ruby-saml 0.8.18 → 0.9
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of ruby-saml might be problematic. Click here for more details.
- checksums.yaml +4 -4
- data/.gitignore +1 -0
- data/.travis.yml +1 -6
- data/Gemfile +2 -12
- data/README.md +363 -35
- data/Rakefile +14 -0
- data/changelog.md +22 -9
- data/lib/onelogin/ruby-saml/attribute_service.rb +34 -0
- data/lib/onelogin/ruby-saml/attributes.rb +26 -64
- data/lib/onelogin/ruby-saml/authrequest.rb +47 -93
- data/lib/onelogin/ruby-saml/idp_metadata_parser.rb +87 -0
- data/lib/onelogin/ruby-saml/logoutrequest.rb +36 -100
- data/lib/onelogin/ruby-saml/logoutresponse.rb +25 -35
- data/lib/onelogin/ruby-saml/metadata.rb +46 -16
- data/lib/onelogin/ruby-saml/response.rb +63 -373
- data/lib/onelogin/ruby-saml/saml_message.rb +78 -0
- data/lib/onelogin/ruby-saml/settings.rb +54 -122
- data/lib/onelogin/ruby-saml/slo_logoutrequest.rb +25 -71
- data/lib/onelogin/ruby-saml/slo_logoutresponse.rb +37 -102
- data/lib/onelogin/ruby-saml/utils.rb +32 -199
- data/lib/onelogin/ruby-saml/version.rb +1 -1
- data/lib/ruby-saml.rb +5 -2
- data/lib/schemas/{saml20assertion_schema.xsd → saml-schema-assertion-2.0.xsd} +283 -283
- data/lib/schemas/saml-schema-authn-context-2.0.xsd +23 -0
- data/lib/schemas/saml-schema-authn-context-types-2.0.xsd +821 -0
- data/lib/schemas/saml-schema-metadata-2.0.xsd +339 -0
- data/lib/schemas/{saml20protocol_schema.xsd → saml-schema-protocol-2.0.xsd} +302 -302
- data/lib/schemas/sstc-metadata-attr.xsd +35 -0
- data/lib/schemas/sstc-saml-attribute-ext.xsd +25 -0
- data/lib/schemas/sstc-saml-metadata-algsupport-v1.0.xsd +41 -0
- data/lib/schemas/sstc-saml-metadata-ui-v1.0.xsd +89 -0
- data/lib/schemas/{xenc_schema.xsd → xenc-schema.xsd} +1 -11
- data/lib/schemas/xml.xsd +287 -0
- data/lib/schemas/{xmldsig_schema.xsd → xmldsig-core-schema.xsd} +0 -9
- data/lib/xml_security.rb +83 -235
- data/ruby-saml.gemspec +1 -0
- data/test/idp_metadata_parser_test.rb +54 -0
- data/test/logoutrequest_test.rb +68 -155
- data/test/logoutresponse_test.rb +43 -32
- data/test/metadata_test.rb +87 -0
- data/test/request_test.rb +102 -99
- data/test/response_test.rb +181 -495
- data/test/responses/idp_descriptor.xml +3 -0
- data/test/responses/logoutresponse_fixtures.rb +7 -8
- data/test/responses/response_no_cert_and_encrypted_attrs.xml +29 -0
- data/test/responses/response_with_multiple_attribute_values.xml +1 -1
- data/test/responses/slo_request.xml +4 -0
- data/test/settings_test.rb +25 -112
- data/test/slo_logoutrequest_test.rb +40 -50
- data/test/slo_logoutresponse_test.rb +86 -185
- data/test/test_helper.rb +27 -102
- data/test/xml_security_test.rb +114 -337
- metadata +30 -81
- data/lib/onelogin/ruby-saml/setting_error.rb +0 -6
- data/test/certificates/certificate.der +0 -0
- data/test/certificates/formatted_certificate +0 -14
