summaryrefslogtreecommitdiff
path: root/node_modules/selfsigned/test
diff options
context:
space:
mode:
authorakiyamn2023-09-24 23:22:21 +1000
committerakiyamn2023-09-24 23:22:21 +1000
commit4e87195739f2a5d9a05451b48773c8afdc680765 (patch)
tree9cba501844a4a11dcbdffc4050ed8189561c55ed /node_modules/selfsigned/test
downloadprice-tracker-worker-4e87195739f2a5d9a05451b48773c8afdc680765.tar.gz
price-tracker-worker-4e87195739f2a5d9a05451b48773c8afdc680765.zip
Initial commit (by create-cloudflare CLI)
Diffstat (limited to 'node_modules/selfsigned/test')
-rw-r--r--node_modules/selfsigned/test/tests.js156
1 files changed, 156 insertions, 0 deletions
diff --git a/node_modules/selfsigned/test/tests.js b/node_modules/selfsigned/test/tests.js
new file mode 100644
index 0000000..be003fb
--- /dev/null
+++ b/node_modules/selfsigned/test/tests.js
@@ -0,0 +1,156 @@
+var { assert } = require('chai');
+var forge = require('node-forge');
+var fs = require('fs');
+var exec = require('child_process').exec;
+
+describe('generate', function () {
+
+ var generate = require('../index').generate;
+
+ it('should work without attrs/options', function (done) {
+ var pems = generate();
+ assert.ok(!!pems.private, 'has a private key');
+ assert.ok(!!pems.fingerprint, 'has fingerprint');
+ assert.ok(!!pems.public, 'has a public key');
+ assert.ok(!!pems.cert, 'has a certificate');
+ assert.ok(!pems.pkcs7, 'should not include a pkcs7 by default');
+ assert.ok(!pems.clientcert, 'should not include a client cert by default');
+ assert.ok(!pems.clientprivate, 'should not include a client private key by default');
+ assert.ok(!pems.clientpublic, 'should not include a client public key by default');
+
+ var caStore = forge.pki.createCaStore();
+ caStore.addCertificate(pems.cert);
+ done();
+ });
+
+ it('should generate client cert', function (done) {
+ var pems = generate(null, {clientCertificate: true});
+
+ assert.ok(!!pems.clientcert, 'should include a client cert when requested');
+ assert.ok(!!pems.clientprivate, 'should include a client private key when requested');
+ assert.ok(!!pems.clientpublic, 'should include a client public key when requested');
+ done();
+ });
+
+ it('should include pkcs7', function (done) {
+ var pems = generate([{ name: 'commonName', value: 'contoso.com' }], {pkcs7: true});
+
+ assert.ok(!!pems.pkcs7, 'has a pkcs7');
+
+ try {
+ fs.unlinkSync('/tmp/tmp.pkcs7');
+ } catch (er) {}
+
+ fs.writeFileSync('/tmp/tmp.pkcs7', pems.pkcs7);
+ exec('openssl pkcs7 -print_certs -in /tmp/tmp.pkcs7', function (err, stdout, stderr) {
+ if (err) {
+ return done(err);
+ }
+
+ const errorMessage = stderr.toString();
+ if (errorMessage.length) {
+ return done(new Error(errorMessage));
+ }
+
+ const expected = stdout.toString();
+ let [ subjectLine,issuerLine, ...cert ] = expected.split(/\r?\n/).filter(c => c);
+ cert = cert.filter(c => c);
+ assert.match(subjectLine, /subject=\/?CN\s?=\s?contoso.com/i);
+ assert.match(issuerLine, /issuer=\/?CN\s?=\s?contoso.com/i);
+ assert.strictEqual(
+ pems.cert,
+ cert.join('\r\n') + '\r\n'
+ );
+
+ done();
+ });
+ });
+
+ it('should support sha1 algorithm', function (done) {
+ var pems_sha1 = generate(null, { algorithm: 'sha1' });
+ assert.ok(forge.pki.certificateFromPem(pems_sha1.cert).siginfo.algorithmOid === forge.pki.oids['sha1WithRSAEncryption'], 'can generate sha1 certs');
+ done();
+ });
+
+ it('should support sha256 algorithm', function (done) {
+ var pems_sha256 = generate(null, { algorithm: 'sha256' });
+ assert.ok(forge.pki.certificateFromPem(pems_sha256.cert).siginfo.algorithmOid === forge.pki.oids['sha256WithRSAEncryption'], 'can generate sha256 certs');
+ done();
+ });
+
+ describe('with callback', function () {
+ it('should work without attrs/options', function (done) {
+ generate(function (err, pems) {
+ if (err) done(err);
+ assert.ok(!!pems.private, 'has a private key');
+ assert.ok(!!pems.public, 'has a public key');
+ assert.ok(!!pems.cert, 'has a certificate');
+ assert.ok(!pems.pkcs7, 'should not include a pkcs7 by default');
+ assert.ok(!pems.clientcert, 'should not include a client cert by default');
+ assert.ok(!pems.clientprivate, 'should not include a client private key by default');
+ assert.ok(!pems.clientpublic, 'should not include a client public key by default');
+ done();
+ });
+ });
+
+ it('should generate client cert', function (done) {
+ generate(null, {clientCertificate: true}, function (err, pems) {
+ if (err) done(err);
+ assert.ok(!!pems.clientcert, 'should include a client cert when requested');
+ assert.ok(!!pems.clientprivate, 'should include a client private key when requested');
+ assert.ok(!!pems.clientpublic, 'should include a client public key when requested');
+ done();
+ });
+ });
+
+ it('should include pkcs7', function (done) {
+ generate([{ name: 'commonName', value: 'contoso.com' }], {pkcs7: true}, function (err, pems) {
+ if (err) done(err);
+ assert.ok(!!pems.pkcs7, 'has a pkcs7');
+
+ try {
+ fs.unlinkSync('/tmp/tmp.pkcs7');
+ } catch (er) {}
+
+ fs.writeFileSync('/tmp/tmp.pkcs7', pems.pkcs7);
+ exec('openssl pkcs7 -print_certs -in /tmp/tmp.pkcs7', function (err, stdout, stderr) {
+ if (err) {
+ return done(err);
+ }
+
+ const errorMessage = stderr.toString();
+ if (errorMessage.length) {
+ return done(new Error(errorMessage));
+ }
+
+ const expected = stdout.toString();
+ let [ subjectLine,issuerLine, ...cert ] = expected.split(/\r?\n/).filter(c => c);
+ assert.match(subjectLine, /subject=\/?CN\s?=\s?contoso.com/i);
+ assert.match(issuerLine, /issuer=\/?CN\s?=\s?contoso.com/i);
+ assert.strictEqual(
+ pems.cert,
+ cert.join('\r\n') + '\r\n'
+ );
+
+ done();
+ });
+ });
+ });
+
+ it('should support sha1 algorithm', function (done) {
+ generate(null, { algorithm: 'sha1' }, function (err, pems_sha1) {
+ if (err) done(err);
+ assert.ok(forge.pki.certificateFromPem(pems_sha1.cert).siginfo.algorithmOid === forge.pki.oids['sha1WithRSAEncryption'], 'can generate sha1 certs');
+ done();
+ });
+ });
+
+ it('should support sha256 algorithm', function (done) {
+ generate(null, { algorithm: 'sha256' }, function (err, pems_sha256) {
+ if (err) done(err);
+ assert.ok(forge.pki.certificateFromPem(pems_sha256.cert).siginfo.algorithmOid === forge.pki.oids['sha256WithRSAEncryption'], 'can generate sha256 certs');
+ done();
+ });
+ });
+ });
+});