summaryrefslogtreecommitdiff
path: root/tests
diff options
context:
space:
mode:
authorIvan Kanakarakis <ivan.kanak@gmail.com>2020-12-08 00:03:53 +0200
committerIvan Kanakarakis <ivan.kanak@gmail.com>2020-12-08 00:03:53 +0200
commitdbebbd4434a96e83a30be42221a9f2e2897a1cda (patch)
tree0115805d5651cbfd573c98c4c3d2827a9cedd208 /tests
parentff9cbcea5568e26d9b7d0adac7e26cd3b5065a4e (diff)
downloadpysaml2-dbebbd4434a96e83a30be42221a9f2e2897a1cda.tar.gz
Resolve sign_alg and digest_alg wherever pre_signature_part is called
Signed-off-by: Ivan Kanakarakis <ivan.kanak@gmail.com>
Diffstat (limited to 'tests')
-rw-r--r--tests/test_52_default_sign_alg.py26
1 files changed, 7 insertions, 19 deletions
diff --git a/tests/test_52_default_sign_alg.py b/tests/test_52_default_sign_alg.py
index 274ee858..fee4ee21 100644
--- a/tests/test_52_default_sign_alg.py
+++ b/tests/test_52_default_sign_alg.py
@@ -42,17 +42,8 @@ def get_ava(assertion):
class TestSignedResponse():
-
def setup_class(self):
self.server = Server("idp_conf")
- sign_alg = Mock()
- sign_alg.return_value = ds.SIG_RSA_SHA512
- digest_alg = Mock()
- digest_alg.return_value = ds.DIGEST_SHA512
- self.restet_default = ds.DefaultSignature
- ds.DefaultSignature = MagicMock()
- ds.DefaultSignature().get_sign_alg = sign_alg
- ds.DefaultSignature().get_digest_alg = digest_alg
conf = config.SPConfig()
conf.load_file("server_conf")
self.client = client.Saml2Client(conf)
@@ -62,7 +53,6 @@ class TestSignedResponse():
"mail": ["derek@nyy.mlb.com"], "title": "The man"}
def teardown_class(self):
- ds.DefaultSignature = self.restet_default
self.server.close()
def verify_assertion(self, assertion):
@@ -76,7 +66,6 @@ class TestSignedResponse():
'surName': ['Jeter'], 'title': ['The man']}
def test_signed_response(self):
-
print(ds.DefaultSignature().get_digest_alg())
name_id = self.server.ident.transient_nameid(
"urn:mace:example.com:saml:roland:sp", "id12")
@@ -96,11 +85,10 @@ class TestSignedResponse():
assert signed_resp
sresponse = response_from_string(signed_resp)
- assert ds.SIG_RSA_SHA512 in str(sresponse), "Not correctly signed!"
- assert ds.DIGEST_SHA512 in str(sresponse), "Not correctly signed!"
+ assert ds.SIG_RSA_SHA1 in str(sresponse), "Not correctly signed!"
+ assert ds.DIGEST_SHA1 in str(sresponse), "Not correctly signed!"
def test_signed_response_1(self):
-
signed_resp = self.server.create_authn_response(
self.ava,
"id12", # in_response_to
@@ -112,15 +100,15 @@ class TestSignedResponse():
)
sresponse = response_from_string(signed_resp)
- assert ds.SIG_RSA_SHA512 in str(sresponse), "Not correctly signed!"
- assert ds.DIGEST_SHA512 in str(sresponse), "Not correctly signed!"
+ assert ds.SIG_RSA_SHA1 in str(sresponse), "Not correctly signed!"
+ assert ds.DIGEST_SHA1 in str(sresponse), "Not correctly signed!"
valid = self.server.sec.verify_signature(signed_resp,
self.server.config.cert_file,
node_name='urn:oasis:names:tc:SAML:2.0:protocol:Response',
node_id=sresponse.id)
assert valid
- assert ds.SIG_RSA_SHA512 in str(sresponse.assertion[0]), "Not correctly signed!"
- assert ds.DIGEST_SHA512 in str(sresponse.assertion[0]), "Not correctly signed!"
+ assert ds.SIG_RSA_SHA1 in str(sresponse.assertion[0]), "Not correctly signed!"
+ assert ds.DIGEST_SHA1 in str(sresponse.assertion[0]), "Not correctly signed!"
valid = self.server.sec.verify_signature(signed_resp,
self.server.config.cert_file,
node_name='urn:oasis:names:tc:SAML:2.0:assertion:Assertion',
@@ -130,7 +118,6 @@ class TestSignedResponse():
self.verify_assertion(sresponse.assertion)
def test_signed_response_2(self):
-
signed_resp = self.server.create_authn_response(
self.ava,
"id12", # in_response_to
@@ -161,6 +148,7 @@ class TestSignedResponse():
self.verify_assertion(sresponse.assertion)
+
if __name__ == "__main__":
ts = TestSignedResponse()
ts.setup_class()