2019-12-21 20:55:43 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-11-08 19:23:39 +05:30
|
|
|
require 'spec_helper'
|
|
|
|
require 'omniauth/strategies/saml'
|
|
|
|
|
2020-06-23 00:09:42 +05:30
|
|
|
RSpec.describe 'processing of SAMLResponse in dependencies' do
|
2018-11-08 19:23:39 +05:30
|
|
|
let(:mock_saml_response) { File.read('spec/fixtures/authentication/saml_response.xml') }
|
|
|
|
let(:saml_strategy) { OmniAuth::Strategies::SAML.new({}) }
|
|
|
|
let(:session_mock) { {} }
|
2022-01-26 12:08:38 +05:30
|
|
|
let(:settings) { double('settings', { soft: false, idp_cert_fingerprint: 'something' }) }
|
2018-11-08 19:23:39 +05:30
|
|
|
let(:auth_hash) { Gitlab::Auth::Saml::AuthHash.new(saml_strategy) }
|
|
|
|
|
|
|
|
subject { auth_hash.authn_context }
|
|
|
|
|
|
|
|
before do
|
|
|
|
allow(saml_strategy).to receive(:session).and_return(session_mock)
|
2019-12-26 22:10:19 +05:30
|
|
|
allow_next_instance_of(OneLogin::RubySaml::Response) do |instance|
|
|
|
|
allow(instance).to receive(:is_valid?).and_return(true)
|
|
|
|
end
|
2022-10-11 01:57:18 +05:30
|
|
|
saml_strategy.send(:handle_response, mock_saml_response, {}, settings ) {}
|
2018-11-08 19:23:39 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it 'can extract AuthnContextClassRef from SAMLResponse param' do
|
|
|
|
is_expected.to eq 'urn:oasis:names:tc:SAML:2.0:ac:classes:Password'
|
|
|
|
end
|
|
|
|
end
|