@wiajs/request 3.0.1 → 3.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (108) hide show
  1. package/package.json +2 -2
  2. package/.github/ISSUE_TEMPLATE.md +0 -56
  3. package/.github/PULL_REQUEST_TEMPLATE.md +0 -13
  4. package/.github/stale.yml +0 -19
  5. package/.swcrc +0 -57
  6. package/.travis.yml +0 -21
  7. package/CONTRIBUTING.md +0 -81
  8. package/biome.json +0 -44
  9. package/codecov.yml +0 -2
  10. package/disabled.appveyor.yml +0 -36
  11. package/examples/README.md +0 -135
  12. package/gulpfile.js +0 -71
  13. package/release.sh +0 -45
  14. package/tests/browser/karma.conf.js +0 -57
  15. package/tests/browser/ssl/ca.crt +0 -14
  16. package/tests/browser/ssl/server.crt +0 -14
  17. package/tests/browser/ssl/server.key +0 -15
  18. package/tests/browser/start.js +0 -37
  19. package/tests/browser/test.js +0 -34
  20. package/tests/fixtures/har.json +0 -158
  21. package/tests/googledoodle.jpg +0 -0
  22. package/tests/server.js +0 -142
  23. package/tests/squid.conf +0 -76
  24. package/tests/ssl/ca/README.md +0 -8
  25. package/tests/ssl/ca/ca.cnf +0 -20
  26. package/tests/ssl/ca/ca.crl +0 -0
  27. package/tests/ssl/ca/ca.crt +0 -17
  28. package/tests/ssl/ca/ca.csr +0 -13
  29. package/tests/ssl/ca/ca.key +0 -18
  30. package/tests/ssl/ca/ca.srl +0 -1
  31. package/tests/ssl/ca/client-enc.key +0 -30
  32. package/tests/ssl/ca/client.cnf +0 -20
  33. package/tests/ssl/ca/client.crt +0 -20
  34. package/tests/ssl/ca/client.csr +0 -18
  35. package/tests/ssl/ca/client.key +0 -27
  36. package/tests/ssl/ca/gen-all-certs.sh +0 -6
  37. package/tests/ssl/ca/gen-client.sh +0 -25
  38. package/tests/ssl/ca/gen-localhost.sh +0 -22
  39. package/tests/ssl/ca/gen-server.sh +0 -18
  40. package/tests/ssl/ca/localhost.cnf +0 -20
  41. package/tests/ssl/ca/localhost.crt +0 -20
  42. package/tests/ssl/ca/localhost.csr +0 -18
  43. package/tests/ssl/ca/localhost.js +0 -33
  44. package/tests/ssl/ca/localhost.key +0 -27
  45. package/tests/ssl/ca/server.cnf +0 -19
  46. package/tests/ssl/ca/server.crt +0 -25
  47. package/tests/ssl/ca/server.csr +0 -29
  48. package/tests/ssl/ca/server.js +0 -34
  49. package/tests/ssl/ca/server.key +0 -51
  50. package/tests/ssl/npm-ca.crt +0 -16
  51. package/tests/ssl/test.crt +0 -15
  52. package/tests/ssl/test.key +0 -15
  53. package/tests/test-agent.js +0 -102
  54. package/tests/test-agentOptions.js +0 -51
  55. package/tests/test-api.js +0 -33
  56. package/tests/test-aws.js +0 -123
  57. package/tests/test-baseUrl.js +0 -133
  58. package/tests/test-basic-auth.js +0 -221
  59. package/tests/test-bearer-auth.js +0 -187
  60. package/tests/test-body.js +0 -154
  61. package/tests/test-cookies.js +0 -130
  62. package/tests/test-defaults.js +0 -340
  63. package/tests/test-digest-auth.js +0 -232
  64. package/tests/test-emptyBody.js +0 -56
  65. package/tests/test-errors.js +0 -108
  66. package/tests/test-event-forwarding.js +0 -39
  67. package/tests/test-follow-all-303.js +0 -45
  68. package/tests/test-follow-all.js +0 -57
  69. package/tests/test-form-data-error.js +0 -85
  70. package/tests/test-form-data.js +0 -133
  71. package/tests/test-form-urlencoded.js +0 -73
  72. package/tests/test-form.js +0 -101
  73. package/tests/test-gzip.js +0 -296
  74. package/tests/test-har.js +0 -175
  75. package/tests/test-hawk.js +0 -187
  76. package/tests/test-headers.js +0 -305
  77. package/tests/test-http-signature.js +0 -110
  78. package/tests/test-httpModule.js +0 -112
  79. package/tests/test-https.js +0 -116
  80. package/tests/test-isUrl.js +0 -120
  81. package/tests/test-json-request.js +0 -117
  82. package/tests/test-localAddress.js +0 -49
