ruby-openid 2.1.8 → 2.2.0
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of ruby-openid might be problematic. Click here for more details.
- data/CHANGELOG.md +13 -0
- data/INSTALL.md +47 -0
- data/README.md +82 -0
- data/{UPGRADE → UPGRADE.md} +54 -55
- data/examples/active_record_openid_store/README +4 -2
- data/examples/active_record_openid_store/XXX_add_open_id_store_to_db.rb +1 -1
- data/examples/active_record_openid_store/lib/openid_ar_store.rb +1 -1
- data/examples/rails_openid/app/controllers/server_controller.rb +0 -6
- data/lib/openid.rb +2 -2
- data/lib/openid/consumer/responses.rb +2 -0
- data/lib/openid/dh.rb +1 -1
- data/lib/openid/extensions/ax.rb +44 -22
- data/lib/openid/extensions/ui.rb +53 -0
- data/lib/openid/message.rb +1 -1
- data/lib/openid/store/filesystem.rb +8 -9
- data/lib/openid/store/memcache.rb +10 -2
- data/lib/openid/trustroot.rb +1 -0
- data/lib/openid/util.rb +6 -0
- data/lib/openid/version.rb +3 -0
- data/test/data/trustroot.txt +2 -2
- data/test/test_accept.rb +1 -1
- data/test/test_associationmanager.rb +1 -1
- data/test/test_ax.rb +89 -19
- data/test/test_checkid_request.rb +1 -1
- data/test/test_consumer.rb +5 -2
- data/test/test_cryptutil.rb +1 -1
- data/test/test_dh.rb +1 -1
- data/test/test_discover.rb +2 -4
- data/test/test_discovery_manager.rb +1 -3
- data/test/test_extension.rb +2 -2
- data/test/test_fetchers.rb +3 -7
- data/test/test_filters.rb +25 -31
- data/test/test_idres.rb +17 -17
- data/test/test_kvpost.rb +2 -2
- data/test/test_message.rb +1 -2
- data/test/test_oauth.rb +3 -2
- data/test/test_openid_yadis.rb +0 -1
- data/test/test_pape.rb +7 -6
- data/test/test_parsehtml.rb +2 -2
- data/test/test_server.rb +17 -22
- data/test/test_sreg.rb +8 -8
- data/test/test_stores.rb +1 -2
- data/test/test_trustroot.rb +14 -15
- data/test/test_ui.rb +93 -0
- data/test/test_urinorm.rb +2 -3
- data/test/test_util.rb +2 -3
- data/test/test_xrds.rb +13 -15
- data/test/test_xrires.rb +27 -14
- data/test/test_yadis_discovery.rb +1 -3
- metadata +260 -189
- data/CHANGELOG +0 -215
- data/INSTALL +0 -47
- data/README +0 -81
- data/admin/runtests.rb +0 -45
data/test/test_consumer.rb
CHANGED
@@ -1,6 +1,6 @@
|
|
1
|
-
require "openid/consumer"
|
2
1
|
require "test/unit"
|
3
2
|
require "testutil"
|
3
|
+
require "openid/consumer"
|
4
4
|
|
5
5
|
module OpenID
|
6
6
|
class Consumer
|
@@ -182,9 +182,11 @@ module OpenID
|
|
182
182
|
end
|
183
183
|
|
184
184
|
def test_setup_needed_openid2
|
185
|
-
|
185
|
+
setup_url = 'http://setup.url/'
|
186
|
+
args = {'openid.ns' => OPENID2_NS, 'openid.mode' => 'setup_needed', 'openid.user_setup_url' => setup_url}
|
186
187
|
response = @consumer.complete(args, nil)
|
187
188
|
assert_equal(SETUP_NEEDED, response.status)
|
189
|
+
assert_equal(setup_url, response.setup_url)
|
188
