ruby-saml 1.1.1 → 1.1.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of ruby-saml might be problematic. Click here for more details.

data/README.md CHANGED
@@ -102,7 +102,7 @@ To override the default behavior and control the destination of log messages, pr
102
102
  a ruby Logger object to the gem's logging singleton:
103
103
 
104
104
  ```ruby
105
- OneLogin::RubySaml::Logging.logger = Logger.new(File.open('/var/log/ruby-saml.log', 'w')
105
+ OneLogin::RubySaml::Logging.logger = Logger.new(File.open('/var/log/ruby-saml.log', 'w'))
106
106
  ```
107
107
 
108
108
  ## The Initialization Phase
@@ -252,9 +252,9 @@ def saml_settings
252
252
  end
253
253
  ```
254
254
  The following attributes are set:
255
- * id_sso_target_url
255
+ * idp_sso_target_url
256
256
  * idp_slo_target_url
257
- * id_cert_fingerpint
257
+ * idp_cert_fingerpint
258
258
 
259
259
  If you are using saml:AttributeStatement to transfer metadata, like the user name, you can access all the attributes through response.attributes. It contains all the saml:AttributeStatement with its 'Name' as a indifferent key the one/more saml:AttributeValue as value. The value returned depends on the value of the
260
260
  `single_value_compatibility` (when activate, only one value returned, the first one)
@@ -1,5 +1,14 @@
1
1
  # RubySaml Changelog
2
2
 
3
+ ### 1.1.2 (February 15, 2015)
4
+ * Improve signature validation. Add tests.
5
+ [#302](https://github.com/onelogin/ruby-saml/pull/302) Add Destination validation.
6
+ * [#292](https://github.com/onelogin/ruby-saml/pull/292) Improve the error message when validating the audience.
7
+ * [#287](https://github.com/onelogin/ruby-saml/pull/287) Keep the extracted certificate when parsing IdP metadata.
8
+
9
+ ### 1.1.1 (November 10, 2015)
10
+ * [#275](https://github.com/onelogin/ruby-saml/pull/275) Fix a bug on signature validations that invalidates valid SAML messages.
11
+
3
12
  ### 1.1.0 (October 27, 2015)
4
13
  * [#273](https://github.com/onelogin/ruby-saml/pull/273) Support SAMLResponse without ds:x509certificate
5
14
  * [#270](https://github.com/onelogin/ruby-saml/pull/270) Allow SAML elements to come from any namespace (at decryption process)
@@ -44,6 +44,7 @@ module OneLogin
44
44
  settings.name_identifier_format = idp_name_id_format
45
45
  settings.idp_sso_target_url = single_signon_service_url
46
46
  settings.idp_slo_target_url = single_logout_service_url
47
+ settings.idp_cert = certificate_base64
47
48
  settings.idp_cert_fingerprint = fingerprint
48
49
  end
49
50
  end
@@ -133,19 +134,28 @@ module OneLogin
133
134
  node.value if node
134
135
  end
135
136
 
137
+ # @return [String|nil] Unformatted Certificate if exists
138
+ #
139
+ def certificate_base64
140
+ @certificate_base64 ||= begin
141
+ node = REXML::XPath.first(
142
+ document,
143
+ "/md:EntityDescriptor/md:IDPSSODescriptor/md:KeyDescriptor[@use='signing']/ds:KeyInfo/ds:X509Data/ds:X509Certificate",
144
+ { "md" => METADATA, "ds" => DSIG }
145
+ )
146
+ node.text if node
147
+ end
148
+ end
149
+
136
150
  # @return [String|nil] X509Certificate if exists
137
151
  #
138
152
  def certificate
139
153
  @certificate ||= begin
140
- node = REXML::XPath.first(
141
- document,
142
- "/md:EntityDescriptor/md:IDPSSODescriptor/md:KeyDescriptor[@use='signing']/ds:KeyInfo/ds:X509Data/ds:X509Certificate",
143
- { "md" => METADATA, "ds" => DSIG }
144
- )
145
- Base64.decode64(node.text) if node
154
+ Base64.decode64(certificate_base64) if certificate_base64
146
155
  end
147
156
  end
148
157
 
158
+
149
159
  # @return [String|nil] the SHA-1 fingerpint of the X509Certificate if it exists
150
160
  #
151
161
  def fingerprint
@@ -254,6 +254,19 @@ module OneLogin
254
254
  end
255
255
  end
256
256
 
257
+ # @return [String|nil] Destination attribute from the SAML Response.