- data/test/certificates/formatted_chained_certificate +0 -42
- data/test/certificates/formatted_private_key +0 -12
- data/test/certificates/formatted_rsa_private_key +0 -12
- data/test/certificates/invalid_certificate1 +0 -1
- data/test/certificates/invalid_certificate2 +0 -1
- data/test/certificates/invalid_certificate3 +0 -12
- data/test/certificates/invalid_chained_certificate1 +0 -1
- data/test/certificates/invalid_private_key1 +0 -1
- data/test/certificates/invalid_private_key2 +0 -1
- data/test/certificates/invalid_private_key3 +0 -10
- data/test/certificates/invalid_rsa_private_key1 +0 -1
- data/test/certificates/invalid_rsa_private_key2 +0 -1
- data/test/certificates/invalid_rsa_private_key3 +0 -10
- data/test/certificates/ruby-saml-2.crt +0 -15
- data/test/requests/logoutrequest_fixtures.rb +0 -47
- data/test/responses/encrypted_new_attack.xml.base64 +0 -1
- data/test/responses/invalids/invalid_issuer_assertion.xml.base64 +0 -1
- data/test/responses/invalids/invalid_issuer_message.xml.base64 +0 -1
- data/test/responses/invalids/multiple_signed.xml.base64 +0 -1
- data/test/responses/invalids/no_signature.xml.base64 +0 -1
- data/test/responses/invalids/response_with_concealed_signed_assertion.xml +0 -51
- data/test/responses/invalids/response_with_doubled_signed_assertion.xml +0 -49
- data/test/responses/invalids/signature_wrapping_attack.xml.base64 +0 -1
- data/test/responses/response_node_text_attack.xml.base64 +0 -1
- data/test/responses/response_with_concealed_signed_assertion.xml +0 -51
- data/test/responses/response_with_doubled_signed_assertion.xml +0 -49
- data/test/responses/response_with_multiple_attribute_statements.xml +0 -72
- data/test/responses/response_with_signed_assertion_3.xml +0 -30
- data/test/responses/response_with_signed_message_and_assertion.xml +0 -34
- data/test/responses/response_with_undefined_recipient.xml.base64 +0 -1
- data/test/responses/response_wrapped.xml.base64 +0 -150
- data/test/responses/valid_response.xml.base64 +0 -1
- data/test/responses/valid_response_without_x509certificate.xml.base64 +0 -1
- data/test/utils_test.rb +0 -231
@@ -1,211 +1,44 @@
|
|
1
|
-
if RUBY_VERSION < '1.9'
|
2
|
-
require 'uuid'
|
3
|
-
else
|
4
|
-
require 'securerandom'
|
5
|
-
end
|
6
|
-
|
7
|
-
require "base64"
|
8
|
-
require "zlib"
|
9
|
-
|
10
1
|
module OneLogin
|
11
2
|
module RubySaml
|
12
|
-
|
13
|
-
# SAML2 Auxiliary class
|
14
|
-
#
|
15
3
|
class Utils
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
# Return a properly formatted x509 certificate
|
28
|
-
#
|
29
|
-
# @param cert [String] The original certificate
|
30
|
-
# @return [String] The formatted certificate
|
31
|
-
#
|
32
|
-
def self.format_cert(cert)
|
33
|
-
# don't try to format an encoded certificate or if is empty or nil
|
34
|
-
if cert.respond_to?(:ascii_only?)
|
35
|
-
return cert if cert.nil? || cert.empty? || !cert.ascii_only?
