979beacd4f24061d66cbf32f329e408932050140
[shibboleth/cpp-opensaml.git] / samltest / saml2 / core / impl / AuthnRequest20Test.h
1 /*\r
2  *  Copyright 2001-2006 Internet2\r
3  * \r
4  * Licensed under the Apache License, Version 2.0 (the "License");\r
5  * you may not use this file except in compliance with the License.\r
6  * You may obtain a copy of the License at\r
7  *\r
8  *     http://www.apache.org/licenses/LICENSE-2.0\r
9  *\r
10  * Unless required by applicable law or agreed to in writing, software\r
11  * distributed under the License is distributed on an "AS IS" BASIS,\r
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r
13  * See the License for the specific language governing permissions and\r
14  * limitations under the License.\r
15  */\r
16 \r
17 #include "internal.h"\r
18 #include <saml/saml2/core/Protocols.h>\r
19 #include <saml/util/SAMLConstants.h>\r
20 \r
21 using namespace opensaml::saml2p;\r
22 using namespace opensaml::saml2;\r
23 \r
24 class AuthnRequest20Test : public CxxTest::TestSuite, public SAMLObjectBaseTestCase {\r
25     XMLCh* expectedID; \r
26     XMLCh* expectedVersion; \r
27     DateTime* expectedIssueInstant; \r
28     XMLCh* expectedConsent; \r
29     XMLCh* expectedDestination; \r
30     bool expectedForceAuthn; \r
31     bool expectedIsPassive; \r
32     XMLCh* expectedProtocolBinding; \r
33     int expectedAssertionConsumerServiceIndex;\r
34     XMLCh* expectedAssertionConsumerServiceURL; \r
35     int expectedAttributeConsumingServiceIndex;\r
36     XMLCh* expectedProviderName;\r
37 \r
38 public:\r
39     void setUp() {\r
40         expectedID = XMLString::transcode("abc123");; \r
41         expectedVersion = XMLString::transcode("2.0"); \r
42         expectedIssueInstant = new DateTime(XMLString::transcode("2006-02-21T16:40:00.000Z"));\r
43         expectedConsent = XMLString::transcode("urn:string:consent"); \r
44         expectedDestination = XMLString::transcode("http://idp.example.org/endpoint"); \r
45         expectedForceAuthn = true;\r
46         expectedIsPassive = true;\r
47         expectedProtocolBinding = XMLString::transcode("urn:string:protocol-binding");\r
48         expectedAssertionConsumerServiceIndex = 3;\r
49         expectedAssertionConsumerServiceURL = XMLString::transcode("http://sp.example.org/acs");\r
50         expectedAttributeConsumingServiceIndex = 2;\r
51         expectedProviderName = XMLString::transcode("Example Org");\r
52 \r
53         singleElementFile = data_path + "saml2/core/impl/AuthnRequest.xml";\r
54         singleElementOptionalAttributesFile = data_path + "saml2/core/impl/AuthnRequestOptionalAttributes.xml";\r
55         childElementsFile  = data_path + "saml2/core/impl/AuthnRequestChildElements.xml";    \r
56         SAMLObjectBaseTestCase::setUp();\r
57     }\r
58     \r
59     void tearDown() {\r
60         XMLString::release(&expectedID);\r
61         XMLString::release(&expectedVersion);\r
62         XMLString::release(&expectedConsent);\r
63         XMLString::release(&expectedDestination);\r
64         XMLString::release(&expectedProtocolBinding);\r
65         XMLString::release(&expectedAssertionConsumerServiceURL);\r
66         XMLString::release(&expectedProviderName);\r
67         delete expectedIssueInstant;\r
68         SAMLObjectBaseTestCase::tearDown();\r
69     }\r
70 \r
71     void testSingleElementUnmarshall() {\r
72         auto_ptr<XMLObject> xo(unmarshallElement(singleElementFile));\r
73         AuthnRequest* request = dynamic_cast<AuthnRequest*>(xo.get());\r
74         TS_ASSERT(request!=NULL);\r
75         assertEquals("ID attribute", expectedID, request->getID());\r
76         assertEquals("Version attribute", expectedVersion, request->getVersion());\r
77         assertEquals("IssueInstant attribute", expectedIssueInstant->getFormattedString(), request->getIssueInstant()->getFormattedString());\r
78         TSM_ASSERT_EQUALS("ForceAuthn attribute presence", false, request->ForceAuthn().first);\r
79         TSM_ASSERT_EQUALS("IsPassive attribute presence", false, request->IsPassive().first);\r
80         TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",false, request->getAssertionConsumerServiceIndex().first);\r
81         TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", false, request->getAttributeConsumingServiceIndex().first);\r
82 \r
83         TS_ASSERT(request->getIssuer()==NULL);\r
84         TS_ASSERT(request->getSignature()==NULL);\r
85         TS_ASSERT(request->getExtensions()==NULL);\r
86         TS_ASSERT(request->getSubject()==NULL);\r
87         TS_ASSERT(request->getNameIDPolicy()==NULL);\r
88         TS_ASSERT(request->getConditions()==NULL);\r
89         TS_ASSERT(request->getRequestedAuthnContext()==NULL);\r
90         TS_ASSERT(request->getScoping()==NULL);\r
91     }\r
92 \r
93     void testSingleElementOptionalAttributesUnmarshall() {\r
94         auto_ptr<XMLObject> xo(unmarshallElement(singleElementOptionalAttributesFile));\r
95         AuthnRequest* request = dynamic_cast<AuthnRequest*>(xo.get());\r
96         TS_ASSERT(request!=NULL);\r
97 \r
98         assertEquals("Consent attribute", expectedConsent, request->getConsent());\r
99         assertEquals("Destination attribute", expectedDestination, request->getDestination());\r
100         TSM_ASSERT_EQUALS("ForceAuthn attribute presence", true, request->ForceAuthn().first);\r
