kl-ruby-saml 0.0.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.document +5 -0
- data/.gitignore +14 -0
- data/.travis.yml +17 -0
- data/Gemfile +9 -0
- data/LICENSE +19 -0
- data/README.md +575 -0
- data/Rakefile +41 -0
- data/changelog.md +75 -0
- data/gemfiles/nokogiri-1.5.gemfile +5 -0
- data/lib/onelogin/ruby-saml.rb +17 -0
- data/lib/onelogin/ruby-saml/attribute_service.rb +57 -0
- data/lib/onelogin/ruby-saml/attributes.rb +128 -0
- data/lib/onelogin/ruby-saml/authrequest.rb +156 -0
- data/lib/onelogin/ruby-saml/http_error.rb +7 -0
- data/lib/onelogin/ruby-saml/idp_metadata_parser.rb +161 -0
- data/lib/onelogin/ruby-saml/logging.rb +30 -0
- data/lib/onelogin/ruby-saml/logoutrequest.rb +131 -0
- data/lib/onelogin/ruby-saml/logoutresponse.rb +241 -0
- data/lib/onelogin/ruby-saml/metadata.rb +123 -0
- data/lib/onelogin/ruby-saml/response.rb +722 -0
- data/lib/onelogin/ruby-saml/saml_message.rb +158 -0
- data/lib/onelogin/ruby-saml/settings.rb +165 -0
- data/lib/onelogin/ruby-saml/slo_logoutrequest.rb +258 -0
- data/lib/onelogin/ruby-saml/slo_logoutresponse.rb +136 -0
- data/lib/onelogin/ruby-saml/utils.rb +172 -0
- data/lib/onelogin/ruby-saml/validation_error.rb +7 -0
- data/lib/onelogin/ruby-saml/version.rb +5 -0
- data/lib/ruby-saml.rb +1 -0
- data/lib/schemas/saml-schema-assertion-2.0.xsd +283 -0
- data/lib/schemas/saml-schema-authn-context-2.0.xsd +23 -0
- data/lib/schemas/saml-schema-authn-context-types-2.0.xsd +821 -0
- data/lib/schemas/saml-schema-metadata-2.0.xsd +337 -0
- data/lib/schemas/saml-schema-protocol-2.0.xsd +302 -0
- data/lib/schemas/sstc-metadata-attr.xsd +35 -0
- data/lib/schemas/sstc-saml-attribute-ext.xsd +25 -0
- data/lib/schemas/sstc-saml-metadata-algsupport-v1.0.xsd +41 -0
- data/lib/schemas/sstc-saml-metadata-ui-v1.0.xsd +89 -0
- data/lib/schemas/xenc-schema.xsd +136 -0
- data/lib/schemas/xml.xsd +287 -0
- data/lib/schemas/xmldsig-core-schema.xsd +309 -0
- data/lib/xml_security.rb +358 -0
- data/ruby-saml.gemspec +57 -0
- data/test/certificates/certificate1 +12 -0
- data/test/certificates/certificate_without_head_foot +1 -0
- data/test/certificates/formatted_certificate +14 -0
- data/test/certificates/formatted_private_key +12 -0
- data/test/certificates/formatted_rsa_private_key +12 -0
- data/test/certificates/invalid_certificate1 +1 -0
- data/test/certificates/invalid_certificate2 +1 -0
- data/test/certificates/invalid_certificate3 +12 -0
- data/test/certificates/invalid_private_key1 +1 -0
- data/test/certificates/invalid_private_key2 +1 -0
- data/test/certificates/invalid_private_key3 +10 -0
- data/test/certificates/invalid_rsa_private_key1 +1 -0
- data/test/certificates/invalid_rsa_private_key2 +1 -0
- data/test/certificates/invalid_rsa_private_key3 +10 -0
- data/test/certificates/ruby-saml.crt +14 -0
- data/test/certificates/ruby-saml.key +15 -0
- data/test/idp_metadata_parser_test.rb +95 -0
- data/test/logging_test.rb +62 -0
- data/test/logout_requests/invalid_slo_request.xml +6 -0
- data/test/logout_requests/slo_request.xml +4 -0
- data/test/logout_requests/slo_request.xml.base64 +1 -0
- data/test/logout_requests/slo_request_deflated.xml.base64 +1 -0
- data/test/logout_requests/slo_request_with_session_index.xml +5 -0
- data/test/logout_responses/logoutresponse_fixtures.rb +67 -0
- data/test/logoutrequest_test.rb +211 -0
- data/test/logoutresponse_test.rb +258 -0
- data/test/metadata_test.rb +203 -0
- data/test/request_test.rb +282 -0
- data/test/response_test.rb +1094 -0
- data/test/responses/adfs_response_sha1.xml +46 -0
- data/test/responses/adfs_response_sha256.xml +46 -0
- data/test/responses/adfs_response_sha384.xml +46 -0
- data/test/responses/adfs_response_sha512.xml +46 -0
- data/test/responses/adfs_response_xmlns.xml +45 -0
- data/test/responses/attackxee.xml +13 -0
- data/test/responses/idp_descriptor.xml +3 -0
- data/test/responses/invalids/invalid_audience.xml.base64 +1 -0
- data/test/responses/invalids/invalid_issuer_assertion.xml.base64 +1 -0
- data/test/responses/invalids/invalid_issuer_message.xml.base64 +1 -0
- data/test/responses/invalids/invalid_signature_position.xml.base64 +1 -0
- data/test/responses/invalids/invalid_subjectconfirmation_inresponse.xml.base64 +1 -0
- data/test/responses/invalids/invalid_subjectconfirmation_nb.xml.base64 +1 -0
- data/test/responses/invalids/invalid_subjectconfirmation_noa.xml.base64 +1 -0
- data/test/responses/invalids/invalid_subjectconfirmation_recipient.xml.base64 +1 -0
