Skip to content

Commit be0f3be

Browse files
refactor: Apply suggestion from @copilot
- #245 (comment) - #245 (comment)
1 parent 29b9da4 commit be0f3be

File tree

2 files changed

+10
-12
lines changed

2 files changed

+10
-12
lines changed

lib/omniauth/strategies/saml.rb

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -184,8 +184,6 @@ def valid_slo_relay_state?(relay_state)
184184
end
185185

186186
def call_slo_relay_state_validator(validator, relay_state)
187-
arity = validator.arity
188-
189187
return validator.call if validator.arity.zero?
190188
return validator.call(relay_state) if validator.arity == 1
191189
validator.call(relay_state, request)

spec/omniauth/strategies/saml_spec.rb

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -332,7 +332,7 @@
332332
subject(:post_slo_response) { post "/auth/saml/slo", params, opts }
333333

334334
context "when relay state is relative" do
335-
let(:params) {super().merge(RelayState: "/signed-out")}
335+
let(:params) { super().merge(RelayState: "/signed-out") }
336336

337337
it "redirects to the relaystate" do
338338
post_slo_response
@@ -343,7 +343,7 @@
343343
end
344344

345345
context "when relay state is an absolute https URL" do
346-
let(:params) {super().merge(RelayState: "https://example.com/")}
346+
let(:params) { super().merge(RelayState: "https://example.com/") }
347347

348348
it "redirects without a location header" do
349349
post_slo_response
@@ -357,31 +357,31 @@
357357
let(:saml_options) { super().merge(slo_default_relay_state: '/signed-out') }
358358

359359
context "when response relay state is valid" do
360-
let(:params) {super().merge(RelayState: "/safe/logout")}
360+
let(:params) { super().merge(RelayState: "/safe/logout") }
361361

362-
it {is_expected.to be_redirect.and have_attributes(location: '/safe/logout') }
362+
it { is_expected.to be_redirect.and have_attributes(location: '/safe/logout') }
363363
end
364364

365365
context "when response relay state is invalid" do
366-
let(:params) {super().merge(RelayState: "javascript:alert(1)")}
366+
let(:params) { super().merge(RelayState: "javascript:alert(1)") }
367367

368-
it {is_expected.to be_redirect.and have_attributes(location: '/signed-out') }
368+
it { is_expected.to be_redirect.and have_attributes(location: '/signed-out') }
369369
end
370370
end
371371

372372
context 'when slo_default_relay_state is blank' do
373373
let(:saml_options) { super().merge(slo_default_relay_state: nil) }
374374

375375
context "when response relay state is valid" do
376-
let(:params) {super().merge(RelayState: "/safe/logout")}
376+
let(:params) { super().merge(RelayState: "/safe/logout") }
377377

378-
it {is_expected.to be_redirect.and have_attributes(location: '/safe/logout') }
378+
it { is_expected.to be_redirect.and have_attributes(location: '/safe/logout') }
379379
end
380380

381381
context "when response relay state is invalid" do
382-
let(:params) {super().merge(RelayState: "javascript:alert(1)")}
382+
let(:params) { super().merge(RelayState: "javascript:alert(1)") }
383383

384-
it {is_expected.to be_redirect.and have_attributes(location: nil) }
384+
it { is_expected.to be_redirect.and have_attributes(location: nil) }
385385
end
386386
end
387387
end

0 commit comments

Comments
 (0)