ruby-openid 1.1.4 → 2.0.1

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of ruby-openid might be problematic. Click here for more details.

Files changed (207) hide show
  1. data/INSTALL +0 -9
  2. data/README +21 -22
  3. data/UPGRADE +117 -0
  4. data/admin/runtests.rb +36 -0
  5. data/examples/README +13 -21
  6. data/examples/active_record_openid_store/README +8 -3
  7. data/examples/active_record_openid_store/XXX_add_open_id_store_to_db.rb +4 -8
  8. data/examples/active_record_openid_store/XXX_upgrade_open_id_store.rb +26 -0
  9. data/examples/active_record_openid_store/lib/association.rb +2 -0
  10. data/examples/active_record_openid_store/lib/openid_ar_store.rb +22 -47
  11. data/examples/active_record_openid_store/test/store_test.rb +78 -48
  12. data/examples/discover +46 -0
  13. data/examples/{rails_server → rails_openid}/README +0 -0
  14. data/examples/{rails_server → rails_openid}/Rakefile +0 -0
  15. data/examples/{rails_server → rails_openid}/app/controllers/application.rb +0 -0
  16. data/examples/rails_openid/app/controllers/consumer_controller.rb +115 -0
  17. data/examples/{rails_server → rails_openid}/app/controllers/login_controller.rb +10 -2
  18. data/examples/rails_openid/app/controllers/server_controller.rb +265 -0
  19. data/examples/{rails_server → rails_openid}/app/helpers/application_helper.rb +0 -0
  20. data/examples/{rails_server → rails_openid}/app/helpers/login_helper.rb +0 -0
  21. data/examples/{rails_server → rails_openid}/app/helpers/server_helper.rb +0 -0
  22. data/examples/rails_openid/app/views/consumer/index.rhtml +81 -0
  23. data/examples/rails_openid/app/views/consumer/start.rhtml +8 -0
  24. data/examples/{rails_server → rails_openid}/app/views/layouts/server.rhtml +0 -0
  25. data/examples/{rails_server → rails_openid}/app/views/login/index.rhtml +1 -1
  26. data/examples/rails_openid/app/views/server/decide.rhtml +26 -0
  27. data/examples/{rails_server → rails_openid}/config/boot.rb +0 -0
  28. data/examples/{rails_server → rails_openid}/config/database.yml +0 -0
  29. data/examples/{rails_server → rails_openid}/config/environment.rb +0 -0
  30. data/examples/{rails_server → rails_openid}/config/environments/development.rb +0 -0
  31. data/examples/{rails_server → rails_openid}/config/environments/production.rb +0 -0
  32. data/examples/{rails_server → rails_openid}/config/environments/test.rb +0 -0
  33. data/examples/{rails_server → rails_openid}/config/routes.rb +2 -1
  34. data/examples/{rails_server → rails_openid}/doc/README_FOR_APP +0 -0
  35. data/examples/{rails_server → rails_openid}/public/404.html +0 -0
  36. data/examples/{rails_server → rails_openid}/public/500.html +0 -0
  37. data/examples/{rails_server → rails_openid}/public/dispatch.cgi +0 -0
  38. data/examples/{rails_server → rails_openid}/public/dispatch.fcgi +0 -0
  39. data/examples/{rails_server → rails_openid}/public/dispatch.rb +0 -0
  40. data/examples/{rails_server → rails_openid}/public/favicon.ico +0 -0
  41. data/examples/rails_openid/public/images/openid_login_bg.gif +0 -0
  42. data/examples/{rails_server → rails_openid}/public/javascripts/controls.js +0 -0
  43. data/examples/{rails_server → rails_openid}/public/javascripts/dragdrop.js +0 -0
  44. data/examples/{rails_server → rails_openid}/public/javascripts/effects.js +0 -0
  45. data/examples/{rails_server → rails_openid}/public/javascripts/prototype.js +0 -0
  46. data/examples/{rails_server → rails_openid}/public/robots.txt +0 -0
  47. data/examples/{rails_server → rails_openid}/script/about +0 -0
  48. data/examples/{rails_server → rails_openid}/script/breakpointer +0 -0
  49. data/examples/{rails_server → rails_openid}/script/console +0 -0
  50. data/examples/{rails_server → rails_openid}/script/destroy +0 -0
  51. data/examples/{rails_server → rails_openid}/script/generate +0 -0
  52. data/examples/{rails_server → rails_openid}/script/performance/benchmarker +0 -0
  53. data/examples/{rails_server → rails_openid}/script/performance/profiler +0 -0
  54. data/examples/{rails_server → rails_openid}/script/plugin +0 -0
  55. data/examples/{rails_server → rails_openid}/script/process/reaper +0 -0
  56. data/examples/{rails_server → rails_openid}/script/process/spawner +0 -0
  57. data/examples/{rails_server → rails_openid}/script/process/spinner +0 -0
  58. data/examples/{rails_server → rails_openid}/script/runner +0 -0
  59. data/examples/{rails_server → rails_openid}/script/server +0 -0
  60. data/examples/{rails_server → rails_openid}/test/functional/login_controller_test.rb +0 -0
  61. data/examples/{rails_server → rails_openid}/test/functional/server_controller_test.rb +0 -0
  62. data/examples/{rails_server → rails_openid}/test/test_helper.rb +0 -0
  63. data/lib/{hmac.rb → hmac/hmac.rb} +0 -0
  64. data/lib/{hmac-sha1.rb → hmac/sha1.rb} +1 -1
  65. data/lib/{hmac-sha2.rb → hmac/sha2.rb} +1 -1
  66. data/lib/openid/association.rb +213 -73
  67. data/lib/openid/consumer/associationmanager.rb +338 -0
  68. data/lib/openid/consumer/checkid_request.rb +175 -0
