ciam-es 0.0.1 → 0.0.6
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/ciam-es.gemspec +2 -2
- data/lib/ciam/ruby-saml/authrequest.rb +12 -12
- data/lib/ciam/ruby-saml/logout_request.rb +76 -55
- data/lib/ciam/ruby-saml/metadata.rb +2 -51
- data/lib/ciam/ruby-saml/response.rb +6 -7
- data/lib/ciam/ruby-saml/settings.rb +1 -1
- metadata +7 -7
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 3dad8a3cc1881093b5b571a3a6ff5ef017a580efd63eabe3a40551c365b2ed06
|
4
|
+
data.tar.gz: a5f904d9fb491a5fa3e916f81ff3a85b86f93536fb32546e35605ca09a3b3530
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: f15050be6418bf31b9b680e16de3646cd987d5142db14a9a07656e62b2916d0dd21c891d594cbf8ded5a288ab03162126480318c5fa0cc130ccc1483e03bfd48
|
7
|
+
data.tar.gz: 5e49de6e43c66d2823efc1a472be655edca69deebec364d595aea1577eedd203ed272846ab76e252474502f28addd9b3dcc36949a8e51478aa8a6b46dff02a02
|
data/ciam-es.gemspec
CHANGED
@@ -2,7 +2,7 @@ $LOAD_PATH.push File.expand_path('../lib', __FILE__)
|
|
2
2
|
|
3
3
|
Gem::Specification.new do |s|
|
4
4
|
s.name = 'ciam-es'
|
5
|
-
s.version = '0.0.
|
5
|
+
s.version = '0.0.6'
|
6
6
|
|
7
7
|
s.required_rubygems_version = Gem::Requirement.new(">= 0") if s.respond_to? :required_rubygems_version=
|
8
8
|
s.authors = ["Fabiano Pavan"]
|
@@ -19,5 +19,5 @@ Gem::Specification.new do |s|
|
|
19
19
|
s.add_runtime_dependency("canonix", ["0.1.1"])
|
20
20
|
s.add_runtime_dependency("uuid", ["~> 2.3"])
|
21
21
|
s.add_runtime_dependency("nokogiri", '>= 1.6.7.2')
|
22
|
-
s.add_runtime_dependency("addressable", ["2.
|
22
|
+
s.add_runtime_dependency("addressable", [">= 2.4.0"])
|
23
23
|
end
|
@@ -29,7 +29,7 @@ module Ciam::Saml
|
|
29
29
|
# Create AuthnRequest root element using REXML
|
30
30
|
request_doc = Ciam::XMLSecurityNew::Document.new
|
31
31
|
request_doc.context[:attribute_quote] = :quote
|
32
|
-
root = request_doc.add_element "
|
32
|
+
root = request_doc.add_element "samlp:AuthnRequest", { "xmlns:samlp" => "urn:oasis:names:tc:SAML:2.0:protocol",
|
33
33
|
"xmlns:saml" => "urn:oasis:names:tc:SAML:2.0:assertion"
|
34
34
|
}
|
35
35
|
root.attributes['ID'] = uuid
|
@@ -72,7 +72,7 @@ module Ciam::Saml
|
|
72
72
|
|
73
73
|
|
74
74
|
if @settings.name_identifier_format != nil
|
75
|
-
root.add_element "
