ expect(result).to_not be
21
+ end
22
+ end
23
+ context "when the certificate has alternate subject names" do
24
+ it 'should allow matches against the supplied common name' do
25
+ sut = Validators::CommonName.new("npboards.com", @cert, @ca_bundle)
26
+ result = sut.validate
27
+ expect(result).to_not be
28
+ end
29
+ end
30
+
31
+ end
32
+ context "when the common name is mismatched" do
33
+ it 'should return errors' do
34
+ sut = Validators::CommonName.new("example.com", @cert, @ca_bundle)
35
+ result = sut.validate
36
+ expect(result).to be_a SSLCheck::Errors::Validation::CommonNameMismatch
37
+ end
38
+ end
39
+ end
40
+ end
@@ -0,0 +1,36 @@
1
+ require 'spec_helper'
2
+
3
+ module SSLCheck
4
+ describe 'ExpirationDateValidatorSpec' do
5
+ before do
6
+ @cert = Certificate.new(VALID_CERT)
7
+ @ca_bundle = [Certificate.new(CA_PARENT), Certificate.new(CA_GRAND_PARENT)]
8
+ end
9
+ context "when the expiration date is in the future" do
10
+ it 'should return errors' do
11
+ sut = Validators::ExpirationDate.new("npboards.com", @cert, @ca_bundle)
12
+ result = sut.validate(FutureClock.new)
13
+ expect(result).to be_a SSLCheck::Errors::Validation::CertificateExpired
14
+ end
15
+ end
16
+ context "when the expiration date is in the past" do
17
+ it 'should return nothing' do
18
+ sut = Validators::ExpirationDate.new("npboards.com", @cert, @ca_bundle)
19
+ result = sut.validate(PastClock.new)
20
+ expect(result).to_not be
21
+ end
22
+ end
23
+ end
24
+ end
25
+
26
+ class FutureClock
27
+ def now
28
+ DateTime.parse("3000-01-01 00:00:00")
29
+ end
30
+ end
31
+
32
+ class PastClock
33
+ def now
34
+ DateTime.parse("1000-01-01 00:00:00")
35
+ end
36
+ end
@@ -0,0 +1,36 @@
1
+ require 'spec_helper'
2
+
3
+ module SSLCheck
4
+ describe 'IssueDateValidatorSpec' do
5
+ before do
6
+ @cert = Certificate.new(VALID_CERT)
7
+ @ca_bundle = [Certificate.new(CA_PARENT), Certificate.new(CA_GRAND_PARENT)]
8
+ end
9
+ context "when the issue date is in the past" do
10
+ it 'should return nothing' do
11
+ sut = Validators::IssueDate.new("npboards.com", @cert, @ca_bundle)
12
+ result = sut.validate(FutureClock.new)
13
+ expect(result).to_not be
14
+ end
15
+ end
16
+ context "when the issue date is in the future" do
17
+ it 'should return errors' do
18
+ sut = Validators::IssueDate.new("npboards.com", @cert, @ca_bundle)
19
+ result = sut.validate(PastClock.new)
20
+ expect(result).to be_a SSLCheck::Errors::Validation::NotYetIssued
21
+ end
22
+ end
23
+ end
24
+ end
25
+
26
+ class FutureClock
27
+ def now
28
+ DateTime.parse("3000-01-01 00:00:00")
29
+ end
30
+ end
31
+
32
+ class PastClock
33
+ def now
34
+ DateTime.parse("1000-01-01 00:00:00")
35
+ end
36
+ end
File without changes
@@ -0,0 +1,13 @@
1
+ require 'spec_helper'
2
+
3
+ module SSLCheck
4
+ describe Client::Response do
5
+ it 'should alias ca_bundle to peer_cert_chain' do
6
+ response = Client::Response.new
7
+ response.raw_peer_cert_chain = [CA_PARENT, CA_GRAND_PARENT]
8
+ expect(response.ca_bundle).to be
9
+ expect(response.ca_bundle.first.to_s).to eq(Certificate.new(CA_PARENT).to_s)
10
+ expect(response.ca_bundle.last.to_s).to eq(Certificate.new(CA_GRAND_PARENT).to_s)
11
+ end
12
+ end
13
+ end
@@ -0,0 +1,100 @@
1
+ # This file was generated by the `rspec --init` command. Conventionally, all
2
+ # specs live under a `spec` directory, which RSpec adds to the `$LOAD_PATH`.
3
+ # The generated `.rspec` file contains `--require spec_helper` which will cause
4
+ # this file to always be loaded, without a need to explicitly require it in any
5
+ # files.
