ruby-saml 0.7.2 → 0.7.3
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of ruby-saml might be problematic. Click here for more details.
- data/.gitignore +1 -0
- data/Gemfile +8 -6
- data/README.md +18 -2
- data/lib/onelogin/ruby-saml/authrequest.rb +8 -5
- data/lib/onelogin/ruby-saml/logoutresponse.rb +2 -2
- data/lib/onelogin/ruby-saml/response.rb +16 -10
- data/lib/onelogin/ruby-saml/settings.rb +5 -2
- data/lib/onelogin/ruby-saml/validation_error.rb +1 -1
- data/lib/onelogin/ruby-saml/version.rb +1 -1
- data/lib/xml_security.rb +5 -4
- data/ruby-saml.gemspec +1 -1
- data/test/certificates/r1_certificate2_base64 +1 -0
- data/test/logoutresponse_test.rb +1 -1
- data/test/request_test.rb +17 -0
- data/test/response_test.rb +23 -3
- data/test/responses/r1_response6.xml.base64 +1 -0
- data/test/settings_test.rb +4 -1
- data/test/test_helper.rb +9 -1
- data/test/xml_security_test.rb +29 -19
- metadata +77 -59
data/.gitignore
CHANGED
data/Gemfile
CHANGED
@@ -4,10 +4,12 @@ gemspec
|
|
4
4
|
|
5
5
|
group :test do
|
6
6
|
gem "ruby-debug", "~> 0.10.4", :require => nil, :platforms => :ruby_18
|
7
|
-
gem "debugger", "~> 1.1
|
8
|
-
gem "shoulda"
|
9
|
-
gem "rake"
|
10
|
-
gem "mocha"
|
11
|
-
gem "nokogiri"
|
12
|
-
gem "timecop"
|
7
|
+
gem "debugger", "~> 1.1", :require => nil, :platforms => :ruby_19
|
8
|
+
gem "shoulda", "~> 2.11"
|
9
|
+
gem "rake", "~> 10"
|
10
|
+
gem "mocha", "~> 0.14"
|
11
|
+
gem "nokogiri", "~> 1.5"
|
12
|
+
gem "timecop", "<= 0.6.0"
|
13
|
+
gem "systemu", "~> 2"
|
14
|
+
gem "rspec", "~> 2"
|
13
15
|
end
|
data/README.md
CHANGED
@@ -90,17 +90,19 @@ What's left at this point, is to wrap it all up in a controller and point the in
|
|
90
90
|
If are using saml:AttributeStatement to transfare metadata, like the user name, you can access all the attributes through response.attributes. It
|
91
91
|
contains all the saml:AttributeStatement with its 'Name' as a indifferent key and the one saml:AttributeValue as value.
|
92
92
|
|
93
|
+
```ruby
|
93
94
|
response = Onelogin::Saml::Response.new(params[:SAMLResponse])
|
94
95
|
response.settings = saml_settings
|
95
96
|
|
96
97
|
response.attributes[:username]
|
98
|
+
```
|
97
99
|
|
98
100
|
## Service Provider Metadata
|
99
101
|
|
100
102
|
To form a trusted pair relationship with the IdP, the SP (you) need to provide metadata XML
|
101
|
-
to the IdP for various good reasons. (Caching, certificate lookups,
|
103
|
+
to the IdP for various good reasons. (Caching, certificate lookups, relaying party permissions, etc)
|
102
104
|
|
103
|
-
The class Onelogin::Saml::
|
105
|
+
The class Onelogin::Saml::Metadata takes care of this by reading the Settings and returning XML. All
|
104
106
|
you have to do is add a controller to return the data, then give this URL to the IdP administrator.
|
105
107
|
The metdata will be polled by the IdP every few minutes, so updating your settings should propagate
|
106
108
|
to the IdP settings.
|
@@ -116,6 +118,20 @@ to the IdP settings.
|
|
116
118
|
end
|
117
119
|
```
|
118
120
|
|
121
|
+
## Clock Drift
|
122
|
+
|
123
|
+
Server clocks tend to drift naturally. If during validation of the response you get the error "Current time is earlier than NotBefore condition" then this may be due to clock differences between your system and that of the Identity Provider.
|
124
|
+
|
125
|
+
First, ensure that both systems synchronize their clocks, using for example the industry standard [Network Time Protocol (NTP)](http://en.wikipedia.org/wiki/Network_Time_Protocol).
|
126
|
+
|
127
|
+
Even then you may experience intermittent issues though, because the clock of the Identity Provider may drift slightly ahead of your system clocks. To allow for a small amount of clock drift you can initialize the response passing in an option named `:allowed_clock_drift`. Its value must be given in a number (and/or fraction) of seconds. The value given is added to the current time at which the response is validated before it's tested against the `NotBefore` assertion. For example:
|
128
|
+
|
129
|
+
```ruby
|
130
|
+
response = Onelogin::Saml::Response.new(params[:SAMLResponse], :allowed_clock_drift => 1)
|
131
|
+
```
|
132
|
+
|
133
|
+
Make sure to keep the value as comfortably small as possible to keep security risks to a minimum.
|
134
|
+
|
119
135
|
## Note on Patches/Pull Requests
|
120
136
|
|
121
137
|
* Fork the project.
|
@@ -13,6 +13,7 @@ module Onelogin
|
|
13
13
|
params = {} if params.nil?