258
+ #
259
+ def destination
260
+ @destination ||= begin
261
+ node = REXML::XPath.first(
262
+ document,
263
+ "/p:Response",
264
+ { "p" => PROTOCOL }
265
+ )
266
+ node.nil? ? nil : node.attributes['Destination']
267
+ end
268
+ end
269
+
257
270
  # @return [Array] The Audience elements from the Contitions of the SAML Response.
258
271
  #
259
272
  def audiences
@@ -295,6 +308,7 @@ module OneLogin
295
308
  validate_in_response_to &&
296
309
  validate_conditions &&
297
310
  validate_audience &&
311
+ validate_destination &&
298
312
  validate_issuer &&
299
313
  validate_session_expiration &&
300
314
  validate_subject_confirmation &&
@@ -454,7 +468,22 @@ module OneLogin
454
468
  return true if audiences.empty? || settings.issuer.nil? || settings.issuer.empty?
455
469
 
456
470
  unless audiences.include? settings.issuer
457
- error_msg = "#{settings.issuer} is not a valid audience for this Response"
471
+ error_msg = "#{settings.issuer} is not a valid audience for this Response - Valid audiences: #{audiences.join(',')}"
472
+ return append_error(error_msg)
473
+ end
474
+
475
+ true
476
+ end
477
+
478
+ # Validates the Destination, (If the SAML Response is received where expected)
479
+ # If fails, the error is added to the errors array
480
+ # @return [Boolean] True if there is a Destination element that matches the Consumer Service URL, otherwise False
481
+ #
482
+ def validate_destination
483
+ return true if destination.nil? || destination.empty? || settings.assertion_consumer_service_url.nil? || settings.assertion_consumer_service_url.empty?
484
+
485
+ unless destination == settings.assertion_consumer_service_url
486
+ error_msg = "The response was received at #{destination} instead of #{settings.assertion_consumer_service_url}"
458
487
  return append_error(error_msg)
459
488
  end
460
489
 
@@ -571,25 +600,38 @@ module OneLogin
571
600
  # @raise [ValidationError] if soft == false and validation fails
572
601
  #
573
602
  def validate_signature
574
- fingerprint = settings.get_fingerprint
575
- idp_cert = settings.get_idp_cert
603
+ error_msg = "Invalid Signature on SAML Response"
576
604
 
577
605
  # If the response contains the signature, and the assertion was encrypted, validate the original SAML Response
578
606
  # otherwise, review if the decrypted assertion contains a signature
579
- response_signed = REXML::XPath.first(
607
+ sig_elements = REXML::XPath.match(
580
608
  document,
581
- "/p:Response[@ID=$id]",
582
- { "p" => PROTOCOL, "ds" => DSIG },
583
- { 'id' => document.signed_element_id }
609
+ "/p:Response/ds:Signature]",
610
+ { "p" => PROTOCOL, "ds" => DSIG }
584
611
  )
585
- doc = (response_signed || decrypted_document.nil?) ? document : decrypted_document
612
+
613
+ use_original = sig_elements.size == 1 || decrypted_document.nil?
614
+ doc = use_original ? document : decrypted_document
615
+
616
+ # Check signature nodes
617
+ if sig_elements.nil? || sig_elements.size == 0
618
+ sig_elements = REXML::XPath.match(
619
+ doc,
620
+ "/p:Response/a:Assertion/ds:Signature",
621
+ {"p" => PROTOCOL, "a" => ASSERTION, "ds"=>DSIG}
622
+ )
623
+ end
624
+
625
+ if sig_elements.size != 1
626
+ return append_error(error_msg)
627
+ end
586
628
 
587
629
  opts = {}
588
630
  opts[:fingerprint_alg] = settings.idp_cert_fingerprint_algorithm
589
- opts[:cert] = idp_cert
631
+ opts[:cert] = settings.get_idp_cert
632
+ fingerprint = settings.get_fingerprint
590
633
 
591
- unless fingerprint && doc.validate_document(fingerprint, @soft, opts)
592
- error_msg = "Invalid Signature on SAML Response"
634
+ unless fingerprint && doc.validate_document(fingerprint, @soft, opts)
593
635
  return append_error(error_msg)
594
636
  end
595
637
 
@@ -118,8 +118,8 @@ module OneLogin
118
118
  def get_idp_cert
119
119
  return nil if idp_cert.nil? || idp_cert.empty?
