ruby-openid 2.1.8 → 2.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of ruby-openid might be problematic. Click here for more details.

Files changed (54) hide show
  1. data/CHANGELOG.md +13 -0
  2. data/INSTALL.md +47 -0
  3. data/README.md +82 -0
  4. data/{UPGRADE → UPGRADE.md} +54 -55
  5. data/examples/active_record_openid_store/README +4 -2
  6. data/examples/active_record_openid_store/XXX_add_open_id_store_to_db.rb +1 -1
  7. data/examples/active_record_openid_store/lib/openid_ar_store.rb +1 -1
  8. data/examples/rails_openid/app/controllers/server_controller.rb +0 -6
  9. data/lib/openid.rb +2 -2
  10. data/lib/openid/consumer/responses.rb +2 -0
  11. data/lib/openid/dh.rb +1 -1
  12. data/lib/openid/extensions/ax.rb +44 -22
  13. data/lib/openid/extensions/ui.rb +53 -0
  14. data/lib/openid/message.rb +1 -1
  15. data/lib/openid/store/filesystem.rb +8 -9
  16. data/lib/openid/store/memcache.rb +10 -2
  17. data/lib/openid/trustroot.rb +1 -0
  18. data/lib/openid/util.rb +6 -0
  19. data/lib/openid/version.rb +3 -0
  20. data/test/data/trustroot.txt +2 -2
  21. data/test/test_accept.rb +1 -1
  22. data/test/test_associationmanager.rb +1 -1
  23. data/test/test_ax.rb +89 -19
  24. data/test/test_checkid_request.rb +1 -1
  25. data/test/test_consumer.rb +5 -2
  26. data/test/test_cryptutil.rb +1 -1
  27. data/test/test_dh.rb +1 -1
  28. data/test/test_discover.rb +2 -4
  29. data/test/test_discovery_manager.rb +1 -3
  30. data/test/test_extension.rb +2 -2
  31. data/test/test_fetchers.rb +3 -7
  32. data/test/test_filters.rb +25 -31
  33. data/test/test_idres.rb +17 -17
  34. data/test/test_kvpost.rb +2 -2
  35. data/test/test_message.rb +1 -2
  36. data/test/test_oauth.rb +3 -2
  37. data/test/test_openid_yadis.rb +0 -1
  38. data/test/test_pape.rb +7 -6
  39. data/test/test_parsehtml.rb +2 -2
  40. data/test/test_server.rb +17 -22
  41. data/test/test_sreg.rb +8 -8
  42. data/test/test_stores.rb +1 -2
  43. data/test/test_trustroot.rb +14 -15
  44. data/test/test_ui.rb +93 -0
  45. data/test/test_urinorm.rb +2 -3
  46. data/test/test_util.rb +2 -3
  47. data/test/test_xrds.rb +13 -15
  48. data/test/test_xrires.rb +27 -14
  49. data/test/test_yadis_discovery.rb +1 -3
  50. metadata +260 -189
  51. data/CHANGELOG +0 -215
  52. data/INSTALL +0 -47
  53. data/README +0 -81
  54. data/admin/runtests.rb +0 -45
@@ -1,6 +1,6 @@
1
- require "openid/consumer"
2
1
  require "test/unit"
3
2
  require "testutil"
3
+ require "openid/consumer"
4
4
 
5
5
  module OpenID
6
6
  class Consumer
@@ -182,9 +182,11 @@ module OpenID
182
182
  end
183
183
 
184
184
  def test_setup_needed_openid2
185
- args = {'openid.ns' => OPENID2_NS, 'openid.mode' => 'setup_needed'}
185
+ setup_url = 'http://setup.url/'
186
+ args = {'openid.ns' => OPENID2_NS, 'openid.mode' => 'setup_needed', 'openid.user_setup_url' => setup_url}
186
187
  response = @consumer.complete(args, nil)
187
188
  assert_equal(SETUP_NEEDED, response.status)
189
+ assert_equal(setup_url, response.setup_url)
188
190
  end
189
191
 