|
14
14
|
|
15
15
|
request_doc = create_authentication_xml_doc(settings)
|
16
|
+
request_doc.context[:attribute_quote] = :quote if settings.double_quote_xml_attribute_values
|
16
17
|
|
17
18
|
request = ""
|
18
19
|
request_doc.write(request)
|
@@ -35,7 +36,7 @@ module Onelogin
|
|
35
36
|
def create_authentication_xml_doc(settings)
|
36
37
|
uuid = "_" + UUID.new.generate
|
37
38
|
time = Time.now.utc.strftime("%Y-%m-%dT%H:%M:%SZ")
|
38
|
-
# Create AuthnRequest root element using REXML
|
39
|
+
# Create AuthnRequest root element using REXML
|
39
40
|
request_doc = REXML::Document.new
|
40
41
|
|
41
42
|
root = request_doc.add_element "samlp:AuthnRequest", { "xmlns:samlp" => "urn:oasis:names:tc:SAML:2.0:protocol" }
|
@@ -43,6 +44,8 @@ module Onelogin
|
|
43
44
|
root.attributes['IssueInstant'] = time
|
44
45
|
root.attributes['Version'] = "2.0"
|
45
46
|
root.attributes['Destination'] = settings.idp_sso_target_url unless settings.idp_sso_target_url.nil?
|
47
|
+
root.attributes['IsPassive'] = settings.passive unless settings.passive.nil?
|
48
|
+
root.attributes['ProtocolBinding'] = settings.protocol_binding unless settings.protocol_binding.nil?
|
46
49
|
|
47
50
|
# Conditionally defined elements based on settings
|
48
51
|
if settings.assertion_consumer_service_url != nil
|
@@ -53,7 +56,7 @@ module Onelogin
|
|
53
56
|
issuer.text = settings.issuer
|
54
57
|
end
|
55
58
|
if settings.name_identifier_format != nil
|
56
|
-
root.add_element "samlp:NameIDPolicy", {
|
59
|
+
root.add_element "samlp:NameIDPolicy", {
|
57
60
|
"xmlns:samlp" => "urn:oasis:names:tc:SAML:2.0:protocol",
|
58
61
|
# Might want to make AllowCreate a setting?
|
59
62
|
"AllowCreate" => "true",
|
@@ -62,14 +65,14 @@ module Onelogin
|
|
62
65
|
end
|
63
66
|
|
64
67
|
# BUG fix here -- if an authn_context is defined, add the tags with an "exact"
|
65
|
-
# match required for authentication to succeed. If this is not defined,
|
68
|
+
# match required for authentication to succeed. If this is not defined,
|
66
69
|
# the IdP will choose default rules for authentication. (Shibboleth IdP)
|
67
70
|
if settings.authn_context != nil
|
68
|
-
requested_context = root.add_element "samlp:RequestedAuthnContext", {
|
71
|
+
requested_context = root.add_element "samlp:RequestedAuthnContext", {
|
69
72
|
"xmlns:samlp" => "urn:oasis:names:tc:SAML:2.0:protocol",
|
70
73
|
"Comparison" => "exact",
|
71
74
|
}
|
72
|
-
class_ref = requested_context.add_element "saml:AuthnContextClassRef", {
|
75
|
+
class_ref = requested_context.add_element "saml:AuthnContextClassRef", {
|
73
76
|
"xmlns:saml" => "urn:oasis:names:tc:SAML:2.0:assertion",
|
74
77
|
}
|
75
78
|
class_ref.text = settings.authn_context
|
@@ -105,7 +105,7 @@ module Onelogin
|
|
105
105
|
if soft
|
106
106
|
@schema.validate(@xml).map{ return false }
|
107
107
|
else
|
108
|
-
@schema.validate(@xml).map{ |error|
|
108
|
+
@schema.validate(@xml).map{ |error| validation_error("#{error.message}\n\n#{@xml.to_s}") }
|
109
109
|
end
|
110
110
|
end
|
111
111
|
|
@@ -151,4 +151,4 @@ module Onelogin
|
|
151
151
|
end
|
152
152
|
end
|
153
153
|
end
|
154
|
-
end
|
154
|
+
end
|
@@ -78,7 +78,7 @@ module Onelogin
|
|
78
78
|
parse_time(node, "SessionNotOnOrAfter")
|
79
79
|
end
|
80
80
|
end
|
81
|
-
|
81
|
+
|
82
82
|
# Checks the status of the response for a "Success" code
|
83
83
|
def success?
|
84
84
|
@status_code ||= begin
|
@@ -92,6 +92,14 @@ module Onelogin
|
|
92
92
|
@conditions ||= xpath_first_from_signed_assertion('/a:Conditions')
|
93
93
|
end
|
94
94
|
|
95
|
+
def not_before
|
96
|
+
@not_before ||= parse_time(conditions, "NotBefore")
|
97
|
+
end
|
98
|
+
|
99
|
+
def not_on_or_after
|
100
|
+
@not_on_or_after ||= parse_time(conditions, "NotOnOrAfter")
|
101
|
+
end
|
102
|
+
|
95
103
|
def issuer
|
96
104
|
@issuer ||= begin
|
97
105
|
node = REXML::XPath.first(document, "/p:Response/a:Issuer", { "p" => PROTOCOL, "a" => ASSERTION })
|
@@ -110,7 +118,7 @@ module Onelogin
|
|
110
118
|
validate_structure(soft) &&
|
111
119
|
validate_response_state(soft) &&
|
112
120
|
validate_conditions(soft) &&
|
113
|
-
document.
|
121
|
+
document.validate_document(get_fingerprint, soft) &&
|
114
122
|
success?
|
115
123
|
end
|
116
124
|
|
@@ -161,16 +169,14 @@ module Onelogin
|
|
161
169
|
return true if conditions.nil?
