Sha256: 61f0240c57293803cdb366c2ec782752604ba9af9ea4ef7070e179a48c810846
Contents?: true
Size: 1.81 KB
Versions: 8
Compression:
Stored size: 1.81 KB
Contents
# frozen_string_literal: true module Saml module Kit # This module is responsible for # validating the trustworthiness # of a saml document. module Trustable extend ActiveSupport::Concern included do validate :must_have_valid_signature, unless: :signature_verified validate :must_be_registered validate :must_be_trusted end # Returns true when the document has an embedded XML Signature or has # been verified externally. def signed? signature_verified || signature.present? end # @!visibility private def signature @signature ||= Signature.new(at_xpath("/samlp:#{name}/ds:Signature")) end # Returns true when documents is signed and the signing certificate # belongs to a known service entity. def trusted? return true if signature_verified return false unless signed? signature.trusted?(provider) end # @!visibility private def provider registry.metadata_for(issuer) end # @!visibility private def signature_verified! @signature_verified = true end private attr_reader :signature_verified def must_have_valid_signature return if to_xml.blank? return unless signature.present? signature.valid? signature.errors.each do |attribute, error| errors[attribute] << error end end def must_be_registered return unless expected_type? return if provider.present? errors[:provider] << error_message(:unregistered) end def must_be_trusted return if trusted? return if provider.present? && !signed? errors[:fingerprint] << error_message(:invalid_fingerprint) end end end end
Version data entries
8 entries across 8 versions & 1 rubygems