  69. data/lib/openid/consumer/discovery.rb +480 -0
  70. data/lib/openid/consumer/discovery_manager.rb +123 -0
  71. data/lib/openid/consumer/html_parse.rb +136 -0
  72. data/lib/openid/consumer/idres.rb +525 -0
  73. data/lib/openid/consumer/responses.rb +133 -0
  74. data/lib/openid/consumer.rb +280 -807
  75. data/lib/openid/cryptutil.rb +85 -0
  76. data/lib/openid/dh.rb +60 -23
  77. data/lib/openid/extension.rb +31 -0
  78. data/lib/openid/extensions/ax.rb +506 -0
  79. data/lib/openid/extensions/pape.rb +182 -0
  80. data/lib/openid/extensions/sreg.rb +275 -0
  81. data/lib/openid/extras.rb +11 -0
  82. data/lib/openid/fetchers.rb +132 -93
  83. data/lib/openid/kvform.rb +133 -0
  84. data/lib/openid/kvpost.rb +56 -0
  85. data/lib/openid/message.rb +534 -0
  86. data/lib/openid/protocolerror.rb +6 -0
  87. data/lib/openid/server.rb +1215 -666
  88. data/lib/openid/store/filesystem.rb +271 -0
  89. data/lib/openid/store/interface.rb +75 -0
  90. data/lib/openid/store/memory.rb +84 -0
  91. data/lib/openid/store/nonce.rb +68 -0
  92. data/lib/openid/trustroot.rb +314 -87
  93. data/lib/openid/urinorm.rb +37 -34
  94. data/lib/openid/util.rb +42 -220
  95. data/lib/openid/yadis/accept.rb +148 -0
  96. data/lib/openid/yadis/constants.rb +21 -0
  97. data/lib/openid/yadis/discovery.rb +153 -0
  98. data/lib/openid/yadis/filters.rb +205 -0
  99. data/lib/openid/{htmltokenizer.rb → yadis/htmltokenizer.rb} +1 -54
  100. data/lib/openid/yadis/parsehtml.rb +36 -0
  101. data/lib/openid/yadis/services.rb +42 -0
  102. data/lib/openid/yadis/xrds.rb +171 -0
  103. data/lib/openid/yadis/xri.rb +90 -0
  104. data/lib/openid/yadis/xrires.rb +106 -0
  105. data/lib/openid.rb +1 -4
  106. data/test/data/accept.txt +124 -0
  107. data/test/data/dh.txt +29 -0
  108. data/test/data/example-xrds.xml +14 -0
  109. data/test/data/linkparse.txt +587 -0
  110. data/test/data/n2b64 +650 -0
  111. data/test/data/test1-discover.txt +137 -0
  112. data/test/data/test1-parsehtml.txt +128 -0
  113. data/test/data/test_discover/openid.html +11 -0
  114. data/test/data/test_discover/openid2.html +11 -0
  115. data/test/data/test_discover/openid2_xrds.xml +12 -0
  116. data/test/data/test_discover/openid2_xrds_no_local_id.xml +11 -0
  117. data/test/data/test_discover/openid_1_and_2.html +11 -0
  118. data/test/data/test_discover/openid_1_and_2_xrds.xml +16 -0
  119. data/test/data/test_discover/openid_1_and_2_xrds_bad_delegate.xml +17 -0
  120. data/test/data/test_discover/openid_and_yadis.html +12 -0
  121. data/test/data/test_discover/openid_no_delegate.html +10 -0
  122. data/test/data/test_discover/yadis_0entries.xml +12 -0
  123. data/test/data/test_discover/yadis_2_bad_local_id.xml +15 -0
  124. data/test/data/test_discover/yadis_2entries_delegate.xml +22 -0
  125. data/test/data/test_discover/yadis_2entries_idp.xml +21 -0
  126. data/test/data/test_discover/yadis_another_delegate.xml +14 -0
  127. data/test/data/test_discover/yadis_idp.xml +12 -0
  128. data/test/data/test_discover/yadis_idp_delegate.xml +13 -0
  129. data/test/data/test_discover/yadis_no_delegate.xml +11 -0
  130. data/test/data/test_xrds/=j3h.2007.11.14.xrds +25 -0
  131. data/test/data/test_xrds/README +12 -0
  132. data/test/data/test_xrds/delegated-20060809-r1.xrds +34 -0
  133. data/test/data/test_xrds/delegated-20060809-r2.xrds +34 -0
  134. data/test/data/test_xrds/delegated-20060809.xrds +34 -0
  135. data/test/data/test_xrds/no-xrd.xml +7 -0
  136. data/test/data/test_xrds/not-xrds.xml +2 -0
  137. data/test/data/test_xrds/prefixsometimes.xrds +34 -0
  138. data/test/data/test_xrds/ref.xrds +109 -0
  139. data/test/data/test_xrds/sometimesprefix.xrds +34 -0
  140. data/test/data/test_xrds/spoof1.xrds +25 -0
  141. data/test/data/test_xrds/spoof2.xrds +25 -0
  142. data/test/data/test_xrds/spoof3.xrds +37 -0
  143. data/test/data/test_xrds/status222.xrds +9 -0
  144. data/test/data/test_xrds/valid-populated-xrds.xml +39 -0
  145. data/test/data/trustroot.txt +147 -0
  146. data/test/discoverdata.rb +131 -0
  147. data/test/test_accept.rb +170 -0
  148. data/test/test_association.rb +266 -0
  149. data/test/test_associationmanager.rb +899 -0
  150. data/test/test_ax.rb +587 -0
  151. data/test/test_checkid_request.rb +297 -0
  152. data/test/test_consumer.rb +257 -0
  153. data/test/test_cryptutil.rb +117 -0
  154. data/test/test_dh.rb +86 -0
  155. data/test/test_discover.rb +772 -0
  156. data/test/test_discovery_manager.rb +262 -0
  157. data/test/test_extras.rb +35 -0
  158. data/test/test_fetchers.rb +472 -0
  159. data/test/test_filters.rb +270 -0
  160. data/test/test_idres.rb +816 -0
  161. data/test/test_kvform.rb +165 -0
  162. data/test/test_kvpost.rb +65 -0
  163. data/test/test_linkparse.rb +101 -0
  164. data/test/test_message.rb +1058 -0
  165. data/test/test_nonce.rb +89 -0
  166. data/test/test_openid_yadis.rb +178 -0
  167. data/test/test_pape.rb +233 -0
  168. data/test/test_parsehtml.rb +80 -0
  169. data/test/test_responses.rb +63 -0
