@@ -56,7 +56,7 @@ class RubySamlTest < Minitest::Test
5656
5757 describe "Prevent XEE attack" do
5858 before do
59- @response = OneLogin ::RubySaml ::Response . new ( fixture ( :attackxee ) )
59+ @response = OneLogin ::RubySaml ::Response . new ( fixture ( :attackxee ) )
6060 end
6161
6262 it "false when evil attack vector is present, soft = true" do
@@ -419,7 +419,7 @@ class RubySamlTest < Minitest::Test
419419 assert response_valid_signed . send ( :validate_issuer )
420420
421421 response_valid_signed . settings . idp_entity_id = 'https://app.onelogin.com/saml2'
422- assert response_valid_signed . send ( :validate_issuer )
422+ assert response_valid_signed . send ( :validate_issuer )
423423 end
424424
425425 it "return false when the issuer of the Message does not match the IdP entityId" do
@@ -501,7 +501,7 @@ class RubySamlTest < Minitest::Test
501501 response = OneLogin ::RubySaml ::Response . new ( response_document_valid_signed , :settings => settings , :matches_request_id => "_fc4a34b0-7efb-012e-caae-782bcb13bb38" )
502502 assert response . send ( :validate_in_response_to )
503503 assert_empty response . errors
504- end
504+ end
505505
506506 it "return true when no Request ID is provided for checking" do
507507 response = OneLogin ::RubySaml ::Response . new ( response_document_valid_signed , :settings => settings )
@@ -898,7 +898,7 @@ class RubySamlTest < Minitest::Test
898898 it 'is not possible when encryptID inside the assertion but no private key' do
899899 response_encrypted_nameid . settings = settings
900900 assert_raises ( OneLogin ::RubySaml ::ValidationError , "An EncryptedID found and no SP private key found on the settings to decrypt it" ) do
901- assert_equal "test@onelogin.com" , response_encrypted_nameid . nameid
901+ assert_equal "test@onelogin.com" , response_encrypted_nameid . nameid
902902 end
903903 end
904904
@@ -1017,7 +1017,7 @@ class RubySamlTest < Minitest::Test
10171017 describe "check right settings" do
10181018
10191019 it "is not possible to decrypt the assertion if no private key" do
1020- response = OneLogin ::RubySaml ::Response . new ( signed_message_encrypted_unsigned_assertion , :settings => settings )
1020+ response = OneLogin ::RubySaml ::Response . new ( signed_message_encrypted_unsigned_assertion , :settings => settings )
10211021
10221022 encrypted_assertion_node = REXML ::XPath . first (
10231023 response . document ,
@@ -1033,7 +1033,7 @@ class RubySamlTest < Minitest::Test
10331033 end
10341034
10351035 it "is possible to decrypt the assertion if private key" do
1036- response = OneLogin ::RubySaml ::Response . new ( signed_message_encrypted_unsigned_assertion , :settings => settings )
1036+ response = OneLogin ::RubySaml ::Response . new ( signed_message_encrypted_unsigned_assertion , :settings => settings )
10371037
10381038 encrypted_assertion_node = REXML ::XPath . first (
10391039 response . document ,
@@ -1100,9 +1100,9 @@ class RubySamlTest < Minitest::Test
11001100 assert_equal "_ce3d2948b4cf20146dee0a0b3dd6f69b6cf86f62d7" , response . nameid
11011101 end
11021102 end
1103-
1103+
11041104 end
1105- describe "test qualified name id in attributes" do
1105+ describe "test qualified name id in attributes" do
11061106
11071107 it "parsed the nameid" do
11081108 response = OneLogin ::RubySaml ::Response . new ( read_response ( "signed_nameid_in_atts.xml" ) , :settings => settings )
@@ -1113,7 +1113,7 @@ class RubySamlTest < Minitest::Test
11131113 end
11141114 end
11151115
1116- describe "test unqualified name id in attributes" do
1116+ describe "test unqualified name id in attributes" do
11171117
11181118 it "parsed the nameid" do
11191119 response = OneLogin ::RubySaml ::Response . new ( read_response ( "signed_unqual_nameid_in_atts.xml" ) , :settings => settings )
0 commit comments