summaryrefslogtreecommitdiffstats
path: root/Tests/Auth/OpenID
diff options
context:
space:
mode:
authortailor <cygnus@janrain.com>2007-01-09 19:00:15 +0000
committertailor <cygnus@janrain.com>2007-01-09 19:00:15 +0000
commitf38bdd6f33ceb38ab8956e2b94ead8c9ee3734e5 (patch)
tree79b5f1910c88bd838ec87cc373f74b1087892de5 /Tests/Auth/OpenID
parentb272be11fca40b7ad4e0d2a9064de284f9412726 (diff)
downloadphp-openid-f38bdd6f33ceb38ab8956e2b94ead8c9ee3734e5.zip
php-openid-f38bdd6f33ceb38ab8956e2b94ead8c9ee3734e5.tar.gz
php-openid-f38bdd6f33ceb38ab8956e2b94ead8c9ee3734e5.tar.bz2
[project @ Update consumer code and tests to use Message abstraction]
Diffstat (limited to 'Tests/Auth/OpenID')
-rw-r--r--Tests/Auth/OpenID/Consumer.php227
1 files changed, 162 insertions, 65 deletions
diff --git a/Tests/Auth/OpenID/Consumer.php b/Tests/Auth/OpenID/Consumer.php
index 190b23a..ab9b69a 100644
--- a/Tests/Auth/OpenID/Consumer.php
+++ b/Tests/Auth/OpenID/Consumer.php
@@ -80,7 +80,6 @@ function Auth_OpenID_associate($qs, $assoc_secret, $assoc_handle)
}
-
return Auth_OpenID_KVForm::fromArray($reply_dict);
}
@@ -214,16 +213,23 @@ class Tests_Auth_OpenID_Consumer extends PHPUnit_TestCase {
$assoc = $store->getAssociation($_Auth_OpenID_server_url,
$fetcher->assoc_handle);
- $assoc->addSignature(array('mode', 'return_to', 'identity'),
+ $assoc->addSignature(array('mode', 'return_to',
+ 'assoc_handle', 'identity'),
$query);
} else {
$query['openid.signed'] =
- 'assoc_handle,sig,signed';
+ 'assoc_handle,mode,signed,identity';
$query['openid.assoc_handle'] = $fetcher->assoc_handle;
$query['openid.sig'] = 'fake';
}
- $result = $consumer->complete($query, $result->endpoint);
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+
+ $result = $consumer->complete($message, $result->endpoint);
+
+ if ($result->status != Auth_OpenID_SUCCESS) {
+ print $result->message."\n";
+ }
$this->assertEquals(Auth_OpenID_SUCCESS, $result->status);
$this->assertEquals($result->identity_url, $user_url);
@@ -337,7 +343,10 @@ class Tests_Auth_OpenID_Consumer_TestSetupNeeded extends _TestIdRes {
$query = array(
'openid.mode' => 'id_res',
'openid.user_setup_url' => $setup_url);
- $ret = $this->consumer->_doIdRes($query, $this->endpoint);
+
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+
+ $ret = $this->consumer->_doIdRes($message, $this->endpoint);
$this->assertEquals($ret->status, Auth_OpenID_SETUP_NEEDED);
$this->assertEquals($ret->setup_url, $setup_url);
}
@@ -359,8 +368,11 @@ class Tests_Auth_OpenID_Consumer_CheckNonceTest extends _TestIdRes {
{
$this->return_to = sprintf('http://rt.unittest/?nonce=%s',
Auth_OpenID_mkNonce());
- $this->response = new Auth_OpenID_SuccessResponse($this->endpoint,
- array('openid.return_to' => $this->return_to));
+ $query = array('openid.return_to' => $this->return_to);
+
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+ $this->response = new Auth_OpenID_SuccessResponse($this->endpoint, $message,
+ array('openid.return_to'));
$ret = $this->consumer->_checkNonce(null, $this->response);
$this->assertEquals($ret->status, Auth_OpenID_SUCCESS);
@@ -369,10 +381,14 @@ class Tests_Auth_OpenID_Consumer_CheckNonceTest extends _TestIdRes {
function test_serverNonce()
{
- $this->response = new Auth_OpenID_SuccessResponse($this->endpoint,
- array('openid.nonce' => Auth_OpenID_mkNonce()));
+ $query = array('openid.nonce' => Auth_OpenID_mkNonce());
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+
+ $this->response = new Auth_OpenID_SuccessResponse($this->endpoint, $message,
