ciam-es 0.0.2 → 0.0.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/ciam-es.gemspec +1 -1
- data/lib/ciam/ruby-saml/authrequest.rb +12 -12
- data/lib/ciam/ruby-saml/logout_request.rb +76 -55
- data/lib/ciam/ruby-saml/logout_response.rb +44 -26
- data/lib/ciam/ruby-saml/metadata.rb +2 -51
- data/lib/ciam/ruby-saml/response.rb +6 -7
- data/lib/ciam/ruby-saml/settings.rb +1 -1
- data/lib/ciam/ruby-saml/version.rb +1 -1
- metadata +3 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: e1ce973bd3d499cd24750bfc8fbaec35056734fd284a1c2e2cc5e5ad4e97298e
|
4
|
+
data.tar.gz: 4d0ec7b507ccbd00422bd868460efeefb358de04ab4b92bb185591b7922bb2c4
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 426e3b6ea6bac67c4f25f0ad0636519e8d24f93d5ac87f457ccf7e6a08c7f81d157ece5aa2be393c516c3b9e310edabbe10e8a278b55f68acf65df3295ba7bd8
|
7
|
+
data.tar.gz: 98c23881eb82db9f2c790d91347ba2c38e249b9c689dc44db07e1ce166f7db495cde8d4c73dc0d4d13e0ab2647dcf7c46981194de8a7f726371463df486f4d4c
|
data/ciam-es.gemspec
CHANGED
@@ -2,7 +2,7 @@ $LOAD_PATH.push File.expand_path('../lib', __FILE__)
|
|
2
2
|
|
3
3
|
Gem::Specification.new do |s|
|
4
4
|
s.name = 'ciam-es'
|
5
|
-
s.version = '0.0.
|
5
|
+
s.version = '0.0.7'
|
6
6
|
|
7
7
|
s.required_rubygems_version = Gem::Requirement.new(">= 0") if s.respond_to? :required_rubygems_version=
|
8
8
|
s.authors = ["Fabiano Pavan"]
|
@@ -29,7 +29,7 @@ module Ciam::Saml
|
|
29
29
|
# Create AuthnRequest root element using REXML
|
30
30
|
request_doc = Ciam::XMLSecurityNew::Document.new
|
31
31
|
request_doc.context[:attribute_quote] = :quote
|
32
|
-
root = request_doc.add_element "
|
32
|
+
root = request_doc.add_element "samlp:AuthnRequest", { "xmlns:samlp" => "urn:oasis:names:tc:SAML:2.0:protocol",
|
33
33
|
"xmlns:saml" => "urn:oasis:names:tc:SAML:2.0:assertion"
|
34
34
|
}
|
35
35
|
root.attributes['ID'] = uuid
|
@@ -72,7 +72,7 @@ module Ciam::Saml
|
|
72
72
|
|
73
73
|
|
74
74
|
if @settings.name_identifier_format != nil
|
75
|
-
root.add_element "
|
75
|
+
root.add_element "samlp:NameIDPolicy", {
|
76
76
|
# Might want to make AllowCreate a setting?
|
77
77
|
#{}"AllowCreate" => "true",
|
78
78
|
"Format" => @settings.name_identifier_format[0]
|
@@ -83,8 +83,8 @@ module Ciam::Saml
|
|
83
83
|
# match required for authentication to succeed. If this is not defined,
|
84
84
|
# the IdP will choose default rules for authentication. (Shibboleth IdP)
|
85
85
|
if @settings.authn_context != nil
|
86
|
-
requested_context = root.add_element "
|
87
|
-
"Comparison" => "
|
86
|
+
requested_context = root.add_element "samlp:RequestedAuthnContext", {
|
87
|
+
"Comparison" => "exact"
|
88
88
|
}
|
89
89
|
context_class = []
|
90
90
|
@settings.authn_context.each_with_index{ |context, index|
|
@@ -95,12 +95,12 @@ module Ciam::Saml
|
|
95
95
|
end
|
96
96
|
|
97
97
|
if @settings.requester_identificator != nil
|
98
|
-
requester_identificator = root.add_element "
|
98