  83. package/tests/test-multipart-encoding.js +0 -147
  84. package/tests/test-multipart.js +0 -129
  85. package/tests/test-node-debug.js +0 -95
  86. package/tests/test-oauth.js +0 -721
  87. package/tests/test-onelineproxy.js +0 -61
  88. package/tests/test-option-reuse.js +0 -54
  89. package/tests/test-options-convenience-method.js +0 -52
  90. package/tests/test-params.js +0 -101
  91. package/tests/test-piped-redirect.js +0 -55
  92. package/tests/test-pipes.js +0 -383
  93. package/tests/test-pool.js +0 -148
  94. package/tests/test-promise.js +0 -53
  95. package/tests/test-proxy-connect.js +0 -80
  96. package/tests/test-proxy.js +0 -304
  97. package/tests/test-qs.js +0 -135
  98. package/tests/test-redirect-auth.js +0 -131
  99. package/tests/test-redirect-complex.js +0 -93
  100. package/tests/test-redirect.js +0 -449
  101. package/tests/test-rfc3986.js +0 -106
  102. package/tests/test-stream.js +0 -36
  103. package/tests/test-timeout.js +0 -260
  104. package/tests/test-timing.js +0 -147
  105. package/tests/test-toJSON.js +0 -45
  106. package/tests/test-tunnel.js +0 -466
  107. package/tests/test-unix.js +0 -74
  108. package/tests/unicycle.jpg +0 -0
@@ -1,14 +0,0 @@
1
- -----BEGIN CERTIFICATE-----
2
- MIICKTCCAZICCQDl9xx8ZXLMPTANBgkqhkiG9w0BAQUFADBZMQswCQYDVQQGEwJB
3
- VTETMBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0
4
- cyBQdHkgTHRkMRIwEAYDVQQDEwlsb2NhbGhvc3QwHhcNMTUwMTA3MTcwOTQ4WhcN
5
- MjUwMTA0MTcwOTQ4WjBZMQswCQYDVQQGEwJBVTETMBEGA1UECBMKU29tZS1TdGF0
6
- ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMRIwEAYDVQQDEwls
7
- b2NhbGhvc3QwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKWxvvLNi8AcT0wI
8
- sf+LoWAvtoIV29ypI6j1JRqmsPO433JP/ijLhJLFc6RKXpKs6pd4am82vzk8Bxs3
9
- VtUXJ0yKh3KMevT7L4X1hw+QxvYAZD6Kl/kaNvKFTuAgcaeSnmnWGjQYLF/i20w7
10
- 7dpeXDmnNMCKwdg+kLeJdPtW0d+vAgMBAAEwDQYJKoZIhvcNAQEFBQADgYEADL6l
11
- Z2mDKj4kPyGD58uBGeBHjmcDA2oJcnsHhOiC1u1NuCwQW4RDWs6Ili0GhuHYHP0B
12
- JDcPw6ZSa1Gx3ZaUJ5yM/+YHpbLev34CjmiwQeG36DF2rAxfoIQk/wI4iWmu1+ed
13
- 5Wwc0cZAb10uy0ihmMK98yhVQPmkBOEyw2O1xJw=
14
- -----END CERTIFICATE-----
@@ -1,15 +0,0 @@
1
- -----BEGIN RSA PRIVATE KEY-----
2
- MIICXAIBAAKBgQClsb7yzYvAHE9MCLH/i6FgL7aCFdvcqSOo9SUaprDzuN9yT/4o
3
- y4SSxXOkSl6SrOqXeGpvNr85PAcbN1bVFydMiodyjHr0+y+F9YcPkMb2AGQ+ipf5
4
- GjbyhU7gIHGnkp5p1ho0GCxf4ttMO+3aXlw5pzTAisHYPpC3iXT7VtHfrwIDAQAB
5
- AoGBAJa5edmk4NuA5SFlR4YOnl3BCWSMPdQciDPJzFbSC2WpZpm16p1xhMd+lhN9
6
- E0qZwUzIXQmN46VM1aoMTRDKXxPqujUIvhn7kxMLmD8lajHzFUIhgnp1XQCfxIIV
7
- sCcnIoP+cbnzP+AegAEPjds/0ngI3YM28UeooqZAmZCHQ0cBAkEAz0go7tCxXqED
8
- +cY+P2axAKuGR+6srx08g5kONTpUx8jXr4su02F376dxhPB9UXWOJkYiGEBwKEds
9
- OnUSNTF/RQJBAMyjUzjb/u6sZqTcHd3owes3UsCC+kfSb814qdG3Z9qYX9p55ESu
10
- hA7Sbjq0WdTHGZdgEexwpfLtTRS8x5ldiGMCQFC3GLlmKqtep92rhLHLm0FXiYKZ
11
- PkUybU4RW6b+f+UMIHELEcDeQ4Xe/iV2QFZoIGJnDP/El+gXZ92bmOt9ysECQD/i
12
- zVx28gO5NuJJBdn9jGzOfLs1KMW7YMQY44thYr7Pyzz9yNHYWcn20Arruw++iLLF
13
- f1L9aBGLHAFZXkb2+FkCQA5/3Z3SgiZrRYX/bWcNe6N65+nGfJv8ZBVsX13pKOxR
14
- 8JzJLyEmx67IOGZvVgfVABrCHJvTrKlUO3x3mDoEPzI=
15
- -----END RSA PRIVATE KEY-----
@@ -1,37 +0,0 @@
1
- 'use strict'
2
- var spawn = require('child_process').spawn
3
- var https = require('https')
4
- var fs = require('fs')
5
- var path = require('path')
6
-
7
- var server = https.createServer({
8
- key: fs.readFileSync(path.join(__dirname, '/ssl/server.key')),
9
- cert: fs.readFileSync(path.join(__dirname, '/ssl/server.crt')),
10
- ca: fs.readFileSync(path.join(__dirname, '/ssl/ca.crt')),
11
- requestCert: true,
12
- rejectUnauthorized: false
13
- }, function (req, res) {
14
- // Set CORS header, since that is something we are testing.