|
162
170
|
return true if options[:skip_conditions]
|
163
171
|
|
164
|
-
|
165
|
-
|
166
|
-
|
167
|
-
|
172
|
+
now = Time.now.utc
|
173
|
+
|
174
|
+
if not_before && (now + (options[:allowed_clock_drift] || 0)) < not_before
|
175
|
+
return soft ? false : validation_error("Current time is earlier than NotBefore condition")
|
168
176
|
end
|
169
177
|
|
170
|
-
if
|
171
|
-
|
172
|
-
return soft ? false : validation_error("Current time is on or after NotOnOrAfter condition")
|
173
|
-
end
|
178
|
+
if not_on_or_after && now >= not_on_or_after
|
179
|
+
return soft ? false : validation_error("Current time is on or after NotOnOrAfter condition")
|
174
180
|
end
|
175
181
|
|
176
182
|
true
|
@@ -16,10 +16,13 @@ module Onelogin
|
|
16
16
|
attr_accessor :sessionindex
|
17
17
|
attr_accessor :assertion_consumer_logout_service_url
|
18
18
|
attr_accessor :compress_request
|
19
|
+
attr_accessor :double_quote_xml_attribute_values
|
20
|
+
attr_accessor :passive
|
21
|
+
attr_accessor :protocol_binding
|
19
22
|
|
20
23
|
private
|
21
|
-
|
22
|
-
DEFAULTS = {:compress_request => true}
|
24
|
+
|
25
|
+
DEFAULTS = {:compress_request => true, :double_quote_xml_attribute_values => false}
|
23
26
|
end
|
24
27
|
end
|
25
28
|
end
|
data/lib/xml_security.rb
CHANGED
@@ -44,9 +44,10 @@ module XMLSecurity
|
|
44
44
|
extract_signed_element_id
|
45
45
|
end
|
46
46
|
|
47
|
-
def
|
47
|
+
def validate_document(idp_cert_fingerprint, soft = true)
|
48
48
|
# get cert from response
|
49
49
|
cert_element = REXML::XPath.first(self, "//ds:X509Certificate", { "ds"=>DSIG })
|
50
|
+
raise Onelogin::Saml::ValidationError.new("Certificate element missing in response (ds:X509Certificate)") unless cert_element
|
50
51
|
base64_cert = cert_element.text
|
51
52
|
cert_text = Base64.decode64(base64_cert)
|
52
53
|
cert = OpenSSL::X509::Certificate.new(cert_text)
|
@@ -58,10 +59,10 @@ module XMLSecurity
|
|
58
59
|
return soft ? false : (raise Onelogin::Saml::ValidationError.new("Fingerprint mismatch"))
|
59
60
|
end
|
60
61
|
|
61
|
-
|
62
|
+
validate_signature(base64_cert, soft)
|
62
63
|
end
|
63
64
|
|
64
|
-
def
|
65
|
+
def validate_signature(base64_cert, soft = true)
|
65
66
|
# validate references
|
66
67
|
|
67
68
|
# check for inclusive namespaces
|
@@ -93,7 +94,7 @@ module XMLSecurity
|
|
93
94
|
|
94
95
|
hashed_element = document.at_xpath("//*[@ID='#{uri[1..-1]}']")
|
95
96
|
canon_algorithm = canon_algorithm REXML::XPath.first(ref, '//ds:CanonicalizationMethod', 'ds' => DSIG)
|
96
|
-
canon_hashed_element = hashed_element.canonicalize(canon_algorithm, inclusive_namespaces)
|
97
|
+
canon_hashed_element = hashed_element.canonicalize(canon_algorithm, inclusive_namespaces)
|
97
98
|
|
98
99
|
digest_algorithm = algorithm(REXML::XPath.first(ref, "//ds:DigestMethod"))
|
99
100
|
|
data/ruby-saml.gemspec
CHANGED
@@ -0,0 +1 @@
|
|
1
|
+
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
|
data/test/logoutresponse_test.rb
CHANGED
@@ -102,7 +102,7 @@ class RubySamlTest < Test::Unit::TestCase
|
|
102
102
|
should "raise error for invalid xml" do
|
103
103
|
logoutresponse = Onelogin::Saml::Logoutresponse.new(invalid_xml_response, settings)
|
104
104
|
|
105
|
-
assert_raises(
|
105
|
+
assert_raises(Onelogin::Saml::ValidationError) { logoutresponse.validate! }
|
106
106
|
end
|
107
107
|
end
|
108
108
|
|
data/test/request_test.rb
CHANGED
@@ -46,6 +46,23 @@ class RequestTest < Test::Unit::TestCase
|
|
46
46
|
assert_match /^<samlp:AuthnRequest/, decoded
|
47
47
|
end
|
48
48
|
|
49
|
+
should "create the SAMLRequest URL parameter with IsPassive" do
|
50
|
+
settings = Onelogin::Saml::Settings.new
|
51
|
+
settings.idp_sso_target_url = "http://example.com"
|
52
|
+
settings.passive = true
|
53
|
+
auth_url = Onelogin::Saml::Authrequest.new.create(settings)
|
54
|
+
assert auth_url =~ /^http:\/\/example\.com\?SAMLRequest=/
|
55
|
+
payload = CGI.unescape(auth_url.split("=").last)
|
56
|
+
decoded = Base64.decode64(payload)
|
57
|
+
|
58
|
+
zstream = Zlib::Inflate.new(-Zlib::MAX_WBITS)
|
59
|
+
inflated = zstream.inflate(decoded)
|
60
|
+
zstream.finish
|
61
|
+
zstream.close
|
62
|
+
|
63
|
+
assert_match /<samlp:AuthnRequest[^<]* IsPassive='true'/, inflated
|
64
|
+
end
|
65
|
+
|
49
66
|
should "accept extra parameters" do
|
50
67
|
settings = Onelogin::Saml::Settings.new
|
51
68
|
settings.idp_sso_target_url = "http://example.com"
|
data/test/response_test.rb
CHANGED
@@ -120,7 +120,7 @@ class RubySamlTest < Test::Unit::TestCase
|
|
120
120
|
settings = Onelogin::Saml::Settings.new
|
121
121
|
response.settings = settings
|
122
122
|
settings.idp_cert_fingerprint = "28:74:9B:E8:1F:E8:10:9C:A8:7C:A9:C3:E3:C5:01:6C:92:1C:B4:BA"
|
123
|
-
XMLSecurity::SignedDocument.any_instance.expects(:
|
123
|
+
XMLSecurity::SignedDocument.any_instance.expects(:validate_signature).returns(true)
|
124
124
|
assert response.validate!