+ array('openid.nonce'));
$ret = $this->consumer->_checkNonce($this->server_url, $this->response);
$this->assertEquals($ret->status, Auth_OpenID_SUCCESS);
+ # print $ret->message."\n";
$this->assertEquals($ret->identity_url, $this->consumer_id);
}
@@ -383,8 +399,13 @@ class Tests_Auth_OpenID_Consumer_CheckNonceTest extends _TestIdRes {
list($timestamp, $salt) = Auth_OpenID_splitNonce($nonce);
$this->store->useNonce($this->server_url, $timestamp, $salt);
- $this->response = new Auth_OpenID_SuccessResponse($this->endpoint,
- array('openid.nonce' => $nonce));
+
+ $query = array('openid.nonce' => $nonce);
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+
+ $this->response = new Auth_OpenID_SuccessResponse($this->endpoint, $message,
+ array('openid.nonce'));
+
$ret = $this->consumer->_checkNonce($this->server_url, $this->response);
$this->assertEquals($ret->status, Auth_OpenID_FAILURE);
$this->assertEquals($ret->identity_url, $this->consumer_id);
@@ -394,8 +415,12 @@ class Tests_Auth_OpenID_Consumer_CheckNonceTest extends _TestIdRes {
function test_tamperedNonce()
{
// Malformed nonce
- $this->response = new Auth_OpenID_SuccessResponse($this->endpoint,
- array('openid.nonce' => 'malformed'));
+ $query = array('openid.nonce' => 'malformed');
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+
+ $this->response = new Auth_OpenID_SuccessResponse($this->endpoint, $message,
+ array('openid.nonce'));
+
$ret = $this->consumer->_checkNonce($this->server_url, $this->response);
$this->assertEquals($ret->status, Auth_OpenID_FAILURE);
$this->assertEquals($ret->identity_url, $this->consumer_id);
@@ -405,8 +430,12 @@ class Tests_Auth_OpenID_Consumer_CheckNonceTest extends _TestIdRes {
function test_missingNonce()
{
// no nonce parameter on the return_to
- $this->response = new Auth_OpenID_SuccessResponse($this->endpoint,
- array('openid.return_to' => $this->return_to));
+ $query = array('openid.return_to' => $this->return_to);
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+
+ $this->response = new Auth_OpenID_SuccessResponse($this->endpoint, $message,
+ array('openid.nonce'));
+
$ret = $this->consumer->_checkNonce($this->server_url, $this->response);
$this->assertEquals($ret->status, Auth_OpenID_FAILURE);
$this->assertEquals($ret->identity_url, $this->consumer_id);
@@ -418,9 +447,9 @@ class Tests_Auth_OpenID_Consumer_CheckNonceTest extends _TestIdRes {
class Tests_Auth_OpenID_Consumer_TestCheckAuthTriggered extends _TestIdRes {
var $consumer_class = '_CheckAuthDetectingConsumer';
- function _doIdRes($query)
+ function _doIdRes($message)
{
- return $this->consumer->_doIdRes($query, $this->endpoint);
+ return $this->consumer->_doIdRes($message, $this->endpoint);
}
function test_checkAuthTriggered()
@@ -429,7 +458,9 @@ class Tests_Auth_OpenID_Consumer_TestCheckAuthTriggered extends _TestIdRes {
'openid.identity' => $this->server_id,
'openid.assoc_handle' =>'not_found');
- $result = $this->_doIdRes($query);
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+
+ $result = $this->_doIdRes($message);
$error = __getError();
if ($error === null) {
@@ -452,7 +483,9 @@ class Tests_Auth_OpenID_Consumer_TestCheckAuthTriggered extends _TestIdRes {
'openid.identity' => $this->server_id,
'openid.assoc_handle' =>'not_found');
- $result = $this->_doIdRes($query);
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+
+ $result = $this->_doIdRes($message);
$error = __getError();
if ($error === null) {