|
36
|
-
else
|
37
|
-
return cert if cert.nil? || cert.empty? || cert.match(/\x0d/)
|
38
|
-
end
|
39
|
-
|
40
|
-
if cert.scan(/BEGIN CERTIFICATE/).length > 1
|
41
|
-
formatted_cert = []
|
42
|
-
cert.scan(/-{5}BEGIN CERTIFICATE-{5}[\n\r]?.*?-{5}END CERTIFICATE-{5}[\n\r]?/m) {|c|
|
43
|
-
formatted_cert << format_cert(c)
|
44
|
-
}
|
45
|
-
formatted_cert.join("\n")
|
46
|
-
else
|
47
|
-
cert = cert.gsub(/\-{5}\s?(BEGIN|END) CERTIFICATE\s?\-{5}/, "")
|
48
|
-
cert = cert.gsub(/\r/, "")
|
49
|
-
cert = cert.gsub(/\n/, "")
|
50
|
-
cert = cert.gsub(/\s/, "")
|
51
|
-
cert = cert.scan(/.{1,64}/)
|
52
|
-
cert = cert.join("\n")
|
53
|
-
"-----BEGIN CERTIFICATE-----\n#{cert}\n-----END CERTIFICATE-----"
|
4
|
+
def self.format_cert(cert, heads=true)
|
5
|
+
cert = cert.delete("\n").delete("\r").delete("\x0D")
|
6
|
+
if cert
|
7
|
+
cert = cert.gsub('-----BEGIN CERTIFICATE-----', '')
|
8
|
+
cert = cert.gsub('-----END CERTIFICATE-----', '')
|
9
|
+
cert = cert.gsub(' ', '')
|
10
|
+
|
11
|
+
if heads
|
12
|
+
cert = cert.scan(/.{1,64}/).join("\n")+"\n"
|
13
|
+
cert = "-----BEGIN CERTIFICATE-----\n" + cert + "-----END CERTIFICATE-----\n"
|
14
|
+
end
|
54
15
|
end
|
55
|
-
|
56
|
-
|
57
|
-
|
58
|
-
|
59
|
-
|
60
|
-
|
61
|
-
|
62
|
-
|
63
|
-
|
64
|
-
|
65
|
-
|
66
|
-
|
67
|
-
|
68
|
-
key = key.gsub(/\-{5}\s?(BEGIN|END)( RSA)? PRIVATE KEY\s?\-{5}/, "")
|
69
|
-
key = key.gsub(/\n/, "")
|
70
|
-
key = key.gsub(/\r/, "")
|
71
|
-
key = key.gsub(/\s/, "")
|
72
|
-
key = key.scan(/.{1,64}/)
|
73
|
-
key = key.join("\n")
|
74
|
-
key_label = rsa_key ? "RSA PRIVATE KEY" : "PRIVATE KEY"
|
75
|
-
"-----BEGIN #{key_label}-----\n#{key}\n-----END #{key_label}-----"
|
76
|
-
end
|
77
|
-
|
78
|
-
# Build the Query String signature that will be used in the HTTP-Redirect binding
|
79
|
-
# to generate the Signature
|
80
|
-
# @param params [Hash] Parameters to build the Query String
|
81
|
-
# @option params [String] :type 'SAMLRequest' or 'SAMLResponse'
|
82
|
-
# @option params [String] :data Base64 encoded SAMLRequest or SAMLResponse
|
83
|
-
# @option params [String] :relay_state The RelayState parameter
|
84
|
-
# @option params [String] :sig_alg The SigAlg parameter
|
85
|
-
# @return [String] The Query String
|
86
|
-
#
|
87
|
-
def self.build_query(params)
|
88
|
-
type, data, relay_state, sig_alg = [:type, :data, :relay_state, :sig_alg].map { |k| params[k]}
|
89
|
-
url_string = "#{type}=#{CGI.escape(data)}"
|
90
|
-
url_string << "&RelayState=#{CGI.escape(relay_state)}" if relay_state
|
91
|
-
url_string << "&SigAlg=#{CGI.escape(sig_alg)}"
|
92
|
-
end
|
93
|
-
|
94
|
-
def self.uuid
|
95
|
-
RUBY_VERSION < '1.9' ? "_#{@@uuid_generator.generate}" : "_#{SecureRandom.uuid}"
|
96
|
-
end
|
97
|
-
|
98
|
-
# Build the status error message
|
99
|
-
# @param status_code [String] StatusCode value
|
100
|
-
# @param status_message [Strig] StatusMessage value
|
101
|
-
# @return [String] The status error message
|
102
|
-
def self.status_error_msg(error_msg, raw_status_code = nil, status_message = nil)
|
103
|
-
unless raw_status_code.nil?