|
125
125
|
end
|
126
126
|
|
@@ -133,6 +133,15 @@ class RubySamlTest < Test::Unit::TestCase
|
|
133
133
|
assert response.validate!
|
134
134
|
end
|
135
135
|
|
136
|
+
should "validate the digest" do
|
137
|
+
response = Onelogin::Saml::Response.new(r1_response_document_6)
|
138
|
+
response.stubs(:conditions).returns(nil)
|
139
|
+
settings = Onelogin::Saml::Settings.new
|
140
|
+
settings.idp_cert = Base64.decode64(r1_signature_2)
|
141
|
+
response.settings = settings
|
142
|
+
assert response.validate!
|
143
|
+
end
|
144
|
+
|
136
145
|
should "validate SAML 2.0 XML structure" do
|
137
146
|
resp_xml = Base64.decode64(response_document_4).gsub(/emailAddress/,'test')
|
138
147
|
response = Onelogin::Saml::Response.new(Base64.encode64(resp_xml))
|
@@ -175,6 +184,17 @@ class RubySamlTest < Test::Unit::TestCase
|
|
175
184
|
response = Onelogin::Saml::Response.new(response_document_5)
|
176
185
|
assert response.send(:validate_conditions, true)
|
177
186
|
end
|
187
|
+
|
188
|
+
should "optionally allow for clock drift" do
|
189
|
+
# The NotBefore condition in the document is 2011-06-14T18:21:01.516Z
|
190
|
+
Time.stubs(:now).returns(Time.parse("2011-06-14T18:21:01Z"))
|
191
|
+
response = Onelogin::Saml::Response.new(response_document_5, :allowed_clock_drift => 0.515)
|
192
|
+
assert !response.send(:validate_conditions, true)
|
193
|
+
|
194
|
+
Time.stubs(:now).returns(Time.parse("2011-06-14T18:21:01Z"))
|
195
|
+
response = Onelogin::Saml::Response.new(response_document_5, :allowed_clock_drift => 0.516)
|
196
|
+
assert response.send(:validate_conditions, true)
|
197
|
+
end
|
178
198
|
end
|
179
199
|
|
180
200
|
context "#attributes" do
|
@@ -220,13 +240,13 @@ class RubySamlTest < Test::Unit::TestCase
|
|
220
240
|
response = Onelogin::Saml::Response.new(response_document)
|
221
241
|
assert_equal "https://app.onelogin.com/saml/metadata/13590", response.issuer
|
222
242
|
end
|
223
|
-
|
243
|
+
|
224
244
|
should "return the issuer inside the response" do
|
225
245
|
response = Onelogin::Saml::Response.new(response_document_2)
|
226
246
|
assert_equal "wibble", response.issuer
|
227
247
|
end
|
228
248
|
end
|
229
|
-
|
249
|
+
|
230
250
|
context "#success" do
|
231
251
|
should "find a status code that says success" do
|
232
252
|
response = Onelogin::Saml::Response.new(response_document)
|
@@ -0,0 +1 @@
|
|
1
|
+
<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="_6c1ff6fb048c872b7cbd14566074f17be8d9c72837" Version="2.0" IssueInstant="2013-03-25T15:36:00Z" Destination="https://rpm.newrelic.com/accounts/136857/sso/saml/finalize" InResponseTo="_9e1f35d0-778f-0130-1da9-042b2b4fd265"><saml:Issuer>https://sso.wellspringworldwide.com/simplesaml/saml2/idp/metadata.php</saml:Issuer><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xs="http://www.w3.org/2001/XMLSchema" ID="_030583b5d7aa9f88438866fa61640a37c35e4fd647" Version="2.0" IssueInstant="2013-03-25T15:36:00Z"><saml:Issuer>https://sso.wellspringworldwide.com/simplesaml/saml2/idp/metadata.php</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
    <ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
  <ds:Reference URI="#_030583b5d7aa9f88438866fa61640a37c35e4fd647"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/><ds:DigestValue>tn77j1c1D4J7Oi3k5VUZR6b9se4=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>WBCiVQC6ealpisOsXQLNhaHozmG/BXk1oyEwa2VuACacLiR0ZeFORqssAmmZEOeueIwuLE1/8OgKz9FEafkDHznXxsLuux57ZOKdyq2mQye5/WWcOERmaQGxNDxDTW7hwPUP1KG2M16om9sstf53SI4GbH434g3pp4iP29KV+8oKzWXwUKPoAdQ1iOjD5cHMxf5OhAtlCXzoBma5w+yNrh/XUA2a6jmnmuvqgOKeTSusYiKbUHU018MyqQkrbZMqgt/R166ElUStspYJsKXjZX7XK9D8zGM5faAQ+gpQymATAkDO80k+UvPv8qYHWzgoD+Rh2E62i37d86dR3T4GNQ==</ds:SignatureValue>
<ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><saml:Subject><saml:NameID SPNameQualifier="rpm.newrelic.com" Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress">e40c0890745ce9250ad223b59090cc6dc5d1f5a1</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData NotOnOrAfter="2013-03-25T15:41:00Z" Recipient="https://rpm.newrelic.com/accounts/136857/sso/saml/finalize" InResponseTo="_9e1f35d0-778f-0130-1da9-042b2b4fd265"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2013-03-25T15:35:30Z" NotOnOrAfter="2013-03-25T15:41:00Z"><saml:AudienceRestriction><saml:Audience>rpm.newrelic.com</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2013-03-25T15:20:12Z" SessionNotOnOrAfter="2013-03-25T23:36:00Z" SessionIndex="_ff6785bd551b4675c0b60b7e26c1fbb7cf509ce999"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:Password</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute