saml2 3.1.5 → 3.1.7

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 1d1d97014a04a384ea5202d3ee1295d3e54419aae9f15126e5fa231a46c70078
4
- data.tar.gz: ce15238854862800449995cdc1b1f3c0e4847ab0724b40921dbc34b7b2caf713
3
+ metadata.gz: a42e449db5b187133933908703402c206e6970a461afe32c341ad415efc99c67
4
+ data.tar.gz: 1eac4f4dd4da460143787f8462f858bd6dec41ed292661c0e3deb3ca6a3752d9
5
5
  SHA512:
6
- metadata.gz: e6debc7315d68e091ab205f1a6c253cc3ffe635cbff997bde1d012ebb46a8a0acdd61763dfe1a105d92204ce36f0be9ee72e554c946834a1112815d3a143231c
7
- data.tar.gz: c36eb127d2fee66656d709677658c00142aed22b99b388f3a29a1b67c6578a2723225b01bcddb38e0e795a531c3955974f2ce6a98b1137c63518ba5819703945
6
+ metadata.gz: 9d465a94aa16d8c0f5b9376004d9ec7c2ad2aac4faddc015735a879c2e910fa7243d6b17d696dae155eebd59ea6468794feefb57a7eba991aa9ef3e75952ff67
7
+ data.tar.gz: c70baefc40e426e0baddbac206bb4695c7b9c86ea2d0dc0ffcff5203070ab84beccb12420aeb0d062728cd2f966ede4574ec25341811e6930792f21a36a529a2
@@ -85,8 +85,8 @@ module SAML2
85
85
  ["unable to validate #{xml&.name || "unrecognized"} condition"]
86
86
  end
87
87
 
88
- def valid?(*args)
89
- validate(*args).empty?
88
+ def valid?(...)
89
+ validate(...).empty?
90
90
  end
91
91
  end
92
92
 
data/lib/saml2/key.rb CHANGED
@@ -29,8 +29,9 @@ module SAML2
29
29
  exponent = crypto_binary_to_integer(rsa_key_value.at_xpath("dsig:Exponent", Namespaces::ALL)&.content&.strip)
30
30
  return unless modulus && exponent
31
31
 
32
- @key = OpenSSL::PKey::RSA.new
33
- key.set_key(modulus, exponent, nil)
32
+ @key = OpenSSL::PKey::RSA.new(
33
+ OpenSSL::ASN1::Sequence([OpenSSL::ASN1::Integer(modulus), OpenSSL::ASN1::Integer(exponent)]).to_der
34
+ )
34
35
  end
35
36
 
36
37
  def x509=(value)
@@ -64,7 +64,7 @@ module SAML2
64
64
  super(sp_sso_descriptor)
65
65
 
66
66
  sp_sso_descriptor.parent["AuthnRequestsSigned"] = authn_requests_signed? unless authn_requests_signed?.nil?
67
- sp_sso_descriptor.parent["WantAssertionsSigned"] = want_assertions_signed? unless authn_requests_signed?.nil?
67
+ sp_sso_descriptor.parent["WantAssertionsSigned"] = want_assertions_signed? unless want_assertions_signed?.nil?
68
68
 
69
69
  assertion_consumer_services.each do |acs|
70
70
  acs.build(sp_sso_descriptor, "AssertionConsumerService")
data/lib/saml2/version.rb CHANGED
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module SAML2
4
- VERSION = "3.1.5"
4
+ VERSION = "3.1.7"
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: saml2
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.1.5
4
+ version: 3.1.7
5
5
  platform: ruby
6
6
  authors:
7
7
  - Cody Cutrer
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2024-02-23 00:00:00.000000000 Z
11
+ date: 2024-04-08 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: activesupport
@@ -244,7 +244,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
244
244
  - !ruby/object:Gem::Version
245
245
  version: '0'
246
246
  requirements: []
247
- rubygems_version: 3.1.6
247
+ rubygems_version: 3.5.6
248
248
  signing_key:
249
249
  specification_version: 4
250
250
  summary: SAML 2.0 Library