|
@@ -77,7 +77,6 @@ import javax.servlet.http.HttpSession;
|
|
|
|
|
|
import static java.nio.charset.StandardCharsets.UTF_8;
|
|
|
import static org.hamcrest.Matchers.containsString;
|
|
|
-import static org.hamcrest.Matchers.equalTo;
|
|
|
import static org.hamcrest.Matchers.startsWith;
|
|
|
import static org.springframework.security.samples.OpenSamlActionTestingSupport.buildConditions;
|
|
|
import static org.springframework.security.samples.OpenSamlActionTestingSupport.buildIssuer;
|
|
@@ -237,8 +236,8 @@ public class Saml2LoginIntegrationTests {
|
|
|
sendResponse(response, "/login?error")
|
|
|
.andExpect(
|
|
|
saml2AuthenticationExceptionMatcher(
|
|
|
- "invalid_signature",
|
|
|
- equalTo("Assertion doesn't have a valid signature.")
|
|
|
+ "invalid_assertion",
|
|
|
+ containsString("Invalid assertion [assertion] for SAML response")
|
|
|
)
|
|
|
);
|
|
|
}
|
|
@@ -253,7 +252,7 @@ public class Saml2LoginIntegrationTests {
|
|
|
.andExpect(
|
|
|
saml2AuthenticationExceptionMatcher(
|
|
|
"invalid_assertion",
|
|
|
- containsString("Assertion 'assertion' with NotOnOrAfter condition of")
|
|
|
+ containsString("Invalid assertion [assertion] for SAML response")
|
|
|
)
|
|
|
);
|
|
|
}
|
|
@@ -268,7 +267,7 @@ public class Saml2LoginIntegrationTests {
|
|
|
.andExpect(
|
|
|
saml2AuthenticationExceptionMatcher(
|
|
|
"invalid_assertion",
|
|
|
- containsString("Assertion 'assertion' with NotBefore condition of")
|
|
|
+ containsString("Invalid assertion [assertion] for SAML response")
|
|
|
)
|
|
|
);
|
|
|
}
|
|
@@ -285,8 +284,7 @@ public class Saml2LoginIntegrationTests {
|
|
|
saml2AuthenticationExceptionMatcher(
|
|
|
"invalid_issuer",
|
|
|
containsString(
|
|
|
- "Response issuer 'invalid issuer' doesn't match "+
|
|
|
- "'https://simplesaml-for-spring-saml.cfapps.io/saml2/idp/metadata.php'"
|
|
|
+ "Invalid issuer [invalid issuer] for SAML response"
|
|
|
)
|
|
|
)
|
|
|
);
|