opentoken 0.2.0
Sign up to get free protection for your applications and to get access to all the features.
- data/.document +5 -0
- data/LICENSE +20 -0
- data/README.rdoc +17 -0
- data/Rakefile +55 -0
- data/VERSION +1 -0
- data/lib/opentoken.rb +326 -0
- data/opentoken.gemspec +57 -0
- data/test/helper.rb +12 -0
- data/test/test_opentoken.rb +48 -0
- metadata +122 -0
data/.document
ADDED
data/LICENSE
ADDED
@@ -0,0 +1,20 @@
|
|
1
|
+
Copyright (c) 2009 Ryan Sonnek
|
2
|
+
|
3
|
+
Permission is hereby granted, free of charge, to any person obtaining
|
4
|
+
a copy of this software and associated documentation files (the
|
5
|
+
"Software"), to deal in the Software without restriction, including
|
6
|
+
without limitation the rights to use, copy, modify, merge, publish,
|
7
|
+
distribute, sublicense, and/or sell copies of the Software, and to
|
8
|
+
permit persons to whom the Software is furnished to do so, subject to
|
9
|
+
the following conditions:
|
10
|
+
|
11
|
+
The above copyright notice and this permission notice shall be
|
12
|
+
included in all copies or substantial portions of the Software.
|
13
|
+
|
14
|
+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
15
|
+
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
16
|
+
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
17
|
+
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
18
|
+
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
19
|
+
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
20
|
+
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
data/README.rdoc
ADDED
@@ -0,0 +1,17 @@
|
|
1
|
+
= opentoken
|
2
|
+
|
3
|
+
Parse encrypted opentoken properties
|
4
|
+
|
5
|
+
see http://www.pingidentity.com/opentoken
|
6
|
+
|
7
|
+
== Note on Patches/Pull Requests
|
8
|
+
|
9
|
+
* Fork the project.
|
10
|
+
* Make your feature addition or bug fix.
|
11
|
+
* Add tests for it. This is important so I don't break it in a future version unintentionally.
|
12
|
+
* Commit, do not mess with rakefile, version, or history. (bump version in a commit by itself I can ignore when I pull)
|
13
|
+
* Send me a pull request. Bonus points for topic branches.
|
14
|
+
|
15
|
+
== Copyright
|
16
|
+
|
17
|
+
Copyright (c) 2010 Ryan Sonnek. See LICENSE for details.
|
data/Rakefile
ADDED
@@ -0,0 +1,55 @@
|
|
1
|
+
require 'rubygems'
|
2
|
+
require 'rake'
|
3
|
+
|
4
|
+
begin
|
5
|
+
require 'jeweler'
|
6
|
+
Jeweler::Tasks.new do |gem|
|
7
|
+
gem.name = "opentoken"
|
8
|
+
gem.summary = %Q{ruby implementation of the opentoken specification}
|
9
|
+
gem.description = %Q{parse opentoken properties passed for Single Signon requests}
|
10
|
+
gem.email = "ryan@socialcast.com"
|
11
|
+
gem.homepage = "http://github.com/wireframe/opentoken"
|
12
|
+
gem.authors = ["Ryan Sonnek"]
|
13
|
+
gem.add_dependency "activesupport", ">=2.3.4"
|
14
|
+
gem.add_development_dependency "shoulda", ">= 0"
|
15
|
+
gem.add_development_dependency "timecop", ">=0.3.4"
|
16
|
+
# gem is a Gem::Specification... see http://www.rubygems.org/read/chapter/20 for additional settings
|