@@ -477,7 +510,9 @@ class Tests_Auth_OpenID_Consumer_TestCheckAuthTriggered extends _TestIdRes {
'openid.identity' => $this->server_id,
'openid.assoc_handle' => $handle);
- $info = $this->_doIdRes($query);
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+
+ $info = $this->_doIdRes($message);
$this->assertEquals('failure', $info->status);
$this->assertEquals($this->consumer_id, $info->identity_url);
@@ -508,7 +543,10 @@ class Tests_Auth_OpenID_Consumer_TestCheckAuthTriggered extends _TestIdRes {
'openid.assoc_handle' => $good_handle);
$good_assoc->addSignature(array('return_to', 'identity'), $query);
- $info = $this->_doIdRes($query);
+
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+
+ $info = $this->_doIdRes($message);
$this->assertEquals($info->status, 'success');
$this->assertEquals($this->consumer_id, $info->identity_url);
}
@@ -539,7 +577,9 @@ class Tests_Auth_OpenID_Complete extends _TestIdRes {
function test_cancel()
{
$query = array('openid.mode' => 'cancel');
- $r = $this->consumer->complete($query, $this->endpoint);
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+
+ $r = $this->consumer->complete($message, $this->endpoint);
$this->assertEquals($r->status, Auth_OpenID_CANCEL);
$this->assertTrue($r->identity_url == $this->endpoint->identity_url);
}
@@ -549,7 +589,8 @@ class Tests_Auth_OpenID_Complete extends _TestIdRes {
$msg = 'an error message';
$query = array('openid.mode' =>'error',
'openid.error' => $msg);
- $r = $this->consumer->complete($query, $this->endpoint);
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+ $r = $this->consumer->complete($message, $this->endpoint);
$this->assertEquals($r->status, Auth_OpenID_FAILURE);
$this->assertTrue($r->identity_url == $this->endpoint->identity_url);
$this->assertEquals($r->message, $msg);
@@ -558,7 +599,8 @@ class Tests_Auth_OpenID_Complete extends _TestIdRes {
function test_noMode()
{
$query = array();
- $r = $this->consumer->complete($query, $this->endpoint);
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+ $r = $this->consumer->complete($message, $this->endpoint);
$this->assertEquals($r->status, Auth_OpenID_FAILURE);
$this->assertTrue($r->identity_url == $this->endpoint->identity_url);
}
@@ -566,7 +608,8 @@ class Tests_Auth_OpenID_Complete extends _TestIdRes {
function test_idResMissingField()
{
$query = array('openid.mode' => 'id_res');
- $r = $this->consumer->complete($query, $this->endpoint);
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+ $r = $this->consumer->complete($message, $this->endpoint);
$this->assertEquals($r->status, Auth_OpenID_FAILURE);
$this->assertEquals($r->identity_url, $this->consumer_id);
}
@@ -577,7 +620,8 @@ class Tests_Auth_OpenID_Complete extends _TestIdRes {
'openid.return_to' => 'return_to (just anything)',
'openid.identity' => 'something wrong (not this->consumer_id)',
'openid.assoc_handle' => 'does not matter');
- $r = $this->consumer->complete($query, $this->endpoint);
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+ $r = $this->consumer->complete($message, $this->endpoint);
$this->assertEquals($r->status, Auth_OpenID_FAILURE);
$this->assertEquals($r->identity_url, $this->consumer_id);
$this->assertTrue(strpos($r->message, 'delegate') !== false);
@@ -601,7 +645,8 @@ class Tests_Auth_OpenID_CheckAuthResponse extends _TestIdRes {
{
// successful response to check_authentication
$response = array('is_valid' => 'true');
- $r = $this->consumer->_processCheckAuthResponse($response, $this->server_url);
