ruby-openid 2.1.8 → 2.2.0

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of ruby-openid might be problematic. Click here for more details.

Files changed (54) hide show
  1. data/CHANGELOG.md +13 -0
  2. data/INSTALL.md +47 -0
  3. data/README.md +82 -0
  4. data/{UPGRADE → UPGRADE.md} +54 -55
  5. data/examples/active_record_openid_store/README +4 -2
  6. data/examples/active_record_openid_store/XXX_add_open_id_store_to_db.rb +1 -1
  7. data/examples/active_record_openid_store/lib/openid_ar_store.rb +1 -1
  8. data/examples/rails_openid/app/controllers/server_controller.rb +0 -6
  9. data/lib/openid.rb +2 -2
  10. data/lib/openid/consumer/responses.rb +2 -0
  11. data/lib/openid/dh.rb +1 -1
  12. data/lib/openid/extensions/ax.rb +44 -22
  13. data/lib/openid/extensions/ui.rb +53 -0
  14. data/lib/openid/message.rb +1 -1
  15. data/lib/openid/store/filesystem.rb +8 -9
  16. data/lib/openid/store/memcache.rb +10 -2
  17. data/lib/openid/trustroot.rb +1 -0
  18. data/lib/openid/util.rb +6 -0
  19. data/lib/openid/version.rb +3 -0
  20. data/test/data/trustroot.txt +2 -2
  21. data/test/test_accept.rb +1 -1
  22. data/test/test_associationmanager.rb +1 -1
  23. data/test/test_ax.rb +89 -19
  24. data/test/test_checkid_request.rb +1 -1
  25. data/test/test_consumer.rb +5 -2
  26. data/test/test_cryptutil.rb +1 -1
  27. data/test/test_dh.rb +1 -1
  28. data/test/test_discover.rb +2 -4
  29. data/test/test_discovery_manager.rb +1 -3
  30. data/test/test_extension.rb +2 -2
  31. data/test/test_fetchers.rb +3 -7
  32. data/test/test_filters.rb +25 -31
  33. data/test/test_idres.rb +17 -17
  34. data/test/test_kvpost.rb +2 -2
  35. data/test/test_message.rb +1 -2
  36. data/test/test_oauth.rb +3 -2
  37. data/test/test_openid_yadis.rb +0 -1
  38. data/test/test_pape.rb +7 -6
  39. data/test/test_parsehtml.rb +2 -2
  40. data/test/test_server.rb +17 -22
  41. data/test/test_sreg.rb +8 -8
  42. data/test/test_stores.rb +1 -2
  43. data/test/test_trustroot.rb +14 -15
  44. data/test/test_ui.rb +93 -0
  45. data/test/test_urinorm.rb +2 -3
  46. data/test/test_util.rb +2 -3
  47. data/test/test_xrds.rb +13 -15
  48. data/test/test_xrires.rb +27 -14
  49. data/test/test_yadis_discovery.rb +1 -3
  50. metadata +260 -189
  51. data/CHANGELOG +0 -215
  52. data/INSTALL +0 -47
  53. data/README +0 -81
  54. data/admin/runtests.rb +0 -45
@@ -1,6 +1,6 @@
1
- require "openid/consumer"
2
1
  require "test/unit"
3
2
  require "testutil"
3
+ require "openid/consumer"
4
4
 
5
5
  module OpenID
6
6
  class Consumer
@@ -182,9 +182,11 @@ module OpenID
182
182
  end
183
183
 
184
184
  def test_setup_needed_openid2
185
- args = {'openid.ns' => OPENID2_NS, 'openid.mode' => 'setup_needed'}
185
+ setup_url = 'http://setup.url/'
186
+ args = {'openid.ns' => OPENID2_NS, 'openid.mode' => 'setup_needed', 'openid.user_setup_url' => setup_url}
186
187
  response = @consumer.complete(args, nil)
187
188
  assert_equal(SETUP_NEEDED, response.status)
189
+ assert_equal(setup_url, response.setup_url)
188
190
  end
189
191
 