190
192
  def test_idres_setup_needed_openid1
@@ -195,6 +197,7 @@ module OpenID
195
197
  }
196
198
  response = @consumer.complete(args, nil)
197
199
  assert_equal(SETUP_NEEDED, response.status)
200
+ assert_equal(setup_url, response.setup_url)
198
201
  end
199
202
 
200
203
  def test_error
@@ -1,5 +1,5 @@
1
1
  # coding: ASCII-8BIT
2
- require 'test/unit'
2
+ require "test/unit"
3
3
  require "openid/cryptutil"
4
4
  require "pathname"
5
5
 
@@ -1,6 +1,6 @@
1
1
  require 'test/unit'
2
- require 'openid/dh'
3
2
  require 'testutil'
3
+ require 'openid/dh'
4
4
 
5
5
  module OpenID
6
6
  class DiffieHellmanExposed < OpenID::DiffieHellman
@@ -1,8 +1,6 @@
1
-
1
+ require 'test/unit'
2
2
  require 'testutil'
3
3
  require 'util'
4
-
5
- require 'test/unit'
6
4
  require 'openid/fetchers'
7
5
  require 'openid/yadis/discovery'
8
6
  require 'openid/consumer/discovery'
@@ -48,7 +46,7 @@ module OpenID
48
46
  @responses.each { |response_set|
49
47
  @url = response_set[0].final_url
50
48
  OpenID.fetcher = SimpleMockFetcher.new(self, response_set)
51
-
49
+
52
50
  expected_status = response_set[-1].code
53
51
  begin
54
52
  OpenID.discover(@url)
@@ -1,8 +1,6 @@
1
-
2
1
  require 'test/unit'
3
2
  require 'openid/consumer/discovery_manager'
4
3
  require 'openid/extras'
5
-
6
4
  require 'testutil'
7
5
 
8
6
  module OpenID
@@ -41,7 +39,7 @@ module OpenID
41
39
  @disco_services.next
42
40
  assert(@disco_services.started?)
43
41
  @disco_services.next
44
- assert(@disco_services.started?)
42
+ assert(@disco_services.started?)
45
43
  @disco_services.next
46
44
  assert(!@disco_services.started?)
47
45
  end
@@ -1,6 +1,6 @@
1
+ require 'test/unit'
1
2
  require 'openid/extension'
2
3
  require 'openid/message'
3
- require 'test/unit'
4
4
 
5
5
  module OpenID
6
6
  class DummyExtension < OpenID::Extension
@@ -29,7 +29,7 @@ module OpenID
29
29
  assert_equal(DummyExtension::TEST_ALIAS,
30
30
  namespaces.get_alias(DummyExtension::TEST_URI))
31
31
  end
32
-
32
+
33
33
  def test_OpenID2
34
34
  oid2_msg = Message.new(OPENID2_NS)
35
35
  ext = DummyExtension.new
@@ -1,14 +1,10 @@
1
- # -*- coding: utf-8 -*-
2
-
1
+ # encoding: utf-8
3
2
  require 'test/unit'
4
3
  require 'net/http'
5
4
  require 'webrick'
6
-
7
5
  require 'testutil'
8
6
  require 'util'
9
-
10
7
  require 'openid/fetchers'
11
-
12
8
  require 'stringio'
13
9
 
14
10
  begin
@@ -412,7 +408,7 @@ EOF
412
408
  f.fetch("https://bogus.com/")
413
409
  }
414
410
  end
415
-
411
+
416
412
  class TestingException < OpenID::FetchingError; end
417
413
 
418
414
  class NoSSLSupportConnection
@@ -543,7 +539,7 @@ class ProxyTest < Test::Unit::TestCase
543
539
  def test_proxy_env
544
540
  ENV['http_proxy'] = 'http://127.0.0.1:3128/'
545
541
  OpenID.fetcher_use_env_http_proxy
546
-
542
+
547
543
  # make_http just to give us something with readable attributes to inspect.
548
544
  conn = OpenID.fetcher.make_http(URI.parse('http://127.0.0.2'))
549
545
  assert_equal('127.0.0.1', conn.proxy_address)
@@ -1,6 +1,8 @@
1
-
2
- require 'test/unit'
3
- require 'openid/yadis/filters'
1
+ require "test/unit"
2
+ require "testutil"
3
+ require "rexml/document"
4
+ require "openid/yadis/xrds"
5
+ require "openid/yadis/filters"
4
6
 
