import os import unittest import json import jc.parsers.x509_cert THIS_DIR = os.path.dirname(os.path.abspath(__file__)) class MyTests(unittest.TestCase): # input with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-ca-cert.der'), 'rb') as f: x509_ca_cert = f.read() with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-cert-and-key.pem'), 'r', encoding='utf-8') as f: x509_cert_and_key_pem = f.read() with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-letsencrypt.pem'), 'r', encoding='utf-8') as f: x509_letsencrypt = f.read() with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-multi-cert.pem'), 'r', encoding='utf-8') as f: x509_multi_cert = f.read() with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-string-serialnumber.der'), 'rb') as f: x509_string_serialnumber = f.read() with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-cert-bad-email.pem'), 'rb') as f: x509_cert_bad_email = f.read() with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-cert-superfluous-bits.pem'), 'rb') as f: x509_cert_superfluous_bits = f.read() with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-negative-serial.pem'), 'rb') as f: x509_cert_negative_serial = f.read() with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-cert-bad-email2.der'), 'rb') as f: x509_cert_bad_email2 = f.read() # output with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-ca-cert.json'), 'r', encoding='utf-8') as f: x509_ca_cert_json = json.loads(f.read()) with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-cert-and-key.json'), 'r', encoding='utf-8') as f: x509_cert_and_key_pem_json = json.loads(f.read()) with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-letsencrypt.json'), 'r', encoding='utf-8') as f: x509_letsencrypt_json = json.loads(f.read()) with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-multi-cert.json'), 'r', encoding='utf-8') as f: x509_multi_cert_json = json.loads(f.read()) with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-string-serialnumber.json'), 'r', encoding='utf-8') as f: x509_string_serialnumber_json = json.loads(f.read()) with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-cert-bad-email.json'), 'r', encoding='utf-8') as f: x509_cert_bad_email_json = json.loads(f.read()) with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-cert-superfluous-bits.json'), 'r', encoding='utf-8') as f: x509_cert_superfluous_bits_json = json.loads(f.read()) with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-negative-serial.json'), 'r', encoding='utf-8') as f: x509_cert_negative_serial_json = json.loads(f.read()) with open(os.path.join(THIS_DIR, os.pardir, 'tests/fixtures/generic/x509-cert-bad-email2.json'), 'r', encoding='utf-8') as f: x509_cert_bad_email2_json = json.loads(f.read()) def test_x509_cert_nodata(self): """ Test 'x509_cert' with no data """ self.assertEqual(jc.parsers.x509_cert.parse('', quiet=True), []) def test_x509_ca_cert(self): """ Test 'cat x509-ca-cert.der' (CA cert in DER format) """ self.assertEqual(jc.parsers.x509_cert.parse(self.x509_ca_cert, quiet=True), self.x509_ca_cert_json) def test_x509_cert_and_key(self): """ Test 'cat x509-cert-and-key.pem' (combo cert and key file in PEM format) """ self.assertEqual(jc.parsers.x509_cert.parse(self.x509_cert_and_key_pem, quiet=True), self.x509_cert_and_key_pem_json) def test_x509_letsencrypt(self): """ Test 'cat x509-letsencrypt.pem' (letsencrypt cert in PEM format) """ self.assertEqual(jc.parsers.x509_cert.parse(self.x509_letsencrypt, quiet=True), self.x509_letsencrypt_json) def test_x509_multi_cert(self): """ Test 'cat x509-multi-cert.pem' (PEM file with multiple certificates) """ self.assertEqual(jc.parsers.x509_cert.parse(self.x509_multi_cert, quiet=True), self.x509_multi_cert_json) def test_x509_string_serialnumber(self): """ Test 'cat x509-string-serialnumber.der' (DER file with string serial numbers) """ self.assertEqual(jc.parsers.x509_cert.parse(self.x509_multi_cert, quiet=True), self.x509_multi_cert_json) def test_x509_cert_bad_email(self): """ Test 'cat x509-cert-bad-email.pem' (PEM file with a non-compliant email address) """ self.assertEqual(jc.parsers.x509_cert.parse(self.x509_cert_bad_email, quiet=True), self.x509_cert_bad_email_json) def test_x509_cert_superfluous_bits(self): """ Test 'cat x509-cert-superfluous-bits.pem' (PEM file with more bits set for the keyUsage extension than defined by the RFC) """ self.assertEqual(jc.parsers.x509_cert.parse(self.x509_cert_superfluous_bits, quiet=True), self.x509_cert_superfluous_bits_json) def test_x509_cert_negative_serial(self): """ Test 'cat x509-cert-bad-email.pem' (PEM file with a non-compliant email address) """ self.assertEqual(jc.parsers.x509_cert.parse(self.x509_cert_negative_serial, quiet=True), self.x509_cert_negative_serial_json) def test_x509_cert_bad_email2(self): """ Test 'cat x509-cert-bad-email2.der' (DER file with a non-compliant email address - IDNA2008 encoded) """ self.assertEqual(jc.parsers.x509_cert.parse(self.x509_cert_bad_email2, quiet=True), self.x509_cert_bad_email2_json) if __name__ == '__main__': unittest.main()