kl-ruby-saml 0.0.1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (137) hide show
  1. checksums.yaml +7 -0
  2. data/.document +5 -0
  3. data/.gitignore +14 -0
  4. data/.travis.yml +17 -0
  5. data/Gemfile +9 -0
  6. data/LICENSE +19 -0
  7. data/README.md +575 -0
  8. data/Rakefile +41 -0
  9. data/changelog.md +75 -0
  10. data/gemfiles/nokogiri-1.5.gemfile +5 -0
  11. data/lib/onelogin/ruby-saml.rb +17 -0
  12. data/lib/onelogin/ruby-saml/attribute_service.rb +57 -0
  13. data/lib/onelogin/ruby-saml/attributes.rb +128 -0
  14. data/lib/onelogin/ruby-saml/authrequest.rb +156 -0
  15. data/lib/onelogin/ruby-saml/http_error.rb +7 -0
  16. data/lib/onelogin/ruby-saml/idp_metadata_parser.rb +161 -0
  17. data/lib/onelogin/ruby-saml/logging.rb +30 -0
  18. data/lib/onelogin/ruby-saml/logoutrequest.rb +131 -0
  19. data/lib/onelogin/ruby-saml/logoutresponse.rb +241 -0
  20. data/lib/onelogin/ruby-saml/metadata.rb +123 -0
  21. data/lib/onelogin/ruby-saml/response.rb +722 -0
  22. data/lib/onelogin/ruby-saml/saml_message.rb +158 -0
  23. data/lib/onelogin/ruby-saml/settings.rb +165 -0
  24. data/lib/onelogin/ruby-saml/slo_logoutrequest.rb +258 -0
  25. data/lib/onelogin/ruby-saml/slo_logoutresponse.rb +136 -0
  26. data/lib/onelogin/ruby-saml/utils.rb +172 -0
  27. data/lib/onelogin/ruby-saml/validation_error.rb +7 -0
  28. data/lib/onelogin/ruby-saml/version.rb +5 -0
  29. data/lib/ruby-saml.rb +1 -0
  30. data/lib/schemas/saml-schema-assertion-2.0.xsd +283 -0
  31. data/lib/schemas/saml-schema-authn-context-2.0.xsd +23 -0
  32. data/lib/schemas/saml-schema-authn-context-types-2.0.xsd +821 -0
  33. data/lib/schemas/saml-schema-metadata-2.0.xsd +337 -0
  34. data/lib/schemas/saml-schema-protocol-2.0.xsd +302 -0
  35. data/lib/schemas/sstc-metadata-attr.xsd +35 -0
  36. data/lib/schemas/sstc-saml-attribute-ext.xsd +25 -0
  37. data/lib/schemas/sstc-saml-metadata-algsupport-v1.0.xsd +41 -0
  38. data/lib/schemas/sstc-saml-metadata-ui-v1.0.xsd +89 -0
  39. data/lib/schemas/xenc-schema.xsd +136 -0
  40. data/lib/schemas/xml.xsd +287 -0
  41. data/lib/schemas/xmldsig-core-schema.xsd +309 -0
  42. data/lib/xml_security.rb +358 -0
  43. data/ruby-saml.gemspec +57 -0
  44. data/test/certificates/certificate1 +12 -0
  45. data/test/certificates/certificate_without_head_foot +1 -0
  46. data/test/certificates/formatted_certificate +14 -0
  47. data/test/certificates/formatted_private_key +12 -0
  48. data/test/certificates/formatted_rsa_private_key +12 -0
  49. data/test/certificates/invalid_certificate1 +1 -0
  50. data/test/certificates/invalid_certificate2 +1 -0
  51. data/test/certificates/invalid_certificate3 +12 -0
  52. data/test/certificates/invalid_private_key1 +1 -0
  53. data/test/certificates/invalid_private_key2 +1 -0
  54. data/test/certificates/invalid_private_key3 +10 -0
  55. data/test/certificates/invalid_rsa_private_key1 +1 -0
  56. data/test/certificates/invalid_rsa_private_key2 +1 -0
  57. data/test/certificates/invalid_rsa_private_key3 +10 -0
  58. data/test/certificates/ruby-saml.crt +14 -0
  59. data/test/certificates/ruby-saml.key +15 -0
  60. data/test/idp_metadata_parser_test.rb +95 -0
  61. data/test/logging_test.rb +62 -0
  62. data/test/logout_requests/invalid_slo_request.xml +6 -0
  63. data/test/logout_requests/slo_request.xml +4 -0
  64. data/test/logout_requests/slo_request.xml.base64 +1 -0
  65. data/test/logout_requests/slo_request_deflated.xml.base64 +1 -0
  66. data/test/logout_requests/slo_request_with_session_index.xml +5 -0
  67. data/test/logout_responses/logoutresponse_fixtures.rb +67 -0
  68. data/test/logoutrequest_test.rb +211 -0
  69. data/test/logoutresponse_test.rb +258 -0
  70. data/test/metadata_test.rb +203 -0
  71. data/test/request_test.rb +282 -0
  72. data/test/response_test.rb +1094 -0
  73. data/test/responses/adfs_response_sha1.xml +46 -0
  74. data/test/responses/adfs_response_sha256.xml +46 -0
  75. data/test/responses/adfs_response_sha384.xml +46 -0