  170. data/test/test_server.rb +2270 -0
  171. data/test/test_sreg.rb +479 -0
  172. data/test/test_stores.rb +269 -0
  173. data/test/test_trustroot.rb +112 -0
  174. data/test/{urinorm.rb → test_urinorm.rb} +6 -3
  175. data/test/test_util.rb +144 -0
  176. data/test/test_xrds.rb +160 -0
  177. data/test/test_xri.rb +48 -0
  178. data/test/test_xrires.rb +63 -0
  179. data/test/test_yadis_discovery.rb +207 -0
  180. data/test/testutil.rb +116 -0
  181. data/test/util.rb +47 -50
  182. metadata +233 -143
  183. data/examples/consumer.rb +0 -290
  184. data/examples/rails_openid_login_generator/openid_login_generator-0.1.gem +0 -0
  185. data/examples/rails_server/app/controllers/server_controller.rb +0 -190
  186. data/examples/rails_server/app/views/server/decide.rhtml +0 -11
  187. data/examples/rails_server/public/images/rails.png +0 -0
  188. data/lib/hmac-md5.rb +0 -11
  189. data/lib/hmac-rmd160.rb +0 -11
  190. data/lib/openid/discovery.rb +0 -122
  191. data/lib/openid/filestore.rb +0 -315
  192. data/lib/openid/parse.rb +0 -23
  193. data/lib/openid/service.rb +0 -147
  194. data/lib/openid/stores.rb +0 -178
  195. data/test/assoc.rb +0 -38
  196. data/test/consumer.rb +0 -376
  197. data/test/data/brian.xrds +0 -16
  198. data/test/data/brianellin.mylid.xrds +0 -42
  199. data/test/dh.rb +0 -20
  200. data/test/extensions.rb +0 -30
  201. data/test/linkparse.rb +0 -305
  202. data/test/runtests.rb +0 -22
  203. data/test/server2.rb +0 -1053
  204. data/test/service.rb +0 -47
  205. data/test/storetestcase.rb +0 -172
  206. data/test/teststore.rb +0 -47
  207. data/test/trustroot.rb +0 -117
data/test/server2.rb DELETED
@@ -1,1053 +0,0 @@
1
- require 'test/unit'
2
- require 'uri'
3
-
4
- require 'openid/server'
5
- require 'openid/stores'
6
-
7
- include OpenID::Server
8
-
9
- ALT_MODULUS = 0xCAADDDEC1667FC68B5FA15D53C4E1532DD24561A1A2D47A12C01ABEA1E00731F6921AAC40742311FDF9E634BB7131BEE1AF240261554389A910425E044E88C8359B010F5AD2B80E29CB1A5B027B19D9E01A6F63A6F45E5D7ED2FF6A2A0085050A7D0CF307C3DB51D2490355907B4427C23A98DF1EB8ABEF2BA209BB7AFFE86A7
10
- ALT_GEN = 5
11
-
12
- class TestProtocolError < Test::Unit::TestCase
13
-
14
- def test_browser_with_return_to
15
- return_to = 'http://rp.unittest/consumer'
16
- # will be a ProtocolError raised by Decode or CheckAuthRequest.answer
17
- args = {
18
- 'openid.mode' => 'monkeydance',
19
- 'openid.identity' => 'http://wagu.unittest/',
20
- 'openid.return_to' => return_to
21
- }
22
- e = ProtocolError.new(args, 'plucky')
23
-
24
- assert_equal(true, e.has_return_to?)
25
-
26
- expected_args = {
27
- 'openid.mode' => 'error',
28
- 'openid.error' => 'plucky'
29
- }
30
-
31
- actual_args = OpenID::Util.parse_query(URI.parse(e.encode_to_url).query)
32
- assert_equal(expected_args, actual_args)
33
- assert_equal(ENCODE_URL, e.which_encoding?)
34
- end
35
-
36
- def test_no_return_to
37
- args = {
38
- 'openid.mode' => 'zebradance',
39
- 'openid.identity' => 'http://wagu.unittest/',
40
- }
41
-
42
- e = ProtocolError.new(args, "waffles")
43
- assert_equal(false, e.has_return_to?)
44
-
45
- expected = {
46
- 'error' => 'waffles',
47
- 'mode' => 'error'
48
- }
49
-
50
- actual = OpenID::Util.parsekv(e.encode_to_kvform)
51
- assert_equal(expected, actual)
52
- assert_equal(ENCODE_KVFORM, e.which_encoding?)
53
- end
54
-
55
- end
56
-
57
- class TestDecode < Test::Unit::TestCase
58
-
59
- def setup
60
- @id_url = "http://decoder.am.unittest/"
61
- @rt_url = "http://rp.unittest/foobot/?qux=zam"
62
- @tr_url = "http://rp.unittest/"
63
- @assoc_handle = "{assoc}{handle}"
64
- end
65
-
66
- def decode(args)
67
- Decoder.new.decode(args)
68
- end
69
-
70
- def test_nil
71
- args = {}
72
- r = self.decode(args)
73
- assert_equal(nil, r)
74
- end
75
-
76
- def test_irrelevant
77
- args = {
78
- 'pony' => 'spotted',
79
- 'sreg.mutant_power' => 'decaffinator',
80
- }
81
- r = self.decode(args)
82
- assert_equal(nil, r)
83
- end
84
-
85
- def test_bad
86
- args = {
87
- 'openid.mode' => 'twos-compliment',
88
- 'openid.pants' => 'zippered'
89
- }
90
-
91
- begin
92
- self.decode(args)
93
- rescue ProtocolError
94
- assert true
95
- else
96
- assert false, 'failed to raise ProtocolError'
97
- end
98
- end
99
-
100
- def test_dict_of_lists
101
- args = {
102
- 'openid.mode' => ['checkid_setup'],
103
- 'openid.identity' => @id_url,
104
- 'openid.assoc_handle' => @assoc_handle,
105
- 'openid.return_to' => @rt_url,
106
- 'openid.trust_root' => @tr_url
107
- }
108
-
109
- # this should raise an argument error
110
- begin
111
- result = self.decode(args)
112
- rescue ArgumentError
113
- assert true
114
- end
115
- end
116
-
117
-
118
- def test_checkid_immediate
119
- args = {
120
- 'openid.mode' => 'checkid_immediate',
121
- 'openid.identity' => @id_url,
122
- 'openid.assoc_handle' => @assoc_handle,
123
- 'openid.return_to' => @rt_url,
124
- 'openid.trust_root' => @tr_url,
125
- # should be ignored
126
- 'openid.some.extension' => 'junk'
127
- }
128
-
129
- r = self.decode(args)
130
-
131
- assert_equal(CheckIDRequest, r.class)
