keystoneauth1.tests.unit.extras.saml2.test_auth_adfs.
AuthenticateviaADFSTests
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.extras.saml2.utils.TestCase
ADDRESS_XPATH
= '/s:Envelope/s:Body/trust:RequestSecurityToken/wsp:AppliesTo/wsa:EndpointReference/wsa:Address'¶GROUP
= 'auth'¶NAMESPACES
= {'o': 'http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd', 'wsp': 'http://schemas.xmlsoap.org/ws/2004/09/policy', 'trust': 'http://docs.oasis-open.org/ws-sx/ws-trust/200512', 'a': 'http://www.w3.org/2005/08/addressing', 'wsa': 'http://www.w3.org/2005/08/addressing', 's': 'http://www.w3.org/2003/05/soap-envelope'}¶PASSWORD_XPATH
= '/s:Envelope/s:Header/o:Security/o:UsernameToken/o:Password'¶PROTOCOL
= 'saml2'¶TEST_TOKEN
= 'bc909249734445a58dee2248df5c9bfb'¶TO_XPATH
= '/s:Envelope/s:Header/a:To'¶USER_XPATH
= '/s:Envelope/s:Header/o:Security/o:UsernameToken/o:Username'¶setUp
()¶test_adfs_request_password
()¶test_adfs_request_to
()¶test_adfs_request_user
()¶test_check_valid_token_when_authenticated
()¶test_end_to_end_workflow
()¶test_get_adfs_security_token
()¶Test ADFSPassword._get_adfs_security_token().
test_get_adfs_security_token_authn_fail
()¶Test proper parsing XML fault after bad authentication.
An exceptions.AuthorizationFailure should be raised including error message from the XML message indicating where was the problem.
test_get_adfs_security_token_bad_response
()¶Test proper handling HTTP 500 and mangled (non XML) response.
This should never happen yet, keystoneauth1 should be prepared and correctly raise exceptions.InternalServerError once it cannot parse XML fault message
test_prepare_adfs_request_address
()¶test_prepare_adfs_request_custom_endpointreference
()¶test_prepare_sp_request
()¶test_send_assertion_to_service_provider_bad_status
()¶keystoneauth1.tests.unit.extras.saml2.test_auth_saml2.
AuthenticateviaSAML2Tests
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.extras.saml2.utils.TestCase
TEST_AUTH_URL
= 'http://keystone.test:5000/v3/'¶TEST_CONSUMER_URL
= 'https://openstack4.local/Shibboleth.sso/SAML2/ECP'¶TEST_IDP
= 'tester'¶TEST_IDP_URL
= 'https://idp.test'¶TEST_PASS
= 'pass'¶TEST_PROTOCOL
= 'saml2'¶TEST_USER
= 'user'¶basic_header
(username='user', password='pass')¶calls
¶get_plugin
(**kwargs)¶setUp
()¶sp_url
(**kwargs)¶test_consumer_mismatch_error_workflow
()¶test_initial_sp_call_invalid_response
()¶Send initial SP HTTP request and receive wrong server response.
test_workflow
()¶keystoneauth1.tests.unit.extras.saml2.test_auth_saml2.
SamlAuth2PluginTests
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.extras.saml2.utils.TestCase
These test ONLY the standalone requests auth plugin.
Tests for the auth plugin are later so that hopefully these can be extracted into it’s own module.
HEADER_MEDIA_TYPE_SEPARATOR
= ','¶TEST_CONSUMER_URL
= 'https://openstack4.local/Shibboleth.sso/SAML2/ECP'¶TEST_IDP_URL
= 'http://idp.test'¶TEST_PASS
= 'pass'¶TEST_SP_URL
= 'http://sp.test'¶TEST_USER
= 'user'¶basic_header
(username='user', password='pass')¶calls
¶get_plugin
(**kwargs)¶test_200_without_paos_header
()¶test_consumer_mismatch_error_workflow
()¶test_initial_sp_call_invalid_response
()¶Send initial SP HTTP request and receive wrong server response.
test_passed_when_not_200
()¶test_request_accept_headers
()¶test_standard_workflow_302_redirect
()¶test_standard_workflow_303_redirect
()¶keystoneauth1.tests.unit.extras.saml2.utils.
TestCase
(*args, **kwargs)¶Bases: keystoneauth1.tests.unit.utils.TestCase
TEST_URL
= 'https://keystone:5000/v3'¶setUp
()¶keystoneauth1.tests.unit.extras.saml2.utils.
make_oneline
(s)¶Except where otherwise noted, this document is licensed under Creative Commons Attribution 3.0 License. See all OpenStack Legal Documents.