- data/test/responses/invalids/multiple_assertions.xml.base64 +2 -0
- data/test/responses/invalids/multiple_signed.xml.base64 +1 -0
- data/test/responses/invalids/no_id.xml.base64 +1 -0
- data/test/responses/invalids/no_saml2.xml.base64 +1 -0
- data/test/responses/invalids/no_signature.xml.base64 +1 -0
- data/test/responses/invalids/no_status.xml.base64 +1 -0
- data/test/responses/invalids/no_status_code.xml.base64 +1 -0
- data/test/responses/invalids/no_subjectconfirmation_data.xml.base64 +1 -0
- data/test/responses/invalids/no_subjectconfirmation_method.xml.base64 +1 -0
- data/test/responses/invalids/response_encrypted_attrs.xml.base64 +1 -0
- data/test/responses/invalids/response_invalid_signed_element.xml.base64 +1 -0
- data/test/responses/invalids/status_code_responder.xml.base64 +1 -0
- data/test/responses/invalids/status_code_responer_and_msg.xml.base64 +1 -0
- data/test/responses/no_signature_ns.xml +48 -0
- data/test/responses/open_saml_response.xml +56 -0
- data/test/responses/response_assertion_wrapped.xml.base64 +93 -0
- data/test/responses/response_encrypted_nameid.xml.base64 +1 -0
- data/test/responses/response_eval.xml +7 -0
- data/test/responses/response_no_cert_and_encrypted_attrs.xml +29 -0
- data/test/responses/response_unsigned_xml_base64 +1 -0
- data/test/responses/response_with_ampersands.xml +139 -0
- data/test/responses/response_with_ampersands.xml.base64 +93 -0
- data/test/responses/response_with_multiple_attribute_values.xml +67 -0
- data/test/responses/response_with_saml2_namespace.xml.base64 +102 -0
- data/test/responses/response_with_signed_assertion.xml.base64 +66 -0
- data/test/responses/response_with_signed_assertion_2.xml.base64 +1 -0
- data/test/responses/response_with_undefined_recipient.xml.base64 +1 -0
- data/test/responses/response_without_attributes.xml.base64 +79 -0
- data/test/responses/response_wrapped.xml.base64 +150 -0
- data/test/responses/signed_message_encrypted_signed_assertion.xml.base64 +1 -0
- data/test/responses/signed_message_encrypted_unsigned_assertion.xml.base64 +1 -0
- data/test/responses/simple_saml_php.xml +71 -0
- data/test/responses/starfield_response.xml.base64 +1 -0
- data/test/responses/test_sign.xml +43 -0
- data/test/responses/unsigned_message_aes128_encrypted_signed_assertion.xml.base64 +1 -0
- data/test/responses/unsigned_message_aes192_encrypted_signed_assertion.xml.base64 +1 -0
- data/test/responses/unsigned_message_aes256_encrypted_signed_assertion.xml.base64 +1 -0
- data/test/responses/unsigned_message_des192_encrypted_signed_assertion.xml.base64 +1 -0
- data/test/responses/unsigned_message_encrypted_assertion_without_saml_namespace.xml.base64 +1 -0
- data/test/responses/unsigned_message_encrypted_signed_assertion.xml.base64 +1 -0
- data/test/responses/unsigned_message_encrypted_unsigned_assertion.xml.base64 +1 -0
- data/test/responses/valid_response.xml.base64 +1 -0
- data/test/saml_message_test.rb +56 -0
- data/test/settings_test.rb +218 -0
- data/test/slo_logoutrequest_test.rb +275 -0
- data/test/slo_logoutresponse_test.rb +185 -0
- data/test/test_helper.rb +252 -0
- data/test/utils_test.rb +145 -0
- data/test/xml_security_test.rb +329 -0
- metadata +415 -0
@@ -0,0 +1 @@
|
|
1
|
+
<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="_e57a4bfc12c126e5d1e172690bb33ca5cf4e545a17" Version="2.0" IssueInstant="2015-03-19T14:01:08Z" Destination="http://rubysaml.com:3000/saml/acs" InResponseTo="_50f13de0-b06e-0132-5c3c-0090f5dedd77"><saml:Issuer>https://idp.example.com/simplesaml/saml2/idp/metadata.php</saml:Issuer><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:EncryptedAssertion><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" xmlns:dsig="http://www.w3.org/2000/09/xmldsig#" Type="http://www.w3.org/2001/04/xmlenc#Element"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes128-cbc"/><dsig:KeyInfo xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><xenc:EncryptedKey><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p"/><xenc:CipherData><xenc:CipherValue>WBz6KwlKYG0Jqs8pl/+ZjyTBOYFhYlF7CvWjawHLDj1E4WBKVw5Bc5qTw1P/fyRIMCAsinP9L+le4eGvQLAqm2Wz9APvYhRy2V6lRKSN3cmURoPDkNHZyoIXZd8NVtz/6HI9jFoiaXFdD48bQ5a6AYWiKiGNdGiONyXomsGOS3s=</xenc:CipherValue></xenc:CipherData></xenc:EncryptedKey></dsig:KeyInfo>
   <xenc:CipherData>
      <xenc:CipherValue>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</xenc:CipherValue>