120
120
 
121
- formated_cert = OneLogin::RubySaml::Utils.format_cert(idp_cert)
122
- OpenSSL::X509::Certificate.new(formated_cert)
121
+ formatted_cert = OneLogin::RubySaml::Utils.format_cert(idp_cert)
122
+ OpenSSL::X509::Certificate.new(formatted_cert)
123
123
  end
124
124
 
125
125
  # @return [OpenSSL::X509::Certificate|nil] Build the SP certificate from the settings (previously format it)
@@ -127,8 +127,8 @@ module OneLogin
127
127
  def get_sp_cert
128
128
  return nil if certificate.nil? || certificate.empty?
129
129
 
130
- formated_cert = OneLogin::RubySaml::Utils.format_cert(certificate)
131
- OpenSSL::X509::Certificate.new(formated_cert)
130
+ formatted_cert = OneLogin::RubySaml::Utils.format_cert(certificate)
131
+ OpenSSL::X509::Certificate.new(formatted_cert)
132
132
  end
133
133
 
134
134
  # @return [OpenSSL::PKey::RSA] Build the SP private from the settings (previously format it)
@@ -65,7 +65,7 @@ module OneLogin
65
65
  # @option params [OpenSSL::X509::Certificate] cert The Identity provider public certtificate
66
66
  # @option params [String] sig_alg The SigAlg parameter
67
67
  # @option params [String] signature The Signature parameter (base64 encoded)
68
- # @option params [String] query_string The SigAlg parameter
68
+ # @option params [String] query_string The full GET Query String to be compared
69
69
  # @return [Boolean] True if the Signature is valid, False otherwise
70
70
  #
71
71
  def self.verify_signature(params)
@@ -1,5 +1,5 @@
1
1
  module OneLogin
2
2
  module RubySaml
3
- VERSION = '1.1.1'
3
+ VERSION = '1.1.2'
4
4
  end
5
5
  end
@@ -204,7 +204,7 @@ class RubySamlTest < Minitest::Test
204
204
  settings.issuer = 'invalid'
205
205
  response_valid_signed.settings = settings
206
206
  response_valid_signed.soft = false
207
- error_msg = "#{response_valid_signed.settings.issuer} is not a valid audience for this Response"
207
+ error_msg = "#{response_valid_signed.settings.issuer} is not a valid audience for this Response - Valid audiences: https://someone.example.com/audience"
208
208
  assert_raises(OneLogin::RubySaml::ValidationError, error_msg) do
209
209
  response_valid_signed.is_valid?
210
210
  end
@@ -368,7 +368,7 @@ class RubySamlTest < Minitest::Test
368
368
  settings.issuer = 'invalid'
369
369
  response_valid_signed.settings = settings
370
370
  response_valid_signed.is_valid?
371
- assert_includes response_valid_signed.errors, "#{response_valid_signed.settings.issuer} is not a valid audience for this Response"
371
+ assert_includes response_valid_signed.errors, "#{response_valid_signed.settings.issuer} is not a valid audience for this Response - Valid audiences: https://someone.example.com/audience"
372
372
  end
373
373
 
374
374
  it "return false when no ID present in the SAML Response" do
@@ -411,7 +411,22 @@ class RubySamlTest < Minitest::Test
411
411
  response.settings = settings
412
412
  response.settings.issuer = 'invalid_audience'
413
413
  assert !response.send(:validate_audience)
414
- assert_includes response.errors, "#{response.settings.issuer} is not a valid audience for this Response"
414
+ assert_includes response.errors, "#{response.settings.issuer} is not a valid audience for this Response - Valid audiences: {audience}"
415
+ end
416
+ end
417
+
418
+ describe "#validate_destination" do
419
+ it "return true when the destination of the SAML Response matches the assertion consumer service url" do
420
+ response.settings = settings
421
+ assert response.send(:validate_destination)
422
+ assert_empty response.errors
423
+ end
424
+
425
+ it "return false when the destination of the SAML Response does not match the assertion consumer service url" do
426
+ response.settings = settings
427
