X-Git-Url: http://www.project-moonshot.org/gitweb/?a=blobdiff_plain;f=samltest%2Fsaml1%2Fbinding%2FSAML1ArtifactTest.h;h=471eba6040bf4c9c249080a9b8d20e4d27bc2064;hb=2b71dc888c341e01deab3220f7c3f1757148e93a;hp=a133cf1faa912feee318fb9564120c0516e33f51;hpb=b66d32ed939fcf6db7bc52c8626b6ac06a2e97f9;p=shibboleth%2Fcpp-opensaml.git diff --git a/samltest/saml1/binding/SAML1ArtifactTest.h b/samltest/saml1/binding/SAML1ArtifactTest.h index a133cf1..471eba6 100644 --- a/samltest/saml1/binding/SAML1ArtifactTest.h +++ b/samltest/saml1/binding/SAML1ArtifactTest.h @@ -1,17 +1,21 @@ -/* - * Copyright 2001-2005 Internet2 - * - * Licensed under the Apache License, Version 2.0 (the "License"); - * you may not use this file except in compliance with the License. - * You may obtain a copy of the License at +/** + * Licensed to the University Corporation for Advanced Internet + * Development, Inc. (UCAID) under one or more contributor license + * agreements. See the NOTICE file distributed with this work for + * additional information regarding copyright ownership. * - * http://www.apache.org/licenses/LICENSE-2.0 + * UCAID licenses this file to you under the Apache License, + * Version 2.0 (the "License"); you may not use this file except + * in compliance with the License. You may obtain a copy of the + * License at * - * Unless required by applicable law or agreed to in writing, software - * distributed under the License is distributed on an "AS IS" BASIS, - * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. - * See the License for the specific language governing permissions and - * limitations under the License. + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, + * software distributed under the License is distributed on an + * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, + * either express or implied. See the License for the specific + * language governing permissions and limitations under the License. */ #include "binding.h" @@ -20,72 +24,85 @@ #include #include #include +#include +#include #include using namespace opensaml::saml1p; using namespace opensaml::saml1; class SAML1ArtifactTest : public CxxTest::TestSuite, - public SAMLBindingBaseTestCase, public MessageEncoder::ArtifactGenerator, public MessageDecoder::ArtifactResolver { + public SAMLBindingBaseTestCase, public MessageEncoder::ArtifactGenerator, public MessageDecoder::ArtifactResolver { public: void setUp() { - m_fields.clear(); SAMLBindingBaseTestCase::setUp(); } void tearDown() { - m_fields.clear(); SAMLBindingBaseTestCase::tearDown(); } void testSAML1Artifact() { try { + xmltooling::QName idprole(samlconstants::SAML20MD_NS, IDPSSODescriptor::LOCAL_NAME); + SecurityPolicy policy(m_metadata, &idprole, m_trust, false); + policy.getRules().assign(m_rules.begin(), m_rules.end()); + // Read message to use from file. string path = data_path + "saml1/binding/SAML1Assertion.xml"; ifstream in(path.c_str()); DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in); XercesJanitor janitor(doc); - auto_ptr toSend( - dynamic_cast(XMLObjectBuilder::buildOneFromElement(doc->getDocumentElement(),true)) + auto_ptr toSend( + dynamic_cast(XMLObjectBuilder::buildOneFromElement(doc->getDocumentElement(),true)) ); janitor.release(); + CredentialCriteria cc; + cc.setUsage(Credential::SIGNING_CREDENTIAL); + Locker clocker(m_creds); + const Credential* cred = m_creds->resolve(&cc); + TSM_ASSERT("Retrieved credential was null", cred!=nullptr); + // Encode message. auto_ptr encoder( - SAMLConfig::getConfig().MessageEncoderManager.newPlugin(SAMLConstants::SAML1_PROFILE_BROWSER_ARTIFACT, NULL) + SAMLConfig::getConfig().MessageEncoderManager.newPlugin( + samlconstants::SAML1_PROFILE_BROWSER_ARTIFACT, pair(nullptr,nullptr) + ) + ); + Locker locker(m_metadata); + encoder->encode( + *this, + toSend.get(), + "https://sp.example.org/SAML/SSO", + m_metadata->getEntityDescriptor(MetadataProvider::Criteria("https://sp.example.org/")).first, + "state", + this, + cred ); - encoder->setArtifactGenerator(this); - encoder->encode(m_fields,toSend.get(),"https://sp.example.org/","state",m_creds); toSend.release(); // Decode message. string relayState; - const RoleDescriptor* issuer=NULL; - bool trusted=false; - QName