   </xenc:CipherData>
</xenc:EncryptedData></saml:EncryptedAssertion></samlp:Response>
|
@@ -0,0 +1 @@
|
|
1
|
+
<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="_9365faa3a6f6a23b5cd75a74cb0786dc19e845200e" Version="2.0" IssueInstant="2015-03-19T14:00:31Z" Destination="http://rubysaml.com:3000/saml/acs" InResponseTo="_3ab7adb0-b06e-0132-5c3b-0090f5dedd77"><saml:Issuer>https://idp.example.com/simplesaml/saml2/idp/metadata.php</saml:Issuer><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:EncryptedAssertion><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" xmlns:dsig="http://www.w3.org/2000/09/xmldsig#" Type="http://www.w3.org/2001/04/xmlenc#Element"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes128-cbc"/><dsig:KeyInfo xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><xenc:EncryptedKey><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p"/><xenc:CipherData><xenc:CipherValue>xkJn7LQHrTZzLdrNec33hMSC5dc8B0uM4fw8HKhwpkWINwC9deaj0QVz4fZ82Zv2QdP3v6r0wJ/8VrUIF8puJTHSU0u2EUU+XqBJxvivGp2UhUPCyWmirSi6efBnWqMKhOz5YJoaLEu17yw+kOnavLZPv2bB8b5bo2mZPiaPG6s=</xenc:CipherValue></xenc:CipherData></xenc:EncryptedKey></dsig:KeyInfo>
   <xenc:CipherData>
      <xenc:CipherValue>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</xenc:CipherValue>
   </xenc:CipherData>
</xenc:EncryptedData></saml:EncryptedAssertion></samlp:Response>
|
@@ -0,0 +1 @@
|
|
1
|
+
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
|
@@ -0,0 +1,56 @@
|
|
1
|
+
require File.expand_path(File.join(File.dirname(__FILE__), "test_helper"))
|
2
|
+
|
3
|
+
class RubySamlTest < Minitest::Test
|
4
|
+
|
5
|
+
describe "SamlMessage" do
|
6
|
+
|
7
|
+
let(:settings) { OneLogin::RubySaml::Settings.new }
|
8
|
+
let(:saml_message) { OneLogin::RubySaml::SamlMessage.new }
|
9
|
+
let(:response_document) { read_response("response_unsigned_xml_base64") }
|
10
|
+
let(:response_document_xml) { read_response("adfs_response_xmlns.xml") }
|
11
|
+
|
12
|
+
it "return decoded raw saml" do
|
13
|
+
decoded_raw = saml_message.send(:decode_raw_saml, logout_request_deflated_base64)
|
14
|
+
assert logout_request_document, decoded_raw
|
15
|
+
end
|
16
|
+
|
17
|
+
it "return encoded raw saml" do
|
18
|
+
settings.compress_request = true
|
19
|
+
encoded_raw = saml_message.send(:encode_raw_saml, logout_request_document, settings)
|
20
|
+
assert logout_request_deflated_base64, encoded_raw
|
21
|
+
|
22
|
+
settings.compress_request = false
|
23
|
+
deflated = saml_message.send(:deflate, logout_request_deflated_base64)
|
24
|
+
encoded_raw = saml_message.send(:encode_raw_saml, deflated, settings)
|
25
|
+
assert logout_request_deflated_base64, encoded_raw
|
26
|
+
end
|
27
|
+
|
28
|
+
it "return decoded string" do
|
29
|
+
decoded = saml_message.send(:decode, response_document)
|
30
|
+
assert response_document_xml, decoded
|
31
|
+
|
32
|
+
decoded = saml_message.send(:decode, logout_request_base64)
|
33
|
+
assert logout_request_document, decoded
|
34
|
+
end
|
35
|
+
|
36
|
+
it "return encoded string" do
|
37
|
+
encoded = saml_message.send(:encode, response_document_xml)
|
38
|
+
assert response_document, encoded
|
39
|
+
|
40
|
+
encoded = saml_message.send(:encode, logout_request_document)
|
41
|
+
assert logout_request_base64, encoded
|
42
|
+
end
|
43
|
+
|
44
|
+
it "return deflated string" do
|
45
|
+
deflated = saml_message.send(:deflate, logout_request_document)
|
46
|
+
encoded_deflated = saml_message.send(:encode, deflated)
|
47
|
+
assert logout_request_deflated_base64, encoded_deflated
|
48
|
+
end
|
49
|
+
|
50
|
+
it "return inflated string" do
|
51
|
+
decoded = saml_message.send(:decode, logout_request_deflated_base64)
|
52
|
+
decoded_inflated = saml_message.send(:inflate, decoded)
|
53
|
+
assert response_document_xml, decoded_inflated
|
54
|
+
end
|
55
|
+
end
|
56
|
+
end
|
@@ -0,0 +1,218 @@
|
|
1
|
+
require File.expand_path(File.join(File.dirname(__FILE__), "test_helper"))
|
2
|
+
|
3
|
+
require 'onelogin/ruby-saml/settings'
|
4
|
+
|
5
|
+
class SettingsTest < Minitest::Test
|
6
|
+
|
7
|
+
describe "Settings" do
|
8
|
+
before do
|
9
|
+
@settings = OneLogin::RubySaml::Settings.new
|
10
|
+
end
|
11
|
+
|
12
|
+
it "should provide getters and settings" do
|
13
|
+
accessors = [
|
14
|
+
:idp_entity_id, :idp_sso_target_url, :idp_slo_target_url, :idp_cert, :idp_cert_fingerprint,
|
15
|
+
:issuer, :assertion_consumer_service_url, :assertion_consumer_service_binding,