Name="homeDirectory" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">/home/kyle.baczynski</saml:AttributeValue></saml:Attribute><saml:Attribute Name="gidNumber" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">1047</saml:AttributeValue></saml:Attribute><saml:Attribute Name="uidNumber" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">1047</saml:AttributeValue></saml:Attribute><saml:Attribute Name="sshPublicKey" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+/u57kj9cQUsWqnD9SXcIMp+2P1whTDkaGgdOUKrHzMZlO0GkNOhdVkjPFxRkpfYZMl2WYdONBCb+Vfczrwrz4Sc8r/hQdAGiEbDc2KDvdOWRbDFdiRU8X7/whZi8MbmLufcuriQBfwzJDOcbcg8KFo7nFGrh6l+ZesgiYX/BWgZbjt4TxhxQXzBX2RApjwYKW9QFEvP+B9dqtq+zqlQWTSLEJfhm3KIWWQIDQa0u/BEFNbxLEUcGzptcPftjjKTJ3sd+poZSNXiQKJ83q5zXh36ALXB9E7r2NFS4yEtrzCVjz3jIxmOA4LTFRsSWetimwMsk/UqxPTiDyeBMCXOt Kyle Baczynski &lt;kyle.baczynski@wellspringworldwide.com&gt;</saml:AttributeValue></saml:Attribute><saml:Attribute Name="loginShell" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">/bin/zsh</saml:AttributeValue></saml:Attribute><saml:Attribute Name="shadowLastChange" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">1363119028</saml:AttributeValue></saml:Attribute><saml:Attribute Name="urn:oid:2.5.4.4" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">Baczynski</saml:AttributeValue></saml:Attribute><saml:Attribute Name="urn:oid:2.5.4.0" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">top</saml:AttributeValue><saml:AttributeValue xsi:type="xs:string">posixAccount</saml:AttributeValue><saml:AttributeValue xsi:type="xs:string">extensibleObject</saml:AttributeValue><saml:AttributeValue xsi:type="xs:string">account</saml:AttributeValue><saml:AttributeValue xsi:type="xs:string">ldapPublicKey</saml:AttributeValue></saml:Attribute><saml:Attribute Name="urn:oid:0.9.2342.19200300.100.1.3" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">kyle.baczynski@wellspringworldwide.com</saml:AttributeValue></saml:Attribute><saml:Attribute Name="urn:oid:2.5.4.42" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">Kyle</saml:AttributeValue></saml:Attribute><saml:Attribute Name="urn:oid:0.9.2342.19200300.100.1.1" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">kyle.baczynski</saml:AttributeValue></saml:Attribute><saml:Attribute Name="urn:oid:2.5.4.3" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">Kyle Baczynski</saml:AttributeValue></saml:Attribute><saml:Attribute Name="urn:oid:0.9.2342.19200300.100.1.5" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">Iced Tea</saml:AttributeValue></saml:Attribute><saml:Attribute Name="urn:oid:2.5.4.35" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">{SSHA}EPvWuunC1SZt6NNts/y7ipTIqULV6IUe</saml:AttributeValue></saml:Attribute><saml:Attribute Name="urn:oid:0.9.2342.19200300.100.1.9" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">*</saml:AttributeValue></saml:Attribute><saml:Attribute Name="urn:oid:2.16.840.1.113730.3.1.39" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml:AttributeValue xsi:type="xs:string">en</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>
|
data/test/settings_test.rb
CHANGED
@@ -11,7 +11,8 @@ class SettingsTest < Test::Unit::TestCase
|
|
11
11
|
:assertion_consumer_service_url, :issuer, :sp_name_qualifier,
|
12
12
|
:idp_sso_target_url, :idp_cert_fingerprint, :name_identifier_format,
|
13
13
|
:idp_slo_target_url, :name_identifier_value, :sessionindex,
|
14
|
-
:assertion_consumer_logout_service_url
|
14
|
+
:assertion_consumer_logout_service_url,
|
15
|
+
:passive, :protocol_binding
|
15
16
|
]
|
16
17
|
|
17
18
|
accessors.each do |accessor|
|
@@ -31,6 +32,8 @@ class SettingsTest < Test::Unit::TestCase
|
|
31
32
|
:idp_slo_target_url => "http://sso.muda.no/slo",
|
32
33
|
:idp_cert_fingerprint => "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00",
|
33
34
|
:name_identifier_format => "urn:oasis:names:tc:SAML:2.0:nameid-format:transient",
|
35
|
+
:passive => true,
|
36
|
+
:protocol_binding => 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST'
|
34
37
|
}
|
35
38
|
@settings = Onelogin::Saml::Settings.new(config)
|
36
39
|
|
data/test/test_helper.rb
CHANGED
@@ -1,8 +1,8 @@
|
|
1
1
|
require 'rubygems'
|
2
2
|
require 'test/unit'
|
3
