sus-fixtures-openssl 0.1.0 → 0.2.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- checksums.yaml.gz.sig +0 -0
- data/lib/sus/fixtures/openssl/certificate_authority_context.rb +1 -1
- data/lib/sus/fixtures/openssl/{host_certificates_context.rb → hosts_certificates_context.rb} +8 -3
- data/lib/sus/fixtures/openssl/invalid_certificate_context.rb +1 -1
- data/lib/sus/fixtures/openssl/valid_certificate_context.rb +1 -1
- data/lib/sus/fixtures/openssl/version.rb +1 -1
- data/lib/sus/fixtures/openssl.rb +1 -1
- data.tar.gz.sig +2 -2
- metadata +4 -4
- metadata.gz.sig +0 -0
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: e391503d0c07a6041da6e9646e9b0e2b0a0abc538e76a7ef6b40faf32ae116e6
|
4
|
+
data.tar.gz: bab7eec2efbaad9fb0b37c5f748f579c5caad2f814b4408dbecb3476e6a477ef
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: a0f2d73894c4e9bdf3b9a1815279c7772c2d3acb6b4c5c4c784aa6a481d3a5cc3bc35019bcce49750981e9ef8bc2cb1b40604b9d0a4a80c5727391dd1d841707
|
7
|
+
data.tar.gz: 27b8e3626c841541a31fc7a217c67c08aa1288346fd7e1ca13346bb894e06c82087d22879a39f6ae7242d4d5df939470baf8441adccd4d2e145926d16417c111
|
checksums.yaml.gz.sig
CHANGED
Binary file
|
data/lib/sus/fixtures/openssl/{host_certificates_context.rb → hosts_certificates_context.rb}
RENAMED
@@ -8,9 +8,14 @@ require_relative 'certificate_authority_context'
|
|
8
8
|
module Sus
|
9
9
|
module Fixtures
|
10
10
|
module OpenSSL
|
11
|
-
module
|
11
|
+
module HostsCertificatesContext
|
12
12
|
include CertificateAuthorityContext
|
13
|
-
|
13
|
+
|
14
|
+
# Override this to provide a list of host names.
|
15
|
+
def hosts
|
16
|
+
[]
|
17
|
+
end
|
18
|
+
|
14
19
|
def keys
|
15
20
|
@keys ||= Hash[
|
16
21
|
hosts.collect{|name| [name, ::OpenSSL::PKey::RSA.new(2048)]}
|
@@ -32,7 +37,7 @@ module Sus
|
|
32
37
|
certificate.serial = 2
|
33
38
|
certificate.version = 2
|
34
39
|
|
35
|
-
certificate.not_before = Time.now
|
40
|
+
certificate.not_before = Time.now - 10
|
36
41
|
certificate.not_after = Time.now + 3600
|
37
42
|
|
38
43
|
extension_factory = ::OpenSSL::X509::ExtensionFactory.new
|
@@ -28,7 +28,7 @@ module Sus
|
|
28
28
|
|
29
29
|
# We set the validity period to the past, so the certificate is invalid:
|
30
30
|
certificate.not_before = Time.now - 3600
|
31
|
-
certificate.not_after = Time.now
|
31
|
+
certificate.not_after = Time.now - 10
|
32
32
|
|
33
33
|
extension_factory = ::OpenSSL::X509::ExtensionFactory.new()
|
34
34
|
extension_factory.subject_certificate = certificate
|
@@ -32,7 +32,7 @@ module Sus
|
|
32
32
|
certificate.version = 2
|
33
33
|
|
34
34
|
# The certificate is valid for one hour:
|
35
|
-
certificate.not_before = Time.now
|
35
|
+
certificate.not_before = Time.now - 10
|
36
36
|
certificate.not_after = Time.now + 3600
|
37
37
|
|
38
38
|
extension_factory = ::OpenSSL::X509::ExtensionFactory.new()
|
data/lib/sus/fixtures/openssl.rb
CHANGED
@@ -6,7 +6,7 @@
|
|
6
6
|
require_relative 'openssl/version'
|
7
7
|
|
8
8
|
require_relative 'openssl/certificate_authority_context'
|
9
|
-
require_relative 'openssl/
|
9
|
+
require_relative 'openssl/hosts_certificates_context'
|
10
10
|
require_relative 'openssl/valid_certificate_context'
|
11
11
|
require_relative 'openssl/invalid_certificate_context'
|
12
12
|
require_relative 'openssl/verified_certificate_context'
|
data.tar.gz.sig
CHANGED
@@ -1,2 +1,2 @@
|
|
1
|
-
|
2
|
-
|
1
|
+
�{%叏�E�/�FJ%=�}��K���G'n�������s�7Bh��t�3Q�=�r�) T5߆��|3�F͞�8��my��S�����X>��z���{ B��Q4��g���Մ��M��'����vX�yl���S�$��]�G�K1{a妨T�@��yn�L�@SC~��f�x=���l�i϶;`g�M=:��#a_G�[�&>l"[�~�^~ѡRҞՍ\�ϣ�����%ⴹ�Q%��f1���C&�$����,V el]B<�-�vZ��ѿ��4���a��"y����Cg�3�,�\�E���tl�dټ��`���o��1f���^��}�Y�w�:(z;o'q|Q���S����[��
|
2
|
+
�h��,�����
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: sus-fixtures-openssl
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.1
|
4
|
+
version: 0.2.1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Samuel Williams
|
@@ -37,7 +37,7 @@ cert_chain:
|
|
37
37
|
Q2K9NVun/S785AP05vKkXZEFYxqG6EW012U4oLcFl5MySFajYXRYbuUpH6AY+HP8
|
38
38
|
voD0MPg1DssDLKwXyt1eKD/+Fq0bFWhwVM/1XiAXL7lyYUyOq24KHgQ2Csg=
|
39
39
|
-----END CERTIFICATE-----
|
40
|
-
date:
|
40
|
+
date: 2024-04-22 00:00:00.000000000 Z
|
41
41
|
dependencies:
|
42
42
|
- !ruby/object:Gem::Dependency
|
43
43
|
name: openssl
|
@@ -75,7 +75,7 @@ extra_rdoc_files: []
|
|
75
75
|
files:
|
76
76
|
- lib/sus/fixtures/openssl.rb
|
77
77
|
- lib/sus/fixtures/openssl/certificate_authority_context.rb
|
78
|
-
- lib/sus/fixtures/openssl/
|
78
|
+
- lib/sus/fixtures/openssl/hosts_certificates_context.rb
|
79
79
|
- lib/sus/fixtures/openssl/invalid_certificate_context.rb
|
80
80
|
- lib/sus/fixtures/openssl/valid_certificate_context.rb
|
81
81
|
- lib/sus/fixtures/openssl/verified_certificate_context.rb
|
@@ -102,7 +102,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
102
102
|
- !ruby/object:Gem::Version
|
103
103
|
version: '0'
|
104
104
|
requirements: []
|
105
|
-
rubygems_version: 3.
|
105
|
+
rubygems_version: 3.5.3
|
106
106
|
signing_key:
|
107
107
|
specification_version: 4
|
108
108
|
summary: Test fixtures for running with OpenSSL.
|
metadata.gz.sig
CHANGED
Binary file
|