@@ -24,9 +24,9 @@ def initialize; end
2424 settings = idp_metadata_parser . parse ( idp_metadata_descriptor )
2525
2626 assert_equal "https://hello.example.com/access/saml/idp.xml" , settings . idp_entity_id
27- assert_equal "https://hello.example.com/access/saml/login" , settings . idp_sso_target_url
27+ assert_equal "https://hello.example.com/access/saml/login" , settings . idp_sso_service_url
2828 assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA:DD:B0:16:45:48:72" , settings . idp_cert_fingerprint
29- assert_equal "https://hello.example.com/access/saml/logout" , settings . idp_slo_target_url
29+ assert_equal "https://hello.example.com/access/saml/logout" , settings . idp_slo_service_url
3030 assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , settings . name_identifier_format
3131 assert_equal [ "AuthToken" , "SSOStartPage" ] , settings . idp_attribute_names
3232 assert_equal '2014-04-17T18:02:33.910Z' , settings . valid_until
@@ -60,7 +60,7 @@ def initialize; end
6060 idp_metadata_parser = OneLogin ::RubySaml ::IdpMetadataParser . new
6161 idp_metadata = idp_metadata_descriptor3
6262 settings = idp_metadata_parser . parse ( idp_metadata )
63- assert_equal "https://idp.example.com/idp/profile/Shibboleth/SSO" , settings . idp_sso_target_url
63+ assert_equal "https://idp.example.com/idp/profile/Shibboleth/SSO" , settings . idp_sso_service_url
6464 end
6565
6666 it "extract SSO endpoint with specific binding" do
@@ -69,15 +69,15 @@ def initialize; end
6969 options = { }
7070 options [ :sso_binding ] = [ 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST' ]
7171 settings = idp_metadata_parser . parse ( idp_metadata , options )
72- assert_equal "https://idp.example.com/idp/profile/SAML2/POST/SSO" , settings . idp_sso_target_url
72+ assert_equal "https://idp.example.com/idp/profile/SAML2/POST/SSO" , settings . idp_sso_service_url
7373
7474 options [ :sso_binding ] = [ 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect' ]
7575 settings = idp_metadata_parser . parse ( idp_metadata , options )
76- assert_equal "https://idp.example.com/idp/profile/SAML2/Redirect/SSO" , settings . idp_sso_target_url
76+ assert_equal "https://idp.example.com/idp/profile/SAML2/Redirect/SSO" , settings . idp_sso_service_url
7777
7878 options [ :sso_binding ] = [ 'invalid_binding' , 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect' ]
7979 settings = idp_metadata_parser . parse ( idp_metadata , options )
80- assert_equal "https://idp.example.com/idp/profile/SAML2/Redirect/SSO" , settings . idp_sso_target_url
80+ assert_equal "https://idp.example.com/idp/profile/SAML2/Redirect/SSO" , settings . idp_sso_service_url
8181 end
8282
8383 it "uses settings options as hash for overrides" do
@@ -117,9 +117,9 @@ def initialize; end
117117 metadata = idp_metadata_parser . parse_to_hash ( idp_metadata_descriptor )
118118
119119 assert_equal "https://hello.example.com/access/saml/idp.xml" , metadata [ :idp_entity_id ]
120- assert_equal "https://hello.example.com/access/saml/login" , metadata [ :idp_sso_target_url ]
120+ assert_equal "https://hello.example.com/access/saml/login" , metadata [ :idp_sso_service_url ]
121121 assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA:DD:B0:16:45:48:72" , metadata [ :idp_cert_fingerprint ]
122- assert_equal "https://hello.example.com/access/saml/logout" , metadata [ :idp_slo_target_url ]
122+ assert_equal "https://hello.example.com/access/saml/logout" , metadata [ :idp_slo_service_url ]
123123 assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , metadata [ :name_identifier_format ]
124124 assert_equal [ "AuthToken" , "SSOStartPage" ] , metadata [ :idp_attribute_names ]
125125 assert_equal '2014-04-17T18:02:33.910Z' , metadata [ :valid_until ]
@@ -153,7 +153,7 @@ def initialize; end
153153 idp_metadata_parser = OneLogin ::RubySaml ::IdpMetadataParser . new
154154 idp_metadata = idp_metadata_descriptor3
155155 metadata = idp_metadata_parser . parse_to_hash ( idp_metadata )