+ $message = Auth_OpenID_Message::fromOpenIDArgs($response);
+ $r = $this->consumer->_processCheckAuthResponse($message, $this->server_url);
$this->assertTrue($r);
}
@@ -610,7 +655,8 @@ class Tests_Auth_OpenID_CheckAuthResponse extends _TestIdRes {
// check_authentication returns false when the server sends no
// answer
$response = array();
- $r = $this->consumer->_processCheckAuthResponse($response, $this->server_url);
+ $message = Auth_OpenID_Message::fromPostArgs($response);
+ $r = $this->consumer->_processCheckAuthResponse($message, $this->server_url);
$this->assertFalse($r);
}
@@ -618,7 +664,9 @@ class Tests_Auth_OpenID_CheckAuthResponse extends _TestIdRes {
{
// check_authentication returns false when is_valid is false
$response = array('is_valid' => 'false');
- $r = $this->consumer->_processCheckAuthResponse($response, $this->server_url);
+ $message = Auth_OpenID_Message::fromOpenIDArgs($response);
+
+ $r = $this->consumer->_processCheckAuthResponse($message, $this->server_url);
$this->assertFalse($r);
}
@@ -630,7 +678,9 @@ class Tests_Auth_OpenID_CheckAuthResponse extends _TestIdRes {
$response = array('is_valid' => 'false',
'invalidate_handle' => 'handle');
- $r = $this->consumer->_processCheckAuthResponse($response,
+ $message = Auth_OpenID_Message::fromOpenIDArgs($response);
+
+ $r = $this->consumer->_processCheckAuthResponse($message,
$this->server_url);
$this->assertFalse($r);
$this->assertTrue(
@@ -643,7 +693,9 @@ class Tests_Auth_OpenID_CheckAuthResponse extends _TestIdRes {
$response = array('is_valid' => 'true',
'invalidate_handle' => 'missing');
- $r = $this->consumer->_processCheckAuthResponse($response, $this->server_url);
+ $message = Auth_OpenID_Message::fromOpenIDArgs($response);
+
+ $r = $this->consumer->_processCheckAuthResponse($message, $this->server_url);
$this->assertTrue($r);
}
@@ -654,7 +706,9 @@ class Tests_Auth_OpenID_CheckAuthResponse extends _TestIdRes {
$response = array('is_valid' => 'true',
'invalidate_handle' => 'handle');
- $r = $this->consumer->_processCheckAuthResponse($response, $this->server_url);
+ $message = Auth_OpenID_Message::fromOpenIDArgs($response);
+
+ $r = $this->consumer->_processCheckAuthResponse($message, $this->server_url);
$this->assertTrue($r);
$this->assertTrue(
$this->consumer->store->getAssociation($this->server_url) === null);
@@ -664,7 +718,7 @@ class Tests_Auth_OpenID_CheckAuthResponse extends _TestIdRes {
class _IdResFetchFailingConsumer extends Auth_OpenID_GenericConsumer {
var $message = 'fetch failed';
- function _doIdRes($query, $endpoint)
+ function _doIdRes($message, $endpoint)
{
return new Auth_OpenID_FailureResponse($endpoint,
$this->message);
@@ -677,7 +731,8 @@ class Tests_Auth_OpenID_FetchErrorInIdRes extends _TestIdRes {
function test_idResFailure()
{
$query = array('openid.mode' => 'id_res');
- $r = $this->consumer->complete($query, $this->endpoint);
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+ $r = $this->consumer->complete($message, $this->endpoint);
$this->assertEquals($r->status, Auth_OpenID_FAILURE);
$this->assertEquals($r->identity_url, $this->consumer_id);
$this->assertEquals($this->consumer->message, $r->message);
@@ -697,8 +752,10 @@ class _ExceptionRaisingMockFetcher {
}
class _BadArgCheckingConsumer extends Auth_OpenID_GenericConsumer {
- function _makeKVPost($args, $tmp)
+ function _makeKVPost($message, $tmp)
{
+ $args = $message->toPostArgs();
+
if ($args != array(
'openid.mode' => 'check_authentication',
'openid.signed' => 'foo')) {