5
7
  module OpenID
6
8
  class BasicServiceEndpointTest < Test::Unit::TestCase
@@ -12,8 +14,7 @@ module OpenID
12
14
 
13
15
  no_types_endpoint = Yadis::BasicServiceEndpoint.new(yadis_url, [], nil, nil)
14
16
 
15
- some_types_endpoint = Yadis::BasicServiceEndpoint.new(yadis_url, types,
16
- nil, nil)
17
+ some_types_endpoint = Yadis::BasicServiceEndpoint.new(yadis_url, types, nil, nil)
17
18
 
18
19
  assert(no_types_endpoint.match_types([]) == [])
19
20
  assert(no_types_endpoint.match_types(["urn:absent"]) == [])
@@ -158,15 +159,14 @@ module OpenID
158
159
  ]
159
160
 
160
161
  cf = Yadis::CompoundFilter.new(subfilters)
161
- assert(cf.get_service_endpoints("unused", "unused") == all)
162
+ assert cf.get_service_endpoints("unused", "unused") == all
162
163
  end
163
164
  end
164
165
 
165
166
  class MakeFilterTest < Test::Unit::TestCase
166
167
  def test_parts_nil
167
168
  result = Yadis.make_filter(nil)
168
- assert(result.is_a?(Yadis::TransformFilterMaker),
169
- result)
169
+ assert result.is_a?(Yadis::TransformFilterMaker)
170
170
  end
171
171
 
172
172
  def test_parts_array
@@ -174,53 +174,49 @@ module OpenID
174
174
  e2 = Yadis::BasicServiceEndpoint.new(nil, [], nil, nil)
175
175
 
176
176
  result = Yadis.make_filter([e1, e2])
177
- assert(result.is_a?(Yadis::TransformFilterMaker),
178
- result)
179
- assert(result.filter_procs[0] == e1.method('from_basic_service_endpoint'))
180
- assert(result.filter_procs[1] == e2.method('from_basic_service_endpoint'))
177
+ assert result.is_a?(Yadis::TransformFilterMaker)
178
+ assert result.filter_procs[0] == e1.method('from_basic_service_endpoint')
179
+ assert result.filter_procs[1] == e2.method('from_basic_service_endpoint')
181
180
  end
182
181
 
183
182
  def test_parts_single
184
183
  e = Yadis::BasicServiceEndpoint.new(nil, [], nil, nil)
185
184
  result = Yadis.make_filter(e)
186
- assert(result.is_a?(Yadis::TransformFilterMaker),
187
- result)
185
+ assert result.is_a?(Yadis::TransformFilterMaker)
188
186
  end
189
187
  end
190
188
 
191
189
  class MakeCompoundFilterTest < Test::Unit::TestCase
192
190
  def test_no_filters
193
191
  result = Yadis.mk_compound_filter([])
194
- assert(result.subfilters == [])
192
+ assert result.subfilters == []
195
193
  end
196
194
 
197
195
  def test_single_transform_filter
198
196
  f = Yadis::TransformFilterMaker.new([])
199
- assert(Yadis.mk_compound_filter([f]) == f)
197
+ assert_equal f, Yadis.mk_compound_filter([f])
200
198
  end
201
199
 
202
200
  def test_single_endpoint
203
201
  e = Yadis::BasicServiceEndpoint.new(nil, [], nil, nil)
204
202
  result = Yadis.mk_compound_filter([e])
205
- assert(result.is_a?(Yadis::TransformFilterMaker))
203
+ assert result.is_a?(Yadis::TransformFilterMaker)
206
204
 