|
16
|
+
:single_logout_service_url, :single_logout_service_binding,
|
17
|
+
:sp_name_qualifier, :name_identifier_format, :name_identifier_value,
|
18
|
+
:sessionindex, :attributes_index, :passive, :force_authn,
|
19
|
+
:compress_request, :double_quote_xml_attribute_values, :protocol_binding,
|
20
|
+
:security, :certificate, :private_key,
|
21
|
+
:authn_context, :authn_context_comparison, :authn_context_decl_ref,
|
22
|
+
:assertion_consumer_logout_service_url,
|
23
|
+
:assertion_consumer_logout_service_binding
|
24
|
+
]
|
25
|
+
|
26
|
+
accessors.each do |accessor|
|
27
|
+
value = Kernel.rand
|
28
|
+
@settings.send("#{accessor}=".to_sym, value)
|
29
|
+
assert_equal value, @settings.send(accessor)
|
30
|
+
end
|
31
|
+
|
32
|
+
end
|
33
|
+
|
34
|
+
it "create settings from hash" do
|
35
|
+
config = {
|
36
|
+
:assertion_consumer_service_url => "http://app.muda.no/sso",
|
37
|
+
:issuer => "http://muda.no",
|
38
|
+
:sp_name_qualifier => "http://sso.muda.no",
|
39
|
+
:idp_sso_target_url => "http://sso.muda.no/sso",
|
40
|
+
:idp_slo_target_url => "http://sso.muda.no/slo",
|
41
|
+
:idp_cert_fingerprint => "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00",
|
42
|
+
:name_identifier_format => "urn:oasis:names:tc:SAML:2.0:nameid-format:transient",
|
43
|
+
:attributes_index => 30,
|
44
|
+
:passive => true,
|
45
|
+
:protocol_binding => 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST'
|
46
|
+
}
|
47
|
+
@settings = OneLogin::RubySaml::Settings.new(config)
|
48
|
+
|
49
|
+
config.each do |k,v|
|
50
|
+
assert_equal v, @settings.send(k)
|
51
|
+
end
|
52
|
+
end
|
53
|
+
|
54
|
+
it "configure attribute service attributes correctly" do
|
55
|
+
@settings = OneLogin::RubySaml::Settings.new
|
56
|
+
@settings.attribute_consuming_service.configure do
|
57
|
+
service_name "Test Service"
|
58
|
+
add_attribute :name => "Name", :name_format => "Name Format", :friendly_name => "Friendly Name"
|
59
|
+
end
|
60
|
+
|
61
|
+
assert_equal @settings.attribute_consuming_service.configured?, true
|
62
|
+
assert_equal @settings.attribute_consuming_service.name, "Test Service"
|
63
|
+
assert_equal @settings.attribute_consuming_service.attributes, [{:name => "Name", :name_format => "Name Format", :friendly_name => "Friendly Name" }]
|
64
|
+
end
|
65
|
+
|
66
|
+
it "does not modify default security settings" do
|
67
|
+
settings = OneLogin::RubySaml::Settings.new
|
68
|
+
settings.security[:authn_requests_signed] = true
|
69
|
+
settings.security[:embed_sign] = true
|
70
|
+
settings.security[:digest_method] = XMLSecurity::Document::SHA256
|
71
|
+
settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA256
|
72
|
+
|
73
|
+
new_settings = OneLogin::RubySaml::Settings.new
|
74
|
+
assert_equal new_settings.security[:authn_requests_signed], false
|
75
|
+
assert_equal new_settings.security[:embed_sign], false
|
76
|
+
assert_equal new_settings.security[:digest_method], XMLSecurity::Document::SHA1
|
77
|
+
assert_equal new_settings.security[:signature_method], XMLSecurity::Document::RSA_SHA1
|
78
|
+
end
|
79
|
+
|
80
|
+
describe "#single_logout_service_url" do
|
81
|
+
it "when single_logout_service_url is nil but assertion_consumer_logout_service_url returns its value" do
|
82
|
+
settings.single_logout_service_url = nil
|
83
|
+
settings.assertion_consumer_logout_service_url = "http://app.muda.no/sls"
|
84
|
+
|
85
|
+
assert_equal "http://app.muda.no/sls", settings.single_logout_service_url
|
86
|
+
end
|
87
|
+
end
|
88
|
+
|
89
|
+
describe "#single_logout_service_binding" do
|
90
|
+
it "when single_logout_service_binding is nil but assertion_consumer_logout_service_binding returns its value" do
|
91
|
+
settings.single_logout_service_binding = nil
|
92
|
+
settings.assertion_consumer_logout_service_binding = "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect"
|
93
|
+
|
94
|
+
assert_equal "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect", settings.single_logout_service_binding
|
95
|
+
end
|
96
|
+
end
|
97
|
+
|
98
|
+
describe "#get_idp_cert" do
|
99
|
+
it "returns nil when the cert is an empty string" do
|
100
|
+
@settings = OneLogin::RubySaml::Settings.new
|
101
|
+
@settings.idp_cert = ""
|
102
|
+
assert_equal nil, @settings.get_idp_cert
|
103
|
+
end
|
104
|
+
|
105
|
+
it "returns nil when the cert is nil" do
|
106
|
+
@settings = OneLogin::RubySaml::Settings.new
|
107
|