17
|
+
end
|
18
|
+
Jeweler::RubygemsDotOrgTasks.new
|
19
|
+
rescue LoadError
|
20
|
+
puts "Jeweler (or a dependency) not available. Install it with: sudo gem install jeweler"
|
21
|
+
end
|
22
|
+
|
23
|
+
require 'rake/testtask'
|
24
|
+
Rake::TestTask.new(:test) do |test|
|
25
|
+
test.libs << 'lib' << 'test'
|
26
|
+
test.pattern = 'test/**/test_*.rb'
|
27
|
+
test.verbose = true
|
28
|
+
end
|
29
|
+
|
30
|
+
begin
|
31
|
+
require 'rcov/rcovtask'
|
32
|
+
Rcov::RcovTask.new do |test|
|
33
|
+
test.libs << 'test'
|
34
|
+
test.pattern = 'test/**/test_*.rb'
|
35
|
+
test.verbose = true
|
36
|
+
end
|
37
|
+
rescue LoadError
|
38
|
+
task :rcov do
|
39
|
+
abort "RCov is not available. In order to run rcov, you must: sudo gem install spicycode-rcov"
|
40
|
+
end
|
41
|
+
end
|
42
|
+
|
43
|
+
task :test => :check_dependencies
|
44
|
+
|
45
|
+
task :default => :test
|
46
|
+
|
47
|
+
require 'rake/rdoctask'
|
48
|
+
Rake::RDocTask.new do |rdoc|
|
49
|
+
version = File.exist?('VERSION') ? File.read('VERSION') : ""
|
50
|
+
|
51
|
+
rdoc.rdoc_dir = 'rdoc'
|
52
|
+
rdoc.title = "opentoken #{version}"
|
53
|
+
rdoc.rdoc_files.include('README*')
|
54
|
+
rdoc.rdoc_files.include('lib/**/*.rb')
|
55
|
+
end
|
data/VERSION
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
0.2.0
|
data/lib/opentoken.rb
ADDED
@@ -0,0 +1,326 @@
|
|
1
|
+
require 'base64'
|
2
|
+
require 'openssl'
|
3
|
+
require 'digest/sha1'
|
4
|
+
require 'zlib'
|
5
|
+
require 'stringio'
|
6
|
+
require 'cgi'
|
7
|
+
|
8
|
+
class OpenToken
|
9
|
+
class TokenExpiredError < StandardError; end
|
10
|
+
|
11
|
+
DEBUG = false
|
12
|
+
CIPHER_NULL = 0
|
13
|
+
CIPHER_AES_256_CBC = 1
|
14
|
+
CIPHER_AES_128_CBC = 2
|
15
|
+
CIPHER_3DES_168_CBC = 3
|
16
|
+
|
17
|
+
CIPHERS = {
|
18
|
+
CIPHER_NULL => {
|
19
|
+
:iv_length => 0
|
20
|
+
},
|
21
|
+
CIPHER_AES_256_CBC => {
|
22
|
+
:algorithm => 'aes-256-cbc',
|
23
|
+
:iv_length => 32,
|
24
|
+
:key_length => 256
|
25
|
+
},
|
26
|
+
CIPHER_AES_128_CBC => {
|
27
|
+
:algorithm => 'aes-128-cbc',
|
28
|
+
:iv_length => 16,
|
29
|
+
:key_length => 128
|
30
|
+
},
|
31
|
+
CIPHER_3DES_168_CBC => {
|
32
|
+
:algorithm => 'des-cbc',
|
33
|
+
:iv_length => 8,
|
34
|
+
:key_length => 168
|
35
|
+
}
|
36
|
+
}
|
37
|
+
|
38
|
+
def initialize(token, options = {})
|
39
|
+
#ruby 1.9 has Base64.urlsafe_decode64 which can be used instead of gsubbing '_' and '-'
|
40
|
+
string = (token || '').gsub('*', '=').gsub('_', '/').gsub('-', '+')
|
41
|
+
data = Base64.decode64(string)
|
42
|
+
inspect_binary_string 'DATA', data
|
43
|
+
|
44
|
+
#header: should be OTK
|
45
|
+
header = data[0..2]
|
46
|
+
raise "Invalid token header: #{header}" unless header == 'OTK'
|
47
|
+
|
48
|
+
#version: should == 1
|
49
|
+
version = data[3]
|
50
|
+
raise "Unsupported token version: #{version}" unless version == 1
|
51
|
+
|
52
|
+
#cipher suite identifier
|
53
|
+
cipher_suite = data[4]
|
54
|
+
cipher = CIPHERS[cipher_suite]
|
55
|
+
raise "Unknown cipher suite: #{cipher_suite}" if cipher.nil?
