test/maestrano/sso_test.rb in maestrano-1.0.2 vs test/maestrano/sso_test.rb in maestrano-1.0.3

- old
+ new

@@ -1,68 +1,68 @@ require File.expand_path('../../test_helper', __FILE__) module Maestrano class SSOTest < Test::Unit::TestCase include SamlTestHelper - + context 'without preset' do setup do Maestrano.configs = nil Maestrano.configure { |config| config.environment = 'production' } end - + should "return the right init_url" do assert Maestrano::SSO.init_url == "http://localhost:3000/maestrano/auth/saml/init" end - + should "return the right consume_url" do assert Maestrano::SSO.consume_url == "http://localhost:3000/maestrano/auth/saml/consume" end - + should "return the right logout_url" do assert Maestrano::SSO.logout_url == "https://maestrano.com/app_logout" end - + should "return the right unauthorized_url" do assert Maestrano::SSO.unauthorized_url == "https://maestrano.com/app_access_unauthorized" end - + should "return the right idp_url" do assert Maestrano::SSO.idp_url == "https://maestrano.com/api/v1/auth/saml" end - + should "return the right session_check_url" do assert Maestrano::SSO.session_check_url('usr-1','f9ds8fdg7f89') == "https://maestrano.com/api/v1/auth/saml/usr-1?session=f9ds8fdg7f89" end - + should "return the right enabled parameter" do assert Maestrano::SSO.enabled? == !!Maestrano.param('sso.enabled') end - + should "return the right saml_settings" do settings = Maestrano::SSO.saml_settings assert settings.assertion_consumer_service_url == Maestrano::SSO.consume_url assert settings.issuer == Maestrano.param('api.id') assert settings.idp_sso_target_url == Maestrano::SSO.idp_url assert settings.idp_cert == Maestrano.param('sso.x509_certificate') assert settings.idp_cert_fingerprint == Maestrano.param('sso.x509_fingerprint') assert settings.name_identifier_format == Maestrano.param('sso.name_id_format') end - + should "build the right saml request" do request = mock('request') Maestrano::Saml::Request.stubs(:new).with(group_id: "cld-3").returns(request) assert Maestrano::SSO.build_request(group_id: "cld-3") == request end - + should "build the right saml response" do response = mock('response') Maestrano::Saml::Response.stubs(:new).with(response_document).returns(response) response = Maestrano::SSO.build_response(response_document) assert Maestrano::SSO.build_response(response_document) == response end - + context "session management" do setup do @session = {} @auth = { extra: { @@ -73,32 +73,32 @@ group_uid: 'cld-3' } } } end - + should "set the session correctly" do Maestrano::SSO.set_session(@session,@auth) decrypt_session = JSON.parse(Base64.decode64(@session[:maestrano])) assert_equal decrypt_session['uid'], @auth[:extra][:session][:uid] assert_equal decrypt_session['session'], @auth[:extra][:session][:token] assert_equal decrypt_session['session_recheck'], @auth[:extra][:session][:recheck].utc.iso8601 assert_equal decrypt_session['group_uid'], @auth[:extra][:session][:group_uid] end - + should "unset the session correctly" do Maestrano::SSO.set_session(@session,@auth) Maestrano::SSO.clear_session(@session) assert @session[:maestrano].nil? end - + should "unset the session if key is a string" do @session['maestrano'] = "bla" Maestrano::SSO.clear_session(@session) assert @session["maestrano"].nil? end - + should "alias clear_session as unset_session" do Maestrano::SSO.set_session(@session,@auth) Maestrano::SSO.unset_session(@session) assert @session[:maestrano].nil? end @@ -110,14 +110,14 @@ @preset = 'mypreset' @config = { 'environment' => 'production', 'app.host' => 'http://mysuperapp.com', - + 'api.id' => 'app-f54ds4f8', 'api.key' => 'someapikey', - + 'sso.enabled' => false, 'sso.slo_enabled' => false, 'sso.init_path' => '/mno/sso/init', 'sso.consume_path' => '/mno/sso/consume', 'sso.creation_mode' => 'real', @@ -125,11 +125,11 @@ } @preset_config = { 'environment' => 'production', 'app.host' => 'http://myotherapp.com', - + 'api.id' => 'app-553941', 'api.key' => 'otherapikey', 'sso.enabled' => false, 'sso.slo_enabled' => false, @@ -140,89 +140,93 @@ } Maestrano.configure do |config| config.environment = @config['environment'] config.app.host = @config['app.host'] - + config.api.id = @config['api.id'] config.api.key = @config['api.key'] - + config.sso.enabled = @config['sso.enabled'] config.sso.slo_enabled = @config['sso.slo_enabled'] config.sso.idm = @config['sso.idm'] config.sso.init_path = @config['sso.init_path'] config.sso.consume_path = @config['sso.consume_path'] config.sso.creation_mode = @config['sso.creation_mode'] end - + Maestrano[@preset].configure do |config| config.environment = @preset_config['environment'] config.app.host = @preset_config['app.host'] - + config.api.id = @preset_config['api.id'] config.api.key = @preset_config['api.key'] - + config.sso.enabled = @preset_config['sso.enabled'] config.sso.slo_enabled = @preset_config['sso.slo_enabled'] config.sso.idm = @preset_config['sso.idm'] config.sso.init_path = @preset_config['sso.init_path'] config.sso.consume_path = @preset_config['sso.consume_path'] config.sso.creation_mode = @preset_config['sso.creation_mode'] end end - + should "return the right init_url" do assert_equal Maestrano::SSO[@preset].init_url, "http://idp.myotherapp.com/mno/sso/init" end - + should "return the right consume_url" do assert_equal Maestrano::SSO[@preset].consume_url, "http://idp.myotherapp.com/mno/sso/consume" end - + should "return the right logout_url" do assert_equal Maestrano::SSO[@preset].logout_url, "https://maestrano.com/app_logout" end - + + should "return the right logout_url with a user uid" do + assert_equal Maestrano::SSO[@preset].logout_url('usr-123'), "https://maestrano.com/app_logout?user_uid=usr-123" + end + should "return the right unauthorized_url" do assert_equal Maestrano::SSO[@preset].unauthorized_url, "https://maestrano.com/app_access_unauthorized" end - + should "return the right idp_url" do assert_equal Maestrano::SSO[@preset].idp_url, "https://maestrano.com/api/v1/auth/saml" end - + should "return the right session_check_url" do assert_equal Maestrano::SSO[@preset].session_check_url('usr-1','f9ds8fdg7f89'), "https://maestrano.com/api/v1/auth/saml/usr-1?session=f9ds8fdg7f89" end - + should "return the right enabled parameter" do assert_equal Maestrano::SSO[@preset].enabled?, !!Maestrano[@preset].param('sso.enabled') end - + should "return the right saml_settings" do settings = Maestrano::SSO[@preset].saml_settings assert settings.assertion_consumer_service_url == Maestrano::SSO[@preset].consume_url assert settings.issuer == Maestrano[@preset].param('api.id') assert settings.idp_sso_target_url == Maestrano::SSO[@preset].idp_url assert settings.idp_cert == Maestrano.param('sso.x509_certificate') assert settings.idp_cert_fingerprint == Maestrano[@preset].param('sso.x509_fingerprint') assert settings.name_identifier_format == Maestrano[@preset].param('sso.name_id_format') end - + should "build the right saml request" do request = mock('request') Maestrano::Saml::Request.stubs(:new).with(group_id: "cld-3").returns(request) assert Maestrano::SSO[@preset].build_request(group_id: "cld-3") == request end - + should "build the right saml response" do response = mock('response') Maestrano::Saml::Response.stubs(:new).with(response_document).returns(response) response = Maestrano::SSO[@preset].build_response(response_document) assert Maestrano::SSO[@preset].build_response(response_document) == response end - + context "session management" do setup do @session = {} @auth = { extra: { @@ -233,36 +237,36 @@ group_uid: 'cld-3' } } } end - + should "set the session correctly" do Maestrano::SSO[@preset].set_session(@session,@auth) decrypt_session = JSON.parse(Base64.decode64(@session[:maestrano])) assert_equal decrypt_session['uid'], @auth[:extra][:session][:uid] assert_equal decrypt_session['session'], @auth[:extra][:session][:token] assert_equal decrypt_session['session_recheck'], @auth[:extra][:session][:recheck].utc.iso8601 assert_equal decrypt_session['group_uid'], @auth[:extra][:session][:group_uid] end - + should "unset the session correctly" do Maestrano::SSO[@preset].set_session(@session,@auth) Maestrano::SSO[@preset].clear_session(@session) assert @session[:maestrano].nil? end - + should "unset the session if key is a string" do @session['maestrano'] = "bla" Maestrano::SSO[@preset].clear_session(@session) assert @session["maestrano"].nil? end - + should "alias clear_session as unset_session" do Maestrano::SSO[@preset].set_session(@session,@auth) Maestrano::SSO[@preset].unset_session(@session) assert @session[:maestrano].nil? end end end end -end \ No newline at end of file +end