• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

digidentity / libsaml
100%
master: 100%

Build:
Build:
LAST BUILD BRANCH: v3.13.1
DEFAULT BRANCH: master
Repo Added 08 Dec 2013 01:23PM UTC
Files 100
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

LAST BUILD ON BRANCH verify-multiple-signatures-with-corresponding-key-names
branch: verify-multiple-signatures-with-corresponding-key-names
CHANGE BRANCH
x
Reset
  • verify-multiple-signatures-with-corresponding-key-names
  • 3.9.3
  • add-advice-element-and-update-subject-element
  • add-attribute-authority-descriptor
  • add-attribute-authority-descriptor-as-descriptor
  • add-attribute-service-url
  • add-endpoint-index-to-artifact
  • add-fail-silent-to-decrypt-encrypted-id
  • add-metadata-publication-info-extension
  • add-name-id-format-to-sso-descriptor-type
  • add-namespaces-to-signature-elements
  • add-scoping-element-to-authn-request
  • add-ssl-private-key-and-ssl-certificate-to-config
  • add-status-message-element
  • add-support-multiple-requested-authn-contexts
  • add-unknown-principal-sub-status-code
  • adjust-assertion-element
  • artifact-response-with-authn-request
  • attribute-extensions
  • attributes
  • audience
  • backwards-compatible-audience
  • bump-xmlenc
  • canonicalize
  • custom-assertion-subject
  • encrypt-elements-consistantly
  • encrypt-encrypted-id-with-multiple-key-descriptors
  • encrypted-attribute
  • encryption-of-encryptedid-and-encryptedattributes-consistency
  • feature/add-key-descriptor-to-encrypt-assertion
  • feature/add-status-detail
  • feature/return-first-key-descriptor
  • feature/support-multiple-attributes
  • fix-encryption-of-encryptedid-with-multiple-keydescriptors
  • fix-nested-assertion-parsing
  • fix/missing-namespaces
  • fix/raise-signature-missing
  • fix/work-with-activesupport-7
  • has-many-audiences
  • housekeeping
  • include-nested-prefixlist-config
  • include_nested_prefixlist
  • inclusive-namespaces-prefix-list-config
  • inclusive_namespaces
  • inclusive_namespaces_pass
  • logout-request
  • master
  • multiple-attribute-value-elements-on-attribute-type
  • optional-conditions-attributes
  • optional-status-detail-element
  • parse-signature-directly-in-root
  • rails-4.1
  • remove-non-soap-related-namespaces
  • replace-attribute-values-instead-of-append
  • request-unsupported
  • retrieve-assertion-consumer-service-by-index-or-default
  • sign-encrypted-data-with-multiple-recipients
  • status-message
  • subject-confirmation-and-subject-confirmation-data-fixes
  • up-to-date-dev-deps-and-nokogiri
  • upgrade-ruby
  • v2.20.1
  • v2.20.2
  • v2.20.3
  • v2.20.4
  • v2.20.5
  • v2.20.6
  • v2.21.2
  • v2.21.3
  • v2.22.0
  • v2.22.1
  • v2.22.2
  • v2.23.1
  • v2.23.2
  • v2.24.1
  • v2.24.2
  • v2.24.3
  • v2.4.2
  • v3.0.1
  • v3.0.2
  • v3.0.3
  • v3.0.4
  • v3.0.5
  • v3.0.6
  • v3.0.7
  • v3.0.8
  • v3.0.9
  • v3.1.0
  • v3.1.1
  • v3.1.2
  • v3.10.0
  • v3.11.0
  • v3.12.0
  • v3.13.0
  • v3.13.1
  • v3.2.1
  • v3.2.2
  • v3.3.0
  • v3.4.0
  • v3.5.0
  • v3.6.0
  • v3.7.0
  • v3.8.0
  • v3.9.0
  • v3.9.1
  • v3.9.2
  • xml-enc-update
  • xml-value-on-logout-request
  • xml-value-on-specific-elements

pending completion
598

Pull #161

travis-ci

web-flow
Added support to verify all signatures in a SAML message by using the corresponding KeyName instead of the KeyName of the first signature it finds in a SAML message.

- Added a new set of key and certificate.
- Added the new certificate as a signing certificate to the metadata of the Service Provider fixture.
- Created a new fixture which contains an AuthnRequest signed with the newly added signing key (a) and added that AuthnRequest to an ArtifactResponse which is signed with the existing signing key (b), which both belong to the Service Provider.
- Added functionality to support the verification of multiple signatures signed by a single issuer using multiple signing keys.
- Verified that the resulting XML is valid.

Added the requirement that Nokogiri 1.8.5 or lower should be used. Nokogiri 1.9.0 and 1.9.1 (released during the last two days) cause a lot of errors on JRuby with the current master branch (so, even without these changes).
Pull Request #161: Added support to verify all signatures in a SAML message by using the…

3 of 3 new or added lines in 1 file covered. (100.0%)

1967 of 1970 relevant lines covered (99.85%)

115.37 hits per line

Relevant lines Covered
Build:
Build:
1970 RELEVANT LINES 1967 COVERED LINES
115.37 HITS PER LINE
Source Files on verify-multiple-signatures-with-corresponding-key-names
  • List 0
  • Changed 50
  • Source Changed 1
  • Coverage Changed 50
Coverage ∆ File Lines Relevant Covered Missed Hits/Line

Recent builds

Builds Branch Commit Type Ran Committer Via Coverage
598 verify-multiple-signatures-with-corresponding-key-names Added support to verify all signatures in a SAML message by using the corresponding KeyName instead of the KeyName of the first signature it finds in a SAML message. - Added a new set of key and certificate. - Added the new certificate as a signi... Pull #161 19 Dec 2018 03:21PM UTC web-flow travis-ci pending completion  
597 verify-multiple-signatures-with-corresponding-key-names Added support to verify all signatures in a SAML message by using the corresponding KeyName instead of the KeyName of the first signature it finds in a SAML message. - Added a new set of key and certificate. - Added the new certificate as a signi... push 19 Dec 2018 03:21PM UTC kevintuhumury travis-ci pending completion  
596 verify-multiple-signatures-with-corresponding-key-names Added support to verify all signatures in a SAML message by using the corresponding KeyName instead of the KeyName of the first signature it finds in a SAML message. - Added a new set of key and certificate. - Added the new certificate as a signi... Pull #161 18 Dec 2018 03:37PM UTC web-flow travis-ci pending completion  
595 verify-multiple-signatures-with-corresponding-key-names Added support to verify all signatures in a SAML message by using the corresponding KeyName instead of the KeyName of the first signature it finds in a SAML message. - Added a new set of key and certificate. - Added the new certificate as a signi... push 18 Dec 2018 03:37PM UTC kevintuhumury travis-ci pending completion  
594 verify-multiple-signatures-with-corresponding-key-names Added support to verify all signatures in a SAML message by using the corresponding KeyName instead of the KeyName of the first signature it finds in a SAML message. - Added a new set of key and certificate. - Added the new certificate as a signi... Pull #161 18 Dec 2018 03:04PM UTC web-flow travis-ci pending completion  
593 verify-multiple-signatures-with-corresponding-key-names Added support to verify all signatures in a SAML message by using the corresponding KeyName instead of the KeyName of the first signature it finds in a SAML message. - Added a new set of key and certificate. - Added the new certificate as a signi... push 18 Dec 2018 02:59PM UTC kevintuhumury travis-ci pending completion  
See All Builds (504)
  • Repo on GitHub
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2025 Coveralls, Inc