|
75
|
+
root.add_element "samlp:NameIDPolicy", {
|
76
76
|
# Might want to make AllowCreate a setting?
|
77
77
|
#{}"AllowCreate" => "true",
|
78
78
|
"Format" => @settings.name_identifier_format[0]
|
@@ -83,8 +83,8 @@ module Ciam::Saml
|
|
83
83
|
# match required for authentication to succeed. If this is not defined,
|
84
84
|
# the IdP will choose default rules for authentication. (Shibboleth IdP)
|
85
85
|
if @settings.authn_context != nil
|
86
|
-
requested_context = root.add_element "
|
87
|
-
"Comparison" => "
|
86
|
+
requested_context = root.add_element "samlp:RequestedAuthnContext", {
|
87
|
+
"Comparison" => "exact"
|
88
88
|
}
|
89
89
|
context_class = []
|
90
90
|
@settings.authn_context.each_with_index{ |context, index|
|
@@ -95,12 +95,12 @@ module Ciam::Saml
|
|
95
95
|
end
|
96
96
|
|
97
97
|
if @settings.requester_identificator != nil
|
98
|
-
requester_identificator = root.add_element "
|
98
|
+
requester_identificator = root.add_element "samlp:Scoping", {
|
99
99
|
"ProxyCount" => "0"
|
100
100
|
}
|
101
101
|
identificators = []
|
102
102
|
@settings.requester_identificator.each_with_index{ |requester, index|
|
103
|
-
identificators[index] = requester_identificator.add_element "
|
103
|
+
identificators[index] = requester_identificator.add_element "samlp:RequesterID"
|
104
104
|
identificators[index].text = requester
|
105
105
|
}
|
106
106
|
|
@@ -109,12 +109,12 @@ module Ciam::Saml
|
|
109
109
|
request_doc << REXML::XMLDecl.new("1.0", "UTF-8")
|
110
110
|
|
111
111
|
#LA FIRMA VA MESSA SOLO NEL CASO CON HTTP POST
|
112
|
-
|
113
|
-
#
|
114
|
-
|
115
|
-
|
116
|
-
|
117
|
-
|
112
|
+
cert = @settings.get_cert(@settings.sp_cert)
|
113
|
+
# embed signature
|
114
|
+
if @settings.metadata_signed && @settings.sp_private_key && @settings.sp_cert
|
115
|
+
private_key = @settings.get_sp_key
|
116
|
+
request_doc.sign_document(private_key, cert)
|
117
|
+
end
|
118
118
|
|
119
119
|
# stampo come stringa semplice i metadata per non avere problemi con validazione firma
|
120
120
|
#ret = request_doc.to_s
|
@@ -37,85 +37,106 @@ module Ciam::Saml
|
|
37
37
|
opt = { :name_id => nil, :session_index => nil, :extra_parameters => nil }.merge(options)
|
38
38
|
return nil unless opt[:name_id]
|
39
39
|
|
40
|
-
|
41
|
-
|
40
|
+
request_doc = Ciam::XMLSecurityNew::Document.new
|
41
|
+
request_doc.context[:attribute_quote] = :quote
|
42
42
|
|
43
43
|
|
44
|
-
root =
|
44
|
+
root = request_doc.add_element "samlp:LogoutRequest", { "xmlns:samlp" => PROTOCOL, "xmlns:saml" => ASSERTION }
|
45
45
|
root.attributes['ID'] = @transaction_id
|
46
46
|
root.attributes['IssueInstant'] = @issue_instant
|
47
47
|
root.attributes['Version'] = "2.0"
|
48
48
|
root.attributes['Destination'] = @settings.single_logout_destination
|
49
49
|
|
50
|
-
issuer = root.add_element "
|
51
|
-
issuer.attributes['Format'] = "urn:oasis:names:tc:SAML:2.0:nameid-format:entity"
|
52
|
-
|
53
|
-
#per la federazione trentina qui ci vanno i metadati...
|
54
|
-
issuer.text = @settings.idp_metadata
|
50
|
+
issuer = root.add_element "saml:Issuer"#, { "xmlns:saml2" => ASSERTION }
|
51
|
+
#issuer.attributes['Format'] = "urn:oasis:names:tc:SAML:2.0:nameid-format:entity"
|
52
|
+
issuer.text = @settings.issuer
|
55
53
|
|
56
|
-
name_id = root.add_element "
|
54
|
+
name_id = root.add_element "saml:NameID"#, { "xmlns:saml2" => ASSERTION }
|
57
55
|