|
56
|
+
|
57
|
+
#SHA-1 HMAC
|
58
|
+
payload_hmac = data[5..24]
|
59
|
+
inspect_binary_string "PAYLOAD HMAC [5..24]", payload_hmac
|
60
|
+
|
61
|
+
#Initialization Vector (iv)
|
62
|
+
iv_length = data[25]
|
63
|
+
iv_end = [26, 26 + iv_length - 1].max
|
64
|
+
iv = data[26..iv_end]
|
65
|
+
inspect_binary_string "IV [26..#{iv_end}]", iv
|
66
|
+
raise "Cipher expects iv length of #{cipher[:iv_length]} and was: #{iv_length}" unless iv_length == cipher[:iv_length]
|
67
|
+
|
68
|
+
#key (not currently used)
|
69
|
+
key_length = data[iv_end + 1]
|
70
|
+
key_end = iv_end + 1
|
71
|
+
raise "Token key embedding is not currently supported" unless key_length == 0
|
72
|
+
|
73
|
+
#payload
|
74
|
+
payload_length = data[(key_end + 1)..(key_end + 2)].unpack('n').first
|
75
|
+
payload_offset = key_end + 3
|
76
|
+
encrypted_payload = data[payload_offset..(data.length - 1)]
|
77
|
+
raise "Payload length is #{encrypted_payload.length} and was expected to be #{payload_length}" unless encrypted_payload.length == payload_length
|
78
|
+
inspect_binary_string "ENCRYPTED PAYLOAD [#{payload_offset}..#{data.length - 1}]", encrypted_payload
|
79
|
+
|
80
|
+
key = PasswordKeyGenerator.generate(options[:password], cipher)
|
81
|
+
inspect_binary_string 'KEY', key
|
82
|
+
|
83
|
+
compressed_payload = decrypt_payload(encrypted_payload, cipher, key, iv)
|
84
|
+
inspect_binary_string 'COMPRESSED PAYLOAD', compressed_payload
|
85
|
+
|
86
|
+
#decompress the payload
|
87
|
+
#see http://stackoverflow.com/questions/1361892/how-to-decompress-gzip-data-in-ruby
|
88
|
+
unparsed_payload = begin
|
89
|
+
Zlib::Inflate.inflate(compressed_payload)
|
90
|
+
rescue Zlib::BufError
|
91
|
+
Zlib::Inflate.new(-Zlib::MAX_WBITS).inflate(compressed_payload[2, compressed_payload.size])
|
92
|
+
end
|
93
|
+
|
94
|
+
#validate payload hmac
|
95
|
+
mac = "0x01".hex.chr
|
96
|
+
mac += cipher_suite.chr
|
97
|
+
mac += iv
|
98
|
+
mac += key if key_length > 0 #key embedding is not currently supported
|
99
|
+
mac += unparsed_payload
|
100
|
+
hash = OpenSSL::HMAC.digest(PasswordKeyGenerator::SHA1_DIGEST, key, mac)
|
101
|
+
if (hash <=> payload_hmac) != 0
|
102
|
+
raise "HMAC for payload was #{hash} and expected to be #{payload_hmac}" unless payload_hmac == hash
|
103
|
+
end
|
104
|
+
|
105
|
+
@payload = KeyValueSerializer.deserialize CGI::unescapeHTML(unparsed_payload)
|
106
|
+
raise TokenExpiredError.new("#{Time.now.utc} is not within token duration: #{self.start_at} - #{self.end_at}") if self.expired?
|
107
|
+
end
|
108
|
+
|
109
|
+
def [](key)
|
110
|
+
@payload[key.to_s]
|
111
|
+
end
|
112
|
+
#verify that the current time is between the not-before and not-on-or-after values
|
113
|
+
def expired?