15
- res.setHeader('Access-Control-Allow-Origin', '*')
16
- res.writeHead(200)
17
- res.end('Can you hear the sound of an enormous door slamming in the depths of hell?\n')
18
- })
19
- server.listen(0, function () {
20
- var port = this.address().port
21
- console.log('Started https server for karma tests on port ' + port)
22
- // Spawn process for karma.
23
- var c = spawn('karma', [
24
- 'start',
25
- path.join(__dirname, '/karma.conf.js'),
26
- 'https://localhost:' + port
27
- ])
28
- c.stdout.pipe(process.stdout)
29
- c.stderr.pipe(process.stderr)
30
- c.on('exit', function (c) {
31
- // Exit process with karma exit code.
32
- if (c !== 0) {
33
- throw new Error('Karma exited with status code ' + c)
34
- }
35
- server.close()
36
- })
37
- })
@@ -1,34 +0,0 @@
1
- 'use strict'
2
-
3
- if (!Function.prototype.bind) {
4
- // This is because of the fact that phantom.js does not have Function.bind.
5
- // This is a bug in phantom.js.
6
- // More info: https://github.com/ariya/phantomjs/issues/10522
7
- /* eslint no-extend-native:0 */
8
- Function.prototype.bind = require('function-bind')
9
- }
10
-
11
- var tape = require('tape')
12
- var request = require('../../index')
13
-
14
- tape('returns on error', function (t) {
15
- t.plan(1)
16
- request({
17
- uri: 'https://stupid.nonexistent.path:port123/\\<-great-idea',
18
- withCredentials: false
19
- }, function (error, response) {
20
- t.equal(typeof error, 'object')
21
- t.end()
22
- })
23
- })
24
-
25
- tape('succeeds on valid URLs (with https and CORS)', function (t) {
26
- t.plan(1)
27
- request({
28
- uri: __karma__.config.requestTestUrl, // eslint-disable-line no-undef
29
- withCredentials: false
30
- }, function (_, response) {
31
- t.equal(response.statusCode, 200)
32
- t.end()
33
- })
34
- })
@@ -1,158 +0,0 @@
1
- {
2
- "application-form-encoded": {
3
- "method": "POST",
4
- "headers": [
5
- {
6
- "name": "content-type",
7
- "value": "application/x-www-form-urlencoded"
8
- }
9
- ],
10
- "postData": {
11
- "mimeType": "application/x-www-form-urlencoded; charset=UTF-8",
12
- "params": [
13
- {
14
- "name": "foo",
15
- "value": "bar"
16
- },
17
- {
18
- "name": "hello",
19
- "value": "world"
20
- }
21
- ]
22
- }
23
- },
24
-
25
- "application-json": {
26
- "method": "POST",
27
- "headers": [
28
- {
29
- "name": "content-type",
30
- "value": "application/json"
31
- }
32
- ],
33
- "postData": {
34
- "mimeType": "application/json",
35
- "text": "{\"number\":1,\"string\":\"f\\\"oo\",\"arr\":[1,2,3],\"nested\":{\"a\":\"b\"},\"arr_mix\":[1,\"a\",{\"arr_mix_nested\":{}}]}"
36
- }
37
- },
38
-
39
- "cookies": {
40
- "method": "POST",
41
- "cookies": [
42
- {
43
- "name": "foo",
44
- "value": "bar"
45
- },
46
- {
47
- "name": "bar",
48
- "value": "baz"
49
- }
50
- ]
51
- },
52
-
53
- "custom-method": {
54
- "method": "PROPFIND"
55
- },
56
-
57
- "headers": {
58
- "method": "GET",
59
- "headers": [
60
- {
61
- "name": "x-foo",
62
- "value": "Bar"
63
- }
64
- ]
65
- },
66
-
67
- "multipart-data": {
68
- "method": "POST",
69
- "headers": [
70
- {
71
- "name": "content-type",
72
- "value": "multipart/form-data"
73
- }
74
- ],
75
- "postData": {
76
- "mimeType": "multipart/form-data",
77
- "params": [
78
- {
79
- "name": "foo",
80
- "value": "Hello World",
81
- "fileName": "hello.txt",
82
- "contentType": "text/plain"
83
- }
84
- ]
85
- }
86
- },
87
-
88
- "multipart-file": {
89
- "method": "POST",
90
- "headers": [
91
- {
92
- "name": "content-type",
93
- "value": "multipart/form-data"
94
- }
95
- ],
96
- "postData": {
97
- "mimeType": "multipart/form-data",
98
- "params": [
99
- {
100
- "name": "foo",
101
- "fileName": "../tests/unicycle.jpg",
102
- "contentType": "image/jpeg"
103
- }
104
- ]
105
- }
106
- },
107
-
108
- "multipart-form-data": {
109
- "method": "POST",
110
- "headers": [
111
- {
112
- "name": "content-type",
113
- "value": "multipart/form-data"
114
- }
115
- ],
116
- "postData": {
117
- "mimeType": "multipart/form-data",
118
- "params": [
119
- {
120
- "name": "foo",
121
- "value": "bar"
122
- }
123
- ]
124
- }
125
- },
126
-
127
- "query": {
128
- "method": "GET",
129
- "queryString": [
130
- {
131
- "name": "foo",
132
- "value": "bar"
133
- },
134
- {
135
- "name": "foo",
136
- "value": "baz"
137
- },
138
- {
139
- "name": "baz",
140
- "value": "abc"
141
- }
142
- ]
143
- },
144
-
145
- "text-plain": {
146
- "method": "POST",
147
- "headers": [
148
- {
149
- "name": "content-type",
150
- "value": "text/plain"
151
- }
152
- ],
153
- "postData": {
154
- "mimeType": "text/plain",
