Fix linefeeds
[shibboleth/cpp-opensaml.git] / samltest / saml2 / core / impl / AuthnRequest20Test.h
index 140d675..1c0482a 100644 (file)
-/*\r
- *  Copyright 2001-2006 Internet2\r
- * \r
- * Licensed under the Apache License, Version 2.0 (the "License");\r
- * you may not use this file except in compliance with the License.\r
- * You may obtain a copy of the License at\r
- *\r
- *     http://www.apache.org/licenses/LICENSE-2.0\r
- *\r
- * Unless required by applicable law or agreed to in writing, software\r
- * distributed under the License is distributed on an "AS IS" BASIS,\r
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r
- * See the License for the specific language governing permissions and\r
- * limitations under the License.\r
- */\r
-\r
-#include "internal.h"\r
-#include <saml/saml2/core/Protocols.h>\r
-#include <saml/util/SAMLConstants.h>\r
-\r
-using namespace opensaml::saml2p;\r
-using namespace opensaml::saml2;\r
-\r
-class AuthnRequest20Test : public CxxTest::TestSuite, public SAMLObjectBaseTestCase {\r
-    XMLCh* expectedID; \r
-    XMLCh* expectedVersion; \r
-    DateTime* expectedIssueInstant; \r
-    XMLCh* expectedConsent; \r
-    XMLCh* expectedDestination; \r
-    bool expectedForceAuthn; \r
-    bool expectedIsPassive; \r
-    XMLCh* expectedProtocolBinding; \r
-    int expectedAssertionConsumerServiceIndex;\r
-    XMLCh* expectedAssertionConsumerServiceURL; \r
-    int expectedAttributeConsumingServiceIndex;\r
-    XMLCh* expectedProviderName;\r
-\r
-public:\r
-    void setUp() {\r
-        expectedID = XMLString::transcode("abc123");; \r
-        expectedVersion = XMLString::transcode("2.0"); \r
-        expectedIssueInstant = new DateTime(XMLString::transcode("2006-02-21T16:40:00.000Z"));\r
-        expectedIssueInstant->parseDateTime();\r
-        expectedConsent = XMLString::transcode("urn:string:consent"); \r
-        expectedDestination = XMLString::transcode("http://idp.example.org/endpoint"); \r
-        expectedForceAuthn = true;\r
-        expectedIsPassive = true;\r
-        expectedProtocolBinding = XMLString::transcode("urn:string:protocol-binding");\r
-        expectedAssertionConsumerServiceIndex = 3;\r
-        expectedAssertionConsumerServiceURL = XMLString::transcode("http://sp.example.org/acs");\r
-        expectedAttributeConsumingServiceIndex = 2;\r
-        expectedProviderName = XMLString::transcode("Example Org");\r
-\r
-        singleElementFile = data_path + "saml2/core/impl/AuthnRequest.xml";\r
-        singleElementOptionalAttributesFile = data_path + "saml2/core/impl/AuthnRequestOptionalAttributes.xml";\r
-        childElementsFile  = data_path + "saml2/core/impl/AuthnRequestChildElements.xml";    \r
-        SAMLObjectBaseTestCase::setUp();\r
-    }\r
-    \r
-    void tearDown() {\r
-        XMLString::release(&expectedID);\r
-        XMLString::release(&expectedVersion);\r
-        XMLString::release(&expectedConsent);\r
-        XMLString::release(&expectedDestination);\r
-        XMLString::release(&expectedProtocolBinding);\r
-        XMLString::release(&expectedAssertionConsumerServiceURL);\r
-        XMLString::release(&expectedProviderName);\r
-        delete expectedIssueInstant;\r
-        SAMLObjectBaseTestCase::tearDown();\r
-    }\r
-\r
-    void testSingleElementUnmarshall() {\r
-        auto_ptr<XMLObject> xo(unmarshallElement(singleElementFile));\r
-        AuthnRequest* request = dynamic_cast<AuthnRequest*>(xo.get());\r
-        TS_ASSERT(request!=NULL);\r
-        assertEquals("ID attribute", expectedID, request->getID());\r
-        assertEquals("Version attribute", expectedVersion, request->getVersion());\r
-        TSM_ASSERT_EQUALS("IssueInstant attribute", expectedIssueInstant->getEpoch(), request->getIssueInstant()->getEpoch());\r
-        TSM_ASSERT_EQUALS("ForceAuthn attribute presence", XMLConstants::XML_BOOL_NULL, request->getForceAuthn());\r
