Multi-line svn commit, see body.
[shibboleth/cpp-opensaml.git] / samltest / saml2 / core / impl / AuthnRequest20Test.h
1 /*\r
2  *  Copyright 2001-2006 Internet2\r
3  * \r
4  * Licensed under the Apache License, Version 2.0 (the "License");\r
5  * you may not use this file except in compliance with the License.\r
6  * You may obtain a copy of the License at\r
7  *\r
8  *     http://www.apache.org/licenses/LICENSE-2.0\r
9  *\r
10  * Unless required by applicable law or agreed to in writing, software\r
11  * distributed under the License is distributed on an "AS IS" BASIS,\r
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r
13  * See the License for the specific language governing permissions and\r
14  * limitations under the License.\r
15  */\r
16 \r
17 #include "internal.h"\r
18 #include <saml/saml2/core/Protocols.h>\r
19 #include <saml/util/SAMLConstants.h>\r
20 \r
21 using namespace opensaml::saml2p;\r
22 using namespace opensaml::saml2;\r
23 \r
24 class AuthnRequest20Test : public CxxTest::TestSuite, public SAMLObjectBaseTestCase {\r
25     XMLCh* expectedID; \r
26     XMLCh* expectedVersion; \r
27     DateTime* expectedIssueInstant; \r
28     XMLCh* expectedConsent; \r
29     XMLCh* expectedDestination; \r
30     bool expectedForceAuthn; \r
31     bool expectedIsPassive; \r
32     XMLCh* expectedProtocolBinding; \r
33     int expectedAssertionConsumerServiceIndex;\r
34     XMLCh* expectedAssertionConsumerServiceURL; \r
35     int expectedAttributeConsumingServiceIndex;\r
36     XMLCh* expectedProviderName;\r
37 \r
38 public:\r
39     void setUp() {\r
40         expectedID = XMLString::transcode("abc123");; \r
41         expectedVersion = XMLString::transcode("2.0"); \r
42         expectedIssueInstant = new DateTime(XMLString::transcode("2006-02-21T16:40:00.000Z"));\r
43         expectedIssueInstant->parseDateTime();\r
44         expectedConsent = XMLString::transcode("urn:string:consent"); \r
45         expectedDestination = XMLString::transcode("http://idp.example.org/endpoint"); \r
46         expectedForceAuthn = true;\r
47         expectedIsPassive = true;\r
48         expectedProtocolBinding = XMLString::transcode("urn:string:protocol-binding");\r
49         expectedAssertionConsumerServiceIndex = 3;\r
50         expectedAssertionConsumerServiceURL = XMLString::transcode("http://sp.example.org/acs");\r
51         expectedAttributeConsumingServiceIndex = 2;\r
52         expectedProviderName = XMLString::transcode("Example Org");\r
53 \r
54         singleElementFile = data_path + "saml2/core/impl/AuthnRequest.xml";\r
55         singleElementOptionalAttributesFile = data_path + "saml2/core/impl/AuthnRequestOptionalAttributes.xml";\r
56         childElementsFile  = data_path + "saml2/core/impl/AuthnRequestChildElements.xml";    \r
57         SAMLObjectBaseTestCase::setUp();\r
58     }\r
59     \r
60     void tearDown() {\r
61         XMLString::release(&expectedID);\r
62         XMLString::release(&expectedVersion);\r
63         XMLString::release(&expectedConsent);\r
64         XMLString::release(&expectedDestination);\r
65         XMLString::release(&expectedProtocolBinding);\r
66         XMLString::release(&expectedAssertionConsumerServiceURL);\r
67         XMLString::release(&expectedProviderName);\r
68         delete expectedIssueInstant;\r
69         SAMLObjectBaseTestCase::tearDown();\r
70     }\r
71 \r
72     void testSingleElementUnmarshall() {\r
73         auto_ptr<XMLObject> xo(unmarshallElement(singleElementFile));\r
74         AuthnRequest* request = dynamic_cast<AuthnRequest*>(xo.get());\r
75         TS_ASSERT(request!=NULL);\r
76         assertEquals("ID attribute", expectedID, request->getID());\r
77         assertEquals("Version attribute", expectedVersion, request->getVersion());\r
78         TSM_ASSERT_EQUALS("IssueInstant attribute", expectedIssueInstant->getEpoch(), request->getIssueInstant()->getEpoch());\r
79         TSM_ASSERT_EQUALS("ForceAuthn attribute presence", false, request->ForceAuthn().first);\r
80         TSM_ASSERT_EQUALS("IsPassive attribute presence", false, request->IsPassive().first);\r
81         TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",false, request->getAssertionConsumerServiceIndex().first);\r
82         TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", false, request->getAttributeConsumingServiceIndex().first);\r
83 \r
84         TS_ASSERT(request->getIssuer()==NULL);\r
85         TS_ASSERT(request->getSignature()==NULL);\r
86         TS_ASSERT(request->getExtensions()==NULL);\r
87         TS_ASSERT(request->getSubject()==NULL);\r
88         TS_ASSERT(request->getNameIDPolicy()==NULL);\r
89         TS_ASSERT(request->getConditions()==NULL);\r
90         TS_ASSERT(request->getRequestedAuthnContext()==NULL);\r
91         TS_ASSERT(request->getScoping()==NULL);\r
92     }\r
93 \r
94     void testSingleElementOptionalAttributesUnmarshall() {\r
95         auto_ptr<XMLObject> xo(unmarshallElement(singleElementOptionalAttributesFile));\r
96         AuthnRequest* request = dynamic_cast<AuthnRequest*>(xo.get());\r
97         TS_ASSERT(request!=NULL);\r
98 \r
99         assertEquals("Consent attribute", expectedConsent, request->getConsent());\r
100         assertEquals("Destination attribute", expectedDestination, request->getDestination());\r
101         TSM_ASSERT_EQUALS("ForceAuthn attribute presence", true, request->ForceAuthn().first);\r