|
104
|
-
if raw_status_code.include? "|"
|
105
|
-
status_codes = raw_status_code.split(' | ')
|
106
|
-
values = status_codes.collect do |status_code|
|
107
|
-
status_code.split(':').last
|
16
|
+
cert
|
17
|
+
end
|
18
|
+
|
19
|
+
def self.format_private_key(key, heads=true)
|
20
|
+
key = key.delete("\n").delete("\r").delete("\x0D")
|
21
|
+
if key
|
22
|
+
if key.index('-----BEGIN PRIVATE KEY-----') != nil
|
23
|
+
key = key.gsub('-----BEGIN PRIVATE KEY-----', '')
|
24
|
+
key = key.gsub('-----END PRIVATE KEY-----', '')
|
25
|
+
key = key.gsub(' ', '')
|
26
|
+
if heads
|
27
|
+
key = key.scan(/.{1,64}/).join("\n")+"\n"
|
28
|
+
key = "-----BEGIN PRIVATE KEY-----\n" + key + "-----END PRIVATE KEY-----\n"
|
108
29
|
end
|
109
|
-
printable_code = values.join(" => ")
|
110
30
|
else
|
111
|
-
|
31
|
+
key = key.gsub('-----BEGIN RSA PRIVATE KEY-----', '')
|
32
|
+
key = key.gsub('-----END RSA PRIVATE KEY-----', '')
|
33
|
+
key = key.gsub(' ', '')
|
34
|
+
if heads
|
35
|
+
key = key.scan(/.{1,64}/).join("\n")+"\n"
|
36
|
+
key = "-----BEGIN RSA PRIVATE KEY-----\n" + key + "-----END RSA PRIVATE KEY-----\n"
|
37
|
+
end
|
112
38
|
end
|
113
|
-
error_msg << ', was ' + printable_code
|
114
|
-
end
|
115
|
-
|
116
|
-
unless status_message.nil?
|
117
|
-
error_msg << ' -> ' + status_message
|
118
39
|
end
|
119
|
-
|
120
|
-
error_msg
|
121
|
-
end
|
122
|
-
|
123
|
-
# Base64 decode and try also to inflate a SAML Message
|
124
|
-
# @param saml [String] The deflated and encoded SAML Message
|
125
|
-
# @return [String] The plain SAML Message
|
126
|
-
#
|
127
|
-
def self.decode_raw_saml(saml)
|
128
|
-
return saml unless base64_encoded?(saml)
|
129
|
-
|
130
|
-
decoded = decode(saml)
|
131
|
-
begin
|
132
|
-
inflate(decoded)
|
133
|
-
rescue
|
134
|
-
decoded
|
135
|
-
end
|
136
|
-
end
|
137
|
-
|
138
|
-
# Base 64 decode method
|
139
|
-
# @param string [String] The string message
|
140
|
-
# @return [String] The decoded string
|
141
|
-
#
|
142
|
-
def self.decode(string)
|
143
|
-
Base64.decode64(string)
|
144
|
-
end
|
145
|
-
|
146
|
-
# Base 64 encode method
|
147
|
-
# @param string [String] The string
|
148
|
-
# @return [String] The encoded string
|
149
|
-
#
|
150
|
-
def self.encode(string)
|
151
|
-
if Base64.respond_to?('strict_encode64')
|
152
|
-
Base64.strict_encode64(string)
|
153
|
-
else
|
154
|
-
Base64.encode64(string).gsub(/\n/, "")
|
155
|
-
end
|
156
|
-
end
|
157
|
-
|
158
|
-
# Check if a string is base64 encoded
|
159
|
-
# @param string [String] string to check the encoding of
|
160
|
-
# @return [true, false] whether or not the string is base64 encoded
|
161
|
-
#
|
162
|
-
def self.base64_encoded?(string)
|
163
|
-
!!string.gsub(/[\r\n]|\\r|\\n|\s/, "").match(BASE64_FORMAT)
|
164
|
-
end
|
165
|
-
|
166
|
-
# Inflate method
|
167
|
-
# @param deflated [String] The string
|
168
|
-
# @return [String] The inflated string
|
169
|
-
#
|
170
|
-
def self.inflate(deflated)
|
171
|
-
Zlib::Inflate.new(-Zlib::MAX_WBITS).inflate(deflated)
|
172
|
-
end
|
173
|
-
|
174
|
-
# Deflate method
|
175
|
-
# @param inflated [String] The string
|
176
|
-
# @return [String] The deflated string
|
177
|
-
#
|
178
|
-
def self.deflate(inflated)
|
179
|
-
Zlib::Deflate.deflate(inflated, 9)[2..-5]