155
- "text": "Hello World"
156
- }
157
- }
158
- }
Binary file
package/tests/server.js DELETED
@@ -1,142 +0,0 @@
1
- 'use strict'
2
-
3
- var fs = require('fs')
4
- var http = require('http')
5
- var path = require('path')
6
- var https = require('https')
7
- var stream = require('stream')
8
- var assert = require('assert')
9
-
10
- exports.createServer = function () {
11
- var s = http.createServer(function (req, resp) {
12
- s.emit(req.url.replace(/(\?.*)/, ''), req, resp)
13
- })
14
- s.on('listening', function () {
15
- s.port = this.address().port
16
- s.url = 'http://localhost:' + s.port
17
- })
18
- s.port = 0
19
- s.protocol = 'http'
20
- return s
21
- }
22
-
23
- exports.createEchoServer = function () {
24
- var s = http.createServer(function (req, resp) {
25
- var b = ''
26
- req.on('data', function (chunk) { b += chunk })
27
- req.on('end', function () {
28
- resp.writeHead(200, {'content-type': 'application/json'})
29
- resp.write(JSON.stringify({
30
- url: req.url,
31
- method: req.method,
32
- headers: req.headers,
33
- body: b
34
- }))
35
- resp.end()
36
- })
37
- })
38
- s.on('listening', function () {
39
- s.port = this.address().port
40
- s.url = 'http://localhost:' + s.port
41
- })
42
- s.port = 0
43
- s.protocol = 'http'
44
- return s
45
- }
46
-
47
- exports.createSSLServer = function (opts) {
48
- var i
49
- var options = { 'key': path.join(__dirname, 'ssl', 'test.key'), 'cert': path.join(__dirname, 'ssl', 'test.crt') }
50
- if (opts) {
51
- for (i in opts) {
52
- options[i] = opts[i]
53
- }
54
- }
55
-
56
- for (i in options) {
57
- if (i !== 'requestCert' && i !== 'rejectUnauthorized' && i !== 'ciphers') {
58
- options[i] = fs.readFileSync(options[i])
59
- }
60
- }
61
-
62
- var s = https.createServer(options, function (req, resp) {
63
- s.emit(req.url, req, resp)
64
- })
65
- s.on('listening', function () {
66
- s.port = this.address().port
67
- s.url = 'https://localhost:' + s.port
68
- })
69
- s.port = 0
70
- s.protocol = 'https'
71
- return s
72
- }
73
-
74
- exports.createPostStream = function (text) {
75
- var postStream = new stream.Stream()
76
- postStream.writeable = true
77
- postStream.readable = true
78
- setTimeout(function () {
79
- postStream.emit('data', Buffer.from(text))
80
- postStream.emit('end')
81
- }, 0)
82
- return postStream
83
- }
84
- exports.createPostValidator = function (text, reqContentType) {
85
- var l = function (req, resp) {
86
- var r = ''
87
- req.on('data', function (chunk) { r += chunk })
88
- req.on('end', function () {
89
- if (req.headers['content-type'] && req.headers['content-type'].indexOf('boundary=') >= 0) {
90
- var boundary = req.headers['content-type'].split('boundary=')[1]
91
- text = text.replace(/__BOUNDARY__/g, boundary)
92
- }
93
- assert.equal(r, text)
94
- if (reqContentType) {
95
- assert.ok(req.headers['content-type'])
96
- assert.ok(~req.headers['content-type'].indexOf(reqContentType))
97
- }
98
- resp.writeHead(200, {'content-type': 'text/plain'})
99
- resp.write(r)
100
- resp.end()
101
- })
102
- }
103
- return l
104
- }
105
- exports.createPostJSONValidator = function (value, reqContentType) {
106
- var l = function (req, resp) {
107
- var r = ''
108
- req.on('data', function (chunk) { r += chunk })
109
- req.on('end', function () {
110
- var parsedValue = JSON.parse(r)
111
- assert.deepEqual(parsedValue, value)
112
- if (reqContentType) {
113
- assert.ok(req.headers['content-type'])
114
- assert.ok(~req.headers['content-type'].indexOf(reqContentType))
115
- }
116
- resp.writeHead(200, {'content-type': 'application/json'})
117
- resp.write(r)
118
- resp.end()
119
- })
120
- }
121
- return l
122
- }
123
- exports.createGetResponse = function (text, contentType) {
124
- var l = function (req, resp) {
125
- contentType = contentType || 'text/plain'
126
- resp.writeHead(200, {'content-type': contentType})
127
- resp.write(text)
128
- resp.end()
129
- }
130
- return l
131
- }
132
- exports.createChunkResponse = function (chunks, contentType) {
133
- var l = function (req, resp) {
134
- contentType = contentType || 'text/plain'
135
- resp.writeHead(200, {'content-type': contentType})
136
- chunks.forEach(function (chunk) {
137
- resp.write(chunk)
138
- })
139
- resp.end()
140
- }
141
- return l
142
- }
package/tests/squid.conf DELETED
@@ -1,76 +0,0 @@
1
- #
2
- # Recommended minimum configuration:
3
- #
4
- acl localhost src 127.0.0.1/32 ::1
5
- acl to_localhost dst 127.0.0.0/8 0.0.0.0/32 ::1
6
-
7
- # Example rule allowing access from your local networks.