190
|
end
|
189
191
|
|
190
192
|
def test_idres_setup_needed_openid1
|
@@ -195,6 +197,7 @@ module OpenID
|
|
195
197
|
}
|
196
198
|
response = @consumer.complete(args, nil)
|
197
199
|
assert_equal(SETUP_NEEDED, response.status)
|
200
|
+
assert_equal(setup_url, response.setup_url)
|
198
201
|
end
|
199
202
|
|
200
203
|
def test_error
|
data/test/test_cryptutil.rb
CHANGED
data/test/test_dh.rb
CHANGED
data/test/test_discover.rb
CHANGED
@@ -1,8 +1,6 @@
|
|
1
|
-
|
1
|
+
require 'test/unit'
|
2
2
|
require 'testutil'
|
3
3
|
require 'util'
|
4
|
-
|
5
|
-
require 'test/unit'
|
6
4
|
require 'openid/fetchers'
|
7
5
|
require 'openid/yadis/discovery'
|
8
6
|
require 'openid/consumer/discovery'
|
@@ -48,7 +46,7 @@ module OpenID
|
|
48
46
|
@responses.each { |response_set|
|
49
47
|
@url = response_set[0].final_url
|
50
48
|
OpenID.fetcher = SimpleMockFetcher.new(self, response_set)
|
51
|
-
|
49
|
+
|
52
50
|
expected_status = response_set[-1].code
|
53
51
|
begin
|
54
52
|
OpenID.discover(@url)
|
@@ -1,8 +1,6 @@
|
|
1
|
-
|
2
1
|
require 'test/unit'
|
3
2
|
require 'openid/consumer/discovery_manager'
|
4
3
|
require 'openid/extras'
|
5
|
-
|
6
4
|
require 'testutil'
|
7
5
|
|
8
6
|
module OpenID
|
@@ -41,7 +39,7 @@ module OpenID
|
|
41
39
|
@disco_services.next
|
42
40
|
assert(@disco_services.started?)
|
43
41
|
@disco_services.next
|
44
|
-
assert(@disco_services.started?)
|
42
|
+
assert(@disco_services.started?)
|
45
43
|
@disco_services.next
|
46
44
|
assert(!@disco_services.started?)
|
47
45
|
end
|
data/test/test_extension.rb
CHANGED
@@ -1,6 +1,6 @@
|
|
1
|
+
require 'test/unit'
|
1
2
|
require 'openid/extension'
|
2
3
|
require 'openid/message'
|
3
|
-
require 'test/unit'
|
4
4
|
|
5
5
|
module OpenID
|
6
6
|
class DummyExtension < OpenID::Extension
|
@@ -29,7 +29,7 @@ module OpenID
|
|
29
29
|
assert_equal(DummyExtension::TEST_ALIAS,
|
30
30
|
namespaces.get_alias(DummyExtension::TEST_URI))
|
31
31
|
end
|
32
|
-
|
32
|
+
|
33
33
|
def test_OpenID2
|
34
34
|
oid2_msg = Message.new(OPENID2_NS)
|
35
35
|
ext = DummyExtension.new
|
data/test/test_fetchers.rb
CHANGED
@@ -1,14 +1,10 @@
|
|
1
|
-
#
|
2
|
-
|
1
|
+
# encoding: utf-8
|
3
2
|
require 'test/unit'
|
4
3
|
require 'net/http'
|
5
4
|
require 'webrick'
|
6
|
-
|
7
5
|
require 'testutil'
|
8
6
|
require 'util'
|
9
|
-
|
10
7
|
require 'openid/fetchers'
|
11
|
-
|
12
8
|
require 'stringio'
|
13
9
|
|
14
10
|
begin
|
@@ -412,7 +408,7 @@ EOF
|
|
412
408
|
f.fetch("https://bogus.com/")
|
413
409
|
}
|
414
410
|
end
|
415
|
-
|
411
|
+
|
416
412
|
class TestingException < OpenID::FetchingError; end
|
417
413
|
|
418
414
|
class NoSSLSupportConnection
|
@@ -543,7 +539,7 @@ class ProxyTest < Test::Unit::TestCase
|
|
543
539
|
def test_proxy_env
|
544
540
|
ENV['http_proxy'] = 'http://127.0.0.1:3128/'
