17888f89a9
* test notification token with agent and notifications server * notification server test with APNS mock * set environment variables in the test * use base64url encoding in encrypted notification data |
||
---|---|---|
.. | ||
.gitignore | ||
AuthKey_H82WD9K9AQ.p8 | ||
README.md | ||
ca.crt | ||
ca.key | ||
openssl_ca.conf | ||
openssl_server.conf | ||
server.crt | ||
server.key |
README.md
To generate fixtures:
(keep these instructions and openssl_ca.conf and openssl_server.conf files consistent with certificate generation on server)
# CA certificate (identity/offline)
openssl genpkey -algorithm ED448 -out ca.key
openssl req -new -x509 -days 999999 -config openssl_ca.conf -extensions v3 -key ca.key -out ca.crt
# Server certificate (online)
openssl genpkey -algorithm ED448 -out server.key
openssl req -new -config openssl_server.conf -reqexts v3 -key server.key -out server.csr
openssl x509 -req -days 999999 -extfile openssl_server.conf -extensions v3 -in server.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out server.crt
# To pretty-print
openssl x509 -in ca.crt -text -noout
openssl req -in server.csr -text -noout
openssl x509 -in server.crt -text -noout
To compute fingerprint for tests:
stack ghci
> import Data.X509.Validation (Fingerprint (..))
> Fingerprint fp <- loadFingerprint "tests/fixtures/ca.crt"
> strEncode fp