  76. data/test/responses/adfs_response_sha512.xml +46 -0
  77. data/test/responses/adfs_response_xmlns.xml +45 -0
  78. data/test/responses/attackxee.xml +13 -0
  79. data/test/responses/idp_descriptor.xml +3 -0
  80. data/test/responses/invalids/invalid_audience.xml.base64 +1 -0
  81. data/test/responses/invalids/invalid_issuer_assertion.xml.base64 +1 -0
  82. data/test/responses/invalids/invalid_issuer_message.xml.base64 +1 -0
  83. data/test/responses/invalids/invalid_signature_position.xml.base64 +1 -0
  84. data/test/responses/invalids/invalid_subjectconfirmation_inresponse.xml.base64 +1 -0
  85. data/test/responses/invalids/invalid_subjectconfirmation_nb.xml.base64 +1 -0
  86. data/test/responses/invalids/invalid_subjectconfirmation_noa.xml.base64 +1 -0
  87. data/test/responses/invalids/invalid_subjectconfirmation_recipient.xml.base64 +1 -0
  88. data/test/responses/invalids/multiple_assertions.xml.base64 +2 -0
  89. data/test/responses/invalids/multiple_signed.xml.base64 +1 -0
  90. data/test/responses/invalids/no_id.xml.base64 +1 -0
  91. data/test/responses/invalids/no_saml2.xml.base64 +1 -0
  92. data/test/responses/invalids/no_signature.xml.base64 +1 -0
  93. data/test/responses/invalids/no_status.xml.base64 +1 -0
  94. data/test/responses/invalids/no_status_code.xml.base64 +1 -0
  95. data/test/responses/invalids/no_subjectconfirmation_data.xml.base64 +1 -0
  96. data/test/responses/invalids/no_subjectconfirmation_method.xml.base64 +1 -0
  97. data/test/responses/invalids/response_encrypted_attrs.xml.base64 +1 -0
  98. data/test/responses/invalids/response_invalid_signed_element.xml.base64 +1 -0
  99. data/test/responses/invalids/status_code_responder.xml.base64 +1 -0
  100. data/test/responses/invalids/status_code_responer_and_msg.xml.base64 +1 -0
  101. data/test/responses/no_signature_ns.xml +48 -0
  102. data/test/responses/open_saml_response.xml +56 -0
  103. data/test/responses/response_assertion_wrapped.xml.base64 +93 -0
  104. data/test/responses/response_encrypted_nameid.xml.base64 +1 -0
  105. data/test/responses/response_eval.xml +7 -0
  106. data/test/responses/response_no_cert_and_encrypted_attrs.xml +29 -0
  107. data/test/responses/response_unsigned_xml_base64 +1 -0
  108. data/test/responses/response_with_ampersands.xml +139 -0
  109. data/test/responses/response_with_ampersands.xml.base64 +93 -0
  110. data/test/responses/response_with_multiple_attribute_values.xml +67 -0
  111. data/test/responses/response_with_saml2_namespace.xml.base64 +102 -0
  112. data/test/responses/response_with_signed_assertion.xml.base64 +66 -0
  113. data/test/responses/response_with_signed_assertion_2.xml.base64 +1 -0
  114. data/test/responses/response_with_undefined_recipient.xml.base64 +1 -0
  115. data/test/responses/response_without_attributes.xml.base64 +79 -0
  116. data/test/responses/response_wrapped.xml.base64 +150 -0
  117. data/test/responses/signed_message_encrypted_signed_assertion.xml.base64 +1 -0
  118. data/test/responses/signed_message_encrypted_unsigned_assertion.xml.base64 +1 -0
  119. data/test/responses/simple_saml_php.xml +71 -0
  120. data/test/responses/starfield_response.xml.base64 +1 -0
  121. data/test/responses/test_sign.xml +43 -0
  122. data/test/responses/unsigned_message_aes128_encrypted_signed_assertion.xml.base64 +1 -0
  123. data/test/responses/unsigned_message_aes192_encrypted_signed_assertion.xml.base64 +1 -0
  124. data/test/responses/unsigned_message_aes256_encrypted_signed_assertion.xml.base64 +1 -0
  125. data/test/responses/unsigned_message_des192_encrypted_signed_assertion.xml.base64 +1 -0
  126. data/test/responses/unsigned_message_encrypted_assertion_without_saml_namespace.xml.base64 +1 -0
  127. data/test/responses/unsigned_message_encrypted_signed_assertion.xml.base64 +1 -0
  128. data/test/responses/unsigned_message_encrypted_unsigned_assertion.xml.base64 +1 -0
  129. data/test/responses/valid_response.xml.base64 +1 -0
  130. data/test/saml_message_test.rb +56 -0