132
- assert_equal('checkid_immediate', r.mode)
133
- assert_equal(true, r.immediate)
134
- assert_equal(@id_url, r.identity)
135
- assert_equal(@tr_url, r.trust_root)
136
- assert_equal(@rt_url, r.return_to)
137
- assert_equal(@assoc_handle, r.assoc_handle)
138
- end
139
-
140
- def test_checkid_setup_no_identity
141
- args = {
142
- 'openid.mode' => 'checkid_setup',
143
- 'openid.assoc_handle' => @assoc_handle,
144
- 'openid.return_to' => @rt_url,
145
- 'openid.trust_root' => @tr_url,
146
- }
147
-
148
- begin
149
- result = self.decode(args)
150
- rescue ProtocolError => e
151
- assert e.query == args
152
- else
153
- flunk('Expected a ProtocolError, but did not get one')
154
- end
155
- end
156
-
157
-
158
- def test_checkid_setup_no_return_to
159
- args = {
160
- 'openid.mode' => 'checkid_setup',
161
- 'openid.identity' => @id_url,
162
- 'openid.assoc_handle' => @assoc_handle,
163
- 'openid.trust_root' => @tr_url,
164
- }
165
- begin
166
- result = self.decode(args)
167
- rescue ProtocolError => e
168
- assert e.query == args
169
- else
170
- flunk('Expected a ProtocolError, but did not get one')
171
- end
172
- end
173
-
174
- def test_checkid_setup_bad_return_to
175
- args = {
176
- 'openid.mode' => 'checkid_setup',
177
- 'openid.identity' => @id_url,
178
- 'openid.assoc_handle' => @assoc_handle,
179
- 'openid.return_to' => 'not a url',
180
- 'openid.trust_root' => @tr_url,
181
- }
182
- begin
183
- result = self.decode(args)
184
- rescue MalformedReturnURL => e
185
- assert e.query == args
186
- else
187
- flunk('Expected a MalformedReturnURL, but did not get one')
188
- end
189
- end
190
-
191
- def test_checkid_setup_untrusted_return_to
192
- args = {
193
- 'openid.mode' => 'checkid_setup',
194
- 'openid.identity' => @id_url,
195
- 'openid.assoc_handle' => @assoc_handle,
196
- 'openid.return_to' => 'http://incorrect.example.com/',
197
- 'openid.trust_root' => @tr_url,
198
- }
199
- begin
200
- result = self.decode(args)
201
- rescue UntrustedReturnURL => e
202
- assert true
203
- else
204
- flunk('Expected a UntrustedReturnURL, but did not get one')
205
- end
206
- end
207
-
208
-
209
- def test_check_auth
210
- args = {
211
- 'openid.mode' => 'check_authentication',
212
- 'openid.assoc_handle' => '{dumb}{handle}',
213
- 'openid.sig' => 'sigblob',
214
- 'openid.signed' => 'foo,bar,mode',
215
- 'openid.foo' => 'signedval1',
216
- 'openid.bar' => 'signedval2',
217
- 'openid.baz' => 'unsigned',
218
- }
219
- r = self.decode(args)
220
- assert_equal(r.class, CheckAuthRequest)
221
- assert_equal('check_authentication', r.mode)
222
- assert_equal('sigblob', r.sig)
223
- assert_equal([['foo', 'signedval1'],
224
- ['bar', 'signedval2'],
225
- ['mode', 'id_res']], r.signed)
226
-
227
- end
228
-
229
- def test_check_auth_missing_signed_field
230
- args = {
231
- 'openid.mode' => 'check_authentication',
232
- 'openid.assoc_handle' => '{dumb}{handle}',
233
- 'openid.sig' => 'sigblob',
234
- 'openid.signed' => 'foo,bar,mode',
235
- 'openid.foo' => 'signedval1',
236
- 'openid.baz' => 'unsigned'
237
- }
238
- begin
239
- r = self.decode(args)
240
- rescue ProtocolError => e
241
- assert e.query == args
242
- else
243
- flunk('Expected a ProtocolError, but did not get one')
244
- end
245
- end
246
-
247
- def test_check_auth_missing_signature
248
- args = {
249
- 'openid.mode' => 'check_authentication',
250
- 'openid.assoc_handle' => '{dumb}{handle}',
251
- 'openid.signed' => 'foo,bar,mode',
252
- 'openid.foo' => 'signedval1',
253
- 'openid.bar' => 'signedval2',
254
- 'openid.baz' => 'unsigned'
255
- }
256
- begin
257
- r = self.decode(args)
258
- rescue ProtocolError => e
259
- assert e.query == args
260
- else
261
- flunk('Expected a ProtocolError, but did not get one')
262
- end
263
- end
264
-
265
-
266
- def test_check_auth_and_invalidate
267
- args = {
268
- 'openid.mode' => 'check_authentication',
269
- 'openid.assoc_handle' => '{dumb}{handle}',
270
- 'openid.invalidate_handle' => '[[SMART_handle]]',
271
- 'openid.sig' => 'sigblob',
272
- 'openid.signed' => 'foo,bar,mode',
273
- 'openid.foo' => 'signedval1',
274
- 'openid.bar' => 'signedval2',
275
- 'openid.baz' => 'unsigned'
276
- }
277
- r = self.decode(args)
278
- assert_equal(CheckAuthRequest, r.class)
279
- assert_equal('[[SMART_handle]]', r.invalidate_handle)
280
- end
281
-
282
-
283
- def test_associate_DH
284
- args = {
285
- 'openid.mode' => 'associate',
286
- 'openid.session_type' => 'DH-SHA1',
287
- 'openid.dh_consumer_public' => "Rzup9265tw=="
288
- }
289
- r = self.decode(args)
290
- assert_equal(AssociateRequest, r.class)
291
- assert_equal("associate", r.mode)
292
- assert_equal("DH-SHA1", r.session.session_type)
293
- assert_equal("HMAC-SHA1", r.assoc_type)
294
- assert(r.session.consumer_pubkey)
295
- end
296
-
297
- # Trying DH assoc w/o public key
298
- def test_associate_DH_missing_key
299
- args = {
300
- 'openid.mode' => 'associate',
301
- 'openid.session_type' => 'DH-SHA1'
302
- }
303
- # Using DH-SHA1 without supplying dh_consumer_public is an error.
