kl-ruby-saml 0.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (137) hide show
  1. checksums.yaml +7 -0
  2. data/.document +5 -0
  3. data/.gitignore +14 -0
  4. data/.travis.yml +17 -0
  5. data/Gemfile +9 -0
  6. data/LICENSE +19 -0
  7. data/README.md +575 -0
  8. data/Rakefile +41 -0
  9. data/changelog.md +75 -0
  10. data/gemfiles/nokogiri-1.5.gemfile +5 -0
  11. data/lib/onelogin/ruby-saml.rb +17 -0
  12. data/lib/onelogin/ruby-saml/attribute_service.rb +57 -0
  13. data/lib/onelogin/ruby-saml/attributes.rb +128 -0
  14. data/lib/onelogin/ruby-saml/authrequest.rb +156 -0
  15. data/lib/onelogin/ruby-saml/http_error.rb +7 -0
  16. data/lib/onelogin/ruby-saml/idp_metadata_parser.rb +161 -0
  17. data/lib/onelogin/ruby-saml/logging.rb +30 -0
  18. data/lib/onelogin/ruby-saml/logoutrequest.rb +131 -0
  19. data/lib/onelogin/ruby-saml/logoutresponse.rb +241 -0
  20. data/lib/onelogin/ruby-saml/metadata.rb +123 -0
  21. data/lib/onelogin/ruby-saml/response.rb +722 -0
  22. data/lib/onelogin/ruby-saml/saml_message.rb +158 -0
  23. data/lib/onelogin/ruby-saml/settings.rb +165 -0
  24. data/lib/onelogin/ruby-saml/slo_logoutrequest.rb +258 -0
  25. data/lib/onelogin/ruby-saml/slo_logoutresponse.rb +136 -0
  26. data/lib/onelogin/ruby-saml/utils.rb +172 -0
  27. data/lib/onelogin/ruby-saml/validation_error.rb +7 -0
  28. data/lib/onelogin/ruby-saml/version.rb +5 -0
  29. data/lib/ruby-saml.rb +1 -0
  30. data/lib/schemas/saml-schema-assertion-2.0.xsd +283 -0
  31. data/lib/schemas/saml-schema-authn-context-2.0.xsd +23 -0
  32. data/lib/schemas/saml-schema-authn-context-types-2.0.xsd +821 -0
  33. data/lib/schemas/saml-schema-metadata-2.0.xsd +337 -0
  34. data/lib/schemas/saml-schema-protocol-2.0.xsd +302 -0
  35. data/lib/schemas/sstc-metadata-attr.xsd +35 -0
  36. data/lib/schemas/sstc-saml-attribute-ext.xsd +25 -0
  37. data/lib/schemas/sstc-saml-metadata-algsupport-v1.0.xsd +41 -0
  38. data/lib/schemas/sstc-saml-metadata-ui-v1.0.xsd +89 -0
  39. data/lib/schemas/xenc-schema.xsd +136 -0
  40. data/lib/schemas/xml.xsd +287 -0
  41. data/lib/schemas/xmldsig-core-schema.xsd +309 -0
  42. data/lib/xml_security.rb +358 -0
  43. data/ruby-saml.gemspec +57 -0
  44. data/test/certificates/certificate1 +12 -0
  45. data/test/certificates/certificate_without_head_foot +1 -0
  46. data/test/certificates/formatted_certificate +14 -0
  47. data/test/certificates/formatted_private_key +12 -0
  48. data/test/certificates/formatted_rsa_private_key +12 -0
  49. data/test/certificates/invalid_certificate1 +1 -0
  50. data/test/certificates/invalid_certificate2 +1 -0
  51. data/test/certificates/invalid_certificate3 +12 -0
  52. data/test/certificates/invalid_private_key1 +1 -0
  53. data/test/certificates/invalid_private_key2 +1 -0
  54. data/test/certificates/invalid_private_key3 +10 -0
  55. data/test/certificates/invalid_rsa_private_key1 +1 -0
  56. data/test/certificates/invalid_rsa_private_key2 +1 -0
  57. data/test/certificates/invalid_rsa_private_key3 +10 -0
  58. data/test/certificates/ruby-saml.crt +14 -0
  59. data/test/certificates/ruby-saml.key +15 -0
  60. data/test/idp_metadata_parser_test.rb +95 -0
  61. data/test/logging_test.rb +62 -0
  62. data/test/logout_requests/invalid_slo_request.xml +6 -0
  63. data/test/logout_requests/slo_request.xml +4 -0
  64. data/test/logout_requests/slo_request.xml.base64 +1 -0
  65. data/test/logout_requests/slo_request_deflated.xml.base64 +1 -0
  66. data/test/logout_requests/slo_request_with_session_index.xml +5 -0
  67. data/test/logout_responses/logoutresponse_fixtures.rb +67 -0
  68. data/test/logoutrequest_test.rb +211 -0
  69. data/test/logoutresponse_test.rb +258 -0
  70. data/test/metadata_test.rb +203 -0
  71. data/test/request_test.rb +282 -0
  72. data/test/response_test.rb +1094 -0
  73. data/test/responses/adfs_response_sha1.xml +46 -0
  74. data/test/responses/adfs_response_sha256.xml +46 -0
  75. data/test/responses/adfs_response_sha384.xml +46 -0
  76. data/test/responses/adfs_response_sha512.xml +46 -0
  77. data/test/responses/adfs_response_xmlns.xml +45 -0
  78. data/test/responses/attackxee.xml +13 -0
  79. data/test/responses/idp_descriptor.xml +3 -0
  80. data/test/responses/invalids/invalid_audience.xml.base64 +1 -0
  81. data/test/responses/invalids/invalid_issuer_assertion.xml.base64 +1 -0
  82. data/test/responses/invalids/invalid_issuer_message.xml.base64 +1 -0
  83. data/test/responses/invalids/invalid_signature_position.xml.base64 +1 -0
  84. data/test/responses/invalids/invalid_subjectconfirmation_inresponse.xml.base64 +1 -0
  85. data/test/responses/invalids/invalid_subjectconfirmation_nb.xml.base64 +1 -0
