ruby-openid 2.6.0 → 2.7.0
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of ruby-openid might be problematic. Click here for more details.
- checksums.yaml +4 -4
- data/CHANGELOG.md +8 -0
- data/lib/openid/association.rb +1 -1
- data/lib/openid/cryptutil.rb +5 -5
- data/lib/openid/message.rb +1 -1
- data/lib/openid/trustroot.rb +2 -2
- data/lib/openid/urinorm.rb +4 -6
- data/lib/openid/util.rb +0 -2
- data/lib/openid/version.rb +1 -1
- data/test/discoverdata.rb +1 -2
- data/test/test_accept.rb +4 -5
- data/test/test_association.rb +4 -3
- data/test/test_associationmanager.rb +22 -24
- data/test/test_ax.rb +9 -9
- data/test/test_checkid_request.rb +6 -8
- data/test/test_consumer.rb +5 -5
- data/test/test_cryptutil.rb +5 -5
- data/test/test_dh.rb +2 -2
- data/test/test_discover.rb +19 -23
- data/test/test_discovery_manager.rb +6 -7
- data/test/test_extension.rb +2 -2
- data/test/test_fetchers.rb +16 -16
- data/test/test_filters.rb +7 -7
- data/test/test_idres.rb +25 -40
- data/test/test_kvform.rb +5 -5
- data/test/test_kvpost.rb +2 -2
- data/test/test_linkparse.rb +3 -5
- data/test/test_message.rb +19 -19
- data/test/test_nonce.rb +2 -2
- data/test/test_oauth.rb +3 -3
- data/test/test_openid_yadis.rb +2 -2
- data/test/test_pape.rb +4 -4
- data/test/test_parsehtml.rb +3 -3
- data/test/test_responses.rb +2 -2
- data/test/test_server.rb +53 -53
- data/test/test_sreg.rb +6 -6
- data/test/test_stores.rb +12 -12
- data/test/test_trustroot.rb +2 -2
- data/test/test_ui.rb +2 -2
- data/test/test_urinorm.rb +2 -2
- data/test/test_util.rb +2 -2
- data/test/test_xrds.rb +15 -15
- data/test/test_xri.rb +4 -4
- data/test/test_xrires.rb +2 -2
- data/test/test_yadis_discovery.rb +5 -5
- data/test/testutil.rb +8 -1
- metadata +18 -7
- data/lib/openid/extras.rb +0 -13
- data/test/test_extras.rb +0 -35
data/test/test_nonce.rb
CHANGED
data/test/test_oauth.rb
CHANGED
@@ -1,4 +1,4 @@
|
|
1
|
-
require '
|
1
|
+
require 'minitest/autorun'
|
2
2
|
require 'openid/extensions/oauth'
|
3
3
|
require 'openid/message'
|
4
4
|
require 'openid/server'
|
@@ -7,7 +7,7 @@ require 'openid/consumer/discovery'
|
|
7
7
|
|
8
8
|
module OpenID
|
9
9
|
module OAuthTest
|
10
|
-
class OAuthRequestTestCase < Test
|
10
|
+
class OAuthRequestTestCase < Minitest::Test
|
11
11
|
def setup
|
12
12
|
@req = OAuth::Request.new
|
13
13
|
end
|
@@ -92,7 +92,7 @@ module OpenID
|
|
92
92
|
|
93
93
|
end
|
94
94
|
|
95
|
-
class OAuthResponseTestCase < Test
|
95
|
+
class OAuthResponseTestCase < Minitest::Test
|
96
96
|
def setup
|
97
97
|
@req = OAuth::Response.new
|
98
98
|
end
|
data/test/test_openid_yadis.rb
CHANGED
@@ -1,4 +1,4 @@
|
|
1
|
-
require '
|
1
|
+
require 'minitest/autorun'
|
2
2
|
require 'openid/consumer/discovery'
|
3
3
|
require 'openid/yadis/services'
|
4
4
|
|
@@ -143,7 +143,7 @@ EOF
|
|
143
143
|
end
|
144
144
|
end
|
145
145
|
|
146
|
-
class OpenIDYadisTests < Test
|
146
|
+
class OpenIDYadisTests < Minitest::Test