-        TSM_ASSERT_EQUALS("IsPassive attribute presence", XMLConstants::XML_BOOL_NULL, request->getIsPassive());\r
-        TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",false, request->getAssertionConsumerServiceIndex().first);\r
-        TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", false, request->getAttributeConsumingServiceIndex().first);\r
-\r
-        TS_ASSERT(request->getIssuer()==NULL);\r
-        TS_ASSERT(request->getSignature()==NULL);\r
-        TS_ASSERT(request->getExtensions()==NULL);\r
-        TS_ASSERT(request->getSubject()==NULL);\r
-        TS_ASSERT(request->getNameIDPolicy()==NULL);\r
-        TS_ASSERT(request->getConditions()==NULL);\r
-        TS_ASSERT(request->getRequestedAuthnContext()==NULL);\r
-        TS_ASSERT(request->getScoping()==NULL);\r
-    }\r
-\r
-    void testSingleElementOptionalAttributesUnmarshall() {\r
-        auto_ptr<XMLObject> xo(unmarshallElement(singleElementOptionalAttributesFile));\r
-        AuthnRequest* request = dynamic_cast<AuthnRequest*>(xo.get());\r
-        TS_ASSERT(request!=NULL);\r
-\r
-        assertEquals("Consent attribute", expectedConsent, request->getConsent());\r
-        assertEquals("Destination attribute", expectedDestination, request->getDestination());\r
-        TSM_ASSERT_EQUALS("ForceAuthn attribute value", expectedForceAuthn, request->ForceAuthn());\r
-        TSM_ASSERT_EQUALS("IsPassive attribute value", expectedIsPassive, request->IsPassive());\r
-        assertEquals("ProtocolBinding attribute", expectedProtocolBinding,request->getProtocolBinding());\r
-        TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",true, request->getAssertionConsumerServiceIndex().first);\r
-        TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute value",expectedAssertionConsumerServiceIndex, request->getAssertionConsumerServiceIndex().second);\r
-        assertEquals("AssertionConsumerServierURL attribute", expectedAssertionConsumerServiceURL, request->getAssertionConsumerServiceURL());\r
-        TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", true, request->getAttributeConsumingServiceIndex().first);\r
-        TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute value", expectedAttributeConsumingServiceIndex, request->getAttributeConsumingServiceIndex().second);\r
-        assertEquals("ProviderName attribute", expectedProviderName, request->getProviderName());\r
-\r
-        TS_ASSERT(request->getIssuer()==NULL);\r
-        TS_ASSERT(request->getSignature()==NULL);\r
-        TS_ASSERT(request->getExtensions()==NULL);\r
-        TS_ASSERT(request->getSubject()==NULL);\r
-        TS_ASSERT(request->getNameIDPolicy()==NULL);\r
-        TS_ASSERT(request->getConditions()==NULL);\r
-        TS_ASSERT(request->getRequestedAuthnContext()==NULL);\r
-        TS_ASSERT(request->getScoping()==NULL);\r
-    }\r
-\r
-    void testChildElementsUnmarshall() {\r
-        auto_ptr<XMLObject> xo(unmarshallElement(childElementsFile));\r
-        AuthnRequest* request= dynamic_cast<AuthnRequest*>(xo.get());\r
-        TS_ASSERT(request!=NULL);\r
-        TS_ASSERT(request->getIssuer()!=NULL);\r
-        TS_ASSERT(request->getSignature()==NULL);\r
-        TS_ASSERT(request->getExtensions()==NULL);\r
-        TS_ASSERT(request->getSubject()!=NULL);\r
-        TS_ASSERT(request->getNameIDPolicy()!=NULL);\r
-        TS_ASSERT(request->getConditions()!=NULL);\r
-        TS_ASSERT(request->getRequestedAuthnContext()!=NULL);\r
-        TS_ASSERT(request->getScoping()!=NULL);\r
-        TSM_ASSERT_EQUALS("ForceAuthn attribute presence", XMLConstants::XML_BOOL_NULL, request->getForceAuthn());\r
-        TSM_ASSERT_EQUALS("IsPassive attribute presence", XMLConstants::XML_BOOL_NULL, request->getIsPassive());\r
-        TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",false, request->getAssertionConsumerServiceIndex().first);\r