+ response.settings.assertion_consumer_service_url = 'invalid_acs'
428
+ assert !response.send(:validate_destination)
429
+ assert_includes response.errors, "The response was received at #{response.destination} instead of #{response.settings.assertion_consumer_service_url}"
415
430
  end
416
431
  end
417
432
 
@@ -551,7 +566,7 @@ class RubySamlTest < Minitest::Test
551
566
  response_invalid_audience.settings = settings
552
567
  response_invalid_audience.settings.issuer = "https://invalid.example.com/audience"
553
568
  assert !response_invalid_audience.send(:validate_audience)
554
- assert_includes response_invalid_audience.errors, "#{response_invalid_audience.settings.issuer} is not a valid audience for this Response"
569
+ assert_includes response_invalid_audience.errors, "#{response_invalid_audience.settings.issuer} is not a valid audience for this Response - Valid audiences: http://invalid.audience.com"
555
570
  end
556
571
  end
557
572
 
@@ -729,6 +744,17 @@ class RubySamlTest < Minitest::Test
729
744
  assert response_valid_signed_without_x509certificate.send(:validate_signature)
730
745
  assert_empty response_valid_signed_without_x509certificate.errors
731
746
  end
747
+
748
+ it "return false when signature wrapping attack" do
749
+ signature_wrapping_attack = read_invalid_response("signature_wrapping_attack.xml.base64")
750
+ response_wrapped = OneLogin::RubySaml::Response.new(signature_wrapping_attack)
751
+ response_wrapped.stubs(:conditions).returns(nil)
752
+ response_wrapped.stubs(:validate_subject_confirmation).returns(true)
753
+ settings.idp_cert_fingerprint = "afe71c28ef740bc87425be13a2263d37971da1f9"
754
+ response_wrapped.settings = settings
755
+ assert !response_wrapped.send(:validate_signature)
756
+ assert_includes response_wrapped.errors, "Invalid Signature on SAML Response"
757
+ end
732
758
  end
733
759
 
734
760
  describe "#nameid" do
@@ -0,0 +1 @@
1
+ <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="pfxc3d2b542-0f7e-8767-8e87-5b0dc6913375" Version="2.0" IssueInstant="2014-03-21T13:41:09Z" Destination="https://pitbulk.no-ip.org/newonelogin/demo1/index.php?acs" InResponseTo="ONELOGIN_5d9e319c1b8a67da48227964c28d280e7860f804"><saml:Issuer>https://pitbulk.no-ip.org/simplesaml/saml2/idp/metadata.php</saml:Issuer><samlp:Status><samlp:StatusDetail><samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="pfxc3d2b542-0f7e-8767-8e87-5b0dc6913375" Version="2.0" IssueInstant="2014-03-21T13:41:09Z" Destination="https://pitbulk.no-ip.org/newonelogin/demo1/index.php?acs" InResponseTo="ONELOGIN_5d9e319c1b8a67da48227964c28d280e7860f804"><saml:Issuer>https://pitbulk.no-ip.org/simplesaml/saml2/idp/metadata.php</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
    <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
  <ds:Reference URI="#pfxc3d2b542-0f7e-8767-8e87-5b0dc6913375"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/><ds:DigestValue>1dQFiYU0o2OF7c/RVV8Gpgb4u3I=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>wRgBXOq/FiLZc2mureTC/j6zY709OikJ5HeUSruHTdYjEg9aZy1RbxlKIYEIfXpnX7NBoKxfAMm+O0fsrqOjgcYxTVkqZjOr71qiXNbtwjeAkdYSpk5brsAcnfcPdv8QReYr3D7t5ZVCgYuvXQ+dNELKeag7e1ASOzVqOdp5Z9Y=</ds:SignatureValue>
<ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xs="http://www.w3.org/2001/XMLSchema" ID="_cccd6024116641fe48e0ae2c51220d02755f96c98d" Version="2.0" IssueInstant="2014-03-21T13:41:09Z"><saml:Issuer>https://pitbulk.no-ip.org/simplesaml/saml2/idp/metadata.php</saml:Issuer><saml:Subject><saml:NameID SPNameQualifier="https://pitbulk.no-ip.org/newonelogin/demo1/metadata.php" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">_b98f98bb1ab512ced653b58baaff543448daed535d</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData NotOnOrAfter="2023-09-22T19:01:09Z" Recipient="https://pitbulk.no-ip.org/newonelogin/demo1/index.php?acs" InResponseTo="ONELOGIN_5d9e319c1b8a67da48227964c28d280e7860f804"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2014-03-21T13:40:39Z" NotOnOrAfter="2023-09-22T19:01:09Z"><saml:AudienceRestriction><saml:Audience>https://pitbulk.no-ip.org/newonelogin/demo1/metadata.php</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2014-03-21T13:41:09Z" SessionNotOnOrAfter="2014-03-21T21:41:09Z" SessionIndex="_9fe0c8dcd3302e7364fcab22a52748ebf2224df0aa"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:Password</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute Name="uid" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">test</saml:AttributeValue></saml:Attribute><saml:Attribute Name="mail" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">test@example.com</saml:AttributeValue></saml:Attribute><saml:Attribute Name="cn" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">test</saml:AttributeValue></saml:Attribute><saml:Attribute Name="sn" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">waa2</saml:AttributeValue></saml:Attribute><saml:Attribute Name="eduPersonAffiliation" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">user</saml:AttributeValue><saml:AttributeValue xsi:type="xs:string">admin</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response></samlp:StatusDetail><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xs="http://www.w3.org/2001/XMLSchema" ID="_cccd6024116641fe48e0ae2c51220d02755f96c98d" Version="2.0" IssueInstant="2014-03-21T13:41:09Z"><saml:Issuer>https://pitbulk.no-ip.org/simplesaml/saml2/idp/metadata.php</saml:Issuer><saml:Subject><saml:NameID SPNameQualifier="https://pitbulk.no-ip.org/newonelogin/demo1/metadata.php" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">_b98f98bb1ab512ced653b58baaff543448daed535d</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData NotOnOrAfter="2023-09-22T19:01:09Z" Recipient="https://pitbulk.no-ip.org/newonelogin/demo1/index.php?acs" InResponseTo="ONELOGIN_5d9e319c1b8a67da48227964c28d280e7860f804"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2014-03-21T13:40:39Z" NotOnOrAfter="2023-09-22T19:01:09Z"><saml:AudienceRestriction><saml:Audience>https://pitbulk.no-ip.org/newonelogin/demo1/metadata.php</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2014-03-21T13:41:09Z" SessionNotOnOrAfter="2023-03-21T21:41:09Z" SessionIndex="_9fe0c8dcd3302e7364fcab22a52748ebf2224df0aa"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:Password</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute Name="uid" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">hacker</saml:AttributeValue></saml:Attribute><saml:Attribute Name="mail" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">hacker@example.com</saml:AttributeValue></saml:Attribute><saml:Attribute Name="cn" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">hacker</saml:AttributeValue></saml:Attribute><saml:Attribute Name="sn" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">waa2</saml:AttributeValue></saml:Attribute><saml:Attribute Name="eduPersonAffiliation" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">user</saml:AttributeValue><saml:AttributeValue xsi:type="xs:string">admin</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>
@@ -343,6 +343,15 @@ class XmlSecurityTest < Minitest::Test
343
343
  end
344
344
  end
345
345
  end
346
+ describe 'signature_wrapping_attack' do
347
+ let(:document_data) { read_invalid_response("signature_wrapping_attack.xml.base64") }
348
+ let(:document) { OneLogin::RubySaml::Response.new(document_data).document }
349
+ let(:fingerprint) { 'afe71c28ef740bc87425be13a2263d37971da1f9' }
350
+