|
147
147
|
def test_openid_yadis
|
148
148
|
data = []
|
149
149
|
|
data/test/test_pape.rb
CHANGED
@@ -1,12 +1,12 @@
|
|
1
|
-
require '
|
1
|
+
require 'minitest/autorun'
|
2
2
|
require 'openid/extensions/pape'
|
3
3
|
require 'openid/message'
|
4
4
|
require 'openid/server'
|
5
|
-
require 'openid/consumer
|
5
|
+
require 'openid/consumer'
|
6
6
|
|
7
7
|
module OpenID
|
8
8
|
module PAPETest
|
9
|
-
class PapeRequestTestCase < Test
|
9
|
+
class PapeRequestTestCase < Minitest::Test
|
10
10
|
def setup
|
11
11
|
@req = PAPE::Request.new
|
12
12
|
end
|
@@ -103,7 +103,7 @@ module OpenID
|
|
103
103
|
|
104
104
|
end
|
105
105
|
|
106
|
-
class PapeResponseTestCase < Test
|
106
|
+
class PapeResponseTestCase < Minitest::Test
|
107
107
|
def setup
|
108
108
|
@req = PAPE::Response.new
|
109
109
|
end
|
data/test/test_parsehtml.rb
CHANGED
@@ -1,9 +1,9 @@
|
|
1
|
-
require "
|
1
|
+
require "minitest/autorun"
|
2
2
|
require "testutil"
|
3
3
|
require "openid/yadis/parsehtml"
|
4
4
|
|
5
5
|
module OpenID
|
6
|
-
class ParseHTMLTestCase < Test
|
6
|
+
class ParseHTMLTestCase < Minitest::Test
|
7
7
|
include OpenID::TestDataMixin
|
8
8
|
|
9
9
|
def test_parsehtml
|
@@ -27,7 +27,7 @@ module OpenID
|
|
27
27
|
end
|
28
28
|
|
29
29
|
# the HTML tokenizer test
|
30
|
-
class TC_TestHTMLTokenizer < Test
|
30
|
+
class TC_TestHTMLTokenizer < Minitest::Test
|
31
31
|
def test_bad_link
|
32
32
|
toke = HTMLTokenizer.new("<p><a href=http://bad.com/link>foo</a></p>")
|
33
33
|
assert("http://bad.com/link" == toke.getTag("a").attr_hash['href'])
|
data/test/test_responses.rb
CHANGED
@@ -1,11 +1,11 @@
|
|
1
|
-
require "
|
1
|
+
require "minitest/autorun"
|
2
2
|
require "openid/consumer/discovery"
|
3
3
|
require "openid/consumer/responses"
|
4
4
|
|
5
5
|
module OpenID
|
6
6
|
class Consumer
|
7
7
|
module TestResponses
|
8
|
-
class TestSuccessResponse < Test
|
8
|
+
class TestSuccessResponse < Minitest::Test
|
9
9
|
def setup
|
10
10
|
@endpoint = OpenIDServiceEndpoint.new
|
11
11
|
@endpoint.claimed_id = 'identity_url'
|
data/test/test_server.rb
CHANGED
@@ -1,4 +1,4 @@
|
|
1
|
-
require '
|
1
|
+
require 'minitest/autorun'
|
2
2
|
require 'testutil'
|
3
3
|
require 'util'
|
4
4
|
require 'uri'
|
@@ -39,7 +39,7 @@ module OpenID
|
|
39
39
|
end
|
40
40
|
end
|
41
41
|
|
42
|
-
class TestProtocolError < Test
|
42
|
+
class TestProtocolError < Minitest::Test
|
43
43
|
def test_browserWithReturnTo
|
44
44
|
return_to = "http://rp.unittest/consumer"
|
45
45
|
# will be a ProtocolError raised by Decode or
|
@@ -151,7 +151,7 @@ module OpenID
|
|
151
151
|
end
|
152
152
|
end
|
153
153
|
|
154
|
-
class TestDecode < Test
|
154
|
+
class TestDecode < Minitest::Test
|
155
155
|
def setup
|
156
156
|
@claimed_id = 'http://de.legating.de.coder.unittest/'
|
157
157
|
@id_url = "http://decoder.am.unittest/"
|
@@ -175,7 +175,7 @@ module OpenID
|
|
175
175
|
'pony' => 'spotted',
|
176
176
|
'sreg.mutant_power' => 'decaffinator',