|
+
requester_identificator = root.add_element "samlp:Scoping", {
|
99
99
|
"ProxyCount" => "0"
|
100
100
|
}
|
101
101
|
identificators = []
|
102
102
|
@settings.requester_identificator.each_with_index{ |requester, index|
|
103
|
-
identificators[index] = requester_identificator.add_element "
|
103
|
+
identificators[index] = requester_identificator.add_element "samlp:RequesterID"
|
104
104
|
identificators[index].text = requester
|
105
105
|
}
|
106
106
|
|
@@ -109,12 +109,12 @@ module Ciam::Saml
|
|
109
109
|
request_doc << REXML::XMLDecl.new("1.0", "UTF-8")
|
110
110
|
|
111
111
|
#LA FIRMA VA MESSA SOLO NEL CASO CON HTTP POST
|
112
|
-
|
113
|
-
#
|
114
|
-
|
115
|
-
|
116
|
-
|
117
|
-
|
112
|
+
cert = @settings.get_cert(@settings.sp_cert)
|
113
|
+
# embed signature
|
114
|
+
if @settings.metadata_signed && @settings.sp_private_key && @settings.sp_cert
|
115
|
+
private_key = @settings.get_sp_key
|
116
|
+
request_doc.sign_document(private_key, cert)
|
117
|
+
end
|
118
118
|
|
119
119
|
# stampo come stringa semplice i metadata per non avere problemi con validazione firma
|
120
120
|
#ret = request_doc.to_s
|
@@ -37,85 +37,106 @@ module Ciam::Saml
|
|
37
37
|
opt = { :name_id => nil, :session_index => nil, :extra_parameters => nil }.merge(options)
|
38
38
|
return nil unless opt[:name_id]
|
39
39
|
|
40
|
-
|
41
|
-
|
40
|
+
request_doc = Ciam::XMLSecurityNew::Document.new
|
41
|
+
request_doc.context[:attribute_quote] = :quote
|
42
42
|
|
43
43
|
|
44
|
-
root =
|
44
|
+
root = request_doc.add_element "samlp:LogoutRequest", { "xmlns:samlp" => PROTOCOL, "xmlns:saml" => ASSERTION }
|
45
45
|
root.attributes['ID'] = @transaction_id
|
46
46
|
root.attributes['IssueInstant'] = @issue_instant
|
47
47
|
root.attributes['Version'] = "2.0"
|
48
48
|
root.attributes['Destination'] = @settings.single_logout_destination
|
49
49
|
|
50
|
-
issuer = root.add_element "
|
51
|
-
issuer.attributes['Format'] = "urn:oasis:names:tc:SAML:2.0:nameid-format:entity"
|
52
|
-
|
53
|
-
#per la federazione trentina qui ci vanno i metadati...
|
54
|
-
issuer.text = @settings.idp_metadata
|
50
|
+
issuer = root.add_element "saml:Issuer"#, { "xmlns:saml2" => ASSERTION }
|
51
|
+
#issuer.attributes['Format'] = "urn:oasis:names:tc:SAML:2.0:nameid-format:entity"
|
52
|
+
issuer.text = @settings.issuer
|
55
53
|
|
56
|
-
name_id = root.add_element "
|
54
|
+
name_id = root.add_element "saml:NameID"#, { "xmlns:saml2" => ASSERTION }
|
57
55
|
name_id.attributes['Format'] = "urn:oasis:names:tc:SAML:2.0:nameid-format:transient"
|
58
56
|
name_id.attributes['NameQualifier'] = @settings.idp_name_qualifier
|
59
57
|
name_id.text = opt[:name_id]
|
60
58
|
# I believe the rest of these are optional
|
61
|
-
if @settings && @settings.sp_name_qualifier
|
62
|
-
|
63
|
-
end
|
59
|
+
# if @settings && @settings.sp_name_qualifier
|
60
|
+
# name_id.attributes["SPNameQualifier"] = @settings.sp_name_qualifier
|