|
545
541
|
OpenID.fetcher_use_env_http_proxy
|
546
|
-
|
542
|
+
|
547
543
|
# make_http just to give us something with readable attributes to inspect.
|
548
544
|
conn = OpenID.fetcher.make_http(URI.parse('http://127.0.0.2'))
|
549
545
|
assert_equal('127.0.0.1', conn.proxy_address)
|
data/test/test_filters.rb
CHANGED
@@ -1,6 +1,8 @@
|
|
1
|
-
|
2
|
-
require
|
3
|
-
require
|
1
|
+
require "test/unit"
|
2
|
+
require "testutil"
|
3
|
+
require "rexml/document"
|
4
|
+
require "openid/yadis/xrds"
|
5
|
+
require "openid/yadis/filters"
|
4
6
|
|
5
7
|
module OpenID
|
6
8
|
class BasicServiceEndpointTest < Test::Unit::TestCase
|
@@ -12,8 +14,7 @@ module OpenID
|
|
12
14
|
|
13
15
|
no_types_endpoint = Yadis::BasicServiceEndpoint.new(yadis_url, [], nil, nil)
|
14
16
|
|
15
|
-
some_types_endpoint = Yadis::BasicServiceEndpoint.new(yadis_url, types,
|
16
|
-
nil, nil)
|
17
|
+
some_types_endpoint = Yadis::BasicServiceEndpoint.new(yadis_url, types, nil, nil)
|
17
18
|
|
18
19
|
assert(no_types_endpoint.match_types([]) == [])
|
19
20
|
assert(no_types_endpoint.match_types(["urn:absent"]) == [])
|
@@ -158,15 +159,14 @@ module OpenID
|
|
158
159
|
]
|
159
160
|
|
160
161
|
cf = Yadis::CompoundFilter.new(subfilters)
|
161
|
-
assert
|
162
|
+
assert cf.get_service_endpoints("unused", "unused") == all
|
162
163
|
end
|
163
164
|
end
|
164
165
|
|
165
166
|
class MakeFilterTest < Test::Unit::TestCase
|
166
167
|
def test_parts_nil
|
167
168
|
result = Yadis.make_filter(nil)
|
168
|
-
assert
|
169
|
-
result)
|
169
|
+
assert result.is_a?(Yadis::TransformFilterMaker)
|
170
170
|
end
|
171
171
|
|
172
172
|
def test_parts_array
|
@@ -174,53 +174,49 @@ module OpenID
|
|
174
174
|
e2 = Yadis::BasicServiceEndpoint.new(nil, [], nil, nil)
|
175
175
|
|
176
176
|
result = Yadis.make_filter([e1, e2])
|
177
|
-
assert
|
178
|
-
|
179
|
-
assert
|
180
|
-
assert(result.filter_procs[1] == e2.method('from_basic_service_endpoint'))
|
177
|
+
assert result.is_a?(Yadis::TransformFilterMaker)
|
178
|
+
assert result.filter_procs[0] == e1.method('from_basic_service_endpoint')
|
179
|
+
assert result.filter_procs[1] == e2.method('from_basic_service_endpoint')
|
181
180
|
end
|
182
181
|
|
183
182
|
def test_parts_single
|
184
183
|
e = Yadis::BasicServiceEndpoint.new(nil, [], nil, nil)
|
185
184
|
result = Yadis.make_filter(e)
|
186
|
-
assert
|
187
|
-
result)
|
185
|
+
assert result.is_a?(Yadis::TransformFilterMaker)
|
188
186
|
end
|
189
187
|
end
|
190
188
|
|
191
189
|
class MakeCompoundFilterTest < Test::Unit::TestCase
|
192
190
|
def test_no_filters
|
193
191
|
result = Yadis.mk_compound_filter([])
|
194
|
-
assert
|
192
|
+
assert result.subfilters == []
|
195
193
|
end
|
196
194
|
|
197
195
|
def test_single_transform_filter
|
198
196
|
f = Yadis::TransformFilterMaker.new([])
|
199
|
-
|
197
|
+
assert_equal f, Yadis.mk_compound_filter([f])
|
200
198
|
end
|
201
199
|
|
202
200
|
def test_single_endpoint
|
203
201
|
e = Yadis::BasicServiceEndpoint.new(nil, [], nil, nil)
|
204
202
|
result = Yadis.mk_compound_filter([e])
|
205
|
-
assert
|
203
|
+
assert result.is_a?(Yadis::TransformFilterMaker)
|
206
204
|
|
207
205
|
# Expect the transform filter to call
|
208
206
|
# from_basic_service_endpoint on the endpoint
|
209
207
|
filter = result.filter_procs[0]
|
210
|
-
|
211
|
-
filter)
|
208
|
+
assert_equal filter, e.method('from_basic_service_endpoint')
|
212
209
|
end
|
213
210
|
|
214
211
|
def test_single_proc
|
215
212
|
# Create a proc that just returns nil for any endpoint
|
216
213
|
p = Proc.new { |endpoint| nil }
|
217
214
|
result = Yadis.mk_compound_filter([p])
|
218
|
-
assert
|
215
|
+
assert result.is_a?(Yadis::TransformFilterMaker)
|
219
216
|
|
220
217
|
# Expect the transform filter to call
|
221
218
|
# from_basic_service_endpoint on the endpoint
|
222
|
-
|
223
|
-
assert(filter == p)