|
177
177
|
}
|
178
|
-
|
178
|
+
assert_raises(Server::ProtocolError) {
|
179
179
|
@decode.call(args)
|
180
180
|
}
|
181
181
|
end
|
@@ -185,7 +185,7 @@ module OpenID
|
|
185
185
|
'openid.mode' => 'twos-compliment',
|
186
186
|
'openid.pants' => 'zippered',
|
187
187
|
}
|
188
|
-
|
188
|
+
assert_raises(Server::ProtocolError) {
|
189
189
|
@decode.call(args)
|
190
190
|
}
|
191
191
|
end
|
@@ -242,7 +242,7 @@ module OpenID
|
|
242
242
|
'openid.claimed_id' => @id_url,
|
243
243
|
'openid.assoc_handle' => @assoc_handle,
|
244
244
|
}
|
245
|
-
|
245
|
+
assert_raises(Server::ProtocolError) {
|
246
246
|
m = Message.from_post_args(args)
|
247
247
|
Server::CheckIDRequest.from_message(m, @op_endpoint)
|
248
248
|
}
|
@@ -333,7 +333,7 @@ module OpenID
|
|
333
333
|
'openid.return_to' => @rt_url,
|
334
334
|
'openid.realm' => @tr_url,
|
335
335
|
}
|
336
|
-
|
336
|
+
assert_raises(Server::ProtocolError) {
|
337
337
|
@decode.call(args)
|
338
338
|
}
|
339
339
|
end
|
@@ -364,7 +364,7 @@ module OpenID
|
|
364
364
|
'openid.assoc_handle' => @assoc_handle,
|
365
365
|
'openid.trust_root' => @tr_url,
|
366
366
|
}
|
367
|
-
|
367
|
+
assert_raises(Server::ProtocolError) {
|
368
368
|
@decode.call(args)
|
369
369
|
}
|
370
370
|
end
|
@@ -385,15 +385,15 @@ module OpenID
|
|
385
385
|
req = @decode.call(args)
|
386
386
|
assert(req.is_a?(Server::CheckIDRequest))
|
387
387
|
|
388
|
-
|
388
|
+
assert_raises(Server::NoReturnToError) {
|
389
389
|
req.answer(false)
|
390
390
|
}
|
391
391
|
|
392
|
-
|
392
|
+
assert_raises(Server::NoReturnToError) {
|
393
393
|
req.encode_to_url('bogus')
|
394
394
|
}
|
395
395
|
|
396
|
-
|
396
|
+
assert_raises(Server::NoReturnToError) {
|
397
397
|
req.cancel_url
|
398
398
|
}
|
399
399
|
end
|
@@ -408,7 +408,7 @@ module OpenID
|
|
408
408
|
'openid.identity' => @id_url,
|
409
409
|
'openid.assoc_handle' => @assoc_handle,
|
410
410
|
}
|
411
|
-
|
411
|
+
assert_raises(Server::ProtocolError) {
|
412
412
|
@decode.call(args)
|
413
413
|
}
|
414
414
|
end
|
@@ -447,7 +447,7 @@ module OpenID
|
|
447
447
|
end
|
448
448
|
|
449
449
|
def test_checkidSetupUntrustedReturn_Constructor
|
450
|
-
|
450
|
+
assert_raises(Server::UntrustedReturnURL) {
|
451
451
|
Server::CheckIDRequest.new(@id_url, @rt_url, nil,
|
452
452
|
'http://not-the-return-place.unittest/',
|
453
453
|
false, @assoc_handle)
|
@@ -455,7 +455,7 @@ module OpenID
|
|
455
455
|
end
|
456
456
|
|
457
457
|
def test_checkidSetupMalformedReturnURL_Constructor
|
458
|
-
|
458
|
+
assert_raises(Server::MalformedReturnURL) {
|
459
459
|
Server::CheckIDRequest.new(@id_url, 'bogus://return.url', nil,
|
460
460
|
'http://trustroot.com/',
|
461
461
|
false, @assoc_handle)
|
@@ -488,7 +488,7 @@ module OpenID
|
|
488
488
|
'openid.bar' => 'signedval2',
|
489
489
|
'openid.baz' => 'unsigned',
|
490
490
|
}
|
491
|
-
|
491
|
+
assert_raises(Server::ProtocolError) {
|
492
492
|
@decode.call(args)