idprole(SAMLConstants::SAML20MD_NS, IDPSSODescriptor::LOCAL_NAME); auto_ptr decoder( - SAMLConfig::getConfig().MessageDecoderManager.newPlugin(SAMLConstants::SAML1_PROFILE_BROWSER_ARTIFACT, NULL) - ); - decoder->setArtifactResolver(this); - Locker locker(m_metadata); - auto_ptr response( - dynamic_cast( - decoder->decode(relayState,issuer,trusted,*this,m_metadata,&idprole,m_trust) + SAMLConfig::getConfig().MessageDecoderManager.newPlugin( + samlconstants::SAML1_PROFILE_BROWSER_ARTIFACT, pair(nullptr,nullptr) ) ); + decoder->setArtifactResolver(this); + auto_ptr response(dynamic_cast(decoder->decode(relayState,*this,policy))); // Test the results. TSM_ASSERT_EQUALS("TARGET was not the expected result.", relayState, "state"); TSM_ASSERT("SAML Response not decoded successfully.", response.get()); - TSM_ASSERT("Message was not verified.", issuer && trusted); - auto_ptr_char entityID(dynamic_cast(issuer->getParent())->getEntityID()); + TSM_ASSERT("Message was not verified.", policy.isAuthenticated()); + auto_ptr_char entityID(policy.getIssuer()->getName()); TSM_ASSERT("Issuer was not expected.", !strcmp(entityID.get(),"https://idp.example.org/")); TSM_ASSERT_EQUALS("Assertion count was not correct.", response->getAssertions().size(), 1); // Trigger a replay. - TSM_ASSERT_THROWS("Did not catch the replay.", - decoder->decode(relayState,issuer,trusted,*this,m_metadata,&idprole,m_trust), - BindingException); + policy.reset(); + TSM_ASSERT_THROWS("Did not catch the replay.", decoder->decode(relayState,*this,policy), BindingException); } catch (XMLToolingException& ex) { TS_TRACE(ex.what()); @@ -93,55 +110,51 @@ public: } } - const char* getMethod() const { - return "GET"; - } - - const char* getRequestURL() const { - return "https://sp.example.org/SAML/Artifact"; - } - - const char* getQueryString() const { - return NULL; - } - - SAMLArtifact* generateSAML1Artifact(const char* relyingParty) const { - return new SAMLArtifactType0001(SAMLConfig::getConfig().hashSHA1("https://idp.example.org/")); + SAMLArtifact* generateSAML1Artifact(const EntityDescriptor* relyingParty) const { + static const char* providerIdStr = "https://idp.example.org/"; + return new SAMLArtifactType0001( + SecurityHelper::doHash("SHA1", providerIdStr, strlen(providerIdStr), false) + ); } - saml2p::SAML2Artifact* generateSAML2Artifact(const char* relyingParty) const { + saml2p::SAML2Artifact* generateSAML2Artifact(const EntityDescriptor* relyingParty) const { throw BindingException("Not implemented."); } Response* resolve( - bool& authenticated, const vector& artifacts, const IDPSSODescriptor& idpDescriptor, - const X509TrustEngine* trustEngine=NULL + SecurityPolicy& policy ) const { TSM_ASSERT_EQUALS("Too many artifacts.", artifacts.size(), 1); XMLObject* xmlObject = SAMLConfig::getConfig().getArtifactMap()->retrieveContent(artifacts.front(), "https://sp.example.org/"); - Assertion* assertion = dynamic_cast(xmlObject); - TSM_ASSERT("Not an assertion.", assertion!=NULL); + saml1::Assertion* assertion = dynamic_cast(xmlObject); + TSM_ASSERT("Not an assertion.", assertion!=nullptr); auto_ptr response(ResponseBuilder::buildResponse()); response->getAssertions().push_back(assertion); - Status* status = StatusBuilder::buildStatus(); + saml1p::Status* status = StatusBuilder::buildStatus(); response->setStatus(status); StatusCode* sc = StatusCodeBuilder::buildStatusCode(); status->setStatusCode(sc); sc->setValue(&StatusCode::SUCCESS); - response->marshall(); + response->setSignature(SignatureBuilder::buildSignature()); + vector sigs(1,response->getSignature()); + CredentialCriteria cc; + cc.setUsage(Credential::SIGNING_CREDENTIAL); + Locker clocker(m_creds); + const Credential* cred = m_creds->resolve(&cc); + TSM_ASSERT("Retrieved credential was null", cred!=nullptr); + response->marshall((DOMDocument*)nullptr,&sigs,cred); SchemaValidators.validate(response.get()); - authenticated = true; + policy.evaluate(*(response.get()), this); return response.release(); } saml2p::ArtifactResponse* resolve( - bool& authenticated, const saml2p::SAML2Artifact& artifact, const SSODescriptorType& ssoDescriptor, - const X509TrustEngine* trustEngine=NULL + SecurityPolicy& policy ) const { throw BindingException("Not implemented."); }