2 * Copyright 2001-2006 Internet2
\r
4 * Licensed under the Apache License, Version 2.0 (the "License");
\r
5 * you may not use this file except in compliance with the License.
\r
6 * You may obtain a copy of the License at
\r
8 * http://www.apache.org/licenses/LICENSE-2.0
\r
10 * Unless required by applicable law or agreed to in writing, software
\r
11 * distributed under the License is distributed on an "AS IS" BASIS,
\r
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
\r
13 * See the License for the specific language governing permissions and
\r
14 * limitations under the License.
\r
17 #include "internal.h"
\r
18 #include <saml/saml2/core/Protocols.h>
\r
19 #include <saml/util/SAMLConstants.h>
\r
21 using namespace opensaml::saml2p;
\r
22 using namespace opensaml::saml2;
\r
24 class AuthnRequest20Test : public CxxTest::TestSuite, public SAMLObjectBaseTestCase {
\r
26 XMLCh* expectedVersion;
\r
27 DateTime* expectedIssueInstant;
\r
28 XMLCh* expectedConsent;
\r
29 XMLCh* expectedDestination;
\r
30 bool expectedForceAuthn;
\r
31 bool expectedIsPassive;
\r
32 XMLCh* expectedProtocolBinding;
\r
33 int expectedAssertionConsumerServiceIndex;
\r
34 XMLCh* expectedAssertionConsumerServiceURL;
\r
35 int expectedAttributeConsumingServiceIndex;
\r
36 XMLCh* expectedProviderName;
\r
40 expectedID = XMLString::transcode("abc123");;
\r
41 expectedVersion = XMLString::transcode("2.0");
\r
42 expectedIssueInstant = new DateTime(XMLString::transcode("2006-02-21T16:40:00.000Z"));
\r
43 expectedConsent = XMLString::transcode("urn:string:consent");
\r
44 expectedDestination = XMLString::transcode("http://idp.example.org/endpoint");
\r
45 expectedForceAuthn = true;
\r
46 expectedIsPassive = true;
\r
47 expectedProtocolBinding = XMLString::transcode("urn:string:protocol-binding");
\r
48 expectedAssertionConsumerServiceIndex = 3;
\r
49 expectedAssertionConsumerServiceURL = XMLString::transcode("http://sp.example.org/acs");
\r
50 expectedAttributeConsumingServiceIndex = 2;
\r
51 expectedProviderName = XMLString::transcode("Example Org");
\r
53 singleElementFile = data_path + "saml2/core/impl/AuthnRequest.xml";
\r
54 singleElementOptionalAttributesFile = data_path + "saml2/core/impl/AuthnRequestOptionalAttributes.xml";
\r
55 childElementsFile = data_path + "saml2/core/impl/AuthnRequestChildElements.xml";
\r
56 SAMLObjectBaseTestCase::setUp();
\r
60 XMLString::release(&expectedID);
\r
61 XMLString::release(&expectedVersion);
\r
62 XMLString::release(&expectedConsent);
\r
63 XMLString::release(&expectedDestination);
\r
64 XMLString::release(&expectedProtocolBinding);
\r
65 XMLString::release(&expectedAssertionConsumerServiceURL);
\r
66 XMLString::release(&expectedProviderName);
\r
67 delete expectedIssueInstant;
\r
68 SAMLObjectBaseTestCase::tearDown();
\r
71 void testSingleElementUnmarshall() {
\r
72 auto_ptr<XMLObject> xo(unmarshallElement(singleElementFile));
\r
73 AuthnRequest* request = dynamic_cast<AuthnRequest*>(xo.get());
\r
74 TS_ASSERT(request!=NULL);
\r
75 assertEquals("ID attribute", expectedID, request->getID());
\r
76 assertEquals("Version attribute", expectedVersion, request->getVersion());
\r
77 assertEquals("IssueInstant attribute", expectedIssueInstant->getFormattedString(), request->getIssueInstant()->getFormattedString());
\r
78 TSM_ASSERT_EQUALS("ForceAuthn attribute presence", false, request->ForceAuthn().first);
\r
79 TSM_ASSERT_EQUALS("IsPassive attribute presence", false, request->IsPassive().first);
\r
80 TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",false, request->getAssertionConsumerServiceIndex().first);
\r
81 TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", false, request->getAttributeConsumingServiceIndex().first);
\r
83 TS_ASSERT(request->getIssuer()==NULL);
\r
84 TS_ASSERT(request->getSignature()==NULL);
\r
85 TS_ASSERT(request->getExtensions()==NULL);
\r
86 TS_ASSERT(request->getSubject()==NULL);
\r
87 TS_ASSERT(request->getNameIDPolicy()==NULL);
\r
88 TS_ASSERT(request->getConditions()==NULL);
\r
89 TS_ASSERT(request->getRequestedAuthnContext()==NULL);
\r
90 TS_ASSERT(request->getScoping()==NULL);
\r
93 void testSingleElementOptionalAttributesUnmarshall() {
\r
94 auto_ptr<XMLObject> xo(unmarshallElement(singleElementOptionalAttributesFile));
\r
95 AuthnRequest* request = dynamic_cast<AuthnRequest*>(xo.get());
\r
96 TS_ASSERT(request!=NULL);
\r
98 assertEquals("Consent attribute", expectedConsent, request->getConsent());
\r
99 assertEquals("Destination attribute", expectedDestination, request->getDestination());
\r
100 TSM_ASSERT_EQUALS("ForceAuthn attribute presence", true, request->ForceAuthn().first);
\r
101 TSM_ASSERT_EQUALS("ForceAuthn attribute value", expectedForceAuthn, request->ForceAuthn().second);