156- assert_equal "https://idp.example.com/idp/profile/Shibboleth/SSO" , metadata [ :idp_sso_target_url ]
156+ assert_equal "https://idp.example.com/idp/profile/Shibboleth/SSO" , metadata [ :idp_sso_service_url ]
157157 end
158158
159159 it "extract SSO endpoint with specific binding" do
@@ -162,15 +162,15 @@ def initialize; end
162162 options = { }
163163 options [ :sso_binding ] = [ 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST' ]
164164 parsed_metadata = idp_metadata_parser . parse_to_hash ( idp_metadata , options )
165- assert_equal "https://idp.example.com/idp/profile/SAML2/POST/SSO" , parsed_metadata [ :idp_sso_target_url ]
165+ assert_equal "https://idp.example.com/idp/profile/SAML2/POST/SSO" , parsed_metadata [ :idp_sso_service_url ]
166166
167167 options [ :sso_binding ] = [ 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect' ]
168168 parsed_metadata = idp_metadata_parser . parse_to_hash ( idp_metadata , options )
169- assert_equal "https://idp.example.com/idp/profile/SAML2/Redirect/SSO" , parsed_metadata [ :idp_sso_target_url ]
169+ assert_equal "https://idp.example.com/idp/profile/SAML2/Redirect/SSO" , parsed_metadata [ :idp_sso_service_url ]
170170
171171 options [ :sso_binding ] = [ 'invalid_binding' , 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect' ]
172172 parsed_metadata = idp_metadata_parser . parse_to_hash ( idp_metadata , options )
173- assert_equal "https://idp.example.com/idp/profile/SAML2/Redirect/SSO" , parsed_metadata [ :idp_sso_target_url ]
173+ assert_equal "https://idp.example.com/idp/profile/SAML2/Redirect/SSO" , parsed_metadata [ :idp_sso_service_url ]
174174 end
175175
176176 it "ignores a given :settings hash" do
@@ -207,8 +207,8 @@ def initialize; end
207207 settings = idp_metadata_parser . parse ( idp_metadata_descriptor2 )
208208
209209 assert_equal "https://hello.example.com/access/saml/idp.xml" , settings . idp_entity_id
210- assert_equal "https://hello.example.com/access/saml/login" , settings . idp_sso_target_url
211- assert_equal "https://hello.example.com/access/saml/logout" , settings . idp_slo_target_url
210+ assert_equal "https://hello.example.com/access/saml/login" , settings . idp_sso_service_url
211+ assert_equal "https://hello.example.com/access/saml/logout" , settings . idp_slo_service_url
212212 assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , settings . name_identifier_format
213213 assert_equal [ "AuthToken" , "SSOStartPage" ] , settings . idp_attribute_names
214214
@@ -239,9 +239,9 @@ def initialize; end
239239 settings = idp_metadata_parser . parse_remote ( @url )
240240
241241 assert_equal "https://hello.example.com/access/saml/idp.xml" , settings . idp_entity_id
242- assert_equal "https://hello.example.com/access/saml/login" , settings . idp_sso_target_url
242+ assert_equal "https://hello.example.com/access/saml/login" , settings . idp_sso_service_url
243243 assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA:DD:B0:16:45:48:72" , settings . idp_cert_fingerprint
244- assert_equal "https://hello.example.com/access/saml/logout" , settings . idp_slo_target_url
244+ assert_equal "https://hello.example.com/access/saml/logout" , settings . idp_slo_service_url
245245 assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , settings . name_identifier_format
246246 assert_equal [ "AuthToken" , "SSOStartPage" ] , settings . idp_attribute_names
247247 assert_equal '2014-04-17T18:02:33.910Z' , settings . valid_until
@@ -273,9 +273,9 @@ def initialize; end
273273 parsed_metadata = idp_metadata_parser . parse_remote_to_hash ( @url )
274274
275275 assert_equal "https://hello.example.com/access/saml/idp.xml" , parsed_metadata [ :idp_entity_id ]
276- assert_equal "https://hello.example.com/access/saml/login" , parsed_metadata [ :idp_sso_target_url ]
276+ assert_equal "https://hello.example.com/access/saml/login" , parsed_metadata [ :idp_sso_service_url ]
277277 assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA:DD:B0:16:45:48:72" , parsed_metadata [ :idp_cert_fingerprint ]
