ruby-openid 2.1.8 → 2.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of ruby-openid might be problematic. Click here for more details.
- data/CHANGELOG.md +13 -0
- data/INSTALL.md +47 -0
- data/README.md +82 -0
- data/{UPGRADE → UPGRADE.md} +54 -55
- data/examples/active_record_openid_store/README +4 -2
- data/examples/active_record_openid_store/XXX_add_open_id_store_to_db.rb +1 -1
- data/examples/active_record_openid_store/lib/openid_ar_store.rb +1 -1
- data/examples/rails_openid/app/controllers/server_controller.rb +0 -6
- data/lib/openid.rb +2 -2
- data/lib/openid/consumer/responses.rb +2 -0
- data/lib/openid/dh.rb +1 -1
- data/lib/openid/extensions/ax.rb +44 -22
- data/lib/openid/extensions/ui.rb +53 -0
- data/lib/openid/message.rb +1 -1
- data/lib/openid/store/filesystem.rb +8 -9
- data/lib/openid/store/memcache.rb +10 -2
- data/lib/openid/trustroot.rb +1 -0
- data/lib/openid/util.rb +6 -0
- data/lib/openid/version.rb +3 -0
- data/test/data/trustroot.txt +2 -2
- data/test/test_accept.rb +1 -1
- data/test/test_associationmanager.rb +1 -1
- data/test/test_ax.rb +89 -19
- data/test/test_checkid_request.rb +1 -1
- data/test/test_consumer.rb +5 -2
- data/test/test_cryptutil.rb +1 -1
- data/test/test_dh.rb +1 -1
- data/test/test_discover.rb +2 -4
- data/test/test_discovery_manager.rb +1 -3
- data/test/test_extension.rb +2 -2
- data/test/test_fetchers.rb +3 -7
- data/test/test_filters.rb +25 -31
- data/test/test_idres.rb +17 -17
- data/test/test_kvpost.rb +2 -2
- data/test/test_message.rb +1 -2
- data/test/test_oauth.rb +3 -2
- data/test/test_openid_yadis.rb +0 -1
- data/test/test_pape.rb +7 -6
- data/test/test_parsehtml.rb +2 -2
- data/test/test_server.rb +17 -22
- data/test/test_sreg.rb +8 -8
- data/test/test_stores.rb +1 -2
- data/test/test_trustroot.rb +14 -15
- data/test/test_ui.rb +93 -0
- data/test/test_urinorm.rb +2 -3
- data/test/test_util.rb +2 -3
- data/test/test_xrds.rb +13 -15
- data/test/test_xrires.rb +27 -14
- data/test/test_yadis_discovery.rb +1 -3
- metadata +260 -189
- data/CHANGELOG +0 -215
- data/INSTALL +0 -47
- data/README +0 -81
- data/admin/runtests.rb +0 -45
data/test/test_consumer.rb
CHANGED
@@ -1,6 +1,6 @@
|
|
1
|
-
require "openid/consumer"
|
2
1
|
require "test/unit"
|
3
2
|
require "testutil"
|
3
|
+
require "openid/consumer"
|
4
4
|
|
5
5
|
module OpenID
|
6
6
|
class Consumer
|
@@ -182,9 +182,11 @@ module OpenID
|
|
182
182
|
end
|
183
183
|
|
184
184
|
def test_setup_needed_openid2
|
185
|
-
|
185
|
+
setup_url = 'http://setup.url/'
|
186
|
+
args = {'openid.ns' => OPENID2_NS, 'openid.mode' => 'setup_needed', 'openid.user_setup_url' => setup_url}
|
186
187
|
response = @consumer.complete(args, nil)
|
187
188
|
assert_equal(SETUP_NEEDED, response.status)
|
189
|
+
assert_equal(setup_url, response.setup_url)
|
188