\r
102 TSM_ASSERT_EQUALS("IsPassive attribute presence", true, request->IsPassive().first);
\r
103 TSM_ASSERT_EQUALS("IsPassive attribute value", expectedIsPassive, request->IsPassive().second);
\r
104 assertEquals("ProtocolBinding attribute", expectedProtocolBinding,request->getProtocolBinding());
\r
105 TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",true, request->getAssertionConsumerServiceIndex().first);
\r
106 TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute value",expectedAssertionConsumerServiceIndex, request->getAssertionConsumerServiceIndex().second);
\r
107 assertEquals("AssertionConsumerServierURL attribute", expectedAssertionConsumerServiceURL, request->getAssertionConsumerServiceURL());
\r
108 TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", true, request->getAttributeConsumingServiceIndex().first);
\r
109 TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute value", expectedAttributeConsumingServiceIndex, request->getAttributeConsumingServiceIndex().second);
\r
110 assertEquals("ProviderName attribute", expectedProviderName, request->getProviderName());
\r
112 TS_ASSERT(request->getIssuer()==NULL);
\r
113 TS_ASSERT(request->getSignature()==NULL);
\r
114 TS_ASSERT(request->getExtensions()==NULL);
\r
115 TS_ASSERT(request->getSubject()==NULL);
\r
116 TS_ASSERT(request->getNameIDPolicy()==NULL);
\r
117 TS_ASSERT(request->getConditions()==NULL);
\r
118 TS_ASSERT(request->getRequestedAuthnContext()==NULL);
\r
119 TS_ASSERT(request->getScoping()==NULL);
\r
122 void testChildElementsUnmarshall() {
\r
123 auto_ptr<XMLObject> xo(unmarshallElement(childElementsFile));
\r
124 AuthnRequest* request= dynamic_cast<AuthnRequest*>(xo.get());
\r
125 TS_ASSERT(request!=NULL);
\r
126 TS_ASSERT(request->getIssuer()!=NULL);
\r
127 TS_ASSERT(request->getSignature()==NULL);
\r
128 TS_ASSERT(request->getExtensions()==NULL);
\r
129 TS_ASSERT(request->getSubject()!=NULL);
\r
130 TS_ASSERT(request->getNameIDPolicy()!=NULL);
\r
131 TS_ASSERT(request->getConditions()!=NULL);
\r
132 TS_ASSERT(request->getRequestedAuthnContext()!=NULL);
\r
133 TS_ASSERT(request->getScoping()!=NULL);
\r
134 TSM_ASSERT_EQUALS("ForceAuthn attribute presence", false, request->ForceAuthn().first);
\r
135 TSM_ASSERT_EQUALS("IsPassive attribute presence", false, request->IsPassive().first);
\r
136 TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",false, request->getAssertionConsumerServiceIndex().first);
\r
137 TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", false, request->getAttributeConsumingServiceIndex().first);
\r
140 void testSingleElementMarshall() {
\r
141 AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();
\r
142 request->setID(expectedID);
\r
143 request->setIssueInstant(expectedIssueInstant);
\r
144 //request->setVersion(expectedVersion);
\r
145 assertEquals(expectedDOM, request);
\r
148 void testSingleElementOptionalAttributesMarshall() {
\r
149 AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();
\r
150 request->setID(expectedID);
\r
151 request->setIssueInstant(expectedIssueInstant);
\r
152 //request->setVersion(expectedVersion);
\r
153 request->setConsent(expectedConsent);
\r
154 request->setDestination(expectedDestination);
\r
155 request->ForceAuthn(expectedForceAuthn);
\r
156 request->IsPassive(expectedIsPassive);
\r
157 request->setProtocolBinding(expectedProtocolBinding);
\r
158 request->setAssertionConsumerServiceIndex(expectedAssertionConsumerServiceIndex);
\r
159 request->setAssertionConsumerServiceURL(expectedAssertionConsumerServiceURL);
\r
160 request->setAttributeConsumingServiceIndex(expectedAttributeConsumingServiceIndex);
\r
161 request->setProviderName(expectedProviderName);
\r
162 assertEquals(expectedOptionalAttributesDOM, request);
\r
165 void testChildElementsMarshall() {
\r
166 AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();
\r
167 request->setID(expectedID);
\r
168 request->setIssueInstant(expectedIssueInstant);
\r
169 // Do this just so don't have to redeclare the saml namespace prefix on every child element in the control XML file
\r
170 Namespace* ns = new Namespace(opensaml::SAMLConstants::SAML20_NS, opensaml::SAMLConstants::SAML20_PREFIX);
\r
171 request->addNamespace(*ns);
\r
172 request->setIssuer(IssuerBuilder::buildIssuer());
\r
173 request->setSubject(SubjectBuilder::buildSubject());
\r
174 request->setNameIDPolicy(NameIDPolicyBuilder::buildNameIDPolicy());
\r
175 request->setConditions(ConditionsBuilder::buildConditions());
\r
176 request->setRequestedAuthnContext(RequestedAuthnContextBuilder::buildRequestedAuthnContext());
\r
177 request->setScoping(ScopingBuilder::buildScoping());
\r
178 assertEquals(expectedChildElementsDOM, request);
\r