8
- # Adapt to list your (internal) IP networks from where browsing
9
- # should be allowed
10
- acl localnet src 10.0.0.0/8 # RFC1918 possible internal network
11
- acl localnet src 172.16.0.0/12 # RFC1918 possible internal network
12
- acl localnet src 192.168.0.0/16 # RFC1918 possible internal network
13
- acl localnet src fc00::/7 # RFC 4193 local private network range
14
- acl localnet src fe80::/10 # RFC 4291 link-local (directly plugged) machines
15
-
16
- acl SSL_ports port 443
17
- acl Safe_ports port 80 # http
18
- acl Safe_ports port 21 # ftp
19
- acl Safe_ports port 443 # https
20
- acl Safe_ports port 70 # gopher
21
- acl Safe_ports port 210 # wais
22
- acl Safe_ports port 1025-65535 # unregistered ports
23
- acl Safe_ports port 280 # http-mgmt
24
- acl Safe_ports port 488 # gss-http
25
- acl Safe_ports port 591 # filemaker
26
- acl Safe_ports port 777 # multiling http
27
- acl CONNECT method CONNECT
28
-
29
- #
30
- # Recommended minimum Access Permission configuration:
31
- #
32
- # Only allow cachemgr access from localhost
33
- http_access allow manager localhost
34
- http_access deny manager
35
-
36
- # Deny requests to certain unsafe ports
37
- http_access deny !Safe_ports
38
-
39
- # Deny CONNECT to other than secure SSL ports
40
- #http_access deny CONNECT !SSL_ports
41
-
42
- # We strongly recommend the following be uncommented to protect innocent
43
- # web applications running on the proxy server who think the only
44
- # one who can access services on "localhost" is a local user
45
- #http_access deny to_localhost
46
-
47
- #
48
- # INSERT YOUR OWN RULE(S) HERE TO ALLOW ACCESS FROM YOUR CLIENTS
49
- #
50
-
51
- # Example rule allowing access from your local networks.
52
- # Adapt localnet in the ACL section to list your (internal) IP networks
53
- # from where browsing should be allowed
54
- http_access allow localnet
55
- http_access allow localhost
56
-
57
- # And finally deny all other access to this proxy
58
- http_access deny all
59
-
60
- # Squid normally listens to port 3128
61
- http_port 3128
62
-
63
- # We recommend you to use at least the following line.
64
- hierarchy_stoplist cgi-bin ?
65
-
66
- # Uncomment and adjust the following to add a disk cache directory.
67
- #cache_dir ufs /usr/local/var/cache 100 16 256
68
-
69
- # Leave coredumps in the first cache dir
70
- coredump_dir /usr/local/var/cache
71
-
72
- # Add any of your own refresh_pattern entries above these.
73
- refresh_pattern ^ftp: 1440 20% 10080
74
- refresh_pattern ^gopher: 1440 0% 1440
75
- refresh_pattern -i (/cgi-bin/|\?) 0 0% 0
76
- refresh_pattern . 0 20% 4320
@@ -1,8 +0,0 @@
1
- # Generating SSL Certs for tests
2
-
3
- Certs are generated for TLS tests. The localhost, client and server certs for use in test are generated by running;
4
- ```
5
- ./gen-all-certs.sh
6
- ```
7
-
8