190
|
end
|
189
191
|
|
190
192
|
def test_idres_setup_needed_openid1
|
@@ -195,6 +197,7 @@ module OpenID
|
|
195
197
|
}
|
196
198
|
response = @consumer.complete(args, nil)
|
197
199
|
assert_equal(SETUP_NEEDED, response.status)
|
200
|
+
assert_equal(setup_url, response.setup_url)
|
198
201
|
end
|
199
202
|
|
200
203
|
def test_error
|
data/test/test_cryptutil.rb
CHANGED
data/test/test_dh.rb
CHANGED
data/test/test_discover.rb
CHANGED
@@ -1,8 +1,6 @@
|
|
1
|
-
|
1
|
+
require 'test/unit'
|
2
2
|
require 'testutil'
|
3
3
|
require 'util'
|
4
|
-
|
5
|
-
require 'test/unit'
|
6
4
|
require 'openid/fetchers'
|
7
5
|
require 'openid/yadis/discovery'
|
8
6
|
require 'openid/consumer/discovery'
|
@@ -48,7 +46,7 @@ module OpenID
|
|
48
46
|
@responses.each { |response_set|
|
49
47
|
@url = response_set[0].final_url
|
50
48
|
OpenID.fetcher = SimpleMockFetcher.new(self, response_set)
|
51
|
-
|
49
|
+
|
52
50
|
expected_status = response_set[-1].code
|
53
51
|
begin
|
54
52
|
OpenID.discover(@url)
|
@@ -1,8 +1,6 @@
|
|
1
|
-
|
2
1
|
require 'test/unit'
|
3
2
|
require 'openid/consumer/discovery_manager'
|
4
3
|
require 'openid/extras'
|
5
|
-
|
6
4
|
require 'testutil'
|
7
5
|
|
8
6
|
module OpenID
|
@@ -41,7 +39,7 @@ module OpenID
|
|
41
39
|
@disco_services.next
|
42
40
|
assert(@disco_services.started?)
|
43
41
|
@disco_services.next
|
44
|
-
assert(@disco_services.started?)
|
42
|
+
assert(@disco_services.started?)
|
45
43
|
@disco_services.next
|
46
44
|
assert(!@disco_services.started?)
|
47
45
|
end
|
data/test/test_extension.rb
CHANGED
@@ -1,6 +1,6 @@
|
|
1
|
+
require 'test/unit'
|
1
2
|
require 'openid/extension'
|
2
3
|
require 'openid/message'
|
3
|
-
require 'test/unit'
|
4
4
|
|
5
5
|
module OpenID
|
6
6
|
class DummyExtension < OpenID::Extension
|
@@ -29,7 +29,7 @@ module OpenID
|
|
29
29
|
assert_equal(DummyExtension::TEST_ALIAS,
|
30
30
|
namespaces.get_alias(DummyExtension::TEST_URI))
|
31
31
|
end
|
32
|
-
|
32
|
+
|
33
33
|
def test_OpenID2
|
34
34
|
oid2_msg = Message.new(OPENID2_NS)
|
35
35
|
ext = DummyExtension.new
|
data/test/test_fetchers.rb
CHANGED
@@ -1,14 +1,10 @@
|
|
1
|
-
#
|
2
|
-
|
1
|
+
# encoding: utf-8
|
3
2
|
require 'test/unit'
|
4
3
|
require 'net/http'
|
5
4
|
require 'webrick'
|
6
|
-
|
7
5
|
require 'testutil'
|
8
6
|
require 'util'
|
9
|
-
|
10
7
|
require 'openid/fetchers'
|
11
|
-
|
12
8
|
require 'stringio'
|
13
9
|
|
14
10
|
begin
|
@@ -412,7 +408,7 @@ EOF
|
|
412
408
|
f.fetch("https://bogus.com/")
|
413
409
|
}
|
414
410
|
end
|
415
|
-
|
411
|
+
|
416
412
|
class TestingException < OpenID::FetchingError; end
|
417
413
|
|
418
414
|
class NoSSLSupportConnection
|
@@ -543,7 +539,7 @@ class ProxyTest < Test::Unit::TestCase
|
|
543
539
|
def test_proxy_env
|
544
540
|
ENV['http_proxy'] = 'http://127.0.0.1:3128/'