|
493
493
|
}
|
494
494
|
end
|
@@ -531,7 +531,7 @@ module OpenID
|
|
531
531
|
'openid.session_type' => 'DH-SHA1',
|
532
532
|
}
|
533
533
|
# Using DH-SHA1 without supplying dh_consumer_public is an error.
|
534
|
-
|
534
|
+
assert_raises(Server::ProtocolError) {
|
535
535
|
@decode.call(args)
|
536
536
|
}
|
537
537
|
end
|
@@ -542,7 +542,7 @@ module OpenID
|
|
542
542
|
'openid.session_type' => 'DH-SHA1',
|
543
543
|
'openid.dh_consumer_public' => "donkeydonkeydonkey",
|
544
544
|
}
|
545
|
-
|
545
|
+
assert_raises(Server::ProtocolError) {
|
546
546
|
@decode.call(args)
|
547
547
|
}
|
548
548
|
end
|
@@ -577,7 +577,7 @@ module OpenID
|
|
577
577
|
'openid.dh_modulus' => 'pizza',
|
578
578
|
'openid.dh_gen' => 'gnocchi',
|
579
579
|
}
|
580
|
-
|
580
|
+
assert_raises(Server::ProtocolError) {
|
581
581
|
@decode.call(args)
|
582
582
|
}
|
583
583
|
end
|
@@ -589,7 +589,7 @@ module OpenID
|
|
589
589
|
'openid.dh_consumer_public' => "Rzup9265tw==",
|
590
590
|
'openid.dh_modulus' => 'pizza',
|
591
591
|
}
|
592
|
-
|
592
|
+
assert_raises(Server::ProtocolError) {
|
593
593
|
@decode.call(args)
|
594
594
|
}
|
595
595
|
end
|
@@ -601,7 +601,7 @@ module OpenID
|
|
601
601
|
'openid.dh_consumer_public' => "Rzup9265tw==",
|
602
602
|
'openid.dh_gen' => 'pizza',
|
603
603
|
}
|
604
|
-
|
604
|
+
assert_raises(Server::ProtocolError) {
|
605
605
|
@decode.call(args)
|
606
606
|
}
|
607
607
|
end
|
@@ -625,7 +625,7 @@ module OpenID
|
|
625
625
|
'openid.session_type' => 'FLCL6',
|
626
626
|
'openid.dh_consumer_public' => "YQ==\n",
|
627
627
|
}
|
628
|
-
|
628
|
+
assert_raises(Server::ProtocolError) {
|
629
629
|
@decode.call(args)
|
630
630
|
}
|
631
631
|
end
|
@@ -646,7 +646,7 @@ module OpenID
|
|
646
646
|
'openid.session_type' => 'DH-SHA1',
|
647
647
|
'openid.dh_consumer_public' => "my public keeey",
|
648
648
|
}
|
649
|
-
|
649
|
+
assert_raises(Server::ProtocolError) {
|
650
650
|
@decode.call(args)
|
651
651
|
}
|
652
652
|
end
|
@@ -675,7 +675,7 @@ module OpenID
|
|
675
675
|
end
|
676
676
|
end
|
677
677
|
|
678
|
-
class TestEncode < Test
|
678
|
+
class TestEncode < Minitest::Test
|
679
679
|
def setup
|
680
680
|
@encoder = Server::Encoder.new
|
681
681
|
@encode = @encoder.method('encode')
|
@@ -826,7 +826,7 @@ module OpenID
|
|
826
826
|
assert(webresponse.headers.member?('location'))
|
827
827
|
|
828
828
|
location = webresponse.headers['location']
|
829
|
-
assert(location.
