summaryrefslogtreecommitdiff
path: root/trunk/test/net/http/test_https.rb
diff options
context:
space:
mode:
Diffstat (limited to 'trunk/test/net/http/test_https.rb')
-rw-r--r--trunk/test/net/http/test_https.rb97
1 files changed, 0 insertions, 97 deletions
diff --git a/trunk/test/net/http/test_https.rb b/trunk/test/net/http/test_https.rb
deleted file mode 100644
index adb50c58fb..0000000000
--- a/trunk/test/net/http/test_https.rb
+++ /dev/null
@@ -1,97 +0,0 @@
-require "test/unit"
-begin
- require 'net/https'
- require 'stringio'
- require File.expand_path("../../openssl/utils", File.dirname(__FILE__))
- require File.expand_path("utils", File.dirname(__FILE__))
-rescue LoadError
- # should skip this test
-end
-
-class TestNetHTTPS < Test::Unit::TestCase
- include TestNetHTTPUtils
-
- subject = OpenSSL::X509::Name.parse("/DC=org/DC=ruby-lang/CN=localhost")
- exts = [
- ["keyUsage", "keyEncipherment,digitalSignature", true],
- ]
- key = OpenSSL::TestUtils::TEST_KEY_RSA1024
- cert = OpenSSL::TestUtils.issue_cert(
- subject, key, 1, Time.now, Time.now + 3600, exts,
- nil, nil, OpenSSL::Digest::SHA1.new
- )
-
- CONFIG = {
- 'host' => '127.0.0.1',
- 'port' => 10081,
- 'proxy_host' => nil,
- 'proxy_port' => nil,
- 'ssl_enable' => true,
- 'ssl_certificate' => cert,
- 'ssl_private_key' => key,
- }
-
- def test_get
- http = Net::HTTP.new("localhost", config("port"))
- http.use_ssl = true
- http.verify_callback = Proc.new do |preverify_ok, store_ctx|
- store_ctx.current_cert.to_der == config('ssl_certificate').to_der
- end
- http.request_get("/") {|res|
- assert_equal($test_net_http_data, res.body)
- }
- end
-
- def test_post
- http = Net::HTTP.new("localhost", config("port"))
- http.use_ssl = true
- http.verify_callback = Proc.new do |preverify_ok, store_ctx|
- store_ctx.current_cert.to_der == config('ssl_certificate').to_der
- end
- data = config('ssl_private_key').to_der
- http.request_post("/", data) {|res|
- assert_equal(data, res.body)
- }
- end
-
- if ENV["RUBY_OPENSSL_TEST_ALL"]
- def test_verify
- http = Net::HTTP.new("ssl.netlab.jp", 443)
- http.use_ssl = true
- assert(
- (http.request_head("/"){|res| } rescue false),
- "The system may not have default CA certificate store."
- )
- end
- end
-
- def test_verify_none
- http = Net::HTTP.new("localhost", config("port"))
- http.use_ssl = true
- http.verify_mode = OpenSSL::SSL::VERIFY_NONE
- http.request_get("/") {|res|
- assert_equal($test_net_http_data, res.body)
- }
- end
-
- def test_certificate_verify_failure
- http = Net::HTTP.new("localhost", config("port"))
- http.use_ssl = true
- ex = assert_raise(OpenSSL::SSL::SSLError){
- http.request_get("/") {|res| }
- }
- assert_match(/certificate verify failed/, ex.message)
- end
-
- def test_identity_verify_failure
- http = Net::HTTP.new("127.0.0.1", config("port"))
- http.use_ssl = true
- http.verify_callback = Proc.new do |preverify_ok, store_ctx|
- store_ctx.current_cert.to_der == config('ssl_certificate').to_der
- end
- ex = assert_raise(OpenSSL::SSL::SSLError){
- http.request_get("/") {|res| }
- }
- assert_match(/hostname was not match/, ex.message)
- end
-end if defined?(OpenSSL)