207
205
  # Expect the transform filter to call
208
206
  # from_basic_service_endpoint on the endpoint
209
207
  filter = result.filter_procs[0]
210
- assert(filter == e.method('from_basic_service_endpoint'),
211
- filter)
208
+ assert_equal filter, e.method('from_basic_service_endpoint')
212
209
  end
213
210
 
214
211
  def test_single_proc
215
212
  # Create a proc that just returns nil for any endpoint
216
213
  p = Proc.new { |endpoint| nil }
217
214
  result = Yadis.mk_compound_filter([p])
218
- assert(result.is_a?(Yadis::TransformFilterMaker))
215
+ assert result.is_a?(Yadis::TransformFilterMaker)
219
216
 
220
217
  # Expect the transform filter to call
221
218
  # from_basic_service_endpoint on the endpoint
222
- filter = result.filter_procs[0]
223
- assert(filter == p)
219
+ assert_equal result.filter_procs[0], p
224
220
  end
225
221
 
226
222
  def test_multiple_filters_same_type
@@ -231,8 +227,8 @@ module OpenID
231
227
  # from f1 and f2.
232
228
  result = Yadis.mk_compound_filter([f1, f2])
233
229
 
234
- assert(result.is_a?(Yadis::CompoundFilter))
235
- assert(result.subfilters == [f1, f2])
230
+ assert result.is_a?(Yadis::CompoundFilter)
231
+ assert result.subfilters == [f1, f2]
236
232
  end
237
233
 
238
234
  def test_multiple_filters_different_type
@@ -247,14 +243,12 @@ module OpenID
247
243
  # from f1 and f2.
248
244
  result = Yadis.mk_compound_filter([f1, f2, f3, f4])
249
245
 
250
- assert(result.is_a?(Yadis::CompoundFilter))
246
+ assert result.is_a?(Yadis::CompoundFilter)
251
247
 
252
- assert(result.subfilters[0] == f1)
253
- assert(result.subfilters[1].filter_procs[0] ==
254
- e.method('from_basic_service_endpoint'))
255
- assert(result.subfilters[2].filter_procs[0] ==
256
- f2.method('from_basic_service_endpoint'))
257
- assert(result.subfilters[2].filter_procs[1] == f3)
248
+ assert result.subfilters[0] == f1
249
+ assert result.subfilters[1].filter_procs[0] == e.method('from_basic_service_endpoint')
250
+ assert result.subfilters[2].filter_procs[0] == f2.method('from_basic_service_endpoint')
251
+ assert result.subfilters[2].filter_procs[1] == f3
258
252
  end
259
253
 
260
254
  def test_filter_type_error
@@ -1,6 +1,6 @@
1
+ require "test/unit"
1
2
  require "testutil"
2
3
  require "util"
3
- require "test/unit"
4
4
  require "openid/consumer/idres"
5
5
  require "openid/protocolerror"
6
6
  require "openid/store/memory"
@@ -103,21 +103,21 @@ module OpenID
103
103
  end
104
104
 
