@@ -26,7 +26,7 @@ def initialize; end
2626 assert_equal "https://hello.example.com/access/saml/idp.xml" , settings . idp_entity_id
2727 assert_equal "https://hello.example.com/access/saml/login" , settings . idp_sso_service_url
2828 assert_equal "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" , settings . idp_sso_service_binding
29- assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA: DD:B0:16:45:48:72 " , settings . idp_cert_fingerprint
29+ assert_equal "C4:C6:BD:41:EC:AD:57:97:CE:7B:7D:80:06:C3:E4:30:53:29:02:0B: DD:2D:47:02:9E:BD:85:AD:93:02:45:21 " , settings . idp_cert_fingerprint
3030 assert_equal "https://hello.example.com/access/saml/logout" , settings . idp_slo_service_url
3131 assert_equal "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" , settings . idp_slo_service_binding
3232 assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , settings . name_identifier_format
@@ -38,15 +38,15 @@ def initialize; end
3838 idp_metadata_parser = RubySaml ::IdpMetadataParser . new
3939 idp_metadata = idp_metadata_descriptor
4040 settings = idp_metadata_parser . parse ( idp_metadata )
41- assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA: DD:B0:16:45:48:72 " , settings . idp_cert_fingerprint
41+ assert_equal "C4:C6:BD:41:EC:AD:57:97:CE:7B:7D:80:06:C3:E4:30:53:29:02:0B: DD:2D:47:02:9E:BD:85:AD:93:02:45:21 " , settings . idp_cert_fingerprint
4242 end
4343
4444 it "extract certificate from md:KeyDescriptor[@use='encryption']" do
4545 idp_metadata_parser = RubySaml ::IdpMetadataParser . new
4646 idp_metadata = idp_metadata_descriptor
4747 idp_metadata = idp_metadata . sub ( /<md:KeyDescriptor use="signing">(.*?)<\/ md:KeyDescriptor>/m , "" )
4848 settings = idp_metadata_parser . parse ( idp_metadata )
49- assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA: DD:B0:16:45:48:72 " , settings . idp_cert_fingerprint
49+ assert_equal "C4:C6:BD:41:EC:AD:57:97:CE:7B:7D:80:06:C3:E4:30:53:29:02:0B: DD:2D:47:02:9E:BD:85:AD:93:02:45:21 " , settings . idp_cert_fingerprint
5050 end
5151
5252 it "extract certificate from md:KeyDescriptor" do
@@ -55,7 +55,7 @@ def initialize; end
5555 idp_metadata = idp_metadata . sub ( /<md:KeyDescriptor use="signing">(.*?)<\/ md:KeyDescriptor>/m , "" )
5656 idp_metadata = idp_metadata . sub ( '<md:KeyDescriptor use="encryption">' , '<md:KeyDescriptor>' )
5757 settings = idp_metadata_parser . parse ( idp_metadata )
58- assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA: DD:B0:16:45:48:72 " , settings . idp_cert_fingerprint
58+ assert_equal "C4:C6:BD:41:EC:AD:57:97:CE:7B:7D:80:06:C3:E4:30:53:29:02:0B: DD:2D:47:02:9E:BD:85:AD:93:02:45:21 " , settings . idp_cert_fingerprint
5959 end
6060
6161 it "extract SSO endpoint with no specific binding, it takes the first" do
@@ -162,7 +162,7 @@ def initialize; end
162162 }
163163 }
164164 } )
165- assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA: DD:B0:16:45:48:72 " , settings . idp_cert_fingerprint
165+ assert_equal "C4:C6:BD:41:EC:AD:57:97:CE:7B:7D:80:06:C3:E4:30:53:29:02:0B: DD:2D:47:02:9E:BD:85:AD:93:02:45:21 " , settings . idp_cert_fingerprint
166166 assert_equal XMLSecurity ::Document ::SHA256 , settings . security [ :digest_method ]
