2 * Copyright 2001-2006 Internet2
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
18 #include <saml/SAMLConfig.h>
19 #include <saml/security/AbstractPKIXTrustEngine.h>
20 #include <saml/saml2/metadata/MetadataProvider.h>
22 using namespace opensaml::saml2;
23 using namespace opensaml::saml2md;
24 using namespace xmlsignature;
27 class SampleTrustEngine : public AbstractPKIXTrustEngine {
29 SampleTrustEngine() {}
30 ~SampleTrustEngine() {}
32 class SampleIterator : public PKIXValidationInfoIterator {
33 vector<XSECCryptoX509CRL*> m_crls;
34 KeyResolver::ResolvedCertificates m_certs;
35 KeyResolver* m_resolver;
38 SampleIterator() : m_resolver(NULL), m_done(false) {
39 string config = data_path + "security/FilesystemKeyResolver.xml";
40 ifstream in(config.c_str());
41 DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in);
42 XercesJanitor<DOMDocument> janitor(doc);
43 m_resolver = XMLToolingConfig::getConfig().KeyResolverManager.newPlugin(
44 FILESYSTEM_KEY_RESOLVER,doc->getDocumentElement()
46 m_resolver->resolveCertificates((KeyInfo*)NULL,m_certs);
60 int getVerificationDepth() const {
64 const vector<XSECCryptoX509*>& getTrustAnchors() const {
68 const vector<XSECCryptoX509CRL*>& getCRLs() const {
73 PKIXValidationInfoIterator* getPKIXValidationInfoIterator(const RoleDescriptor& role) const {
74 return new SampleIterator();
79 class AbstractPKIXTrustEngineTest : public CxxTest::TestSuite, public SAMLObjectBaseTestCase {
82 SAMLObjectBaseTestCase::setUp();
86 SAMLObjectBaseTestCase::tearDown();
89 void testExplicitKeyTrustEngine() {
90 string config = data_path + "security/FilesystemMetadataProvider.xml";
91 ifstream in(config.c_str());
92 DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in);
93 XercesJanitor<DOMDocument> janitor(doc);
95 auto_ptr_XMLCh path("path");
96 string s = data_path + "security/example-metadata.xml";
97 auto_ptr_XMLCh file(s.c_str());
98 doc->getDocumentElement()->setAttributeNS(NULL,path.get(),file.get());
100 // Build metadata provider.
101 auto_ptr<MetadataProvider> metadataProvider(
102 SAMLConfig::getConfig().MetadataProviderManager.newPlugin(FILESYSTEM_METADATA_PROVIDER,doc->getDocumentElement())
105 metadataProvider->init();
107 catch (XMLToolingException& ex) {
112 // Build trust engine.
113 auto_ptr<opensaml::TrustEngine> trustEngine(new SampleTrustEngine());
115 // Get signed assertion.
116 config = data_path + "signature/SAML2Assertion.xml";
117 ifstream in2(config.c_str());
118 DOMDocument* doc2=XMLToolingConfig::getConfig().getParser().parse(in2);
119 XercesJanitor<DOMDocument> janitor2(doc2);
120 auto_ptr<Assertion> assertion(dynamic_cast<Assertion*>(XMLObjectBuilder::getBuilder(doc2->getDocumentElement())->buildFromDocument(doc2)));
123 Locker locker(metadataProvider.get());
124 const EntityDescriptor* descriptor = metadataProvider->getEntityDescriptor("https://idp.example.org");
125 TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=NULL);
127 RoleDescriptor* role=descriptor->getIDPSSODescriptors().front();
128 TSM_ASSERT("Role not present", role!=NULL);
130 Signature* sig=assertion->getSignature();
131 TSM_ASSERT("Signature not present", sig!=NULL);
132 TSM_ASSERT("Signature failed to validate.", trustEngine->validate(*sig, *role, metadataProvider->getKeyResolver()));
134 descriptor = metadataProvider->getEntityDescriptor("https://idp2.example.org");
135 TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=NULL);
137 role=descriptor->getIDPSSODescriptors().front();
138 TSM_ASSERT("Role not present", role!=NULL);
140 TSM_ASSERT("Signature validated.", !trustEngine->validate(*sig, *role, metadataProvider->getKeyResolver()));