61
|
+
# end
|
64
62
|
if opt[:session_index]
|
65
|
-
session_index = root.add_element "
|
63
|
+
session_index = root.add_element "samlp:SessionIndex" #, { "xmlns:samlp" => PROTOCOL }
|
66
64
|
session_index.text = opt[:session_index]
|
67
65
|
end
|
68
|
-
|
69
|
-
|
70
|
-
|
66
|
+
|
67
|
+
request_doc << REXML::XMLDecl.new("1.0", "UTF-8")
|
68
|
+
#sign logout_request
|
69
|
+
cert = @settings.get_cert(@settings.sp_cert)
|
70
|
+
|
71
|
+
# embed signature
|
72
|
+
if @settings.metadata_signed && @settings.sp_private_key && @settings.sp_cert
|
73
|
+
private_key = @settings.get_sp_key
|
74
|
+
request_doc.sign_document(private_key, cert)
|
75
|
+
end
|
76
|
+
|
77
|
+
|
78
|
+
puts "Created LogoutRequest: #{request_doc}"
|
79
|
+
|
80
|
+
#Logout per binding redirect
|
81
|
+
# meta = Metadata.new(@settings)
|
82
|
+
# slo_req = meta.create_slo_request( request_doc.to_s, opt[:extra_parameters] )
|
83
|
+
|
84
|
+
|
85
|
+
return request_doc.to_s
|
86
|
+
|
71
87
|
#action, content = binding_select("SingleLogoutService")
|
72
88
|
#Logging.debug "action: #{action} content: #{content}"
|
73
89
|
#return [action, content]
|
74
|
-
|
90
|
+
end
|
75
91
|
|
76
|
-
|
92
|
+
# function to return the created request as an XML document
|
77
93
|
def to_xml
|
78
|
-
|
79
|
-
|
80
|
-
|
94
|
+
text = ""
|
95
|
+
@request.write(text, 1)
|
96
|
+
return text
|
97
|
+
end
|
98
|
+
|
99
|
+
def to_s
|
100
|
+
@request.to_s
|
81
101
|
end
|
82
|
-
|
83
|
-
@request.to_s
|
84
|
-
end
|
102
|
+
|
85
103
|
# Functions for pulling values out from an IdP initiated LogoutRequest
|
86
|
-
|
87
|
-
|
88
|
-
|
89
|
-
|
90
|
-
|
91
|
-
|
92
|
-
|
93
|
-
|
94
|
-
|
95
|
-
|
96
|
-
|
104
|
+
def name_id
|
105
|
+
element = REXML::XPath.first(@request, "/p:LogoutRequest/a:NameID", {
|
106
|
+
"p" => PROTOCOL, "a" => ASSERTION } )
|
107
|
+
return nil if element.nil?
|
108
|
+
# Can't seem to get this to work right...
|
109
|
+
#element.context[:compress_whitespace] = ["NameID"]
|
110
|
+
#element.context[:compress_whitespace] = :all
|
111
|
+
str = element.text.gsub(/^\s+/, "")
|
112
|
+
str.gsub!(/\s+$/, "")
|
113
|
+
return str
|
114
|
+
end
|
97
115
|
|
98
|
-
|
99
|
-
|
100
|
-
|
101
|
-
|
102
|
-
|
103
|
-
|
104
|
-
|
105
|
-
|
106
|
-
|
107
|
-
|
116
|
+
def transaction_id
|
117
|
+
return @transaction_id if @transaction_id
|
118
|
+
element = REXML::XPath.first(@request, "/p:LogoutRequest", {
|
119
|
+
"p" => PROTOCOL} )
|
120
|
+
return nil if element.nil?
|
121
|
+
return element.attributes["ID"]
|
122
|
+
end
|
123
|
+
|
124
|
+
def is_valid?
|
125
|
+
validate(soft = true)
|
126
|
+
end
|
108
127
|
|
109
|
-
|
110
|
-
|
111
|
-
|
112
|
-
|
113
|
-
|
114
|
-
return false if @request.
|
115
|
-
|
116
|
-
|
117
|
-
|
118
|
-
|
128
|
+
def validate!
|
129
|
+
validate( soft = false )
|
130
|
+
end
|
131
|
+
|
132
|
+
def validate( soft = true )
|
133
|
+
return false if @request.nil?