|
829
|
+
assert(location.start_with?(request.return_to),
|
830
830
|
sprintf("%s does not start with %s",
|
831
831
|
location, request.return_to))
|
832
832
|
# argh.
|
@@ -906,7 +906,7 @@ module OpenID
|
|
906
906
|
'openid.identity' => 'http://limu.unittest/',
|
907
907
|
})
|
908
908
|
e = Server::ProtocolError.new(args, "wet paint")
|
909
|
-
|
909
|
+
assert_raises(Server::EncodingError) {
|
910
910
|
@encode.call(e)
|
911
911
|
}
|
912
912
|
end
|
@@ -924,7 +924,7 @@ module OpenID
|
|
924
924
|
end
|
925
925
|
end
|
926
926
|
|
927
|
-
class TestSigningEncode < Test
|
927
|
+
class TestSigningEncode < Minitest::Test
|
928
928
|
def setup
|
929
929
|
@_dumb_key = Server::Signatory._dumb_key
|
930
930
|
@_normal_key = Server::Signatory._normal_key
|
@@ -981,7 +981,7 @@ module OpenID
|
|
981
981
|
|
982
982
|
def test_forgotStore
|
983
983
|
@encoder.signatory = nil
|
984
|
-
|
984
|
+
assert_raises(ArgumentError) {
|
985
985
|
@encode.call(@response)
|
986
986
|
}
|
987
987
|
end
|
@@ -1019,13 +1019,13 @@ module OpenID
|
|
1019
1019
|
|
1020
1020
|
def test_alreadySigned
|
1021
1021
|
@response.fields.set_arg(OPENID_NS, 'sig', 'priorSig==')
|
1022
|
-
|
1022
|
+
assert_raises(Server::AlreadySigned) {
|
1023
1023
|
@encode.call(@response)
|
1024
1024
|
}
|
1025
1025
|
end
|
1026
1026
|
end
|
1027
1027
|
|
1028
|
-
class TestCheckID < Test
|
1028
|
+
class TestCheckID < Minitest::Test
|
1029
1029
|
def setup
|
1030
1030
|
@op_endpoint = 'http://endpoint.unittest/'
|
1031
1031
|
@store = Store::Memory.new()
|
@@ -1184,7 +1184,7 @@ module OpenID
|
|
1184
1184
|
@request.identity = nil
|
1185
1185
|
# XXX - Check on this, I think this behavior is legal in OpenID
|
1186
1186
|
# 2.0?
|
1187
|
-
|
1187
|
+
assert_raises(ArgumentError) {
|
1188
1188
|
@request.answer(true, nil, "=V")
|
1189
1189
|
}
|
1190
1190
|
end
|
@@ -1198,7 +1198,7 @@ module OpenID
|
|
1198
1198
|
|
1199
1199
|
def test_answerAllowWithNoIdentity
|
1200
1200
|
@request.identity = IDENTIFIER_SELECT
|
1201
|
-
|
1201
|
+
assert_raises(ArgumentError) {
|
1202
1202
|
@request.answer(true, nil, nil)
|
1203
1203
|
}
|
1204
1204
|
end
|
@@ -1225,7 +1225,7 @@ module OpenID
|
|
1225
1225
|
@request.mode = 'checkid_immediate'
|
1226
1226
|
@request.op_endpoint = nil
|
1227
1227
|
|
1228
|
-
|
1228
|
+
assert_raises(ArgumentError) {
|
1229
1229
|
@request.answer(false)
|
1230
1230
|
}
|
1231
1231
|
end
|
@@ -1240,7 +1240,7 @@ module OpenID
|
|
1240
1240
|
server_url = "http://server.com/server"
|
1241
1241
|
|
1242
1242
|
url = @request.encode_to_url(server_url)
|
1243
|
-
assert(url.
|
1243
|
+
assert(url.start_with?(server_url))
|
1244
1244
|
|
1245
1245
|
_, query = url.split("?", 2)
|
1246
1246
|
args = Util.parse_query(query)
|
@@ -1272,7 +1272,7 @@ module OpenID
|
|
1272
1272
|
@request.identity = IDENTIFIER_SELECT
|
1273
1273
|
selected_id = 'http://anon.unittest/9861'
|
1274
1274
|
claimed_id = 'http://monkeyhat.unittest/'
|
1275
|
-
|
1275
|
+
assert_raises(Server::VersionError) {
|
1276
1276
|
@request.answer(true, nil, selected_id, claimed_id)
