ruby-saml 0.8.18 → 0.9

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of ruby-saml might be problematic. Click here for more details.

Files changed (90) hide show
  1. checksums.yaml +4 -4
  2. data/.gitignore +1 -0
  3. data/.travis.yml +1 -6
  4. data/Gemfile +2 -12
  5. data/README.md +363 -35
  6. data/Rakefile +14 -0
  7. data/changelog.md +22 -9
  8. data/lib/onelogin/ruby-saml/attribute_service.rb +34 -0
  9. data/lib/onelogin/ruby-saml/attributes.rb +26 -64
  10. data/lib/onelogin/ruby-saml/authrequest.rb +47 -93
  11. data/lib/onelogin/ruby-saml/idp_metadata_parser.rb +87 -0
  12. data/lib/onelogin/ruby-saml/logoutrequest.rb +36 -100
  13. data/lib/onelogin/ruby-saml/logoutresponse.rb +25 -35
  14. data/lib/onelogin/ruby-saml/metadata.rb +46 -16
  15. data/lib/onelogin/ruby-saml/response.rb +63 -373
  16. data/lib/onelogin/ruby-saml/saml_message.rb +78 -0
  17. data/lib/onelogin/ruby-saml/settings.rb +54 -122
  18. data/lib/onelogin/ruby-saml/slo_logoutrequest.rb +25 -71
  19. data/lib/onelogin/ruby-saml/slo_logoutresponse.rb +37 -102
  20. data/lib/onelogin/ruby-saml/utils.rb +32 -199
  21. data/lib/onelogin/ruby-saml/version.rb +1 -1
  22. data/lib/ruby-saml.rb +5 -2
  23. data/lib/schemas/{saml20assertion_schema.xsd → saml-schema-assertion-2.0.xsd} +283 -283
  24. data/lib/schemas/saml-schema-authn-context-2.0.xsd +23 -0
  25. data/lib/schemas/saml-schema-authn-context-types-2.0.xsd +821 -0
  26. data/lib/schemas/saml-schema-metadata-2.0.xsd +339 -0
  27. data/lib/schemas/{saml20protocol_schema.xsd → saml-schema-protocol-2.0.xsd} +302 -302
  28. data/lib/schemas/sstc-metadata-attr.xsd +35 -0
  29. data/lib/schemas/sstc-saml-attribute-ext.xsd +25 -0
  30. data/lib/schemas/sstc-saml-metadata-algsupport-v1.0.xsd +41 -0
  31. data/lib/schemas/sstc-saml-metadata-ui-v1.0.xsd +89 -0
  32. data/lib/schemas/{xenc_schema.xsd → xenc-schema.xsd} +1 -11
  33. data/lib/schemas/xml.xsd +287 -0
  34. data/lib/schemas/{xmldsig_schema.xsd → xmldsig-core-schema.xsd} +0 -9
  35. data/lib/xml_security.rb +83 -235
  36. data/ruby-saml.gemspec +1 -0
  37. data/test/idp_metadata_parser_test.rb +54 -0
  38. data/test/logoutrequest_test.rb +68 -155
  39. data/test/logoutresponse_test.rb +43 -32
  40. data/test/metadata_test.rb +87 -0
  41. data/test/request_test.rb +102 -99
  42. data/test/response_test.rb +181 -495
  43. data/test/responses/idp_descriptor.xml +3 -0
  44. data/test/responses/logoutresponse_fixtures.rb +7 -8
  45. data/test/responses/response_no_cert_and_encrypted_attrs.xml +29 -0
  46. data/test/responses/response_with_multiple_attribute_values.xml +1 -1
  47. data/test/responses/slo_request.xml +4 -0
  48. data/test/settings_test.rb +25 -112
  49. data/test/slo_logoutrequest_test.rb +40 -50
  50. data/test/slo_logoutresponse_test.rb +86 -185
  51. data/test/test_helper.rb +27 -102
  52. data/test/xml_security_test.rb +114 -337
  53. metadata +30 -81
  54. data/lib/onelogin/ruby-saml/setting_error.rb +0 -6
  55. data/test/certificates/certificate.der +0 -0
  56. data/test/certificates/formatted_certificate +0 -14
  57. data/test/certificates/formatted_chained_certificate +0 -42
  58. data/test/certificates/formatted_private_key +0 -12
  59. data/test/certificates/formatted_rsa_private_key +0 -12
  60. data/test/certificates/invalid_certificate1 +0 -1
  61. data/test/certificates/invalid_certificate2 +0 -1
  62. data/test/certificates/invalid_certificate3 +0 -12
  63. data/test/certificates/invalid_chained_certificate1 +0 -1
  64. data/test/certificates/invalid_private_key1 +0 -1
  65. data/test/certificates/invalid_private_key2 +0 -1
  66. data/test/certificates/invalid_private_key3 +0 -10
  67. data/test/certificates/invalid_rsa_private_key1 +0 -1
  68. data/test/certificates/invalid_rsa_private_key2 +0 -1
  69. data/test/certificates/invalid_rsa_private_key3 +0 -10
  70. data/test/certificates/ruby-saml-2.crt +0 -15
  71. data/test/requests/logoutrequest_fixtures.rb +0 -47
