def test_delete(self, user_mgt_app): recorder = _instrument_provider_mgt(user_mgt_app, 200, '{}') auth.delete_saml_provider_config('saml.provider', app=user_mgt_app) assert len(recorder) == 1 req = recorder[0] assert req.method == 'DELETE' assert req.url == '{0}{1}'.format(USER_MGT_URL_PREFIX, '/inboundSamlConfigs/saml.provider')
def test_update_saml_provider_config(): provider_config = _create_saml_provider_config() try: provider_config = auth.update_saml_provider_config( provider_config.provider_id, idp_entity_id='UPDATED_IDP_ENTITY_ID', sso_url='https://example.com/updated_login', x509_certificates=[X509_CERTIFICATES[1]], rp_entity_id='UPDATED_RP_ENTITY_ID', callback_url='https://updatedProjectId.firebaseapp.com/__/auth/handler', display_name='UPDATED_SAML_DISPLAY_NAME', enabled=False) assert provider_config.idp_entity_id == 'UPDATED_IDP_ENTITY_ID' assert provider_config.sso_url == 'https://example.com/updated_login' assert provider_config.x509_certificates == [X509_CERTIFICATES[1]] assert provider_config.rp_entity_id == 'UPDATED_RP_ENTITY_ID' assert provider_config.callback_url == ('https://updatedProjectId.firebaseapp.com/' '__/auth/handler') assert provider_config.display_name == 'UPDATED_SAML_DISPLAY_NAME' assert provider_config.enabled is False finally: auth.delete_saml_provider_config(provider_config.provider_id)
def test_delete_saml_provider_config(): provider_config = _create_saml_provider_config() auth.delete_saml_provider_config(provider_config.provider_id) with pytest.raises(auth.ConfigurationNotFoundError): auth.get_saml_provider_config(provider_config.provider_id)
def saml_provider(): provider_config = _create_saml_provider_config() yield provider_config auth.delete_saml_provider_config(provider_config.provider_id)
def test_delete_invalid_provider_id(self, user_mgt_app, provider_id): with pytest.raises(ValueError) as excinfo: auth.delete_saml_provider_config(provider_id, app=user_mgt_app) assert str(excinfo.value).startswith('Invalid SAML provider ID')
def delete_saml_provider_config(): # [START delete_saml_provider] auth.delete_saml_provider_config('saml.myProvider')