  86. data/test/responses/invalids/invalid_subjectconfirmation_noa.xml.base64 +1 -0
  87. data/test/responses/invalids/invalid_subjectconfirmation_recipient.xml.base64 +1 -0
  88. data/test/responses/invalids/multiple_assertions.xml.base64 +2 -0
  89. data/test/responses/invalids/multiple_signed.xml.base64 +1 -0
  90. data/test/responses/invalids/no_id.xml.base64 +1 -0
  91. data/test/responses/invalids/no_saml2.xml.base64 +1 -0
  92. data/test/responses/invalids/no_signature.xml.base64 +1 -0
  93. data/test/responses/invalids/no_status.xml.base64 +1 -0
  94. data/test/responses/invalids/no_status_code.xml.base64 +1 -0
  95. data/test/responses/invalids/no_subjectconfirmation_data.xml.base64 +1 -0
  96. data/test/responses/invalids/no_subjectconfirmation_method.xml.base64 +1 -0
  97. data/test/responses/invalids/response_encrypted_attrs.xml.base64 +1 -0
  98. data/test/responses/invalids/response_invalid_signed_element.xml.base64 +1 -0
  99. data/test/responses/invalids/status_code_responder.xml.base64 +1 -0
  100. data/test/responses/invalids/status_code_responer_and_msg.xml.base64 +1 -0
  101. data/test/responses/no_signature_ns.xml +48 -0
  102. data/test/responses/open_saml_response.xml +56 -0
  103. data/test/responses/response_assertion_wrapped.xml.base64 +93 -0
  104. data/test/responses/response_encrypted_nameid.xml.base64 +1 -0
  105. data/test/responses/response_eval.xml +7 -0
  106. data/test/responses/response_no_cert_and_encrypted_attrs.xml +29 -0
  107. data/test/responses/response_unsigned_xml_base64 +1 -0
  108. data/test/responses/response_with_ampersands.xml +139 -0
  109. data/test/responses/response_with_ampersands.xml.base64 +93 -0
  110. data/test/responses/response_with_multiple_attribute_values.xml +67 -0
  111. data/test/responses/response_with_saml2_namespace.xml.base64 +102 -0
  112. data/test/responses/response_with_signed_assertion.xml.base64 +66 -0
  113. data/test/responses/response_with_signed_assertion_2.xml.base64 +1 -0
  114. data/test/responses/response_with_undefined_recipient.xml.base64 +1 -0
  115. data/test/responses/response_without_attributes.xml.base64 +79 -0
  116. data/test/responses/response_wrapped.xml.base64 +150 -0
  117. data/test/responses/signed_message_encrypted_signed_assertion.xml.base64 +1 -0
  118. data/test/responses/signed_message_encrypted_unsigned_assertion.xml.base64 +1 -0
  119. data/test/responses/simple_saml_php.xml +71 -0
  120. data/test/responses/starfield_response.xml.base64 +1 -0
  121. data/test/responses/test_sign.xml +43 -0
  122. data/test/responses/unsigned_message_aes128_encrypted_signed_assertion.xml.base64 +1 -0
  123. data/test/responses/unsigned_message_aes192_encrypted_signed_assertion.xml.base64 +1 -0
  124. data/test/responses/unsigned_message_aes256_encrypted_signed_assertion.xml.base64 +1 -0
  125. data/test/responses/unsigned_message_des192_encrypted_signed_assertion.xml.base64 +1 -0
  126. data/test/responses/unsigned_message_encrypted_assertion_without_saml_namespace.xml.base64 +1 -0
  127. data/test/responses/unsigned_message_encrypted_signed_assertion.xml.base64 +1 -0
  128. data/test/responses/unsigned_message_encrypted_unsigned_assertion.xml.base64 +1 -0
  129. data/test/responses/valid_response.xml.base64 +1 -0
  130. data/test/saml_message_test.rb +56 -0
  131. data/test/settings_test.rb +218 -0
  132. data/test/slo_logoutrequest_test.rb +275 -0
  133. data/test/slo_logoutresponse_test.rb +185 -0
  134. data/test/test_helper.rb +252 -0
  135. data/test/utils_test.rb +145 -0
  136. data/test/xml_security_test.rb +329 -0
  137. metadata +415 -0
@@ -0,0 +1 @@
1
+ <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="_e57a4bfc12c126e5d1e172690bb33ca5cf4e545a17" Version="2.0" IssueInstant="2015-03-19T14:01:08Z" Destination="http://rubysaml.com:3000/saml/acs" InResponseTo="_50f13de0-b06e-0132-5c3c-0090f5dedd77"><saml:Issuer>https://idp.example.com/simplesaml/saml2/idp/metadata.php</saml:Issuer><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:EncryptedAssertion><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" xmlns:dsig="http://www.w3.org/2000/09/xmldsig#" Type="http://www.w3.org/2001/04/xmlenc#Element"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes128-cbc"/><dsig:KeyInfo xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><xenc:EncryptedKey><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p"/><xenc:CipherData><xenc:CipherValue>WBz6KwlKYG0Jqs8pl/+ZjyTBOYFhYlF7CvWjawHLDj1E4WBKVw5Bc5qTw1P/fyRIMCAsinP9L+le4eGvQLAqm2Wz9APvYhRy2V6lRKSN3cmURoPDkNHZyoIXZd8NVtz/6HI9jFoiaXFdD48bQ5a6AYWiKiGNdGiONyXomsGOS3s=</xenc:CipherValue></xenc:CipherData></xenc:EncryptedKey></dsig:KeyInfo>
   <xenc:CipherData>
