-/*\r
- * Copyright 2001-2006 Internet2\r
- * \r
- * Licensed under the Apache License, Version 2.0 (the "License");\r
- * you may not use this file except in compliance with the License.\r
- * You may obtain a copy of the License at\r
- *\r
- * http://www.apache.org/licenses/LICENSE-2.0\r
- *\r
- * Unless required by applicable law or agreed to in writing, software\r
- * distributed under the License is distributed on an "AS IS" BASIS,\r
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\r
- * See the License for the specific language governing permissions and\r
- * limitations under the License.\r
- */\r
-\r
-#include "internal.h"\r
-#include <saml/SAMLConfig.h>\r
-#include <saml/saml2/binding/SAML2ArtifactType0004.h>\r
-#include <saml/saml2/metadata/Metadata.h>\r
-#include <saml/saml2/metadata/MetadataProvider.h>\r
-\r
-using namespace opensaml::saml2md;\r
-using namespace opensaml::saml2p;\r
-\r
-class FilesystemMetadataProviderTest : public CxxTest::TestSuite, public SAMLObjectBaseTestCase {\r
- XMLCh* entityID;\r
- XMLCh* entityID2;\r
- XMLCh* supportedProtocol;\r
- XMLCh* supportedProtocol2;\r
-\r
-public:\r
- void setUp() {\r
- entityID=XMLString::transcode("urn:mace:incommon:washington.edu");\r
- entityID2=XMLString::transcode("urn:mace:incommon:rochester.edu");\r
- supportedProtocol=XMLString::transcode("urn:oasis:names:tc:SAML:1.1:protocol");\r
- supportedProtocol2=XMLString::transcode("urn:mace:shibboleth:1.0");\r
- SAMLObjectBaseTestCase::setUp();\r
- }\r
- \r
- void tearDown() {\r
- XMLString::release(&entityID);\r
- XMLString::release(&entityID2);\r
- XMLString::release(&supportedProtocol);\r
- XMLString::release(&supportedProtocol2);\r
- SAMLObjectBaseTestCase::tearDown();\r
- }\r
-\r
- void testFilesystemProvider() {\r
- string config = data_path + "saml2/metadata/FilesystemMetadataProvider.xml";\r
- ifstream in(config.c_str());\r
- DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in);\r
- XercesJanitor<DOMDocument> janitor(doc);\r
-\r
- auto_ptr_XMLCh path("path");\r
- string s = data_path + "saml2/metadata/InCommon-metadata.xml";\r
- auto_ptr_XMLCh file(s.c_str());\r
- doc->getDocumentElement()->setAttributeNS(NULL,path.get(),file.get());\r
-\r
- auto_ptr<MetadataProvider> metadataProvider(\r
- SAMLConfig::getConfig().MetadataProviderManager.newPlugin(FILESYSTEM_METADATA_PROVIDER,doc->getDocumentElement())\r
- );\r
- try {\r
- metadataProvider->init();\r
- }\r
- catch (XMLToolingException& ex) {\r
- TS_TRACE(ex.what());\r
- throw;\r
- }\r
- \r
- Locker locker(metadataProvider.get());\r
- const EntityDescriptor* descriptor = metadataProvider->getEntityDescriptor(entityID);\r
- TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=NULL);\r
- assertEquals("Entity's ID does not match requested ID", entityID, descriptor->getEntityID());\r
- TSM_ASSERT_EQUALS("Unexpected number of roles", 1, descriptor->getIDPSSODescriptors().size());\r
- TSM_ASSERT("Role lookup failed", descriptor->getIDPSSODescriptor(supportedProtocol)!=NULL);\r
- TSM_ASSERT("Role lookup failed", descriptor->getIDPSSODescriptor(supportedProtocol2)!=NULL);\r
-\r
- auto_ptr<SAML2ArtifactType0004> artifact(\r
- new SAML2ArtifactType0004(SAMLConfig::getConfig().hashSHA1("urn:mace:incommon:washington.edu"),1)\r
- );\r
- descriptor = metadataProvider->getEntityDescriptor(artifact.get());\r
- TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=NULL);\r
- assertEquals("Entity's ID does not match requested ID", entityID, descriptor->getEntityID());\r
- }\r
-\r
- void testFilesystemWithBlacklists() {\r
- string config = data_path + "saml2/metadata/FilesystemWithBlacklists.xml";\r
- ifstream in(config.c_str());\r
- DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in);\r