@@ -725,7 +782,9 @@ class Tests_Auth_OpenID_Consumer_TestCheckAuth extends _TestIdRes {
array(),
"blah:blah\n");
$query = array('openid.signed' => 'stuff, things');
- $r = $this->consumer->_checkAuth($query, $_Auth_OpenID_server_url);
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+
+ $r = $this->consumer->_checkAuth($message, $_Auth_OpenID_server_url);
if ($r !== false) {
$this->fail("Expected _checkAuth result to be false");
}
@@ -737,7 +796,10 @@ class Tests_Auth_OpenID_Consumer_TestCheckAuth extends _TestIdRes {
'closid.foo' => 'something');
$consumer = new _BadArgCheckingConsumer($this->store);
- $consumer->_checkAuth($query, 'does://not.matter');
+
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+
+ $consumer->_checkAuth($message, 'does://not.matter');
$this->assertEquals(__getError(), E_ASSERTION_ERROR);
}
}
@@ -757,7 +819,10 @@ class Tests_Auth_OpenID_Consumer_TestFetchAssoc extends PHPUnit_TestCase {
404,
array(),
"blah:blah\n");
- $r = $this->consumer->_makeKVPost(array('openid.mode' => 'associate'),
+ $query = array('openid.mode' => 'associate');
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+
+ $r = $this->consumer->_makeKVPost($message,
"http://server_url");
if ($r !== null) {
$this->fail("Expected _makeKVPost result to be null");
@@ -768,7 +833,10 @@ class Tests_Auth_OpenID_Consumer_TestFetchAssoc extends PHPUnit_TestCase {
{
$this->consumer->fetcher = new _ExceptionRaisingMockFetcher();
- $this->consumer->_makeKVPost(array('openid.mode' => 'associate'),
+ $query = array('openid.mode' => 'associate');
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+
+ $this->consumer->_makeKVPost($message,
"http://server_url");
if (__getError() !== E_MOCK_FETCHER_EXCEPTION) {
@@ -779,7 +847,10 @@ class Tests_Auth_OpenID_Consumer_TestFetchAssoc extends PHPUnit_TestCase {
// exception fetching returns no association
$this->assertEquals(@$this->consumer->_getAssociation('some://url'), null);
- $this->consumer->_checkAuth(array('openid.signed' => ''),
+ $query = array('openid.signed' => '');
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+
+ $this->consumer->_checkAuth($message,
'some://url');
if (__getError() !== E_MOCK_FETCHER_EXCEPTION) {
@@ -797,7 +868,7 @@ class Tests_Auth_OpenID_AuthRequest extends PHPUnit_TestCase {
$this->endpoint->server_url = 'http://server.unittest/';
$this->assoc =& $this;
$this->assoc->handle = 'assoc@handle';
- $this->authreq = new Auth_OpenID_AuthRequest($this->endpoint, $this->assoc);
+ $this->authreq = new Auth_OpenID_AuthRequest($this->assoc, $this->endpoint);
}
function test_addExtensionArg()
@@ -808,9 +879,9 @@ class Tests_Auth_OpenID_AuthRequest extends PHPUnit_TestCase {
array('openid.bag.color' => 'brown',
'openid.bag.material' => 'paper'));
$url = $this->authreq->redirectURL('http://7.utest/', 'http://7.utest/r');
- $this->failUnless(strpos($url, 'openid.bag.color=brown') !== false,
+ $this->assertTrue(strpos($url, 'openid.bag.color=brown') !== false,
'extension arg not found in '.$url);
- $this->failUnless(strpos($url, 'openid.bag.material=paper') !== false,
+ $this->assertTrue(strpos($url, 'openid.bag.material=paper') !== false,
'extension arg not found in '.$url);
}
}
@@ -824,28 +895,39 @@ class Tests_Auth_OpenID_SuccessResponse extends PHPUnit_TestCase {
function test_extensionResponse()
{
- $resp = SuccessResponse($this->endpoint, array(
+ $uri = "http://bogus.unittest/1.0";
+
+ $query = array(
+ 'openid.ns.unittest' => $uri,
'openid.unittest.one' => '1',