  131. data/test/settings_test.rb +218 -0
  132. data/test/slo_logoutrequest_test.rb +275 -0
  133. data/test/slo_logoutresponse_test.rb +185 -0
  134. data/test/test_helper.rb +252 -0
  135. data/test/utils_test.rb +145 -0
  136. data/test/xml_security_test.rb +329 -0
  137. metadata +415 -0
@@ -0,0 +1 @@
1
+ <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="_e57a4bfc12c126e5d1e172690bb33ca5cf4e545a17" Version="2.0" IssueInstant="2015-03-19T14:01:08Z" Destination="http://rubysaml.com:3000/saml/acs" InResponseTo="_50f13de0-b06e-0132-5c3c-0090f5dedd77"><saml:Issuer>https://idp.example.com/simplesaml/saml2/idp/metadata.php</saml:Issuer><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:EncryptedAssertion><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" xmlns:dsig="http://www.w3.org/2000/09/xmldsig#" Type="http://www.w3.org/2001/04/xmlenc#Element"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes128-cbc"/><dsig:KeyInfo xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><xenc:EncryptedKey><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p"/><xenc:CipherData><xenc:CipherValue>WBz6KwlKYG0Jqs8pl/+ZjyTBOYFhYlF7CvWjawHLDj1E4WBKVw5Bc5qTw1P/fyRIMCAsinP9L+le4eGvQLAqm2Wz9APvYhRy2V6lRKSN3cmURoPDkNHZyoIXZd8NVtz/6HI9jFoiaXFdD48bQ5a6AYWiKiGNdGiONyXomsGOS3s=</xenc:CipherValue></xenc:CipherData></xenc:EncryptedKey></dsig:KeyInfo>
   <xenc:CipherData>
      <xenc:CipherValue>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</xenc:CipherValue>
   </xenc:CipherData>
</xenc:EncryptedData></saml:EncryptedAssertion></samlp:Response>
@@ -0,0 +1 @@
1
+ <samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="_9365faa3a6f6a23b5cd75a74cb0786dc19e845200e" Version="2.0" IssueInstant="2015-03-19T14:00:31Z" Destination="http://rubysaml.com:3000/saml/acs" InResponseTo="_3ab7adb0-b06e-0132-5c3b-0090f5dedd77"><saml:Issuer>https://idp.example.com/simplesaml/saml2/idp/metadata.php</saml:Issuer><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:EncryptedAssertion><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" xmlns:dsig="http://www.w3.org/2000/09/xmldsig#" Type="http://www.w3.org/2001/04/xmlenc#Element"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes128-cbc"/><dsig:KeyInfo xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><xenc:EncryptedKey><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p"/><xenc:CipherData><xenc:CipherValue>xkJn7LQHrTZzLdrNec33hMSC5dc8B0uM4fw8HKhwpkWINwC9deaj0QVz4fZ82Zv2QdP3v6r0wJ/8VrUIF8puJTHSU0u2EUU+XqBJxvivGp2UhUPCyWmirSi6efBnWqMKhOz5YJoaLEu17yw+kOnavLZPv2bB8b5bo2mZPiaPG6s=</xenc:CipherValue></xenc:CipherData></xenc:EncryptedKey></dsig:KeyInfo>
   <xenc:CipherData>
      <xenc:CipherValue>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</xenc:CipherValue>
   </xenc:CipherData>
</xenc:EncryptedData></saml:EncryptedAssertion></samlp:Response>
@@ -0,0 +1 @@
1
+ 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
@@ -0,0 +1,56 @@
1
+ require File.expand_path(File.join(File.dirname(__FILE__), "test_helper"))
2
+
3
+ class RubySamlTest < Minitest::Test
4
+
5
+ describe "SamlMessage" do
6
+
7
+ let(:settings) { OneLogin::RubySaml::Settings.new }
8
+ let(:saml_message) { OneLogin::RubySaml::SamlMessage.new }
9
+ let(:response_document) { read_response("response_unsigned_xml_base64") }
10
+ let(:response_document_xml) { read_response("adfs_response_xmlns.xml") }
11
+
12
+ it "return decoded raw saml" do
13
+ decoded_raw = saml_message.send(:decode_raw_saml, logout_request_deflated_base64)
14
+ assert logout_request_document, decoded_raw
15
+ end
16
+
17
+ it "return encoded raw saml" do
18
+ settings.compress_request = true
19
+ encoded_raw = saml_message.send(:encode_raw_saml, logout_request_document, settings)
20
+ assert logout_request_deflated_base64, encoded_raw
21
+
22
+ settings.compress_request = false
23
+ deflated = saml_message.send(:deflate, logout_request_deflated_base64)
24
+ encoded_raw = saml_message.send(:encode_raw_saml, deflated, settings)