- XercesJanitor<DOMDocument> janitor(doc);\r
-\r
- auto_ptr_XMLCh path("path");\r
- string s = data_path + "saml2/metadata/InCommon-metadata.xml";\r
- auto_ptr_XMLCh file(s.c_str());\r
- doc->getDocumentElement()->setAttributeNS(NULL,path.get(),file.get());\r
-\r
- auto_ptr<MetadataProvider> metadataProvider(\r
- SAMLConfig::getConfig().MetadataProviderManager.newPlugin(FILESYSTEM_METADATA_PROVIDER,doc->getDocumentElement())\r
- );\r
- try {\r
- metadataProvider->init();\r
- }\r
- catch (XMLToolingException& ex) {\r
- TS_TRACE(ex.what());\r
- throw;\r
- }\r
-\r
- Locker locker(metadataProvider.get());\r
- const EntityDescriptor* descriptor = metadataProvider->getEntityDescriptor(entityID);\r
- TSM_ASSERT("Retrieved entity descriptor was not null", descriptor==NULL);\r
- descriptor = metadataProvider->getEntityDescriptor(entityID2);\r
- TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=NULL);\r
- assertEquals("Entity's ID does not match requested ID", entityID2, descriptor->getEntityID());\r
- }\r
-\r
- void testFilesystemWithWhitelists() {\r
- string config = data_path + "saml2/metadata/FilesystemWithWhitelists.xml";\r
- ifstream in(config.c_str());\r
- DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in);\r
- XercesJanitor<DOMDocument> janitor(doc);\r
-\r
- auto_ptr_XMLCh path("path");\r
- string s = data_path + "saml2/metadata/InCommon-metadata.xml";\r
- auto_ptr_XMLCh file(s.c_str());\r
- doc->getDocumentElement()->setAttributeNS(NULL,path.get(),file.get());\r
-\r
- auto_ptr<MetadataProvider> metadataProvider(\r
- SAMLConfig::getConfig().MetadataProviderManager.newPlugin(FILESYSTEM_METADATA_PROVIDER,doc->getDocumentElement())\r
- );\r
- try {\r
- metadataProvider->init();\r
- }\r
- catch (XMLToolingException& ex) {\r
- TS_TRACE(ex.what());\r
- throw;\r
- }\r
-\r
- Locker locker(metadataProvider.get());\r
- const EntityDescriptor* descriptor = metadataProvider->getEntityDescriptor(entityID2);\r
- TSM_ASSERT("Retrieved entity descriptor was not null", descriptor==NULL);\r
- descriptor = metadataProvider->getEntityDescriptor(entityID);\r
- TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=NULL);\r
- assertEquals("Entity's ID does not match requested ID", entityID, descriptor->getEntityID());\r
- }\r
-};\r
+/*
+ * Copyright 2001-2006 Internet2
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+#include "internal.h"
+#include <saml/SAMLConfig.h>
+#include <saml/saml2/binding/SAML2ArtifactType0004.h>
+#include <saml/saml2/metadata/Metadata.h>
+#include <saml/saml2/metadata/MetadataProvider.h>
+
+using namespace opensaml::saml2md;
+using namespace opensaml::saml2p;
+
+class FilesystemMetadataProviderTest : public CxxTest::TestSuite, public SAMLObjectBaseTestCase {
+ XMLCh* entityID;
+ XMLCh* entityID2;
+ XMLCh* supportedProtocol;
+ XMLCh* supportedProtocol2;
+
+public:
+ void setUp() {
+ entityID=XMLString::transcode("urn:mace:incommon:washington.edu");
+ entityID2=XMLString::transcode("urn:mace:incommon:rochester.edu");
+ supportedProtocol=XMLString::transcode("urn:oasis:names:tc:SAML:1.1:protocol");
+ supportedProtocol2=XMLString::transcode("urn:mace:shibboleth:1.0");
+ SAMLObjectBaseTestCase::setUp();
+ }
+
+ void tearDown() {
+ XMLString::release(&entityID);
+ XMLString::release(&entityID2);
+ XMLString::release(&supportedProtocol);
+ XMLString::release(&supportedProtocol2);
+ SAMLObjectBaseTestCase::tearDown();
+ }
+
+ void testFilesystemProvider() {
+ string config = data_path + "saml2/metadata/FilesystemMetadataProvider.xml";
+ ifstream in(config.c_str());
+ DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in);
+ XercesJanitor<DOMDocument> janitor(doc);
+
+ auto_ptr_XMLCh path("path");
+ string s = data_path + "saml2/metadata/InCommon-metadata.xml";