|
219
|
+
assert_equal result.filter_procs[0], p
|
224
220
|
end
|
225
221
|
|
226
222
|
def test_multiple_filters_same_type
|
@@ -231,8 +227,8 @@ module OpenID
|
|
231
227
|
# from f1 and f2.
|
232
228
|
result = Yadis.mk_compound_filter([f1, f2])
|
233
229
|
|
234
|
-
assert
|
235
|
-
assert
|
230
|
+
assert result.is_a?(Yadis::CompoundFilter)
|
231
|
+
assert result.subfilters == [f1, f2]
|
236
232
|
end
|
237
233
|
|
238
234
|
def test_multiple_filters_different_type
|
@@ -247,14 +243,12 @@ module OpenID
|
|
247
243
|
# from f1 and f2.
|
248
244
|
result = Yadis.mk_compound_filter([f1, f2, f3, f4])
|
249
245
|
|
250
|
-
assert
|
246
|
+
assert result.is_a?(Yadis::CompoundFilter)
|
251
247
|
|
252
|
-
assert
|
253
|
-
assert
|
254
|
-
|
255
|
-
assert
|
256
|
-
f2.method('from_basic_service_endpoint'))
|
257
|
-
assert(result.subfilters[2].filter_procs[1] == f3)
|
248
|
+
assert result.subfilters[0] == f1
|
249
|
+
assert result.subfilters[1].filter_procs[0] == e.method('from_basic_service_endpoint')
|
250
|
+
assert result.subfilters[2].filter_procs[0] == f2.method('from_basic_service_endpoint')
|
251
|
+
assert result.subfilters[2].filter_procs[1] == f3
|
258
252
|
end
|
259
253
|
|
260
254
|
def test_filter_type_error
|
data/test/test_idres.rb
CHANGED
@@ -1,6 +1,6 @@
|
|
1
|
+
require "test/unit"
|
1
2
|
require "testutil"
|
2
3
|
require "util"
|
3
|
-
require "test/unit"
|
4
4
|
require "openid/consumer/idres"
|
5
5
|
require "openid/protocolerror"
|
6
6
|
require "openid/store/memory"
|
@@ -103,21 +103,21 @@ module OpenID
|
|
103
103
|
end
|
104
104
|
|
105
105
|
def test_112
|
106
|
-
args = {'openid.assoc_handle' => 'fa1f5ff0-cde4-11dc-a183-3714bfd55ca8',
|
107
|
-
'openid.claimed_id' => 'http://binkley.lan/user/test01',
|
108
|
-
'openid.identity' => 'http://test01.binkley.lan/',
|
109
|
-
'openid.mode' => 'id_res',
|
110
|
-
'openid.ns' => 'http://specs.openid.net/auth/2.0',
|
111
|
-
'openid.ns.pape' => 'http://specs.openid.net/extensions/pape/1.0',
|
112
|
-
'openid.op_endpoint' => 'http://binkley.lan/server',
|
113
|
-
'openid.pape.auth_policies' => 'none',
|
114
|
-
'openid.pape.auth_time' => '2008-01-28T20:42:36Z',
|
115
|
-
'openid.pape.nist_auth_level' => '0',
|
116
|
-
'openid.response_nonce' => '2008-01-28T21:07:04Z99Q=',
|
117
|
-
'openid.return_to' => 'http://binkley.lan:8001/process?janrain_nonce=2008-01-28T21%3A07%3A02Z0tMIKx',
|
118
|
-
'openid.sig' => 'YJlWH4U6SroB1HoPkmEKx9AyGGg=',
|
119
|
-
'openid.signed' => 'assoc_handle,identity,response_nonce,return_to,claimed_id,op_endpoint,pape.auth_time,ns.pape,pape.nist_auth_level,pape.auth_policies'
|
120
|
-
}
|
106
|
+