190
192
  def test_idres_setup_needed_openid1
@@ -195,6 +197,7 @@ module OpenID
195
197
  }
196
198
  response = @consumer.complete(args, nil)
197
199
  assert_equal(SETUP_NEEDED, response.status)
200
+ assert_equal(setup_url, response.setup_url)
198
201
  end
199
202
 
200
203
  def test_error
@@ -1,5 +1,5 @@
1
1
  # coding: ASCII-8BIT
2
- require 'test/unit'
2
+ require "test/unit"
3
3
  require "openid/cryptutil"
4
4
  require "pathname"
5
5
 
@@ -1,6 +1,6 @@
1
1
  require 'test/unit'
2
- require 'openid/dh'
3
2
  require 'testutil'
3
+ require 'openid/dh'
4
4
 
5
5
  module OpenID
6
6
  class DiffieHellmanExposed < OpenID::DiffieHellman
@@ -1,8 +1,6 @@
1
-
1
+ require 'test/unit'
2
2
  require 'testutil'
3
3
  require 'util'
4
-
5
- require 'test/unit'
6
4
  require 'openid/fetchers'
7
5
  require 'openid/yadis/discovery'
8
6
  require 'openid/consumer/discovery'
@@ -48,7 +46,7 @@ module OpenID
48
46
  @responses.each { |response_set|
49
47
  @url = response_set[0].final_url
50
48
  OpenID.fetcher = SimpleMockFetcher.new(self, response_set)
51
-
49
+
52
50
  expected_status = response_set[-1].code
53
51
  begin
54
52
  OpenID.discover(@url)
@@ -1,8 +1,6 @@
1
-
2
1
  require 'test/unit'
3
2
  require 'openid/consumer/discovery_manager'
4
3
  require 'openid/extras'
5
-
6
4
  require 'testutil'
7
5
 
8
6
  module OpenID
@@ -41,7 +39,7 @@ module OpenID
41
39
  @disco_services.next
42
40
  assert(@disco_services.started?)
43
41
  @disco_services.next
44
- assert(@disco_services.started?)
42
+ assert(@disco_services.started?)
45
43
  @disco_services.next
46
44
  assert(!@disco_services.started?)
47
45
  end
@@ -1,6 +1,6 @@
1
+ require 'test/unit'
1
2
  require 'openid/extension'
2
3
  require 'openid/message'
3
- require 'test/unit'
4
4
 
5
5
  module OpenID
6
6
  class DummyExtension < OpenID::Extension
@@ -29,7 +29,7 @@ module OpenID
29
29
  assert_equal(DummyExtension::TEST_ALIAS,
30
30
  namespaces.get_alias(DummyExtension::TEST_URI))
31
31
  end
32
-
32
+
33
33
  def test_OpenID2
34
34
  oid2_msg = Message.new(OPENID2_NS)
35
35
  ext = DummyExtension.new
@@ -1,14 +1,10 @@
1
- # -*- coding: utf-8 -*-
2
-
1
+ # encoding: utf-8
3
2
  require 'test/unit'
4
3
  require 'net/http'
5
4
  require 'webrick'
6
-
7
5
  require 'testutil'
8
6
  require 'util'
9
-
10
7
  require 'openid/fetchers'
11
-
12
8
  require 'stringio'
13
9
 
14
10
  begin
@@ -412,7 +408,7 @@ EOF
412
408
  f.fetch("https://bogus.com/")
413
409
  }
414
410
  end
415
-
411
+
416
412
  class TestingException < OpenID::FetchingError; end
417
413
 
418
414
  class NoSSLSupportConnection
@@ -543,7 +539,7 @@ class ProxyTest < Test::Unit::TestCase
543
539
  def test_proxy_env
544
540
  ENV['http_proxy'] = 'http://127.0.0.1:3128/'
545
541
  OpenID.fetcher_use_env_http_proxy
546
-
542
+
547
543
  # make_http just to give us something with readable attributes to inspect.
548
544
  conn = OpenID.fetcher.make_http(URI.parse('http://127.0.0.2'))
549
545
  assert_equal('127.0.0.1', conn.proxy_address)
@@ -1,6 +1,8 @@
1
-
2
- require 'test/unit'
3
- require 'openid/yadis/filters'
1
+ require "test/unit"
2
+ require "testutil"
3
+ require "rexml/document"
4
+ require "openid/yadis/xrds"
5
+ require "openid/yadis/filters"
4
6
 