105
105
  def test_112
106
- args = {'openid.assoc_handle' => 'fa1f5ff0-cde4-11dc-a183-3714bfd55ca8',
107
- 'openid.claimed_id' => 'http://binkley.lan/user/test01',
108
- 'openid.identity' => 'http://test01.binkley.lan/',
109
- 'openid.mode' => 'id_res',
110
- 'openid.ns' => 'http://specs.openid.net/auth/2.0',
111
- 'openid.ns.pape' => 'http://specs.openid.net/extensions/pape/1.0',
112
- 'openid.op_endpoint' => 'http://binkley.lan/server',
113
- 'openid.pape.auth_policies' => 'none',
114
- 'openid.pape.auth_time' => '2008-01-28T20:42:36Z',
115
- 'openid.pape.nist_auth_level' => '0',
116
- 'openid.response_nonce' => '2008-01-28T21:07:04Z99Q=',
117
- 'openid.return_to' => 'http://binkley.lan:8001/process?janrain_nonce=2008-01-28T21%3A07%3A02Z0tMIKx',
118
- 'openid.sig' => 'YJlWH4U6SroB1HoPkmEKx9AyGGg=',
119
- 'openid.signed' => 'assoc_handle,identity,response_nonce,return_to,claimed_id,op_endpoint,pape.auth_time,ns.pape,pape.nist_auth_level,pape.auth_policies'
120
- }
106
+ args = {'openid.assoc_handle' => 'fa1f5ff0-cde4-11dc-a183-3714bfd55ca8',
107
+ 'openid.claimed_id' => 'http://binkley.lan/user/test01',
108
+ 'openid.identity' => 'http://test01.binkley.lan/',
109
+ 'openid.mode' => 'id_res',
110
+ 'openid.ns' => 'http://specs.openid.net/auth/2.0',
111
+ 'openid.ns.pape' => 'http://specs.openid.net/extensions/pape/1.0',
112
+ 'openid.op_endpoint' => 'http://binkley.lan/server',
113
+ 'openid.pape.auth_policies' => 'none',
114
+ 'openid.pape.auth_time' => '2008-01-28T20:42:36Z',
115
+ 'openid.pape.nist_auth_level' => '0',
116
+ 'openid.response_nonce' => '2008-01-28T21:07:04Z99Q=',
117
+ 'openid.return_to' => 'http://binkley.lan:8001/process?janrain_nonce=2008-01-28T21%3A07%3A02Z0tMIKx',
118
+ 'openid.sig' => 'YJlWH4U6SroB1HoPkmEKx9AyGGg=',
119
+ 'openid.signed' => 'assoc_handle,identity,response_nonce,return_to,claimed_id,op_endpoint,pape.auth_time,ns.pape,pape.nist_auth_level,pape.auth_policies'
120
+ }
121
121
  assert_equal(args['openid.ns'], OPENID2_NS)
122
122
  incoming = Message.from_post_args(args)
123
123
  assert(incoming.is_openid2)
@@ -129,7 +129,7 @@ module OpenID
129
129
  assert(expected.is_openid2)
130
130
  assert_equal(expected, car)
131
131
  assert_equal(expected_args, car.to_post_args)
132
- end
132
+ end
133
133
 
134
134
  def test_no_signed_list
135
135
  msg = Message.new(OPENID2_NS)
@@ -1,8 +1,8 @@
1
+ require "test/unit"
2
+ require "testutil"
1
3
  require "openid/kvpost"
2
4
  require "openid/kvform"
3
5
  require "openid/message"
4
- require "test/unit"
5
- require 'testutil'
6
6
 
7
7
  module OpenID
8
8
  class KVPostTestCase < Test::Unit::TestCase
@@ -1,9 +1,7 @@
1
1
  # last synced with Python openid.test.test_message on 6/29/2007.
2
-
3
2
  require 'test/unit'
4
3
  require 'util'
5
4
  require 'openid/message'
6
-
7
5
  require 'rexml/document'
8
6
 
9
7
  module OpenID
@@ -902,6 +900,7 @@ module OpenID
902
900
  'openid.identity' => 'http://bogus.example.invalid:port/',
903
901
  'openid.assoc_handle' => 'FLUB',
904
902
  'openid.return_to' => 'Neverland',
903
+ 'openid.ax.value.fullname' => "Bob&Smith'"
905
904
  }
906
905
 
907
906
  @action_url = 'scheme://host:port/path?query'
@@ -1,3 +1,4 @@
1
+ require 'test/unit'
1
2
  require 'openid/extensions/oauth'
2
3
  require 'openid/message'
3
4
  require 'openid/server'
@@ -8,7 +9,7 @@ module OpenID
8
9
  module OAuthTest
9
10
  class OAuthRequestTestCase < Test::Unit::TestCase
10
11
  def setup
11
- @req = OAuth::Request.new
12
+ @req = OAuth::Request.new
12
13
  end
13
14
 
14
15
  def test_construct
@@ -137,7 +138,7 @@ module OpenID
137
138
  end
138
139
 