|
545
541
|
OpenID.fetcher_use_env_http_proxy
|
546
|
-
|
542
|
+
|
547
543
|
# make_http just to give us something with readable attributes to inspect.
|
548
544
|
conn = OpenID.fetcher.make_http(URI.parse('http://127.0.0.2'))
|
549
545
|
assert_equal('127.0.0.1', conn.proxy_address)
|
data/test/test_filters.rb
CHANGED
@@ -1,6 +1,8 @@
|
|
1
|
-
|
2
|
-
require
|
3
|
-
require
|
1
|
+
require "test/unit"
|
2
|
+
require "testutil"
|
3
|
+
require "rexml/document"
|
4
|
+
require "openid/yadis/xrds"
|
5
|
+
require "openid/yadis/filters"
|
4
6
|
|
5
7
|
module OpenID
|
6
8
|
class BasicServiceEndpointTest < Test::Unit::TestCase
|
@@ -12,8 +14,7 @@ module OpenID
|
|
12
14
|
|
13
15
|
no_types_endpoint = Yadis::BasicServiceEndpoint.new(yadis_url, [], nil, nil)
|
14
16
|
|
15
|
-
some_types_endpoint = Yadis::BasicServiceEndpoint.new(yadis_url, types,
|
16
|
-
nil, nil)
|
17
|
+
some_types_endpoint = Yadis::BasicServiceEndpoint.new(yadis_url, types, nil, nil)
|
17
18
|
|
18
19
|
assert(no_types_endpoint.match_types([]) == [])
|
19
20
|
assert(no_types_endpoint.match_types(["urn:absent"]) == [])
|
@@ -158,15 +159,14 @@ module OpenID
|
|
158
159
|
]
|
159
160
|
|
160
161
|
cf = Yadis::CompoundFilter.new(subfilters)
|
161
|
-
assert
|
162
|
+
assert cf.get_service_endpoints("unused", "unused") == all
|
162
163
|
end
|
163
164
|
end
|
164
165
|
|
165
166
|
class MakeFilterTest < Test::Unit::TestCase
|
166
167
|
def test_parts_nil
|
167
168
|
result = Yadis.make_filter(nil)
|
168
|
-
assert
|
169
|
-
result)
|
169
|
+
assert result.is_a?(Yadis::TransformFilterMaker)
|
170
170
|
end
|
171
171
|
|
172
172
|
def test_parts_array
|
@@ -174,53 +174,49 @@ module OpenID
|
|
174
174
|
e2 = Yadis::BasicServiceEndpoint.new(nil, [], nil, nil)
|
175
175
|
|
176
176
|
result = Yadis.make_filter([e1, e2])
|
177
|
-
assert
|
178
|
-
|
179
|
-
assert
|
180
|
-
assert(result.filter_procs[1] == e2.method('from_basic_service_endpoint'))
|
177
|
+
assert result.is_a?(Yadis::TransformFilterMaker)
|
178
|
+
assert result.filter_procs[0] == e1.method('from_basic_service_endpoint')
|
179
|
+
assert result.filter_procs[1] == e2.method('from_basic_service_endpoint')
|
181
180
|
end
|
182
181
|
|
183
182
|
def test_parts_single
|
184
183
|
e = Yadis::BasicServiceEndpoint.new(nil, [], nil, nil)
|
185
184
|
result = Yadis.make_filter(e)
|
186
|
-
assert
|
187
|
-
result)
|
185
|
+
assert result.is_a?(Yadis::TransformFilterMaker)
|
188
186
|
end
|
189
187
|
end
|
190
188
|
|
191
189
|
class MakeCompoundFilterTest < Test::Unit::TestCase
|
192
190
|
def test_no_filters
|
193
191
|
result = Yadis.mk_compound_filter([])
|
194
|
-
assert
|
192
|
+
assert result.subfilters == []
|
195
193
|
end
|
196
194
|
|
197
195
|
def test_single_transform_filter
|
198
196
|
f = Yadis::TransformFilterMaker.new([])
|
199
|
-
|
197
|
+
assert_equal f, Yadis.mk_compound_filter([f])
|
200
198
|
end
|
201
199
|
|
202
200
|
def test_single_endpoint
|
203
201
|
e = Yadis::BasicServiceEndpoint.new(nil, [], nil, nil)
|
204
202
|
result = Yadis.mk_compound_filter([e])
|
205
|
-
assert
|
203
|
+
assert result.is_a?(Yadis::TransformFilterMaker)
|
206
204
|
|
207
205
|
# Expect the transform filter to call
|
208
206
|
# from_basic_service_endpoint on the endpoint
|
209
207
|
filter = result.filter_procs[0]
|
210
|
-
|
211
|
-
filter)
|
208
|
+
assert_equal filter, e.method('from_basic_service_endpoint')
|
212
209
|
end
|
213
210
|
|
214
211
|
def test_single_proc
|
215
212
|
# Create a proc that just returns nil for any endpoint
|
216
213
|
p = Proc.new { |endpoint| nil }
|
217
214
|
result = Yadis.mk_compound_filter([p])
|
218
|
-
assert
|
215
|
+
assert result.is_a?(Yadis::TransformFilterMaker)
|
219
216
|
|
220
217
|
# Expect the transform filter to call
|
221
218
|
# from_basic_service_endpoint on the endpoint
|
222
|
-
|
223
|
-
assert(filter == p)