|
114
|
+
now = Time.now.utc
|
115
|
+
now < start_at || now >= end_at
|
116
|
+
end
|
117
|
+
def start_at
|
118
|
+
payload_date('not-before')
|
119
|
+
end
|
120
|
+
def end_at
|
121
|
+
payload_date('not-on-or-after')
|
122
|
+
end
|
123
|
+
#"renew-until"=>"2010-03-05T07:19:15Z"
|
124
|
+
def valid_until
|
125
|
+
payload_date('renew-until')
|
126
|
+
end
|
127
|
+
def payload_date(key)
|
128
|
+
Time.iso8601(self[key]).utc
|
129
|
+
end
|
130
|
+
|
131
|
+
private
|
132
|
+
def decrypt_payload(encrypted_payload, cipher, key, iv)
|
133
|
+
return encrypted_payload unless cipher[:algorithm]
|
134
|
+
#see http://snippets.dzone.com/posts/show/4975
|
135
|
+
#see http://jdwyah.blogspot.com/2009/12/decrypting-ruby-aes-encryption.html
|
136
|
+
#see http://snippets.dzone.com/posts/show/576
|
137
|
+
crypt = OpenSSL::Cipher::Cipher.new(cipher[:algorithm])
|
138
|
+
crypt.decrypt
|
139
|
+
crypt.key = key
|
140
|
+
crypt.iv = iv
|
141
|
+
crypt.update(encrypted_payload) + crypt.final
|
142
|
+
end
|
143
|
+
|
144
|
+
def inspect_binary_string(header, string)
|
145
|
+
return unless DEBUG
|
146
|
+
puts "#{header}:"
|
147
|
+
index = 0
|
148
|
+
string.each_byte do |b|
|
149
|
+
puts "#{index}: #{b} => #{b.chr}"
|
150
|
+
index += 1
|
151
|
+
end
|
152
|
+
end
|
153
|
+
end
|
154
|
+
|
155
|
+
class PasswordKeyGenerator
|
156
|
+
SHA1_DIGEST = OpenSSL::Digest::Digest.new('sha1')
|
157
|
+
|
158
|
+
def self.generate(password, cipher_suite)
|
159
|
+
salt = 0.chr * 8
|
160
|
+
self.generate_impl(password, cipher_suite, salt, 1000)
|
161
|
+
end
|
162
|
+
|
163
|
+
def self.generate_block(password, salt, count, index)
|
164
|
+
mac = salt
|
165
|
+
mac += [index].pack("N")
|
166
|
+
|
167
|
+
result = OpenSSL::HMAC.digest(SHA1_DIGEST, password, mac)
|
168
|
+
cur = result
|
169
|
+
|
170
|
+
i_count = 1
|
171
|
+
while i_count < count
|
172
|
+
i_count +=1
|
173
|
+
|
174
|
+
cur = OpenSSL::HMAC.digest(SHA1_DIGEST, password, cur)
|
175
|
+
|
176
|
+
20.times do |i|
|
177
|
+
result[i] = result[i] ^ cur[i]
|
178
|
+
end
|
179
|
+
end
|
180
|
+
|
181
|
+
return result
|
182
|
+
end
|
183
|
+
|
184
|
+
def self.generate_impl(password, cipher, salt, iterations)
|
185
|
+
return unless cipher[:algorithm]