304
- begin
305
- self.decode(args)
306
- rescue ProtocolError => e
307
- assert e.query == args
308
- else
309
- flunk('Wanted a ProtocolError')
310
- end
311
- end
312
-
313
- # test associate w/ non default mod and gen
314
- def test_associate_DH_mod_gen
315
- args = {
316
- 'openid.mode' => 'associate',
317
- 'openid.session_type' => 'DH-SHA1',
318
- 'openid.dh_consumer_public' => "Rzup9265tw==",
319
- 'openid.dh_modulus' => OpenID::Util.num_to_base64(ALT_MODULUS),
320
- 'openid.dh_gen' => OpenID::Util.num_to_base64(ALT_GEN)
321
- }
322
- r = self.decode(args)
323
- assert_equal(AssociateRequest, r.class)
324
- assert_equal('DH-SHA1', r.session.session_type)
325
- assert_equal('HMAC-SHA1', r.assoc_type)
326
- assert_equal(ALT_MODULUS, r.session.dh.p)
327
- assert_equal(ALT_GEN, r.session.dh.g)
328
- assert r.session.consumer_pubkey
329
- end
330
-
331
- def test_associate_weird_session
332
- args = {
333
- 'openid.mode' => 'associate',
334
- 'openid.session_type' => 'FLCL6',
335
- 'openid.dh_consumer_public' => "YQ==\n"
336
- }
337
- begin
338
- self.decode(args)
339
- rescue ProtocolError => e
340
- assert e.query == args
341
- else
342
- flunk('Wanted a ProtocolError')
343
- end
344
- end
345
-
346
- def test_associate_plain_session
347
- args = {'openid.mode' => 'associate'}
348
- r = self.decode(args)
349
- assert_equal(AssociateRequest, r.class)
350
- assert_equal('associate', r.mode)
351
- assert_equal('plaintext', r.session.session_type)
352
- assert_equal('HMAC-SHA1', r.assoc_type)
353
- end
354
-
355
- end
356
-
357
- class TestEncode < Test::Unit::TestCase
358
-
359
- def setup
360
- @encoder = Encoder.new
361
- end
362
-
363
- def test_id_res
364
- request = CheckIDRequest.new('checkid_setup',
365
- 'http://bombom.unittest/',
366
- 'http://burr.unittest/999',
367
- 'http://burr.unittest/')
368
- response = OpenIDResponse.new(request)
369
- response.fields = {
370
- 'mode' => 'id_res',
371
- 'identity' => request.identity,
372
- 'return_to' => request.return_to
373
- }
374
- webresponse = @encoder.encode(response)
375
- assert_equal(HTTP_REDIRECT, webresponse.code)
376
- assert webresponse.headers.has_key?('location')
377
- loc = webresponse.headers['location']
378
- assert loc.starts_with?(request.return_to)
379
-
380
- query = OpenID::Util.parse_query(URI.parse(loc).query)
381
- expected = {}
382
- response.fields.each {|k,v| expected['openid.'+k] = v}
383
- assert_equal(expected, query)
384
- end
385
-
386
- def test_cancel
387
- request = CheckIDRequest.new('checkid_setup',
388
- 'http://bombom.unittest/',
389
- 'http://burr.unittest/999',
390
- 'http://burr.unittest/')
391
- response = OpenIDResponse.new(request)
392
- response.fields = {'mode' => 'cancel'}
393
- wr = @encoder.encode(response)
394
- assert_equal(HTTP_REDIRECT, wr.code)
395
- assert wr.headers.has_key?('location')
396
- assert wr.headers['location'].starts_with?(request.return_to)
397
- end
398
-
399
- def test_assoc_reply
400
- req = AssociateRequest.from_query({})
401
- resp = OpenIDResponse.new(req)
402
- resp.fields = {'assoc_handle' => 'every-zig'}
403
- wr = @encoder.encode(resp)
404
- assert_equal(HTTP_OK, wr.code)
405
- assert_equal({}, wr.headers)
406
- assert_equal("assoc_handle:every-zig\n", wr.body)
407
- end
408
-
409
- def test_check_auth_reply
410
- req = CheckAuthRequest.new('sock', 'sigg', [])
411
- res = OpenIDResponse.new(req)
412
- res.fields = {'is_valid' => 'true', 'invalidate_handle' => 'xxx:xxx'}
413
- wr = @encoder.encode(res)
414
-
415
- expected = "invalidate_handle:xxx:xxx\nis_valid:true\n"
416
- expected = OpenID::Util.parsekv(expected)
417
-
418
- assert_equal(HTTP_OK, wr.code)
419
- assert_equal({}, wr.headers)
420
- assert_equal(expected, OpenID::Util.parsekv(wr.body))
421
- end
422
-
423
- def test_unencodable_error
424
- args = {'openid.identity' => 'http://limu.unittest/'}
425
- e = ProtocolError.new(args, 'foo')
426
- begin
427
- @encoder.encode(e)
428
- rescue EncodingError => e
429
- assert true
430
- else
431
- flunk('Expected an EncodingError')
432
- end
433
- end
434
-
435
- def test_encodable_error
436
- args = {
437
- 'openid.mode' => 'associate',
438
- 'openid.identity' => 'http://limu.unittest/'
439
- }
440
- e = ProtocolError.new(args, 'snoot')
441
-
442
- expected_body = "error:snoot\nmode:error\n"
443
- expected_body = OpenID::Util.parsekv(expected_body)
444
-
445
- wr = @encoder.encode(e)
446
- assert_equal(HTTP_ERROR, wr.code)
447
- assert_equal({}, wr.headers)
448
- assert_equal(expected_body, OpenID::Util.parsekv(wr.body))
449
- end
450
-
451
- end
452
-
453
- class TestSigningEncode < Test::Unit::TestCase
454
-
455
- def setup
456
- @dumb_key = 'http://localhost/|dumb'
457
- @normal_key = 'http://localhost/|normal'
458
- @store = OpenID::MemoryStore.new
459
- @request = CheckIDRequest.new('checkid_setup',
460
- 'http://bombom.unittest/',
461
- 'http://burr.unittest/999',
462
- 'http://burr.unittest/')
463
- @response = OpenIDResponse.new(@request)
464
- @response.fields = {
465
- 'mode' => 'id_res',
466
- 'identity' => @request.identity,
467
- 'return_to' => @request.return_to
468
- }
469
- @response.signed += ['mode','identity','return_to']
470
- @signatory = Signatory.new(@store)
471
- @encoder = SigningEncoder.new(@signatory)
472
- end
473
-
474
- def test_id_res
475
- assoc_handle = '{bicycle}{shed}'
476
- assoc = OpenID::Association.from_expires_in(60, assoc_handle,
477
- 'sekrit','HMAC-SHA1')
478
- @store.store_association(@normal_key, assoc)
479
- @request.assoc_handle = assoc_handle
480
- wr = @encoder.encode(@response)
481
-
482
- assert_equal(HTTP_REDIRECT, wr.code)
483
- assert wr.headers.has_key?('location')
484
-
485
- loc = wr.headers['location']
486
- query = OpenID::Util.parse_query(URI.parse(loc).query)
487
-
488
- assert query.has_key?('openid.sig')
489
- assert query.has_key?('openid.signed')
490
- assert query.has_key?('openid.assoc_handle')
491
- end
492
-
493
- def test_id_res_dumb
494
- wr = @encoder.encode(@response)
495
-
496
- assert_equal(HTTP_REDIRECT, wr.code)
497
- assert wr.headers.has_key?('location')
498
-
499
- loc = wr.headers['location']
500
- query = OpenID::Util.parse_query(URI.parse(loc).query)
501
-
502
- assert query.has_key?('openid.sig')
503
- assert query.has_key?('openid.signed')
504
- assert query.has_key?('openid.assoc_handle')
505
- end
506
-
507
- def test_cancel
508
- response = OpenIDResponse.new(@request)
509
- response.fields['mode'] = 'cancel'
510
- response.signed.clear
511
- wr = @encoder.encode(response)
512
- assert_equal(HTTP_REDIRECT, wr.code)
