@@ -34,7 +34,7 @@ class SignedJWTVerifierTest extends SignedDataVerifier {
34
34
35
35
describe ( "Chain Verification Checks" , ( ) => {
36
36
it ( 'should validate a chain without OCSP' , async ( ) => {
37
- const verifier = new SignedJWTVerifierTest ( [ Buffer . from ( ROOT_CA_BASE64_ENCODED , 'base64' ) ] , false , Environment . PRODUCTION , "com.example" ) ;
37
+ const verifier = new SignedJWTVerifierTest ( [ Buffer . from ( ROOT_CA_BASE64_ENCODED , 'base64' ) ] , false , Environment . PRODUCTION , "com.example" , 1234 ) ;
38
38
const publicKey = await verifier . testVerifyCertificateChain ( verifier . getRootCertificates ( ) , LEAF_CERT_BASE64_ENCODED , INTERMEDIATE_CA_BASE64_ENCODED )
39
39
expect ( Buffer . from ( LEAF_CERT_PUBLIC_KEY_BASE64_ENCODED , 'base64' ) ) . toMatchObject ( publicKey . export ( {
40
40
type : 'spki' ,
@@ -43,7 +43,7 @@ describe("Chain Verification Checks", () => {
43
43
} )
44
44
45
45
it ( 'should fail to validate a chain with an invalid intermediate OID' , async ( ) => {
46
- const verifier = new SignedJWTVerifierTest ( [ Buffer . from ( ROOT_CA_BASE64_ENCODED , 'base64' ) ] , false , Environment . PRODUCTION , "com.example" ) ;
46
+ const verifier = new SignedJWTVerifierTest ( [ Buffer . from ( ROOT_CA_BASE64_ENCODED , 'base64' ) ] , false , Environment . PRODUCTION , "com.example" , 1234 ) ;
47
47
try {
48
48
await verifier . testVerifyCertificateChain ( verifier . getRootCertificates ( ) , LEAF_CERT_FOR_INTERMEDIATE_CA_INVALID_OID_BASE64_ENCODED , INTERMEDIATE_CA_INVALID_OID_BASE64_ENCODED )
49
49
assert ( false )
@@ -54,7 +54,7 @@ describe("Chain Verification Checks", () => {
54
54
} )
55
55
56
56
it ( 'should fail to validate a chain with an invalid leaf OID' , async ( ) => {
57
- const verifier = new SignedJWTVerifierTest ( [ Buffer . from ( ROOT_CA_BASE64_ENCODED , 'base64' ) ] , false , Environment . PRODUCTION , "com.example" ) ;
57
+ const verifier = new SignedJWTVerifierTest ( [ Buffer . from ( ROOT_CA_BASE64_ENCODED , 'base64' ) ] , false , Environment . PRODUCTION , "com.example" , 1234 ) ;
58
58
try {
59
59
await verifier . testVerifyCertificateChain ( verifier . getRootCertificates ( ) , LEAF_CERT_INVALID_OID_BASE64_ENCODED , INTERMEDIATE_CA_BASE64_ENCODED )
60
60
assert ( false )
@@ -65,7 +65,7 @@ describe("Chain Verification Checks", () => {
65
65
} )
66
66
67
67
it ( 'should fail to validate a chain with empty root certificate array' , async ( ) => {
68
- const verifier = new SignedJWTVerifierTest ( [ ] , false , Environment . PRODUCTION , "com.example" ) ;
68
+ const verifier = new SignedJWTVerifierTest ( [ ] , false , Environment . PRODUCTION , "com.example" , 1234 ) ;
69
69
try {
70
70
await verifier . testVerifyCertificateChain ( verifier . getRootCertificates ( ) , LEAF_CERT_BASE64_ENCODED , INTERMEDIATE_CA_BASE64_ENCODED )
71
71
assert ( false )
@@ -76,7 +76,7 @@ describe("Chain Verification Checks", () => {
76
76
} )
77
77
78
78
it ( 'should fail to validate a chain with an expired chain' , async ( ) => {
79
- const verifier = new SignedJWTVerifierTest ( [ Buffer . from ( ROOT_CA_BASE64_ENCODED , 'base64' ) ] , false , Environment . PRODUCTION , "com.example" ) ;
79
+ const verifier = new SignedJWTVerifierTest ( [ Buffer . from ( ROOT_CA_BASE64_ENCODED , 'base64' ) ] , false , Environment . PRODUCTION , "com.example" , 1234 ) ;
80
80
verifier . effectiveDate = new Date ( 2280946846000 )
81
81
try {
82
82
await verifier . testVerifyCertificateChain ( verifier . getRootCertificates ( ) , LEAF_CERT_BASE64_ENCODED , INTERMEDIATE_CA_BASE64_ENCODED )
@@ -88,12 +88,12 @@ describe("Chain Verification Checks", () => {
88
88
} )
89
89
90
90
it ( 'should validate a real chain with OCSP' , async ( ) => {
91
- const verifier = new SignedJWTVerifierTest ( [ Buffer . from ( REAL_APPLE_ROOT_BASE64_ENCODED , 'base64' ) ] , true , Environment . PRODUCTION , "com.example" ) ;
91
+ const verifier = new SignedJWTVerifierTest ( [ Buffer . from ( REAL_APPLE_ROOT_BASE64_ENCODED , 'base64' ) ] , true , Environment . PRODUCTION , "com.example" , 1234 ) ;
92
92
await verifier . testVerifyCertificateChain ( verifier . getRootCertificates ( ) , REAL_APPLE_SIGNING_CERTIFICATE_BASE64_ENCODED , REAL_APPLE_INTERMEDIATE_BASE64_ENCODED )
93
93
} )
94
94
95
95
it ( 'should fail to validate a chain with mismatched root certificates' , async ( ) => {
96
- const verifier = new SignedJWTVerifierTest ( [ Buffer . from ( REAL_APPLE_ROOT_BASE64_ENCODED , 'base64' ) ] , false , Environment . PRODUCTION , "com.example" ) ;
96
+ const verifier = new SignedJWTVerifierTest ( [ Buffer . from ( REAL_APPLE_ROOT_BASE64_ENCODED , 'base64' ) ] , false , Environment . PRODUCTION , "com.example" , 1234 ) ;
97
97
try {
98
98
await verifier . testVerifyCertificateChain ( verifier . getRootCertificates ( ) , LEAF_CERT_BASE64_ENCODED , INTERMEDIATE_CA_BASE64_ENCODED )
99
99
assert ( false )
@@ -106,7 +106,7 @@ describe("Chain Verification Checks", () => {
106
106
107
107
it ( 'should fail to validate a chain with invalid root certificates' , async ( ) => {
108
108
try {
109
- const verifier = new SignedJWTVerifierTest ( [ Buffer . from ( "abc" , "utf-8" ) ] , false , Environment . PRODUCTION , "com.example" ) ;
109
+ const verifier = new SignedJWTVerifierTest ( [ Buffer . from ( "abc" , "utf-8" ) ] , false , Environment . PRODUCTION , "com.example" , 1234 ) ;
110
110
await verifier . testVerifyCertificateChain ( verifier . getRootCertificates ( ) , LEAF_CERT_BASE64_ENCODED , INTERMEDIATE_CA_BASE64_ENCODED )
111
111
} catch ( e ) {
112
112
return
0 commit comments