|
180
|
-
end
|
181
|
-
|
182
|
-
# Given two strings, attempt to match them as URIs using Rails' parse method. If they can be parsed,
|
183
|
-
# then the fully-qualified domain name and the host should performa a case-insensitive match, per the
|
184
|
-
# RFC for URIs. If Rails can not parse the string in to URL pieces, return a boolean match of the
|
185
|
-
# two strings. This maintains the previous functionality.
|
186
|
-
# @return [Boolean]
|
187
|
-
def self.uri_match?(destination_url, settings_url)
|
188
|
-
dest_uri = URI.parse(destination_url)
|
189
|
-
acs_uri = URI.parse(settings_url)
|
190
|
-
|
191
|
-
if dest_uri.scheme.nil? || acs_uri.scheme.nil? || dest_uri.host.nil? || acs_uri.host.nil?
|
192
|
-
raise URI::InvalidURIError
|
193
|
-
else
|
194
|
-
dest_uri.scheme.downcase == acs_uri.scheme.downcase &&
|
195
|
-
dest_uri.host.downcase == acs_uri.host.downcase &&
|
196
|
-
dest_uri.path == acs_uri.path &&
|
197
|
-
dest_uri.query == acs_uri.query
|
198
|
-
end
|
199
|
-
rescue URI::InvalidURIError
|
200
|
-
original_uri_match?(destination_url, settings_url)
|
201
|
-
end
|
202
|
-
|
203
|
-
# If Rails' URI.parse can't match to valid URL, default back to the original matching service.
|
204
|
-
# @return [Boolean]
|
205
|
-
def self.original_uri_match?(destination_url, settings_url)
|
206
|
-
destination_url == settings_url
|
207
40
|
end
|
208
41
|
|
209
42
|
end
|
210
43
|
end
|
211
|
-
end
|
44
|
+
end
|
data/lib/ruby-saml.rb
CHANGED
@@ -1,13 +1,16 @@
|
|
1
1
|
require 'onelogin/ruby-saml/logging'
|
2
|
+
require 'onelogin/ruby-saml/saml_message'
|
2
3
|
require 'onelogin/ruby-saml/authrequest'
|
3
4
|
require 'onelogin/ruby-saml/logoutrequest'
|
4
5
|
require 'onelogin/ruby-saml/logoutresponse'
|
6
|
+
require 'onelogin/ruby-saml/attributes'
|
5
7
|
require 'onelogin/ruby-saml/slo_logoutrequest'
|
6
8
|
require 'onelogin/ruby-saml/slo_logoutresponse'
|
7
9
|
require 'onelogin/ruby-saml/response'
|
8
10
|
require 'onelogin/ruby-saml/settings'
|
9
|
-
require 'onelogin/ruby-saml/
|
11
|
+
require 'onelogin/ruby-saml/attribute_service'
|
10
12
|
require 'onelogin/ruby-saml/validation_error'
|
11
13
|
require 'onelogin/ruby-saml/metadata'
|
14
|
+
require 'onelogin/ruby-saml/idp_metadata_parser'
|
15
|
+
require 'onelogin/ruby-saml/utils'
|
12
16
|
require 'onelogin/ruby-saml/version'
|
13
|
-
require 'onelogin/ruby-saml/attributes'
|