test/logoutrequest_test.rb in kl-ruby-saml-0.0.4 vs test/logoutrequest_test.rb in kl-ruby-saml-0.0.5
- old
+ new
@@ -101,12 +101,12 @@
assert_match %r[<ds:DigestMethod Algorithm='http://www.w3.org/2000/09/xmldsig#sha1'/>], inflated
end
it "create a signed logout request with 256 digest and signature method" do
settings.compress_request = false
- settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA256
- settings.security[:digest_method] = XMLSecurity::Document::SHA256
+ settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA256
+ settings.security[:digest_method] = KlXMLSecurity::Document::SHA256
params = OneLogin::KlRubySaml::Logoutrequest.new.create_params(settings)
request_xml = Base64.decode64(params["SAMLRequest"])
assert_match %r[<ds:SignatureValue>([a-zA-Z0-9/+=]+)</ds:SignatureValue>], request_xml
@@ -114,12 +114,12 @@
assert_match %r[<ds:DigestMethod Algorithm='http://www.w3.org/2001/04/xmldsig-more#sha256'/>], request_xml
end
it "create a signed logout request with 512 digest and signature method RSA_SHA384" do
settings.compress_request = false
- settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA384
- settings.security[:digest_method] = XMLSecurity::Document::SHA512
+ settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA384
+ settings.security[:digest_method] = KlXMLSecurity::Document::SHA512
params = OneLogin::KlRubySaml::Logoutrequest.new.create_params(settings)
request_xml = Base64.decode64(params["SAMLRequest"])
assert_match %r[<ds:SignatureValue>([a-zA-Z0-9/+=]+)</ds:SignatureValue>], request_xml
@@ -139,70 +139,70 @@
settings.certificate = ruby_saml_cert_text
settings.private_key = ruby_saml_key_text
end
it "create a signature parameter with RSA_SHA1 / SHA1 and validate it" do
- settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA1
+ settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA1
params = OneLogin::KlRubySaml::Logoutrequest.new.create_params(settings, :RelayState => 'http://example.com')
assert params['SAMLRequest']
assert params[:RelayState]
assert params['Signature']
- assert_equal params['SigAlg'], XMLSecurity::Document::RSA_SHA1
+ assert_equal params['SigAlg'], KlXMLSecurity::Document::RSA_SHA1
query_string = "SAMLRequest=#{CGI.escape(params['SAMLRequest'])}"
query_string << "&RelayState=#{CGI.escape(params[:RelayState])}"
query_string << "&SigAlg=#{CGI.escape(params['SigAlg'])}"
- signature_algorithm = XMLSecurity::BaseDocument.new.algorithm(params['SigAlg'])
+ signature_algorithm = KlXMLSecurity::BaseDocument.new.algorithm(params['SigAlg'])
assert_equal signature_algorithm, OpenSSL::Digest::SHA1
assert cert.public_key.verify(signature_algorithm.new, Base64.decode64(params['Signature']), query_string)
end
it "create a signature parameter with RSA_SHA256 / SHA256 and validate it" do
- settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA256
+ settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA256
params = OneLogin::KlRubySaml::Logoutrequest.new.create_params(settings, :RelayState => 'http://example.com')
assert params['Signature']
- assert_equal params['SigAlg'], XMLSecurity::Document::RSA_SHA256
+ assert_equal params['SigAlg'], KlXMLSecurity::Document::RSA_SHA256
query_string = "SAMLRequest=#{CGI.escape(params['SAMLRequest'])}"
query_string << "&RelayState=#{CGI.escape(params[:RelayState])}"
query_string << "&SigAlg=#{CGI.escape(params['SigAlg'])}"
- signature_algorithm = XMLSecurity::BaseDocument.new.algorithm(params['SigAlg'])
+ signature_algorithm = KlXMLSecurity::BaseDocument.new.algorithm(params['SigAlg'])
assert_equal signature_algorithm, OpenSSL::Digest::SHA256
assert cert.public_key.verify(signature_algorithm.new, Base64.decode64(params['Signature']), query_string)
end
it "create a signature parameter with RSA_SHA384 / SHA384 and validate it" do
- settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA384
+ settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA384
params = OneLogin::KlRubySaml::Logoutrequest.new.create_params(settings, :RelayState => 'http://example.com')
assert params['Signature']
- assert_equal params['SigAlg'], XMLSecurity::Document::RSA_SHA384
+ assert_equal params['SigAlg'], KlXMLSecurity::Document::RSA_SHA384
query_string = "SAMLRequest=#{CGI.escape(params['SAMLRequest'])}"
query_string << "&RelayState=#{CGI.escape(params[:RelayState])}"
query_string << "&SigAlg=#{CGI.escape(params['SigAlg'])}"
- signature_algorithm = XMLSecurity::BaseDocument.new.algorithm(params['SigAlg'])
+ signature_algorithm = KlXMLSecurity::BaseDocument.new.algorithm(params['SigAlg'])
assert_equal signature_algorithm, OpenSSL::Digest::SHA384
assert cert.public_key.verify(signature_algorithm.new, Base64.decode64(params['Signature']), query_string)
end
it "create a signature parameter with RSA_SHA512 / SHA512 and validate it" do
- settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA512
+ settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA512
params = OneLogin::KlRubySaml::Logoutrequest.new.create_params(settings, :RelayState => 'http://example.com')
assert params['Signature']
- assert_equal params['SigAlg'], XMLSecurity::Document::RSA_SHA512
+ assert_equal params['SigAlg'], KlXMLSecurity::Document::RSA_SHA512
query_string = "SAMLRequest=#{CGI.escape(params['SAMLRequest'])}"
query_string << "&RelayState=#{CGI.escape(params[:RelayState])}"
query_string << "&SigAlg=#{CGI.escape(params['SigAlg'])}"
- signature_algorithm = XMLSecurity::BaseDocument.new.algorithm(params['SigAlg'])
+ signature_algorithm = KlXMLSecurity::BaseDocument.new.algorithm(params['SigAlg'])
assert_equal signature_algorithm, OpenSSL::Digest::SHA512
assert cert.public_key.verify(signature_algorithm.new, Base64.decode64(params['Signature']), query_string)
end
end