|
219
|
+
assert_equal result.filter_procs[0], p
|
224
220
|
end
|
225
221
|
|
226
222
|
def test_multiple_filters_same_type
|
@@ -231,8 +227,8 @@ module OpenID
|
|
231
227
|
# from f1 and f2.
|
232
228
|
result = Yadis.mk_compound_filter([f1, f2])
|
233
229
|
|
234
|
-
assert
|
235
|
-
assert
|
230
|
+
assert result.is_a?(Yadis::CompoundFilter)
|
231
|
+
assert result.subfilters == [f1, f2]
|
236
232
|
end
|
237
233
|
|
238
234
|
def test_multiple_filters_different_type
|
@@ -247,14 +243,12 @@ module OpenID
|
|
247
243
|
# from f1 and f2.
|
248
244
|
result = Yadis.mk_compound_filter([f1, f2, f3, f4])
|
249
245
|
|
250
|
-
assert
|
246
|
+
assert result.is_a?(Yadis::CompoundFilter)
|
251
247
|
|
252
|
-
assert
|
253
|
-
assert
|
254
|
-
|
255
|
-
assert
|
256
|
-
f2.method('from_basic_service_endpoint'))
|
257
|
-
assert(result.subfilters[2].filter_procs[1] == f3)
|
248
|
+
assert result.subfilters[0] == f1
|
249
|
+
assert result.subfilters[1].filter_procs[0] == e.method('from_basic_service_endpoint')
|
250
|
+
assert result.subfilters[2].filter_procs[0] == f2.method('from_basic_service_endpoint')
|
251
|
+
assert result.subfilters[2].filter_procs[1] == f3
|
258
252
|
end
|
259
253
|
|
260
254
|
def test_filter_type_error
|
data/test/test_idres.rb
CHANGED
@@ -1,6 +1,6 @@
|
|
1
|
+
require "test/unit"
|
1
2
|
require "testutil"
|
2
3
|
require "util"
|
3
|
-
require "test/unit"
|
4
4
|
require "openid/consumer/idres"
|
5
5
|
require "openid/protocolerror"
|
6
6
|
require "openid/store/memory"
|
@@ -103,21 +103,21 @@ module OpenID
|
|
103
103
|
end
|
104
104
|
|
105
105
|
def test_112
|
106
|
-
args = {'openid.assoc_handle' => 'fa1f5ff0-cde4-11dc-a183-3714bfd55ca8',
|
107
|
-
'openid.claimed_id' => 'http://binkley.lan/user/test01',
|
108
|
-
'openid.identity' => 'http://test01.binkley.lan/',
|
109
|
-
'openid.mode' => 'id_res',
|
110
|
-
'openid.ns' => 'http://specs.openid.net/auth/2.0',
|
111
|
-
'openid.ns.pape' => 'http://specs.openid.net/extensions/pape/1.0',
|
112
|
-
'openid.op_endpoint' => 'http://binkley.lan/server',
|
113
|
-
'openid.pape.auth_policies' => 'none',
|
114
|
-
'openid.pape.auth_time' => '2008-01-28T20:42:36Z',
|
115
|
-
'openid.pape.nist_auth_level' => '0',
|
116
|
-
'openid.response_nonce' => '2008-01-28T21:07:04Z99Q=',
|
117
|
-
'openid.return_to' => 'http://binkley.lan:8001/process?janrain_nonce=2008-01-28T21%3A07%3A02Z0tMIKx',
|
118
|
-
'openid.sig' => 'YJlWH4U6SroB1HoPkmEKx9AyGGg=',
|
119
|
-
'openid.signed' => 'assoc_handle,identity,response_nonce,return_to,claimed_id,op_endpoint,pape.auth_time,ns.pape,pape.nist_auth_level,pape.auth_policies'
|
120
|
-
}
|
106
|
+