+ auto_ptr_XMLCh file(s.c_str());
+ doc->getDocumentElement()->setAttributeNS(NULL,path.get(),file.get());
+
+ auto_ptr<MetadataProvider> metadataProvider(
+ SAMLConfig::getConfig().MetadataProviderManager.newPlugin(FILESYSTEM_METADATA_PROVIDER,doc->getDocumentElement())
+ );
+ try {
+ metadataProvider->init();
+ }
+ catch (XMLToolingException& ex) {
+ TS_TRACE(ex.what());
+ throw;
+ }
+
+ Locker locker(metadataProvider.get());
+ const EntityDescriptor* descriptor = metadataProvider->getEntityDescriptor(entityID);
+ TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=NULL);
+ assertEquals("Entity's ID does not match requested ID", entityID, descriptor->getEntityID());
+ TSM_ASSERT_EQUALS("Unexpected number of roles", 1, descriptor->getIDPSSODescriptors().size());
+ TSM_ASSERT("Role lookup failed", descriptor->getIDPSSODescriptor(supportedProtocol)!=NULL);
+ TSM_ASSERT("Role lookup failed", descriptor->getIDPSSODescriptor(supportedProtocol2)!=NULL);
+
+ auto_ptr<SAML2ArtifactType0004> artifact(
+ new SAML2ArtifactType0004(SAMLConfig::getConfig().hashSHA1("urn:mace:incommon:washington.edu"),1)
+ );
+ descriptor = metadataProvider->getEntityDescriptor(artifact.get());
+ TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=NULL);
+ assertEquals("Entity's ID does not match requested ID", entityID, descriptor->getEntityID());
+ }
+
+ void testFilesystemWithBlacklists() {
+ string config = data_path + "saml2/metadata/FilesystemWithBlacklists.xml";
+ ifstream in(config.c_str());
+ DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in);
+ XercesJanitor<DOMDocument> janitor(doc);
+
+ auto_ptr_XMLCh path("path");
+ string s = data_path + "saml2/metadata/InCommon-metadata.xml";
+ auto_ptr_XMLCh file(s.c_str());
+ doc->getDocumentElement()->setAttributeNS(NULL,path.get(),file.get());
+
+ auto_ptr<MetadataProvider> metadataProvider(
+ SAMLConfig::getConfig().MetadataProviderManager.newPlugin(FILESYSTEM_METADATA_PROVIDER,doc->getDocumentElement())
+ );
+ try {
+ metadataProvider->init();
+ }
+ catch (XMLToolingException& ex) {
+ TS_TRACE(ex.what());
+ throw;
+ }
+
+ Locker locker(metadataProvider.get());
+ const EntityDescriptor* descriptor = metadataProvider->getEntityDescriptor(entityID);
+ TSM_ASSERT("Retrieved entity descriptor was not null", descriptor==NULL);
+ descriptor = metadataProvider->getEntityDescriptor(entityID2);
+ TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=NULL);
+ assertEquals("Entity's ID does not match requested ID", entityID2, descriptor->getEntityID());
+ }
+
+ void testFilesystemWithWhitelists() {
+ string config = data_path + "saml2/metadata/FilesystemWithWhitelists.xml";
+ ifstream in(config.c_str());
+ DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in);
+ XercesJanitor<DOMDocument> janitor(doc);
+
+ auto_ptr_XMLCh path("path");
+ string s = data_path + "saml2/metadata/InCommon-metadata.xml";
+ auto_ptr_XMLCh file(s.c_str());
+ doc->getDocumentElement()->setAttributeNS(NULL,path.get(),file.get());
+
+ auto_ptr<MetadataProvider> metadataProvider(
+ SAMLConfig::getConfig().MetadataProviderManager.newPlugin(FILESYSTEM_METADATA_PROVIDER,doc->getDocumentElement())
+ );
+ try {
+ metadataProvider->init();
+ }
+ catch (XMLToolingException& ex) {
+ TS_TRACE(ex.what());
+ throw;
+ }
+
+ Locker locker(metadataProvider.get());
+ const EntityDescriptor* descriptor = metadataProvider->getEntityDescriptor(entityID2);
+ TSM_ASSERT("Retrieved entity descriptor was not null", descriptor==NULL);
+ descriptor = metadataProvider->getEntityDescriptor(entityID);
+ TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=NULL);
+ assertEquals("Entity's ID does not match requested ID", entityID, descriptor->getEntityID());
+ }
+};