@@ -29,6 +29,7 @@ def initialize; end
2929 assert_equal "https://hello.example.com/access/saml/logout" , settings . idp_slo_target_url
3030 assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , settings . name_identifier_format
3131 assert_equal [ "AuthToken" , "SSOStartPage" ] , settings . idp_attribute_names
32+ assert_equal '2014-04-17T18:02:33.910Z' , settings . valid_until
3233 end
3334
3435 it "extract certificate from md:KeyDescriptor[@use='signing']" do
@@ -76,7 +77,7 @@ def initialize; end
7677
7778 options [ :sso_binding ] = [ 'invalid_binding' , 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect' ]
7879 settings = idp_metadata_parser . parse ( idp_metadata , options )
79- assert_equal "https://idp.example.com/idp/profile/SAML2/Redirect/SSO" , settings . idp_sso_target_url
80+ assert_equal "https://idp.example.com/idp/profile/SAML2/Redirect/SSO" , settings . idp_sso_target_url
8081 end
8182
8283 it "uses settings options as hash for overrides" do
@@ -121,6 +122,7 @@ def initialize; end
121122 assert_equal "https://hello.example.com/access/saml/logout" , metadata [ :idp_slo_target_url ]
122123 assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , metadata [ :name_identifier_format ]
123124 assert_equal [ "AuthToken" , "SSOStartPage" ] , metadata [ :idp_attribute_names ]
125+ assert_equal '2014-04-17T18:02:33.910Z' , metadata [ :valid_until ]
124126 end
125127
126128 it "extract certificate from md:KeyDescriptor[@use='signing']" do
@@ -242,6 +244,7 @@ def initialize; end
242244 assert_equal "https://hello.example.com/access/saml/logout" , settings . idp_slo_target_url
243245 assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , settings . name_identifier_format
244246 assert_equal [ "AuthToken" , "SSOStartPage" ] , settings . idp_attribute_names
247+ assert_equal '2014-04-17T18:02:33.910Z' , settings . valid_until
245248 assert_equal OpenSSL ::SSL ::VERIFY_PEER , @http . verify_mode
246249 end
247250
@@ -275,6 +278,7 @@ def initialize; end
275278 assert_equal "https://hello.example.com/access/saml/logout" , parsed_metadata [ :idp_slo_target_url ]
276279 assert_equal "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified" , parsed_metadata [ :name_identifier_format ]
277280 assert_equal [ "AuthToken" , "SSOStartPage" ] , parsed_metadata [ :idp_attribute_names ]
281+ assert_equal '2014-04-17T18:02:33.910Z' , parsed_metadata [ :valid_until ]
278282 assert_equal OpenSSL ::SSL ::VERIFY_PEER , @http . verify_mode
279283 end
280284
@@ -341,14 +345,17 @@ def initialize; end
341345 assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA:DD:B0:16:45:48:72" , @settings . idp_cert_fingerprint
342346 assert_equal "https://hello.example.com/access/saml/logout" , @settings . idp_slo_target_url
343347 assert_equal [ "AuthToken" , "SSOStartPage" ] , @settings . idp_attribute_names
348+ assert_equal '2014-04-17T18:02:33.910Z' , @settings . valid_until
344349 end
345350
346351 it "should handle multiple descriptors at once" do
347352 settings = @idp_metadata_parser . parse_to_array ( @idp_metadata )
348353 assert_equal "https://foo.example.com/access/saml/idp.xml" , settings . first [ :idp_entity_id ]
349354 assert_equal "F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA:DD:B0:16:45:48:72" , settings . first [ :idp_cert_fingerprint ]
355+ assert_equal '2014-04-17T18:02:33.910Z' , settings . first [ :valid_until ]
350356 assert_equal "https://bar.example.com/access/saml/idp.xml" , settings . last [ :idp_entity_id ]
351357 assert_equal "08:EB:6E:60:A2:14:4E:89:EC:FA:05:74:9D:72:BF:5D:BE:54:F0:1A" , settings . last [ :idp_cert_fingerprint ]
358+ assert_equal '2014-04-17T18:02:33.910Z' , settings . last [ :valid_until ]
352359 end
353360 end
354361
0 commit comments