+
@settings.idp_cert = nil
|
108
|
+
assert_equal nil, @settings.get_idp_cert
|
109
|
+
end
|
110
|
+
|
111
|
+
it "returns the certificate when it is valid" do
|
112
|
+
@settings = OneLogin::RubySaml::Settings.new
|
113
|
+
@settings.idp_cert = ruby_saml_cert_text
|
114
|
+
assert @settings.get_idp_cert.kind_of? OpenSSL::X509::Certificate
|
115
|
+
end
|
116
|
+
|
117
|
+
it "raises when the certificate is not valid" do
|
118
|
+
# formatted but invalid cert
|
119
|
+
@settings.idp_cert = read_certificate("formatted_certificate")
|
120
|
+
assert_raises(OpenSSL::X509::CertificateError) {
|
121
|
+
@settings.get_idp_cert
|
122
|
+
}
|
123
|
+
end
|
124
|
+
end
|
125
|
+
|
126
|
+
describe "#get_sp_cert" do
|
127
|
+
it "returns nil when the cert is an empty string" do
|
128
|
+
@settings = OneLogin::RubySaml::Settings.new
|
129
|
+
@settings.certificate = ""
|
130
|
+
assert_equal nil, @settings.get_sp_cert
|
131
|
+
end
|
132
|
+
|
133
|
+
it "returns nil when the cert is nil" do
|
134
|
+
@settings = OneLogin::RubySaml::Settings.new
|
135
|
+
@settings.certificate = nil
|
136
|
+
assert_equal nil, @settings.get_sp_cert
|
137
|
+
end
|
138
|
+
|
139
|
+
it "returns the certificate when it is valid" do
|
140
|
+
@settings = OneLogin::RubySaml::Settings.new
|
141
|
+
@settings.certificate = ruby_saml_cert_text
|
142
|
+
assert @settings.get_sp_cert.kind_of? OpenSSL::X509::Certificate
|
143
|
+
end
|
144
|
+
|
145
|
+
it "raises when the certificate is not valid" do
|
146
|
+
# formatted but invalid cert
|
147
|
+
@settings.certificate = read_certificate("formatted_certificate")
|
148
|
+
assert_raises(OpenSSL::X509::CertificateError) {
|
149
|
+
@settings.get_sp_cert
|
150
|
+
}
|
151
|
+
end
|
152
|
+
|
153
|
+
end
|
154
|
+
|
155
|
+
describe "#get_sp_key" do
|
156
|
+
it "returns nil when the private key is an empty string" do
|
157
|
+
@settings = OneLogin::RubySaml::Settings.new
|
158
|
+
@settings.private_key = ""
|
159
|
+
assert_equal nil, @settings.get_sp_key
|
160
|
+
end
|
161
|
+
|
162
|
+
it "returns nil when the private key is nil" do
|
163
|
+
@settings = OneLogin::RubySaml::Settings.new
|
164
|
+
@settings.private_key = nil
|
165
|
+
assert_equal nil, @settings.get_sp_key
|
166
|
+
end
|
167
|
+
|
168
|
+
it "returns the private key when it is valid" do
|
169
|
+
@settings = OneLogin::RubySaml::Settings.new
|
170
|
+
@settings.private_key = ruby_saml_key_text
|
171
|
+
assert @settings.get_sp_key.kind_of? OpenSSL::PKey::RSA
|
172
|
+
end
|
173
|
+
|
174
|
+
it "raises when the private key is not valid" do
|
175
|
+
# formatted but invalid rsa private key
|
176
|
+
@settings.private_key = read_certificate("formatted_rsa_private_key")
|
177
|
+
assert_raises(OpenSSL::PKey::RSAError) {
|
178
|
+
@settings.get_sp_key
|
179
|
+
}
|
180
|
+
end
|
181
|
+
|
182
|
+
end
|
183
|
+
|
184
|
+
describe "#get_fingerprint" do
|
185
|
+
it "get the fingerprint value when cert and fingerprint in settings are nil" do
|
186
|
+
@settings = OneLogin::RubySaml::Settings.new
|
187
|
+
@settings.idp_cert_fingerprint = nil
|
188
|
+
@settings.idp_cert = nil
|
189
|
+
fingerprint = @settings.get_fingerprint
|
190
|
+
assert_nil fingerprint
|
191
|
+
end
|
192
|
+
|
193
|
+
it "get the fingerprint value when there is a cert at the settings" do
|
194
|
+
@settings = OneLogin::RubySaml::Settings.new
|
195
|
+
@settings.idp_cert_fingerprint = nil
|
196
|
+
@settings.idp_cert = ruby_saml_cert_text
|
197
|
+
fingerprint = @settings.get_fingerprint
|
198
|
+
assert fingerprint.downcase == ruby_saml_cert_fingerprint.downcase
|
199
|
+
end
|
200
|
+
|
201
|
+
it "get the fingerprint value when there is a fingerprint at the settings" do
|
202
|
+
@settings = OneLogin::RubySaml::Settings.new
|
203
|
+
@settings.idp_cert_fingerprint = ruby_saml_cert_fingerprint
|
204
|
+
@settings.idp_cert = nil
|
205
|
+
fingerprint = @settings.get_fingerprint
|
206
|
+
assert fingerprint.downcase == ruby_saml_cert_fingerprint.downcase
|
207
|
+
end
|
208
|
+
|
209
|
+
it "get the fingerprint value when there are cert and fingerprint at the settings" do
|
210
|
+
@settings = OneLogin::RubySaml::Settings.new
|
211
|
+
@settings.idp_cert_fingerprint = ruby_saml_cert_fingerprint
|
212
|
+
@settings.idp_cert = ruby_saml_cert_text
|
213
|
+
fingerprint = @settings.get_fingerprint
|
214
|
+
assert fingerprint.downcase == ruby_saml_cert_fingerprint.downcase
|
215
|
+
end
|
216
|
+