args = {'openid.assoc_handle' => 'fa1f5ff0-cde4-11dc-a183-3714bfd55ca8',
|
107
|
+
'openid.claimed_id' => 'http://binkley.lan/user/test01',
|
108
|
+
'openid.identity' => 'http://test01.binkley.lan/',
|
109
|
+
'openid.mode' => 'id_res',
|
110
|
+
'openid.ns' => 'http://specs.openid.net/auth/2.0',
|
111
|
+
'openid.ns.pape' => 'http://specs.openid.net/extensions/pape/1.0',
|
112
|
+
'openid.op_endpoint' => 'http://binkley.lan/server',
|
113
|
+
'openid.pape.auth_policies' => 'none',
|
114
|
+
'openid.pape.auth_time' => '2008-01-28T20:42:36Z',
|
115
|
+
'openid.pape.nist_auth_level' => '0',
|
116
|
+
'openid.response_nonce' => '2008-01-28T21:07:04Z99Q=',
|
117
|
+
'openid.return_to' => 'http://binkley.lan:8001/process?janrain_nonce=2008-01-28T21%3A07%3A02Z0tMIKx',
|
118
|
+
'openid.sig' => 'YJlWH4U6SroB1HoPkmEKx9AyGGg=',
|
119
|
+
'openid.signed' => 'assoc_handle,identity,response_nonce,return_to,claimed_id,op_endpoint,pape.auth_time,ns.pape,pape.nist_auth_level,pape.auth_policies'
|
120
|
+
}
|
121
121
|
assert_equal(args['openid.ns'], OPENID2_NS)
|
122
122
|
incoming = Message.from_post_args(args)
|
123
123
|
assert(incoming.is_openid2)
|
@@ -129,7 +129,7 @@ module OpenID
|
|
129
129
|
assert(expected.is_openid2)
|
130
130
|
assert_equal(expected, car)
|
131
131
|
assert_equal(expected_args, car.to_post_args)
|
132
|
-
end
|
132
|
+
end
|
133
133
|
|
134
134
|
def test_no_signed_list
|
135
135
|
msg = Message.new(OPENID2_NS)
|
data/test/test_kvpost.rb
CHANGED
data/test/test_message.rb
CHANGED
@@ -1,9 +1,7 @@
|
|
1
1
|
# last synced with Python openid.test.test_message on 6/29/2007.
|
2
|
-
|
3
2
|
require 'test/unit'
|
4
3
|
require 'util'
|
5
4
|
require 'openid/message'
|
6
|
-
|
7
5
|
require 'rexml/document'
|
8
6
|
|
9
7
|
module OpenID
|
@@ -902,6 +900,7 @@ module OpenID
|
|
902
900
|
'openid.identity' => 'http://bogus.example.invalid:port/',
|
903
901
|
'openid.assoc_handle' => 'FLUB',
|
904
902
|
'openid.return_to' => 'Neverland',
|
903
|
+
'openid.ax.value.fullname' => "Bob&Smith'"
|
905
904
|
}
|
906
905
|
|
907
906
|
@action_url = 'scheme://host:port/path?query'
|
data/test/test_oauth.rb
CHANGED
@@ -1,3 +1,4 @@
|
|
1
|
+
require 'test/unit'
|
1
2
|
require 'openid/extensions/oauth'
|
2
3
|
require 'openid/message'
|
3
4
|
require 'openid/server'
|
@@ -8,7 +9,7 @@ module OpenID
|
|
8
9
|
module OAuthTest
|
9
10
|
class OAuthRequestTestCase < Test::Unit::TestCase
|
10
11
|
def setup
|
11
|
-
@req = OAuth::Request.new
|
12
|
+
@req = OAuth::Request.new
|
12
13
|
end
|
13
14
|
|
14
15
|
def test_construct
|
@@ -137,7 +138,7 @@ module OpenID
|
|
137
138
|
end
|
138
139
|
|
139
140
|
def test_from_success_response
|
140