|
186
|
+
|
187
|
+
key_size = cipher[:key_length] / 8
|
188
|
+
numblocks = key_size / 20
|
189
|
+
numblocks += 1 if (key_size % 20) > 0
|
190
|
+
|
191
|
+
# Generate the appropriate number of blocks and write their output to
|
192
|
+
# the key bytes; note that it's important to start from 1 (vs. 0) as the
|
193
|
+
# initial block number affects the hash. It's not clear that this fact
|
194
|
+
# is stated explicitly anywhere, but without this approach, the generated
|
195
|
+
# keys will not match up with test cases defined in RFC 3962.
|
196
|
+
key_buffer_index = 0
|
197
|
+
key = ""
|
198
|
+
|
199
|
+
numblocks.times do |i|
|
200
|
+
i+=1 # Previously zero based, needs to be 1 based
|
201
|
+
block = self.generate_block(password, salt, iterations, i)
|
202
|
+
len = [20, (key_size - key_buffer_index)].min
|
203
|
+
key += block[0, len]
|
204
|
+
key_buffer_index += len
|
205
|
+
end
|
206
|
+
|
207
|
+
return key
|
208
|
+
end
|
209
|
+
end
|
210
|
+
|
211
|
+
class KeyValueSerializer
|
212
|
+
LINE_START = 0
|
213
|
+
EMPTY_SPACE = 1
|
214
|
+
VALUE_START = 2
|
215
|
+
LINE_END = 3
|
216
|
+
IN_KEY = 4
|
217
|
+
IN_VALUE = 5
|
218
|
+
IN_QUOTED_VALUE = 6
|
219
|
+
|
220
|
+
def self.unescape_value(value)
|
221
|
+
value.gsub("\\\"", "\"").gsub("\'", "'")
|
222
|
+
end
|
223
|
+
|
224
|
+
def self.deserialize(string)
|
225
|
+
result = {}
|
226
|
+
state = LINE_START
|
227
|
+
open_quote_char = 0.chr
|
228
|
+
currkey = ""
|
229
|
+
token = ""
|
230
|
+
nextval = ""
|
231
|
+
|
232
|
+
string.split(//).each do |c|
|
233
|
+
|
234
|
+
nextval = c
|
235
|
+
|
236
|
+
case c
|
237
|
+
when "\t"
|
238
|
+
if state == IN_KEY
|
239
|
+
# key ends
|
240
|
+
currkey = token
|
241
|
+
token = ""
|
242
|
+
state = EMPTY_SPACE
|
243
|
+
elsif state == IN_VALUE
|
244
|
+
# non-quoted value ends
|
245
|
+
result[currkey] = self.deserialize(token)
|
246
|
+
token = ""
|
247
|
+
state = LINE_END
|
248
|
+
elsif state == IN_QUOTED_VALUE
|
249
|
+
token += c
|
250
|
+
end
|
251
|
+
when " "
|
252
|
+
if state == IN_KEY
|
253
|
+
# key ends
|
254
|
+
currkey = token
|
255
|
+
token = ""
|
256
|
+
state = EMPTY_SPACE
|
257
|
+
elsif state == IN_VALUE
|
258
|
+
# non-quoted value ends
|
259
|
+
result[currkey] = self.deserialize(token)
|
260
|
+
token = ""
|
261
|
+
state = LINE_END
|
262
|
+
elsif state == IN_QUOTED_VALUE
|
263
|
+
token += c
|
264
|
+
end
|
265
|
+
when "\n"
|
266
|
+
# newline
|
267
|
+
if (state == IN_VALUE) || (state == VALUE_START)
|
268
|
+
result[currkey] = self.unescape_value(token)
|
269
|
+
token = ""
|
270
|
+
state = LINE_START
|
271
|
+
elsif state == LINE_END
|
272
|
+
token = ""
|
273
|
+
state = LINE_START
|
274
|
+
elsif state == IN_QUOTED_VALUE
|
275
|
+
token += c
|
276
|
+
end
|
277
|
+
when "="
|
278
|
+
if state == IN_KEY
|
279
|
+
currkey = token
|
280
|
+
token = ""
|
281
|
+
state = VALUE_START
|
282
|
+
elsif (state == IN_QUOTED_VALUE) || (state == IN_VALUE)
|
283
|
+
token += c