|
134
|
+
return false if @request.validate(@settings, soft) == false
|
135
|
+
|
136
|
+
return true
|
137
|
+
|
138
|
+
end
|
139
|
+
|
119
140
|
private
|
120
141
|
|
121
142
|
def self.timestamp
|
@@ -5,13 +5,15 @@ require "rexml/document"
|
|
5
5
|
module Ciam
|
6
6
|
module Saml
|
7
7
|
class LogoutResponse
|
8
|
-
|
9
|
-
include
|
8
|
+
include Coding
|
9
|
+
include Response
|
10
10
|
ASSERTION = "urn:oasis:names:tc:SAML:2.0:assertion"
|
11
11
|
PROTOCOL = "urn:oasis:names:tc:SAML:2.0:protocol"
|
12
12
|
DSIG = "http://www.w3.org/2000/09/xmldsig#"
|
13
13
|
|
14
|
-
|
14
|
+
attr_accessor :settings
|
15
|
+
|
16
|
+
def initialize( options = { } )
|
15
17
|
opt = { :response => nil, :settings => nil }.merge(options)
|
16
18
|
# We've recieved a LogoutResponse from the IdP
|
17
19
|
if opt[:response]
|
@@ -32,7 +34,7 @@ module Ciam
|
|
32
34
|
if opt[:settings]
|
33
35
|
@settings = opt[:settings]
|
34
36
|
end
|
35
|
-
|
37
|
+
end
|
36
38
|
|
37
39
|
# Create a LogoutResponse to to the IdP's LogoutRequest
|
38
40
|
# (For IdP initiated SLO)
|
@@ -42,11 +44,12 @@ module Ciam
|
|
42
44
|
:status => "urn:oasis:names:tc:SAML:2.0:status:Success",
|
43
45
|
:extra_parameters => nil }.merge(options)
|
44
46
|
return nil if opt[:transaction_id].nil?
|
45
|
-
|
46
|
-
|
47
|
+
response_doc = Ciam::XMLSecurityNew::Document.new
|
48
|
+
response_doc.context[:attribute_quote] = :quote
|
49
|
+
|
47
50
|
uuid = "_" + UUID.new.generate
|
48
51
|
time = Time.now.utc.strftime("%Y-%m-%dT%H:%M:%SZ")
|
49
|
-
root =
|
52
|
+
root = response_doc.add_element "saml2p:LogoutResponse", { "xmlns:saml2p" => PROTOCOL }
|
50
53
|
root.attributes['ID'] = uuid
|
51
54
|
root.attributes['IssueInstant'] = time
|
52
55
|
root.attributes['Version'] = "2.0"
|
@@ -68,44 +71,56 @@ module Ciam
|
|
68
71
|
}
|
69
72
|
issuer.text = @settings.issuer
|
70
73
|
end
|
71
|
-
|
72
|
-
|
73
|
-
|
74
|
+
|
75
|
+
response_doc << REXML::XMLDecl.new("1.0", "UTF-8")
|
76
|
+
#sign logout_response
|
77
|
+
cert = @settings.get_cert(@settings.sp_cert)
|
78
|
+
|
79
|
+
# embed signature
|
80
|
+
if @settings.metadata_signed && @settings.sp_private_key && @settings.sp_cert
|
81
|
+
private_key = @settings.get_sp_key
|
82
|
+
response_doc.sign_document(private_key, cert)
|
83
|
+
end
|
74
84
|
|
75
|
-
|
85
|
+
Logging.debug "Created LogoutResponse:\n #{response_doc}"
|
76
86
|
|
87
|
+
return request_doc.to_s
|
88
|
+
|
77
89
|
end
|
90
|
+
|
78
91
|
# function to return the created request as an XML document
|
79
92
|
def to_xml
|
80
93
|
text = ""
|
81
94
|
@response.write(text, 1)
|
82
95
|
return text
|
83
96
|
end
|
97
|
+
|
84
98
|
def to_s
|
85
99
|
@response.to_s
|
86
100
|
end
|
87
101
|
|
88
|
-
|
89
|
-
|
90
|
-
|
91
|
-
|
92
|
-
|
93
|
-
|
102
|
+
def issuer
|
103
|
+
element = REXML::XPath.first(@response, "/p:LogoutResponse/a:Issuer", {
|
104
|
+
"p" => PROTOCOL, "a" => ASSERTION} )
|
105
|
+
return nil if element.nil?
|
106
|
+
element.text
|
107
|
+
end
|
94
108
|
|
95
|
-
|
109
|
+
def in_response_to
|
96
110
|
element = REXML::XPath.first(@response, "/p:LogoutResponse", {
|
97
111
|
"p" => PROTOCOL })
|
98
112
|
return nil if element.nil?
|
99
|
-
|
100
|
-
|
113
|
+
element.attributes["InResponseTo"]
|
114
|
+
end
|
101
115
|
|
102
|
-
|
116
|
+
def success?
|
103
117
|
element = REXML::XPath.first(@response, "/p:LogoutResponse/p:Status/p:StatusCode", {
|
104
118
|
"p" => PROTOCOL })
|
105
119
|
return false if element.nil?
