Allow for use as XMLTooling extension, clean up some header use in tests.
[shibboleth/cpp-opensaml.git] / samltest / security / AbstractPKIXTrustEngineTest.h
1 /*\r
2  *  Copyright 2001-2006 Internet2\r
3  * \r
4  * Licensed under the Apache License, Version 2.0 (the "License");\r
5  * you may not use this file except in compliance with the License.\r
6  * You may obtain a copy of the License at\r
7  *\r
8  *     http://www.apache.org/licenses/LICENSE-2.0\r
9  *\r
10  * Unless required by applicable law or agreed to in writing, software\r
11  * distributed under the License is distributed on an "AS IS" BASIS,\r
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r
13  * See the License for the specific language governing permissions and\r
14  * limitations under the License.\r
15  */\r
16 \r
17 #include "internal.h"\r
18 #include <saml/SAMLConfig.h>\r
19 #include <saml/security/AbstractPKIXTrustEngine.h>\r
20 #include <saml/saml2/metadata/MetadataProvider.h>\r
21 \r
22 using namespace opensaml::saml2;\r
23 using namespace opensaml::saml2md;\r
24 using namespace xmlsignature;\r
25 \r
26 namespace {\r
27     class SampleTrustEngine : public AbstractPKIXTrustEngine {\r
28     public:\r
29         SampleTrustEngine() {}\r
30         ~SampleTrustEngine() {}\r
31         \r
32         class SampleIterator : public PKIXValidationInfoIterator {\r
33             vector<XSECCryptoX509CRL*> m_crls;\r
34             KeyResolver::ResolvedCertificates m_certs;\r
35             KeyResolver* m_resolver;\r
36             bool m_done;\r
37         public:\r
38             SampleIterator() : m_resolver(NULL), m_done(false) {\r
39                 string config = data_path + "security/FilesystemKeyResolver.xml";\r
40                 ifstream in(config.c_str());\r
41                 DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in);\r
42                 XercesJanitor<DOMDocument> janitor(doc);\r
43                 m_resolver = XMLToolingConfig::getConfig().KeyResolverManager.newPlugin(\r
44                     FILESYSTEM_KEY_RESOLVER,doc->getDocumentElement()\r
45                     );\r
46                 m_resolver->resolveCertificates((KeyInfo*)NULL,m_certs);\r
47             }\r
48             \r
49             ~SampleIterator() {\r
50                 delete m_resolver;\r
51             }\r
52 \r
53             bool next() {\r
54                 if (m_done)\r
55                     return false;\r
56                 m_done = true;\r
57                 return true;\r
58             }\r
59             \r
60             int getVerificationDepth() const {\r
61                 return 0;\r
62             }\r
63             \r
64             const vector<XSECCryptoX509*>& getTrustAnchors() const {\r
65                 return m_certs.v();\r
66             }\r
67             \r
68             const vector<XSECCryptoX509CRL*>& getCRLs() const {\r
69                 return m_crls;\r
70             }\r
71         };\r
72     \r
73         PKIXValidationInfoIterator* getPKIXValidationInfoIterator(const RoleDescriptor& role) const {\r
74             return new SampleIterator();\r
75         }\r
76     };\r
77 };\r
78 \r
79 class AbstractPKIXTrustEngineTest : public CxxTest::TestSuite, public SAMLObjectBaseTestCase {\r
80 public:\r
81     void setUp() {\r
82         SAMLObjectBaseTestCase::setUp();\r
83     }\r
84     \r
85     void tearDown() {\r
86         SAMLObjectBaseTestCase::tearDown();\r
87     }\r
88 \r
89     void testExplicitKeyTrustEngine() {\r
90         string config = data_path + "security/FilesystemMetadataProvider.xml";\r
91         ifstream in(config.c_str());\r
92         DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in);\r
93         XercesJanitor<DOMDocument> janitor(doc);\r
94 \r
95         auto_ptr_XMLCh path("path");\r
96         string s = data_path + "security/example-metadata.xml";\r
97         auto_ptr_XMLCh file(s.c_str());\r
98         doc->getDocumentElement()->setAttributeNS(NULL,path.get(),file.get());\r
99 \r
100         // Build metadata provider.\r
101         auto_ptr<MetadataProvider> metadataProvider(\r
102             SAMLConfig::getConfig().MetadataProviderManager.newPlugin(FILESYSTEM_METADATA_PROVIDER,doc->getDocumentElement())\r
103             );\r
104         try {\r
105             metadataProvider->init();\r
106         }\r
107         catch (XMLToolingException& ex) {\r
108             TS_TRACE(ex.what());\r
109             throw;\r
110         }\r
111         \r
112         // Build trust engine.\r
113         auto_ptr<opensaml::TrustEngine> trustEngine(new SampleTrustEngine());\r
114         \r
115         // Get signed assertion.\r
116         config = data_path + "signature/SAML2Assertion.xml";\r
117         ifstream in2(config.c_str());\r
118         DOMDocument* doc2=XMLToolingConfig::getConfig().getParser().parse(in2);\r
119         XercesJanitor<DOMDocument> janitor2(doc2);\r
120         auto_ptr<Assertion> assertion(dynamic_cast<Assertion*>(XMLObjectBuilder::getBuilder(doc2->getDocumentElement())->buildFromDocument(doc2)));\r
121         janitor2.release();\r
122 \r
123         Locker locker(metadataProvider.get());\r
124         const EntityDescriptor* descriptor = metadataProvider->getEntityDescriptor("https://idp.example.org");\r
125         TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=NULL);\r
126         \r
127         RoleDescriptor* role=descriptor->getIDPSSODescriptors().front();\r
128         TSM_ASSERT("Role not present", role!=NULL);\r
129         \r
130         Signature* sig=assertion->getSignature();\r
131         TSM_ASSERT("Signature not present", sig!=NULL);\r
132         TSM_ASSERT("Signature failed to validate.", trustEngine->validate(*sig, *role, metadataProvider->getKeyResolver()));\r
133 \r
134         descriptor = metadataProvider->getEntityDescriptor("https://idp2.example.org");\r
135         TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=NULL);\r
136         \r
137         role=descriptor->getIDPSSODescriptors().front();\r
138         TSM_ASSERT("Role not present", role!=NULL);\r
139 \r
140         TSM_ASSERT("Signature validated.", !trustEngine->validate(*sig, *role, metadataProvider->getKeyResolver()));\r
141     }\r
142 };\r