end
|
217
|
+
end
|
218
|
+
end
|
@@ -0,0 +1,275 @@
|
|
1
|
+
require File.expand_path(File.join(File.dirname(__FILE__), "test_helper"))
|
2
|
+
require 'logout_responses/logoutresponse_fixtures'
|
3
|
+
|
4
|
+
require 'onelogin/ruby-saml/slo_logoutrequest'
|
5
|
+
require 'timecop'
|
6
|
+
|
7
|
+
class RubySamlTest < Minitest::Test
|
8
|
+
|
9
|
+
describe "SloLogoutrequest" do
|
10
|
+
|
11
|
+
let(:settings) { OneLogin::RubySaml::Settings.new }
|
12
|
+
let(:logout_request) { OneLogin::RubySaml::SloLogoutrequest.new(logout_request_document) }
|
13
|
+
let(:invalid_logout_request) { OneLogin::RubySaml::SloLogoutrequest.new(invalid_logout_request_document) }
|
14
|
+
|
15
|
+
before do
|
16
|
+
settings.idp_entity_id = 'https://app.onelogin.com/saml/metadata/SOMEACCOUNT'
|
17
|
+
settings.soft = true
|
18
|
+
logout_request.settings = settings
|
19
|
+
invalid_logout_request.settings = settings
|
20
|
+
end
|
21
|
+
|
22
|
+
describe "initiator" do
|
23
|
+
it "raise an exception when logout request is initialized with nil" do
|
24
|
+
assert_raises(ArgumentError) { OneLogin::RubySaml::SloLogoutrequest.new(nil) }
|
25
|
+
end
|
26
|
+
end
|
27
|
+
|
28
|
+
describe "#is_valid?" do
|
29
|
+
it "return false when logout request is initialized with blank data" do
|
30
|
+
logout_request_blank = OneLogin::RubySaml::SloLogoutrequest.new('')
|
31
|
+
assert !logout_request_blank.is_valid?
|
32
|
+
assert_includes logout_request_blank.errors, 'Blank logout request'
|
33
|
+
end
|
34
|
+
|
35
|
+
it "return true when the logout request is initialized with valid data" do
|
36
|
+
assert logout_request.is_valid?
|
37
|
+
assert_empty logout_request.errors
|
38
|
+
assert_equal 'someone@example.org', logout_request.nameid
|
39
|
+
end
|
40
|
+
|
41
|
+
it "should be idempotent when the logout request is initialized with invalid data" do
|
42
|
+
assert !invalid_logout_request.is_valid?
|
43
|
+
assert_equal ['Invalid SAML Logout Request. Not match the saml-schema-protocol-2.0.xsd'], invalid_logout_request.errors
|
44
|
+
assert !invalid_logout_request.is_valid?
|
45
|
+
assert_equal ['Invalid SAML Logout Request. Not match the saml-schema-protocol-2.0.xsd'], invalid_logout_request.errors
|
46
|
+
end
|
47
|
+
|
48
|
+
it "should be idempotent when the logout request is initialized with valid data" do
|
49
|
+
assert logout_request.is_valid?
|
50
|
+
assert_empty logout_request.errors
|
51
|
+
assert logout_request.is_valid?
|
52
|
+
assert_empty logout_request.errors
|
53
|
+
end
|
54
|
+
|
55
|
+
it "raise error for invalid xml" do
|
56
|
+
invalid_logout_request.soft = false
|
57
|
+
assert_raises(OneLogin::RubySaml::ValidationError) { invalid_logout_request.is_valid? }
|
58
|
+
end
|
59
|
+
end
|
60
|
+
|
61
|
+
describe "#nameid" do
|
62
|
+
it "extract the value of the name id element" do
|
63
|
+
assert_equal "someone@example.org", logout_request.nameid
|
64
|
+
end
|
65
|
+
end
|
66
|
+
|
67
|
+
describe "#issuer" do
|
68
|
+
it "return the issuer inside the logout request" do
|
69
|
+
assert_equal "https://app.onelogin.com/saml/metadata/SOMEACCOUNT", logout_request.issuer
|
70
|
+
end
|
71
|
+
end
|
72
|
+
|
73
|
+
describe "#id" do
|
74
|
+
it "extract the value of the ID attribute" do
|
75
|
+
assert_equal "_c0348950-935b-0131-1060-782bcb56fcaa", logout_request.id
|
76
|
+
end
|
77
|
+
end
|
78
|
+
|
79
|
+
describe "#not_on_or_after" do
|
80
|
+
it "extract the value of the NotOnOrAfter attribute" do
|
81
|
+
time_value = '2014-07-17T01:01:48Z'
|
82
|
+
assert_equal nil, logout_request.not_on_or_after
|
83
|
+
logout_request.document.root.attributes['NotOnOrAfter'] = time_value
|
84
|
+
assert_equal Time.parse(time_value), logout_request.not_on_or_after
|
85
|
+
end
|
86
|
+
end
|
87
|
+
|
88
|
+
describe '#session_indexes' do
|
89
|
+
it "return empty array when no SessionIndex" do
|
90
|
+
assert_equal [], logout_request.session_indexes
|
91
|
+
end
|
92
|
+
|
93
|
+
it "return an Array with one SessionIndex" do
|
94
|
+
logout_request_with_session_index = OneLogin::RubySaml::SloLogoutrequest.new(logout_request_xml_with_session_index)
|
95
|
+
assert_equal ['_ea853497-c58a-408a-bc23-c849752d9741'], logout_request_with_session_index.session_indexes
|
96
|
+
end
|
97
|
+
end
|
98
|
+
|
99
|
+
describe "#validate_id" do
|
100
|
+
it "return true when there is a valid ID in the logout request" do
|
101
|
+
assert logout_request.send(:validate_id)