      <xenc:CipherValue>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</xenc:CipherValue>
   </xenc:CipherData>
</xenc:EncryptedData></saml:EncryptedAssertion></samlp:Response>
@@ -0,0 +1 @@
1
+ <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="_9365faa3a6f6a23b5cd75a74cb0786dc19e845200e" Version="2.0" IssueInstant="2015-03-19T14:00:31Z" Destination="http://rubysaml.com:3000/saml/acs" InResponseTo="_3ab7adb0-b06e-0132-5c3b-0090f5dedd77"><saml:Issuer>https://idp.example.com/simplesaml/saml2/idp/metadata.php</saml:Issuer><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:EncryptedAssertion><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" xmlns:dsig="http://www.w3.org/2000/09/xmldsig#" Type="http://www.w3.org/2001/04/xmlenc#Element"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes128-cbc"/><dsig:KeyInfo xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><xenc:EncryptedKey><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p"/><xenc:CipherData><xenc:CipherValue>xkJn7LQHrTZzLdrNec33hMSC5dc8B0uM4fw8HKhwpkWINwC9deaj0QVz4fZ82Zv2QdP3v6r0wJ/8VrUIF8puJTHSU0u2EUU+XqBJxvivGp2UhUPCyWmirSi6efBnWqMKhOz5YJoaLEu17yw+kOnavLZPv2bB8b5bo2mZPiaPG6s=</xenc:CipherValue></xenc:CipherData></xenc:EncryptedKey></dsig:KeyInfo>
   <xenc:CipherData>
      <xenc:CipherValue>ERiTkdJzJN841qIRwT79+laTQZWz83osoKohRBIaBHNLasGuBApR6iJqsSrQb2/6wWddDaNOqbnBEY+6Ze1mSzDjYomrWtVDD2psrzk1T29G56LuTQiOtTtOUlOPOVUkS9Tp1RgCXmi7No49lJJHxM8b53Y6hNjJQiSwrEdxhrv83MSuqYahuT5n2yB9jGg/ZnF6IP2YXLT7cd4kYRj/0g0mEBGAIHV3ZGRLVSKg0CMVPnQUCPLXqVCKoRbF2nt5R8Q6gGmKm/2zsyEfDw/vW076fVg6EoK+XVZ/M/gHKccA+iyeHKMN2k/yWeHn7FB32jY9oR8Ct6mW9JlgBbliM1SCDMnshuJXlKnyXuvOfJQd12NUrt9lWACwnKQzSZ3y/b5UthalAYTgHPVtL871hXnC9MTeTfAk+HqV7nfdPJTk/jVDIi0Wsbqlf+ppC1nvRab8ovWmfpUKFYhHhiQ6K6XQGo7xT/dKqV7+2wvhHtvYPt8iW76RkWtHVEjZaHjgCF/XGpMrj5CuX8KMQ3b67CIxb28V5MxnUXrJV1q5TnEF56bvlG4NNqQTYWMcu+bhcA5w1E/rJZxSKfpg7VdT4RMA3s0ZCXs9DR7RnjQP9szrytarMRwF+AI07Axt2/z71t551rNzCedNLdQFnFbFh9IgDSmYin7y1mxsa7IiLUZcJwtJTh33tKf0ObwMfj68vWgEJ0Aq8ZjnhVB7C7sRK4vh7NOgldS/CXZ2L5E5kYh2hVzqh0EGJrkOs3Rb3/nbZCwO4zdAYvv74qrPUkEUxG3/p9wjcg+bSFulcJCpk7i0+NnsocQ3OpDQGUFhtv6Q925h2LDAYQSkQgIvPnqbt+A6VRCng6g+mMwbbwP6o/agY2CyduED0QINAvZz85Cpts3uf4uxJEnaztDGT1RBPFwhMuJVt7Qe4nqurRftCh+T6KiVvwE6CqfuRFQm+SlWFyYq5u7GdRNFsuT3YKji3mF+UdqgNJa++R4bpOtZm1QQzv1qSS6UCtrJHbjBXhYDig3dEz1erkMWCwwjcicpeSrjBFc0lc1VzYfm1mOYWBHTE2RfDnEUztOzBUmiBVD3GXmS4xrUErIqz3RHe1erG8HwSZbfsXfOpfR5K8RsqL5A8l+vjSN6wfQGB1uIf07OPplzLL/UlZWcPQq+j0GGQAd/4Kbl5giWSSbwueaW95/dUJQGcOw7gIw9LIRasAWb6JQ0/TRgwU+a7Hoj+cFAdWxkeV63V9g4BvwOW3Zr00pSo2G9g+KUsAuFQxk9h9cDEqdEM2vPtfeSkjpXOZnGOrRNVUG23lgJHEQsTNb+VQb4ROFJBVjjdpE7jHMU9YaK8EfQokUBfr+8OtIdp9+LAUnfZ3JKGMKOROuQ2rtjb3NCZ8sy5u6usom0mbcxHiVqA+XbFYoNfer4JyqI+vanSC+dXnUEHnWxF9s6OqmSLUNCQ0TlKhXA/6SEBTC5Lb+Nust80tYHSgBm2S49aFD5sR2sI+8SCd3fftcyZESZCH7zH/t0c6gr7AEIPHaro0jmJPX/2Sxbof0TDmd1VCP1vEQIKo/jXgiPplIPMzk+ZTKLCn5TGjlBXQMLkEgXQuFcxf6kwnWgvV+4wfkV0dSweMF4RIq7oUBMuRcKLZzsI1xK1+Og1oros/oMgmkfAvR+LHn/q2vl73HgTMKyti5tBwWJBDGQ1uKP4UDzlO3L3SU72xT2SeAkavU6WJ0fz6XXRVIYnfkfzJ6nUpXYxEA7G+9X2zIBe6x9oyG1rOB8tNG3IyHJXfVujz5TaMVycP5hFqBy+EN2WF1Vu0qMUgi7ZY9u2xDnrI9XkYD+d0hXhC6Ow/EzMi+THV6w2MsOhy5E0FMQPbiipRSirzxs0bQkKLmgxkxaulaWPuCATc2lNZOb1Xp3y277TX5IkJQdbo1h772cUTf/tfW6lb/my34VbFEJEusMXSPxwXa2LkNoqDvIBPjsMYnogagriVWd+WDIjM/Sqh+RhRo0Owp/V4w8KhrCU0tFI/g1pn59i4mrhnMUyeZdYSPk0TFdNBMekMB5Kq3Cc9kHSpe4TCAkWkknZ9qKF0sH7kQnDzfvWsrLDHdv9ijX/Kz+J4wwopeSKcLbjOORpnNd0sAuF4FhwuOh9t9bHgxIVNpipcfiMUKzxI1IcLQjFC7aNuc/K+SdW4mw1L9rI8JihNH21vid4h9BZUaY18fedWvdtH+0W2TPsHgMKM5KbADS6ixcxaK9qBAELDaRrIwY209pDgDIj6TU/IrhB5SKGsrEoEnvvxDXIds7vZPfbn6Q5KphxcU66zLhI1AtGmYkO1uIRRrjX3A1zchhHpE2OmTFhCDLYMIuGPhY55I71Nnzn6ysF2HHnxRBWEIEV8aEFFA87UzqhdzNWI3sMcy7yVsyLxWpdSB+GpsCM9vU1+BRZh10KeNROSQryY3lUp/uYpWCsuTPMXuYvqS6RSebFgVu38bgGfaBvLILfb/YkcHWGP/5Yo/ndEgsTI2pDTqdpDArNaxoHJJ+uC1DhPKsQgc1OLtdcIR81eHn9JHdUKBRWcHU+8GBEcMmFjHrbr7V8eVPOEuTodO1gIjQuUC0OjRD5O7gadPNwMG5JV3Q878V8stkrQFPyFdgsCSjrPPgeXifmsZDeVzVw+bjoACqbTHcYGYOEYUkSfYe4G43YP/we0wr4ehJUo9nj4taP8IN8nnn8ZTvuai8LHVgRZ+uXZI7qJvOToj1s8qBl7KWZTHRuVCvACvZp7V6mzzBxKdQwB8A5/mnp3jnVhjFkDTzczBDaPqyhurN3pYVdGhV62TTrECf04u0uvJY/84v56xHsnDOw0PtKZ3KbRdaQT4rI3YfS7FlI4jk/uIcG5OijKxzeK8v9UCDn7tAoDATkSQvi9Tn9cJfUdLMYqKXN+3CLKOsJH974b+78ZhFplD6v++6PHzZaeelPkP/9a9vYUbDPX3Rx3bxVfcVgO3Mvm/1mB/D71q33zEUreS0qBQzLqWLSOmAca9uXAsTMrvUBjl2Ir5NXcLvpm5kUMu3B3SazJiDT212fPu03xT3PIYlGMXyc10KmFByXevKAcRTsS8ov7IHnctxo6As2/UsiQU0S2Sa2fx0w7T9+yLOPkUPtplCLHjqTq3ZDsmpRpDV3XYFMVgBLM6LqKjDep3uJB3Q1PX1pewH3HklWyV7WyIWsoD6hFAD3tRinrIOZ2GYvU+FfTfZuJ2Bl6UGpJV3vYa4MnVtQlpyNKsOoCfxAO4xi0cWotlmJpyOz7PlE+mKkYCKDl7i3g1nbtk2vC6l1Z7rJaPkYLBsjW4WuifOs9h/DyrmaeSk2BGcT1w8vgiG9zsHsREpcO7IHFmPtViNdwzRSd+0ufubp1g42v7//WgNU/swT+xeUk5Ew/dnnnVjWF7ihKG+LjA6ZG5WvCYqeyT1KffCJC2awSL8mgHTpaBHfO6DbA+Znh+5mNiHNdD4KdCqUNuaCW3OL3ftj/fgyXLm4JQl88s3ixPkHWDLQkkvNHJf4ZMD0Zgzw0GhZ9dEElcrGrTSq2KcX0wmAC2bO41FEfvIi4YGTMi44q1UH7sKiOam4bDrnWf9r+ecUhutCivqAY5g+9OPt3VLgdEHv9HyUk2PjYBAQJA+nOSHnBGxLJQXD0uXYoX3Rr8c4wHCyyC5pnRtWX6fLiaXrrtm6mi4BxzUG0FGBWNjvaCvbgOxFN7i8xsode8FElDUFYXp8MG3yFlyDp7FHEZsWwUX58E6Zj+HjBUETcYQXUjX3gBC2RxjZcz80ZsSaFEIhsphIAzREr/JcfRgpJH7b0FvbG/EIQBGMwSZ1LK7ZM0oXJY+W6BGShKtp8eOr6Ej8fxcxQoDxID1H/jgKwzltKq6v1fpYSbCjd+lEuz3OBRLa+bVr8rzSRezJ1XbQCvCDk/KeQS2au3FOoGIhaYTzDec8GvEx/xe1gQjuumCKsfDOAdTk2RNCw7zvsPGk+IMteMUNJya+bEK8j1zkb/Elxc6smwAScotZ2meKe/lhh0TwX8nVBHjTP/5gPFGl8fl36aJ1DqRij9O6iv2h9dckT1xbCWY/pW8gF7/TyOQoDje/JLZg97xhZ0PxoQyWHopXlNaKivfDXF5sV72lcOzazSP32mSelJuh4kES332dpjQLsiT2TGK7tsN3r77RM2iKpA3HE/XyhjyFqkwI4c6E7tCQmY9CPXeNWZyLWXdL/4Fgvs7elmQjhVvhx+9K5CLv5O/DYTeB31L9oF0zLV6N/K+vzCOFaFT6tI6B+icXUtccuKGcggIDF4N/z+AKCNK1m2TX0P0Y7ZPESdVzvSoYQqYbCRx+yGTACEHd6c72y3UlgecifscdJ983F+QDFjeZBRf8C4NhWxALyrwqAg1tKJPX8RXEpQfJDHoGNdIFFveZhku/4hYZF6B2GJ8l/fgItQDcwSnqctLNBlwVJ0P5cgbU3SCAYQF/+ldB0NJiJ8gzYOQCp2N8kJEEl4cc5gq28v5BtmUGhA7GilS4ZSHs6tJIuqego8ZWKir4KIKZg5QiiTfK/sME4u/ZadKJnJ5mhCTE+M7HG+Tyrmn6rkgsHHn6sTc4px23xxIH3PIM5YCQwK0DxopaflXDXUBwYYUr7mO8zv+NLzI3o/nkQzwX2+Wp3cb9qES/8N7q6h3653y8jgKYi+1Tv+ODLTFax9QkAGAKNsbeW9dOWCGovDSlcA+jizBmO+ag2Dy1AoZEI/ioy9rfmNWe7rNCvR/ulVNsyeC7VO0Y3o6g7JCttjc5+Beh4/HCTg/Cn6l1//Lhu1jVecSCZQOTv5wLQKqITF4/NtneGytWkUsroJwMu1PjCFBCp0I938tBk8mCpzf57i3C50I+vIEFNDNq3zmoSkcMae8U6Kvp1/e7p4wtwjwHAvy7PwewtYzndhT5CwqEq1uN/SrkDlXaCAMZGt9jHTzONviXjox7l0fr/l8HJ7y/GLno7wdE00a0LxzlxNGNdcKuqrDjndE3QmLUXrzTICSH7+2P5bqhoeSjj44HAu/QkDHpBqQl0k92DiKy4USbULnrAlRn8ix0u9uAZL+aMwrERyFtIoetNJMrWpkEHELg2V744qR3QY8QnjvL9jmG5J1rAXNCk2qbFI4SLYO+bLIAZaxIcXrP5GMf/ojYUZEnBiny2E+JWR9TFRjh+8yxXk9/PwJWI3RDJFdV6rY8rsKm1M2+01qNwjAYKkWTdyBeg3Jlvb84BoqOwPPoJHXKB0fJsY82R/FoVQK26aL6bA5xcAvfVszwSYs+4yTJA2roA==</xenc:CipherValue>
   </xenc:CipherData>
</xenc:EncryptedData></saml:EncryptedAssertion></samlp:Response>
@@ -0,0 +1 @@
1
+ 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
@@ -0,0 +1,56 @@
1
+ require File.expand_path(File.join(File.dirname(__FILE__), "test_helper"))
2
+
3
+ class RubySamlTest < Minitest::Test
4
+
5
+ describe "SamlMessage" do
6
+
7
+ let(:settings) { OneLogin::RubySaml::Settings.new }
8
+ let(:saml_message) { OneLogin::RubySaml::SamlMessage.new }
9
+ let(:response_document) { read_response("response_unsigned_xml_base64") }
10
+ let(:response_document_xml) { read_response("adfs_response_xmlns.xml") }
11
+
12
+ it "return decoded raw saml" do
13
+ decoded_raw = saml_message.send(:decode_raw_saml, logout_request_deflated_base64)
14
+ assert logout_request_document, decoded_raw
15
+ end
16
+
17
+ it "return encoded raw saml" do
18
+ settings.compress_request = true
19
+ encoded_raw = saml_message.send(:encode_raw_saml, logout_request_document, settings)
20
+ assert logout_request_deflated_base64, encoded_raw
21
+
22
+ settings.compress_request = false
23
+ deflated = saml_message.send(:deflate, logout_request_deflated_base64)
24
+ encoded_raw = saml_message.send(:encode_raw_saml, deflated, settings)
25
+ assert logout_request_deflated_base64, encoded_raw
26
+ end
27
+
28
+ it "return decoded string" do
29
+ decoded = saml_message.send(:decode, response_document)
30
+ assert response_document_xml, decoded
31
+
32
+ decoded = saml_message.send(:decode, logout_request_base64)
33
+ assert logout_request_document, decoded
34
+ end
35
+
36
+ it "return encoded string" do
37
+ encoded = saml_message.send(:encode, response_document_xml)
38
+ assert response_document, encoded
39
+
40
+ encoded = saml_message.send(:encode, logout_request_document)
41
+ assert logout_request_base64, encoded
42
+ end
43
+
44
+ it "return deflated string" do
45
+ deflated = saml_message.send(:deflate, logout_request_document)
46
+ encoded_deflated = saml_message.send(:encode, deflated)
47
+ assert logout_request_deflated_base64, encoded_deflated
48
+ end
49
+
50
+ it "return inflated string" do
51
+ decoded = saml_message.send(:decode, logout_request_deflated_base64)
52
+ decoded_inflated = saml_message.send(:inflate, decoded)
53
+ assert response_document_xml, decoded_inflated
54
+ end
55
+ end
56
+ end
@@ -0,0 +1,218 @@
1
+ require File.expand_path(File.join(File.dirname(__FILE__), "test_helper"))
2
+
3
+ require 'onelogin/ruby-saml/settings'
4
+
5
+ class SettingsTest < Minitest::Test
6
+
7
+ describe "Settings" do
8
+ before do
9
+ @settings = OneLogin::RubySaml::Settings.new
10
+ end
11
+
12
+ it "should provide getters and settings" do
13
+ accessors = [
14
+ :idp_entity_id, :idp_sso_target_url, :idp_slo_target_url, :idp_cert, :idp_cert_fingerprint,
15