|
1277
1277
|
}
|
1278
1278
|
end
|
@@ -1280,7 +1280,7 @@ module OpenID
|
|
1280
1280
|
def test_answerAllowWithAnotherIdentity
|
1281
1281
|
# XXX - Check on this, I think this behavior is legal in OpenID
|
1282
1282
|
# 2.0?
|
1283
|
-
|
1283
|
+
assert_raises(ArgumentError){
|
1284
1284
|
@request.answer(true, nil, "http://pebbles.unittest/")
|
1285
1285
|
}
|
1286
1286
|
end
|
@@ -1288,14 +1288,14 @@ module OpenID
|
|
1288
1288
|
def test_answerAllowNoIdentityOpenID1
|
1289
1289
|
@request.message = Message.new(OPENID1_NS)
|
1290
1290
|
@request.identity = nil
|
1291
|
-
|
1291
|
+
assert_raises(ArgumentError) {
|
1292
1292
|
@request.answer(true, nil, nil)
|
1293
1293
|
}
|
1294
1294
|
end
|
1295
1295
|
|
1296
1296
|
def test_answerAllowForgotEndpoint
|
1297
1297
|
@request.op_endpoint = nil
|
1298
|
-
|
1298
|
+
assert_raises(RuntimeError) {
|
1299
1299
|
@request.answer(true)
|
1300
1300
|
}
|
1301
1301
|
end
|
@@ -1307,7 +1307,7 @@ module OpenID
|
|
1307
1307
|
msg.set_arg(OPENID_NS, 'mode', 'checkid_setup')
|
1308
1308
|
msg.set_arg(OPENID_NS, 'assoc_handle', 'bogus')
|
1309
1309
|
|
1310
|
-
|
1310
|
+
assert_raises(Server::ProtocolError) {
|
1311
1311
|
Server::CheckIDRequest.from_message(msg, @server)
|
1312
1312
|
}
|
1313
1313
|
end
|
@@ -1318,7 +1318,7 @@ module OpenID
|
|
1318
1318
|
msg.set_arg(OPENID_NS, 'return_to', 'http://invalid:8000/rt')
|
1319
1319
|
msg.set_arg(OPENID_NS, 'claimed_id', 'https://example.myopenid.com')
|
1320
1320
|
|
1321
|
-
|
1321
|
+
assert_raises(Server::ProtocolError) {
|
1322
1322
|
Server::CheckIDRequest.from_message(msg, @server)
|
1323
1323
|
}
|
1324
1324
|
end
|
@@ -1329,7 +1329,7 @@ module OpenID
|
|
1329
1329
|
msg.set_arg(OPENID_NS, 'return_to', 'http://invalid:8000/rt')
|
1330
1330
|
msg.set_arg(OPENID_NS, 'identity', 'https://example.myopenid.com')
|
1331
1331
|
|
1332
|
-
|
1332
|
+
assert_raises(Server::ProtocolError) {
|
1333
1333
|
Server::CheckIDRequest.from_message(msg, @server)
|
1334
1334
|
}
|
1335
1335
|
end
|
@@ -1423,7 +1423,7 @@ module OpenID
|
|
1423
1423
|
assert_equal('id_res', answer.fields.get_arg(OPENID_NS, 'mode'))
|
1424
1424
|
|
1425
1425
|
usu = answer.fields.get_arg(OPENID_NS, 'user_setup_url', '')
|
1426
|
-
assert(usu.
|
1426
|
+
assert(usu.start_with?(server_url))
|
1427
1427
|
expected_substr = 'openid.claimed_id=http%3A%2F%2Fclaimed-id.test%2F'
|
1428
1428
|
assert(!usu.index(expected_substr).nil?, usu)
|
1429
1429
|
end
|
@@ -1466,7 +1466,7 @@ module OpenID
|
|
1466
1466
|
def test_getCancelURLimmed
|
1467
1467
|
@request.mode = 'checkid_immediate'
|
1468
1468
|
@request.immediate = true
|
1469
|
-
|
1469
|
+
assert_raises(ArgumentError) {
|
1470
1470
|
@request.cancel_url
|
1471
1471
|
}
|
1472
1472
|
end
|
@@ -1497,7 +1497,7 @@ module OpenID
|
|
1497
1497
|
end
|
1498
1498
|
end
|
1499
1499
|
|
1500
|
-
class TestCheckIDExtension < Test
|
1500
|
+
class TestCheckIDExtension < Minitest::Test
|
1501
1501
|
|
1502
1502
|
def setup
|
1503
1503
|
@op_endpoint = 'http://endpoint.unittest/ext'
|
@@ -1574,7 +1574,7 @@ module OpenID
|
|
1574
1574
|
end
|
1575
1575
|
end
|
1576
1576
|
|
1577
|
-
class TestCheckAuth < Test
|
1577
|
+
class TestCheckAuth < Minitest::Test
|
1578
1578
|
def setup
|
1579
1579
|
@assoc_handle = 'mooooooooo'
