2 * Copyright 2001-2006 Internet2
\r
4 * Licensed under the Apache License, Version 2.0 (the "License");
\r
5 * you may not use this file except in compliance with the License.
\r
6 * You may obtain a copy of the License at
\r
8 * http://www.apache.org/licenses/LICENSE-2.0
\r
10 * Unless required by applicable law or agreed to in writing, software
\r
11 * distributed under the License is distributed on an "AS IS" BASIS,
\r
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
\r
13 * See the License for the specific language governing permissions and
\r
14 * limitations under the License.
\r
17 #include "internal.h"
\r
18 #include <saml/saml2/core/Protocols.h>
\r
19 #include <saml/util/SAMLConstants.h>
\r
21 using namespace opensaml::saml2p;
\r
22 using namespace opensaml::saml2;
\r
24 class AuthnRequest20Test : public CxxTest::TestSuite, public SAMLObjectBaseTestCase {
\r
26 XMLCh* expectedVersion;
\r
27 DateTime* expectedIssueInstant;
\r
28 XMLCh* expectedConsent;
\r
29 XMLCh* expectedDestination;
\r
30 bool expectedForceAuthn;
\r
31 bool expectedIsPassive;
\r
32 XMLCh* expectedProtocolBinding;
\r
33 int expectedAssertionConsumerServiceIndex;
\r
34 XMLCh* expectedAssertionConsumerServiceURL;
\r
35 int expectedAttributeConsumingServiceIndex;
\r
36 XMLCh* expectedProviderName;
\r
40 expectedID = XMLString::transcode("abc123");;
\r
41 expectedVersion = XMLString::transcode("2.0");
\r
42 expectedIssueInstant = new DateTime(XMLString::transcode("2006-02-21T16:40:00.000Z"));
\r
43 expectedIssueInstant->parseDateTime();
\r
44 expectedConsent = XMLString::transcode("urn:string:consent");
\r
45 expectedDestination = XMLString::transcode("http://idp.example.org/endpoint");
\r
46 expectedForceAuthn = true;
\r
47 expectedIsPassive = true;
\r
48 expectedProtocolBinding = XMLString::transcode("urn:string:protocol-binding");
\r
49 expectedAssertionConsumerServiceIndex = 3;
\r
50 expectedAssertionConsumerServiceURL = XMLString::transcode("http://sp.example.org/acs");
\r
51 expectedAttributeConsumingServiceIndex = 2;
\r
52 expectedProviderName = XMLString::transcode("Example Org");
\r
54 singleElementFile = data_path + "saml2/core/impl/AuthnRequest.xml";
\r
55 singleElementOptionalAttributesFile = data_path + "saml2/core/impl/AuthnRequestOptionalAttributes.xml";
\r
56 childElementsFile = data_path + "saml2/core/impl/AuthnRequestChildElements.xml";
\r
57 SAMLObjectBaseTestCase::setUp();
\r
61 XMLString::release(&expectedID);
\r
62 XMLString::release(&expectedVersion);
\r
63 XMLString::release(&expectedConsent);
\r
64 XMLString::release(&expectedDestination);
\r
65 XMLString::release(&expectedProtocolBinding);
\r
66 XMLString::release(&expectedAssertionConsumerServiceURL);
\r
67 XMLString::release(&expectedProviderName);
\r
68 delete expectedIssueInstant;
\r
69 SAMLObjectBaseTestCase::tearDown();
\r
72 void testSingleElementUnmarshall() {
\r
73 auto_ptr<XMLObject> xo(unmarshallElement(singleElementFile));
\r
74 AuthnRequest* request = dynamic_cast<AuthnRequest*>(xo.get());
\r
75 TS_ASSERT(request!=NULL);
\r
76 assertEquals("ID attribute", expectedID, request->getID());
\r
77 assertEquals("Version attribute", expectedVersion, request->getVersion());
\r
78 TSM_ASSERT_EQUALS("IssueInstant attribute", expectedIssueInstant->getEpoch(), request->getIssueInstant()->getEpoch());
\r
79 TSM_ASSERT_EQUALS("ForceAuthn attribute presence", false, request->ForceAuthn().first);
\r
80 TSM_ASSERT_EQUALS("IsPassive attribute presence", false, request->IsPassive().first);
\r
81 TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",false, request->getAssertionConsumerServiceIndex().first);
\r
82 TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", false, request->getAttributeConsumingServiceIndex().first);
\r
84 TS_ASSERT(request->getIssuer()==NULL);
\r
85 TS_ASSERT(request->getSignature()==NULL);
\r
86 TS_ASSERT(request->getExtensions()==NULL);
\r
87 TS_ASSERT(request->getSubject()==NULL);
\r
88 TS_ASSERT(request->getNameIDPolicy()==NULL);
\r
89 TS_ASSERT(request->getConditions()==NULL);
\r
90 TS_ASSERT(request->getRequestedAuthnContext()==NULL);
\r
91 TS_ASSERT(request->getScoping()==NULL);
\r
94 void testSingleElementOptionalAttributesUnmarshall() {
\r
95 auto_ptr<XMLObject> xo(unmarshallElement(singleElementOptionalAttributesFile));
\r
96 AuthnRequest* request = dynamic_cast<AuthnRequest*>(xo.get());
\r
97 TS_ASSERT(request!=NULL);
\r
99 assertEquals("Consent attribute", expectedConsent, request->getConsent());
\r
100 assertEquals("Destination attribute", expectedDestination, request->getDestination());
\r
101 TSM_ASSERT_EQUALS("ForceAuthn attribute presence", true, request->ForceAuthn().first);
\r
102 TSM_ASSERT_EQUALS("ForceAuthn attribute value", expectedForceAuthn, request->ForceAuthn().second);