- They should last 10 years, but can be updated at any time.
@@ -1,20 +0,0 @@
1
- [ req ]
2
- default_bits = 1024
3
- days = 3650
4
- distinguished_name = req_distinguished_name
5
- attributes = req_attributes
6
- prompt = no
7
- output_password = password
8
-
9
- [ req_distinguished_name ]
10
- C = US
11
- ST = CA
12
- L = Oakland
13
- O = request
14
- OU = request Certificate Authority
15
- CN = requestCA
16
- emailAddress = mikeal@mikealrogers.com
17
-
18
- [ req_attributes ]
19
- challengePassword = password challenge
20
-
File without changes
@@ -1,17 +0,0 @@
1
- -----BEGIN CERTIFICATE-----
2
- MIICvTCCAiYCCQDn+P/MSbDsWjANBgkqhkiG9w0BAQUFADCBojELMAkGA1UEBhMC
3
- VVMxCzAJBgNVBAgTAkNBMRAwDgYDVQQHEwdPYWtsYW5kMRAwDgYDVQQKEwdyZXF1
4
- ZXN0MSYwJAYDVQQLEx1yZXF1ZXN0IENlcnRpZmljYXRlIEF1dGhvcml0eTESMBAG
5
- A1UEAxMJcmVxdWVzdENBMSYwJAYJKoZIhvcNAQkBFhdtaWtlYWxAbWlrZWFscm9n
6
- ZXJzLmNvbTAeFw0xMjAzMDEyMjUwNTZaFw0yMjAyMjcyMjUwNTZaMIGiMQswCQYD
7
- VQQGEwJVUzELMAkGA1UECBMCQ0ExEDAOBgNVBAcTB09ha2xhbmQxEDAOBgNVBAoT
8
- B3JlcXVlc3QxJjAkBgNVBAsTHXJlcXVlc3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
9
- MRIwEAYDVQQDEwlyZXF1ZXN0Q0ExJjAkBgkqhkiG9w0BCQEWF21pa2VhbEBtaWtl
10
- YWxyb2dlcnMuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC7t9pQUAK4
11
- 5XJYTI6NrF0n3G2HZsfN+rPYSVzzL8SuVyb1tHXos+vbPm3NKI4E8X1yVAXU8CjJ
12
- 5SqXnp4DAypAhaseho81cbhk7LXUhFz78OvAa+OD+xTAEAnNQ8tGUr4VGyplEjfD
13
- xsBVuqV2j8GPNTftr+drOCFlqfAgMrBn4wIDAQABMA0GCSqGSIb3DQEBBQUAA4GB
14
- ADVdTlVAL45R+PACNS7Gs4o81CwSclukBu4FJbxrkd4xGQmurgfRrYYKjtqiopQm
15
- D7ysRamS3HMN9/VKq2T7r3z1PMHPAy7zM4uoXbbaTKwlnX4j/8pGPn8Ca3qHXYlo
16
- 88L/OOPc6Di7i7qckS3HFbXQCTiULtxWmy97oEuTwrAj
17
- -----END CERTIFICATE-----
@@ -1,13 +0,0 @@
1
- -----BEGIN CERTIFICATE REQUEST-----
2
- MIICBjCCAW8CAQAwgaIxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJDQTEQMA4GA1UE
3
- BxMHT2FrbGFuZDEQMA4GA1UEChMHcmVxdWVzdDEmMCQGA1UECxMdcmVxdWVzdCBD
4
- ZXJ0aWZpY2F0ZSBBdXRob3JpdHkxEjAQBgNVBAMTCXJlcXVlc3RDQTEmMCQGCSqG
5
- SIb3DQEJARYXbWlrZWFsQG1pa2VhbHJvZ2Vycy5jb20wgZ8wDQYJKoZIhvcNAQEB
6
- BQADgY0AMIGJAoGBALu32lBQArjlclhMjo2sXSfcbYdmx836s9hJXPMvxK5XJvW0
7
- deiz69s+bc0ojgTxfXJUBdTwKMnlKpeengMDKkCFqx6GjzVxuGTstdSEXPvw68Br
8
- 44P7FMAQCc1Dy0ZSvhUbKmUSN8PGwFW6pXaPwY81N+2v52s4IWWp8CAysGfjAgMB
9
- AAGgIzAhBgkqhkiG9w0BCQcxFBMScGFzc3dvcmQgY2hhbGxlbmdlMA0GCSqGSIb3
10
- DQEBBQUAA4GBAGJO7grHeVHXetjHEK8urIxdnvfB2qeZeObz4GPKIkqUurjr0rfj
11
- bA3EK1kDMR5aeQWR8RunixdM16Q6Ry0lEdLVWkdSwRN9dmirIHT9cypqnD/FYOia
12
- SdezZ0lUzXgmJIwRYRwB1KSMMocIf52ll/xC2bEGg7/ZAEuAyAgcZV3X
13
- -----END CERTIFICATE REQUEST-----
@@ -1,18 +0,0 @@
1
- -----BEGIN RSA PRIVATE KEY-----
2
- Proc-Type: 4,ENCRYPTED
3
- DEK-Info: DES-EDE3-CBC,C8B5887048377F02
4
-
5
- nyD5ZH0Wup2uWsDvurq5mKDaDrf8lvNn9w0SH/ZkVnfR1/bkwqrFriqJWvZNUG+q
6
- nS0iBYczsWLJnbub9a1zLOTENWUKVD5uqbC3aGHhnoUTNSa27DONgP8gHOn6JgR+
7