args = {'openid.assoc_handle' => 'fa1f5ff0-cde4-11dc-a183-3714bfd55ca8',
|
107
|
+
'openid.claimed_id' => 'http://binkley.lan/user/test01',
|
108
|
+
'openid.identity' => 'http://test01.binkley.lan/',
|
109
|
+
'openid.mode' => 'id_res',
|
110
|
+
'openid.ns' => 'http://specs.openid.net/auth/2.0',
|
111
|
+
'openid.ns.pape' => 'http://specs.openid.net/extensions/pape/1.0',
|
112
|
+
'openid.op_endpoint' => 'http://binkley.lan/server',
|
113
|
+
'openid.pape.auth_policies' => 'none',
|
114
|
+
'openid.pape.auth_time' => '2008-01-28T20:42:36Z',
|
115
|
+
'openid.pape.nist_auth_level' => '0',
|
116
|
+
'openid.response_nonce' => '2008-01-28T21:07:04Z99Q=',
|
117
|
+
'openid.return_to' => 'http://binkley.lan:8001/process?janrain_nonce=2008-01-28T21%3A07%3A02Z0tMIKx',
|
118
|
+
'openid.sig' => 'YJlWH4U6SroB1HoPkmEKx9AyGGg=',
|
119
|
+
'openid.signed' => 'assoc_handle,identity,response_nonce,return_to,claimed_id,op_endpoint,pape.auth_time,ns.pape,pape.nist_auth_level,pape.auth_policies'
|
120
|
+
}
|
121
121
|
assert_equal(args['openid.ns'], OPENID2_NS)
|
122
122
|
incoming = Message.from_post_args(args)
|
123
123
|
assert(incoming.is_openid2)
|
@@ -129,7 +129,7 @@ module OpenID
|
|
129
129
|
assert(expected.is_openid2)
|
130
130
|
assert_equal(expected, car)
|
131
131
|
assert_equal(expected_args, car.to_post_args)
|
132
|
-
end
|
132
|
+
end
|
133
133
|
|
134
134
|
def test_no_signed_list
|
135
135
|
msg = Message.new(OPENID2_NS)
|
data/test/test_kvpost.rb
CHANGED
data/test/test_message.rb
CHANGED
@@ -1,9 +1,7 @@
|
|
1
1
|
# last synced with Python openid.test.test_message on 6/29/2007.
|
2
|
-
|
3
2
|
require 'test/unit'
|
4
3
|
require 'util'
|
5
4
|
require 'openid/message'
|
6
|
-
|
7
5
|
require 'rexml/document'
|
8
6
|
|
9
7
|
module OpenID
|
@@ -902,6 +900,7 @@ module OpenID
|
|
902
900
|
'openid.identity' => 'http://bogus.example.invalid:port/',
|
903
901
|
'openid.assoc_handle' => 'FLUB',
|
904
902
|
'openid.return_to' => 'Neverland',
|
903
|
+
'openid.ax.value.fullname' => "Bob&Smith'"
|
905
904
|
}
|
906
905
|
|
907
906
|
@action_url = 'scheme://host:port/path?query'
|
data/test/test_oauth.rb
CHANGED
@@ -1,3 +1,4 @@
|
|
1
|
+
require 'test/unit'
|
1
2
|
require 'openid/extensions/oauth'
|
2
3
|
require 'openid/message'
|
3
4
|
require 'openid/server'
|
@@ -8,7 +9,7 @@ module OpenID
|
|
8
9
|
module OAuthTest
|
9
10
|
class OAuthRequestTestCase < Test::Unit::TestCase
|
10
11
|
def setup
|
11
|
-
@req = OAuth::Request.new
|
12
|
+
@req = OAuth::Request.new
|
12
13
|
end
|
13
14
|
|
14
15
|
def test_construct
|
@@ -137,7 +138,7 @@ module OpenID
|
|
137
138
|
end
|
138
139
|
|
139
140
|
def test_from_success_response
|
140