|
284
|
+
end
|
285
|
+
when "\""
|
286
|
+
if state == IN_QUOTED_VALUE
|
287
|
+
if (c == open_quote_char) && (token[token.size-1] != "\\")
|
288
|
+
result[currkey] = self.unescape_value(token)
|
289
|
+
token = ""
|
290
|
+
state = LINE_END
|
291
|
+
else
|
292
|
+
token += c
|
293
|
+
end
|
294
|
+
elsif state == VALUE_START
|
295
|
+
state = IN_QUOTED_VALUE
|
296
|
+
open_quote_char = c
|
297
|
+
end
|
298
|
+
when "'"
|
299
|
+
if state == IN_QUOTED_VALUE
|
300
|
+
if (c == open_quote_char) && (token[token.size-1] != "\\")
|
301
|
+
result[currkey] = self.unescape_value(token)
|
302
|
+
token = ""
|
303
|
+
state = LINE_END
|
304
|
+
else
|
305
|
+
token += c
|
306
|
+
end
|
307
|
+
else state == VALUE_START
|
308
|
+
state = IN_QUOTED_VALUE
|
309
|
+
open_quote_char = c
|
310
|
+
end
|
311
|
+
else
|
312
|
+
if state == LINE_START
|
313
|
+
state = IN_KEY
|
314
|
+
elsif state == VALUE_START
|
315
|
+
state = IN_VALUE
|
316
|
+
end
|
317
|
+
token += c
|
318
|
+
end
|
319
|
+
|
320
|
+
if (state == IN_QUOTED_VALUE) || (state == IN_VALUE)
|
321
|
+
result[currkey] = unescape_value(token)
|
322
|
+
end
|
323
|
+
end
|
324
|
+
result
|
325
|
+
end
|
326
|
+
end
|
data/opentoken.gemspec
ADDED
@@ -0,0 +1,57 @@
|
|
1
|
+
# Generated by jeweler
|
2
|
+
# DO NOT EDIT THIS FILE DIRECTLY
|
3
|
+
# Instead, edit Jeweler::Tasks in Rakefile, and run 'rake gemspec'
|
4
|
+
# -*- encoding: utf-8 -*-
|
5
|
+
|
6
|
+
Gem::Specification.new do |s|
|
7
|
+
s.name = %q{opentoken}
|
8
|
+
s.version = "0.2.0"
|
9
|
+
|
10
|
+
s.required_rubygems_version = Gem::Requirement.new(">= 0") if s.respond_to? :required_rubygems_version=
|
11
|
+
s.authors = ["Ryan Sonnek"]
|
12
|
+
s.date = %q{2011-01-12}
|
13
|
+
s.description = %q{parse opentoken properties passed for Single Signon requests}
|
14
|
+
s.email = %q{ryan@socialcast.com}
|
15
|
+
s.extra_rdoc_files = [
|
16
|
+
"LICENSE",
|
17
|
+
"README.rdoc"
|
18
|
+
]
|
19
|
+
s.files = [
|
20
|
+
".document",
|
21
|
+
"LICENSE",
|
22
|
+
"README.rdoc",
|
23
|
+
"Rakefile",
|
24
|
+
"VERSION",
|
25
|
+
"lib/opentoken.rb",
|
26
|
+
"opentoken.gemspec",
|
27
|
+
"test/helper.rb",
|
28
|
+
"test/test_opentoken.rb"
|
29
|
+
]
|
30
|
+
s.homepage = %q{http://github.com/wireframe/opentoken}
|
31
|
+
s.require_paths = ["lib"]
|
32
|
+
s.rubygems_version = %q{1.4.2}
|
33
|
+
s.summary = %q{ruby implementation of the opentoken specification}
|
34
|
+
s.test_files = [
|
35
|
+
"test/helper.rb",
|
36
|
+
"test/test_opentoken.rb"
|
37
|
+
]
|
38
|
+
|
39
|
+
if s.respond_to? :specification_version then
|
40
|
+
s.specification_version = 3
|
41
|
+
|
42
|
+
if Gem::Version.new(Gem::VERSION) >= Gem::Version.new('1.2.0') then
|
43
|
+
s.add_runtime_dependency(%q<activesupport>, [">= 2.3.4"])
|
44
|
+
s.add_development_dependency(%q<shoulda>, [">= 0"])
|
45
|
+
s.add_development_dependency(%q<timecop>, [">= 0.3.4"])
|
46
|
+
else
|
47
|
+
s.add_dependency(%q<activesupport>, [">= 2.3.4"])
|
48
|
