X-Git-Url: http://www.project-moonshot.org/gitweb/?a=blobdiff_plain;f=samltest%2Fsaml1%2Fbinding%2FSAML1POSTTest.h;h=6b8230d98866b34b0efc8572c7b6a1723f581b5f;hb=11cd3b15c71ee22f2818d810a17c213123e8c248;hp=6872867356fc60f7b2fdd4db8c4a04bed91fb174;hpb=1ffcb743f90aeb3da11054316f3d005ff7edbf7b;p=shibboleth%2Fcpp-opensaml.git diff --git a/samltest/saml1/binding/SAML1POSTTest.h b/samltest/saml1/binding/SAML1POSTTest.h index 6872867..6b8230d 100644 --- a/samltest/saml1/binding/SAML1POSTTest.h +++ b/samltest/saml1/binding/SAML1POSTTest.h @@ -1,5 +1,5 @@ /* - * Copyright 2001-2005 Internet2 + * Copyright 2001-2007 Internet2 * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -24,17 +24,18 @@ using namespace opensaml::saml1; class SAML1POSTTest : public CxxTest::TestSuite, public SAMLBindingBaseTestCase { public: void setUp() { - m_fields.clear(); SAMLBindingBaseTestCase::setUp(); } void tearDown() { - m_fields.clear(); SAMLBindingBaseTestCase::tearDown(); } - void testSAML1POSTTrusted() { + void testSAML1POST() { try { + QName idprole(samlconstants::SAML20MD_NS, IDPSSODescriptor::LOCAL_NAME); + SecurityPolicy policy(m_rules1, m_metadata, &idprole, m_trust, false); + // Read message to use from file. string path = data_path + "saml1/binding/SAML1Response.xml"; ifstream in(path.c_str()); @@ -45,103 +46,61 @@ public: ); janitor.release(); - // Freshen timestamp. + CredentialCriteria cc; + cc.setUsage(CredentialCriteria::SIGNING_CREDENTIAL); + Locker clocker(m_creds); + const Credential* cred = m_creds->resolve(&cc); + TSM_ASSERT("Retrieved credential was null", cred!=NULL); + + // Freshen timestamp and ID. toSend->setIssueInstant(time(NULL)); + toSend->setResponseID(NULL); // Encode message. - auto_ptr encoder(SAMLConfig::getConfig().MessageEncoderManager.newPlugin(SAML1_POST_ENCODER, NULL)); - encoder->encode(m_fields,toSend.get(),"https://sp.example.org/","state",m_creds); - toSend.release(); - - // Decode message. - string relayState; - const RoleDescriptor* issuer=NULL; - bool trusted=false; - QName idprole(SAMLConstants::SAML20MD_NS, IDPSSODescriptor::LOCAL_NAME); - auto_ptr decoder(SAMLConfig::getConfig().MessageDecoderManager.newPlugin(SAML1_POST_DECODER, NULL)); - Locker locker(m_metadata); - auto_ptr response( - dynamic_cast( - decoder->decode(relayState,issuer,trusted,*this,m_metadata,&idprole,m_trust) + auto_ptr_XMLCh lit1("MessageEncoder"); + auto_ptr_XMLCh lit2("template"); + path = data_path + "binding/template.html"; + auto_ptr_XMLCh lit3(path.c_str()); + DOMDocument* encoder_config = XMLToolingConfig::getConfig().getParser().newDocument(); + XercesJanitor janitor2(encoder_config); + encoder_config->appendChild(encoder_config->createElementNS(NULL,lit1.get())); + encoder_config->getDocumentElement()->setAttributeNS(NULL,lit2.get(),lit3.get()); + auto_ptr encoder( + SAMLConfig::getConfig().MessageEncoderManager.newPlugin( + samlconstants::SAML1_PROFILE_BROWSER_POST, pair(encoder_config->getDocumentElement(),NULL) ) ); - - // Test the results. - TSM_ASSERT_EQUALS("TARGET was not the expected result.", relayState, "state"); - TSM_ASSERT("SAML Response not decoded successfully.", response.get()); - TSM_ASSERT("Message was not verified.", issuer && trusted); - auto_ptr_char entityID(dynamic_cast(issuer->getParent())->getEntityID()); - TSM_ASSERT("Issuer was not expected.", !strcmp(entityID.get(),"https://idp.example.org/")); - TSM_ASSERT_EQUALS("Assertion count was not correct.", response->getAssertions().size(), 1); - } - catch (XMLToolingException& ex) { - TS_TRACE(ex.what()); - throw; - } - } - void testSAML1POSTUntrusted() { - try { - // Read message to use from file. - string path = data_path + "saml1/binding/SAML1Response.xml"; - ifstream in(path.c_str()); - DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in); - XercesJanitor janitor(doc); - auto_ptr toSend( - dynamic_cast(XMLObjectBuilder::buildOneFromElement(doc->getDocumentElement(),true)) + Locker locker(m_metadata); + encoder->encode( + *this,toSend.get(),"https://sp.example.org/SAML/SSO",m_metadata->getEntityDescriptor("https://sp.example.org/"),"state",NULL,cred ); - janitor.release(); - - // Freshen timestamp and clear ID. - toSend->setIssueInstant(time(NULL)); - toSend->setResponseID(NULL); - - // Encode message. - auto_ptr encoder(SAMLConfig::getConfig().MessageEncoderManager.newPlugin(SAML1_POST_ENCODER, NULL)); - encoder->encode(m_fields,toSend.get(),"https://sp.example.org/","state"); toSend.release(); // Decode message. string relayState; - const RoleDescriptor* issuer=NULL; - bool trusted=false; - QName idprole(SAMLConstants::SAML20MD_NS, IDPSSODescriptor::LOCAL_NAME); - auto_ptr decoder(SAMLConfig::getConfig().MessageDecoderManager.newPlugin(SAML1_POST_DECODER, NULL)); - Locker locker(m_metadata); - auto_ptr response( - dynamic_cast( - decoder->decode(relayState,issuer,trusted,*this,m_metadata,&idprole) + auto_ptr decoder( + SAMLConfig::getConfig().MessageDecoderManager.newPlugin( + samlconstants::SAML1_PROFILE_BROWSER_POST, pair(NULL,NULL) ) ); + auto_ptr response(dynamic_cast(decoder->decode(relayState,*this,policy))); // Test the results. TSM_ASSERT_EQUALS("TARGET was not the expected result.", relayState, "state"); TSM_ASSERT("SAML Response not decoded successfully.", response.get()); - TSM_ASSERT("Message was verified.", issuer && !trusted); - auto_ptr_char entityID(dynamic_cast(issuer->getParent())->getEntityID()); + TSM_ASSERT("Message was not verified.", policy.isSecure()); + auto_ptr_char entityID(policy.getIssuer()->getName()); TSM_ASSERT("Issuer was not expected.", !strcmp(entityID.get(),"https://idp.example.org/")); TSM_ASSERT_EQUALS("Assertion count was not correct.", response->getAssertions().size(), 1); // Trigger a replay. - TSM_ASSERT_THROWS("Did not catch the replay.", - decoder->decode(relayState,issuer,trusted,*this,m_metadata,&idprole,m_trust), - BindingException); + policy.reset(); + TSM_ASSERT_THROWS("Did not catch the replay.", decoder->decode(relayState,*this,policy), SecurityPolicyException); } catch (XMLToolingException& ex) { TS_TRACE(ex.what()); throw; } } - - const char* getMethod() const { - return "POST"; - } - - const char* getRequestURL() const { - return "https://sp.example.org/SAML/POST"; - } - - const char* getQueryString() const { - return NULL; - } };