|
1580
1580
|
@message = Message.from_post_args({
|
@@ -1644,7 +1644,7 @@ module OpenID
|
|
1644
1644
|
end
|
1645
1645
|
end
|
1646
1646
|
|
1647
|
-
class TestAssociate < Test
|
1647
|
+
class TestAssociate < Minitest::Test
|
1648
1648
|
# TODO: test DH with non-default values for modulus and gen.
|
1649
1649
|
# (important to do because we actually had it broken for a while.)
|
1650
1650
|
|
@@ -1720,7 +1720,7 @@ module OpenID
|
|
1720
1720
|
|
1721
1721
|
bad_request_argss.each { |request_args|
|
1722
1722
|
message = Message.from_post_args(request_args)
|
1723
|
-
|
1723
|
+
assert_raises(Server::ProtocolError) {
|
1724
1724
|
Server::AssociateRequest.from_message(message)
|
1725
1725
|
}
|
1726
1726
|
}
|
@@ -1745,7 +1745,7 @@ module OpenID
|
|
1745
1745
|
|
1746
1746
|
bad_request_argss.each { |request_args|
|
1747
1747
|
message = Message.from_post_args(request_args)
|
1748
|
-
|
1748
|
+
assert_raises(Server::ProtocolError) {
|
1749
1749
|
Server::AssociateRequest.from_message(message)
|
1750
1750
|
}
|
1751
1751
|
}
|
@@ -1906,7 +1906,7 @@ module OpenID
|
|
1906
1906
|
# the request was an OpenID 1 request.
|
1907
1907
|
m = Message.new(OPENID1_NS)
|
1908
1908
|
|
1909
|
-
|
1909
|
+
assert_raises(Server::ProtocolError) {
|
1910
1910
|
@request.answer_unsupported(m)
|
1911
1911
|
}
|
1912
1912
|
end
|
@@ -1915,7 +1915,7 @@ module OpenID
|
|
1915
1915
|
class UnhandledError < Exception
|
1916
1916
|
end
|
1917
1917
|
|
1918
|
-
class TestServer < Test
|
1918
|
+
class TestServer < Minitest::Test
|
1919
1919
|
include TestUtil
|
1920
1920
|
|
1921
1921
|
def setup
|
@@ -1928,7 +1928,7 @@ module OpenID
|
|
1928
1928
|
request = Server::OpenIDRequest.new()
|
1929
1929
|
request.mode = "monkeymode"
|
1930
1930
|
request.message = Message.new(OPENID1_NS)
|
1931
|
-
|
1931
|
+
assert_raises(RuntimeError) {
|
1932
1932
|
@server.handle_request(request)
|
1933
1933
|
}
|
1934
1934
|
end
|
@@ -1952,7 +1952,7 @@ module OpenID
|
|
1952
1952
|
request = Server::OpenIDRequest.new()
|
1953
1953
|
request.mode = "monkeymode"
|
1954
1954
|
request.message = Message.new(OPENID1_NS)
|
1955
|
-
|
1955
|
+
assert_raises(UnhandledError) {
|
1956
1956
|
@server.handle_request(request)
|
1957
1957
|
}
|
1958
1958
|
end
|
@@ -2071,7 +2071,7 @@ module OpenID
|
|
2071
2071
|
attr_accessor :assoc_handle, :namespace
|
2072
2072
|
end
|
2073
2073
|
|
2074
|
-
class TestSignatory < Test
|
2074
|
+
class TestSignatory < Minitest::Test
|
2075
2075
|
include TestUtil
|
2076
2076
|
|
2077
2077
|
def setup
|
@@ -2393,7 +2393,7 @@ module OpenID
|
|
2393
2393
|
end
|
2394
2394
|
end
|
2395
2395
|
|
2396
|
-
class RunthroughTestCase < Test
|
2396
|
+
class RunthroughTestCase < Minitest::Test
|
2397
2397
|
def setup
|
2398
2398
|
@store = Store::Memory.new
|
2399
2399
|
@server = Server::Server.new(@store, "http://example.com/openid/server")
|