5
7
  module OpenID
6
8
  class BasicServiceEndpointTest < Test::Unit::TestCase
@@ -12,8 +14,7 @@ module OpenID
12
14
 
13
15
  no_types_endpoint = Yadis::BasicServiceEndpoint.new(yadis_url, [], nil, nil)
14
16
 
15
- some_types_endpoint = Yadis::BasicServiceEndpoint.new(yadis_url, types,
16
- nil, nil)
17
+ some_types_endpoint = Yadis::BasicServiceEndpoint.new(yadis_url, types, nil, nil)
17
18
 
18
19
  assert(no_types_endpoint.match_types([]) == [])
19
20
  assert(no_types_endpoint.match_types(["urn:absent"]) == [])
@@ -158,15 +159,14 @@ module OpenID
158
159
  ]
159
160
 
160
161
  cf = Yadis::CompoundFilter.new(subfilters)
161
- assert(cf.get_service_endpoints("unused", "unused") == all)
162
+ assert cf.get_service_endpoints("unused", "unused") == all
162
163
  end
163
164
  end
164
165
 
165
166
  class MakeFilterTest < Test::Unit::TestCase
166
167
  def test_parts_nil
167
168
  result = Yadis.make_filter(nil)
168
- assert(result.is_a?(Yadis::TransformFilterMaker),
169
- result)
169
+ assert result.is_a?(Yadis::TransformFilterMaker)
170
170
  end
171
171
 
172
172
  def test_parts_array
@@ -174,53 +174,49 @@ module OpenID
174
174
  e2 = Yadis::BasicServiceEndpoint.new(nil, [], nil, nil)
175
175
 
176
176
  result = Yadis.make_filter([e1, e2])
177
- assert(result.is_a?(Yadis::TransformFilterMaker),
178
- result)
179
- assert(result.filter_procs[0] == e1.method('from_basic_service_endpoint'))
180
- assert(result.filter_procs[1] == e2.method('from_basic_service_endpoint'))
177
+ assert result.is_a?(Yadis::TransformFilterMaker)
178
+ assert result.filter_procs[0] == e1.method('from_basic_service_endpoint')
179
+ assert result.filter_procs[1] == e2.method('from_basic_service_endpoint')
181
180
  end
182
181
 
183
182
  def test_parts_single
184
183
  e = Yadis::BasicServiceEndpoint.new(nil, [], nil, nil)
185
184
  result = Yadis.make_filter(e)
186
- assert(result.is_a?(Yadis::TransformFilterMaker),
187
- result)
185
+ assert result.is_a?(Yadis::TransformFilterMaker)
188
186
  end
189
187
  end
190
188
 
191
189
  class MakeCompoundFilterTest < Test::Unit::TestCase
192
190
  def test_no_filters
193
191
  result = Yadis.mk_compound_filter([])
194
- assert(result.subfilters == [])
192
+ assert result.subfilters == []
195
193
  end
196
194
 
197
195
  def test_single_transform_filter
198
196
  f = Yadis::TransformFilterMaker.new([])
199
- assert(Yadis.mk_compound_filter([f]) == f)
197
+ assert_equal f, Yadis.mk_compound_filter([f])
200
198
  end
201
199
 
202
200
  def test_single_endpoint
203
201
  e = Yadis::BasicServiceEndpoint.new(nil, [], nil, nil)
204
202
  result = Yadis.mk_compound_filter([e])
205
- assert(result.is_a?(Yadis::TransformFilterMaker))
203
+ assert result.is_a?(Yadis::TransformFilterMaker)
206
204
 