'openid.unittest.two' =>'2',
'openid.sreg.nickname' => 'j3h',
- 'openid.return_to' => 'return_to'));
+ 'openid.return_to' => 'return_to');
- $utargs = $resp->extensionResponse('unittest');
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+ $resp = new Auth_OpenID_SuccessResponse($this->endpoint, $message);
+
+ $utargs = $resp->extensionResponse($uri);
$this->assertEquals($utargs, array('one' => '1', 'two' => '2'));
- $sregargs = $resp->extensionResponse('sreg');
+ $sregargs = $resp->extensionResponse(Auth_OpenID_SREG_URI);
$this->assertEquals($sregargs, array('nickname' => 'j3h'));
}
function test_noReturnTo()
{
- $resp = SuccessResponse($this->endpoint, array());
- $this->failUnless($resp->getReturnTo() === null);
+ $message = Auth_OpenID_Message::fromPostArgs(array());
+ $resp = new Auth_OpenID_SuccessResponse($this->endpoint, $message);
+ $this->assertTrue($resp->getReturnTo() === null);
}
function test_returnTo()
{
- $resp = SuccessResponse($this->endpoint,
- array('openid.return_to' => 'return_to'));
+ $query = array('openid.return_to' => 'return_to');
+ $message = Auth_OpenID_Message::fromPostArgs($query);
+
+ $resp = new Auth_OpenID_SuccessResponse($this->endpoint,
+ $message, array('openid.return_to'));
+
$this->assertEquals($resp->getReturnTo(), 'return_to');
}
}
@@ -862,13 +944,15 @@ class Tests_Auth_OpenID_ParseAssociation extends _TestIdRes {
function test_missing()
{
// Missing required arguments
- $result = $this->consumer->_parseAssociation(array(), null, 'server_url');
+ $message = Auth_OpenID_Message::fromPostArgs(array());
+ $result = $this->consumer->_parseAssociation($message, null, 'server_url');
$this->assertTrue($result === null);
}
function _setUpDH()
{
- list($sess, $args) = $this->consumer->_createAssociateRequest($this->server_url);
+ list($sess, $message) = $this->consumer->_createAssociateRequest($this->server_url);
+ $args = $message->toPostArgs();
$server_sess = Auth_OpenID_DiffieHellmanServerSession::fromQuery($args);
$server_resp = $server_sess->answer($this->secret);
$server_resp['assoc_type'] = 'HMAC-SHA1';
@@ -886,7 +970,8 @@ class Tests_Auth_OpenID_ParseAssociation extends _TestIdRes {
'assoc_handle' => 'ahandle',
'expires_in' => '1000'
);
- $ret = $this->consumer->_parseAssociation($server_resp, $sess,
+ $message = Auth_OpenID_Message::fromOpenIDArgs($server_resp);
+ $ret = $this->consumer->_parseAssociation($message, $sess,
'server_url');
$this->assertEquals($ret->secret,
"\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" .
@@ -900,7 +985,8 @@ class Tests_Auth_OpenID_ParseAssociation extends _TestIdRes {
return;
}
list($sess, $server_resp) = $this->_setUpDH();
- $ret = $this->consumer->_parseAssociation($server_resp, $sess,
+ $message = Auth_OpenID_Message::fromOpenIDArgs($server_resp);
+ $ret = $this->consumer->_parseAssociation($message, $sess,
'server_url');
$this->assertTrue($ret !== null);
$this->assertEquals($ret->assoc_type, 'HMAC-SHA1');
@@ -917,7 +1003,9 @@ class Tests_Auth_OpenID_ParseAssociation extends _TestIdRes {
'assoc_type' => 'Crazy Low Prices!!!',
'expires_in' => '1000'
);
- $ret = $this->consumer->_parseAssociation($server_resp, $sess,
+ $message = Auth_OpenID_Message::fromOpenIDArgs($server_resp);
+
+ $ret = $this->consumer->_parseAssociation($message, $sess,
'server_url');
$this->assertTrue($ret === null);
}
@@ -930,7 +1018,8 @@ class Tests_Auth_OpenID_ParseAssociation extends _TestIdRes {
'assoc_type' => 'HMAC-SHA1',
'expires_in' => 'Crazy Low Prices!!!'