name_id.attributes['Format'] = "urn:oasis:names:tc:SAML:2.0:nameid-format:transient"
|
58
56
|
name_id.attributes['NameQualifier'] = @settings.idp_name_qualifier
|
59
57
|
name_id.text = opt[:name_id]
|
60
58
|
# I believe the rest of these are optional
|
61
|
-
if @settings && @settings.sp_name_qualifier
|
62
|
-
|
63
|
-
end
|
59
|
+
# if @settings && @settings.sp_name_qualifier
|
60
|
+
# name_id.attributes["SPNameQualifier"] = @settings.sp_name_qualifier
|
61
|
+
# end
|
64
62
|
if opt[:session_index]
|
65
|
-
session_index = root.add_element "
|
63
|
+
session_index = root.add_element "samlp:SessionIndex" #, { "xmlns:samlp" => PROTOCOL }
|
66
64
|
session_index.text = opt[:session_index]
|
67
65
|
end
|
68
|
-
|
69
|
-
|
70
|
-
|
66
|
+
|
67
|
+
request_doc << REXML::XMLDecl.new("1.0", "UTF-8")
|
68
|
+
#sign logout_request
|
69
|
+
cert = @settings.get_cert(@settings.sp_cert)
|
70
|
+
|
71
|
+
# embed signature
|
72
|
+
if @settings.metadata_signed && @settings.sp_private_key && @settings.sp_cert
|
73
|
+
private_key = @settings.get_sp_key
|
74
|
+
request_doc.sign_document(private_key, cert)
|
75
|
+
end
|
76
|
+
|
77
|
+
|
78
|
+
puts "Created LogoutRequest: #{request_doc}"
|
79
|
+
|
80
|
+
#Logout per binding redirect
|
81
|
+
# meta = Metadata.new(@settings)
|
82
|
+
# slo_req = meta.create_slo_request( request_doc.to_s, opt[:extra_parameters] )
|
83
|
+
|
84
|
+
|
85
|
+
return request_doc.to_s
|
86
|
+
|
71
87
|
#action, content = binding_select("SingleLogoutService")
|
72
88
|
#Logging.debug "action: #{action} content: #{content}"
|
73
89
|
#return [action, content]
|
74
|
-
|
90
|
+
end
|
75
91
|
|
76
|
-
|
92
|
+
# function to return the created request as an XML document
|
77
93
|
def to_xml
|
78
|
-
|
79
|
-
|
80
|
-
|
94
|
+
text = ""
|
95
|
+
@request.write(text, 1)
|
96
|
+
return text
|
97
|
+
end
|
98
|
+
|
99
|
+
def to_s
|
100
|
+
@request.to_s
|
81
101
|
end
|
82
|
-
|
83
|
-
@request.to_s
|
84
|
-
end
|
102
|
+
|
85
103
|
# Functions for pulling values out from an IdP initiated LogoutRequest
|
86
|
-
|
87
|
-
|
88
|
-
|
89
|
-
|
90
|
-
|
91
|
-
|
92
|
-
|
93
|
-
|
94
|
-
|
95
|
-
|
96
|
-
|
104
|
+
def name_id
|
105
|
+
element = REXML::XPath.first(@request, "/p:LogoutRequest/a:NameID", {
|
106
|
+
"p" => PROTOCOL, "a" => ASSERTION } )
|
107
|
+
return nil if element.nil?
|
108
|
+
# Can't seem to get this to work right...
|
109
|
+
#element.context[:compress_whitespace] = ["NameID"]
|
110
|
+
#element.context[:compress_whitespace] = :all
|
111
|
+
str = element.text.gsub(/^\s+/, "")
|
112
|
+
str.gsub!(/\s+$/, "")
|
113
|
+
return str
|
114
|
+
end
|
97
115
|
|
98
|
-
|
99
|
-
|
100
|
-
|
101
|
-
|
102
|
-
|
103
|
-
|
104
|
-
|
105
|
-
|
106
|
-
|
107
|
-
|
116
|
+
def transaction_id
|
117
|
+
return @transaction_id if @transaction_id
|
118
|
+
element = REXML::XPath.first(@request, "/p:LogoutRequest", {
|
119
|
+
"p" => PROTOCOL} )
|
120
|
+
return nil if element.nil?
|
121
|
+
return element.attributes["ID"]
|
122
|
+
end
|
123
|
+
|
124
|
+
def is_valid?
|
125
|
+
validate(soft = true)
|
126
|
+
end
|
108
127
|
|
109
|
-
|
110
|
-
|
111
|
-
|
112
|
-
|
113
|
-
|
114
|
-
return false if @request.
|
115
|
-
|
116
|
-
|
117
|
-
|
118
|
-
|
128
|
+
def validate!
|
129
|
+
validate( soft = false )
|
130
|
+
end
|
131
|
+
|
132
|
+
def validate( soft = true )
|
133
|
+
return false if @request.nil?