167167 assert_equal XMLSecurity ::Document ::RSA_SHA256 , settings . security [ :signature_method ]
168168 end
@@ -175,7 +175,7 @@ def initialize; end
175175
176176 RubySaml ::IdpMetadataParser . new . parse ( idp_metadata_descriptor , :settings => settings )
177177
178- assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA: DD:B0:16:45:48:72 " , settings . idp_cert_fingerprint
178+ assert_equal "C4:C6:BD:41:EC:AD:57:97:CE:7B:7D:80:06:C3:E4:30:53:29:02:0B: DD:2D:47:02:9E:BD:85:AD:93:02:45:21 " , settings . idp_cert_fingerprint
179179 assert_equal XMLSecurity ::Document ::SHA256 , settings . security [ :digest_method ]
180180 assert_equal XMLSecurity ::Document ::RSA_SHA256 , settings . security [ :signature_method ]
181181 end
@@ -190,7 +190,7 @@ def initialize; end
190190 assert_equal "https://hello.example.com/access/saml/idp.xml" , metadata [ :idp_entity_id ]
191191 assert_equal "https://hello.example.com/access/saml/login" , metadata [ :idp_sso_service_url ]
192192 assert_equal "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" , metadata [ :idp_sso_service_binding ]
193- assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA: DD:B0:16:45:48:72 " , metadata [ :idp_cert_fingerprint ]
193+ assert_equal "C4:C6:BD:41:EC:AD:57:97:CE:7B:7D:80:06:C3:E4:30:53:29:02:0B: DD:2D:47:02:9E:BD:85:AD:93:02:45:21 " , metadata [ :idp_cert_fingerprint ]
194194 assert_equal "https://hello.example.com/access/saml/logout" , metadata [ :idp_slo_service_url ]
195195 assert_equal "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" , metadata [ :idp_slo_service_binding ]
196196 assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , metadata [ :name_identifier_format ]
@@ -202,15 +202,15 @@ def initialize; end
202202 idp_metadata_parser = RubySaml ::IdpMetadataParser . new
203203 idp_metadata = idp_metadata_descriptor
204204 metadata = idp_metadata_parser . parse_to_hash ( idp_metadata )
205- assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA: DD:B0:16:45:48:72 " , metadata [ :idp_cert_fingerprint ]
205+ assert_equal "C4:C6:BD:41:EC:AD:57:97:CE:7B:7D:80:06:C3:E4:30:53:29:02:0B: DD:2D:47:02:9E:BD:85:AD:93:02:45:21 " , metadata [ :idp_cert_fingerprint ]
206206 end
207207
208208 it "extract certificate from md:KeyDescriptor[@use='encryption']" do
209209 idp_metadata_parser = RubySaml ::IdpMetadataParser . new
210210 idp_metadata = idp_metadata_descriptor
211211 idp_metadata = idp_metadata . sub ( /<md:KeyDescriptor use="signing">(.*?)<\/ md:KeyDescriptor>/m , "" )
212212 parsed_metadata = idp_metadata_parser . parse_to_hash ( idp_metadata )
213- assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA: DD:B0:16:45:48:72 " , parsed_metadata [ :idp_cert_fingerprint ]
213+ assert_equal "C4:C6:BD:41:EC:AD:57:97:CE:7B:7D:80:06:C3:E4:30:53:29:02:0B: DD:2D:47:02:9E:BD:85:AD:93:02:45:21 " , parsed_metadata [ :idp_cert_fingerprint ]
214214 end
215215
216216 it "extract certificate from md:KeyDescriptor" do
@@ -219,7 +219,7 @@ def initialize; end
219219 idp_metadata = idp_metadata . sub ( /<md:KeyDescriptor use="signing">(.*?)<\/ md:KeyDescriptor>/m , "" )
220220 idp_metadata = idp_metadata . sub ( '<md:KeyDescriptor use="encryption">' , '<md:KeyDescriptor>' )
221221 parsed_metadata = idp_metadata_parser . parse_to_hash ( idp_metadata )
222- assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA: DD:B0:16:45:48:72 " , parsed_metadata [ :idp_cert_fingerprint ]
222+ assert_equal "C4:C6:BD:41:EC:AD:57:97:CE:7B:7D:80:06:C3:E4:30:53:29:02:0B: DD:2D:47:02:9E:BD:85:AD:93:02:45:21 " , parsed_metadata [ :idp_cert_fingerprint ]
223223 end
224224
225225 it "extract SSO endpoint with no specific binding, it takes the first" do
@@ -261,7 +261,7 @@ def initialize; end
261261 }
262262 }
263263 } )
264- assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA: DD:B0:16:45:48:72 " , parsed_metadata [ :idp_cert_fingerprint ]
264+ assert_equal "C4:C6:BD:41:EC:AD:57:97:CE:7B:7D:80:06:C3:E4:30:53:29:02:0B: DD:2D:47:02:9E:BD:85:AD:93:02:45:21 " , parsed_metadata [ :idp_cert_fingerprint ]
265265 assert_nil parsed_metadata [ :security ]
266266 end
267267
@@ -272,8 +272,8 @@ def initialize; end
272272 metadata1 = idp_metadata_parser . parse_to_hash ( idp_metadata1 )
273273 metadata2 = idp_metadata_parser . parse_to_hash ( idp_metadata2 )
274274
275- assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA: DD:B0:16:45:48:72 " , metadata1 [ :idp_cert_fingerprint ]
276- assert_equal "CD:2B:2B:DA:FF:F5:DB:64:10:7C:AC:FD:FE:0F:CB:5D:73:5F:16:07 " , metadata2 [ :idp_cert_fingerprint ]
275+ assert_equal "C4:C6:BD:41:EC:AD:57:97:CE:7B:7D:80:06:C3:E4:30:53:29:02:0B: DD:2D:47:02:9E:BD:85:AD:93:02:45:21 " , metadata1 [ :idp_cert_fingerprint ]
276+ assert_equal "E5:52:D9:2C:3C:DC:3D:09:5C:90:76:82:AB:B6:75:B4:92:92:2C:42:87:7E:18:EB:17:F3:1F:39:FE:9F:7C:6A " , metadata2 [ :idp_cert_fingerprint ]
277277 end
278278 end
279279
@@ -320,7 +320,7 @@ def initialize; end
320320 assert_equal "https://hello.example.com/access/saml/idp.xml" , settings . idp_entity_id
321321 assert_equal "https://hello.example.com/access/saml/login" , settings . idp_sso_service_url
322322 assert_equal "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" , settings . idp_sso_service_binding
323- assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA: DD:B0:16:45:48:72 " , settings . idp_cert_fingerprint
323+ assert_equal "C4:C6:BD:41:EC:AD:57:97:CE:7B:7D:80:06:C3:E4:30:53:29:02:0B: DD:2D:47:02:9E:BD:85:AD:93:02:45:21 " , settings . idp_cert_fingerprint
324324 assert_equal "https://hello.example.com/access/saml/logout" , settings . idp_slo_service_url
325325 assert_equal "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" , settings . idp_slo_service_binding
326326 assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , settings . name_identifier_format
@@ -356,7 +356,7 @@ def initialize; end
356356 assert_equal "https://hello.example.com/access/saml/idp.xml" , parsed_metadata [ :idp_entity_id ]
357357 assert_equal "https://hello.example.com/access/saml/login" , parsed_metadata [ :idp_sso_service_url ]
358358 assert_equal "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" , parsed_metadata [ :idp_sso_service_binding ]
359- assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA: DD:B0:16:45:48:72 " , parsed_metadata [ :idp_cert_fingerprint ]
359+ assert_equal "C4:C6:BD:41:EC:AD:57:97:CE:7B:7D:80:06:C3:E4:30:53:29:02:0B: DD:2D:47:02:9E:BD:85:AD:93:02:45:21 " , parsed_metadata [ :idp_cert_fingerprint ]
