@@ -29,6 +29,7 @@ def initialize; end
29
29
assert_equal "https://hello.example.com/access/saml/logout" , settings . idp_slo_target_url
30
30
assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , settings . name_identifier_format
31
31
assert_equal [ "AuthToken" , "SSOStartPage" ] , settings . idp_attribute_names
32
+ assert_equal '2014-04-17T18:02:33.910Z' , settings . valid_until
32
33
end
33
34
34
35
it "extract certificate from md:KeyDescriptor[@use='signing']" do
@@ -76,7 +77,7 @@ def initialize; end
76
77
77
78
options [ :sso_binding ] = [ 'invalid_binding' , 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect' ]
78
79
settings = idp_metadata_parser . parse ( idp_metadata , options )
79
- assert_equal "https://idp.example.com/idp/profile/SAML2/Redirect/SSO" , settings . idp_sso_target_url
80
+ assert_equal "https://idp.example.com/idp/profile/SAML2/Redirect/SSO" , settings . idp_sso_target_url
80
81
end
81
82
82
83
it "uses settings options as hash for overrides" do
@@ -121,6 +122,7 @@ def initialize; end
121
122
assert_equal "https://hello.example.com/access/saml/logout" , metadata [ :idp_slo_target_url ]
122
123
assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , metadata [ :name_identifier_format ]
123
124
assert_equal [ "AuthToken" , "SSOStartPage" ] , metadata [ :idp_attribute_names ]
125
+ assert_equal '2014-04-17T18:02:33.910Z' , metadata [ :valid_until ]
124
126
end
125
127
126
128
it "extract certificate from md:KeyDescriptor[@use='signing']" do
@@ -242,6 +244,7 @@ def initialize; end
242
244
assert_equal "https://hello.example.com/access/saml/logout" , settings . idp_slo_target_url
243
245
assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , settings . name_identifier_format
244
246
assert_equal [ "AuthToken" , "SSOStartPage" ] , settings . idp_attribute_names
247
+ assert_equal '2014-04-17T18:02:33.910Z' , settings . valid_until
245
248
assert_equal OpenSSL ::SSL ::VERIFY_PEER , @http . verify_mode
246
249
end
247
250
@@ -275,6 +278,7 @@ def initialize; end
275
278
assert_equal "https://hello.example.com/access/saml/logout" , parsed_metadata [ :idp_slo_target_url ]
276
279
assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , parsed_metadata [ :name_identifier_format ]
277
280
assert_equal [ "AuthToken" , "SSOStartPage" ] , parsed_metadata [ :idp_attribute_names ]
281
+ assert_equal '2014-04-17T18:02:33.910Z' , parsed_metadata [ :valid_until ]
278
282
assert_equal OpenSSL ::SSL ::VERIFY_PEER , @http . verify_mode
279
283
end
280
284
@@ -341,14 +345,17 @@ def initialize; end
341
345
assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA:DD:B0:16:45:48:72" , @settings . idp_cert_fingerprint
342
346
assert_equal "https://hello.example.com/access/saml/logout" , @settings . idp_slo_target_url
343
347
assert_equal [ "AuthToken" , "SSOStartPage" ] , @settings . idp_attribute_names
348
+ assert_equal '2014-04-17T18:02:33.910Z' , @settings . valid_until
344
349
end
345
350
346
351
it "should handle multiple descriptors at once" do
347
352
settings = @idp_metadata_parser . parse_to_array ( @idp_metadata )
348
353
assert_equal "https://foo.example.com/access/saml/idp.xml" , settings . first [ :idp_entity_id ]
349
354
assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA:DD:B0:16:45:48:72" , settings . first [ :idp_cert_fingerprint ]
355
+ assert_equal '2014-04-17T18:02:33.910Z' , settings . first [ :valid_until ]
350
356
assert_equal "https://bar.example.com/access/saml/idp.xml" , settings . last [ :idp_entity_id ]
351
357
assert_equal "08:EB:6E:60:A2:14:4E:89:EC:FA:05:74:9D:72:BF:5D:BE:54:F0:1A" , settings . last [ :idp_cert_fingerprint ]
358
+ assert_equal '2014-04-17T18:02:33.910Z' , settings . last [ :valid_until ]
352
359
end
353
360
end
354
361
0 commit comments