|
-
|
141
|
+
|
141
142
|
openid_req_msg = Message.from_openid_args({
|
142
143
|
'mode' => 'id_res',
|
143
144
|
'ns' => OPENID2_NS,
|
data/test/test_openid_yadis.rb
CHANGED
data/test/test_pape.rb
CHANGED
@@ -1,3 +1,4 @@
|
|
1
|
+
require 'test/unit'
|
1
2
|
require 'openid/extensions/pape'
|
2
3
|
require 'openid/message'
|
3
4
|
require 'openid/server'
|
@@ -170,11 +171,11 @@ module OpenID
|
|
170
171
|
assert_equal(nil, @req.auth_time)
|
171
172
|
assert_equal([], @req.auth_policies)
|
172
173
|
end
|
173
|
-
|
174
|
+
|
174
175
|
def test_parse_extension_args_strict_bogus1
|
175
176
|
args = {'auth_policies' => 'http://foo http://bar',
|
176
177
|
'auth_time' => 'this one time'}
|
177
|
-
assert_raises(ArgumentError) {
|
178
|
+
assert_raises(ArgumentError) {
|
178
179
|
@req.parse_extension_args(args, true)
|
179
180
|
}
|
180
181
|
end
|
@@ -183,11 +184,11 @@ module OpenID
|
|
183
184
|
args = {'auth_policies' => 'http://foo http://bar',
|
184
185
|
'auth_time' => '1983-11-05T12:30:24Z',
|
185
186
|
'nist_auth_level' => 'some'}
|
186
|
-
assert_raises(ArgumentError) {
|
187
|
+
assert_raises(ArgumentError) {
|
187
188
|
@req.parse_extension_args(args, true)
|
188
189
|
}
|
189
190
|
end
|
190
|
-
|
191
|
+
|
191
192
|
def test_parse_extension_args_strict_good
|
192
193
|
args = {'auth_policies' => 'http://foo http://bar',
|
193
194
|
'auth_time' => '2007-10-11T05:25:18Z',
|
@@ -208,9 +209,9 @@ module OpenID
|
|
208
209
|
assert_equal(nil, @req.nist_auth_level)
|
209
210
|
end
|
210
211
|
|
211
|
-
|
212
|
+
|
212
213
|
def test_from_success_response
|
213
|
-
|
214
|
+
|
214
215
|
openid_req_msg = Message.from_openid_args({
|
215
216
|
'mode' => 'id_res',
|
216
217
|
'ns' => OPENID2_NS,
|
data/test/test_parsehtml.rb
CHANGED
data/test/test_server.rb
CHANGED
@@ -1,3 +1,7 @@
|
|
1
|
+
require 'test/unit'
|
2
|
+
require 'testutil'
|
3
|
+
require 'util'
|
4
|
+
require 'uri'
|
1
5
|
require 'openid/server'
|
2
6
|
require 'openid/cryptutil'
|
3
7
|
require 'openid/association'
|
@@ -6,11 +10,6 @@ require 'openid/message'
|
|
6
10
|
require 'openid/store/memory'
|
7
11
|
require 'openid/dh'
|
8
12
|
require 'openid/consumer/associationmanager'
|
9
|
-
require 'util'
|
10
|
-
require "testutil"
|
11
|
-
|
12
|
-
require 'test/unit'
|
13
|
-
require 'uri'
|
14
13
|
|
15
14
|
# In general, if you edit or add tests here, try to move in the
|
16
15
|
# direction of testing smaller units. For testing the external
|
@@ -208,7 +207,7 @@ module OpenID
|
|
208
207
|
begin
|
209
208
|
result = @decode.call(args)
|
210
209
|
rescue ArgumentError => err
|
211
|
-
assert
|
210
|
+
assert !err.to_s.index('values').nil?