3
|
require 'shoulda'
|
4
|
-
require 'mocha'
|
5
4
|
require 'ruby-debug'
|
5
|
+
require 'mocha/setup'
|
6
6
|
require 'timecop'
|
7
7
|
|
8
8
|
$LOAD_PATH.unshift(File.join(File.dirname(__FILE__), '..', 'lib'))
|
@@ -41,6 +41,10 @@ class Test::Unit::TestCase
|
|
41
41
|
@response_document5 ||= File.read(File.join(File.dirname(__FILE__), 'responses', 'response5.xml.base64'))
|
42
42
|
end
|
43
43
|
|
44
|
+
def r1_response_document_6
|
45
|
+
@response_document6 ||= File.read(File.join(File.dirname(__FILE__), 'responses', 'r1_response6.xml.base64'))
|
46
|
+
end
|
47
|
+
|
44
48
|
def ampersands_response
|
45
49
|
@ampersands_resposne ||= File.read(File.join(File.dirname(__FILE__), 'responses', 'response_with_ampersands.xml.base64'))
|
46
50
|
end
|
@@ -64,4 +68,8 @@ class Test::Unit::TestCase
|
|
64
68
|
@signature1 ||= File.read(File.join(File.dirname(__FILE__), 'certificates', 'certificate1'))
|
65
69
|
end
|
66
70
|
|
71
|
+
def r1_signature_2
|
72
|
+
@signature2 ||= File.read(File.join(File.dirname(__FILE__), 'certificates', 'r1_certificate2_base64'))
|
73
|
+
end
|
74
|
+
|
67
75
|
end
|
data/test/xml_security_test.rb
CHANGED
@@ -11,31 +11,31 @@ class XmlSecurityTest < Test::Unit::TestCase
|
|
11
11
|
end
|
12
12
|
|
13
13
|
should "should run validate without throwing NS related exceptions" do
|
14
|
-
assert !@document.
|
14
|
+
assert !@document.validate_signature(@base64cert, true)
|
15
15
|
end
|
16
16
|
|
17
17
|
should "should run validate with throwing NS related exceptions" do
|
18
18
|
assert_raise(Onelogin::Saml::ValidationError) do
|
19
|
-
@document.
|
19
|
+
@document.validate_signature(@base64cert, false)
|
20
20
|
end
|
21
21
|
end
|
22
|
-
|
22
|
+
|
23
23
|
should "not raise an error when softly validating the document multiple times" do
|
24
24
|
assert_nothing_raised do
|
25
|
-
2.times { @document.
|
25
|
+
2.times { @document.validate_signature(@base64cert, true) }
|
26
26
|
end
|
27
27
|
end
|
28
28
|
|
29
29
|
should "should raise Fingerprint mismatch" do
|
30
30
|
exception = assert_raise(Onelogin::Saml::ValidationError) do
|
31
|
-
@document.
|
31
|
+
@document.validate_document("no:fi:ng:er:pr:in:t", false)
|
32
32
|
end
|
33
33
|
assert_equal("Fingerprint mismatch", exception.message)
|
34
34
|
end
|
35
35
|
|
36
36
|
should "should raise Digest mismatch" do
|
37
37
|
exception = assert_raise(Onelogin::Saml::ValidationError) do
|
38
|
-
@document.
|
38
|
+
@document.validate_signature(@base64cert, false)
|
39
39
|
end
|
40
40
|
assert_equal("Digest mismatch", exception.message)
|
41
41
|
end
|
@@ -47,50 +47,60 @@ class XmlSecurityTest < Test::Unit::TestCase
|
|
47
47
|
document = XMLSecurity::SignedDocument.new(response)
|
48
48
|
base64cert = document.elements["//ds:X509Certificate"].text
|
49
49
|
exception = assert_raise(Onelogin::Saml::ValidationError) do
|
50
|
-
document.
|
50
|
+
document.validate_signature(base64cert, false)
|
51
51
|
end
|
52
52
|
assert_equal("Key validation error", exception.message)
|
53
53
|
end
|
54
|
+
|
55
|
+
should "raise validation error when the X509Certificate is missing" do
|
56
|
+
response = Base64.decode64(response_document)
|
57
|
+
response.sub!(/<ds:X509Certificate>.*<\/ds:X509Certificate>/, "")
|
58
|
+
document = XMLSecurity::SignedDocument.new(response)
|
59
|
+
exception = assert_raise(Onelogin::Saml::ValidationError) do
|
60
|
+
document.validate_document("a fingerprint", false) # The fingerprint isn't relevant to this test
|
61
|
+
end
|
62
|
+
assert_equal("Certificate element missing in response (ds:X509Certificate)", exception.message)
|
63
|
+
end
|
54
64
|
end
|
55
65
|
|
56
66
|
context "Algorithms" do
|
57
67
|
should "validate using SHA1" do
|
58
68
|
@document = XMLSecurity::SignedDocument.new(fixture(:adfs_response_sha1, false))
|
59
|
-
assert @document.
|
69
|
+
assert @document.validate_document("F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA:DD:B0:16:45:48:72")
|
60
70
|
end
|
61
71
|
|
62
72
|
should "validate using SHA256" do
|
63
73
|
@document = XMLSecurity::SignedDocument.new(fixture(:adfs_response_sha256, false))
|
64
|
-
assert @document.
|
74
|
+
assert @document.validate_document("28:74:9B:E8:1F:E8:10:9C:A8:7C:A9:C3:E3:C5:01:6C:92:1C:B4:BA")
|
65
75
|
end
|
66
76
|
|
67
77
|
should "validate using SHA384" do
|
68
78
|
@document = XMLSecurity::SignedDocument.new(fixture(:adfs_response_sha384, false))
|
69
|
-
assert @document.