|
102
|
+
assert_empty logout_request.errors
|
103
|
+
end
|
104
|
+
|
105
|
+
it "return false when there is an invalid ID in the logout request" do
|
106
|
+
logout_request_blank = OneLogin::RubySaml::SloLogoutrequest.new('')
|
107
|
+
assert !logout_request_blank.send(:validate_id)
|
108
|
+
assert_includes logout_request_blank.errors, "Missing ID attribute on Logout Request"
|
109
|
+
end
|
110
|
+
end
|
111
|
+
|
112
|
+
describe "#validate_version" do
|
113
|
+
it "return true when the logout request is SAML 2.0 Version" do
|
114
|
+
assert logout_request.send(:validate_version)
|
115
|
+
end
|
116
|
+
|
117
|
+
it "return false when the logout request is not SAML 2.0 Version" do
|
118
|
+
logout_request_blank = OneLogin::RubySaml::SloLogoutrequest.new('')
|
119
|
+
assert !logout_request_blank.send(:validate_version)
|
120
|
+
assert_includes logout_request_blank.errors, "Unsupported SAML version"
|
121
|
+
end
|
122
|
+
end
|
123
|
+
|
124
|
+
describe "#validate_not_on_or_after" do
|
125
|
+
it "return true when the logout request has a valid NotOnOrAfter or does not contain any" do
|
126
|
+
assert logout_request.send(:validate_not_on_or_after)
|
127
|
+
assert_empty logout_request.errors
|
128
|
+
Timecop.freeze Time.parse('2011-06-14T18:25:01.516Z') do
|
129
|
+
time_value = '2014-07-17T01:01:48Z'
|
130
|
+
logout_request.document.root.attributes['NotOnOrAfter'] = time_value
|
131
|
+
assert logout_request.send(:validate_not_on_or_after)
|
132
|
+
assert_empty logout_request.errors
|
133
|
+
end
|
134
|
+
end
|
135
|
+
|
136
|
+
it "return false when the logout request has an invalid NotOnOrAfter" do
|
137
|
+
logout_request.document.root.attributes['NotOnOrAfter'] = '2014-07-17T01:01:48Z'
|
138
|
+
assert !logout_request.send(:validate_not_on_or_after)
|
139
|
+
assert /Current time is on or after NotOnOrAfter/.match(logout_request.errors[0])
|
140
|
+
end
|
141
|
+
|
142
|
+
it "raise when the logout request has an invalid NotOnOrAfter" do
|
143
|
+
logout_request.document.root.attributes['NotOnOrAfter'] = '2014-07-17T01:01:48Z'
|
144
|
+
logout_request.soft = false
|
145
|
+
assert_raises(OneLogin::RubySaml::ValidationError, "Current time is on or after NotOnOrAfter") do
|
146
|
+
logout_request.send(:validate_not_on_or_after)
|
147
|
+
end
|
148
|
+
end
|
149
|
+
end
|
150
|
+
|
151
|
+
describe "#validate_request_state" do
|
152
|
+
it "return true when valid logout request xml" do
|
153
|
+
assert logout_request.send(:validate_request_state)
|
154
|
+
assert_empty logout_request.errors
|
155
|
+
assert logout_request.send(:validate_request_state)
|
156
|
+
assert_empty logout_request.errors
|
157
|
+
end
|
158
|
+
|
159
|
+
it "return false when invalid logout request xml" do
|
160
|
+
logout_request_blank = OneLogin::RubySaml::SloLogoutrequest.new('')
|
161
|
+
logout_request_blank.soft = true
|
162
|
+
assert !logout_request_blank.send(:validate_request_state)
|
163
|
+
assert_includes logout_request_blank.errors, "Blank logout request"
|
164
|
+
end
|
165
|
+
|
166
|
+
it "raise error for invalid xml" do
|
167
|
+
logout_request_blank = OneLogin::RubySaml::SloLogoutrequest.new('')
|
168
|
+
logout_request_blank.soft = false
|
169
|
+
assert_raises(OneLogin::RubySaml::ValidationError, "Blank logout request") do
|
170
|
+
logout_request_blank.send(:validate_request_state)
|
171
|
+
end
|
172
|
+
end
|
173
|
+
end
|
174
|
+
|
175
|
+
describe "#validate_structure" do
|
176
|
+
it "return true when encountering a valid Logout Request xml" do
|
177
|
+
assert logout_request.send(:validate_structure)
|
178
|
+
assert_empty logout_request.errors
|
179
|
+
end
|
180
|
+
|
181
|
+
it "return false when encountering a Logout Request bad formatted" do
|
182
|
+
assert !invalid_logout_request.send(:validate_structure)
|
183
|
+
assert_includes invalid_logout_request.errors, "Invalid SAML Logout Request. Not match the saml-schema-protocol-2.0.xsd"
|
184
|
+
end
|
185
|
+
|
186
|
+
it "raise when encountering a Logout Request bad formatted" do
|
187
|
+
invalid_logout_request.soft = false
|
188
|
+
assert_raises(OneLogin::RubySaml::ValidationError, "Element '{urn:oasis:names:tc:SAML:2.0:assertion}Issuer': This element is not expected") do
|
189
|
+
invalid_logout_request.send(:validate_structure)
|
190
|
+
end
|
191
|
+
end
|
192
|
+
end
|
193
|
+
|
194
|
+
describe "#validate_issuer" do
|
195
|
+