|
-
|
141
|
+
|
141
142
|
openid_req_msg = Message.from_openid_args({
|
142
143
|
'mode' => 'id_res',
|
143
144
|
'ns' => OPENID2_NS,
|
data/test/test_openid_yadis.rb
CHANGED
data/test/test_pape.rb
CHANGED
@@ -1,3 +1,4 @@
|
|
1
|
+
require 'test/unit'
|
1
2
|
require 'openid/extensions/pape'
|
2
3
|
require 'openid/message'
|
3
4
|
require 'openid/server'
|
@@ -170,11 +171,11 @@ module OpenID
|
|
170
171
|
assert_equal(nil, @req.auth_time)
|
171
172
|
assert_equal([], @req.auth_policies)
|
172
173
|
end
|
173
|
-
|
174
|
+
|
174
175
|
def test_parse_extension_args_strict_bogus1
|
175
176
|
args = {'auth_policies' => 'http://foo http://bar',
|
176
177
|
'auth_time' => 'this one time'}
|
177
|
-
assert_raises(ArgumentError) {
|
178
|
+
assert_raises(ArgumentError) {
|
178
179
|
@req.parse_extension_args(args, true)
|
179
180
|
}
|
180
181
|
end
|
@@ -183,11 +184,11 @@ module OpenID
|
|
183
184
|
args = {'auth_policies' => 'http://foo http://bar',
|
184
185
|
'auth_time' => '1983-11-05T12:30:24Z',
|
185
186
|
'nist_auth_level' => 'some'}
|
186
|
-
assert_raises(ArgumentError) {
|
187
|
+
assert_raises(ArgumentError) {
|
187
188
|
@req.parse_extension_args(args, true)
|
188
189
|
}
|
189
190
|
end
|
190
|
-
|
191
|
+
|
191
192
|
def test_parse_extension_args_strict_good
|
192
193
|
args = {'auth_policies' => 'http://foo http://bar',
|
193
194
|
'auth_time' => '2007-10-11T05:25:18Z',
|
@@ -208,9 +209,9 @@ module OpenID
|
|
208
209
|
assert_equal(nil, @req.nist_auth_level)
|
209
210
|
end
|
210
211
|
|
211
|
-
|
212
|
+
|
212
213
|
def test_from_success_response
|
213
|
-
|
214
|
+
|
214
215
|
openid_req_msg = Message.from_openid_args({
|
215
216
|
'mode' => 'id_res',
|
216
217
|
'ns' => OPENID2_NS,
|
data/test/test_parsehtml.rb
CHANGED
data/test/test_server.rb
CHANGED
@@ -1,3 +1,7 @@
|
|
1
|
+
require 'test/unit'
|
2
|
+
require 'testutil'
|
3
|
+
require 'util'
|
4
|
+
require 'uri'
|
1
5
|
require 'openid/server'
|
2
6
|
require 'openid/cryptutil'
|
3
7
|
require 'openid/association'
|
@@ -6,11 +10,6 @@ require 'openid/message'
|
|
6
10
|
require 'openid/store/memory'
|
7
11
|
require 'openid/dh'
|
8
12
|
require 'openid/consumer/associationmanager'
|
9
|
-
require 'util'
|
10
|
-
require "testutil"
|
11
|
-
|
12
|
-
require 'test/unit'
|
13
|
-
require 'uri'
|
14
13
|
|
15
14
|
# In general, if you edit or add tests here, try to move in the
|
16
15
|
# direction of testing smaller units. For testing the external
|
@@ -208,7 +207,7 @@ module OpenID
|
|
208
207
|
begin
|
209
208
|
result = @decode.call(args)
|
210
209
|
rescue ArgumentError => err
|
211
|
-
assert
|
210
|
+
assert !err.to_s.index('values').nil?