360360 assert_equal "https://hello.example.com/access/saml/logout" , parsed_metadata [ :idp_slo_service_url ]
361361 assert_equal "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" , parsed_metadata [ :idp_slo_service_binding ]
362362 assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , parsed_metadata [ :name_identifier_format ]
@@ -467,7 +467,7 @@ def initialize; end
467467 assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , @settings . name_identifier_format
468468 assert_equal "https://hello.example.com/access/saml/login" , @settings . idp_sso_service_url
469469 assert_equal "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" , @settings . idp_sso_service_binding
470- assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA: DD:B0:16:45:48:72 " , @settings . idp_cert_fingerprint
470+ assert_equal "C4:C6:BD:41:EC:AD:57:97:CE:7B:7D:80:06:C3:E4:30:53:29:02:0B: DD:2D:47:02:9E:BD:85:AD:93:02:45:21 " , @settings . idp_cert_fingerprint
471471 assert_equal "https://hello.example.com/access/saml/logout" , @settings . idp_slo_service_url
472472 assert_equal "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" , @settings . idp_slo_service_binding
473473 assert_equal [ "AuthToken" , "SSOStartPage" ] , @settings . idp_attribute_names
@@ -477,10 +477,10 @@ def initialize; end
477477 it "should handle multiple descriptors at once" do
478478 settings = @idp_metadata_parser . parse_to_array ( @idp_metadata )
479479 assert_equal "https://foo.example.com/access/saml/idp.xml" , settings . first [ :idp_entity_id ]
480- assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA: DD:B0:16:45:48:72 " , settings . first [ :idp_cert_fingerprint ]
480+ assert_equal "C4:C6:BD:41:EC:AD:57:97:CE:7B:7D:80:06:C3:E4:30:53:29:02:0B: DD:2D:47:02:9E:BD:85:AD:93:02:45:21 " , settings . first [ :idp_cert_fingerprint ]
481481 assert_equal '2014-04-17T18:02:33.910Z' , settings . first [ :valid_until ]
482482 assert_equal "https://bar.example.com/access/saml/idp.xml" , settings . last [ :idp_entity_id ]
483- assert_equal "08:EB:6E:60:A2:14:4E:89:EC:FA:05:74: 9D:72:BF:5D:BE:54:F0:1A " , settings . last [ :idp_cert_fingerprint ]
483+ assert_equal "74:E4:FA:29:20:26:36:8A:72:5E:9D:CF:4F:8E:1F:DC:D4:CE:E2:3C: 9D:6F:93:35:A1:A7:8A:4D:79:83:21:D0 " , settings . last [ :idp_cert_fingerprint ]
484484 assert_equal '2014-04-17T18:02:33.910Z' , settings . last [ :valid_until ]
485485 end
486486 end
@@ -649,7 +649,7 @@ def initialize; end
649649
650650 it "should return idp_cert and idp_cert_fingerprint and no idp_cert_multi" do
651651 assert_equal ( expected_cert , @settings . idp_cert )
652- assert_equal ( "2D:A9:40:88:28:EE:67:BB:4A:5B:E0: 58:A7:CC:71:95: 2D:1B:C9:D3 " , @settings . idp_cert_fingerprint )
652+ assert_equal ( "46:E3:68:F4:ED:61:43:2B:EC:36:E3:99:E9:03:4B:99:E5:B3: 58:EF:A9:A9:00:FC: 2D:C8:7C:14:C6:60:E3:8F " , @settings . idp_cert_fingerprint )
653653 assert_equal ( { :signing => [ expected_cert ] , :encryption => [ expected_cert ] } , @settings . idp_cert_multi )
654654 assert_equal ( "https://app.onelogin.com/saml/metadata/383123" , @settings . idp_entity_id )
655655 assert_equal ( "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress" , @settings . name_identifier_format )
0 commit comments