it "return true when the issuer of the Logout Request matchs the IdP entityId" do
|
196
|
+
logout_request.settings.idp_entity_id = 'https://app.onelogin.com/saml/metadata/SOMEACCOUNT'
|
197
|
+
assert logout_request.send(:validate_issuer)
|
198
|
+
end
|
199
|
+
it "return false when the issuer of the Logout Request does not match the IdP entityId" do
|
200
|
+
logout_request.settings.idp_entity_id = 'http://idp.example.com/invalid'
|
201
|
+
assert !logout_request.send(:validate_issuer)
|
202
|
+
assert_includes logout_request.errors, "Doesn't match the issuer, expected: <#{logout_request.settings.idp_entity_id}>, but was: <https://app.onelogin.com/saml/metadata/SOMEACCOUNT>"
|
203
|
+
end
|
204
|
+
it "raise when the issuer of the Logout Request does not match the IdP entityId" do
|
205
|
+
logout_request.settings.idp_entity_id = 'http://idp.example.com/invalid'
|
206
|
+
logout_request.soft = false
|
207
|
+
assert_raises(OneLogin::RubySaml::ValidationError, "Doesn't match the issuer, expected: <#{logout_request.settings.idp_entity_id}>, but was: <https://app.onelogin.com/saml/metadata/SOMEACCOUNT>") do
|
208
|
+
logout_request.send(:validate_issuer)
|
209
|
+
end
|
210
|
+
end
|
211
|
+
end
|
212
|
+
|
213
|
+
describe "#validate_signature" do
|
214
|
+
before do
|
215
|
+
settings.idp_slo_target_url = "http://example.com?field=value"
|
216
|
+
settings.security[:logout_requests_signed] = true
|
217
|
+
settings.security[:embed_sign] = false
|
218
|
+
settings.certificate = ruby_saml_cert_text
|
219
|
+
settings.private_key = ruby_saml_key_text
|
220
|
+
settings.idp_cert = ruby_saml_cert_text
|
221
|
+
end
|
222
|
+
|
223
|
+
it "return true when valid RSA_SHA1 Signature" do
|
224
|
+
settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA1
|
225
|
+
params = OneLogin::RubySaml::Logoutrequest.new.create_params(settings, :RelayState => 'http://example.com')
|
226
|
+
params['RelayState'] = params[:RelayState]
|
227
|
+
options = {}
|
228
|
+
options[:get_params] = params
|
229
|
+
logout_request_sign_test = OneLogin::RubySaml::SloLogoutrequest.new(params['SAMLRequest'], options)
|
230
|
+
logout_request_sign_test.settings = settings
|
231
|
+
assert logout_request_sign_test.send(:validate_signature)
|
232
|
+
end
|
233
|
+
|
234
|
+
it "return true when valid RSA_SHA256 Signature" do
|
235
|
+
settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA256
|
236
|
+
params = OneLogin::RubySaml::Logoutrequest.new.create_params(settings, :RelayState => 'http://example.com')
|
237
|
+
options = {}
|
238
|
+
options[:get_params] = params
|
239
|
+
logout_request_sign_test = OneLogin::RubySaml::SloLogoutrequest.new(params['SAMLRequest'], options)
|
240
|
+
params['RelayState'] = params[:RelayState]
|
241
|
+
logout_request_sign_test.settings = settings
|
242
|
+
assert logout_request_sign_test.send(:validate_signature)
|
243
|
+
end
|
244
|
+
|
245
|
+
it "return false when invalid RSA_SHA1 Signature" do
|
246
|
+
settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA1
|
247
|
+
params = OneLogin::RubySaml::Logoutrequest.new.create_params(settings, :RelayState => 'http://example.com')
|
248
|
+
params['RelayState'] = 'http://invalid.exampcle.com'
|
249
|
+
params[:RelayState] = params['RelayState']
|
250
|
+
options = {}
|
251
|
+
options[:get_params] = params
|
252
|
+
|
253
|
+
logout_request_sign_test = OneLogin::RubySaml::SloLogoutrequest.new(params['SAMLRequest'], options)
|
254
|
+
logout_request_sign_test.settings = settings
|
255
|
+
assert !logout_request_sign_test.send(:validate_signature)
|
256
|
+
end
|
257
|
+
|
258
|
+
it "raise when invalid RSA_SHA1 Signature" do
|
259
|
+
settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA1
|
260
|
+
settings.soft = false
|
261
|
+
params = OneLogin::RubySaml::Logoutrequest.new.create_params(settings, :RelayState => 'http://example.com')
|
262
|
+
params['RelayState'] = 'http://invalid.exampcle.com'
|
263
|
+
params[:RelayState] = params['RelayState']
|
264
|
+
options = {}
|
265
|
+
options[:get_params] = params
|
266
|
+
options[:settings] = settings
|
267
|
+
|
268
|
+
logout_request_sign_test = OneLogin::RubySaml::SloLogoutrequest.new(params['SAMLRequest'], options)
|
269
|
+
assert_raises(OneLogin::RubySaml::ValidationError, "Invalid Signature on Logout Request") do
|
270
|
+
logout_request_sign_test.send(:validate_signature)
|
271
|
+
end
|
272
|
+
end
|
273
|
+
end
|
274
|
+
end
|
275
|
+
end
|