test/slo_logoutresponse_test.rb in kl-ruby-saml-0.0.4 vs test/slo_logoutresponse_test.rb in kl-ruby-saml-0.0.5
- old
+ new
@@ -68,24 +68,24 @@
assert_match /<ds:SignatureMethod Algorithm='http:\/\/www.w3.org\/2000\/09\/xmldsig#rsa-sha1'\/>/, response_xml
assert_match /<ds:DigestMethod Algorithm='http:\/\/www.w3.org\/2000\/09\/xmldsig#sha1'\/>/, response_xml
end
it "create a signed logout response with 256 digest and signature methods" do
- settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA256
- settings.security[:digest_method] = XMLSecurity::Document::SHA256
+ settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA256
+ settings.security[:digest_method] = KlXMLSecurity::Document::SHA256
params = OneLogin::KlRubySaml::SloLogoutresponse.new.create_params(settings, logout_request.id, "Custom Logout Message")
response_xml = Base64.decode64(params["SAMLResponse"])
assert_match %r[<ds:SignatureValue>([a-zA-Z0-9/+=]+)</ds:SignatureValue>], response_xml
assert_match /<ds:SignatureMethod Algorithm='http:\/\/www.w3.org\/2001\/04\/xmldsig-more#rsa-sha256'\/>/, response_xml
assert_match /<ds:DigestMethod Algorithm='http:\/\/www.w3.org\/2001\/04\/xmldsig-more#sha256'\/>/, response_xml
end
it "create a signed logout response with 512 digest and signature method RSA_SHA384" do
- settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA384
- settings.security[:digest_method] = XMLSecurity::Document::SHA512
+ settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA384
+ settings.security[:digest_method] = KlXMLSecurity::Document::SHA512
logout_request.settings = settings
params = OneLogin::KlRubySaml::SloLogoutresponse.new.create_params(settings, logout_request.id, "Custom Logout Message")
response_xml = Base64.decode64(params["SAMLResponse"])
@@ -104,79 +104,79 @@
settings.security[:logout_responses_signed] = true
settings.security[:embed_sign] = false
end
it "create a signature parameter with RSA_SHA1 and validate it" do
- settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA1
+ settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA1
params = OneLogin::KlRubySaml::SloLogoutresponse.new.create_params(settings, logout_request.id, "Custom Logout Message", :RelayState => 'http://example.com')
assert params['SAMLResponse']
assert params[:RelayState]
assert params['Signature']
- assert_equal params['SigAlg'], XMLSecurity::Document::RSA_SHA1
+ assert_equal params['SigAlg'], KlXMLSecurity::Document::RSA_SHA1
query_string = "SAMLResponse=#{CGI.escape(params['SAMLResponse'])}"
query_string << "&RelayState=#{CGI.escape(params[:RelayState])}"
query_string << "&SigAlg=#{CGI.escape(params['SigAlg'])}"
- signature_algorithm = XMLSecurity::BaseDocument.new.algorithm(params['SigAlg'])
+ signature_algorithm = KlXMLSecurity::BaseDocument.new.algorithm(params['SigAlg'])
assert_equal signature_algorithm, OpenSSL::Digest::SHA1
assert cert.public_key.verify(signature_algorithm.new, Base64.decode64(params['Signature']), query_string)
end
it "create a signature parameter with RSA_SHA256 /SHA256 and validate it" do
- settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA256
+ settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA256
params = OneLogin::KlRubySaml::SloLogoutresponse.new.create_params(settings, logout_request.id, "Custom Logout Message", :RelayState => 'http://example.com')
assert params['SAMLResponse']
assert params[:RelayState]
assert params['Signature']
- assert_equal params['SigAlg'], XMLSecurity::Document::RSA_SHA256
+ assert_equal params['SigAlg'], KlXMLSecurity::Document::RSA_SHA256
query_string = "SAMLResponse=#{CGI.escape(params['SAMLResponse'])}"
query_string << "&RelayState=#{CGI.escape(params[:RelayState])}"
query_string << "&SigAlg=#{CGI.escape(params['SigAlg'])}"
- signature_algorithm = XMLSecurity::BaseDocument.new.algorithm(params['SigAlg'])
+ signature_algorithm = KlXMLSecurity::BaseDocument.new.algorithm(params['SigAlg'])
assert_equal signature_algorithm, OpenSSL::Digest::SHA256
assert cert.public_key.verify(signature_algorithm.new, Base64.decode64(params['Signature']), query_string)
end
it "create a signature parameter with RSA_SHA384 / SHA384 and validate it" do
- settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA384
+ settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA384
params = OneLogin::KlRubySaml::SloLogoutresponse.new.create_params(settings, logout_request.id, "Custom Logout Message", :RelayState => 'http://example.com')
assert params['SAMLResponse']
assert params[:RelayState]
assert params['Signature']
- assert_equal params['SigAlg'], XMLSecurity::Document::RSA_SHA384
+ assert_equal params['SigAlg'], KlXMLSecurity::Document::RSA_SHA384
query_string = "SAMLResponse=#{CGI.escape(params['SAMLResponse'])}"
query_string << "&RelayState=#{CGI.escape(params[:RelayState])}"
query_string << "&SigAlg=#{CGI.escape(params['SigAlg'])}"
- signature_algorithm = XMLSecurity::BaseDocument.new.algorithm(params['SigAlg'])
+ signature_algorithm = KlXMLSecurity::BaseDocument.new.algorithm(params['SigAlg'])
assert_equal signature_algorithm, OpenSSL::Digest::SHA384
assert cert.public_key.verify(signature_algorithm.new, Base64.decode64(params['Signature']), query_string)
end
it "create a signature parameter with RSA_SHA512 / SHA512 and validate it" do
- settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA512
+ settings.security[:signature_method] = KlXMLSecurity::Document::RSA_SHA512
params = OneLogin::KlRubySaml::SloLogoutresponse.new.create_params(settings, logout_request.id, "Custom Logout Message", :RelayState => 'http://example.com')
assert params['SAMLResponse']
assert params[:RelayState]
assert params['Signature']
- assert_equal params['SigAlg'], XMLSecurity::Document::RSA_SHA512
+ assert_equal params['SigAlg'], KlXMLSecurity::Document::RSA_SHA512
query_string = "SAMLResponse=#{CGI.escape(params['SAMLResponse'])}"
query_string << "&RelayState=#{CGI.escape(params[:RelayState])}"
query_string << "&SigAlg=#{CGI.escape(params['SigAlg'])}"
- signature_algorithm = XMLSecurity::BaseDocument.new.algorithm(params['SigAlg'])
+ signature_algorithm = KlXMLSecurity::BaseDocument.new.algorithm(params['SigAlg'])
assert_equal signature_algorithm, OpenSSL::Digest::SHA512
assert cert.public_key.verify(signature_algorithm.new, Base64.decode64(params['Signature']), query_string)
end
end