- GAKo01HCSTiVT4LjkwN337QKHnMP2fTzg+IoC/CigvMcq09hRLwU1/guq0GJKGwH
8
- gTxYNuYmQC4Tjh8vdS4liF+Ve/P3qPR2CehZrIOkDT8PHJBGQJRo4xGUIB7Tpk38
9
- VCk+UZ0JCS2coY8VkY/9tqFJp/ZnnQQVmaNbdRqg7ECKL+bXnNo7yjzmazPZmPe3
10
- /ShbE0+CTt7LrjCaQAxWbeDzqfo1lQfgN1LulTm8MCXpQaJpv7v1VhIhQ7afjMYb
11
- 4thW/ypHPiYS2YJCAkAVlua9Oxzzh1qJoh8Df19iHtpd79Q77X/qf+1JvITlMu0U
12
- gi7yEatmQcmYNws1mtTC1q2DXrO90c+NZ0LK/Alse6NRL/xiUdjug2iHeTf/idOR
13
- Gg/5dSZbnnlj1E5zjSMDkzg6EHAFmHV4jYGSAFLEQgp4V3ZhMVoWZrvvSHgKV/Qh
14
- FqrAK4INr1G2+/QTd09AIRzfy3/j6yD4A9iNaOsEf9Ua7Qh6RcALRCAZTWR5QtEf
15
- dX+iSNJ4E85qXs0PqwkMDkoaxIJ+tmIRJY7y8oeylV8cfGAi8Soubt/i3SlR8IHC
16
- uDMas/2OnwafK3N7ODeE1i7r7wkzQkSHaEz0TrF8XRnP25jAICCSLiMdAAjKfxVb
17
- EvzsFSuAy3Jt6bU3hSLY9o4YVYKE+68ITMv9yNjvTsEiW+T+IbN34w==
18
- -----END RSA PRIVATE KEY-----
@@ -1 +0,0 @@
1
- ADF62016AA40C9C7
@@ -1,30 +0,0 @@
1
- -----BEGIN RSA PRIVATE KEY-----
2
- Proc-Type: 4,ENCRYPTED
3
- DEK-Info: AES-128-CBC,F383CD86ECED9F72E8A8A5671B9B478F
4
-
5
- 0UwxIzEIrq2gNvP2M4S7ZlHKdZ9W69YyprT4tEVmauBYwZwwqLTdtsxZ7uWvPIiW
6
- oJHUNCUlgZ0qiUJBEAl23YArUS8PJmPCA57t8MK/8mnuOi2ke/w9FAERcRNZu5U2
7
- Ksxh8lUwyvwoFbsFuUkIJEAL7uRn6nhPZ2ftIp39k6oaP7TSuKHZCNUizQT4vHsl
8
- l9zg0BWsK+ORtQcckaCu3o/AnX5r1kTRR0DXaaagN6fCgxcGDljPv1ByHqvH+Kkp
9
- TjDbM7io+TOrjjfeoGV9EeeS4TJ0PRy9zouJRbeqnMqu1RUqhMGE2ey5MjXmU0EV
10
- gHs30563fySFFfNS2ziV5v4ml+ar06wqFaYKEQmxYdjUpLuMDFP186bak+WZ7OAe
11
- NQpdgdfLCB9OmAOMFlnNKEsMo145ChlpEEhcwtX9nYJlrDU9wvHm0AvFl1hMW11B
12
- 7I9G8B/XyPM/i92hmcwAtgd1A+90G1mWg0HjkQmzaOkGcYFVK+nlEyNleZI5I9CM
13
- Eelu0kBuibCSKztMoWmAKJEXUHtCvGCpCauvr+GkwPV/7lT8D68HGtpynOEqHl5g
14
- guTLzg0FxCOkpJgZapPiI77TxwbqJGnI8C5b1He1YyPkTHJNeP7lu4HJDbYEny5/
15
- C+zSagaP+i4ffa00zeiVHRKlEhygsz6gdGY0phnB9sCQvK3VIsrBEqk4U4FP5w+K
16
- L8JZJGDWmMwDl4mgVvSiRsDFTPCSfCd0FRmpZnlrVr4306qvkz/1aBE86y0bjZfk
17
- EcJTWnXVf09J0YbnCHGblNi8MwRi7MCoqmGXHGTxwmpB0gdXuUJCigmm8xSMRqSr
18
- To8La6apf/QujfSHcxBXnf8JCFO6v59SUMDhx2oce/gYRTejx7L+f/UhVo4EvRF6
19
- W92pNDCkjeJKU2nNwsV/HeAJml81xxCYQA80PsVMu/27inkDSSP4egapcXr0T1OV
20
- ic+VTR4Tl3g9hI4YBL43+hsJWaxVMpT022ZB6bcTgYFTDQcoAwilOoadF+rVxer/
21
- ry8ORowY5GRH+zlLE3zetn87EAijwux2/QhnGE3eDFc0FbI008wzRQwhqV/S22yF
22
- XYKh5ni5Xg2tguUMuBC8hr9xjpUe3nP7u/W45f/0BCE6eeJzXTunMWTrBCigMzEq
23
- 7OvmIhz7sqb18NC68z4Fj5vmpSqf8//RCyE7Sk0pX7VgSIKX92qopqi/5yroQwFf
24
- jLanlxi4QRBLTBJoXnm+I5kh6dEbV0OaUskKwXqW5T2wAgOx5O6TTK+ZeFGyLSMW
25
- eJY6UnT/6vWAY10O5JiieRbzBaGGJgAQ1fTZYs16F3kbKYR9YvrQKi0ACo2pkYs8
26
- 1FvblxhmpMNRjpvOSpb+71vVgk8hD/v5XaVvVC4Wrm6gnsjlNZD0vQjcOWs1Q/a/
27
- jWKeB/gTUMIa5CWdzNRvSq2Cvgu5FJYf5qIdii7+FOgDv5VKgUugP5ZHHDQ1iwMZ
28
- o8NfMheG2x5ottq1m7VFS8IB+pWjJfsxSFtybJ8rdHzlbmEQyPzWYCWIQXPVvpNs
29
- oBm36btgWMrzQTjDrt+WKhkuau0NacTZqjugpCJKimBQ/lLYiuxjItUoWKn0mQO4
30
- -----END RSA PRIVATE KEY-----
@@ -1,20 +0,0 @@
1
- [ req ]
2
- default_bits = 1024
3
- days = 3650
4
- distinguished_name = req_distinguished_name