|
134
|
+
return false if @request.validate(@settings, soft) == false
|
135
|
+
|
136
|
+
return true
|
137
|
+
|
138
|
+
end
|
139
|
+
|
119
140
|
private
|
120
141
|
|
121
142
|
def self.timestamp
|
@@ -30,18 +30,10 @@ module Ciam
|
|
30
30
|
def generate(settings)
|
31
31
|
#meta_doc = REXML::Document.new
|
32
32
|
meta_doc = Ciam::XMLSecurityNew::Document.new
|
33
|
-
|
34
|
-
root = meta_doc.add_element "md:EntityDescriptor", {
|
35
|
-
"xmlns:md" => "urn:oasis:names:tc:SAML:2.0:metadata",
|
36
|
-
"xmlns:xml" => "http://www.w3.org/XML/1998/namespace",
|
37
|
-
"xmlns:ciam" => "https://ciam.gov.it/saml-extensions",
|
38
|
-
}
|
39
|
-
else
|
40
|
-
root = meta_doc.add_element "md:EntityDescriptor", {
|
33
|
+
root = meta_doc.add_element "md:EntityDescriptor", {
|
41
34
|
"xmlns:md" => "urn:oasis:names:tc:SAML:2.0:metadata",
|
42
35
|
"xmlns:xml" => "http://www.w3.org/XML/1998/namespace"
|
43
36
|
}
|
44
|
-
end
|
45
37
|
|
46
38
|
if settings.issuer != nil
|
47
39
|
root.attributes["entityID"] = settings.issuer
|
@@ -223,53 +215,12 @@ module Ciam
|
|
223
215
|
"xml:lang" => "it"
|
224
216
|
}
|
225
217
|
|
226
|
-
org_display_name.text = settings.organization['org_display_name']
|
218
|
+
org_display_name.text = settings.organization['org_display_name']
|
227
219
|
org_url = organization.add_element "md:OrganizationURL", {
|
228
220
|
"xml:lang" => "it"
|
229
221
|
}
|
230
222
|
org_url.text = settings.organization['org_url']
|
231
223
|
|
232
|
-
#ContactPerson per sp aggregato
|
233
|
-
if settings.aggregato
|
234
|
-
contact_person_aggregatore = root.add_element "md:ContactPerson", {
|
235
|
-
"contactType" => "other",
|
236
|
-
"ciam:entityType" => "ciam:aggregator"
|
237
|
-
}
|
238
|
-
company = contact_person_aggregatore.add_element "md:Company"
|
239
|
-
company.text = settings.hash_aggregatore['soggetto_aggregatore']
|
240
|
-
|
241
|
-
extensions_aggregatore = contact_person_aggregatore.add_element "md:Extensions"
|
242
|
-
vat_number_aggregatore = extensions_aggregatore.add_element "ciam:VATNumber"
|
243
|
-
vat_number_aggregatore.text = settings.hash_aggregatore['piva_aggregatore']
|
244
|
-
|
245
|
-
ipa_code_aggregatore = extensions_aggregatore.add_element "ciam:IPACode"
|
246
|
-
ipa_code_aggregatore.text = settings.hash_aggregatore['cipa_aggregatore']
|
247
|
-
|
248
|
-
fiscal_code_aggregatore = extensions_aggregatore.add_element "ciam:FiscalCode"
|
249
|
-
fiscal_code_aggregatore.text = settings.hash_aggregatore['cf_aggregatore']
|
250
|
-
|
251
|
-
contact_person_aggregato = root.add_element "md:ContactPerson", {
|
252
|
-
"contactType" => "other",
|
253
|
-
"ciam:entityType" => "ciam:aggregated"
|
254
|
-
}
|
255
|
-
company = contact_person_aggregato.add_element "md:Company"
|
256
|
-
company.text = settings.organization['org_name']
|
257
|
-
|
258
|
-
extensions_aggregato = contact_person_aggregato.add_element "md:Extensions"
|
259
|
-
unless settings.hash_aggregatore['soggetto_aggregato']['vat_number'].blank?
|
260
|
-
vat_number_aggregato = extensions_aggregato.add_element "ciam:VATNumber"
|
261
|
-
vat_number_aggregato.text = settings.hash_aggregatore['soggetto_aggregato']['vat_number']
|
262
|
-
end
|
263
|
-
unless settings.hash_aggregatore['soggetto_aggregato']['ipa_code'].blank?
|
264
|
-
ipa_code_aggregato = extensions_aggregato.add_element "ciam:IPACode"
|
265
|
-
ipa_code_aggregato.text = settings.hash_aggregatore['soggetto_aggregato']['ipa_code']
|
266
|
-
end
|
267
|
-
unless settings.hash_aggregatore['soggetto_aggregato']['fiscal_code'].blank?