-        TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", false, request->getAttributeConsumingServiceIndex().first);\r
-    }\r
-\r
-    void testSingleElementMarshall() {\r
-        AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();\r
-        request->setID(expectedID);\r
-        request->setIssueInstant(expectedIssueInstant);\r
-        //request->setVersion(expectedVersion);\r
-        assertEquals(expectedDOM, request);\r
-    }\r
-\r
-    void testSingleElementOptionalAttributesMarshall() {\r
-        AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();\r
-        request->setID(expectedID);\r
-        request->setIssueInstant(expectedIssueInstant);\r
-        //request->setVersion(expectedVersion);\r
-        request->setConsent(expectedConsent);\r
-        request->setDestination(expectedDestination);\r
-        request->ForceAuthn(expectedForceAuthn);\r
-        request->IsPassive(expectedIsPassive);\r
-        request->setProtocolBinding(expectedProtocolBinding);\r
-        request->setAssertionConsumerServiceIndex(expectedAssertionConsumerServiceIndex);\r
-        request->setAssertionConsumerServiceURL(expectedAssertionConsumerServiceURL);\r
-        request->setAttributeConsumingServiceIndex(expectedAttributeConsumingServiceIndex);\r
-        request->setProviderName(expectedProviderName);\r
-        assertEquals(expectedOptionalAttributesDOM, request);\r
-    }\r
-\r
-    void testChildElementsMarshall() {\r
-        AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();\r
-        request->setID(expectedID);\r
-        request->setIssueInstant(expectedIssueInstant);\r
-        // Do this just so don't have to redeclare the saml namespace prefix on every child element in the control XML file\r
-        Namespace* ns = new Namespace(opensaml::SAMLConstants::SAML20_NS, opensaml::SAMLConstants::SAML20_PREFIX);\r
-        request->addNamespace(*ns);\r
-        request->setIssuer(IssuerBuilder::buildIssuer());\r
-        request->setSubject(SubjectBuilder::buildSubject());\r
-        request->setNameIDPolicy(NameIDPolicyBuilder::buildNameIDPolicy());\r
-        request->setConditions(ConditionsBuilder::buildConditions());\r
-        request->setRequestedAuthnContext(RequestedAuthnContextBuilder::buildRequestedAuthnContext());\r
-        request->setScoping(ScopingBuilder::buildScoping());\r
-        assertEquals(expectedChildElementsDOM, request);\r
-        delete ns;\r
-    }\r
-\r
-};\r
+/*
+ *  Copyright 2001-2006 Internet2
+ * 
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ *     http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include "internal.h"
+#include <saml/saml2/core/Protocols.h>
+#include <saml/util/SAMLConstants.h>
+
+using namespace opensaml::saml2p;
+using namespace opensaml::saml2;
+
+class AuthnRequest20Test : public CxxTest::TestSuite, public SAMLObjectBaseTestCase {
+    XMLCh* expectedID; 
+    XMLCh* expectedVersion; 
+    DateTime* expectedIssueInstant; 
+    XMLCh* expectedConsent; 
+    XMLCh* expectedDestination; 
+    bool expectedForceAuthn; 
+    bool expectedIsPassive; 
+    XMLCh* expectedProtocolBinding; 
+    int expectedAssertionConsumerServiceIndex;
+    XMLCh* expectedAssertionConsumerServiceURL; 
+    int expectedAttributeConsumingServiceIndex;
+    XMLCh* expectedProviderName;
+
+public:
+    void setUp() {
+        expectedID = XMLString::transcode("abc123");; 
+        expectedVersion = XMLString::transcode("2.0"); 
+        expectedIssueInstant = new DateTime(XMLString::transcode("2006-02-21T16:40:00.000Z"));
+        expectedIssueInstant->parseDateTime();
+        expectedConsent = XMLString::transcode("urn:string:consent"); 
+        expectedDestination = XMLString::transcode("http://idp.example.org/endpoint"); 
+        expectedForceAuthn = true;
+        expectedIsPassive = true;
+        expectedProtocolBinding = XMLString::transcode("urn:string:protocol-binding");
+        expectedAssertionConsumerServiceIndex = 3;