  72. data/test/responses/encrypted_new_attack.xml.base64 +0 -1
  73. data/test/responses/invalids/invalid_issuer_assertion.xml.base64 +0 -1
  74. data/test/responses/invalids/invalid_issuer_message.xml.base64 +0 -1
  75. data/test/responses/invalids/multiple_signed.xml.base64 +0 -1
  76. data/test/responses/invalids/no_signature.xml.base64 +0 -1
  77. data/test/responses/invalids/response_with_concealed_signed_assertion.xml +0 -51
  78. data/test/responses/invalids/response_with_doubled_signed_assertion.xml +0 -49
  79. data/test/responses/invalids/signature_wrapping_attack.xml.base64 +0 -1
  80. data/test/responses/response_node_text_attack.xml.base64 +0 -1
  81. data/test/responses/response_with_concealed_signed_assertion.xml +0 -51
  82. data/test/responses/response_with_doubled_signed_assertion.xml +0 -49
  83. data/test/responses/response_with_multiple_attribute_statements.xml +0 -72
  84. data/test/responses/response_with_signed_assertion_3.xml +0 -30
  85. data/test/responses/response_with_signed_message_and_assertion.xml +0 -34
  86. data/test/responses/response_with_undefined_recipient.xml.base64 +0 -1
  87. data/test/responses/response_wrapped.xml.base64 +0 -150
  88. data/test/responses/valid_response.xml.base64 +0 -1
  89. data/test/responses/valid_response_without_x509certificate.xml.base64 +0 -1
  90. data/test/utils_test.rb +0 -231
@@ -1,211 +1,44 @@
1
- if RUBY_VERSION < '1.9'
2
- require 'uuid'
3
- else
4
- require 'securerandom'
5
- end
6
-
7
- require "base64"
8
- require "zlib"
9
-
10
1
  module OneLogin
11
2
  module RubySaml
12
-
13
- # SAML2 Auxiliary class
14
- #
15
3
  class Utils
16
- @@uuid_generator = UUID.new if RUBY_VERSION < '1.9'
17
-
18
- BASE64_FORMAT = %r(\A([A-Za-z0-9+/]{4})*([A-Za-z0-9+/]{2}==|[A-Za-z0-9+/]{3}=)?\Z)
19
-
20
- # Given a REXML::Element instance, return the concatenation of all child text nodes. Assumes
21
- # that there all children other than text nodes can be ignored (e.g. comments). If nil is
22
- # passed, nil will be returned.
23
- def self.element_text(element)
24
- element.texts.map(&:value).join if element
25
- end
26
-
27
- # Return a properly formatted x509 certificate
28
- #
29
- # @param cert [String] The original certificate
30
- # @return [String] The formatted certificate
31
- #
32
- def self.format_cert(cert)
33
- # don't try to format an encoded certificate or if is empty or nil
34
- if cert.respond_to?(:ascii_only?)
35
- return cert if cert.nil? || cert.empty? || !cert.ascii_only?
36
- else
37
- return cert if cert.nil? || cert.empty? || cert.match(/\x0d/)
38
- end
39
-
40
- if cert.scan(/BEGIN CERTIFICATE/).length > 1
41
- formatted_cert = []
42
- cert.scan(/-{5}BEGIN CERTIFICATE-{5}[\n\r]?.*?-{5}END CERTIFICATE-{5}[\n\r]?/m) {|c|
43
- formatted_cert << format_cert(c)
44
- }
45
- formatted_cert.join("\n")
46
- else
47
- cert = cert.gsub(/\-{5}\s?(BEGIN|END) CERTIFICATE\s?\-{5}/, "")
48
- cert = cert.gsub(/\r/, "")
49
- cert = cert.gsub(/\n/, "")
50
- cert = cert.gsub(/\s/, "")
51
- cert = cert.scan(/.{1,64}/)
52
- cert = cert.join("\n")
53
- "-----BEGIN CERTIFICATE-----\n#{cert}\n-----END CERTIFICATE-----"
4
+ def self.format_cert(cert, heads=true)
5
+ cert = cert.delete("\n").delete("\r").delete("\x0D")
6
+ if cert
7
+ cert = cert.gsub('-----BEGIN CERTIFICATE-----', '')
8
+ cert = cert.gsub('-----END CERTIFICATE-----', '')
9
+ cert = cert.gsub(' ', '')
10
+
11
+ if heads
12
+ cert = cert.scan(/.{1,64}/).join("\n")+"\n"
13
+ cert = "-----BEGIN CERTIFICATE-----\n" + cert + "-----END CERTIFICATE-----\n"
14
+ end
54
15
  end
55
- end
56
-
57
- # Return a properly formatted private key
58
- #
59
- # @param key [String] The original private key
60
- # @return [String] The formatted private key
61
- #
62
- def self.format_private_key(key)
63
- # don't try to format an encoded private key or if is empty
64
- return key if key.nil? || key.empty? || key.match(/\x0d/)
65
-
66
- # is this an rsa key?