513
- assert wr.headers.has_key?('location')
514
-
515
- loc = wr.headers['location']
516
- query = OpenID::Util.parse_query(URI.parse(loc).query)
517
- assert(!query.has_key?('openid.sig'))
518
- end
519
-
520
- def test_assoc_reply
521
- req = AssociateRequest.from_query({})
522
- res = OpenIDResponse.new(req)
523
- res.fields = {'assoc_handle' => 'every-zig'}
524
- wr = @encoder.encode(res)
525
- assert_equal(HTTP_OK, wr.code)
526
- assert_equal({}, wr.headers)
527
- assert_equal("assoc_handle:every-zig\n", wr.body)
528
- end
529
-
530
- def test_already_signed
531
- @response.fields['sig'] = 'priorSig=='
532
- begin
533
- @encoder.encode(@response)
534
- rescue AlreadySigned => e
535
- assert true
536
- else
537
- flunk('Wanted an AlreadySigned exception')
538
- end
539
- end
540
-
541
- end
542
-
543
- class TestCheckID < Test::Unit::TestCase
544
-
545
- def setup
546
- @request = CheckIDRequest.new('checkid_setup',
547
- 'http://bombom.unittest/',
548
- 'http://burr.unittest/999',
549
- 'http://burr.unittest/')
550
- end
551
-
552
- def test_trust_root_invalid
553
- @request.trust_root = 'http://foo.un/17'
554
- @request.return_to = 'http://foo.un/39'
555
- assert !@request.trust_root_valid
556
- end
557
-
558
- def test_trust_root_hvalid
559
- @request.trust_root = 'http://foo.un/'
560
- @request.return_to = 'http://foo.un/39'
561
- assert @request.trust_root_valid
562
- end
563
-
564
- def test_answer_allow
565
- answer = @request.answer(true)
566
- assert_equal(@request, answer.request)
567
- assert_equal({'mode'=>'id_res','identity'=>@request.identity,
568
- 'return_to'=>@request.return_to}, answer.fields)
569
- signed = answer.signed.dup.sort
570
- assert_equal(['identity','mode','return_to'], signed)
571
- end
572
-
573
- def test_answer_allow_no_trust_root
574
- @request.trust_root = nil
575
- answer = @request.answer(true)
576
- assert_equal(@request, answer.request)
577
- assert_equal({'mode'=>'id_res','identity'=>@request.identity,
578
- 'return_to'=>@request.return_to}, answer.fields)
579
- signed = answer.signed.dup.sort
580
- assert_equal(['identity','mode','return_to'], signed)
581
- end
582
-
583
- def test_answer_immediate_deny
584
- @request.mode = 'checkid_immediate'
585
- @request.immediate = true
586
- server_url = 'http://server-url.unittest/'
587
- answer = @request.answer(false, server_url)
588
- assert_equal(@request, answer.request)
589
- assert_equal(2, answer.fields.length)
590
- assert_equal('id_res', answer.fields['mode'])
591
- assert answer.fields['user_setup_url'].starts_with?(server_url)
592
- assert_equal([], answer.signed)
593
- end
594
-
595
- def test_answer_setup_deny
596
- answer = @request.answer(false)
597
- assert_equal({'mode' => 'cancel'}, answer.fields)
598
- assert_equal([], answer.signed)
599
- end
600
-
601
- def test_encode_to_url
602
- server_url = 'http://openid-server.un/'
603
- url = @request.encode_to_url(server_url)
604
- query = OpenID::Util.parse_query(URI.parse(url).query)
605
-
606
- req = CheckIDRequest.from_query(query)
607
- assert_equal(@request.mode, req.mode)
608
- assert_equal(@request.identity, req.identity)
609
- assert_equal(@request.return_to, req.return_to)
610
- assert_equal(@request.trust_root, req.trust_root)
611
- assert_equal(@request.immediate, req.immediate)
612
- assert_equal(@request.assoc_handle, req.assoc_handle)
613
- end
614
-
615
- def test_cancel_url
616
- url = @request.cancel_url
617
- expected = OpenID::Util.append_args(@request.return_to,
618
- {'openid.mode'=>'cancel'})
619
- assert_equal(expected, url)
620
- end
621
-
622
- def test_cancel_url_immediate
623
- @request.immediate = true
624
- begin
625
- url = @request.cancel_url
626
- rescue ProtocolError => e
627
- assert true
628
- else
629
- flunk('Wanted a ProtoclError')
630
- end
631
- end
632
-
633
- end
634
-
635
-
636
- class TestCheckIDExtension < Test::Unit::TestCase
637
-
638
- def setup
639
- @request = CheckIDRequest.new('checkid_setup',
640
- 'http://bombom.unittest/',
641
- 'http://burr.unittest/999',
642
- 'http://burr.unittest/')
643
- @response = OpenIDResponse.new(@request)
644
- @response.fields['mode'] = 'id_res'
645
- @response.fields['blue'] = 'star'
646
- @response.signed += ['mode','identity','return_to']
647
- end
648
-
649
- def test_add_field
650
- ns = 'mj12'
651
- @response.add_field(ns, 'bright', 'potato')
652
- assert_equal({'blue'=>'star',
653
- 'mode'=>'id_res',
654
- 'mj12.bright'=>'potato'}, @response.fields)
655
- assert_equal(['mode','identity','return_to','mj12.bright'], @response.signed)
656
- end
657
-
658
- def test_add_field_unsigned
659
- ns = 'mj12'
660
- @response.add_field(ns, 'bright', 'potato', false)
661
- assert_equal({'blue'=>'star',
662
- 'mode'=>'id_res',
663
- 'mj12.bright'=>'potato'}, @response.fields)
664
- assert_equal(['mode','identity','return_to'], @response.signed)
665
- end
666
-
667
- def test_add_fields
668
- ns = 'mj12'
669
- @response.add_fields(ns, {'bright'=>'potato', 'xxx'=>'yyy'})
670
- assert_equal({'blue'=>'star',
671
- 'mode'=>'id_res',
672
- 'mj12.bright'=>'potato',
673
- 'mj12.xxx'=>'yyy'}, @response.fields)
674
- assert_equal(['mode','identity','return_to','mj12.bright','mj12.xxx'].sort, @response.signed.sort)
675
- end
676
-
677
- def test_add_fields_unsigned
678
- ns = 'mj12'
679
- @response.add_fields(ns, {'bright'=>'potato', 'xxx'=>'yyy'}, false)
680
- assert_equal({'blue'=>'star',
681
- 'mode'=>'id_res',
682
- 'mj12.bright'=>'potato',
683
- 'mj12.xxx'=>'yyy'}, @response.fields)
684
- assert_equal(['mode','identity','return_to'].sort, @response.signed.sort)
685
- end
686
-
687
- def test_update
688
- eres = OpenIDResponse.new(nil)
689
- eres.fields.update({'a'=>'b','c'=>'d'})
690
- eres.signed = ['c']
691
-
692
- @response.update('ns', eres)
693
- assert_equal({'blue'=>'star','mode'=>'id_res','ns.a'=>'b','ns.c'=>'d'},
694
- @response.fields)
695
- assert_equal(['mode', 'identity', 'return_to', 'ns.c'], @response.signed)
696
- end
697
-
698
- def test_update_no_namespace
699
- eres = OpenIDResponse.new(nil)
700
- eres.fields.update({'a'=>'b','c'=>'d'})
701
- eres.signed = ['c']
702
-
703
- @response.update(nil, eres)
704
- assert_equal({'blue'=>'star','mode'=>'id_res','a'=>'b','c'=>'d'},
705
- @response.fields)
706
- assert_equal(['mode', 'identity', 'return_to', 'c'], @response.signed)
707
- end
708
-
709
- end
710
-
711
- class MockSignatory
712
-
713
- attr_accessor :is_valid, :assocs
714
-
715
- def initialize(assoc)
716
- @assocs = [assoc]
717
- @is_valid = true
718
- end
719
-
720
- def is_valid?