|
268
|
-
fiscal_code_aggregato = extensions_aggregato.add_element "ciam:FiscalCode"
|
269
|
-
fiscal_code_aggregato.text = settings.hash_aggregatore['soggetto_aggregato']['fiscal_code']
|
270
|
-
end
|
271
|
-
end
|
272
|
-
|
273
224
|
#meta_doc << REXML::XMLDecl.new(version='1.0', encoding='UTF-8')
|
274
225
|
meta_doc << REXML::XMLDecl.new("1.0", "UTF-8")
|
275
226
|
|
@@ -98,8 +98,13 @@ module Ciam
|
|
98
98
|
parse_time(node, "SessionNotOnOrAfter")
|
99
99
|
end
|
100
100
|
end
|
101
|
-
|
102
101
|
|
102
|
+
def session_index
|
103
|
+
@session_index ||= begin
|
104
|
+
node = REXML::XPath.first(document, "/p:Response/a:Assertion/a:AuthnStatement", { "p" => PROTOCOL, "a" => ASSERTION })
|
105
|
+
node.attributes["SessionIndex"] unless node.blank?
|
106
|
+
end
|
107
|
+
end
|
103
108
|
|
104
109
|
# Checks the status of the response for a "Success" code
|
105
110
|
def success?
|
@@ -166,12 +171,6 @@ module Ciam
|
|
166
171
|
|
167
172
|
}
|
168
173
|
|
169
|
-
issuer_assertion_nodes.each{ |iss|
|
170
|
-
#controllo: L'attributo Format di Issuer deve essere presente con il valore urn:oasis:names:tc:SAML:2.0:nameid-format:entity
|
171
|
-
return (soft ? false : validation_error("Elemento Issuer non ha formato corretto ")) if iss.attributes['Format'] != 'urn:oasis:names:tc:SAML:2.0:nameid-format:entity'
|
172
|
-
|
173
|
-
}
|
174
|
-
|
175
174
|
nodes = issuer_response_nodes + issuer_assertion_nodes
|
176
175
|
|
177
176
|
nodes.map { |node| Utils.element_text(node) }.compact.uniq
|
@@ -10,7 +10,7 @@ module Ciam
|
|
10
10
|
attr_accessor :name_identifier_value, :name_identifier_format
|
11
11
|
attr_accessor :sessionindex, :issuer, :destination_service_url, :authn_context, :requester_identificator
|
12
12
|
attr_accessor :single_logout_service_url, :single_logout_service_binding, :single_logout_destination
|
13
|
-
attr_accessor :skip_validation
|
13
|
+
attr_accessor :skip_validation
|
14
14
|
|
15
15
|
def initialize(config = {})
|
16
16
|
config.each do |k,v|
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: ciam-es
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.0.
|
4
|
+
version: 0.0.6
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Fabiano Pavan
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2020-
|
11
|
+
date: 2020-09-18 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: canonix
|
@@ -56,16 +56,16 @@ dependencies:
|
|
56
56
|
name: addressable
|
57
57
|
requirement: !ruby/object:Gem::Requirement
|
58
58
|
requirements:
|
59
|
-
- -
|
59
|
+
- - ">="
|
60
60
|
- !ruby/object:Gem::Version
|
61
|
-
version: 2.
|
61
|
+
version: 2.4.0
|
62
62
|
type: :runtime
|
63
63
|
prerelease: false
|
64
64
|
version_requirements: !ruby/object:Gem::Requirement
|
65
65
|
requirements:
|
66
|
-
- -
|
66
|
+
- - ">="
|
67
67
|
- !ruby/object:Gem::Version
|
68
|
-
version: 2.
|
68
|
+
version: 2.4.0
|
69
69
|
description: 'SAML toolkit for Ruby programs to integrate with CIAM Milano '
|
70
70
|
email: fabiano.pavan@soluzionipa.it
|
71
71
|
executables: []
|
@@ -138,7 +138,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
138
138
|
- !ruby/object:Gem::Version
|
139
139
|
version: '0'
|
140
140
|
requirements: []
|
141
|
-
rubygems_version: 3.0.
|
141
|
+
rubygems_version: 3.0.8
|
142
142
|
signing_key:
|
143
143
|
specification_version: 4
|
144
144
|
summary: SAML Ruby Tookit CIAM
|