|
4 | 4 |
|
5 | 5 | from descope import AuthException, DescopeClient |
6 | 6 | from descope.common import DEFAULT_TIMEOUT_SECONDS |
7 | | -from descope.management.common import MgmtV1 |
| 7 | +from descope.management.common import ( |
| 8 | + MgmtV1, |
| 9 | + SSOSetupSuiteSettings, |
| 10 | + SSOSetupSuiteSettingsDisabledFeatures, |
| 11 | +) |
8 | 12 |
|
9 | 13 | from .. import common |
10 | 14 |
|
@@ -417,6 +421,58 @@ def test_update_settings(self): |
417 | 421 | timeout=DEFAULT_TIMEOUT_SECONDS, |
418 | 422 | ) |
419 | 423 |
|
| 424 | + # Test success flow with SSO Setup Suite settings |
| 425 | + with patch("requests.post") as mock_post: |
| 426 | + mock_post.return_value.ok = True |
| 427 | + sso_disabled_features = SSOSetupSuiteSettingsDisabledFeatures( |
| 428 | + saml=True, oidc=False, scim=True, sso_domains=False, group_mapping=True |
| 429 | + ) |
| 430 | + sso_settings = SSOSetupSuiteSettings( |
| 431 | + enabled=True, |
| 432 | + style_id="style123", |
| 433 | + disabled_features=sso_disabled_features, |
| 434 | + ) |
| 435 | + self.assertIsNone( |
| 436 | + client.mgmt.tenant.update_settings( |
| 437 | + "t1", |
| 438 | + self_provisioning_domains=["domain1.com"], |
| 439 | + domains=["domain1.com", "domain2.com"], |
| 440 | + auth_type="oidc", |
| 441 | + session_settings_enabled=True, |
| 442 | + sso_setup_suite_settings=sso_settings, |
| 443 | + ) |
| 444 | + ) |
| 445 | + mock_post.assert_called_with( |
| 446 | + f"{common.DEFAULT_BASE_URL}{MgmtV1.tenant_settings_path}", |
| 447 | + headers={ |
| 448 | + **common.default_headers, |
| 449 | + "Authorization": f"Bearer {self.dummy_project_id}:{self.dummy_management_key}", |
| 450 | + "x-descope-project-id": self.dummy_project_id, |
| 451 | + }, |
| 452 | + json={ |
| 453 | + "tenantId": "t1", |
| 454 | + "selfProvisioningDomains": ["domain1.com"], |
| 455 | + "domains": ["domain1.com", "domain2.com"], |
| 456 | + "authType": "oidc", |
| 457 | + "enabled": True, |
| 458 | + "ssoSetupSuiteSettings": { |
| 459 | + "enabled": True, |
| 460 | + "styleId": "style123", |
| 461 | + "disabledFeatures": { |
| 462 | + "saml": True, |
| 463 | + "oidc": False, |
| 464 | + "scim": True, |
| 465 | + "ssoDomains": False, |
| 466 | + "groupMapping": True, |
| 467 | + }, |
| 468 | + }, |
| 469 | + }, |
| 470 | + allow_redirects=False, |
| 471 | + params=None, |
| 472 | + verify=True, |
| 473 | + timeout=DEFAULT_TIMEOUT_SECONDS, |
| 474 | + ) |
| 475 | + |
420 | 476 | def test_load_settings(self): |
421 | 477 | client = DescopeClient( |
422 | 478 | self.dummy_project_id, |
@@ -460,3 +516,54 @@ def test_load_settings(self): |
460 | 516 | verify=True, |
461 | 517 | timeout=DEFAULT_TIMEOUT_SECONDS, |
462 | 518 | ) |
| 519 | + |
| 520 | + # Test success flow with SSO Setup Suite settings |
| 521 | + with patch("requests.get") as mock_get: |
| 522 | + network_resp = mock.Mock() |
| 523 | + network_resp.ok = True |
| 524 | + network_resp.json.return_value = json.loads( |
| 525 | + """ |
| 526 | + { |
| 527 | + "domains": ["domain1.com", "domain2.com"], |
| 528 | + "authType": "oidc", |
| 529 | + "sessionSettingsEnabled": true, |
| 530 | + "ssoSetupSuiteSettings": { |
| 531 | + "enabled": true, |
| 532 | + "styleId": "style123", |
| 533 | + "disabledFeatures": { |
| 534 | + "saml": true, |
| 535 | + "oidc": false, |
| 536 | + "scim": true, |
| 537 | + "ssoDomains": false, |
| 538 | + "groupMapping": true |
| 539 | + } |
| 540 | + } |
| 541 | + } |
| 542 | + """ |
| 543 | + ) |
| 544 | + mock_get.return_value = network_resp |
| 545 | + resp = client.mgmt.tenant.load_settings("t1") |
| 546 | + self.assertEqual(resp["domains"], ["domain1.com", "domain2.com"]) |
| 547 | + self.assertEqual(resp["authType"], "oidc") |
| 548 | + self.assertEqual(resp["sessionSettingsEnabled"], True) |
| 549 | + sso_settings = resp["ssoSetupSuiteSettings"] |
| 550 | + self.assertEqual(sso_settings["enabled"], True) |
| 551 | + self.assertEqual(sso_settings["styleId"], "style123") |
| 552 | + disabled_features = sso_settings["disabledFeatures"] |
| 553 | + self.assertEqual(disabled_features["saml"], True) |
| 554 | + self.assertEqual(disabled_features["oidc"], False) |
| 555 | + self.assertEqual(disabled_features["scim"], True) |
| 556 | + self.assertEqual(disabled_features["ssoDomains"], False) |
| 557 | + self.assertEqual(disabled_features["groupMapping"], True) |
| 558 | + mock_get.assert_called_with( |
| 559 | + f"{common.DEFAULT_BASE_URL}{MgmtV1.tenant_settings_path}", |
| 560 | + headers={ |
| 561 | + **common.default_headers, |
| 562 | + "Authorization": f"Bearer {self.dummy_project_id}:{self.dummy_management_key}", |
| 563 | + "x-descope-project-id": self.dummy_project_id, |
| 564 | + }, |
| 565 | + params={"id": "t1"}, |
| 566 | + allow_redirects=True, |
| 567 | + verify=True, |
| 568 | + timeout=DEFAULT_TIMEOUT_SECONDS, |
| 569 | + ) |
0 commit comments