101         TSM_ASSERT_EQUALS("ForceAuthn attribute value", expectedForceAuthn, request->ForceAuthn().second);\r
102         TSM_ASSERT_EQUALS("IsPassive attribute presence", true, request->IsPassive().first);\r
103         TSM_ASSERT_EQUALS("IsPassive attribute value", expectedIsPassive, request->IsPassive().second);\r
104         assertEquals("ProtocolBinding attribute", expectedProtocolBinding,request->getProtocolBinding());\r
105         TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",true, request->getAssertionConsumerServiceIndex().first);\r
106         TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute value",expectedAssertionConsumerServiceIndex, request->getAssertionConsumerServiceIndex().second);\r
107         assertEquals("AssertionConsumerServierURL attribute", expectedAssertionConsumerServiceURL, request->getAssertionConsumerServiceURL());\r
108         TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", true, request->getAttributeConsumingServiceIndex().first);\r
109         TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute value", expectedAttributeConsumingServiceIndex, request->getAttributeConsumingServiceIndex().second);\r
110         assertEquals("ProviderName attribute", expectedProviderName, request->getProviderName());\r
111 \r
112         TS_ASSERT(request->getIssuer()==NULL);\r
113         TS_ASSERT(request->getSignature()==NULL);\r
114         TS_ASSERT(request->getExtensions()==NULL);\r
115         TS_ASSERT(request->getSubject()==NULL);\r
116         TS_ASSERT(request->getNameIDPolicy()==NULL);\r
117         TS_ASSERT(request->getConditions()==NULL);\r
118         TS_ASSERT(request->getRequestedAuthnContext()==NULL);\r
119         TS_ASSERT(request->getScoping()==NULL);\r
120     }\r
121 \r
122     void testChildElementsUnmarshall() {\r
123         auto_ptr<XMLObject> xo(unmarshallElement(childElementsFile));\r
124         AuthnRequest* request= dynamic_cast<AuthnRequest*>(xo.get());\r
125         TS_ASSERT(request!=NULL);\r
126         TS_ASSERT(request->getIssuer()!=NULL);\r
127         TS_ASSERT(request->getSignature()==NULL);\r
128         TS_ASSERT(request->getExtensions()==NULL);\r
129         TS_ASSERT(request->getSubject()!=NULL);\r
130         TS_ASSERT(request->getNameIDPolicy()!=NULL);\r
131         TS_ASSERT(request->getConditions()!=NULL);\r
132         TS_ASSERT(request->getRequestedAuthnContext()!=NULL);\r
133         TS_ASSERT(request->getScoping()!=NULL);\r
134         TSM_ASSERT_EQUALS("ForceAuthn attribute presence", false, request->ForceAuthn().first);\r
135         TSM_ASSERT_EQUALS("IsPassive attribute presence", false, request->IsPassive().first);\r
136         TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",false, request->getAssertionConsumerServiceIndex().first);\r
137         TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", false, request->getAttributeConsumingServiceIndex().first);\r
138     }\r
139 \r
140     void testSingleElementMarshall() {\r
141         AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();\r
142         request->setID(expectedID);\r
143         request->setIssueInstant(expectedIssueInstant);\r
144         //request->setVersion(expectedVersion);\r
145         assertEquals(expectedDOM, request);\r
146     }\r
147 \r
148     void testSingleElementOptionalAttributesMarshall() {\r
149         AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();\r
150         request->setID(expectedID);\r
151         request->setIssueInstant(expectedIssueInstant);\r
152         //request->setVersion(expectedVersion);\r
153         request->setConsent(expectedConsent);\r
154         request->setDestination(expectedDestination);\r
155         request->ForceAuthn(expectedForceAuthn);\r
156         request->IsPassive(expectedIsPassive);\r
157         request->setProtocolBinding(expectedProtocolBinding);\r
158         request->setAssertionConsumerServiceIndex(expectedAssertionConsumerServiceIndex);\r
159         request->setAssertionConsumerServiceURL(expectedAssertionConsumerServiceURL);\r
160         request->setAttributeConsumingServiceIndex(expectedAttributeConsumingServiceIndex);\r
161         request->setProviderName(expectedProviderName);\r
162         assertEquals(expectedOptionalAttributesDOM, request);\r
163     }\r
164 \r
165     void testChildElementsMarshall() {\r
166         AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();\r
167         request->setID(expectedID);\r
168         request->setIssueInstant(expectedIssueInstant);\r
169         // Do this just so don't have to redeclare the saml namespace prefix on every child element in the control XML file\r
170         Namespace* ns = new Namespace(opensaml::SAMLConstants::SAML20_NS, opensaml::SAMLConstants::SAML20_PREFIX);\r
171         request->addNamespace(*ns);\r
172         request->setIssuer(IssuerBuilder::buildIssuer());\r
173         request->setSubject(SubjectBuilder::buildSubject());\r
174         request->setNameIDPolicy(NameIDPolicyBuilder::buildNameIDPolicy());\r
175         request->setConditions(ConditionsBuilder::buildConditions());\r
176         request->setRequestedAuthnContext(RequestedAuthnContextBuilder::buildRequestedAuthnContext());\r
177         request->setScoping(ScopingBuilder::buildScoping());\r
178         assertEquals(expectedChildElementsDOM, request);\r
179         delete ns;\r
180     }\r
181 \r
182 };\r