351
+ it 'is invalid' do
352
+ assert !document.validate_document(fingerprint, true), 'Document should be invalid'
353
+ end
354
+ end
346
355
  end
347
356
  end
348
357
  end
metadata CHANGED
@@ -1,166 +1,188 @@
1
- --- !ruby/object:Gem::Specification
1
+ --- !ruby/object:Gem::Specification
2
2
  name: ruby-saml
3
- version: !ruby/object:Gem::Version
4
- version: 1.1.1
3
+ version: !ruby/object:Gem::Version
4
+ hash: 23
5
+ prerelease: false
6
+ segments:
7
+ - 1
8
+ - 1
9
+ - 2
10
+ version: 1.1.2
5
11
  platform: ruby
6
- authors:
12
+ authors:
7
13
  - OneLogin LLC
8
14
  autorequire:
9
15
  bindir: bin
10
16
  cert_chain: []
11
- date: 2015-11-11 00:00:00.000000000 Z
12
- dependencies:
13
- - !ruby/object:Gem::Dependency
17
+
18
+ date: 2016-02-15 00:00:00 +01:00
19
+ default_executable:
20
+ dependencies:
21
+ - !ruby/object:Gem::Dependency
14
22
  name: uuid
15
- requirement: !ruby/object:Gem::Requirement
16
- requirements:
17
- - - "~>"
18
- - !ruby/object:Gem::Version
19
- version: '2.3'
20
- type: :runtime
21
23
  prerelease: false
22
- version_requirements: !ruby/object:Gem::Requirement
23
- requirements:
24
- - - "~>"
25
- - !ruby/object:Gem::Version
26
- version: '2.3'
27
- - !ruby/object:Gem::Dependency
28
- name: nokogiri
29
- requirement: !ruby/object:Gem::Requirement
30
- requirements:
31
- - - ">="
32
- - !ruby/object:Gem::Version
33
- version: 1.5.10
24
+ requirement: &id001 !ruby/object:Gem::Requirement
25
+ none: false
26
+ requirements:
27
+ - - ~>
28
+ - !ruby/object:Gem::Version
29
+ hash: 5
30
+ segments:
31
+ - 2
32
+ - 3
33
+ version: "2.3"
34
34
  type: :runtime
35
+ version_requirements: *id001
36
+ - !ruby/object:Gem::Dependency
37
+ name: nokogiri
35
38
  prerelease: false
36
- version_requirements: !ruby/object:Gem::Requirement
37
- requirements:
39
+ requirement: &id002 !ruby/object:Gem::Requirement
40
+ none: false
41
+ requirements:
38
42
  - - ">="
39
- - !ruby/object:Gem::Version
43
+ - !ruby/object:Gem::Version
44
+ hash: 23
45
+ segments:
46
+ - 1
47
+ - 5
48
+ - 10
40
49
  version: 1.5.10
41
- - !ruby/object:Gem::Dependency
50
+ type: :runtime
51
+ version_requirements: *id002
52
+ - !ruby/object:Gem::Dependency
42
53
  name: minitest
43
- requirement: !ruby/object:Gem::Requirement
44
- requirements:
45
- - - "~>"
46
- - !ruby/object:Gem::Version
47
- version: '5.5'
48
- type: :development
49
54
  prerelease: false
50
- version_requirements: !ruby/object:Gem::Requirement
51
- requirements:
52
- - - "~>"
53
- - !ruby/object:Gem::Version
54
- version: '5.5'
55
- - !ruby/object:Gem::Dependency
56
- name: mocha
57
- requirement: !ruby/object:Gem::Requirement
58
- requirements:
59
- - - "~>"
60
- - !ruby/object:Gem::Version
61
- version: '0.14'
55
+ requirement: &id003 !ruby/object:Gem::Requirement
56
+ none: false
57
+ requirements:
58
+ - - ~>
59
+ - !ruby/object:Gem::Version
60
+ hash: 21
61
+ segments:
62
+ - 5
63
+ - 5
64
+ version: "5.5"
62
65
  type: :development
66
+ version_requirements: *id003
67
+ - !ruby/object:Gem::Dependency
68
+ name: mocha
63
69
  prerelease: false
64
- version_requirements: !ruby/object:Gem::Requirement
65
- requirements:
66
- - - "~>"
67
- - !ruby/object:Gem::Version
68
- version: '0.14'
69
- - !ruby/object:Gem::Dependency
70
- name: rake
71
- requirement: !ruby/object:Gem::Requirement
72
- requirements:
73
- - - "~>"
74
- - !ruby/object:Gem::Version
75
- version: '10'
70
+ requirement: &id004 !ruby/object:Gem::Requirement
71
+ none: false
72
+ requirements:
73
+ - - ~>
74
+ - !ruby/object:Gem::Version
75
+ hash: 23
76
+ segments:
77
+ - 0
78
+ - 14
79
+ version: "0.14"
76
80
  type: :development
81
+ version_requirements: *id004
82
+ - !ruby/object:Gem::Dependency
83
+ name: rake
77
84
  prerelease: false