+
s.add_dependency(%q<shoulda>, [">= 0"])
|
49
|
+
s.add_dependency(%q<timecop>, [">= 0.3.4"])
|
50
|
+
end
|
51
|
+
else
|
52
|
+
s.add_dependency(%q<activesupport>, [">= 2.3.4"])
|
53
|
+
s.add_dependency(%q<shoulda>, [">= 0"])
|
54
|
+
s.add_dependency(%q<timecop>, [">= 0.3.4"])
|
55
|
+
end
|
56
|
+
end
|
57
|
+
|
data/test/helper.rb
ADDED
@@ -0,0 +1,12 @@
|
|
1
|
+
require 'rubygems'
|
2
|
+
require 'test/unit'
|
3
|
+
require 'shoulda'
|
4
|
+
require 'timecop'
|
5
|
+
require 'activesupport'
|
6
|
+
|
7
|
+
$LOAD_PATH.unshift(File.join(File.dirname(__FILE__), '..', 'lib'))
|
8
|
+
$LOAD_PATH.unshift(File.dirname(__FILE__))
|
9
|
+
require 'opentoken'
|
10
|
+
|
11
|
+
class Test::Unit::TestCase
|
12
|
+
end
|
@@ -0,0 +1,48 @@
|
|
1
|
+
require 'helper'
|
2
|
+
|
3
|
+
class TestOpentoken < Test::Unit::TestCase
|
4
|
+
#"renew-until"=>"2010-03-05T07:19:15Z"
|
5
|
+
#"not-before"=>"2010-03-04T19:19:15Z"
|
6
|
+
#"not-on-or-after"=>"2010-03-04T19:24:15Z"
|
7
|
+
context "aes-128-cbc token with subject attribute" do
|
8
|
+
setup do
|
9
|
+
@opentoken = "T1RLAQJ0Ca97sl6MLJAZDa_hdFzMlicMQBDjqUzrXl0EOXKmpj5oo7L5AACgaWoW8fZizrsLbtxb_F00aTdFmhw8flGy4iGqPWPtqYpdIzQZzg5WvrvYH8Rnq7ckJpYk2YPZw6yNyA4ohG-BgFdTHc0U7CwZTFmodg1MuO0cTh7T98s2RXiTcaZa21MNO0yuXKm2Q10cbrWhnB5yHJUhSHx6JLxlgMTZ0oE0DoUOB6JmoLMYHcyL9hKRiPTh62ky_QmXRaifDNOdl4sH2w**"
|
10
|
+
@password = 'Test123'
|
11
|
+
end
|
12
|
+
context "parsing token between expiration dates" do
|
13
|
+
setup do
|
14
|
+
Timecop.travel(Time.iso8601('2010-03-04T19:20:10Z')) do
|
15
|
+
assert_nothing_raised do
|
16
|
+
@token = OpenToken.new @opentoken, :password => @password
|
17
|
+
end
|
18
|
+
end
|
19
|
+
end
|
20
|
+
should "decrypt subject from token payload" do
|
21
|
+
assert_equal 'john@example.com', @token[:subject]
|
22
|
+
end
|
23
|
+
should "parse 'renew-until' date" do
|
24
|
+
assert_equal Time.iso8601('2010-03-05T07:19:15Z'), @token.valid_until
|
25
|
+
end
|
26
|
+
end
|
27
|
+
|
28
|
+
context "parsing token when current time is before expiration date" do
|
29
|
+
should "raise TokenExpiredError" do
|
30
|
+
Timecop.travel(Time.iso8601('2010-03-04T19:19:10Z')) do
|
31
|
+
assert_raises OpenToken::TokenExpiredError do
|
32
|
+
@token = OpenToken.new @opentoken, :password => @password
|
33
|
+
end
|
34
|
+
end
|
35
|
+
end
|
36
|
+
end
|
37
|
+
|
38
|
+
context "parsing token when current time is equal to expiration date" do
|
39
|
+
should "raise TokenExpiredError" do
|
40
|
+
Timecop.travel(Time.iso8601('2010-03-04T19:24:15Z')) do
|
41
|
+
assert_raises OpenToken::TokenExpiredError do
|
42
|
+
@token = OpenToken.new @opentoken, :password => @password
|
43
|
+
end
|
44
|
+
end
|
45
|
+
end
|
46
|
+
end
|
47
|
+
end
|
48
|
+
end
|
metadata
ADDED
@@ -0,0 +1,122 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: opentoken
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
hash: 23
|
5
|
+
prerelease:
|
6
|
+
segments:
|
7
|
+
- 0
|
8
|
+
- 2
|
9
|
+