25
+ assert logout_request_deflated_base64, encoded_raw
26
+ end
27
+
28
+ it "return decoded string" do
29
+ decoded = saml_message.send(:decode, response_document)
30
+ assert response_document_xml, decoded
31
+
32
+ decoded = saml_message.send(:decode, logout_request_base64)
33
+ assert logout_request_document, decoded
34
+ end
35
+
36
+ it "return encoded string" do
37
+ encoded = saml_message.send(:encode, response_document_xml)
38
+ assert response_document, encoded
39
+
40
+ encoded = saml_message.send(:encode, logout_request_document)
41
+ assert logout_request_base64, encoded
42
+ end
43
+
44
+ it "return deflated string" do
45
+ deflated = saml_message.send(:deflate, logout_request_document)
46
+ encoded_deflated = saml_message.send(:encode, deflated)
47
+ assert logout_request_deflated_base64, encoded_deflated
48
+ end
49
+
50
+ it "return inflated string" do
51
+ decoded = saml_message.send(:decode, logout_request_deflated_base64)
52
+ decoded_inflated = saml_message.send(:inflate, decoded)
53
+ assert response_document_xml, decoded_inflated
54
+ end
55
+ end
56
+ end
@@ -0,0 +1,218 @@
1
+ require File.expand_path(File.join(File.dirname(__FILE__), "test_helper"))
2
+
3
+ require 'onelogin/ruby-saml/settings'
4
+
5
+ class SettingsTest < Minitest::Test
6
+
7
+ describe "Settings" do
8
+ before do
9
+ @settings = OneLogin::RubySaml::Settings.new
10
+ end
11
+
12
+ it "should provide getters and settings" do
13
+ accessors = [
14
+ :idp_entity_id, :idp_sso_target_url, :idp_slo_target_url, :idp_cert, :idp_cert_fingerprint,
15
+ :issuer, :assertion_consumer_service_url, :assertion_consumer_service_binding,
16
+ :single_logout_service_url, :single_logout_service_binding,
17
+ :sp_name_qualifier, :name_identifier_format, :name_identifier_value,
18
+ :sessionindex, :attributes_index, :passive, :force_authn,
19
+ :compress_request, :double_quote_xml_attribute_values, :protocol_binding,
20
+ :security, :certificate, :private_key,
21
+ :authn_context, :authn_context_comparison, :authn_context_decl_ref,
22
+ :assertion_consumer_logout_service_url,
23
+ :assertion_consumer_logout_service_binding
24
+ ]
25
+
26
+ accessors.each do |accessor|
27
+ value = Kernel.rand
28
+ @settings.send("#{accessor}=".to_sym, value)
29
+ assert_equal value, @settings.send(accessor)
30
+ end
31
+
32
+ end
33
+
34
+ it "create settings from hash" do
35
+ config = {
36
+ :assertion_consumer_service_url => "http://app.muda.no/sso",
37
+ :issuer => "http://muda.no",
38
+ :sp_name_qualifier => "http://sso.muda.no",
39
+ :idp_sso_target_url => "http://sso.muda.no/sso",
40
+ :idp_slo_target_url => "http://sso.muda.no/slo",
41
+ :idp_cert_fingerprint => "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00",
42
+ :name_identifier_format => "urn:oasis:names:tc:SAML:2.0:nameid-format:transient",
43
+ :attributes_index => 30,
44
+ :passive => true,
45
+ :protocol_binding => 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST'
46
+ }
47
+ @settings = OneLogin::RubySaml::Settings.new(config)
48
+
49
+ config.each do |k,v|
50
+ assert_equal v, @settings.send(k)
51
+ end
52
+ end
53
+
54
+ it "configure attribute service attributes correctly" do
55
+ @settings = OneLogin::RubySaml::Settings.new
56
+ @settings.attribute_consuming_service.configure do
57
+ service_name "Test Service"
58
+ add_attribute :name => "Name", :name_format => "Name Format", :friendly_name => "Friendly Name"
59
+ end
60
+
61
+ assert_equal @settings.attribute_consuming_service.configured?, true
62
+ assert_equal @settings.attribute_consuming_service.name, "Test Service"
63
+ assert_equal @settings.attribute_consuming_service.attributes, [{:name => "Name", :name_format => "Name Format", :friendly_name => "Friendly Name" }]
64
+ end
65
+
66
+ it "does not modify default security settings" do
67
+ settings = OneLogin::RubySaml::Settings.new
68
+ settings.security[:authn_requests_signed] = true
69
+ settings.security[:embed_sign] = true
70