|
79
|
+
assert @document.validate_document("F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA:DD:B0:16:45:48:72")
|
70
80
|
end
|
71
81
|
|
72
82
|
should "validate using SHA512" do
|
73
83
|
@document = XMLSecurity::SignedDocument.new(fixture(:adfs_response_sha512, false))
|
74
|
-
assert @document.
|
84
|
+
assert @document.validate_document("F1:3C:6B:80:90:5A:03:0E:6C:91:3E:5D:15:FA:DD:B0:16:45:48:72")
|
75
85
|
end
|
76
86
|
end
|
77
|
-
|
87
|
+
|
78
88
|
context "XmlSecurity::SignedDocument" do
|
79
|
-
|
89
|
+
|
80
90
|
context "#extract_inclusive_namespaces" do
|
81
91
|
should "support explicit namespace resolution for exclusive canonicalization" do
|
82
92
|
response = fixture(:open_saml_response, false)
|
83
93
|
document = XMLSecurity::SignedDocument.new(response)
|
84
94
|
inclusive_namespaces = document.send(:extract_inclusive_namespaces)
|
85
|
-
|
95
|
+
|
86
96
|
assert_equal %w[ xs ], inclusive_namespaces
|
87
97
|
end
|
88
|
-
|
98
|
+
|
89
99
|
should "support implicit namespace resolution for exclusive canonicalization" do
|
90
100
|
response = fixture(:no_signature_ns, false)
|
91
101
|
document = XMLSecurity::SignedDocument.new(response)
|
92
102
|
inclusive_namespaces = document.send(:extract_inclusive_namespaces)
|
93
|
-
|
103
|
+
|
94
104
|
assert_equal %w[ #default saml ds xs xsi ], inclusive_namespaces
|
95
105
|
end
|
96
106
|
|
@@ -110,10 +120,10 @@ class XmlSecurityTest < Test::Unit::TestCase
|
|
110
120
|
should "return an empty list when inclusive namespace element is missing" do
|
111
121
|
response = fixture(:no_signature_ns, false)
|
112
122
|
response.slice! %r{<InclusiveNamespaces xmlns="http://www.w3.org/2001/10/xml-exc-c14n#" PrefixList="#default saml ds xs xsi"/>}
|
113
|
-
|
123
|
+
|
114
124
|
document = XMLSecurity::SignedDocument.new(response)
|
115
125
|
inclusive_namespaces = document.send(:extract_inclusive_namespaces)
|
116
|
-
|
126
|
+
|
117
127
|
assert inclusive_namespaces.empty?
|
118
128
|
end
|
119
129
|
end
|
@@ -146,5 +156,5 @@ class XmlSecurityTest < Test::Unit::TestCase
|
|
146
156
|
end
|
147
157
|
|
148
158
|
end
|
149
|
-
|
159
|
+
|
150
160
|
end
|
metadata
CHANGED
@@ -1,72 +1,79 @@
|
|
1
|
-
--- !ruby/object:Gem::Specification
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
2
|
name: ruby-saml
|
3
|
-
version: !ruby/object:Gem::Version
|
4
|
-
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
hash: 5
|
5
5
|
prerelease:
|
6
|
+
segments:
|
7
|
+
- 0
|
8
|
+
- 7
|
9
|
+
- 3
|
10
|
+
version: 0.7.3
|
6
11
|
platform: ruby
|
7
|
-
authors:
|
12
|
+
authors:
|
8
13
|
- OneLogin LLC
|
9
14
|
autorequire:
|
10
15
|
bindir: bin
|
11
16
|
cert_chain: []
|
12
|
-
|
13
|
-
|
14
|
-
|
17
|
+
|
18
|
+
date: 2014-02-20 00:00:00 Z
|
19
|
+
dependencies:
|
20
|
+
- !ruby/object:Gem::Dependency
|
15
21
|
name: canonix
|
16
|
-
requirement: !ruby/object:Gem::Requirement
|
17
|
-
none: false
|
18
|
-
requirements:
|
19
|
-
- - '='
|
20
|
-
- !ruby/object:Gem::Version
|
21
|
-
version: 0.1.1
|
22
|
-
type: :runtime
|
23
22
|
prerelease: false
|
24
|
-
|
23
|
+
requirement: &id001 !ruby/object:Gem::Requirement
|
25
24
|
none: false
|
26
|
-
requirements:
|
27
|
-
- -
|
28
|
-
- !ruby/object:Gem::Version
|
25
|
+
requirements:
|
26
|
+
- - "="
|
27
|
+
- !ruby/object:Gem::Version
|
28
|
+
hash: 25
|
29
|
+
segments:
|
30
|
+
- 0
|
31
|
+
- 1
|
32
|
+
- 1
|
29
33
|
version: 0.1.1
|
30
|
-
|
34
|
+
type: :runtime
|
35
|
+
version_requirements: *id001
|
36
|
+
- !ruby/object:Gem::Dependency
|
31
37
|
name: uuid
|
32
|
-
|
38
|
+
prerelease: false
|
39
|
+
requirement: &id002 !ruby/object:Gem::Requirement
|
33
40
|
none: false
|
34
|
-
requirements:
|
41
|
+
requirements:
|
35
42
|
- - ~>
|
36
|
-
- !ruby/object:Gem::Version
|
37
|
-
|
43
|
+
- !ruby/object:Gem::Version
|
44
|
+
hash: 5
|
45
|
+
segments:
|
46
|
+
- 2
|
47
|
+
- 3
|
48
|
+
version: "2.3"
|
38
49
|
type: :runtime
|
50
|
+
version_requirements: *id002
|
51
|
+
- !ruby/object:Gem::Dependency