207
205
  # Expect the transform filter to call
208
206
  # from_basic_service_endpoint on the endpoint
209
207
  filter = result.filter_procs[0]
210
- assert(filter == e.method('from_basic_service_endpoint'),
211
- filter)
208
+ assert_equal filter, e.method('from_basic_service_endpoint')
212
209
  end
213
210
 
214
211
  def test_single_proc
215
212
  # Create a proc that just returns nil for any endpoint
216
213
  p = Proc.new { |endpoint| nil }
217
214
  result = Yadis.mk_compound_filter([p])
218
- assert(result.is_a?(Yadis::TransformFilterMaker))
215
+ assert result.is_a?(Yadis::TransformFilterMaker)
219
216
 
220
217
  # Expect the transform filter to call
221
218
  # from_basic_service_endpoint on the endpoint
222
- filter = result.filter_procs[0]
223
- assert(filter == p)
219
+ assert_equal result.filter_procs[0], p
224
220
  end
225
221
 
226
222
  def test_multiple_filters_same_type
@@ -231,8 +227,8 @@ module OpenID
231
227
  # from f1 and f2.
232
228
  result = Yadis.mk_compound_filter([f1, f2])
233
229
 
234
- assert(result.is_a?(Yadis::CompoundFilter))
235
- assert(result.subfilters == [f1, f2])
230
+ assert result.is_a?(Yadis::CompoundFilter)
231
+ assert result.subfilters == [f1, f2]
236
232
  end
237
233
 
238
234
  def test_multiple_filters_different_type
@@ -247,14 +243,12 @@ module OpenID
247
243
  # from f1 and f2.
248
244
  result = Yadis.mk_compound_filter([f1, f2, f3, f4])
249
245
 
250
- assert(result.is_a?(Yadis::CompoundFilter))
246
+ assert result.is_a?(Yadis::CompoundFilter)
251
247
 
252
- assert(result.subfilters[0] == f1)
253
- assert(result.subfilters[1].filter_procs[0] ==
254
- e.method('from_basic_service_endpoint'))
255
- assert(result.subfilters[2].filter_procs[0] ==
256
- f2.method('from_basic_service_endpoint'))
257
- assert(result.subfilters[2].filter_procs[1] == f3)
248
+ assert result.subfilters[0] == f1
249
+ assert result.subfilters[1].filter_procs[0] == e.method('from_basic_service_endpoint')
250
+ assert result.subfilters[2].filter_procs[0] == f2.method('from_basic_service_endpoint')
251
+ assert result.subfilters[2].filter_procs[1] == f3
258
252
  end
259
253
 
260
254
  def test_filter_type_error
@@ -1,6 +1,6 @@
1
+ require "test/unit"
1
2
  require "testutil"
2
3
  require "util"
3
- require "test/unit"
4
4
  require "openid/consumer/idres"
5
5
  require "openid/protocolerror"
6
6
  require "openid/store/memory"
@@ -103,21 +103,21 @@ module OpenID
103
103
  end
104
104
 