+ settings.security[:digest_method] = XMLSecurity::Document::SHA256
71
+ settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA256
72
+
73
+ new_settings = OneLogin::RubySaml::Settings.new
74
+ assert_equal new_settings.security[:authn_requests_signed], false
75
+ assert_equal new_settings.security[:embed_sign], false
76
+ assert_equal new_settings.security[:digest_method], XMLSecurity::Document::SHA1
77
+ assert_equal new_settings.security[:signature_method], XMLSecurity::Document::RSA_SHA1
78
+ end
79
+
80
+ describe "#single_logout_service_url" do
81
+ it "when single_logout_service_url is nil but assertion_consumer_logout_service_url returns its value" do
82
+ settings.single_logout_service_url = nil
83
+ settings.assertion_consumer_logout_service_url = "http://app.muda.no/sls"
84
+
85
+ assert_equal "http://app.muda.no/sls", settings.single_logout_service_url
86
+ end
87
+ end
88
+
89
+ describe "#single_logout_service_binding" do
90
+ it "when single_logout_service_binding is nil but assertion_consumer_logout_service_binding returns its value" do
91
+ settings.single_logout_service_binding = nil
92
+ settings.assertion_consumer_logout_service_binding = "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect"
93
+
94
+ assert_equal "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect", settings.single_logout_service_binding
95
+ end
96
+ end
97
+
98
+ describe "#get_idp_cert" do
99
+ it "returns nil when the cert is an empty string" do
100
+ @settings = OneLogin::RubySaml::Settings.new
101
+ @settings.idp_cert = ""
102
+ assert_equal nil, @settings.get_idp_cert
103
+ end
104
+
105
+ it "returns nil when the cert is nil" do
106
+ @settings = OneLogin::RubySaml::Settings.new
107
+ @settings.idp_cert = nil
108
+ assert_equal nil, @settings.get_idp_cert
109
+ end
110
+
111
+ it "returns the certificate when it is valid" do
112
+ @settings = OneLogin::RubySaml::Settings.new
113
+ @settings.idp_cert = ruby_saml_cert_text
114
+ assert @settings.get_idp_cert.kind_of? OpenSSL::X509::Certificate
115
+ end
116
+
117
+ it "raises when the certificate is not valid" do
118
+ # formatted but invalid cert
119
+ @settings.idp_cert = read_certificate("formatted_certificate")
120
+ assert_raises(OpenSSL::X509::CertificateError) {
121
+ @settings.get_idp_cert
122
+ }
123
+ end
124
+ end
125
+
126
+ describe "#get_sp_cert" do
127
+ it "returns nil when the cert is an empty string" do
128
+ @settings = OneLogin::RubySaml::Settings.new
129
+ @settings.certificate = ""
130
+ assert_equal nil, @settings.get_sp_cert
131
+ end
132
+
133
+ it "returns nil when the cert is nil" do
134
+ @settings = OneLogin::RubySaml::Settings.new
135
+ @settings.certificate = nil
136
+ assert_equal nil, @settings.get_sp_cert
137
+ end
138
+
139
+ it "returns the certificate when it is valid" do
140
+ @settings = OneLogin::RubySaml::Settings.new
141
+ @settings.certificate = ruby_saml_cert_text
142
+ assert @settings.get_sp_cert.kind_of? OpenSSL::X509::Certificate
143
+ end
144
+
145
+ it "raises when the certificate is not valid" do
146
+ # formatted but invalid cert
147
+ @settings.certificate = read_certificate("formatted_certificate")
148
+ assert_raises(OpenSSL::X509::CertificateError) {
149
+ @settings.get_sp_cert
150
+ }
151
+ end
152
+
153
+ end
154
+
155
+ describe "#get_sp_key" do
156
+ it "returns nil when the private key is an empty string" do
157
+ @settings = OneLogin::RubySaml::Settings.new
158
+ @settings.private_key = ""
159
+ assert_equal nil, @settings.get_sp_key
160
+ end
161
+
162
+ it "returns nil when the private key is nil" do
163
+ @settings = OneLogin::RubySaml::Settings.new
164
+ @settings.private_key = nil
165
+ assert_equal nil, @settings.get_sp_key
166
+ end
167
+
168
+ it "returns the private key when it is valid" do
169
+ @settings = OneLogin::RubySaml::Settings.new
170
+ @settings.private_key = ruby_saml_key_text
171
+ assert @settings.get_sp_key.kind_of? OpenSSL::PKey::RSA
172
+ end
173
+
174