5
- attributes = req_attributes
6
- prompt = no
7
- output_password = password
8
-
9
- [ req_distinguished_name ]
10
- C = US
11
- ST = CA
12
- L = Oakland
13
- O = request
14
- OU = request@localhost
15
- CN = TestClient
16
- emailAddress = do.not@email.me
17
-
18
- [ req_attributes ]
19
- challengePassword = password challenge
20
-
@@ -1,20 +0,0 @@
1
- -----BEGIN CERTIFICATE-----
2
- MIIDLjCCApcCCQCt9iAWqkDJxzANBgkqhkiG9w0BAQUFADCBojELMAkGA1UEBhMC
3
- VVMxCzAJBgNVBAgTAkNBMRAwDgYDVQQHEwdPYWtsYW5kMRAwDgYDVQQKEwdyZXF1
4
- ZXN0MSYwJAYDVQQLEx1yZXF1ZXN0IENlcnRpZmljYXRlIEF1dGhvcml0eTESMBAG
5
- A1UEAxMJcmVxdWVzdENBMSYwJAYJKoZIhvcNAQkBFhdtaWtlYWxAbWlrZWFscm9n
6
- ZXJzLmNvbTAeFw0xODExMjIxNTIzMjNaFw0yMTExMjExNTIzMjNaMIGPMQswCQYD
7
- VQQGEwJVUzELMAkGA1UECAwCQ0ExEDAOBgNVBAcMB09ha2xhbmQxEDAOBgNVBAoM
8
- B3JlcXVlc3QxGjAYBgNVBAsMEXJlcXVlc3RAbG9jYWxob3N0MRMwEQYDVQQDDApU
9
- ZXN0Q2xpZW50MR4wHAYJKoZIhvcNAQkBFg9kby5ub3RAZW1haWwubWUwggEiMA0G
10
- CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDFNIUKI5I/cOYMv7dYJzPMNEpd9d80
11
- lXueDWOtFflpKpnt3ssCk+pFIxlbnlBnFl1CIkpjAY9pqB4WoGpDARkkW0RqVleZ
12
- mlxBRMwfkzzTriURb0PtB7P7iRp+lcr+uraJg4sP9xEpZbq/CO1q584EQmiANVL3
13
- NAPdXf2kP91lUy+F5gZgZqkuPtDRXk1jqxTswRLqBmP5ublM/b9ZQS2Jmih7rVL4
14
- FiTo6E2DdjSYiZ1cQKSBw3rFWhiFLe3R2BjqK+/uD/hDdcT9sEtdqxLyLqFFBKLa
15
- cYcHcnZOMaohmN8vup26D199r5VP6cJvAh93XfxpCiNDl/S4KSCDq5G5AgMBAAEw
16
- DQYJKoZIhvcNAQEFBQADgYEAjINjRQxACmbp77ymVwaiUiy9YXbXLSsu8auZYDlu
17
- LqiZMIjm6hOOHZPlCC7QXBBRyUKXQnRC4+mOxWfcMwEztYqrX51fP/hVB0aF7hXg
18
- hcn0Ge65N9P8Kby6k/2ha/NQW7I17Sgg1PrvN5BkDFnZBrhNwZbzWwxwezifUwob
19
- ITQ=
20
- -----END CERTIFICATE-----
@@ -1,18 +0,0 @@
1
- -----BEGIN CERTIFICATE REQUEST-----
2
- MIIC+DCCAeACAQAwgY8xCzAJBgNVBAYTAlVTMQswCQYDVQQIDAJDQTEQMA4GA1UE
3
- BwwHT2FrbGFuZDEQMA4GA1UECgwHcmVxdWVzdDEaMBgGA1UECwwRcmVxdWVzdEBs
4
- b2NhbGhvc3QxEzARBgNVBAMMClRlc3RDbGllbnQxHjAcBgkqhkiG9w0BCQEWD2Rv
5
- Lm5vdEBlbWFpbC5tZTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMU0
6
- hQojkj9w5gy/t1gnM8w0Sl313zSVe54NY60V+Wkqme3eywKT6kUjGVueUGcWXUIi
7
- SmMBj2moHhagakMBGSRbRGpWV5maXEFEzB+TPNOuJRFvQ+0Hs/uJGn6Vyv66tomD
8
- iw/3ESllur8I7WrnzgRCaIA1Uvc0A91d/aQ/3WVTL4XmBmBmqS4+0NFeTWOrFOzB
9
- EuoGY/m5uUz9v1lBLYmaKHutUvgWJOjoTYN2NJiJnVxApIHDesVaGIUt7dHYGOor
10
- 7+4P+EN1xP2wS12rEvIuoUUEotpxhwdydk4xqiGY3y+6nboPX32vlU/pwm8CH3dd
11
- /GkKI0OX9LgpIIOrkbkCAwEAAaAjMCEGCSqGSIb3DQEJBzEUDBJwYXNzd29yZCBj
12
- aGFsbGVuZ2UwDQYJKoZIhvcNAQELBQADggEBALppUGqe3AVfnD28k8SPXI8LMl16
13
- 0VJWabujQVe1ycDZb/T+9Lcy5Xc6PKhn2yb4da/f528j3M1DsOafTUk+aqOaKHce
14
- o83TCZEdysKjntKQHTBWFT1lf1iOSsD7mT1GOaFmmc81Z6pUUjN8WNk7ybfPoLfb
15
- b+MNKkEqVVw1Ta/TeKGbc+K4Xi/T7VAAP2pJRY9ftrjDm1nciGJHu9NGyjAc8TQB
16
- YabIRAD7sdZkOWR0RSk06gJDqQGNqhn0tjzruDRdrtv5l1UiSPrrnyTOd75mZwXj
17
- LFs5qIQT5W/LRLJ4BkW3YNSiwFJxQ8a4DddYhkd+CadefQtRdgEI3+GhNcQ=
18
- -----END CERTIFICATE REQUEST-----