105
105
  def test_112
106
- args = {'openid.assoc_handle' => 'fa1f5ff0-cde4-11dc-a183-3714bfd55ca8',
107
- 'openid.claimed_id' => 'http://binkley.lan/user/test01',
108
- 'openid.identity' => 'http://test01.binkley.lan/',
109
- 'openid.mode' => 'id_res',
110
- 'openid.ns' => 'http://specs.openid.net/auth/2.0',
111
- 'openid.ns.pape' => 'http://specs.openid.net/extensions/pape/1.0',
112
- 'openid.op_endpoint' => 'http://binkley.lan/server',
113
- 'openid.pape.auth_policies' => 'none',
114
- 'openid.pape.auth_time' => '2008-01-28T20:42:36Z',
115
- 'openid.pape.nist_auth_level' => '0',
116
- 'openid.response_nonce' => '2008-01-28T21:07:04Z99Q=',
117
- 'openid.return_to' => 'http://binkley.lan:8001/process?janrain_nonce=2008-01-28T21%3A07%3A02Z0tMIKx',
118
- 'openid.sig' => 'YJlWH4U6SroB1HoPkmEKx9AyGGg=',
119
- 'openid.signed' => 'assoc_handle,identity,response_nonce,return_to,claimed_id,op_endpoint,pape.auth_time,ns.pape,pape.nist_auth_level,pape.auth_policies'
120
- }
106
+ args = {'openid.assoc_handle' => 'fa1f5ff0-cde4-11dc-a183-3714bfd55ca8',
107
+ 'openid.claimed_id' => 'http://binkley.lan/user/test01',
108
+ 'openid.identity' => 'http://test01.binkley.lan/',
109
+ 'openid.mode' => 'id_res',
110
+ 'openid.ns' => 'http://specs.openid.net/auth/2.0',
111
+ 'openid.ns.pape' => 'http://specs.openid.net/extensions/pape/1.0',
112
+ 'openid.op_endpoint' => 'http://binkley.lan/server',
113
+ 'openid.pape.auth_policies' => 'none',
114
+ 'openid.pape.auth_time' => '2008-01-28T20:42:36Z',
115
+ 'openid.pape.nist_auth_level' => '0',
116
+ 'openid.response_nonce' => '2008-01-28T21:07:04Z99Q=',
117
+ 'openid.return_to' => 'http://binkley.lan:8001/process?janrain_nonce=2008-01-28T21%3A07%3A02Z0tMIKx',
118
+ 'openid.sig' => 'YJlWH4U6SroB1HoPkmEKx9AyGGg=',
119
+ 'openid.signed' => 'assoc_handle,identity,response_nonce,return_to,claimed_id,op_endpoint,pape.auth_time,ns.pape,pape.nist_auth_level,pape.auth_policies'
120
+ }
121
121
  assert_equal(args['openid.ns'], OPENID2_NS)
122
122
  incoming = Message.from_post_args(args)
123
123
  assert(incoming.is_openid2)
@@ -129,7 +129,7 @@ module OpenID
129
129
  assert(expected.is_openid2)
130
130
  assert_equal(expected, car)
131
131
  assert_equal(expected_args, car.to_post_args)
132
- end
132
+ end
133
133
 
134
134
  def test_no_signed_list
135
135
  msg = Message.new(OPENID2_NS)
@@ -1,8 +1,8 @@
1
+ require "test/unit"
2
+ require "testutil"
1
3
  require "openid/kvpost"
2
4
  require "openid/kvform"
3
5
  require "openid/message"
4
- require "test/unit"
5
- require 'testutil'
6
6
 
7
7
  module OpenID
8
8
  class KVPostTestCase < Test::Unit::TestCase
@@ -1,9 +1,7 @@
1
1
  # last synced with Python openid.test.test_message on 6/29/2007.
2
-
3
2
  require 'test/unit'
4
3
  require 'util'
5
4
  require 'openid/message'
6
-
7
5
  require 'rexml/document'
8
6
 
9
7
  module OpenID
@@ -902,6 +900,7 @@ module OpenID
902
900
  'openid.identity' => 'http://bogus.example.invalid:port/',
903
901
  'openid.assoc_handle' => 'FLUB',
904
902
  'openid.return_to' => 'Neverland',
903
+ 'openid.ax.value.fullname' => "Bob&Smith'"
905
904
  }
906
905
 
907
906
  @action_url = 'scheme://host:port/path?query'
@@ -1,3 +1,4 @@
1
+ require 'test/unit'
1
2
  require 'openid/extensions/oauth'
2
3
  require 'openid/message'
3
4
  require 'openid/server'
@@ -8,7 +9,7 @@ module OpenID
8
9
  module OAuthTest
9
10
  class OAuthRequestTestCase < Test::Unit::TestCase
10
11
  def setup
11
- @req = OAuth::Request.new
12
+ @req = OAuth::Request.new
12
13
  end
13
14
 
14
15
  def test_construct
@@ -137,7 +138,7 @@ module OpenID
137
138
  end
138
139
 
