Fix warnings

This commit is contained in:
Christophe Maudoux 2020-11-17 23:18:05 +01:00
parent 17f1b474c1
commit 433d0f1259
8 changed files with 14 additions and 14 deletions

View File

@ -154,7 +154,7 @@ SKIP: {
),
'Push fake kerberos in an allowed domain'
);
my $id = expectCookie($res);
$id = expectCookie($res);
}
count($maintests);

View File

@ -141,7 +141,7 @@ SKIP: {
# Verify authentication on SP
expectRedirection( $res, 'http://auth.sp.com' );
my $spId = expectCookie($res);
my $rawCookie = getHeader( $res, 'Set-Cookie' );
$rawCookie = getHeader( $res, 'Set-Cookie' );
ok( $rawCookie =~ /;\s*SameSite=None/, 'Found SameSite=None' );
ok( $res = $sp->_get( '/', cookie => "lemonldap=$spId" ), 'Get / on SP' );

View File

@ -170,7 +170,7 @@ qr%<input name="code" value="" type="text" class="form-control" id="extcode" trp
'Unauth SP request'
);
expectOK($res);
my ( $host, $url, $s ) =
( $host, $url, $s ) =
expectAutoPost( $res, 'auth.idp.com', '/saml/singleSignOn',
'SAMLRequest' );
@ -218,7 +218,7 @@ qr%<input name="code" value="" type="text" class="form-control" id="extcode" trp
ok( mail() =~ m%<b>(\d{4})</b>%, 'Found 2F code in mail' )
or print STDERR Dumper( mail() );
my $code = $1;
$code = $1;
$s =~ s/code=/code=${code}/;
ok(
@ -265,7 +265,7 @@ qr%<input name="code" value="" type="text" class="form-control" id="extcode" trp
# Verify authentication on SP
expectRedirection( $res, 'http://auth.sp.com' );
my $spId = expectCookie($res);
$spId = expectCookie($res);
ok( $res = $sp->_get( '/', cookie => "lemonldap=$spId" ), 'Get / on SP' );
expectOK($res);

View File

@ -12,7 +12,7 @@ BEGIN {
}
my $debug = 'error';
my ( $op, $rp, $res );
my ( $op, $rp, $res, $url );
my $access_token;
@ -89,7 +89,7 @@ count(3);
# Do a user login to have an existing session
my $res;
$res;
my $query = "user=french&password=french";
ok(
$res = $op->_post(
@ -112,7 +112,7 @@ count(1);
# Query RP for auth
ok( $res = $rp->_get( '/', accept => 'text/html' ), 'Unauth SP request' );
count(1);
my ( $url, $query ) =
( $url, $query ) =
expectRedirection( $res, qr#http://auth.op.com(/oauth2/authorize)\?(.*)$# );
# Push request to OP

View File

@ -367,7 +367,7 @@ JjTJecOOS+88fK8qL1TrYv5rapIdqUI7aQ==
) or print STDERR Dumper( $res->[2]->[0] );
ok( $res->[2]->[0] =~ /trspan="lastLogins"/, 'History found' )
or explain( $res->[2]->[0], 'trspan="lastLogins"' );
my @c = ( $res->[2]->[0] =~ /<td>127.0.0.1/gs );
@c = ( $res->[2]->[0] =~ /<td>127.0.0.1/gs );
# History with 3 successLogins
ok( @c == 3, " -> Three entries found" )

View File

@ -490,7 +490,7 @@ JjTJecOOS+88fK8qL1TrYv5rapIdqUI7aQ==
or print STDERR Dumper($res);
# No 2F device left
my @sf = map m%<span device=\'(TOTP|U2F)\' epoch=\'\d{10}\'%g,
@sf = map m%<span device=\'(TOTP|U2F)\' epoch=\'\d{10}\'%g,
$res->[2]->[0];
ok( scalar @sf == 0, 'No 2F device found' )
or print STDERR Dumper($res);

View File

@ -113,7 +113,7 @@ ok(
);
count(1);
( my $host, my $url, $query ) =
( $host, $url, $query ) =
expectForm( $res, undef, '/upgradesession', 'confirm', 'url' );
# Accept session upgrade
@ -131,7 +131,7 @@ ok(
);
count(1);
my $pdata = expectCookie( $res, 'lemonldappdata' );
$pdata = expectCookie( $res, 'lemonldappdata' );
( $host, $url, $query ) =
expectForm( $res, undef, '/mail2fcheck?skin=bootstrap', 'token', 'code' );

View File

@ -90,7 +90,7 @@ SKIP: {
);
count(1);
my ( $host, $url, $query ) =
( $host, $url, $query ) =
expectForm( $res, undef, '/yubikey2fcheck?skin=bootstrap',
'token', 'code' );
@ -121,7 +121,7 @@ SKIP: {
);
count(1);
my ( $host, $url, $query ) =
( $host, $url, $query ) =
expectForm( $res, undef, '/yubikey2fcheck?skin=bootstrap',
'token', 'code' );