+ :issuer, :assertion_consumer_service_url, :assertion_consumer_service_binding,
16
+ :single_logout_service_url, :single_logout_service_binding,
17
+ :sp_name_qualifier, :name_identifier_format, :name_identifier_value,
18
+ :sessionindex, :attributes_index, :passive, :force_authn,
19
+ :compress_request, :double_quote_xml_attribute_values, :protocol_binding,
20
+ :security, :certificate, :private_key,
21
+ :authn_context, :authn_context_comparison, :authn_context_decl_ref,
22
+ :assertion_consumer_logout_service_url,
23
+ :assertion_consumer_logout_service_binding
24
+ ]
25
+
26
+ accessors.each do |accessor|
27
+ value = Kernel.rand
28
+ @settings.send("#{accessor}=".to_sym, value)
29
+ assert_equal value, @settings.send(accessor)
30
+ end
31
+
32
+ end
33
+
34
+ it "create settings from hash" do
35
+ config = {
36
+ :assertion_consumer_service_url => "http://app.muda.no/sso",
37
+ :issuer => "http://muda.no",
38
+ :sp_name_qualifier => "http://sso.muda.no",
39
+ :idp_sso_target_url => "http://sso.muda.no/sso",
40
+ :idp_slo_target_url => "http://sso.muda.no/slo",
41
+ :idp_cert_fingerprint => "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00",
42
+ :name_identifier_format => "urn:oasis:names:tc:SAML:2.0:nameid-format:transient",
43
+ :attributes_index => 30,
44
+ :passive => true,
45
+ :protocol_binding => 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST'
46
+ }
47
+ @settings = OneLogin::RubySaml::Settings.new(config)
48
+
49
+ config.each do |k,v|
50
+ assert_equal v, @settings.send(k)
51
+ end
52
+ end
53
+
54
+ it "configure attribute service attributes correctly" do
55
+ @settings = OneLogin::RubySaml::Settings.new
56
+ @settings.attribute_consuming_service.configure do
57
+ service_name "Test Service"
58
+ add_attribute :name => "Name", :name_format => "Name Format", :friendly_name => "Friendly Name"
59
+ end
60
+
61
+ assert_equal @settings.attribute_consuming_service.configured?, true
62
+ assert_equal @settings.attribute_consuming_service.name, "Test Service"
63
+ assert_equal @settings.attribute_consuming_service.attributes, [{:name => "Name", :name_format => "Name Format", :friendly_name => "Friendly Name" }]
64
+ end
65
+
66
+ it "does not modify default security settings" do
67
+ settings = OneLogin::RubySaml::Settings.new
68
+ settings.security[:authn_requests_signed] = true
69
+ settings.security[:embed_sign] = true
70
+ settings.security[:digest_method] = XMLSecurity::Document::SHA256
71
+ settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA256
72
+
73
+ new_settings = OneLogin::RubySaml::Settings.new
74
+ assert_equal new_settings.security[:authn_requests_signed], false
75
+ assert_equal new_settings.security[:embed_sign], false
76
+ assert_equal new_settings.security[:digest_method], XMLSecurity::Document::SHA1
77
+ assert_equal new_settings.security[:signature_method], XMLSecurity::Document::RSA_SHA1
78
+ end
79
+
80
+ describe "#single_logout_service_url" do
81
+ it "when single_logout_service_url is nil but assertion_consumer_logout_service_url returns its value" do
82
+ settings.single_logout_service_url = nil
83
+ settings.assertion_consumer_logout_service_url = "http://app.muda.no/sls"
84
+
85
+ assert_equal "http://app.muda.no/sls", settings.single_logout_service_url
86
+ end
87
+ end
88
+
89
+ describe "#single_logout_service_binding" do
90
+ it "when single_logout_service_binding is nil but assertion_consumer_logout_service_binding returns its value" do
91
+ settings.single_logout_service_binding = nil
92
+ settings.assertion_consumer_logout_service_binding = "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect"
93
+
94
+ assert_equal "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect", settings.single_logout_service_binding
95
+ end
96
+ end
97
+
98
+ describe "#get_idp_cert" do
99
+ it "returns nil when the cert is an empty string" do
100
+ @settings = OneLogin::RubySaml::Settings.new
101
+ @settings.idp_cert = ""
102
+ assert_equal nil, @settings.get_idp_cert
103
+ end
104
+
105
+ it "returns nil when the cert is nil" do
106
+ @settings = OneLogin::RubySaml::Settings.new
107
+ @settings.idp_cert = nil
108
+ assert_equal nil, @settings.get_idp_cert
109
+ end
110
+
111
+ it "returns the certificate when it is valid" do
112
+ @settings = OneLogin::RubySaml::Settings.new
113
+ @settings.idp_cert = ruby_saml_cert_text
114
+ assert @settings.get_idp_cert.kind_of? OpenSSL::X509::Certificate
115
+ end
116
+
117
+ it "raises when the certificate is not valid" do
118
+ # formatted but invalid cert
119
+ @settings.idp_cert = read_certificate("formatted_certificate")
120
+ assert_raises(OpenSSL::X509::CertificateError) {
121
+ @settings.get_idp_cert