78
- version_requirements: !ruby/object:Gem::Requirement
79
- requirements:
80
- - - "~>"
81
- - !ruby/object:Gem::Version
82
- version: '10'
83
- - !ruby/object:Gem::Dependency
84
- name: shoulda
85
- requirement: !ruby/object:Gem::Requirement
86
- requirements:
87
- - - "~>"
88
- - !ruby/object:Gem::Version
89
- version: '2.11'
85
+ requirement: &id005 !ruby/object:Gem::Requirement
86
+ none: false
87
+ requirements:
88
+ - - ~>
89
+ - !ruby/object:Gem::Version
90
+ hash: 23
91
+ segments:
92
+ - 10
93
+ version: "10"
90
94
  type: :development
95
+ version_requirements: *id005
96
+ - !ruby/object:Gem::Dependency
97
+ name: shoulda
91
98
  prerelease: false
92
- version_requirements: !ruby/object:Gem::Requirement
93
- requirements:
94
- - - "~>"
95
- - !ruby/object:Gem::Version
96
- version: '2.11'
97
- - !ruby/object:Gem::Dependency
98
- name: simplecov
99
- requirement: !ruby/object:Gem::Requirement
100
- requirements:
101
- - - "~>"
102
- - !ruby/object:Gem::Version
103
- version: 0.9.0
99
+ requirement: &id006 !ruby/object:Gem::Requirement
100
+ none: false
101
+ requirements:
102
+ - - ~>
103
+ - !ruby/object:Gem::Version
104
+ hash: 21
105
+ segments:
106
+ - 2
107
+ - 11
108
+ version: "2.11"
104
109
  type: :development
110
+ version_requirements: *id006
111
+ - !ruby/object:Gem::Dependency
112
+ name: simplecov
105
113
  prerelease: false
106
- version_requirements: !ruby/object:Gem::Requirement
107
- requirements:
108
- - - "~>"
109
- - !ruby/object:Gem::Version
114
+ requirement: &id007 !ruby/object:Gem::Requirement
115
+ none: false
116
+ requirements:
117
+ - - ~>
118
+ - !ruby/object:Gem::Version
119
+ hash: 59
120
+ segments:
121
+ - 0
122
+ - 9
123
+ - 0
110
124
  version: 0.9.0
111
- - !ruby/object:Gem::Dependency
112
- name: systemu
113
- requirement: !ruby/object:Gem::Requirement
114
- requirements:
115
- - - "~>"
116
- - !ruby/object:Gem::Version
117
- version: '2'
118
125
  type: :development
126
+ version_requirements: *id007
127
+ - !ruby/object:Gem::Dependency
128
+ name: systemu
119
129
  prerelease: false
120
- version_requirements: !ruby/object:Gem::Requirement
121
- requirements:
122
- - - "~>"
123
- - !ruby/object:Gem::Version
124
- version: '2'
125
- - !ruby/object:Gem::Dependency
126
- name: timecop
127
- requirement: !ruby/object:Gem::Requirement
128
- requirements:
129
- - - "<="
130
- - !ruby/object:Gem::Version
131
- version: 0.6.0
130
+ requirement: &id008 !ruby/object:Gem::Requirement
131
+ none: false
132
+ requirements:
133
+ - - ~>
134
+ - !ruby/object:Gem::Version
135
+ hash: 7
136
+ segments:
137
+ - 2
138
+ version: "2"
132
139
  type: :development
140
+ version_requirements: *id008
141
+ - !ruby/object:Gem::Dependency
142
+ name: timecop
133
143
  prerelease: false
134
- version_requirements: !ruby/object:Gem::Requirement
135
- requirements:
136
- - - "<="
137
- - !ruby/object:Gem::Version
144
+ requirement: &id009 !ruby/object:Gem::Requirement
145
+ none: false
146
+ requirements:
147
+ - - <=
148
+ - !ruby/object:Gem::Version
149
+ hash: 7
150
+ segments:
151
+ - 0
152
+ - 6
153
+ - 0
138
154
  version: 0.6.0
139
- - !ruby/object:Gem::Dependency
140
- name: pry-byebug
141
- requirement: !ruby/object:Gem::Requirement
142
- requirements:
143
- - - ">="
144
- - !ruby/object:Gem::Version
145
- version: '0'
146
155
  type: :development
156
+ version_requirements: *id009
157
+ - !ruby/object:Gem::Dependency
158
+ name: ruby-debug
147
159
  prerelease: false
148
- version_requirements: !ruby/object:Gem::Requirement
149
- requirements:
150
- - - ">="
151
- - !ruby/object:Gem::Version
152
- version: '0'
160
+ requirement: &id010 !ruby/object:Gem::Requirement
161
+ none: false
162
+ requirements:
163
+ - - ~>
164
+ - !ruby/object:Gem::Version
