2019-10-16 05:07:51 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-06-25 11:32:03 -04:00
|
|
|
require 'spec_helper'
|
|
|
|
require 'omniauth/strategies/saml'
|
|
|
|
|
2020-06-03 14:08:28 -04:00
|
|
|
RSpec.describe 'processing of SAMLResponse in dependencies' do
|
2018-06-25 11:32:03 -04:00
|
|
|
let(:mock_saml_response) { File.read('spec/fixtures/authentication/saml_response.xml') }
|
|
|
|
let(:saml_strategy) { OmniAuth::Strategies::SAML.new({}) }
|
|
|
|
let(:session_mock) { {} }
|
2021-12-02 10:10:48 -05:00
|
|
|
let(:settings) { double('settings', { soft: false, idp_cert_fingerprint: 'something' }) }
|
2018-06-25 11:32:03 -04:00
|
|
|
let(:auth_hash) { Gitlab::Auth::Saml::AuthHash.new(saml_strategy) }
|
|
|
|
|
|
|
|
subject { auth_hash.authn_context }
|
|
|
|
|
|
|
|
before do
|
|
|
|
allow(saml_strategy).to receive(:session).and_return(session_mock)
|
2019-11-07 10:06:33 -05:00
|
|
|
allow_next_instance_of(OneLogin::RubySaml::Response) do |instance|
|
|
|
|
allow(instance).to receive(:is_valid?).and_return(true)
|
|
|
|
end
|
2022-08-26 14:12:09 -04:00
|
|
|
saml_strategy.send(:handle_response, mock_saml_response, {}, settings ) {}
|
2018-06-25 11:32:03 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'can extract AuthnContextClassRef from SAMLResponse param' do
|
|
|
|
is_expected.to eq 'urn:oasis:names:tc:SAML:2.0:ac:classes:Password'
|
|
|
|
end
|
|
|
|
end
|