122
+ }
123
+ end
124
+ end
125
+
126
+ describe "#get_sp_cert" do
127
+ it "returns nil when the cert is an empty string" do
128
+ @settings = OneLogin::RubySaml::Settings.new
129
+ @settings.certificate = ""
130
+ assert_equal nil, @settings.get_sp_cert
131
+ end
132
+
133
+ it "returns nil when the cert is nil" do
134
+ @settings = OneLogin::RubySaml::Settings.new
135
+ @settings.certificate = nil
136
+ assert_equal nil, @settings.get_sp_cert
137
+ end
138
+
139
+ it "returns the certificate when it is valid" do
140
+ @settings = OneLogin::RubySaml::Settings.new
141
+ @settings.certificate = ruby_saml_cert_text
142
+ assert @settings.get_sp_cert.kind_of? OpenSSL::X509::Certificate
143
+ end
144
+
145
+ it "raises when the certificate is not valid" do
146
+ # formatted but invalid cert
147
+ @settings.certificate = read_certificate("formatted_certificate")
148
+ assert_raises(OpenSSL::X509::CertificateError) {
149
+ @settings.get_sp_cert
150
+ }
151
+ end
152
+
153
+ end
154
+
155
+ describe "#get_sp_key" do
156
+ it "returns nil when the private key is an empty string" do
157
+ @settings = OneLogin::RubySaml::Settings.new
158
+ @settings.private_key = ""
159
+ assert_equal nil, @settings.get_sp_key
160
+ end
161
+
162
+ it "returns nil when the private key is nil" do
163
+ @settings = OneLogin::RubySaml::Settings.new
164
+ @settings.private_key = nil
165
+ assert_equal nil, @settings.get_sp_key
166
+ end
167
+
168
+ it "returns the private key when it is valid" do
169
+ @settings = OneLogin::RubySaml::Settings.new
170
+ @settings.private_key = ruby_saml_key_text
171
+ assert @settings.get_sp_key.kind_of? OpenSSL::PKey::RSA
172
+ end
173
+
174
+ it "raises when the private key is not valid" do
175
+ # formatted but invalid rsa private key
176
+ @settings.private_key = read_certificate("formatted_rsa_private_key")
177
+ assert_raises(OpenSSL::PKey::RSAError) {
178
+ @settings.get_sp_key
179
+ }
180
+ end
181
+
182
+ end
183
+
184
+ describe "#get_fingerprint" do
185
+ it "get the fingerprint value when cert and fingerprint in settings are nil" do
186
+ @settings = OneLogin::RubySaml::Settings.new
187
+ @settings.idp_cert_fingerprint = nil
188
+ @settings.idp_cert = nil
189
+ fingerprint = @settings.get_fingerprint
190
+ assert_nil fingerprint
191
+ end
192
+
193
+ it "get the fingerprint value when there is a cert at the settings" do
194
+ @settings = OneLogin::RubySaml::Settings.new
195
+ @settings.idp_cert_fingerprint = nil
196
+ @settings.idp_cert = ruby_saml_cert_text
197
+ fingerprint = @settings.get_fingerprint
198
+ assert fingerprint.downcase == ruby_saml_cert_fingerprint.downcase
199
+ end
200
+
201
+ it "get the fingerprint value when there is a fingerprint at the settings" do
202
+ @settings = OneLogin::RubySaml::Settings.new
203
+ @settings.idp_cert_fingerprint = ruby_saml_cert_fingerprint
204
+ @settings.idp_cert = nil
205
+ fingerprint = @settings.get_fingerprint
206
+ assert fingerprint.downcase == ruby_saml_cert_fingerprint.downcase
207
+ end
208
+
209
+ it "get the fingerprint value when there are cert and fingerprint at the settings" do
210
+ @settings = OneLogin::RubySaml::Settings.new
211
+ @settings.idp_cert_fingerprint = ruby_saml_cert_fingerprint
212
+ @settings.idp_cert = ruby_saml_cert_text
213
+ fingerprint = @settings.get_fingerprint
214
+ assert fingerprint.downcase == ruby_saml_cert_fingerprint.downcase
215
+ end
216
+ end
217
+ end
218
+ end
@@ -0,0 +1,275 @@
1
+ require File.expand_path(File.join(File.dirname(__FILE__), "test_helper"))
2
+ require 'logout_responses/logoutresponse_fixtures'
3
+
4
+ require 'onelogin/ruby-saml/slo_logoutrequest'
5
+ require 'timecop'
6
+
7
+ class RubySamlTest < Minitest::Test
8
+
9
+ describe "SloLogoutrequest" do
10
+
11
+ let(:settings) { OneLogin::RubySaml::Settings.new }
12
+ let(:logout_request) { OneLogin::RubySaml::SloLogoutrequest.new(logout_request_document) }
13
+ let(:invalid_logout_request) { OneLogin::RubySaml::SloLogoutrequest.new(invalid_logout_request_document) }
14
+
15
+ before do
16
+ settings.idp_entity_id = 'https://app.onelogin.com/saml/metadata/SOMEACCOUNT'
17
+ settings.soft = true
18
+ logout_request.settings = settings
19
+ invalid_logout_request.settings = settings
20
+ end
21
+
22
+ describe "initiator" do
23
+ it "raise an exception when logout request is initialized with nil" do
24
+ assert_raises(ArgumentError) { OneLogin::RubySaml::SloLogoutrequest.new(nil) }
25
+ end
26
+ end
27
+
28
+ describe "#is_valid?" do
29
+ it "return false when logout request is initialized with blank data" do
30
+ logout_request_blank = OneLogin::RubySaml::SloLogoutrequest.new('')
31
+ assert !logout_request_blank.is_valid?