102         TSM_ASSERT_EQUALS("ForceAuthn attribute value", expectedForceAuthn, request->ForceAuthn().second);\r
103         TSM_ASSERT_EQUALS("IsPassive attribute presence", true, request->IsPassive().first);\r
104         TSM_ASSERT_EQUALS("IsPassive attribute value", expectedIsPassive, request->IsPassive().second);\r
105         assertEquals("ProtocolBinding attribute", expectedProtocolBinding,request->getProtocolBinding());\r
106         TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",true, request->getAssertionConsumerServiceIndex().first);\r
107         TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute value",expectedAssertionConsumerServiceIndex, request->getAssertionConsumerServiceIndex().second);\r
108         assertEquals("AssertionConsumerServierURL attribute", expectedAssertionConsumerServiceURL, request->getAssertionConsumerServiceURL());\r
109         TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", true, request->getAttributeConsumingServiceIndex().first);\r
110         TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute value", expectedAttributeConsumingServiceIndex, request->getAttributeConsumingServiceIndex().second);\r
111         assertEquals("ProviderName attribute", expectedProviderName, request->getProviderName());\r
112 \r
113         TS_ASSERT(request->getIssuer()==NULL);\r
114         TS_ASSERT(request->getSignature()==NULL);\r
115         TS_ASSERT(request->getExtensions()==NULL);\r
116         TS_ASSERT(request->getSubject()==NULL);\r
117         TS_ASSERT(request->getNameIDPolicy()==NULL);\r
118         TS_ASSERT(request->getConditions()==NULL);\r
119         TS_ASSERT(request->getRequestedAuthnContext()==NULL);\r
120         TS_ASSERT(request->getScoping()==NULL);\r
121     }\r
122 \r
123     void testChildElementsUnmarshall() {\r
124         auto_ptr<XMLObject> xo(unmarshallElement(childElementsFile));\r
125         AuthnRequest* request= dynamic_cast<AuthnRequest*>(xo.get());\r
126         TS_ASSERT(request!=NULL);\r
127         TS_ASSERT(request->getIssuer()!=NULL);\r
128         TS_ASSERT(request->getSignature()==NULL);\r
129         TS_ASSERT(request->getExtensions()==NULL);\r
130         TS_ASSERT(request->getSubject()!=NULL);\r
131         TS_ASSERT(request->getNameIDPolicy()!=NULL);\r
132         TS_ASSERT(request->getConditions()!=NULL);\r
133         TS_ASSERT(request->getRequestedAuthnContext()!=NULL);\r
134         TS_ASSERT(request->getScoping()!=NULL);\r
135         TSM_ASSERT_EQUALS("ForceAuthn attribute presence", false, request->ForceAuthn().first);\r
136         TSM_ASSERT_EQUALS("IsPassive attribute presence", false, request->IsPassive().first);\r
137         TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",false, request->getAssertionConsumerServiceIndex().first);\r
138         TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", false, request->getAttributeConsumingServiceIndex().first);\r
139     }\r
140 \r
141     void testSingleElementMarshall() {\r
142         AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();\r
143         request->setID(expectedID);\r
144         request->setIssueInstant(expectedIssueInstant);\r
145         //request->setVersion(expectedVersion);\r
146         assertEquals(expectedDOM, request);\r
147     }\r
148 \r
149     void testSingleElementOptionalAttributesMarshall() {\r
150         AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();\r
151         request->setID(expectedID);\r
152         request->setIssueInstant(expectedIssueInstant);\r
153         //request->setVersion(expectedVersion);\r
154         request->setConsent(expectedConsent);\r
155         request->setDestination(expectedDestination);\r
156         request->ForceAuthn(expectedForceAuthn);\r
157         request->IsPassive(expectedIsPassive);\r
158         request->setProtocolBinding(expectedProtocolBinding);\r
159         request->setAssertionConsumerServiceIndex(expectedAssertionConsumerServiceIndex);\r
160         request->setAssertionConsumerServiceURL(expectedAssertionConsumerServiceURL);\r
161         request->setAttributeConsumingServiceIndex(expectedAttributeConsumingServiceIndex);\r
162         request->setProviderName(expectedProviderName);\r
163         assertEquals(expectedOptionalAttributesDOM, request);\r
164     }\r
165 \r
166     void testChildElementsMarshall() {\r
167         AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();\r
168         request->setID(expectedID);\r
169         request->setIssueInstant(expectedIssueInstant);\r
170         // Do this just so don't have to redeclare the saml namespace prefix on every child element in the control XML file\r
171         Namespace* ns = new Namespace(opensaml::SAMLConstants::SAML20_NS, opensaml::SAMLConstants::SAML20_PREFIX);\r
172         request->addNamespace(*ns);\r
173         request->setIssuer(IssuerBuilder::buildIssuer());\r
174         request->setSubject(SubjectBuilder::buildSubject());\r
175         request->setNameIDPolicy(NameIDPolicyBuilder::buildNameIDPolicy());\r
176         request->setConditions(ConditionsBuilder::buildConditions());\r
177         request->setRequestedAuthnContext(RequestedAuthnContextBuilder::buildRequestedAuthnContext());\r
178         request->setScoping(ScopingBuilder::buildScoping());\r
179         assertEquals(expectedChildElementsDOM, request);\r
180         delete ns;\r
181     }\r
182 \r
183 };\r