test/slo_logoutresponse_test.rb in kl-ruby-saml-0.0.4 vs test/slo_logoutresponse_test.rb in kl-ruby-saml-0.0.5

- old
+ new

@@ -68,24 +68,24 @@ assert_match /<ds:SignatureMethod Algorithm='http:\/\/www.w3.org\/2000\/09\/xmldsig#rsa-sha1'\/>/, response_xml assert_match /<ds:DigestMethod Algorithm='http:\/\/www.w3.org\/2000\/09\/xmldsig#sha1'\/>/, response_xml end it "create a signed logout response with 256 digest and signature methods" do - settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA256 - settings.security[:digest_method] = XMLSecurity::Document::SHA256 + settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA256 + settings.security[:digest_method] = KlXMLSecurity::Document::SHA256 params = OneLogin::KlRubySaml::SloLogoutresponse.new.create_params(settings, logout_request.id, "Custom Logout Message") response_xml = Base64.decode64(params["SAMLResponse"]) assert_match %r[<ds:SignatureValue>([a-zA-Z0-9/+=]+)</ds:SignatureValue>], response_xml assert_match /<ds:SignatureMethod Algorithm='http:\/\/www.w3.org\/2001\/04\/xmldsig-more#rsa-sha256'\/>/, response_xml assert_match /<ds:DigestMethod Algorithm='http:\/\/www.w3.org\/2001\/04\/xmldsig-more#sha256'\/>/, response_xml end it "create a signed logout response with 512 digest and signature method RSA_SHA384" do - settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA384 - settings.security[:digest_method] = XMLSecurity::Document::SHA512 + settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA384 + settings.security[:digest_method] = KlXMLSecurity::Document::SHA512 logout_request.settings = settings params = OneLogin::KlRubySaml::SloLogoutresponse.new.create_params(settings, logout_request.id, "Custom Logout Message") response_xml = Base64.decode64(params["SAMLResponse"]) @@ -104,79 +104,79 @@ settings.security[:logout_responses_signed] = true settings.security[:embed_sign] = false end it "create a signature parameter with RSA_SHA1 and validate it" do - settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA1 + settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA1 params = OneLogin::KlRubySaml::SloLogoutresponse.new.create_params(settings, logout_request.id, "Custom Logout Message", :RelayState => 'http://example.com') assert params['SAMLResponse'] assert params[:RelayState] assert params['Signature'] - assert_equal params['SigAlg'], XMLSecurity::Document::RSA_SHA1 + assert_equal params['SigAlg'], KlXMLSecurity::Document::RSA_SHA1 query_string = "SAMLResponse=#{CGI.escape(params['SAMLResponse'])}" query_string << "&RelayState=#{CGI.escape(params[:RelayState])}" query_string << "&SigAlg=#{CGI.escape(params['SigAlg'])}" - signature_algorithm = XMLSecurity::BaseDocument.new.algorithm(params['SigAlg']) + signature_algorithm = KlXMLSecurity::BaseDocument.new.algorithm(params['SigAlg']) assert_equal signature_algorithm, OpenSSL::Digest::SHA1 assert cert.public_key.verify(signature_algorithm.new, Base64.decode64(params['Signature']), query_string) end it "create a signature parameter with RSA_SHA256 /SHA256 and validate it" do - settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA256 + settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA256 params = OneLogin::KlRubySaml::SloLogoutresponse.new.create_params(settings, logout_request.id, "Custom Logout Message", :RelayState => 'http://example.com') assert params['SAMLResponse'] assert params[:RelayState] assert params['Signature'] - assert_equal params['SigAlg'], XMLSecurity::Document::RSA_SHA256 + assert_equal params['SigAlg'], KlXMLSecurity::Document::RSA_SHA256 query_string = "SAMLResponse=#{CGI.escape(params['SAMLResponse'])}" query_string << "&RelayState=#{CGI.escape(params[:RelayState])}" query_string << "&SigAlg=#{CGI.escape(params['SigAlg'])}" - signature_algorithm = XMLSecurity::BaseDocument.new.algorithm(params['SigAlg']) + signature_algorithm = KlXMLSecurity::BaseDocument.new.algorithm(params['SigAlg']) assert_equal signature_algorithm, OpenSSL::Digest::SHA256 assert cert.public_key.verify(signature_algorithm.new, Base64.decode64(params['Signature']), query_string) end it "create a signature parameter with RSA_SHA384 / SHA384 and validate it" do - settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA384 + settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA384 params = OneLogin::KlRubySaml::SloLogoutresponse.new.create_params(settings, logout_request.id, "Custom Logout Message", :RelayState => 'http://example.com') assert params['SAMLResponse'] assert params[:RelayState] assert params['Signature'] - assert_equal params['SigAlg'], XMLSecurity::Document::RSA_SHA384 + assert_equal params['SigAlg'], KlXMLSecurity::Document::RSA_SHA384 query_string = "SAMLResponse=#{CGI.escape(params['SAMLResponse'])}" query_string << "&RelayState=#{CGI.escape(params[:RelayState])}" query_string << "&SigAlg=#{CGI.escape(params['SigAlg'])}" - signature_algorithm = XMLSecurity::BaseDocument.new.algorithm(params['SigAlg']) + signature_algorithm = KlXMLSecurity::BaseDocument.new.algorithm(params['SigAlg']) assert_equal signature_algorithm, OpenSSL::Digest::SHA384 assert cert.public_key.verify(signature_algorithm.new, Base64.decode64(params['Signature']), query_string) end it "create a signature parameter with RSA_SHA512 / SHA512 and validate it" do - settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA512 + settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA512 params = OneLogin::KlRubySaml::SloLogoutresponse.new.create_params(settings, logout_request.id, "Custom Logout Message", :RelayState => 'http://example.com') assert params['SAMLResponse'] assert params[:RelayState] assert params['Signature'] - assert_equal params['SigAlg'], XMLSecurity::Document::RSA_SHA512 + assert_equal params['SigAlg'], KlXMLSecurity::Document::RSA_SHA512 query_string = "SAMLResponse=#{CGI.escape(params['SAMLResponse'])}" query_string << "&RelayState=#{CGI.escape(params[:RelayState])}" query_string << "&SigAlg=#{CGI.escape(params['SigAlg'])}" - signature_algorithm = XMLSecurity::BaseDocument.new.algorithm(params['SigAlg']) + signature_algorithm = KlXMLSecurity::BaseDocument.new.algorithm(params['SigAlg']) assert_equal signature_algorithm, OpenSSL::Digest::SHA512 assert cert.public_key.verify(signature_algorithm.new, Base64.decode64(params['Signature']), query_string) end end