inspec/test/unit/resources/x509_certificate_test.rb
Christoph Hartmann d2f000e435 refactor x509 resources and rsa key
Signed-off-by: Christoph Hartmann <chris@lollyrock.com>
2017-03-22 11:44:32 +01:00

86 lines
3.3 KiB
Ruby

# encoding: utf-8
# author: Richard Nixon
require 'helper'
require 'inspec/resource'
describe 'Inspec::Resources::X509Certificate' do
let (:resource_cert) {
load_resource(
'x509_certificate',
'test_certificate.rsa.crt.pem'
)
}
it 'verify subject distingushed name' do
_(resource_cert.send('subject_dn')).must_match 'Inspec Test Certificate'
end
it 'parses the certificate subject' do
_(resource_cert.send('subject').CN).must_equal 'Inspec Test Certificate'
_(resource_cert.send('subject').emailAddress).must_equal 'support@chef.io'
end
it 'verify issue distingushed name' do
_(resource_cert.send('issuer_dn')).must_match 'Inspec Test CA'
end
it 'parses the issuer' do
_(resource_cert.send('issuer').CN).must_equal 'Inspec Test CA'
end
it 'parses the public key' do
_(resource_cert.send('public_key').to_s).must_match "-----BEGIN PUBLIC KEY-----\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAxi1Tp4dPQ+GU+RipsguU\nWT50a6fsBCpe+QT0YdW/7GG6kynRzR+fzQ0q1LDxpgqAH+eDIWEAFYoTPc8haAjZ\nvAYn7JlXUQpeoK7fc2BPgYA0lr33Ee0H9nqeZlnytQ+/EVUqqDx61cgeW3ARAK1I\nODwhuziuTi7XNu+HTx3feH4ohq/FppB26PYfJo1jCmt7YxHxl6AGrYrEX5zubQR0\nAtPAJzg0/aqDH5GJHJETjloIxh/KLnGlbG3DJylFU+vPxvns1TKM0dezg8UefXer\nRtxDAwSix7sNctXwa0xToc6O+e/StNPR0eLvILS8iR89fuML57Z4AGFWMNdqTYoj\nqwIDAQAB\n-----END PUBLIC KEY-----\n"
end
it 'can determine fingerprint' do
_(resource_cert.send('fingerprint')).must_equal '62bb500b0190ae47fd593c29a0b92ddbeb6c1eb6'
end
it 'can determine the key length' do
_(resource_cert.send('key_length')).must_equal 2048
end
it 'parses the serial number' do
_(resource_cert.send('serial')).must_equal 37
end
it 'parses the signature algorithm' do
_(resource_cert.send('signature_algorithm')).must_equal 'sha256WithRSAEncryption'
end
it 'parses the x.509 certificate version' do
_(resource_cert.send('version')).must_equal 2
end
it 'includes the standard extensions even if they are not in the certificate' do
_(resource_cert.send('extensions').length).must_equal 16
_(resource_cert.send('extensions')).must_include 'keyUsage'
_(resource_cert.send('extensions')).must_include 'extendedKeyUsage'
_(resource_cert.send('extensions')).must_include 'subjectAltName'
end
it 'parses the x.509 certificate extensions' do
_(resource_cert.send('extensions')['keyUsage']).must_include "Digital Signature"
_(resource_cert.send('extensions')['keyUsage']).must_include "Non Repudiation"
_(resource_cert.send('extensions')['keyUsage']).must_include "Data Encipherment"
_(resource_cert.send('extensions')['extendedKeyUsage']).must_include "TLS Web Server Authentication"
_(resource_cert.send('extensions')['extendedKeyUsage']).must_include "Code Signing"
_(resource_cert.send('extensions')['subjectAltName']).must_include "email:support@chef.io"
end
it 'parses missing x.509 certificate extensions' do
_(resource_cert.send('extensions')['nameConstraints']).wont_include "Fried Chicken"
end
it 'calculates the remaining days of validity' do
# Still valid
Time.stub :now, Time.new(2018, 2, 1, 1, 28, 57, '+00:00') do
_(resource_cert.send('validity_in_days')).must_equal 28
end
# Expired
Time.stub :now, Time.new(2018, 4, 1, 1, 28, 57, '+00:00') do
_(resource_cert.send('validity_in_days')).must_equal (-31)
end
end
end