278- assert_equal "https://hello.example.com/access/saml/logout" , parsed_metadata [ :idp_slo_target_url ]
278+ assert_equal "https://hello.example.com/access/saml/logout" , parsed_metadata [ :idp_slo_service_url ]
279279 assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , parsed_metadata [ :name_identifier_format ]
280280 assert_equal [ "AuthToken" , "SSOStartPage" ] , parsed_metadata [ :idp_attribute_names ]
281281 assert_equal '2014-04-17T18:02:33.910Z' , parsed_metadata [ :valid_until ]
@@ -341,9 +341,9 @@ def initialize; end
341341
342342 it "should retreive data" do
343343 assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , @settings . name_identifier_format
344- assert_equal "https://hello.example.com/access/saml/login" , @settings . idp_sso_target_url
344+ assert_equal "https://hello.example.com/access/saml/login" , @settings . idp_sso_service_url
345345 assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA:DD:B0:16:45:48:72" , @settings . idp_cert_fingerprint
346- assert_equal "https://hello.example.com/access/saml/logout" , @settings . idp_slo_target_url
346+ assert_equal "https://hello.example.com/access/saml/logout" , @settings . idp_slo_service_url
347347 assert_equal [ "AuthToken" , "SSOStartPage" ] , @settings . idp_attribute_names
348348 assert_equal '2014-04-17T18:02:33.910Z' , @settings . valid_until
349349 end
@@ -434,8 +434,8 @@ def initialize; end
434434 assert_equal expected_multi_cert , @settings . idp_cert_multi
435435 assert_equal "https://idp.examle.com/saml/metadata" , @settings . idp_entity_id
436436 assert_equal "urn:oasis:names:tc:SAML:2.0:nameid-format:transient" , @settings . name_identifier_format
437- assert_equal "https://idp.examle.com/saml/sso" , @settings . idp_sso_target_url
438- assert_equal "https://idp.examle.com/saml/slo" , @settings . idp_slo_target_url
437+ assert_equal "https://idp.examle.com/saml/sso" , @settings . idp_sso_service_url
438+ assert_equal "https://idp.examle.com/saml/slo" , @settings . idp_slo_service_url
439439 end
440440 end
441441
@@ -479,8 +479,8 @@ def initialize; end
479479 assert_equal expected_multi_cert , @settings . idp_cert_multi
480480 assert_equal "https://idp.examle.com/saml/metadata" , @settings . idp_entity_id
481481 assert_equal "urn:oasis:names:tc:SAML:2.0:nameid-format:transient" , @settings . name_identifier_format
482- assert_equal "https://idp.examle.com/saml/sso" , @settings . idp_sso_target_url
483- assert_equal "https://idp.examle.com/saml/slo" , @settings . idp_slo_target_url
482+ assert_equal "https://idp.examle.com/saml/sso" , @settings . idp_sso_service_url
483+ assert_equal "https://idp.examle.com/saml/slo" , @settings . idp_slo_service_url
484484 end
485485 end
486486
@@ -519,8 +519,8 @@ def initialize; end
519519 assert_nil @settings . idp_cert_multi
520520 assert_equal "https://app.onelogin.com/saml/metadata/383123" , @settings . idp_entity_id
521521 assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress" , @settings . name_identifier_format
522- assert_equal "https://app.onelogin.com/trust/saml2/http-post/sso/383123" , @settings . idp_sso_target_url
523- assert_nil @settings . idp_slo_target_url
522+ assert_equal "https://app.onelogin.com/trust/saml2/http-post/sso/383123" , @settings . idp_sso_service_url
523+ assert_nil @settings . idp_slo_service_url
524524 end
525525 end
526526
@@ -587,8 +587,8 @@ def initialize; end
587587 assert_equal expected_multi_cert , @settings . idp_cert_multi
588588 assert_equal "https://app.onelogin.com/saml/metadata/383123" , @settings . idp_entity_id
589589 assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress" , @settings . name_identifier_format
590- assert_equal "https://app.onelogin.com/trust/saml2/http-post/sso/383123" , @settings . idp_sso_target_url
591- assert_nil @settings . idp_slo_target_url
590+ assert_equal "https://app.onelogin.com/trust/saml2/http-post/sso/383123" , @settings . idp_sso_service_url
591+ assert_nil @settings . idp_slo_service_url
592592 end
593593 end
594594end
0 commit comments