- 0
|
10
|
+
version: 0.2.0
|
11
|
+
platform: ruby
|
12
|
+
authors:
|
13
|
+
- Ryan Sonnek
|
14
|
+
autorequire:
|
15
|
+
bindir: bin
|
16
|
+
cert_chain: []
|
17
|
+
|
18
|
+
date: 2011-01-12 00:00:00 -06:00
|
19
|
+
default_executable:
|
20
|
+
dependencies:
|
21
|
+
- !ruby/object:Gem::Dependency
|
22
|
+
name: activesupport
|
23
|
+
prerelease: false
|
24
|
+
requirement: &id001 !ruby/object:Gem::Requirement
|
25
|
+
none: false
|
26
|
+
requirements:
|
27
|
+
- - ">="
|
28
|
+
- !ruby/object:Gem::Version
|
29
|
+
hash: 11
|
30
|
+
segments:
|
31
|
+
- 2
|
32
|
+
- 3
|
33
|
+
- 4
|
34
|
+
version: 2.3.4
|
35
|
+
type: :runtime
|
36
|
+
version_requirements: *id001
|
37
|
+
- !ruby/object:Gem::Dependency
|
38
|
+
name: shoulda
|
39
|
+
prerelease: false
|
40
|
+
requirement: &id002 !ruby/object:Gem::Requirement
|
41
|
+
none: false
|
42
|
+
requirements:
|
43
|
+
- - ">="
|
44
|
+
- !ruby/object:Gem::Version
|
45
|
+
hash: 3
|
46
|
+
segments:
|
47
|
+
- 0
|
48
|
+
version: "0"
|
49
|
+
type: :development
|
50
|
+
version_requirements: *id002
|
51
|
+
- !ruby/object:Gem::Dependency
|
52
|
+
name: timecop
|
53
|
+
prerelease: false
|
54
|
+
requirement: &id003 !ruby/object:Gem::Requirement
|
55
|
+
none: false
|
56
|
+
requirements:
|
57
|
+
- - ">="
|
58
|
+
- !ruby/object:Gem::Version
|
59
|
+
hash: 27
|
60
|
+
segments:
|
61
|
+
- 0
|
62
|
+
- 3
|
63
|
+
- 4
|
64
|
+
version: 0.3.4
|
65
|
+
type: :development
|
66
|
+
version_requirements: *id003
|
67
|
+
description: parse opentoken properties passed for Single Signon requests
|
68
|
+
email: ryan@socialcast.com
|
69
|
+
executables: []
|
70
|
+
|
71
|
+
extensions: []
|
72
|
+
|
73
|
+
extra_rdoc_files:
|
74
|
+
- LICENSE
|
75
|
+
- README.rdoc
|
76
|
+
files:
|
77
|
+
- .document
|
78
|
+
- LICENSE
|
79
|
+
- README.rdoc
|
80
|
+
- Rakefile
|
81
|
+
- VERSION
|
82
|
+
- lib/opentoken.rb
|
83
|
+
- opentoken.gemspec
|
84
|
+
- test/helper.rb
|
85
|
+
- test/test_opentoken.rb
|
86
|
+
has_rdoc: true
|
87
|
+
homepage: http://github.com/wireframe/opentoken
|
88
|
+
licenses: []
|
89
|
+
|
90
|
+
post_install_message:
|
91
|
+
rdoc_options: []
|
92
|
+
|
93
|
+
require_paths:
|
94
|
+
- lib
|
95
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
96
|
+
none: false
|
97
|
+
requirements:
|
98
|
+
- - ">="
|
99
|
+
- !ruby/object:Gem::Version
|
100
|
+
hash: 3
|
101
|
+
segments:
|
102
|
+
- 0
|
103
|
+
version: "0"
|
104
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
105
|
+
none: false
|
106
|
+
requirements:
|
107
|
+
- - ">="
|
108
|
+
- !ruby/object:Gem::Version
|
109
|
+
hash: 3
|
110
|
+
segments:
|
111
|
+
- 0
|
112
|
+
version: "0"
|
113
|
+
requirements: []
|
114
|
+
|
115
|
+
rubyforge_project:
|
116
|
+
rubygems_version: 1.4.2
|
117
|
+
signing_key:
|
118
|
+
specification_version: 3
|
119
|
+
summary: ruby implementation of the opentoken specification
|
120
|
+
test_files:
|
121
|
+
- test/helper.rb
|
122
|
+
- test/test_opentoken.rb
|