aboutsummaryrefslogtreecommitdiffstats
path: root/tests/lib/Security/CertificateTest.php
diff options
context:
space:
mode:
Diffstat (limited to 'tests/lib/Security/CertificateTest.php')
-rw-r--r--tests/lib/Security/CertificateTest.php104
1 files changed, 104 insertions, 0 deletions
diff --git a/tests/lib/Security/CertificateTest.php b/tests/lib/Security/CertificateTest.php
new file mode 100644
index 00000000000..732b431d73e
--- /dev/null
+++ b/tests/lib/Security/CertificateTest.php
@@ -0,0 +1,104 @@
+<?php
+
+declare(strict_types=1);
+
+/**
+ * SPDX-FileCopyrightText: 2019-2024 Nextcloud GmbH and Nextcloud contributors
+ * SPDX-FileCopyrightText: 2016 ownCloud, Inc.
+ * SPDX-License-Identifier: AGPL-3.0-only
+ */
+
+namespace Test\Security;
+
+use OC\Security\Certificate;
+
+class CertificateTest extends \Test\TestCase {
+ /** @var Certificate That contains a valid certificate */
+ protected $goodCertificate;
+ /** @var Certificate That contains an invalid certificate */
+ protected $invalidCertificate;
+ /** @var Certificate That contains an expired certificate */
+ protected $expiredCertificate;
+
+ protected function setUp(): void {
+ parent::setUp();
+
+ $goodCertificate = file_get_contents(__DIR__ . '/../../data/certificates/goodCertificate.crt');
+ $this->goodCertificate = new Certificate($goodCertificate, 'GoodCertificate');
+ $badCertificate = file_get_contents(__DIR__ . '/../../data/certificates/badCertificate.crt');
+ $this->invalidCertificate = new Certificate($badCertificate, 'BadCertificate');
+ $expiredCertificate = file_get_contents(__DIR__ . '/../../data/certificates/expiredCertificate.crt');
+ $this->expiredCertificate = new Certificate($expiredCertificate, 'ExpiredCertificate');
+ }
+
+
+ public function testBogusData(): void {
+ $this->expectException(\Exception::class);
+ $this->expectExceptionMessage('Certificate could not get parsed.');
+
+ $certificate = new Certificate('foo', 'bar');
+ $certificate->getIssueDate();
+ }
+
+ public function testOpenSslTrustedCertificateFormat(): void {
+ $trustedCertificate = file_get_contents(__DIR__ . '/../../data/certificates/openSslTrustedCertificate.crt');
+ $certificate = new Certificate($trustedCertificate, 'TrustedCertificate');
+ $this->assertSame('thawte, Inc.', $certificate->getOrganization());
+ }
+
+ public function testCertificateStartingWithFileReference(): void {
+ $this->expectException(\Exception::class);
+ $this->expectExceptionMessage('Certificate could not get parsed.');
+
+ new Certificate('file://' . __DIR__ . '/../../data/certificates/goodCertificate.crt', 'bar');
+ }
+
+ public function testGetName(): void {
+ $this->assertSame('GoodCertificate', $this->goodCertificate->getName());
+ $this->assertSame('BadCertificate', $this->invalidCertificate->getName());
+ }
+
+ public function testGetCommonName(): void {
+ $this->assertSame('security.owncloud.com', $this->goodCertificate->getCommonName());
+ $this->assertSame(null, $this->invalidCertificate->getCommonName());
+ }
+
+ public function testGetOrganization(): void {
+ $this->assertSame('ownCloud Security', $this->goodCertificate->getOrganization());
+ $this->assertSame('Internet Widgits Pty Ltd', $this->invalidCertificate->getOrganization());
+ }
+
+ public function testGetIssueDate(): void {
+ $expected = new \DateTime('2015-08-27 20:03:42 GMT');
+ $this->assertEquals($expected->getTimestamp(), $this->goodCertificate->getIssueDate()->getTimestamp());
+ $expected = new \DateTime('2015-08-27 20:19:13 GMT');
+ $this->assertEquals($expected->getTimestamp(), $this->invalidCertificate->getIssueDate()->getTimestamp());
+ }
+
+ public function testGetExpireDate(): void {
+ $expected = new \DateTime('2025-08-24 20:03:42 GMT');
+ $this->assertEquals($expected->getTimestamp(), $this->goodCertificate->getExpireDate()->getTimestamp());
+ $expected = new \DateTime('2025-08-24 20:19:13 GMT');
+ $this->assertEquals($expected->getTimestamp(), $this->invalidCertificate->getExpireDate()->getTimestamp());
+ $expected = new \DateTime('2014-08-28 09:12:43 GMT');
+ $this->assertEquals($expected->getTimestamp(), $this->expiredCertificate->getExpireDate()->getTimestamp());
+ }
+
+ public function testIsExpired(): void {
+ $this->assertSame(false, $this->goodCertificate->isExpired());
+ $this->assertSame(false, $this->invalidCertificate->isExpired());
+ $this->assertSame(true, $this->expiredCertificate->isExpired());
+ }
+
+ public function testGetIssuerName(): void {
+ $this->assertSame('security.owncloud.com', $this->goodCertificate->getIssuerName());
+ $this->assertSame(null, $this->invalidCertificate->getIssuerName());
+ $this->assertSame(null, $this->expiredCertificate->getIssuerName());
+ }
+
+ public function testGetIssuerOrganization(): void {
+ $this->assertSame('ownCloud Security', $this->goodCertificate->getIssuerOrganization());
+ $this->assertSame('Internet Widgits Pty Ltd', $this->invalidCertificate->getIssuerOrganization());
+ $this->assertSame('Internet Widgits Pty Ltd', $this->expiredCertificate->getIssuerOrganization());
+ }
+}