@@ -354,13 +354,16 @@ def initialize; end
354354 end
355355
356356 it "if no ValidUntil but CacheDuration return CacheDuration converted in ValidUntil" do
357+ return if RUBY_VERSION < '1.9'
357358 Timecop . freeze ( Time . parse ( "2020-01-02T10:02:33Z" , Time . now . utc ) ) do
358359 settings = @idp_metadata_parser . parse ( idp_metadata_descriptor5 )
359360 assert_equal '2020-01-03T10:02:33Z' , settings . valid_until
360361 end
361362 end
362363
363364 it "if ValidUntil and CacheDuration return the sooner timestamp" do
365+ return if RUBY_VERSION < '1.9'
366+
364367 Timecop . freeze ( Time . parse ( "2020-01-01T10:12:55Z" , Time . now . utc ) ) do
365368 settings = @idp_metadata_parser . parse ( idp_metadata_descriptor6 )
366369 assert_equal '2020-01-03T10:12:55Z' , settings . valid_until
@@ -585,7 +588,7 @@ def initialize; end
585588 it "should return idp_cert and idp_cert_fingerprint and no idp_cert_multi" do
586589 assert_equal ( expected_cert , @settings . idp_cert )
587590 assert_equal ( "2D:A9:40:88:28:EE:67:BB:4A:5B:E0:58:A7:CC:71:95:2D:1B:C9:D3" , @settings . idp_cert_fingerprint )
588- assert_equal ( { signing : [ expected_cert ] , encryption : [ expected_cert ] } , @settings . idp_cert_multi )
591+ assert_equal ( { :signing => [ expected_cert ] , :encryption => [ expected_cert ] } , @settings . idp_cert_multi )
589592 assert_equal ( "https://app.onelogin.com/saml/metadata/383123" , @settings . idp_entity_id )
590593 assert_equal ( "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress" , @settings . name_identifier_format )
591594 assert_equal ( "https://app.onelogin.com/trust/saml2/http-post/sso/383123" , @settings . idp_sso_service_url )
0 commit comments