|
52
|
+
name: nokogiri
|
39
53
|
prerelease: false
|
40
|
-
|
54
|
+
requirement: &id003 !ruby/object:Gem::Requirement
|
41
55
|
none: false
|
42
|
-
requirements:
|
56
|
+
requirements:
|
43
57
|
- - ~>
|
44
|
-
- !ruby/object:Gem::Version
|
45
|
-
|
46
|
-
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
- - ! '>='
|
52
|
-
- !ruby/object:Gem::Version
|
53
|
-
version: '0'
|
58
|
+
- !ruby/object:Gem::Version
|
59
|
+
hash: 3
|
60
|
+
segments:
|
61
|
+
- 1
|
62
|
+
- 5
|
63
|
+
- 0
|
64
|
+
version: 1.5.0
|
54
65
|
type: :runtime
|
55
|
-
|
56
|
-
version_requirements: !ruby/object:Gem::Requirement
|
57
|
-
none: false
|
58
|
-
requirements:
|
59
|
-
- - ! '>='
|
60
|
-
- !ruby/object:Gem::Version
|
61
|
-
version: '0'
|
66
|
+
version_requirements: *id003
|
62
67
|
description: SAML toolkit for Ruby on Rails
|
63
68
|
email: support@onelogin.com
|
64
69
|
executables: []
|
70
|
+
|
65
71
|
extensions: []
|
66
|
-
|
72
|
+
|
73
|
+
extra_rdoc_files:
|
67
74
|
- LICENSE
|
68
75
|
- README.md
|
69
|
-
files:
|
76
|
+
files:
|
70
77
|
- .document
|
71
78
|
- .gitignore
|
72
79
|
- .travis.yml
|
@@ -91,6 +98,7 @@ files:
|
|
91
98
|
- lib/xml_security.rb
|
92
99
|
- ruby-saml.gemspec
|
93
100
|
- test/certificates/certificate1
|
101
|
+
- test/certificates/r1_certificate2_base64
|
94
102
|
- test/logoutrequest_test.rb
|
95
103
|
- test/logoutresponse_test.rb
|
96
104
|
- test/request_test.rb
|
@@ -102,6 +110,7 @@ files:
|
|
102
110
|
- test/responses/logoutresponse_fixtures.rb
|
103
111
|
- test/responses/no_signature_ns.xml
|
104
112
|
- test/responses/open_saml_response.xml
|
113
|
+
- test/responses/r1_response6.xml.base64
|
105
114
|
- test/responses/response1.xml.base64
|
106
115
|
- test/responses/response2.xml.base64
|
107
116
|
- test/responses/response3.xml.base64
|
@@ -117,31 +126,40 @@ files:
|
|
117
126
|
- test/xml_security_test.rb
|
118
127
|
homepage: http://github.com/onelogin/ruby-saml
|
119
128
|
licenses: []
|
129
|
+
|
120
130
|
post_install_message:
|
121
|
-
rdoc_options:
|
131
|
+
rdoc_options:
|
122
132
|
- --charset=UTF-8
|
123
|
-
require_paths:
|
133
|
+
require_paths:
|
124
134
|
- lib
|
125
|
-
required_ruby_version: !ruby/object:Gem::Requirement
|
135
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
126
136
|
none: false
|
127
|
-
requirements:
|
128
|
-
- -
|
129
|
-
- !ruby/object:Gem::Version
|
130
|
-
|
131
|
-
|
137
|
+
requirements:
|
138
|
+
- - ">="
|
139
|
+
- !ruby/object:Gem::Version
|
140
|
+
hash: 3
|
141
|
+
segments:
|
142
|
+
- 0
|
143
|
+
version: "0"
|
144
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
132
145
|
none: false
|
133
|
-
requirements:
|
134
|
-
- -
|
135
|
-
- !ruby/object:Gem::Version
|
136
|
-
|
146
|
+
requirements:
|
147
|
+
- - ">="
|
148
|
+
- !ruby/object:Gem::Version
|
149
|
+
hash: 3
|
150
|
+
segments:
|
151
|
+
- 0
|
152
|
+
version: "0"
|
137
153
|
requirements: []
|
154
|
+
|
138
155
|
rubyforge_project: http://www.rubygems.org/gems/ruby-saml
|
139
|
-
rubygems_version: 1.8.
|
156
|
+
rubygems_version: 1.8.25
|
140
157
|
signing_key:
|
141
158
|
specification_version: 3
|
142
159
|
summary: SAML Ruby Tookit
|
143
|
-
test_files:
|
160
|
+
test_files:
|
144
161
|
- test/certificates/certificate1
|
162
|
+
- test/certificates/r1_certificate2_base64
|
145
163
|
- test/logoutrequest_test.rb
|
146
164
|
- test/logoutresponse_test.rb
|
147
165
|
- test/request_test.rb
|
@@ -153,6 +171,7 @@ test_files:
|
|
153
171
|
- test/responses/logoutresponse_fixtures.rb
|
154
172
|
- test/responses/no_signature_ns.xml
|
155
173
|
- test/responses/open_saml_response.xml
|
174
|
+
- test/responses/r1_response6.xml.base64
|
156
175
|
- test/responses/response1.xml.base64
|
157
176
|
- test/responses/response2.xml.base64
|
158
177
|
- test/responses/response3.xml.base64
|
@@ -166,4 +185,3 @@ test_files:
|
|
166
185
|
- test/settings_test.rb
|
167
186
|
- test/test_helper.rb
|
168
187
|
- test/xml_security_test.rb
|
169
|
-
has_rdoc:
|