|
212
211
|
else
|
213
212
|
flunk("Expected ArgumentError, but got result #{result}")
|
214
213
|
end
|
@@ -1008,7 +1007,7 @@ module OpenID
|
|
1008
1007
|
assert(webresponse.headers.has_key?('location'))
|
1009
1008
|
location = webresponse.headers['location']
|
1010
1009
|
query = Util.parse_query(URI::parse(location).query)
|
1011
|
-
assert
|
1010
|
+
assert !query.has_key?('openid.sig')
|
1012
1011
|
end
|
1013
1012
|
|
1014
1013
|
def test_assocReply
|
@@ -1530,7 +1529,7 @@ module OpenID
|
|
1530
1529
|
{'blue' => 'star',
|
1531
1530
|
'mode' => 'id_res',
|
1532
1531
|
})
|
1533
|
-
|
1532
|
+
|
1534
1533
|
assert_equal(@response.fields.get_args(namespace),
|
1535
1534
|
{'bright' => 'potato'})
|
1536
1535
|
end
|
@@ -1613,7 +1612,7 @@ module OpenID
|
|
1613
1612
|
r = @request.answer(@signatory)
|
1614
1613
|
assert_equal({'is_valid' => 'false'},
|
1615
1614
|
r.fields.get_args(OPENID_NS))
|
1616
|
-
|
1615
|
+
|
1617
1616
|
end
|
1618
1617
|
|
1619
1618
|
def test_replay
|
@@ -1750,7 +1749,7 @@ module OpenID
|
|
1750
1749
|
invalid_s1,
|
1751
1750
|
invalid_s1_2,
|
1752
1751
|
]
|
1753
|
-
|
1752
|
+
|
1754
1753
|
bad_request_argss.each { |request_args|
|
1755
1754
|
message = Message.from_post_args(request_args)
|
1756
1755
|
assert_raise(Server::ProtocolError) {
|
@@ -2299,8 +2298,7 @@ module OpenID
|
|
2299
2298
|
verified = @signatory.verify(assoc_handle, signed)
|
2300
2299
|
}
|
2301
2300
|
|
2302
|
-
assert
|
2303
|
-
#assert(@messages)
|
2301
|
+
assert !verified
|
2304
2302
|
end
|
2305
2303
|
|
2306
2304
|
def test_verifyAssocMismatch
|
@@ -2322,16 +2320,14 @@ module OpenID
|
|
2322
2320
|
verified = @signatory.verify(assoc_handle, signed)
|
2323
2321
|
}
|
2324
2322
|
|
2325
|
-
assert
|
2326
|
-
#assert(@messages)
|
2323
|
+
assert !verified
|
2327
2324
|
end
|
2328
2325
|
|
2329
2326
|
def test_getAssoc
|
2330
2327
|
assoc_handle = makeAssoc(true)
|
2331
2328
|
assoc = @signatory.get_association(assoc_handle, true)
|
2332
|
-
assert
|
2333
|
-
assert_equal
|
2334
|
-
# @failIf(@messages, @messages)
|
2329
|
+
assert assoc
|
2330
|
+
assert_equal assoc.handle, assoc_handle
|
2335
2331
|
end
|
2336
2332
|
|
2337
2333
|
def test_getAssocExpired
|
@@ -2340,8 +2336,7 @@ module OpenID
|
|
2340
2336
|
silence_logging {
|
2341
2337
|
assoc = @signatory.get_association(assoc_handle, true)
|
2342
2338
|
}
|
2343
|
-
assert
|
2344
|
-
# assert(@messages)
|
2339
|
+
assert !assoc
|
2345
2340
|
end
|
2346
2341
|
|
2347
2342
|
def test_getAssocInvalid
|
@@ -2428,7 +2423,7 @@ module OpenID
|
|
2428
2423
|
'openid.assoc_type' => 'HMAC-SHA1'}
|
2429
2424
|
areq = @server.decode_request(assoc_args)
|
2430
2425
|
aresp = @server.handle_request(areq)
|
2431
|
-
|
2426
|
+
|
2432
2427
|
amess = aresp.fields
|
2433
2428
|
assert(amess.is_openid1)
|
2434
2429
|
ahandle = amess.get_arg(OPENID_NS, 'assoc_handle')
|
@@ -2441,7 +2436,7 @@ module OpenID
|
|
2441
2436
|
'openid.return_to' => 'http://example.com/openid/consumer',
|
2442
2437
|
'openid.assoc_handle' => ahandle,
|
2443
2438
|
'openid.identity' => 'http://foo.com/'}
|
2444
|
-
|
2439
|
+
|
2445
2440
|
cireq = @server.decode_request(checkid_args)
|
2446
2441
|
ciresp = cireq.answer(true)
|
2447
2442
|
|
@@ -2449,7 +2444,7 @@ module OpenID
|
|
2449
2444
|
|
2450
2445
|
assert_equal(assoc.get_message_signature(signed_resp.fields),
|
2451
2446
|
signed_resp.fields.get_arg(OPENID_NS, 'sig'))
|
2452
|
-
|
2447
|
+
|
2453
2448
|
assert(assoc.check_message_signature(signed_resp.fields))
|
2454
2449
|
end
|
2455
2450
|
|