32
+ assert_includes logout_request_blank.errors, 'Blank logout request'
33
+ end
34
+
35
+ it "return true when the logout request is initialized with valid data" do
36
+ assert logout_request.is_valid?
37
+ assert_empty logout_request.errors
38
+ assert_equal 'someone@example.org', logout_request.nameid
39
+ end
40
+
41
+ it "should be idempotent when the logout request is initialized with invalid data" do
42
+ assert !invalid_logout_request.is_valid?
43
+ assert_equal ['Invalid SAML Logout Request. Not match the saml-schema-protocol-2.0.xsd'], invalid_logout_request.errors
44
+ assert !invalid_logout_request.is_valid?
45
+ assert_equal ['Invalid SAML Logout Request. Not match the saml-schema-protocol-2.0.xsd'], invalid_logout_request.errors
46
+ end
47
+
48
+ it "should be idempotent when the logout request is initialized with valid data" do
49
+ assert logout_request.is_valid?
50
+ assert_empty logout_request.errors
51
+ assert logout_request.is_valid?
52
+ assert_empty logout_request.errors
53
+ end
54
+
55
+ it "raise error for invalid xml" do
56
+ invalid_logout_request.soft = false
57
+ assert_raises(OneLogin::RubySaml::ValidationError) { invalid_logout_request.is_valid? }
58
+ end
59
+ end
60
+
61
+ describe "#nameid" do
62
+ it "extract the value of the name id element" do
63
+ assert_equal "someone@example.org", logout_request.nameid
64
+ end
65
+ end
66
+
67
+ describe "#issuer" do
68
+ it "return the issuer inside the logout request" do
69
+ assert_equal "https://app.onelogin.com/saml/metadata/SOMEACCOUNT", logout_request.issuer
70
+ end
71
+ end
72
+
73
+ describe "#id" do
74
+ it "extract the value of the ID attribute" do
75
+ assert_equal "_c0348950-935b-0131-1060-782bcb56fcaa", logout_request.id
76
+ end
77
+ end
78
+
79
+ describe "#not_on_or_after" do
80
+ it "extract the value of the NotOnOrAfter attribute" do
81
+ time_value = '2014-07-17T01:01:48Z'
82
+ assert_equal nil, logout_request.not_on_or_after
83
+ logout_request.document.root.attributes['NotOnOrAfter'] = time_value
84
+ assert_equal Time.parse(time_value), logout_request.not_on_or_after
85
+ end
86
+ end
87
+
88
+ describe '#session_indexes' do
89
+ it "return empty array when no SessionIndex" do
90
+ assert_equal [], logout_request.session_indexes
91
+ end
92
+
93
+ it "return an Array with one SessionIndex" do
94
+ logout_request_with_session_index = OneLogin::RubySaml::SloLogoutrequest.new(logout_request_xml_with_session_index)
95
+ assert_equal ['_ea853497-c58a-408a-bc23-c849752d9741'], logout_request_with_session_index.session_indexes
96
+ end
97
+ end
98
+
99
+ describe "#validate_id" do
100
+ it "return true when there is a valid ID in the logout request" do
101
+ assert logout_request.send(:validate_id)
102
+ assert_empty logout_request.errors
103
+ end
104
+
105
+ it "return false when there is an invalid ID in the logout request" do
106
+ logout_request_blank = OneLogin::RubySaml::SloLogoutrequest.new('')
107
+ assert !logout_request_blank.send(:validate_id)
108
+ assert_includes logout_request_blank.errors, "Missing ID attribute on Logout Request"
109
+ end
110
+ end
111
+
112
+ describe "#validate_version" do
113
+ it "return true when the logout request is SAML 2.0 Version" do
114
+ assert logout_request.send(:validate_version)
115
+ end
116
+
117
+ it "return false when the logout request is not SAML 2.0 Version" do
118
+ logout_request_blank = OneLogin::RubySaml::SloLogoutrequest.new('')
119
+ assert !logout_request_blank.send(:validate_version)
120
+ assert_includes logout_request_blank.errors, "Unsupported SAML version"
121
+ end
122
+ end
123
+
124
+ describe "#validate_not_on_or_after" do
125
+ it "return true when the logout request has a valid NotOnOrAfter or does not contain any" do
126
+ assert logout_request.send(:validate_not_on_or_after)
127
+ assert_empty logout_request.errors
128
+ Timecop.freeze Time.parse('2011-06-14T18:25:01.516Z') do
129
+ time_value = '2014-07-17T01:01:48Z'
130
+ logout_request.document.root.attributes['NotOnOrAfter'] = time_value
131
+ assert logout_request.send(:validate_not_on_or_after)
132
+ assert_empty logout_request.errors
133
+ end
134
+ end
135
+
136
+ it "return false when the logout request has an invalid NotOnOrAfter" do
137
+ logout_request.document.root.attributes['NotOnOrAfter'] = '2014-07-17T01:01:48Z'
138
+ assert !logout_request.send(:validate_not_on_or_after)
139
+ assert /Current time is on or after NotOnOrAfter/.match(logout_request.errors[0])
140
+ end
141
+
142
+ it "raise when the logout request has an invalid NotOnOrAfter" do
143
+ logout_request.document.root.attributes['NotOnOrAfter'] = '2014-07-17T01:01:48Z'
144
+ logout_request.soft = false
145
+ assert_raises(OneLogin::RubySaml::ValidationError, "Current time is on or after NotOnOrAfter") do
146
+ logout_request.send(:validate_not_on_or_after)
147
+ end
148
+ end
149
+ end
150
+
151
+ describe "#validate_request_state" do
152
+ it "return true when valid logout request xml" do
153
+ assert logout_request.send(:validate_request_state)
154
+ assert_empty logout_request.errors
155
+ assert logout_request.send(:validate_request_state)
156
+ assert_empty logout_request.errors
157
+ end
158
+
159
+ it "return false when invalid logout request xml" do
160
+ logout_request_blank = OneLogin::RubySaml::SloLogoutrequest.new('')
161
+ logout_request_blank.soft = true
162
+ assert !logout_request_blank.send(:validate_request_state)
163