\r
103 TSM_ASSERT_EQUALS("IsPassive attribute presence", true, request->IsPassive().first);
\r
104 TSM_ASSERT_EQUALS("IsPassive attribute value", expectedIsPassive, request->IsPassive().second);
\r
105 assertEquals("ProtocolBinding attribute", expectedProtocolBinding,request->getProtocolBinding());
\r
106 TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",true, request->getAssertionConsumerServiceIndex().first);
\r
107 TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute value",expectedAssertionConsumerServiceIndex, request->getAssertionConsumerServiceIndex().second);
\r
108 assertEquals("AssertionConsumerServierURL attribute", expectedAssertionConsumerServiceURL, request->getAssertionConsumerServiceURL());
\r
109 TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", true, request->getAttributeConsumingServiceIndex().first);
\r
110 TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute value", expectedAttributeConsumingServiceIndex, request->getAttributeConsumingServiceIndex().second);
\r
111 assertEquals("ProviderName attribute", expectedProviderName, request->getProviderName());
\r
113 TS_ASSERT(request->getIssuer()==NULL);
\r
114 TS_ASSERT(request->getSignature()==NULL);
\r
115 TS_ASSERT(request->getExtensions()==NULL);
\r
116 TS_ASSERT(request->getSubject()==NULL);
\r
117 TS_ASSERT(request->getNameIDPolicy()==NULL);
\r
118 TS_ASSERT(request->getConditions()==NULL);
\r
119 TS_ASSERT(request->getRequestedAuthnContext()==NULL);
\r
120 TS_ASSERT(request->getScoping()==NULL);
\r
123 void testChildElementsUnmarshall() {
\r
124 auto_ptr<XMLObject> xo(unmarshallElement(childElementsFile));
\r
125 AuthnRequest* request= dynamic_cast<AuthnRequest*>(xo.get());
\r
126 TS_ASSERT(request!=NULL);
\r
127 TS_ASSERT(request->getIssuer()!=NULL);
\r
128 TS_ASSERT(request->getSignature()==NULL);
\r
129 TS_ASSERT(request->getExtensions()==NULL);
\r
130 TS_ASSERT(request->getSubject()!=NULL);
\r
131 TS_ASSERT(request->getNameIDPolicy()!=NULL);
\r
132 TS_ASSERT(request->getConditions()!=NULL);
\r
133 TS_ASSERT(request->getRequestedAuthnContext()!=NULL);
\r
134 TS_ASSERT(request->getScoping()!=NULL);
\r
135 TSM_ASSERT_EQUALS("ForceAuthn attribute presence", false, request->ForceAuthn().first);
\r
136 TSM_ASSERT_EQUALS("IsPassive attribute presence", false, request->IsPassive().first);
\r
137 TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",false, request->getAssertionConsumerServiceIndex().first);
\r
138 TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", false, request->getAttributeConsumingServiceIndex().first);
\r
141 void testSingleElementMarshall() {
\r
142 AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();
\r
143 request->setID(expectedID);
\r
144 request->setIssueInstant(expectedIssueInstant);
\r
145 //request->setVersion(expectedVersion);
\r
146 assertEquals(expectedDOM, request);
\r
149 void testSingleElementOptionalAttributesMarshall() {
\r
150 AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();
\r
151 request->setID(expectedID);
\r
152 request->setIssueInstant(expectedIssueInstant);
\r
153 //request->setVersion(expectedVersion);
\r
154 request->setConsent(expectedConsent);
\r
155 request->setDestination(expectedDestination);
\r
156 request->ForceAuthn(expectedForceAuthn);
\r
157 request->IsPassive(expectedIsPassive);
\r
158 request->setProtocolBinding(expectedProtocolBinding);
\r
159 request->setAssertionConsumerServiceIndex(expectedAssertionConsumerServiceIndex);
\r
160 request->setAssertionConsumerServiceURL(expectedAssertionConsumerServiceURL);
\r
161 request->setAttributeConsumingServiceIndex(expectedAttributeConsumingServiceIndex);
\r
162 request->setProviderName(expectedProviderName);
\r
163 assertEquals(expectedOptionalAttributesDOM, request);
\r
166 void testChildElementsMarshall() {
\r
167 AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();
\r
168 request->setID(expectedID);
\r
169 request->setIssueInstant(expectedIssueInstant);
\r
170 // Do this just so don't have to redeclare the saml namespace prefix on every child element in the control XML file
\r
171 Namespace* ns = new Namespace(opensaml::SAMLConstants::SAML20_NS, opensaml::SAMLConstants::SAML20_PREFIX);
\r
172 request->addNamespace(*ns);
\r
173 request->setIssuer(IssuerBuilder::buildIssuer());
\r
174 request->setSubject(SubjectBuilder::buildSubject());
\r
175 request->setNameIDPolicy(NameIDPolicyBuilder::buildNameIDPolicy());
\r
176 request->setConditions(ConditionsBuilder::buildConditions());
\r
177 request->setRequestedAuthnContext(RequestedAuthnContextBuilder::buildRequestedAuthnContext());
\r
178 request->setScoping(ScopingBuilder::buildScoping());
\r
179 assertEquals(expectedChildElementsDOM, request);
\r