|
106
|
-
|
107
|
-
|
108
|
-
|
120
|
+
element.attributes["Value"] == "urn:oasis:names:tc:SAML:2.0:status:Success"
|
121
|
+
|
122
|
+
end
|
123
|
+
|
109
124
|
def is_valid?
|
110
125
|
validate(soft = true)
|
111
126
|
end
|
@@ -113,6 +128,7 @@ module Ciam
|
|
113
128
|
def validate!
|
114
129
|
validate( soft = false )
|
115
130
|
end
|
131
|
+
|
116
132
|
def validate( soft = true )
|
117
133
|
return false if @response.nil?
|
118
134
|
# Skip validation with a failed response if we don't have settings
|
@@ -123,10 +139,12 @@ module Ciam
|
|
123
139
|
|
124
140
|
end
|
125
141
|
|
126
|
-
|
142
|
+
protected
|
143
|
+
|
127
144
|
def document
|
128
145
|
REXML::Document.new(@response)
|
129
146
|
end
|
130
|
-
|
147
|
+
|
148
|
+
end
|
131
149
|
end
|
132
150
|
end
|
@@ -30,18 +30,10 @@ module Ciam
|
|
30
30
|
def generate(settings)
|
31
31
|
#meta_doc = REXML::Document.new
|
32
32
|
meta_doc = Ciam::XMLSecurityNew::Document.new
|
33
|
-
|
34
|
-
root = meta_doc.add_element "md:EntityDescriptor", {
|
35
|
-
"xmlns:md" => "urn:oasis:names:tc:SAML:2.0:metadata",
|
36
|
-
"xmlns:xml" => "http://www.w3.org/XML/1998/namespace",
|
37
|
-
"xmlns:ciam" => "https://ciam.gov.it/saml-extensions",
|
38
|
-
}
|
39
|
-
else
|
40
|
-
root = meta_doc.add_element "md:EntityDescriptor", {
|
33
|
+
root = meta_doc.add_element "md:EntityDescriptor", {
|
41
34
|
"xmlns:md" => "urn:oasis:names:tc:SAML:2.0:metadata",
|
42
35
|
"xmlns:xml" => "http://www.w3.org/XML/1998/namespace"
|
43
36
|
}
|
44
|
-
end
|
45
37
|
|
46
38
|
if settings.issuer != nil
|
47
39
|
root.attributes["entityID"] = settings.issuer
|
@@ -223,53 +215,12 @@ module Ciam
|
|
223
215
|
"xml:lang" => "it"
|
224
216
|
}
|
225
217
|
|
226
|
-
org_display_name.text = settings.organization['org_display_name']
|
218
|
+
org_display_name.text = settings.organization['org_display_name']
|
227
219
|
org_url = organization.add_element "md:OrganizationURL", {
|
228
220
|
"xml:lang" => "it"
|
229
221
|
}
|
230
222
|
org_url.text = settings.organization['org_url']
|
231
223
|
|
232
|
-
#ContactPerson per sp aggregato
|
233
|
-
if settings.aggregato
|
234
|
-
contact_person_aggregatore = root.add_element "md:ContactPerson", {
|
235
|
-
"contactType" => "other",
|
236
|
-
"ciam:entityType" => "ciam:aggregator"
|
237
|
-
}
|
238
|
-
company = contact_person_aggregatore.add_element "md:Company"
|
239
|
-
company.text = settings.hash_aggregatore['soggetto_aggregatore']
|
240
|
-
|
241
|
-
extensions_aggregatore = contact_person_aggregatore.add_element "md:Extensions"
|
242
|
-
vat_number_aggregatore = extensions_aggregatore.add_element "ciam:VATNumber"
|
243
|
-
vat_number_aggregatore.text = settings.hash_aggregatore['piva_aggregatore']
|
244
|
-
|
245
|
-
ipa_code_aggregatore = extensions_aggregatore.add_element "ciam:IPACode"
|
246
|
-
ipa_code_aggregatore.text = settings.hash_aggregatore['cipa_aggregatore']
|
247
|
-
|
248
|
-
fiscal_code_aggregatore = extensions_aggregatore.add_element "ciam:FiscalCode"
|
249
|
-
fiscal_code_aggregatore.text = settings.hash_aggregatore['cf_aggregatore']
|
250
|
-
|
251
|
-
contact_person_aggregato = root.add_element "md:ContactPerson", {
|
252
|
-
"contactType" => "other",
|
253
|
-
"ciam:entityType" => "ciam:aggregated"
|
254
|
-
}
|
255
|
-
company = contact_person_aggregato.add_element "md:Company"
|
256
|
-
company.text = settings.organization['org_name']
|
257
|
-
|
258
|
-
extensions_aggregato = contact_person_aggregato.add_element "md:Extensions"
|
259
|
-
unless settings.hash_aggregatore['soggetto_aggregato']['vat_number'].blank?