);
- $ret = $this->consumer->_parseAssociation($server_resp, $sess,
+ $message = Auth_OpenID_Message::fromOpenIDArgs($server_resp);
+ $ret = $this->consumer->_parseAssociation($message, $sess,
'server_url');
$this->assertTrue($ret === null);
}
@@ -944,7 +1033,8 @@ class Tests_Auth_OpenID_ParseAssociation extends _TestIdRes {
'expires_in' => '1000',
'session_type' => '|/iA6rA'
);
- $ret = $this->consumer->_parseAssociation($server_resp, $sess,
+ $message = Auth_OpenID_Message::fromOpenIDArgs($server_resp);
+ $ret = $this->consumer->_parseAssociation($message, $sess,
'server_url');
$this->assertTrue($ret === null);
}
@@ -962,7 +1052,8 @@ class Tests_Auth_OpenID_ParseAssociation extends _TestIdRes {
'expires_in' => '1000',
'mac_key' => base64_encode($this->secret));
- $ret = $this->consumer->_parseAssociation($server_resp, $sess,
+ $message = Auth_OpenID_Message::fromOpenIDArgs($server_resp);
+ $ret = $this->consumer->_parseAssociation($message, $sess,
'server_url');
$this->assertTrue($ret !== null);
$this->assertEquals($ret->assoc_type, 'HMAC-SHA1');
@@ -984,7 +1075,8 @@ class Tests_Auth_OpenID_ParseAssociation extends _TestIdRes {
'assoc_handle' => 'handle',
'expires_in' => '1000');
- $ret = $this->consumer->_parseAssociation($server_resp, $sess,
+ $message = Auth_OpenID_Message::fromOpenIDArgs($server_resp);
+ $ret = $this->consumer->_parseAssociation($message, $sess,
'server_url');
$this->assertTrue($ret === null);
}
@@ -996,7 +1088,8 @@ class Tests_Auth_OpenID_ParseAssociation extends _TestIdRes {
}
list($sess, $server_resp) = $this->_setUpDH();
$server_resp['enc_mac_key'] = "\x00\x00\x00";
- $ret = $this->consumer->_parseAssociation($server_resp, $sess,
+ $message = Auth_OpenID_Message::fromOpenIDArgs($server_resp);
+ $ret = $this->consumer->_parseAssociation($message, $sess,
'server_url');
$this->assertTrue($ret === null);
}
@@ -1018,7 +1111,7 @@ class _StubConsumer {
return $auth_req;
}
- function complete($query, $endpoint)
+ function complete($message, $endpoint)
{
return $this->response;
}
@@ -1109,8 +1202,9 @@ class Tests_Auth_OpenID_ConsumerTest2 extends PHPUnit_TestCase {
function test_noDiscoCompleteSuccessWithToken()
{
+ $message = Auth_OpenID_Message::fromPostArgs(array());
$this->_doRespNoDisco(new Auth_OpenID_SuccessResponse($this->endpoint,
- array()));
+ $message));
}
function test_noDiscoCompleteCancelWithToken()
@@ -1156,9 +1250,10 @@ class Tests_Auth_OpenID_ConsumerTest2 extends PHPUnit_TestCase {
// Cancel and success DO clean up the discovery process
function test_completeSuccess()
{
+ $message = Auth_OpenID_Message::fromPostArgs(array());
$this->_doRespDisco(true,
new Auth_OpenID_SuccessResponse($this->endpoint,
- array()));
+ $message));
}
function test_completeCancel()
@@ -1206,10 +1301,12 @@ $Tests_Auth_OpenID_Consumer_other = array(
new Tests_Auth_OpenID_Consumer_TestFetchAssoc(),
new Tests_Auth_OpenID_Consumer_CheckNonceTest(),
new Tests_Auth_OpenID_Complete(),
+ new Tests_Auth_OpenID_SuccessResponse(),
new Tests_Auth_OpenID_CheckAuthResponse(),
new Tests_Auth_OpenID_FetchErrorInIdRes(),
new Tests_Auth_OpenID_ParseAssociation(),
- new Tests_Auth_OpenID_ConsumerTest2()
+ new Tests_Auth_OpenID_ConsumerTest2(),
+ new Tests_Auth_OpenID_AuthRequest()
);
?> \ No newline at end of file