139
140
  def test_from_success_response
140
-
141
+
141
142
  openid_req_msg = Message.from_openid_args({
142
143
  'mode' => 'id_res',
143
144
  'ns' => OPENID2_NS,
@@ -1,4 +1,3 @@
1
-
2
1
  require 'test/unit'
3
2
  require 'openid/consumer/discovery'
4
3
  require 'openid/yadis/services'
@@ -1,3 +1,4 @@
1
+ require 'test/unit'
1
2
  require 'openid/extensions/pape'
2
3
  require 'openid/message'
3
4
  require 'openid/server'
@@ -170,11 +171,11 @@ module OpenID
170
171
  assert_equal(nil, @req.auth_time)
171
172
  assert_equal([], @req.auth_policies)
172
173
  end
173
-
174
+
174
175
  def test_parse_extension_args_strict_bogus1
175
176
  args = {'auth_policies' => 'http://foo http://bar',
176
177
  'auth_time' => 'this one time'}
177
- assert_raises(ArgumentError) {
178
+ assert_raises(ArgumentError) {
178
179
  @req.parse_extension_args(args, true)
179
180
  }
180
181
  end
@@ -183,11 +184,11 @@ module OpenID
183
184
  args = {'auth_policies' => 'http://foo http://bar',
184
185
  'auth_time' => '1983-11-05T12:30:24Z',
185
186
  'nist_auth_level' => 'some'}
186
- assert_raises(ArgumentError) {
187
+ assert_raises(ArgumentError) {
187
188
  @req.parse_extension_args(args, true)
188
189
  }
189
190
  end
190
-
191
+
191
192
  def test_parse_extension_args_strict_good
192
193
  args = {'auth_policies' => 'http://foo http://bar',
193
194
  'auth_time' => '2007-10-11T05:25:18Z',
@@ -208,9 +209,9 @@ module OpenID
208
209
  assert_equal(nil, @req.nist_auth_level)
209
210
  end
210
211
 
211
-
212
+
212
213
  def test_from_success_response
213
-
214
+
214
215
  openid_req_msg = Message.from_openid_args({
215
216
  'mode' => 'id_res',
216
217
  'ns' => OPENID2_NS,
@@ -1,6 +1,6 @@
1
- require 'test/unit'
2
- require "openid/yadis/parsehtml"
1
+ require "test/unit"
3
2
  require "testutil"
3
+ require "openid/yadis/parsehtml"
4
4
 
5
5
  module OpenID
6
6
  class ParseHTMLTestCase < Test::Unit::TestCase
@@ -1,3 +1,7 @@
1
+ require 'test/unit'
2
+ require 'testutil'
3
+ require 'util'
4
+ require 'uri'
1
5
  require 'openid/server'
2
6
  require 'openid/cryptutil'
3
7
  require 'openid/association'
@@ -6,11 +10,6 @@ require 'openid/message'
6
10
  require 'openid/store/memory'
7
11
  require 'openid/dh'
8
12
  require 'openid/consumer/associationmanager'
9
- require 'util'
10
- require "testutil"
11
-
12
- require 'test/unit'
13
- require 'uri'
14
13
 
15
14
  # In general, if you edit or add tests here, try to move in the
16
15
  # direction of testing smaller units. For testing the external
@@ -208,7 +207,7 @@ module OpenID
208
207
  begin
209
208
  result = @decode.call(args)
210
209
  rescue ArgumentError => err
211
- assert(!err.to_s.index('values').nil?, err)
210
+ assert !err.to_s.index('values').nil?
212
211
  else
213
212
  flunk("Expected ArgumentError, but got result #{result}")
214
213
  end
@@ -1008,7 +1007,7 @@ module OpenID
1008
1007
  assert(webresponse.headers.has_key?('location'))
1009
1008
  location = webresponse.headers['location']
1010
1009
  query = Util.parse_query(URI::parse(location).query)
1011
- assert(!query.has_key?('openid.sig'), response.fields.to_post_args())
1010
+ assert !query.has_key?('openid.sig')
1012
1011
  end
1013
1012
 