139
140
  def test_from_success_response
140
-
141
+
141
142
  openid_req_msg = Message.from_openid_args({
142
143
  'mode' => 'id_res',
143
144
  'ns' => OPENID2_NS,
@@ -1,4 +1,3 @@
1
-
2
1
  require 'test/unit'
3
2
  require 'openid/consumer/discovery'
4
3
  require 'openid/yadis/services'
@@ -1,3 +1,4 @@
1
+ require 'test/unit'
1
2
  require 'openid/extensions/pape'
2
3
  require 'openid/message'
3
4
  require 'openid/server'
@@ -170,11 +171,11 @@ module OpenID
170
171
  assert_equal(nil, @req.auth_time)
171
172
  assert_equal([], @req.auth_policies)
172
173
  end
173
-
174
+
174
175
  def test_parse_extension_args_strict_bogus1
175
176
  args = {'auth_policies' => 'http://foo http://bar',
176
177
  'auth_time' => 'this one time'}
177
- assert_raises(ArgumentError) {
178
+ assert_raises(ArgumentError) {
178
179
  @req.parse_extension_args(args, true)
179
180
  }
180
181
  end
@@ -183,11 +184,11 @@ module OpenID
183
184
  args = {'auth_policies' => 'http://foo http://bar',
184
185
  'auth_time' => '1983-11-05T12:30:24Z',
185
186
  'nist_auth_level' => 'some'}
186
- assert_raises(ArgumentError) {
187
+ assert_raises(ArgumentError) {
187
188
  @req.parse_extension_args(args, true)
188
189
  }
189
190
  end
190
-
191
+
191
192
  def test_parse_extension_args_strict_good
192
193
  args = {'auth_policies' => 'http://foo http://bar',
193
194
  'auth_time' => '2007-10-11T05:25:18Z',
@@ -208,9 +209,9 @@ module OpenID
208
209
  assert_equal(nil, @req.nist_auth_level)
209
210
  end
210
211
 
211
-
212
+
212
213
  def test_from_success_response
213
-
214
+
214
215
  openid_req_msg = Message.from_openid_args({
215
216
  'mode' => 'id_res',
216
217
  'ns' => OPENID2_NS,
@@ -1,6 +1,6 @@
1
- require 'test/unit'
2
- require "openid/yadis/parsehtml"
1
+ require "test/unit"
3
2
  require "testutil"
3
+ require "openid/yadis/parsehtml"
4
4
 
5
5
  module OpenID
6
6
  class ParseHTMLTestCase < Test::Unit::TestCase
@@ -1,3 +1,7 @@
1
+ require 'test/unit'
2
+ require 'testutil'
3
+ require 'util'
4
+ require 'uri'
1
5
  require 'openid/server'
2
6
  require 'openid/cryptutil'
3
7
  require 'openid/association'
@@ -6,11 +10,6 @@ require 'openid/message'
6
10
  require 'openid/store/memory'
7
11
  require 'openid/dh'
8
12
  require 'openid/consumer/associationmanager'
9
- require 'util'
10
- require "testutil"
11
-
12
- require 'test/unit'
13
- require 'uri'
14
13
 
15
14
  # In general, if you edit or add tests here, try to move in the
16
15
  # direction of testing smaller units. For testing the external
@@ -208,7 +207,7 @@ module OpenID
208
207
  begin
209
208
  result = @decode.call(args)
210
209
  rescue ArgumentError => err
211
- assert(!err.to_s.index('values').nil?, err)
210
+ assert !err.to_s.index('values').nil?
212
211
  else
213
212
  flunk("Expected ArgumentError, but got result #{result}")
214
213
  end
@@ -1008,7 +1007,7 @@ module OpenID
1008
1007
  assert(webresponse.headers.has_key?('location'))
1009
1008
  location = webresponse.headers['location']
1010
1009
  query = Util.parse_query(URI::parse(location).query)
1011
- assert(!query.has_key?('openid.sig'), response.fields.to_post_args())
1010
+ assert !query.has_key?('openid.sig')
1012
1011
  end
1013
1012
 