|
212
211
|
else
|
213
212
|
flunk("Expected ArgumentError, but got result #{result}")
|
214
213
|
end
|
@@ -1008,7 +1007,7 @@ module OpenID
|
|
1008
1007
|
assert(webresponse.headers.has_key?('location'))
|
1009
1008
|
location = webresponse.headers['location']
|
1010
1009
|
query = Util.parse_query(URI::parse(location).query)
|
1011
|
-
assert
|
1010
|
+
assert !query.has_key?('openid.sig')
|
1012
1011
|
end
|
1013
1012
|
|
1014
1013
|
def test_assocReply
|
@@ -1530,7 +1529,7 @@ module OpenID
|
|
1530
1529
|
{'blue' => 'star',
|
1531
1530
|
'mode' => 'id_res',
|
1532
1531
|
})
|
1533
|
-
|
1532
|
+
|
1534
1533
|
assert_equal(@response.fields.get_args(namespace),
|
1535
1534
|
{'bright' => 'potato'})
|
1536
1535
|
end
|
@@ -1613,7 +1612,7 @@ module OpenID
|
|
1613
1612
|
r = @request.answer(@signatory)
|
1614
1613
|
assert_equal({'is_valid' => 'false'},
|
1615
1614
|
r.fields.get_args(OPENID_NS))
|
1616
|
-
|
1615
|
+
|
1617
1616
|
end
|
1618
1617
|
|
1619
1618
|
def test_replay
|
@@ -1750,7 +1749,7 @@ module OpenID
|
|
1750
1749
|
invalid_s1,
|
1751
1750
|
invalid_s1_2,
|
1752
1751
|
]
|
1753
|
-
|
1752
|
+
|
1754
1753
|
bad_request_argss.each { |request_args|
|
1755
1754
|
message = Message.from_post_args(request_args)
|
1756
1755
|
assert_raise(Server::ProtocolError) {
|
@@ -2299,8 +2298,7 @@ module OpenID
|
|
2299
2298
|
verified = @signatory.verify(assoc_handle, signed)
|
2300
2299
|
}
|
2301
2300
|
|
2302
|
-
assert
|
2303
|
-
#assert(@messages)
|
2301
|
+
assert !verified
|
2304
2302
|
end
|
2305
2303
|
|
2306
2304
|
def test_verifyAssocMismatch
|
@@ -2322,16 +2320,14 @@ module OpenID
|
|
2322
2320
|
verified = @signatory.verify(assoc_handle, signed)
|
2323
2321
|
}
|
2324
2322
|
|
2325
|
-
assert
|
2326
|
-
#assert(@messages)
|
2323
|
+
assert !verified
|
2327
2324
|
end
|
2328
2325
|
|
2329
2326
|
def test_getAssoc
|
2330
2327
|
assoc_handle = makeAssoc(true)
|
2331
2328
|
assoc = @signatory.get_association(assoc_handle, true)
|
2332
|
-
assert
|
2333
|
-
assert_equal
|
2334
|
-
# @failIf(@messages, @messages)
|
2329
|
+
assert assoc
|
2330
|
+
assert_equal assoc.handle, assoc_handle
|
2335
2331
|
end
|
2336
2332
|
|
2337
2333
|
def test_getAssocExpired
|
@@ -2340,8 +2336,7 @@ module OpenID
|
|
2340
2336
|
silence_logging {
|
2341
2337
|
assoc = @signatory.get_association(assoc_handle, true)
|
2342
2338
|
}
|
2343
|
-
assert
|
2344
|
-
# assert(@messages)
|
2339
|
+
assert !assoc
|
2345
2340
|
end
|
2346
2341
|
|
2347
2342
|
def test_getAssocInvalid
|
@@ -2428,7 +2423,7 @@ module OpenID
|
|
2428
2423
|
'openid.assoc_type' => 'HMAC-SHA1'}
|
2429
2424
|
areq = @server.decode_request(assoc_args)
|
2430
2425
|
aresp = @server.handle_request(areq)
|
2431
|
-
|
2426
|
+
|
2432
2427
|
amess = aresp.fields
|
2433
2428
|
assert(amess.is_openid1)
|
2434
2429
|
ahandle = amess.get_arg(OPENID_NS, 'assoc_handle')
|
@@ -2441,7 +2436,7 @@ module OpenID
|
|
2441
2436
|
'openid.return_to' => 'http://example.com/openid/consumer',
|
2442
2437
|
'openid.assoc_handle' => ahandle,
|
2443
2438
|
'openid.identity' => 'http://foo.com/'}
|
2444
|
-
|
2439
|
+
|
2445
2440
|
cireq = @server.decode_request(checkid_args)
|
2446
2441
|
ciresp = cireq.answer(true)
|
2447
2442
|
|
@@ -2449,7 +2444,7 @@ module OpenID
|
|
2449
2444
|
|
2450
2445
|
assert_equal(assoc.get_message_signature(signed_resp.fields),
|
2451
2446
|
signed_resp.fields.get_arg(OPENID_NS, 'sig'))
|
2452
|
-
|
2447
|
+
|
2453
2448
|
assert(assoc.check_message_signature(signed_resp.fields))
|
2454
2449
|
end
|
2455
2450
|
|