+ it "raises when the private key is not valid" do
175
+ # formatted but invalid rsa private key
176
+ @settings.private_key = read_certificate("formatted_rsa_private_key")
177
+ assert_raises(OpenSSL::PKey::RSAError) {
178
+ @settings.get_sp_key
179
+ }
180
+ end
181
+
182
+ end
183
+
184
+ describe "#get_fingerprint" do
185
+ it "get the fingerprint value when cert and fingerprint in settings are nil" do
186
+ @settings = OneLogin::RubySaml::Settings.new
187
+ @settings.idp_cert_fingerprint = nil
188
+ @settings.idp_cert = nil
189
+ fingerprint = @settings.get_fingerprint
190
+ assert_nil fingerprint
191
+ end
192
+
193
+ it "get the fingerprint value when there is a cert at the settings" do
194
+ @settings = OneLogin::RubySaml::Settings.new
195
+ @settings.idp_cert_fingerprint = nil
196
+ @settings.idp_cert = ruby_saml_cert_text
197
+ fingerprint = @settings.get_fingerprint
198
+ assert fingerprint.downcase == ruby_saml_cert_fingerprint.downcase
199
+ end
200
+
201
+ it "get the fingerprint value when there is a fingerprint at the settings" do
202
+ @settings = OneLogin::RubySaml::Settings.new
203
+ @settings.idp_cert_fingerprint = ruby_saml_cert_fingerprint
204
+ @settings.idp_cert = nil
205
+ fingerprint = @settings.get_fingerprint
206
+ assert fingerprint.downcase == ruby_saml_cert_fingerprint.downcase
207
+ end
208
+
209
+ it "get the fingerprint value when there are cert and fingerprint at the settings" do
210
+ @settings = OneLogin::RubySaml::Settings.new
211
+ @settings.idp_cert_fingerprint = ruby_saml_cert_fingerprint
212
+ @settings.idp_cert = ruby_saml_cert_text
213
+ fingerprint = @settings.get_fingerprint
214
+ assert fingerprint.downcase == ruby_saml_cert_fingerprint.downcase
215
+ end
216
+ end
217
+ end
218
+ end
@@ -0,0 +1,275 @@
1
+ require File.expand_path(File.join(File.dirname(__FILE__), "test_helper"))
2
+ require 'logout_responses/logoutresponse_fixtures'
3
+
4
+ require 'onelogin/ruby-saml/slo_logoutrequest'
5
+ require 'timecop'
6
+
7
+ class RubySamlTest < Minitest::Test
8
+
9
+ describe "SloLogoutrequest" do
10
+
11
+ let(:settings) { OneLogin::RubySaml::Settings.new }
12
+ let(:logout_request) { OneLogin::RubySaml::SloLogoutrequest.new(logout_request_document) }
13
+ let(:invalid_logout_request) { OneLogin::RubySaml::SloLogoutrequest.new(invalid_logout_request_document) }
14
+
15
+ before do
16
+ settings.idp_entity_id = 'https://app.onelogin.com/saml/metadata/SOMEACCOUNT'
17
+ settings.soft = true
18
+ logout_request.settings = settings
19
+ invalid_logout_request.settings = settings
20
+ end
21
+
22
+ describe "initiator" do
23
+ it "raise an exception when logout request is initialized with nil" do
24
+ assert_raises(ArgumentError) { OneLogin::RubySaml::SloLogoutrequest.new(nil) }
25
+ end
26
+ end
27
+
28
+ describe "#is_valid?" do
29
+ it "return false when logout request is initialized with blank data" do
30
+ logout_request_blank = OneLogin::RubySaml::SloLogoutrequest.new('')
31
+ assert !logout_request_blank.is_valid?
32
+ assert_includes logout_request_blank.errors, 'Blank logout request'
33
+ end
34
+
35
+ it "return true when the logout request is initialized with valid data" do
36
+ assert logout_request.is_valid?
37
+ assert_empty logout_request.errors
38
+ assert_equal 'someone@example.org', logout_request.nameid
39
+ end
40
+
41
+ it "should be idempotent when the logout request is initialized with invalid data" do
42
+ assert !invalid_logout_request.is_valid?
43
+ assert_equal ['Invalid SAML Logout Request. Not match the saml-schema-protocol-2.0.xsd'], invalid_logout_request.errors
44
+ assert !invalid_logout_request.is_valid?
45
+ assert_equal ['Invalid SAML Logout Request. Not match the saml-schema-protocol-2.0.xsd'], invalid_logout_request.errors
46
+ end
47
+
48
+ it "should be idempotent when the logout request is initialized with valid data" do
49
+ assert logout_request.is_valid?
50
+ assert_empty logout_request.errors
51
+ assert logout_request.is_valid?
