|
1 | 1 | require 'pact/hal/http_client'
|
| 2 | +require "faraday" |
| 3 | +require "faraday/retry" |
2 | 4 |
|
3 | 5 | module Pact
|
4 | 6 | module Hal
|
@@ -129,6 +131,80 @@ module Hal
|
129 | 131 | end
|
130 | 132 | end
|
131 | 133 | end
|
| 134 | + |
| 135 | + describe "x509 certificate" do |
| 136 | + FAKE_SERVER_URL = 'https://localhost:4444' |
| 137 | + X509_CERT_FILE_PATH = './spec/fixtures/certificates/client_cert.pem' |
| 138 | + X509_KEY_FILE_PATH = './spec/fixtures/certificates/key.pem' |
| 139 | + UNSIGNED_X509_CERT_FILE_PATH = './spec/fixtures/certificates/unsigned_cert.pem' |
| 140 | + UNSIGNED_X509_KEY_FILE_PATH = './spec/fixtures/certificates/unsigned_key.pem' |
| 141 | + |
| 142 | + def wait_for_server_to_start |
| 143 | + Faraday.new( |
| 144 | + url: FAKE_SERVER_URL, |
| 145 | + ssl: { |
| 146 | + verify: false, |
| 147 | + client_cert: OpenSSL::X509::Certificate.new(File.read(X509_CERT_FILE_PATH)), |
| 148 | + client_key: OpenSSL::PKey::RSA.new(File.read(X509_KEY_FILE_PATH)) |
| 149 | + } |
| 150 | + ) do |builder| |
| 151 | + builder.request :retry, max: 20, interval: 0.5, exceptions: [StandardError] |
| 152 | + builder.adapter :net_http |
| 153 | + end.get |
| 154 | + end |
| 155 | + |
| 156 | + let(:do_get) { subject.get(FAKE_SERVER_URL) } |
| 157 | + |
| 158 | + before(:all) do |
| 159 | + @pipe = IO.popen("bundle exec ruby ./spec/support/ssl_server.rb") |
| 160 | + ENV['SSL_CERT_FILE'] = "./spec/fixtures/certificates/ca_cert.pem" |
| 161 | + |
| 162 | + wait_for_server_to_start() |
| 163 | + end |
| 164 | + |
| 165 | + context "with valid x509 client certificates" do |
| 166 | + before do |
| 167 | + ENV['X509_CLIENT_CERT_FILE'] = X509_CERT_FILE_PATH |
| 168 | + ENV['X509_CLIENT_KEY_FILE'] = X509_KEY_FILE_PATH |
| 169 | + end |
| 170 | + |
| 171 | + it "succeeds" do |
| 172 | + expect(do_get.status).to eq 200 |
| 173 | + end |
| 174 | + end |
| 175 | + |
| 176 | + context "when invalid x509 certificates are set" do |
| 177 | + before do |
| 178 | + ENV['X509_CLIENT_CERT_FILE'] = UNSIGNED_X509_CERT_FILE_PATH |
| 179 | + ENV['X509_CLIENT_KEY_FILE'] = UNSIGNED_X509_KEY_FILE_PATH |
| 180 | + end |
| 181 | + |
| 182 | + it "fails raising SSL error" do |
| 183 | + expect { do_get } |
| 184 | + .to raise_error { |error| |
| 185 | + expect([OpenSSL::SSL::SSLError, Errno::ECONNRESET]).to include(error.class) |
| 186 | + } |
| 187 | + end |
| 188 | + end |
| 189 | + |
| 190 | + context "when no x509 certificates are set" do |
| 191 | + before do |
| 192 | + ENV['X509_CLIENT_CERT_FILE'] = nil |
| 193 | + ENV['X509_CLIENT_KEY_FILE'] = nil |
| 194 | + end |
| 195 | + |
| 196 | + it "fails raising SSL error" do |
| 197 | + expect { do_get } |
| 198 | + .to raise_error { |error| |
| 199 | + expect([OpenSSL::SSL::SSLError, Errno::ECONNRESET]).to include(error.class) |
| 200 | + } |
| 201 | + end |
| 202 | + end |
| 203 | + |
| 204 | + after(:all) do |
| 205 | + Process.kill "KILL", @pipe.pid |
| 206 | + end |
| 207 | + end |
132 | 208 | end
|
133 | 209 | end
|
134 | 210 | end
|
0 commit comments