|
260
|
-
vat_number_aggregato = extensions_aggregato.add_element "ciam:VATNumber"
|
261
|
-
vat_number_aggregato.text = settings.hash_aggregatore['soggetto_aggregato']['vat_number']
|
262
|
-
end
|
263
|
-
unless settings.hash_aggregatore['soggetto_aggregato']['ipa_code'].blank?
|
264
|
-
ipa_code_aggregato = extensions_aggregato.add_element "ciam:IPACode"
|
265
|
-
ipa_code_aggregato.text = settings.hash_aggregatore['soggetto_aggregato']['ipa_code']
|
266
|
-
end
|
267
|
-
unless settings.hash_aggregatore['soggetto_aggregato']['fiscal_code'].blank?
|
268
|
-
fiscal_code_aggregato = extensions_aggregato.add_element "ciam:FiscalCode"
|
269
|
-
fiscal_code_aggregato.text = settings.hash_aggregatore['soggetto_aggregato']['fiscal_code']
|
270
|
-
end
|
271
|
-
end
|
272
|
-
|
273
224
|
#meta_doc << REXML::XMLDecl.new(version='1.0', encoding='UTF-8')
|
274
225
|
meta_doc << REXML::XMLDecl.new("1.0", "UTF-8")
|
275
226
|
|
@@ -98,8 +98,13 @@ module Ciam
|
|
98
98
|
parse_time(node, "SessionNotOnOrAfter")
|
99
99
|
end
|
100
100
|
end
|
101
|
-
|
102
101
|
|
102
|
+
def session_index
|
103
|
+
@session_index ||= begin
|
104
|
+
node = REXML::XPath.first(document, "/p:Response/a:Assertion/a:AuthnStatement", { "p" => PROTOCOL, "a" => ASSERTION })
|
105
|
+
node.attributes["SessionIndex"] unless node.blank?
|
106
|
+
end
|
107
|
+
end
|
103
108
|
|
104
109
|
# Checks the status of the response for a "Success" code
|
105
110
|
def success?
|
@@ -166,12 +171,6 @@ module Ciam
|
|
166
171
|
|
167
172
|
}
|
168
173
|
|
169
|
-
issuer_assertion_nodes.each{ |iss|
|
170
|
-
#controllo: L'attributo Format di Issuer deve essere presente con il valore urn:oasis:names:tc:SAML:2.0:nameid-format:entity
|
171
|
-
return (soft ? false : validation_error("Elemento Issuer non ha formato corretto ")) if iss.attributes['Format'] != 'urn:oasis:names:tc:SAML:2.0:nameid-format:entity'
|
172
|
-
|
173
|
-
}
|
174
|
-
|
175
174
|
nodes = issuer_response_nodes + issuer_assertion_nodes
|
176
175
|
|
177
176
|
nodes.map { |node| Utils.element_text(node) }.compact.uniq
|
@@ -10,7 +10,7 @@ module Ciam
|
|
10
10
|
attr_accessor :name_identifier_value, :name_identifier_format
|
11
11
|
attr_accessor :sessionindex, :issuer, :destination_service_url, :authn_context, :requester_identificator
|
12
12
|
attr_accessor :single_logout_service_url, :single_logout_service_binding, :single_logout_destination
|
13
|
-
attr_accessor :skip_validation
|
13
|
+
attr_accessor :skip_validation
|
14
14
|
|
15
15
|
def initialize(config = {})
|
16
16
|
config.each do |k,v|
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: ciam-es
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.0.
|
4
|
+
version: 0.0.7
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Fabiano Pavan
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2020-
|
11
|
+
date: 2020-09-22 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: canonix
|
@@ -138,7 +138,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
138
138
|
- !ruby/object:Gem::Version
|
139
139
|
version: '0'
|
140
140
|
requirements: []
|
141
|
-
rubygems_version: 3.0.
|
141
|
+
rubygems_version: 3.0.8
|
142
142
|
signing_key:
|
143
143
|
specification_version: 4
|
144
144
|
summary: SAML Ruby Tookit CIAM
|