52
+ assert_empty logout_request.errors
53
+ end
54
+
55
+ it "raise error for invalid xml" do
56
+ invalid_logout_request.soft = false
57
+ assert_raises(OneLogin::RubySaml::ValidationError) { invalid_logout_request.is_valid? }
58
+ end
59
+ end
60
+
61
+ describe "#nameid" do
62
+ it "extract the value of the name id element" do
63
+ assert_equal "someone@example.org", logout_request.nameid
64
+ end
65
+ end
66
+
67
+ describe "#issuer" do
68
+ it "return the issuer inside the logout request" do
69
+ assert_equal "https://app.onelogin.com/saml/metadata/SOMEACCOUNT", logout_request.issuer
70
+ end
71
+ end
72
+
73
+ describe "#id" do
74
+ it "extract the value of the ID attribute" do
75
+ assert_equal "_c0348950-935b-0131-1060-782bcb56fcaa", logout_request.id
76
+ end
77
+ end
78
+
79
+ describe "#not_on_or_after" do
80
+ it "extract the value of the NotOnOrAfter attribute" do
81
+ time_value = '2014-07-17T01:01:48Z'
82
+ assert_equal nil, logout_request.not_on_or_after
83
+ logout_request.document.root.attributes['NotOnOrAfter'] = time_value
84
+ assert_equal Time.parse(time_value), logout_request.not_on_or_after
85
+ end
86
+ end
87
+
88
+ describe '#session_indexes' do
89
+ it "return empty array when no SessionIndex" do
90
+ assert_equal [], logout_request.session_indexes
91
+ end
92
+
93
+ it "return an Array with one SessionIndex" do
94
+ logout_request_with_session_index = OneLogin::RubySaml::SloLogoutrequest.new(logout_request_xml_with_session_index)
95
+ assert_equal ['_ea853497-c58a-408a-bc23-c849752d9741'], logout_request_with_session_index.session_indexes
96
+ end
97
+ end
98
+
99
+ describe "#validate_id" do
100
+ it "return true when there is a valid ID in the logout request" do
101
+ assert logout_request.send(:validate_id)
102
+ assert_empty logout_request.errors
103
+ end
104
+
105
+ it "return false when there is an invalid ID in the logout request" do
106
+ logout_request_blank = OneLogin::RubySaml::SloLogoutrequest.new('')
107
+ assert !logout_request_blank.send(:validate_id)
108
+ assert_includes logout_request_blank.errors, "Missing ID attribute on Logout Request"
109
+ end
110
+ end
111
+
112
+ describe "#validate_version" do
113
+ it "return true when the logout request is SAML 2.0 Version" do
114
+ assert logout_request.send(:validate_version)
115
+ end
116
+
117
+ it "return false when the logout request is not SAML 2.0 Version" do
118
+ logout_request_blank = OneLogin::RubySaml::SloLogoutrequest.new('')
119
+ assert !logout_request_blank.send(:validate_version)
120
+ assert_includes logout_request_blank.errors, "Unsupported SAML version"
121
+ end
122
+ end
123
+
124
+ describe "#validate_not_on_or_after" do
125
+ it "return true when the logout request has a valid NotOnOrAfter or does not contain any" do
126
+ assert logout_request.send(:validate_not_on_or_after)
127
+ assert_empty logout_request.errors
128
+ Timecop.freeze Time.parse('2011-06-14T18:25:01.516Z') do
129
+ time_value = '2014-07-17T01:01:48Z'
130
+ logout_request.document.root.attributes['NotOnOrAfter'] = time_value
131
+ assert logout_request.send(:validate_not_on_or_after)
132
+ assert_empty logout_request.errors
133
+ end
134
+ end
135
+
136
+ it "return false when the logout request has an invalid NotOnOrAfter" do
137
+ logout_request.document.root.attributes['NotOnOrAfter'] = '2014-07-17T01:01:48Z'
138
+ assert !logout_request.send(:validate_not_on_or_after)
139
+ assert /Current time is on or after NotOnOrAfter/.match(logout_request.errors[0])
140
+ end
141
+
142
+ it "raise when the logout request has an invalid NotOnOrAfter" do
143
+ logout_request.document.root.attributes['NotOnOrAfter'] = '2014-07-17T01:01:48Z'
144
+ logout_request.soft = false
145
+ assert_raises(OneLogin::RubySaml::ValidationError, "Current time is on or after NotOnOrAfter") do
146
+ logout_request.send(:validate_not_on_or_after)
147
+ end
148
+ end
149
+ end
150
+
151
+ describe "#validate_request_state" do
152
+ it "return true when valid logout request xml" do
153
+ assert logout_request.send(:validate_request_state)
154
+ assert_empty logout_request.errors
155
+ assert logout_request.send(:validate_request_state)
156
+ assert_empty logout_request.errors
157
+ end
158
+
159
+ it "return false when invalid logout request xml" do
160
+ logout_request_blank = OneLogin::RubySaml::SloLogoutrequest.new('')
161
+ logout_request_blank.soft = true
162
+ assert !logout_request_blank.send(:validate_request_state)
163
+ assert_includes logout_request_blank.errors, "Blank logout request"
164
+ end
165
+
166
+ it "raise error for invalid xml" do
167
+ logout_request_blank = OneLogin::RubySaml::SloLogoutrequest.new('')
168
+ logout_request_blank.soft = false
169
+ assert_raises(OneLogin::RubySaml::ValidationError, "Blank logout request") do
170
+ logout_request_blank.send(:validate_request_state)
171
+ end
172
+ end
173
+ end
174
+
175
+ describe "#validate_structure" do
176
