@@ -67,7 +67,7 @@ def test_logout_phase_with_discovery
6767 config . stubs ( :end_session_endpoint ) . returns ( 'https://example.com/logout' )
6868 ::OpenIDConnect ::Discovery ::Provider ::Config . stubs ( :discover! ) . with ( 'https://example.com/' ) . returns ( config )
6969
70- request . stubs ( :path_info ) . returns ( '/auth/openidconnect/logout' )
70+ request . stubs ( :path ) . returns ( '/auth/openidconnect/logout' )
7171
7272 strategy . expects ( :redirect ) . with ( regexp_matches ( expected_redirect ) )
7373 strategy . other_phase
@@ -102,7 +102,7 @@ def test_logout_phase_with_discovery_and_post_logout_redirect_uri
102102 config . stubs ( :end_session_endpoint ) . returns ( 'https://example.com/logout' )
103103 ::OpenIDConnect ::Discovery ::Provider ::Config . stubs ( :discover! ) . with ( 'https://example.com/' ) . returns ( config )
104104
105- request . stubs ( :path_info ) . returns ( '/auth/openidconnect/logout' )
105+ request . stubs ( :path ) . returns ( '/auth/openidconnect/logout' )
106106
107107 strategy . expects ( :redirect ) . with ( expected_redirect )
108108 strategy . other_phase
@@ -112,7 +112,7 @@ def test_logout_phase
112112 strategy . options . issuer = 'example.com'
113113 strategy . options . client_options . host = 'example.com'
114114
115- request . stubs ( :path_info ) . returns ( '/auth/openidconnect/logout' )
115+ request . stubs ( :path ) . returns ( '/auth/openidconnect/logout' )
116116
117117 strategy . expects ( :call_app! )
118118 strategy . other_phase
@@ -164,7 +164,7 @@ def test_callback_phase(session: {}, params: {}, options: {}, userinfo: true, st
164164 state = SecureRandom . hex ( 16 )
165165 nonce = SecureRandom . hex ( 16 )
166166 request . stubs ( :params ) . returns ( 'code' => code , 'state' => state )
167- request . stubs ( :path_info ) . returns ( '' )
167+ request . stubs ( :path ) . returns ( '' )
168168
169169 strategy . options . issuer = 'example.com'
170170 strategy . options . client_signing_alg = :RS256
@@ -249,7 +249,7 @@ def test_callback_phase_with_discovery
249249 jwks = JSON ::JWK ::Set . new ( JSON . parse ( File . read ( 'test/fixtures/jwks.json' ) ) [ 'keys' ] )
250250
251251 request . stubs ( :params ) . returns ( 'code' => code , 'state' => state )
252- request . stubs ( :path_info ) . returns ( '' )
252+ request . stubs ( :path ) . returns ( '' )
253253
254254 strategy . options . client_options . host = 'example.com'
255255 strategy . options . discovery = true
@@ -290,7 +290,7 @@ def test_callback_phase_with_error
290290 state = SecureRandom . hex ( 16 )
291291 nonce = SecureRandom . hex ( 16 )
292292 request . stubs ( :params ) . returns ( 'error' => 'invalid_request' )
293- request . stubs ( :path_info ) . returns ( '' )
293+ request . stubs ( :path ) . returns ( '' )
294294
295295 strategy . call! ( { 'rack.session' => { 'omniauth.state' => state , 'omniauth.nonce' => nonce } } )
296296 strategy . expects ( :fail! )
@@ -302,7 +302,7 @@ def test_callback_phase_with_invalid_state
302302 state = SecureRandom . hex ( 16 )
303303 nonce = SecureRandom . hex ( 16 )
304304 request . stubs ( :params ) . returns ( 'code' => code , 'state' => 'foobar' )
305- request . stubs ( :path_info ) . returns ( '' )
305+ request . stubs ( :path ) . returns ( '' )
306306
307307 strategy . call! ( 'rack.session' => { 'omniauth.state' => state , 'omniauth.nonce' => nonce } )
308308 result = strategy . callback_phase
@@ -316,7 +316,7 @@ def test_callback_phase_with_timeout
316316 state = SecureRandom . hex ( 16 )
317317 nonce = SecureRandom . hex ( 16 )
318318 request . stubs ( :params ) . returns ( 'code' => code , 'state' => state )
319- request . stubs ( :path_info ) . returns ( '' )
319+ request . stubs ( :path ) . returns ( '' )
320320
321321 strategy . options . issuer = 'example.com'
322322
@@ -331,7 +331,7 @@ def test_callback_phase_with_etimeout
331331 state = SecureRandom . hex ( 16 )
332332 nonce = SecureRandom . hex ( 16 )
333333 request . stubs ( :params ) . returns ( 'code' => code , 'state' => state )
334- request . stubs ( :path_info ) . returns ( '' )
334+ request . stubs ( :path ) . returns ( '' )
335335
336336 strategy . options . issuer = 'example.com'
337337
@@ -346,7 +346,7 @@ def test_callback_phase_with_socket_error
346346 state = SecureRandom . hex ( 16 )
347347 nonce = SecureRandom . hex ( 16 )
348348 request . stubs ( :params ) . returns ( 'code' => code , 'state' => state )
349- request . stubs ( :path_info ) . returns ( '' )
349+ request . stubs ( :path ) . returns ( '' )
350350
351351 strategy . options . issuer = 'example.com'
352352
@@ -500,7 +500,7 @@ def test_state
500500 # the following should fail because the wrong state is passed to the callback
501501 code = SecureRandom . hex ( 16 )
502502 request . stubs ( :params ) . returns ( 'code' => code , 'state' => 43 )
503- request . stubs ( :path_info ) . returns ( '' )
503+ request . stubs ( :path ) . returns ( '' )
504504 strategy . call! ( 'rack.session' => session )
505505
506506 result = strategy . callback_phase
@@ -526,7 +526,7 @@ def test_option_client_auth_method
526526 token_type : 'Bearer' ,
527527 } . to_json
528528
529- request . stubs ( :path_info ) . returns ( '' )
529+ request . stubs ( :path ) . returns ( '' )
530530 strategy . call! ( 'rack.session' => { 'omniauth.state' => state , 'omniauth.nonce' => nonce } )
531531
532532 id_token = stub ( 'OpenIDConnect::ResponseObject::IdToken' )
0 commit comments