1014
1013
  def test_assocReply
@@ -1530,7 +1529,7 @@ module OpenID
1530
1529
  {'blue' => 'star',
1531
1530
  'mode' => 'id_res',
1532
1531
  })
1533
-
1532
+
1534
1533
  assert_equal(@response.fields.get_args(namespace),
1535
1534
  {'bright' => 'potato'})
1536
1535
  end
@@ -1613,7 +1612,7 @@ module OpenID
1613
1612
  r = @request.answer(@signatory)
1614
1613
  assert_equal({'is_valid' => 'false'},
1615
1614
  r.fields.get_args(OPENID_NS))
1616
-
1615
+
1617
1616
  end
1618
1617
 
1619
1618
  def test_replay
@@ -1750,7 +1749,7 @@ module OpenID
1750
1749
  invalid_s1,
1751
1750
  invalid_s1_2,
1752
1751
  ]
1753
-
1752
+
1754
1753
  bad_request_argss.each { |request_args|
1755
1754
  message = Message.from_post_args(request_args)
1756
1755
  assert_raise(Server::ProtocolError) {
@@ -2299,8 +2298,7 @@ module OpenID
2299
2298
  verified = @signatory.verify(assoc_handle, signed)
2300
2299
  }
2301
2300
 
2302
- assert(!verified)
2303
- #assert(@messages)
2301
+ assert !verified
2304
2302
  end
2305
2303
 
2306
2304
  def test_verifyAssocMismatch
@@ -2322,16 +2320,14 @@ module OpenID
2322
2320
  verified = @signatory.verify(assoc_handle, signed)
2323
2321
  }
2324
2322
 
2325
- assert(!verified)
2326
- #assert(@messages)
2323
+ assert !verified
2327
2324
  end
2328
2325
 
2329
2326
  def test_getAssoc
2330
2327
  assoc_handle = makeAssoc(true)
2331
2328
  assoc = @signatory.get_association(assoc_handle, true)
2332
- assert(assoc)
2333
- assert_equal(assoc.handle, assoc_handle)
2334
- # @failIf(@messages, @messages)
2329
+ assert assoc
2330
+ assert_equal assoc.handle, assoc_handle
2335
2331
  end
2336
2332
 
2337
2333
  def test_getAssocExpired
@@ -2340,8 +2336,7 @@ module OpenID
2340
2336
  silence_logging {
2341
2337
  assoc = @signatory.get_association(assoc_handle, true)
2342
2338
  }
2343
- assert(!assoc, assoc)
2344
- # assert(@messages)
2339
+ assert !assoc
2345
2340
  end
2346
2341
 
2347
2342
  def test_getAssocInvalid
@@ -2428,7 +2423,7 @@ module OpenID
2428
2423
  'openid.assoc_type' => 'HMAC-SHA1'}
2429
2424
  areq = @server.decode_request(assoc_args)
2430
2425
  aresp = @server.handle_request(areq)
2431
-
2426
+
2432
2427
  amess = aresp.fields
2433
2428
  assert(amess.is_openid1)
2434
2429
  ahandle = amess.get_arg(OPENID_NS, 'assoc_handle')
@@ -2441,7 +2436,7 @@ module OpenID
2441
2436
  'openid.return_to' => 'http://example.com/openid/consumer',
2442
2437
  'openid.assoc_handle' => ahandle,
2443
2438
  'openid.identity' => 'http://foo.com/'}
2444
-
2439
+
2445
2440
  cireq = @server.decode_request(checkid_args)
2446
2441
  ciresp = cireq.answer(true)
2447
2442
 
@@ -2449,7 +2444,7 @@ module OpenID
2449
2444
 
2450
2445
  assert_equal(assoc.get_message_signature(signed_resp.fields),
2451
2446
  signed_resp.fields.get_arg(OPENID_NS, 'sig'))
2452
-
2447
+
2453
2448
  assert(assoc.check_message_signature(signed_resp.fields))
2454
2449
  end
2455
2450