+        expectedAssertionConsumerServiceURL = XMLString::transcode("http://sp.example.org/acs");
+        expectedAttributeConsumingServiceIndex = 2;
+        expectedProviderName = XMLString::transcode("Example Org");
+
+        singleElementFile = data_path + "saml2/core/impl/AuthnRequest.xml";
+        singleElementOptionalAttributesFile = data_path + "saml2/core/impl/AuthnRequestOptionalAttributes.xml";
+        childElementsFile  = data_path + "saml2/core/impl/AuthnRequestChildElements.xml";    
+        SAMLObjectBaseTestCase::setUp();
+    }
+    
+    void tearDown() {
+        XMLString::release(&expectedID);
+        XMLString::release(&expectedVersion);
+        XMLString::release(&expectedConsent);
+        XMLString::release(&expectedDestination);
+        XMLString::release(&expectedProtocolBinding);
+        XMLString::release(&expectedAssertionConsumerServiceURL);
+        XMLString::release(&expectedProviderName);
+        delete expectedIssueInstant;
+        SAMLObjectBaseTestCase::tearDown();
+    }
+
+    void testSingleElementUnmarshall() {
+        auto_ptr<XMLObject> xo(unmarshallElement(singleElementFile));
+        AuthnRequest* request = dynamic_cast<AuthnRequest*>(xo.get());
+        TS_ASSERT(request!=NULL);
+        assertEquals("ID attribute", expectedID, request->getID());
+        assertEquals("Version attribute", expectedVersion, request->getVersion());
+        TSM_ASSERT_EQUALS("IssueInstant attribute", expectedIssueInstant->getEpoch(), request->getIssueInstant()->getEpoch());
+        TSM_ASSERT_EQUALS("ForceAuthn attribute presence", XMLConstants::XML_BOOL_NULL, request->getForceAuthn());
+        TSM_ASSERT_EQUALS("IsPassive attribute presence", XMLConstants::XML_BOOL_NULL, request->getIsPassive());
+        TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",false, request->getAssertionConsumerServiceIndex().first);
+        TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", false, request->getAttributeConsumingServiceIndex().first);
+
+        TS_ASSERT(request->getIssuer()==NULL);
+        TS_ASSERT(request->getSignature()==NULL);
+        TS_ASSERT(request->getExtensions()==NULL);
+        TS_ASSERT(request->getSubject()==NULL);
+        TS_ASSERT(request->getNameIDPolicy()==NULL);
+        TS_ASSERT(request->getConditions()==NULL);
+        TS_ASSERT(request->getRequestedAuthnContext()==NULL);
+        TS_ASSERT(request->getScoping()==NULL);
+    }
+
+    void testSingleElementOptionalAttributesUnmarshall() {
+        auto_ptr<XMLObject> xo(unmarshallElement(singleElementOptionalAttributesFile));
+        AuthnRequest* request = dynamic_cast<AuthnRequest*>(xo.get());
+        TS_ASSERT(request!=NULL);
+
+        assertEquals("Consent attribute", expectedConsent, request->getConsent());
+        assertEquals("Destination attribute", expectedDestination, request->getDestination());
+        TSM_ASSERT_EQUALS("ForceAuthn attribute value", expectedForceAuthn, request->ForceAuthn());
+        TSM_ASSERT_EQUALS("IsPassive attribute value", expectedIsPassive, request->IsPassive());
+        assertEquals("ProtocolBinding attribute", expectedProtocolBinding,request->getProtocolBinding());
+        TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",true, request->getAssertionConsumerServiceIndex().first);
+        TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute value",expectedAssertionConsumerServiceIndex, request->getAssertionConsumerServiceIndex().second);
+        assertEquals("AssertionConsumerServierURL attribute", expectedAssertionConsumerServiceURL, request->getAssertionConsumerServiceURL());
+        TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", true, request->getAttributeConsumingServiceIndex().first);
+        TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute value", expectedAttributeConsumingServiceIndex, request->getAttributeConsumingServiceIndex().second);