+ it "return true when encountering a valid Logout Request xml" do
177
+ assert logout_request.send(:validate_structure)
178
+ assert_empty logout_request.errors
179
+ end
180
+
181
+ it "return false when encountering a Logout Request bad formatted" do
182
+ assert !invalid_logout_request.send(:validate_structure)
183
+ assert_includes invalid_logout_request.errors, "Invalid SAML Logout Request. Not match the saml-schema-protocol-2.0.xsd"
184
+ end
185
+
186
+ it "raise when encountering a Logout Request bad formatted" do
187
+ invalid_logout_request.soft = false
188
+ assert_raises(OneLogin::RubySaml::ValidationError, "Element '{urn:oasis:names:tc:SAML:2.0:assertion}Issuer': This element is not expected") do
189
+ invalid_logout_request.send(:validate_structure)
190
+ end
191
+ end
192
+ end
193
+
194
+ describe "#validate_issuer" do
195
+ it "return true when the issuer of the Logout Request matchs the IdP entityId" do
196
+ logout_request.settings.idp_entity_id = 'https://app.onelogin.com/saml/metadata/SOMEACCOUNT'
197
+ assert logout_request.send(:validate_issuer)
198
+ end
199
+ it "return false when the issuer of the Logout Request does not match the IdP entityId" do
200
+ logout_request.settings.idp_entity_id = 'http://idp.example.com/invalid'
201
+ assert !logout_request.send(:validate_issuer)
202
+ assert_includes logout_request.errors, "Doesn't match the issuer, expected: <#{logout_request.settings.idp_entity_id}>, but was: <https://app.onelogin.com/saml/metadata/SOMEACCOUNT>"
203
+ end
204
+ it "raise when the issuer of the Logout Request does not match the IdP entityId" do
205
+ logout_request.settings.idp_entity_id = 'http://idp.example.com/invalid'
206
+ logout_request.soft = false
207
+ assert_raises(OneLogin::RubySaml::ValidationError, "Doesn't match the issuer, expected: <#{logout_request.settings.idp_entity_id}>, but was: <https://app.onelogin.com/saml/metadata/SOMEACCOUNT>") do
208
+ logout_request.send(:validate_issuer)
209
+ end
210
+ end
211
+ end
212
+
213
+ describe "#validate_signature" do
214
+ before do
215
+ settings.idp_slo_target_url = "http://example.com?field=value"
216
+ settings.security[:logout_requests_signed] = true
217
+ settings.security[:embed_sign] = false
218
+ settings.certificate = ruby_saml_cert_text
219
+ settings.private_key = ruby_saml_key_text
220
+ settings.idp_cert = ruby_saml_cert_text
221
+ end
222
+
223
+ it "return true when valid RSA_SHA1 Signature" do
224
+ settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA1
225
+ params = OneLogin::RubySaml::Logoutrequest.new.create_params(settings, :RelayState => 'http://example.com')
226
+ params['RelayState'] = params[:RelayState]
227
+ options = {}
228
+ options[:get_params] = params
229
+ logout_request_sign_test = OneLogin::RubySaml::SloLogoutrequest.new(params['SAMLRequest'], options)
230
+ logout_request_sign_test.settings = settings
231
+ assert logout_request_sign_test.send(:validate_signature)
232
+ end
233
+
234
+ it "return true when valid RSA_SHA256 Signature" do
235
+ settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA256
236
+ params = OneLogin::RubySaml::Logoutrequest.new.create_params(settings, :RelayState => 'http://example.com')
237
+ options = {}
238
+ options[:get_params] = params
239
+ logout_request_sign_test = OneLogin::RubySaml::SloLogoutrequest.new(params['SAMLRequest'], options)
240
+ params['RelayState'] = params[:RelayState]
241
+ logout_request_sign_test.settings = settings
242
+ assert logout_request_sign_test.send(:validate_signature)
243
+ end
244
+
245
+ it "return false when invalid RSA_SHA1 Signature" do
246
+ settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA1
247
+ params = OneLogin::RubySaml::Logoutrequest.new.create_params(settings, :RelayState => 'http://example.com')
248
+ params['RelayState'] = 'http://invalid.exampcle.com'
249
+ params[:RelayState] = params['RelayState']
250
+ options = {}
251
+ options[:get_params] = params
252
+
253
+ logout_request_sign_test = OneLogin::RubySaml::SloLogoutrequest.new(params['SAMLRequest'], options)
254
+ logout_request_sign_test.settings = settings
255
+ assert !logout_request_sign_test.send(:validate_signature)
256
+ end
257
+
258
+ it "raise when invalid RSA_SHA1 Signature" do
259
+ settings.security[:signature_method] = XMLSecurity::Document::RSA_SHA1
260
+ settings.soft = false
261
+ params = OneLogin::RubySaml::Logoutrequest.new.create_params(settings, :RelayState => 'http://example.com')
262
+ params['RelayState'] = 'http://invalid.exampcle.com'
263
+ params[:RelayState] = params['RelayState']
264
+ options = {}
265
+ options[:get_params] = params
266
+ options[:settings] = settings
267
+
268
+ logout_request_sign_test = OneLogin::RubySaml::SloLogoutrequest.new(params['SAMLRequest'], options)
269
+ assert_raises(OneLogin::RubySaml::ValidationError, "Invalid Signature on Logout Request") do
270
+ logout_request_sign_test.send(:validate_signature)
271
+ end
272
+ end
273
+ end
274
+ end
275
+ end