67
- rsa_key = key.match("RSA PRIVATE KEY")
68
- key = key.gsub(/\-{5}\s?(BEGIN|END)( RSA)? PRIVATE KEY\s?\-{5}/, "")
69
- key = key.gsub(/\n/, "")
70
- key = key.gsub(/\r/, "")
71
- key = key.gsub(/\s/, "")
72
- key = key.scan(/.{1,64}/)
73
- key = key.join("\n")
74
- key_label = rsa_key ? "RSA PRIVATE KEY" : "PRIVATE KEY"
75
- "-----BEGIN #{key_label}-----\n#{key}\n-----END #{key_label}-----"
76
- end
77
-
78
- # Build the Query String signature that will be used in the HTTP-Redirect binding
79
- # to generate the Signature
80
- # @param params [Hash] Parameters to build the Query String
81
- # @option params [String] :type 'SAMLRequest' or 'SAMLResponse'
82
- # @option params [String] :data Base64 encoded SAMLRequest or SAMLResponse
83
- # @option params [String] :relay_state The RelayState parameter
84
- # @option params [String] :sig_alg The SigAlg parameter
85
- # @return [String] The Query String
86
- #
87
- def self.build_query(params)
88
- type, data, relay_state, sig_alg = [:type, :data, :relay_state, :sig_alg].map { |k| params[k]}
89
- url_string = "#{type}=#{CGI.escape(data)}"
90
- url_string << "&RelayState=#{CGI.escape(relay_state)}" if relay_state
91
- url_string << "&SigAlg=#{CGI.escape(sig_alg)}"
92
- end
93
-
94
- def self.uuid
95
- RUBY_VERSION < '1.9' ? "_#{@@uuid_generator.generate}" : "_#{SecureRandom.uuid}"
96
- end
97
-
98
- # Build the status error message
99
- # @param status_code [String] StatusCode value
100
- # @param status_message [Strig] StatusMessage value
101
- # @return [String] The status error message
102
- def self.status_error_msg(error_msg, raw_status_code = nil, status_message = nil)
103
- unless raw_status_code.nil?
104
- if raw_status_code.include? "|"
105
- status_codes = raw_status_code.split(' | ')
106
- values = status_codes.collect do |status_code|
107
- status_code.split(':').last
16
+ cert
17
+ end
18
+
19
+ def self.format_private_key(key, heads=true)
20
+ key = key.delete("\n").delete("\r").delete("\x0D")
21
+ if key
22
+ if key.index('-----BEGIN PRIVATE KEY-----') != nil
23
+ key = key.gsub('-----BEGIN PRIVATE KEY-----', '')
24
+ key = key.gsub('-----END PRIVATE KEY-----', '')
25
+ key = key.gsub(' ', '')
26
+ if heads
27
+ key = key.scan(/.{1,64}/).join("\n")+"\n"
28
+ key = "-----BEGIN PRIVATE KEY-----\n" + key + "-----END PRIVATE KEY-----\n"
108
29
  end
109
- printable_code = values.join(" => ")
110
30
  else
111
- printable_code = raw_status_code.split(':').last
31
+ key = key.gsub('-----BEGIN RSA PRIVATE KEY-----', '')
32
+ key = key.gsub('-----END RSA PRIVATE KEY-----', '')
33
+ key = key.gsub(' ', '')
34
+ if heads
35
+ key = key.scan(/.{1,64}/).join("\n")+"\n"
36
+ key = "-----BEGIN RSA PRIVATE KEY-----\n" + key + "-----END RSA PRIVATE KEY-----\n"
37
+ end
112
38
  end
113
- error_msg << ', was ' + printable_code
114
- end
115
-
116
- unless status_message.nil?