+        assertEquals("ProviderName attribute", expectedProviderName, request->getProviderName());
+
+        TS_ASSERT(request->getIssuer()==NULL);
+        TS_ASSERT(request->getSignature()==NULL);
+        TS_ASSERT(request->getExtensions()==NULL);
+        TS_ASSERT(request->getSubject()==NULL);
+        TS_ASSERT(request->getNameIDPolicy()==NULL);
+        TS_ASSERT(request->getConditions()==NULL);
+        TS_ASSERT(request->getRequestedAuthnContext()==NULL);
+        TS_ASSERT(request->getScoping()==NULL);
+    }
+
+    void testChildElementsUnmarshall() {
+        auto_ptr<XMLObject> xo(unmarshallElement(childElementsFile));
+        AuthnRequest* request= dynamic_cast<AuthnRequest*>(xo.get());
+        TS_ASSERT(request!=NULL);
+        TS_ASSERT(request->getIssuer()!=NULL);
+        TS_ASSERT(request->getSignature()==NULL);
+        TS_ASSERT(request->getExtensions()==NULL);
+        TS_ASSERT(request->getSubject()!=NULL);
+        TS_ASSERT(request->getNameIDPolicy()!=NULL);
+        TS_ASSERT(request->getConditions()!=NULL);
+        TS_ASSERT(request->getRequestedAuthnContext()!=NULL);
+        TS_ASSERT(request->getScoping()!=NULL);
+        TSM_ASSERT_EQUALS("ForceAuthn attribute presence", XMLConstants::XML_BOOL_NULL, request->getForceAuthn());
+        TSM_ASSERT_EQUALS("IsPassive attribute presence", XMLConstants::XML_BOOL_NULL, request->getIsPassive());
+        TSM_ASSERT_EQUALS("AssertionConsumerServiceIndex attribute presence",false, request->getAssertionConsumerServiceIndex().first);
+        TSM_ASSERT_EQUALS("AttributeConsumingServiceIndex attribute presence", false, request->getAttributeConsumingServiceIndex().first);
+    }
+
+    void testSingleElementMarshall() {
+        AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();
+        request->setID(expectedID);
+        request->setIssueInstant(expectedIssueInstant);
+        //request->setVersion(expectedVersion);
+        assertEquals(expectedDOM, request);
+    }
+
+    void testSingleElementOptionalAttributesMarshall() {
+        AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();
+        request->setID(expectedID);
+        request->setIssueInstant(expectedIssueInstant);
+        //request->setVersion(expectedVersion);
+        request->setConsent(expectedConsent);
+        request->setDestination(expectedDestination);
+        request->ForceAuthn(expectedForceAuthn);
+        request->IsPassive(expectedIsPassive);
+        request->setProtocolBinding(expectedProtocolBinding);
+        request->setAssertionConsumerServiceIndex(expectedAssertionConsumerServiceIndex);
+        request->setAssertionConsumerServiceURL(expectedAssertionConsumerServiceURL);
+        request->setAttributeConsumingServiceIndex(expectedAttributeConsumingServiceIndex);
+        request->setProviderName(expectedProviderName);
+        assertEquals(expectedOptionalAttributesDOM, request);
+    }
+
+    void testChildElementsMarshall() {
+        AuthnRequest* request=AuthnRequestBuilder::buildAuthnRequest();
+        request->setID(expectedID);
+        request->setIssueInstant(expectedIssueInstant);
+        // Do this just so don't have to redeclare the saml namespace prefix on every child element in the control XML file
+        Namespace* ns = new Namespace(opensaml::SAMLConstants::SAML20_NS, opensaml::SAMLConstants::SAML20_PREFIX);
+        request->addNamespace(*ns);
+        request->setIssuer(IssuerBuilder::buildIssuer());
+        request->setSubject(SubjectBuilder::buildSubject());
+        request->setNameIDPolicy(NameIDPolicyBuilder::buildNameIDPolicy());
+        request->setConditions(ConditionsBuilder::buildConditions());
+        request->setRequestedAuthnContext(RequestedAuthnContextBuilder::buildRequestedAuthnContext());
+        request->setScoping(ScopingBuilder::buildScoping());
+        assertEquals(expectedChildElementsDOM, request);
+        delete ns;
+    }
+
+};