6
+ #
7
+ # Given that it is always loaded, you are encouraged to keep this file as
8
+ # light-weight as possible. Requiring heavyweight dependencies from this file
9
+ # will add to the boot time of your test suite on EVERY test run, even for an
10
+ # individual file that may not need all of that loaded. Instead, consider making
11
+ # a separate helper file that requires the additional dependencies and performs
12
+ # the additional setup, and require it from the spec files that actually need
13
+ # it.
14
+
15
+ require 'simplecov'
16
+ SimpleCov.start do
17
+ add_filter "/spec/"
18
+ end
19
+
20
+ require_relative '../lib/sslcheck'
21
+ require 'cert_fixtures'
22
+
23
+ #
24
+ # The `.rspec` file also contains a few flags that are not defaults but that
25
+ # users commonly want.
26
+ #
27
+ # See http://rubydoc.info/gems/rspec-core/RSpec/Core/Configuration
28
+ RSpec.configure do |config|
29
+ # rspec-expectations config goes here. You can use an alternate
30
+ # assertion/expectation library such as wrong or the stdlib/minitest
31
+ # assertions if you prefer.
32
+ config.expect_with :rspec do |expectations|
33
+ # This option will default to `true` in RSpec 4. It makes the `description`
34
+ # and `failure_message` of custom matchers include text for helper methods
35
+ # defined using `chain`, e.g.:
36
+ # be_bigger_than(2).and_smaller_than(4).description
37
+ # # => "be bigger than 2 and smaller than 4"
38
+ # ...rather than:
39
+ # # => "be bigger than 2"
40
+ expectations.include_chain_clauses_in_custom_matcher_descriptions = true
41
+ end
42
+
43
+ # rspec-mocks config goes here. You can use an alternate test double
44
+ # library (such as bogus or mocha) by changing the `mock_with` option here.
45
+ config.mock_with :rspec do |mocks|
46
+ # Prevents you from mocking or stubbing a method that does not exist on
47
+ # a real object. This is generally recommended, and will default to
48
+ # `true` in RSpec 4.
49
+ mocks.verify_partial_doubles = true
50
+ end
51
+
52
+ # The settings below are suggested to provide a good initial experience
53
+ # with RSpec, but feel free to customize to your heart's content.
54
+ =begin
55
+ # These two settings work together to allow you to limit a spec run
56
+ # to individual examples or groups you care about by tagging them with
57
+ # `:focus` metadata. When nothing is tagged with `:focus`, all examples
58
+ # get run.
59
+ config.filter_run :focus
60
+ config.run_all_when_everything_filtered = true
61
+
62
+ # Limits the available syntax to the non-monkey patched syntax that is
63
+ # recommended. For more details, see:
64
+ # - http://myronmars.to/n/dev-blog/2012/06/rspecs-new-expectation-syntax
65
+ # - http://teaisaweso.me/blog/2013/05/27/rspecs-new-message-expectation-syntax/
66
+ # - http://myronmars.to/n/dev-blog/2014/05/notable-changes-in-rspec-3#new__config_option_to_disable_rspeccore_monkey_patching
67
+ config.disable_monkey_patching!
68
+
69
+ # This setting enables warnings. It's recommended, but in some cases may
70
+ # be too noisy due to issues in dependencies.
71
+ config.warnings = true
72
+
73
+ # Many RSpec users commonly either run the entire suite or an individual
74
+ # file, and it's useful to allow more verbose output when running an
75
+ # individual spec file.
76
+ if config.files_to_run.one?
77
+ # Use the documentation formatter for detailed output,
78
+ # unless a formatter has already been configured
79
+ # (e.g. via a command-line flag).
80
+ config.default_formatter = 'doc'
81
+ end
82
+
83
+ # Print the 10 slowest examples and example groups at the
84
+ # end of the spec run, to help surface which specs are running
85
+ # particularly slow.
86
+ config.profile_examples = 10
87
+
88
+ # Run specs in random order to surface order dependencies. If you find an
89
+ # order dependency and want to debug it, you can fix the order by providing
90
+ # the seed, which is printed after each run.
91
+ # --seed 1234
92
+ config.order = :random
93
+
94
+ # Seed global randomization in this process using the `--seed` CLI option.
95
+ # Setting this allows you to use `--seed` to deterministically reproduce
96
+ # test failures related to randomization by passing the same `--seed` value
97
+ # as the one that triggered the failure.
98
+ Kernel.srand config.seed
99
+ =end
100
+ end