721
- @is_valid
722
- end
723
-
724
- def verify(assoc_handle, sig, signed_pairs)
725
- if @assocs.member?([true, assoc_handle])
726
- return self.is_valid?
727
- else
728
- return false
729
- end
730
- end
731
-
732
- def get_association(assoc_handle, dumb)
733
- if @assocs.member?([dumb, assoc_handle])
734
- return true
735
- else
736
- return nil
737
- end
738
- end
739
-
740
- def invalidate(assoc_handle, dumb)
741
- @assocs.delete([dumb, assoc_handle])
742
- end
743
-
744
- end
745
-
746
- class TestCheckAuthServer < Test::Unit::TestCase
747
-
748
- def setup
749
- @assoc_handle = 'moo'
750
- @request = CheckAuthRequest.new(@assoc_handle, 'signature',
751
- [['one','alpha'],['two','beta']])
752
- @signatory = MockSignatory.new([true, @assoc_handle])
753
- end
754
-
755
- def test_valid
756
- r = @request.answer(@signatory)
757
- assert_equal({'is_valid'=>'true'}, r.fields)
758
- assert_equal(r.request, @request)
759
- end
760
-
761
- def test_invalid
762
- assert_not_nil(@signatory)
763
-
764
- @signatory.is_valid = false
765
- r = @request.answer(@signatory)
766
- assert_equal({'is_valid'=>'false'}, r.fields)
767
- assert_equal(r.request, @request)
768
- end
769
-
770
- def test_replay
771
- r = @request.answer(@signatory)
772
- r = @request.answer(@signatory)
773
- assert_equal({'is_valid'=>'false'}, r.fields)
774
- end
775
-
776
- def test_invalidate_handle
777
- @request.invalidate_handle = 'bogushandle'
778
- r = @request.answer(@signatory)
779
- assert_equal({'is_valid'=>'true',
780
- 'invalidate_handle'=>'bogushandle'}, r.fields)
781
- assert_equal(r.request, @request)
782
- end
783
-
784
- def test_invalidate_handle_no
785
- assoc_handle = 'goodhandle'
786
- @signatory.assocs << [false, assoc_handle]
787
- @request.invalidate_handle = assoc_handle
788
- r = @request.answer(@signatory)
789
- assert_equal({'is_valid'=>'true'}, r.fields)
790
- end
791
-
792
- end
793
-
794
-
795
- class TestAssociate < Test::Unit::TestCase
796
-
797
- def setup
798
- @request = AssociateRequest.from_query({})
799
- @store = OpenID::MemoryStore.new
800
- @signatory = Signatory.new(@store)
801
- @assoc = @signatory.create_association(false)
802
- end
803
-
804
- def test_dh
805
- consumer_dh = OpenID::DiffieHellman.new
806
- cpub = consumer_dh.public
807
- session = DiffieHellmanServerSession.new(OpenID::DiffieHellman.new, cpub)
808
- @request = AssociateRequest.new(session)
809
- response = @request.answer(@assoc)
810
- rf = response.fields
811
- assert_equal('HMAC-SHA1', rf['assoc_type'])
812
- assert_equal('DH-SHA1', rf['session_type'])
813
- assert_equal(@assoc.handle, rf['assoc_handle'])
814
- assert_nil(rf['mac_key'])
815
- assert_not_nil(rf['enc_mac_key'])
816
- assert_not_nil(rf['dh_server_public'])
817
-
818
- enc_key = OpenID::Util.from_base64(rf['enc_mac_key'])
819
- spub = OpenID::Util.base64_to_num(rf['dh_server_public'])
820
- secret = consumer_dh.xor_secrect(spub, enc_key)
821
- assert_equal(@assoc.secret, secret)
822
- end
823
-
824
- def test_plaintext
825
- response = @request.answer(@assoc)
826
- rf = response.fields
827
-
828
- assert_equal('HMAC-SHA1', rf['assoc_type'])
829
- assert_equal(@assoc.handle, rf['assoc_handle'])
830
- assert_equal(OpenID::Util.to_base64(@assoc.secret), rf['mac_key'])
831
- assert_equal("#{14 * 24 * 60 * 6}", rf['expires_in'])
832
- assert_nil(rf['session_type'])
833
- assert_nil(rf['enc_mac_key'])
834
- assert_nil(rf['dh_server_public'])
835
- end
836
-
837
- end
838
-
839
- class Counter
840
-
841
- attr_accessor :count
842
-
843
- def initialize
844
- @count = 0
845
- end
846
-
847
- def inc
848
- @count += 1
849
- end
850
-
851
- end
852
-
853
- class TestServer < Test::Unit::TestCase
854
-
855
- def setup
856
- @store = OpenID::MemoryStore.new
857
- @server = Server.new(@store)
858
- end
859
-
860
- def test_associate
861
- req = AssociateRequest.from_query({})
862
- res = @server.openid_associate(req)
863
- assert res.fields.has_key?('assoc_handle')
864
- end
865
-
866
- def test_check_auth
867
- req = CheckAuthRequest.new('arrrrg', '0x3999', [])
868
- res = @server.openid_check_authentication(req)
869
- assert res.fields.has_key?('is_valid')
870
- end
871
-
872
- end
873
-
874
- class TestSignatory < Test::Unit::TestCase
875
-
876
- def setup
877
- @store = OpenID::MemoryStore.new
878
- @signatory = Signatory.new(@store)
879
- @dumb_key = 'http://localhost/|dumb'
880
- @normal_key = 'http://localhost/|normal'
881
- end
882
-
883
- def test_sign
884
- request = CheckIDRequest.new('checkid_setup','foo','bar','baz')
885
- assoc_handle = '{assoc}{lookatme}'
886
- @store.store_association(@normal_key,
887
- OpenID::Association.from_expires_in(60,
888
- assoc_handle,
889
- 'sekrit',
890
- 'HMAC-SHA1'))
891
- request.assoc_handle = assoc_handle
892
- response = OpenIDResponse.new(request)
893
- response.fields = {
894
- 'foo' => 'amsigned',
895
- 'bar' => 'notsigned',
896
- 'azu' => 'alsosigned'
897
- }
898
- response.signed = ['foo','azu']
899
- sresponse = @signatory.sign(response)
900
-
901
- assert_equal(assoc_handle, sresponse.fields['assoc_handle'])
