summaryrefslogtreecommitdiff
path: root/test/rubygems/test_gem_security_policy.rb
diff options
context:
space:
mode:
authordrbrain <drbrain@b2dd03c8-39d4-4d8f-98ff-823fe69b080e>2013-09-13 19:58:57 +0000
committerdrbrain <drbrain@b2dd03c8-39d4-4d8f-98ff-823fe69b080e>2013-09-13 19:58:57 +0000
commit1daa0b113d853bfa57b776cc569939b61ca14292 (patch)
treef8c4acb08a551820299dff2b13966d6ac38d31e4 /test/rubygems/test_gem_security_policy.rb
parent85995e88d49c442b5b113c2676456133e79f5c02 (diff)
* lib/rubygems: Update to RubyGems 2.1.3
Fixed installing platform gems Restored concurrent requires Fixed installing gems with extensions with --install-dir Fixed `gem fetch -v` to install the latest version Fixed installing gems with "./" in their files entries * test/rubygems/test_gem_package.rb: Tests for the above. * NEWS: Updated for RubyGems 2.1.3 git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@42938 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
Diffstat (limited to 'test/rubygems/test_gem_security_policy.rb')
-rw-r--r--test/rubygems/test_gem_security_policy.rb54
1 files changed, 1 insertions, 53 deletions
diff --git a/test/rubygems/test_gem_security_policy.rb b/test/rubygems/test_gem_security_policy.rb
index a2115e709a..1ce93fbd95 100644
--- a/test/rubygems/test_gem_security_policy.rb
+++ b/test/rubygems/test_gem_security_policy.rb
@@ -2,10 +2,6 @@
require 'rubygems/test_case'
-unless defined?(OpenSSL::SSL) then
- warn 'Skipping Gem::Security::Policy tests. openssl not found.'
-end
-
class TestGemSecurityPolicy < Gem::TestCase
ALTERNATE_KEY = load_key 'alternate'
@@ -15,7 +11,6 @@ class TestGemSecurityPolicy < Gem::TestCase
INVALIDCHILD_KEY = load_key 'invalidchild'
ALTERNATE_CERT = load_cert 'alternate'
- CA_CERT = load_cert 'ca'
CHILD_CERT = load_cert 'child'
EXPIRED_CERT = load_cert 'expired'
FUTURE_CERT = load_cert 'future'
@@ -290,11 +285,6 @@ class TestGemSecurityPolicy < Gem::TestCase
"(root of signing cert #{CHILD_CERT.subject})", e.message
end
- def test_subject
- assert_equal 'email:nobody@example', @no.subject(PUBLIC_CERT)
- assert_equal '/C=JP/O=JIN.GR.JP/OU=RRR/CN=CA', @no.subject(CA_CERT)
- end
-
def test_verify
Gem::Security.trust_dir.trust_cert PUBLIC_CERT
@@ -335,33 +325,6 @@ class TestGemSecurityPolicy < Gem::TestCase
assert_equal 'missing digest for 0', e.message
end
- def test_verify_no_signatures
- Gem::Security.trust_dir.trust_cert PUBLIC_CERT
-
- digests, = dummy_signatures
-
- use_ui @ui do
- @no.verify [PUBLIC_CERT], nil, digests, {}, 'some_gem'
- end
-
- assert_match "WARNING: some_gem is not signed\n", @ui.error
-
- assert_raises Gem::Security::Exception do
- @almost_no.verify [PUBLIC_CERT], nil, digests, {}
- end
- end
-
- def test_verify_no_signatures_no_digests
- Gem::Security.trust_dir.trust_cert PUBLIC_CERT
-
- use_ui @ui do
- @no.verify [PUBLIC_CERT], nil, {}, {}, 'some_gem'
- end
-
- assert_empty @ui.output
- assert_empty @ui.error
- end
-
def test_verify_not_enough_signatures
Gem::Security.trust_dir.trust_cert PUBLIC_CERT
@@ -378,21 +341,6 @@ class TestGemSecurityPolicy < Gem::TestCase
assert_equal 'missing digest for 1', e.message
end
- def test_verify_no_trust
- digests, signatures = dummy_signatures
-
- use_ui @ui do
- @low.verify [PUBLIC_CERT], nil, digests, signatures, 'some_gem'
- end
-
- assert_equal "WARNING: email:nobody@example is not trusted for some_gem\n",
- @ui.error
-
- assert_raises Gem::Security::Exception do
- @medium.verify [PUBLIC_CERT], nil, digests, signatures
- end
- end
-
def test_verify_wrong_digest_type
Gem::Security.trust_dir.trust_cert PUBLIC_CERT
@@ -536,5 +484,5 @@ class TestGemSecurityPolicy < Gem::TestCase
return digests, signatures
end
-end if defined?(OpenSSL::SSL)
+end