diff options
author | drbrain <drbrain@b2dd03c8-39d4-4d8f-98ff-823fe69b080e> | 2013-09-13 19:58:57 +0000 |
---|---|---|
committer | drbrain <drbrain@b2dd03c8-39d4-4d8f-98ff-823fe69b080e> | 2013-09-13 19:58:57 +0000 |
commit | 1daa0b113d853bfa57b776cc569939b61ca14292 (patch) | |
tree | f8c4acb08a551820299dff2b13966d6ac38d31e4 /test/rubygems/test_gem_security_policy.rb | |
parent | 85995e88d49c442b5b113c2676456133e79f5c02 (diff) |
* lib/rubygems: Update to RubyGems 2.1.3
Fixed installing platform gems
Restored concurrent requires
Fixed installing gems with extensions with --install-dir
Fixed `gem fetch -v` to install the latest version
Fixed installing gems with "./" in their files entries
* test/rubygems/test_gem_package.rb: Tests for the above.
* NEWS: Updated for RubyGems 2.1.3
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@42938 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
Diffstat (limited to 'test/rubygems/test_gem_security_policy.rb')
-rw-r--r-- | test/rubygems/test_gem_security_policy.rb | 54 |
1 files changed, 1 insertions, 53 deletions
diff --git a/test/rubygems/test_gem_security_policy.rb b/test/rubygems/test_gem_security_policy.rb index a2115e709a..1ce93fbd95 100644 --- a/test/rubygems/test_gem_security_policy.rb +++ b/test/rubygems/test_gem_security_policy.rb @@ -2,10 +2,6 @@ require 'rubygems/test_case' -unless defined?(OpenSSL::SSL) then - warn 'Skipping Gem::Security::Policy tests. openssl not found.' -end - class TestGemSecurityPolicy < Gem::TestCase ALTERNATE_KEY = load_key 'alternate' @@ -15,7 +11,6 @@ class TestGemSecurityPolicy < Gem::TestCase INVALIDCHILD_KEY = load_key 'invalidchild' ALTERNATE_CERT = load_cert 'alternate' - CA_CERT = load_cert 'ca' CHILD_CERT = load_cert 'child' EXPIRED_CERT = load_cert 'expired' FUTURE_CERT = load_cert 'future' @@ -290,11 +285,6 @@ class TestGemSecurityPolicy < Gem::TestCase "(root of signing cert #{CHILD_CERT.subject})", e.message end - def test_subject - assert_equal 'email:nobody@example', @no.subject(PUBLIC_CERT) - assert_equal '/C=JP/O=JIN.GR.JP/OU=RRR/CN=CA', @no.subject(CA_CERT) - end - def test_verify Gem::Security.trust_dir.trust_cert PUBLIC_CERT @@ -335,33 +325,6 @@ class TestGemSecurityPolicy < Gem::TestCase assert_equal 'missing digest for 0', e.message end - def test_verify_no_signatures - Gem::Security.trust_dir.trust_cert PUBLIC_CERT - - digests, = dummy_signatures - - use_ui @ui do - @no.verify [PUBLIC_CERT], nil, digests, {}, 'some_gem' - end - - assert_match "WARNING: some_gem is not signed\n", @ui.error - - assert_raises Gem::Security::Exception do - @almost_no.verify [PUBLIC_CERT], nil, digests, {} - end - end - - def test_verify_no_signatures_no_digests - Gem::Security.trust_dir.trust_cert PUBLIC_CERT - - use_ui @ui do - @no.verify [PUBLIC_CERT], nil, {}, {}, 'some_gem' - end - - assert_empty @ui.output - assert_empty @ui.error - end - def test_verify_not_enough_signatures Gem::Security.trust_dir.trust_cert PUBLIC_CERT @@ -378,21 +341,6 @@ class TestGemSecurityPolicy < Gem::TestCase assert_equal 'missing digest for 1', e.message end - def test_verify_no_trust - digests, signatures = dummy_signatures - - use_ui @ui do - @low.verify [PUBLIC_CERT], nil, digests, signatures, 'some_gem' - end - - assert_equal "WARNING: email:nobody@example is not trusted for some_gem\n", - @ui.error - - assert_raises Gem::Security::Exception do - @medium.verify [PUBLIC_CERT], nil, digests, signatures - end - end - def test_verify_wrong_digest_type Gem::Security.trust_dir.trust_cert PUBLIC_CERT @@ -536,5 +484,5 @@ class TestGemSecurityPolicy < Gem::TestCase return digests, signatures end -end if defined?(OpenSSL::SSL) +end |