1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102
|
/*
* Copyright 2001-2007 Internet2
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include "internal.h"
#include <saml/SAMLConfig.h>
#include <saml/saml2/metadata/Metadata.h>
#include <saml/saml2/metadata/MetadataCredentialCriteria.h>
#include <saml/saml2/metadata/MetadataProvider.h>
#include <xmltooling/security/SignatureTrustEngine.h>
using namespace opensaml::saml2;
using namespace opensaml::saml2md;
using namespace xmlsignature;
class StaticPKIXTrustEngineTest : public CxxTest::TestSuite, public SAMLObjectBaseTestCase {
public:
void setUp() {
SAMLObjectBaseTestCase::setUp();
}
void tearDown() {
SAMLObjectBaseTestCase::tearDown();
}
void testStaticPKIXTrustEngine() {
string config = data_path + "security/XMLMetadataProvider.xml";
ifstream in(config.c_str());
DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(in);
XercesJanitor<DOMDocument> janitor(doc);
auto_ptr_XMLCh path("path");
string s = data_path + "security/example-metadata.xml";
auto_ptr_XMLCh file(s.c_str());
doc->getDocumentElement()->setAttributeNS(NULL,path.get(),file.get());
// Build metadata provider.
auto_ptr<MetadataProvider> metadataProvider(
opensaml::SAMLConfig::getConfig().MetadataProviderManager.newPlugin(XML_METADATA_PROVIDER,doc->getDocumentElement())
);
try {
metadataProvider->init();
}
catch (XMLToolingException& ex) {
TS_TRACE(ex.what());
throw;
}
// Build trust engine.
config = data_path + "security/StaticPKIXTrustEngine.xml";
ifstream in2(config.c_str());
DOMDocument* doc2=XMLToolingConfig::getConfig().getParser().parse(in2);
XercesJanitor<DOMDocument> janitor2(doc2);
auto_ptr<TrustEngine> trustEngine(
XMLToolingConfig::getConfig().TrustEngineManager.newPlugin(STATIC_PKIX_TRUSTENGINE,doc2->getDocumentElement())
);
// Get signed assertion.
config = data_path + "signature/SAML2Assertion.xml";
ifstream in3(config.c_str());
DOMDocument* doc3=XMLToolingConfig::getConfig().getParser().parse(in3);
XercesJanitor<DOMDocument> janitor3(doc3);
auto_ptr<Assertion> assertion(dynamic_cast<Assertion*>(XMLObjectBuilder::getBuilder(doc3->getDocumentElement())->buildFromDocument(doc3)));
janitor3.release();
Locker locker(metadataProvider.get());
const EntityDescriptor* descriptor = metadataProvider->getEntityDescriptor(MetadataProvider::Criteria("https://idp.example.org")).first;
TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=NULL);
RoleDescriptor* role=descriptor->getIDPSSODescriptors().front();
TSM_ASSERT("Role not present", role!=NULL);
Signature* sig=assertion->getSignature();
TSM_ASSERT("Signature not present", sig!=NULL);
MetadataCredentialCriteria cc(*role);
cc.setPeerName("https://idp.example.org");
TSM_ASSERT("Signature failed to validate.", dynamic_cast<SignatureTrustEngine*>(trustEngine.get())->validate(*sig, *metadataProvider, &cc));
descriptor = metadataProvider->getEntityDescriptor(MetadataProvider::Criteria("https://idp2.example.org")).first;
TSM_ASSERT("Retrieved entity descriptor was null", descriptor!=NULL);
role=descriptor->getIDPSSODescriptors().front();
TSM_ASSERT("Role not present", role!=NULL);
MetadataCredentialCriteria cc2(*role);
cc2.setPeerName("https://idp2.example.org");
TSM_ASSERT("Signature validated.", !dynamic_cast<SignatureTrustEngine*>(trustEngine.get())->validate(*sig, *metadataProvider, &cc2));
}
};
|