+ assert_includes logout_request_blank.errors, "Blank logout request"
164
+ end
165
+
166
+ it "raise error for invalid xml" do
167
+ logout_request_blank = OneLogin::RubySaml::SloLogoutrequest.new('')
168
+ logout_request_blank.soft = false
169
+ assert_raises(OneLogin::RubySaml::ValidationError, "Blank logout request") do
170
+ logout_request_blank.send(:validate_request_state)
171
+ end
172
+ end
173
+ end
174
+
175
+ describe "#validate_structure" do
176
+ it "return true when encountering a valid Logout Request xml" do
177
+ assert logout_request.send(:validate_structure)
178
+ assert_empty logout_request.errors
179
+ end
180
+
181
+ it "return false when encountering a Logout Request bad formatted" do
182
+ assert !invalid_logout_request.send(:validate_structure)
183
+ assert_includes invalid_logout_request.errors, "Invalid SAML Logout Request. Not match the saml-schema-protocol-2.0.xsd"
184
+ end
185
+
186
+ it "raise when encountering a Logout Request bad formatted" do
187
+ invalid_logout_request.soft = false
188
+ assert_raises(OneLogin::RubySaml::ValidationError, "Element '{urn:oasis:names:tc:SAML:2.0:assertion}Issuer': This element is not expected") do
189
+ invalid_logout_request.send(:validate_structure)
190
+ end
191
+ end
192
+ end
193
+
194
+ describe "#validate_issuer" do
195
+ it "return true when the issuer of the Logout Request matchs the IdP entityId" do
196
+ logout_request.settings.idp_entity_id = 'https://app.onelogin.com/saml/metadata/SOMEACCOUNT'
197
+ assert logout_request.send(:validate_issuer)
198
+ end
199
+ it "return false when the issuer of the Logout Request does not match the IdP entityId" do
200
+ logout_request.settings.idp_entity_id = 'http://idp.example.com/invalid'
201
+ assert !logout_request.send(:validate_issuer)
202
+ assert_includes logout_request.errors, "Doesn't match the issuer, expected: <#{logout_request.settings.idp_entity_id}>, but was: <https://app.onelogin.com/saml/metadata/SOMEACCOUNT>"
203
+ end
204
+ it "raise when the issuer of the Logout Request does not match the IdP entityId" do
205
+ logout_request.settings.idp_entity_id = 'http://idp.example.com/invalid'
206
+ logout_request.soft = false
207
+ assert_raises(OneLogin::RubySaml::ValidationError, "Doesn't match the issuer, expected: <#{logout_request.settings.idp_entity_id}>, but was: <https://app.onelogin.com/saml/metadata/SOMEACCOUNT>") do
208
+ logout_request.send(:validate_issuer)
209
+ end
210
+ end
211
+ end
212
+
213
+ describe "#validate_signature" do
214
+ before do
215
+ settings.idp_slo_target_url = "http://example.com?field=value"
216
+ settings.security[:logout_requests_signed] = true
217
+ settings.security[:embed_sign] = false
218
+ settings.certificate = ruby_saml_cert_text
219
+ settings.private_key = ruby_saml_key_text
220
+ settings.idp_cert = ruby_saml_cert_text
221
+ end
222
+
223
+ it "return true when valid RSA_SHA1 Signature" do
224
+ settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA1
225
+ params = OneLogin::RubySaml::Logoutrequest.new.create_params(settings, :RelayState => 'http://example.com')
226
+ params['RelayState'] = params[:RelayState]
227
+ options = {}
228
+ options[:get_params] = params
229
+ logout_request_sign_test = OneLogin::RubySaml::SloLogoutrequest.new(params['SAMLRequest'], options)
230
+ logout_request_sign_test.settings = settings
231
+ assert logout_request_sign_test.send(:validate_signature)
232
+ end
233
+
234
+ it "return true when valid RSA_SHA256 Signature" do
235
+ settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA256
236
+ params = OneLogin::RubySaml::Logoutrequest.new.create_params(settings, :RelayState => 'http://example.com')
237
+ options = {}
238
+ options[:get_params] = params
239
+ logout_request_sign_test = OneLogin::RubySaml::SloLogoutrequest.new(params['SAMLRequest'], options)
240
+ params['RelayState'] = params[:RelayState]
241
+ logout_request_sign_test.settings = settings
242
+ assert logout_request_sign_test.send(:validate_signature)
243
+ end
244
+
245
+ it "return false when invalid RSA_SHA1 Signature" do
246
+ settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA1
247
+ params = OneLogin::RubySaml::Logoutrequest.new.create_params(settings, :RelayState => 'http://example.com')
248
+ params['RelayState'] = 'http://invalid.exampcle.com'
249
+ params[:RelayState] = params['RelayState']
250
+ options = {}
251
+ options[:get_params] = params
252
+
253
+ logout_request_sign_test = OneLogin::RubySaml::SloLogoutrequest.new(params['SAMLRequest'], options)
254
+ logout_request_sign_test.settings = settings
255
+ assert !logout_request_sign_test.send(:validate_signature)
256
+ end
257
+
258
+ it "raise when invalid RSA_SHA1 Signature" do
259
+ settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA1
260
+ settings.soft = false
261
+ params = OneLogin::RubySaml::Logoutrequest.new.create_params(settings, :RelayState => 'http://example.com')
262
+ params['RelayState'] = 'http://invalid.exampcle.com'
263
+ params[:RelayState] = params['RelayState']
264
+ options = {}
265
+ options[:get_params] = params
266
+ options[:settings] = settings
267
+
268
+ logout_request_sign_test = OneLogin::RubySaml::SloLogoutrequest.new(params['SAMLRequest'], options)
269
+ assert_raises(OneLogin::RubySaml::ValidationError, "Invalid Signature on Logout Request") do
270
+ logout_request_sign_test.send(:validate_signature)
271
+ end
272
+ end
273
+ end
274
+ end
275
+ end