902
- assert_equal('foo,azu', sresponse.fields['signed'])
903
- assert_not_nil(sresponse.fields['sig'])
904
- end
905
-
906
- def test_sign_dumb
907
- request = CheckIDRequest.new('checkid_setup','foo','bar','baz')
908
- request.assoc_handle = nil
909
- response = OpenIDResponse.new(request)
910
- response.fields = {
911
- 'foo' => 'amsigned',
912
- 'bar' => 'notsigned',
913
- 'azu' => 'alsosigned'
914
- }
915
- response.signed = ['foo','azu']
916
- sresponse = @signatory.sign(response)
917
- assoc_handle = sresponse.fields['assoc_handle']
918
- assert_not_nil(assoc_handle)
919
- assoc = @signatory.get_association(assoc_handle, true)
920
- assert_not_nil(assoc)
921
- assert_equal('foo,azu', sresponse.fields['signed'])
922
- assert_not_nil(sresponse.fields['sig'])
923
- end
924
-
925
- def test_sign_expired
926
- request = CheckIDRequest.new('checkid_setup','foo','bar','baz')
927
- assoc_handle = '{assoc}{lookatme}'
928
- @store.store_association(@normal_key,
929
- OpenID::Association.from_expires_in(-10,
930
- assoc_handle,
931
- 'sekrit',
932
- 'HMAC-SHA1'))
933
- assert_not_nil(@store.get_association(@normal_key, assoc_handle))
934
-
935
- request.assoc_handle = assoc_handle
936
- response = OpenIDResponse.new(request)
937
- response.fields = {
938
- 'foo' => 'amsigned',
939
- 'bar' => 'notsigned',
940
- 'azu' => 'alsosigned'
941
- }
942
- response.signed = ['foo','azu']
943
- sresponse = @signatory.sign(response)
944
-
945
- new_assoc_handle = sresponse.fields['assoc_handle']
946
- assert_not_nil(new_assoc_handle)
947
- assert new_assoc_handle != assoc_handle
948
-
949
- assert_equal(assoc_handle, sresponse.fields['invalidate_handle'])
950
- assert_equal('foo,azu', sresponse.fields['signed'])
951
- assert_not_nil(sresponse.fields['sig'])
952
-
953
- assert_nil(@store.get_association(@normal_key, assoc_handle))
954
- assert_not_nil(@store.get_association(@dumb_key, new_assoc_handle))
955
- assert_nil(@store.get_association(@normal_key, new_assoc_handle))
956
- end
957
-
958
- def test_verify
959
- assoc_handle = '{vroom}{zoom}'
960
- assoc = OpenID::Association.from_expires_in(60, assoc_handle,
961
- 'sekrit', 'HMAC-SHA1')
962
-
963
- @store.store_association(@dumb_key, assoc)
964
-
965
- signed_pairs = [['foo', 'bar'],['apple', 'orange']]
966
-
967
- sig = "Ylu0KcIR7PvNegB/K41KpnRgJl0="
968
- verified = @signatory.verify(assoc_handle, sig, signed_pairs)
969
- assert_not_nil(verified)
970
- end
971
-
972
- def test_verify_bad_sig
973
- assoc_handle = '{vroom}{zoom}'
974
- assoc = OpenID::Association.from_expires_in(60, assoc_handle,
975
- 'sekrit', 'HMAC-SHA1')
976
-
977
- @store.store_association(@dumb_key, assoc)
978
-
979
- signed_pairs = [['foo', 'bar'],['apple', 'orange']]
980
-
981
- sig = "Ylu0KcIR7PvNegB/K41KpnRgXXX="
982
- verified = @signatory.verify(assoc_handle, sig, signed_pairs)
983
- assert(!verified)
984
- end
985
-
986
- def test_verify_bad_handle
987
- assoc_handle = '{vroom}{zoom}'
988
- signed_pairs = [['foo', 'bar'],['apple', 'orange']]
989
-
990
- sig = "Ylu0KcIR7PvNegB/K41KpnRgJl0="
991
- verified = @signatory.verify(assoc_handle, sig, signed_pairs)
992
- assert(!verified)
993
- end
994
-
995
- def make_assoc(dumb, lifetime=60)
996
- assoc_handle = '{bling}'
997
- assoc = OpenID::Association.from_expires_in(lifetime, assoc_handle,
998
- 'sekrit', 'HMAC-SHA1')
999
- key = dumb ? @dumb_key : @normal_key
1000
- @store.store_association(key, assoc)
1001
- return assoc_handle
1002
- end
1003
-
1004
- def test_get_assoc
1005
- assoc_handle = self.make_assoc(true)
1006
- assoc = @signatory.get_association(assoc_handle, true)
1007
- assert_not_nil(assoc)
1008
- assert_equal(assoc_handle, assoc.handle)
1009
- end
1010
-
1011
- def test_get_assoc_expired
1012
- assoc_handle = self.make_assoc(true, -10)
1013
- assoc = @signatory.get_association(assoc_handle, true)
1014
- assert_nil(assoc)
1015
- end
1016
-
1017
- def test_get_assoc_invalid
1018
- assoc_handle = 'no-such-handle'
1019
- assoc = @signatory.get_association(assoc_handle, false)
1020
- assert_nil(assoc)
1021
- end
1022
-
1023
- def test_get_assoc_dumb_vs_normal
1024
- assoc_handle = self.make_assoc(true)
1025
- assoc = @signatory.get_association(assoc_handle, false)
1026
- assert_nil(assoc)
1027
- end
1028
-
1029
- def test_create_assoc
1030
- assoc = @signatory.create_association(false)
1031
- assoc2 = @signatory.get_association(assoc.handle, false)
1032
- assert_not_nil(assoc2)
1033
- assert_equal(assoc, assoc2)
1034
- end
1035
-
1036
- def test_invalidate
1037
- assoc_handle = '-squash-'
1038
- assoc = OpenID::Association.from_expires_in(60, assoc_handle,
1039
- 'sekrit', 'HMAC-SHA1')
1040
- @store.store_association(@dumb_key, assoc)
1041
- assoc = @signatory.get_association(assoc_handle, true)
1042
- assert_not_nil(assoc)
1043
-
1044
- assoc = @signatory.get_association(assoc_handle, true)
1045
- assert_not_nil(assoc)
1046
-
1047
- @signatory.invalidate(assoc_handle, true)
1048
- assoc = @signatory.get_association(assoc_handle, true)
1049
- assert_nil(assoc)
1050
- end
1051
-
1052
- end
1053
-