165
+ hash: 63
166
+ segments:
167
+ - 0
168
+ - 10
169
+ - 4
170
+ version: 0.10.4
171
+ type: :development
172
+ version_requirements: *id010
153
173
  description: SAML toolkit for Ruby on Rails
154
174
  email: support@onelogin.com
155
175
  executables: []
176
+
156
177
  extensions: []
157
- extra_rdoc_files:
178
+
179
+ extra_rdoc_files:
158
180
  - LICENSE
159
181
  - README.md
160
- files:
161
- - ".document"
162
- - ".gitignore"
163
- - ".travis.yml"
182
+ files:
183
+ - .document
184
+ - .gitignore
185
+ - .travis.yml
164
186
  - Gemfile
165
187
  - LICENSE
166
188
  - README.md
@@ -255,6 +277,7 @@ files:
255
277
  - test/responses/invalids/no_subjectconfirmation_method.xml.base64
256
278
  - test/responses/invalids/response_encrypted_attrs.xml.base64
257
279
  - test/responses/invalids/response_invalid_signed_element.xml.base64
280
+ - test/responses/invalids/signature_wrapping_attack.xml.base64
258
281
  - test/responses/invalids/status_code_responder.xml.base64
259
282
  - test/responses/invalids/status_code_responer_and_msg.xml.base64
260
283
  - test/responses/no_signature_ns.xml
@@ -299,32 +322,43 @@ files:
299
322
  - test/test_helper.rb
300
323
  - test/utils_test.rb
301
324
  - test/xml_security_test.rb
325
+ has_rdoc: true
302
326
  homepage: http://github.com/onelogin/ruby-saml
303
- licenses:
327
+ licenses:
304
328
  - MIT
305
- metadata: {}
306
329
  post_install_message:
307
- rdoc_options:
308
- - "--charset=UTF-8"
309
- require_paths:
330
+ rdoc_options:
331
+ - --charset=UTF-8
332
+ require_paths:
310
333
  - lib
311
- required_ruby_version: !ruby/object:Gem::Requirement
312
- requirements:
334
+ required_ruby_version: !ruby/object:Gem::Requirement
335
+ none: false
336
+ requirements:
313
337
  - - ">="
314
- - !ruby/object:Gem::Version
338
+ - !ruby/object:Gem::Version
339
+ hash: 57
340
+ segments:
341
+ - 1
342
+ - 8
343
+ - 7
315
344
  version: 1.8.7
316
- required_rubygems_version: !ruby/object:Gem::Requirement
317
- requirements:
345
+ required_rubygems_version: !ruby/object:Gem::Requirement
346
+ none: false
347
+ requirements:
318
348
  - - ">="
319
- - !ruby/object:Gem::Version
320
- version: '0'
349
+ - !ruby/object:Gem::Version
350
+ hash: 3
351
+ segments:
352
+ - 0
353
+ version: "0"
321
354
  requirements: []
355
+
322
356
  rubyforge_project: http://www.rubygems.org/gems/ruby-saml
323
- rubygems_version: 2.2.2
357
+ rubygems_version: 1.3.7
324
358
  signing_key:
325
- specification_version: 4
359
+ specification_version: 3
326
360
  summary: SAML Ruby Tookit
327
- test_files:
361
+ test_files:
328
362
  - test/certificates/certificate1
329
363
  - test/certificates/certificate_without_head_foot
330
364
  - test/certificates/formatted_certificate
@@ -380,6 +414,7 @@ test_files:
380
414
  - test/responses/invalids/no_subjectconfirmation_method.xml.base64
381
415
  - test/responses/invalids/response_encrypted_attrs.xml.base64
382
416
  - test/responses/invalids/response_invalid_signed_element.xml.base64
417
+ - test/responses/invalids/signature_wrapping_attack.xml.base64
383
418
  - test/responses/invalids/status_code_responder.xml.base64
384
419
  - test/responses/invalids/status_code_responer_and_msg.xml.base64
385
420
  - test/responses/no_signature_ns.xml
checksums.yaml DELETED
@@ -1,7 +0,0 @@
1
- ---
2
- SHA1:
3
- metadata.gz: 6fb3836e492ba5fa2faa139d8985ff83e87fc8f4
4
- data.tar.gz: 0fd231fd67a7a1bd5cfcf2e7413813e465b0fa54
5
- SHA512:
6
- metadata.gz: a931f544427ae080827ba9a21a2f14115ccd36588a5bd32cbf9017c6989b22878f8f21c87f8cd1c17451f67d8f162a2887b1f50810aba0806e33d15d0d1b61c5
7
- data.tar.gz: 79639d6aa3edd230d080e24a3ce57bda7609ecb9ad460578b7a4ee79b9d904993918a7d5a68d94b1fea13566e625b0c3f386c2626354d658cac09fc5003f79f8