@@ -56,7 +56,7 @@ class RubySamlTest < Minitest::Test
56
56
57
57
describe "Prevent XEE attack" do
58
58
before do
59
- @response = OneLogin ::RubySaml ::Response . new ( fixture ( :attackxee ) )
59
+ @response = OneLogin ::RubySaml ::Response . new ( fixture ( :attackxee ) )
60
60
end
61
61
62
62
it "false when evil attack vector is present, soft = true" do
@@ -419,7 +419,7 @@ class RubySamlTest < Minitest::Test
419
419
assert response_valid_signed . send ( :validate_issuer )
420
420
421
421
response_valid_signed . settings . idp_entity_id = 'https://app.onelogin.com/saml2'
422
- assert response_valid_signed . send ( :validate_issuer )
422
+ assert response_valid_signed . send ( :validate_issuer )
423
423
end
424
424
425
425
it "return false when the issuer of the Message does not match the IdP entityId" do
@@ -501,7 +501,7 @@ class RubySamlTest < Minitest::Test
501
501
response = OneLogin ::RubySaml ::Response . new ( response_document_valid_signed , :settings => settings , :matches_request_id => "_fc4a34b0-7efb-012e-caae-782bcb13bb38" )
502
502
assert response . send ( :validate_in_response_to )
503
503
assert_empty response . errors
504
- end
504
+ end
505
505
506
506
it "return true when no Request ID is provided for checking" do
507
507
response = OneLogin ::RubySaml ::Response . new ( response_document_valid_signed , :settings => settings )
@@ -898,7 +898,7 @@ class RubySamlTest < Minitest::Test
898
898
it 'is not possible when encryptID inside the assertion but no private key' do
899
899
response_encrypted_nameid . settings = settings
900
900
assert_raises ( OneLogin ::RubySaml ::ValidationError , "An EncryptedID found and no SP private key found on the settings to decrypt it" ) do
901
- assert_equal "[email protected] " , response_encrypted_nameid . nameid
901
+ assert_equal "[email protected] " , response_encrypted_nameid . nameid
902
902
end
903
903
end
904
904
@@ -1017,7 +1017,7 @@ class RubySamlTest < Minitest::Test
1017
1017
describe "check right settings" do
1018
1018
1019
1019
it "is not possible to decrypt the assertion if no private key" do
1020
- response = OneLogin ::RubySaml ::Response . new ( signed_message_encrypted_unsigned_assertion , :settings => settings )
1020
+ response = OneLogin ::RubySaml ::Response . new ( signed_message_encrypted_unsigned_assertion , :settings => settings )
1021
1021
1022
1022
encrypted_assertion_node = REXML ::XPath . first (
1023
1023
response . document ,
@@ -1033,7 +1033,7 @@ class RubySamlTest < Minitest::Test
1033
1033
end
1034
1034
1035
1035
it "is possible to decrypt the assertion if private key" do
1036
- response = OneLogin ::RubySaml ::Response . new ( signed_message_encrypted_unsigned_assertion , :settings => settings )
1036
+ response = OneLogin ::RubySaml ::Response . new ( signed_message_encrypted_unsigned_assertion , :settings => settings )
1037
1037
1038
1038
encrypted_assertion_node = REXML ::XPath . first (
1039
1039
response . document ,
@@ -1100,9 +1100,9 @@ class RubySamlTest < Minitest::Test
1100
1100
assert_equal "_ce3d2948b4cf20146dee0a0b3dd6f69b6cf86f62d7" , response . nameid
1101
1101
end
1102
1102
end
1103
-
1103
+
1104
1104
end
1105
- describe "test qualified name id in attributes" do
1105
+ describe "test qualified name id in attributes" do
1106
1106
1107
1107
it "parsed the nameid" do
1108
1108
response = OneLogin ::RubySaml ::Response . new ( read_response ( "signed_nameid_in_atts.xml" ) , :settings => settings )
@@ -1113,7 +1113,7 @@ class RubySamlTest < Minitest::Test
1113
1113
end
1114
1114
end
1115
1115
1116
- describe "test unqualified name id in attributes" do
1116
+ describe "test unqualified name id in attributes" do
1117
1117
1118
1118
it "parsed the nameid" do
1119
1119
response = OneLogin ::RubySaml ::Response . new ( read_response ( "signed_unqual_nameid_in_atts.xml" ) , :settings => settings )
0 commit comments