117
- error_msg << ' -> ' + status_message
118
39
  end
119
-
120
- error_msg
121
- end
122
-
123
- # Base64 decode and try also to inflate a SAML Message
124
- # @param saml [String] The deflated and encoded SAML Message
125
- # @return [String] The plain SAML Message
126
- #
127
- def self.decode_raw_saml(saml)
128
- return saml unless base64_encoded?(saml)
129
-
130
- decoded = decode(saml)
131
- begin
132
- inflate(decoded)
133
- rescue
134
- decoded
135
- end
136
- end
137
-
138
- # Base 64 decode method
139
- # @param string [String] The string message
140
- # @return [String] The decoded string
141
- #
142
- def self.decode(string)
143
- Base64.decode64(string)
144
- end
145
-
146
- # Base 64 encode method
147
- # @param string [String] The string
148
- # @return [String] The encoded string
149
- #
150
- def self.encode(string)
151
- if Base64.respond_to?('strict_encode64')
152
- Base64.strict_encode64(string)
153
- else
154
- Base64.encode64(string).gsub(/\n/, "")
155
- end
156
- end
157
-
158
- # Check if a string is base64 encoded
159
- # @param string [String] string to check the encoding of
160
- # @return [true, false] whether or not the string is base64 encoded
161
- #
162
- def self.base64_encoded?(string)
163
- !!string.gsub(/[\r\n]|\\r|\\n|\s/, "").match(BASE64_FORMAT)
164
- end
165
-
166
- # Inflate method
167
- # @param deflated [String] The string
168
- # @return [String] The inflated string
169
- #
170
- def self.inflate(deflated)
171
- Zlib::Inflate.new(-Zlib::MAX_WBITS).inflate(deflated)
172
- end
173
-
174
- # Deflate method
175
- # @param inflated [String] The string
176
- # @return [String] The deflated string
177
- #
178
- def self.deflate(inflated)
179
- Zlib::Deflate.deflate(inflated, 9)[2..-5]
180
- end
181
-
182
- # Given two strings, attempt to match them as URIs using Rails' parse method. If they can be parsed,
183
- # then the fully-qualified domain name and the host should performa a case-insensitive match, per the
184
- # RFC for URIs. If Rails can not parse the string in to URL pieces, return a boolean match of the
185
- # two strings. This maintains the previous functionality.
186
- # @return [Boolean]
187
- def self.uri_match?(destination_url, settings_url)
188
- dest_uri = URI.parse(destination_url)
189
- acs_uri = URI.parse(settings_url)
190
-
191
- if dest_uri.scheme.nil? || acs_uri.scheme.nil? || dest_uri.host.nil? || acs_uri.host.nil?
192
- raise URI::InvalidURIError
193
- else
194
- dest_uri.scheme.downcase == acs_uri.scheme.downcase &&
195
- dest_uri.host.downcase == acs_uri.host.downcase &&
196
- dest_uri.path == acs_uri.path &&
197
- dest_uri.query == acs_uri.query
198
- end
199
- rescue URI::InvalidURIError
200
- original_uri_match?(destination_url, settings_url)
201
- end
202
-
203
- # If Rails' URI.parse can't match to valid URL, default back to the original matching service.
204
- # @return [Boolean]
205
- def self.original_uri_match?(destination_url, settings_url)
206
- destination_url == settings_url
207
40
  end
208
41
 
209
42
  end
210
43
  end
211
- end
44
+ end
@@ -1,5 +1,5 @@
1
1
  module OneLogin
2
2
  module RubySaml
3
- VERSION = '0.8.18'
3
+ VERSION = '0.9'
4
4
  end
5
5
  end
data/lib/ruby-saml.rb CHANGED
@@ -1,13 +1,16 @@
1
1
  require 'onelogin/ruby-saml/logging'
2
+ require 'onelogin/ruby-saml/saml_message'
2
3
  require 'onelogin/ruby-saml/authrequest'
3
4
  require 'onelogin/ruby-saml/logoutrequest'
4
5
  require 'onelogin/ruby-saml/logoutresponse'
6
+ require 'onelogin/ruby-saml/attributes'
5
7
  require 'onelogin/ruby-saml/slo_logoutrequest'
6
8
  require 'onelogin/ruby-saml/slo_logoutresponse'
7
9
  require 'onelogin/ruby-saml/response'
8
10
  require 'onelogin/ruby-saml/settings'
9
- require 'onelogin/ruby-saml/utils'
11
+ require 'onelogin/ruby-saml/attribute_service'
10
12
  require 'onelogin/ruby-saml/validation_error'
11
13
  require 'onelogin/ruby-saml/metadata'
14
+ require 'onelogin/ruby-saml/idp_metadata_parser'
15
+ require 'onelogin/ruby-saml/utils'
12
16
  require 'onelogin/ruby-saml/version'
13
- require 'onelogin/ruby-saml/attributes'