1014
1013
  def test_assocReply
@@ -1530,7 +1529,7 @@ module OpenID
1530
1529
  {'blue' => 'star',
1531
1530
  'mode' => 'id_res',
1532
1531
  })
1533
-
1532
+
1534
1533
  assert_equal(@response.fields.get_args(namespace),
1535
1534
  {'bright' => 'potato'})
1536
1535
  end
@@ -1613,7 +1612,7 @@ module OpenID
1613
1612
  r = @request.answer(@signatory)
1614
1613
  assert_equal({'is_valid' => 'false'},
1615
1614
  r.fields.get_args(OPENID_NS))
1616
-
1615
+
1617
1616
  end
1618
1617
 
1619
1618
  def test_replay
@@ -1750,7 +1749,7 @@ module OpenID
1750
1749
  invalid_s1,
1751
1750
  invalid_s1_2,
1752
1751
  ]
1753
-
1752
+
1754
1753
  bad_request_argss.each { |request_args|
1755
1754
  message = Message.from_post_args(request_args)
1756
1755
  assert_raise(Server::ProtocolError) {
@@ -2299,8 +2298,7 @@ module OpenID
2299
2298
  verified = @signatory.verify(assoc_handle, signed)
2300
2299
  }
2301
2300
 
2302
- assert(!verified)
2303
- #assert(@messages)
2301
+ assert !verified
2304
2302
  end
2305
2303
 
2306
2304
  def test_verifyAssocMismatch
@@ -2322,16 +2320,14 @@ module OpenID
2322
2320
  verified = @signatory.verify(assoc_handle, signed)
2323
2321
  }
2324
2322
 
2325
- assert(!verified)
2326
- #assert(@messages)
2323
+ assert !verified
2327
2324
  end
2328
2325
 
2329
2326
  def test_getAssoc
2330
2327
  assoc_handle = makeAssoc(true)
2331
2328
  assoc = @signatory.get_association(assoc_handle, true)
2332
- assert(assoc)
2333
- assert_equal(assoc.handle, assoc_handle)
2334
- # @failIf(@messages, @messages)
2329
+ assert assoc
2330
+ assert_equal assoc.handle, assoc_handle
2335
2331
  end
2336
2332
 
2337
2333
  def test_getAssocExpired
@@ -2340,8 +2336,7 @@ module OpenID
2340
2336
  silence_logging {
2341
2337
  assoc = @signatory.get_association(assoc_handle, true)
2342
2338
  }
2343
- assert(!assoc, assoc)
2344
- # assert(@messages)
2339
+ assert !assoc
2345
2340
  end
2346
2341
 
2347
2342
  def test_getAssocInvalid
@@ -2428,7 +2423,7 @@ module OpenID
2428
2423
  'openid.assoc_type' => 'HMAC-SHA1'}
2429
2424
  areq = @server.decode_request(assoc_args)
2430
2425
  aresp = @server.handle_request(areq)
2431
-
2426
+
2432
2427
  amess = aresp.fields
2433
2428
  assert(amess.is_openid1)
2434
2429
  ahandle = amess.get_arg(OPENID_NS, 'assoc_handle')
@@ -2441,7 +2436,7 @@ module OpenID
2441
2436
  'openid.return_to' => 'http://example.com/openid/consumer',
2442
2437
  'openid.assoc_handle' => ahandle,
2443
2438
  'openid.identity' => 'http://foo.com/'}
2444
-
2439
+
2445
2440
  cireq = @server.decode_request(checkid_args)
2446
2441
  ciresp = cireq.answer(true)
2447
2442
 
@@ -2449,7 +2444,7 @@ module OpenID
2449
2444
 
2450
2445
  assert_equal(assoc.get_message_signature(signed_resp.fields),
2451
2446
  signed_resp.fields.get_arg(OPENID_NS, 'sig'))
2452
-
2447
+
2453
2448
  assert(assoc.check_message_signature(signed_resp.fields))
2454
2449
  end
2455
2450