use of org.opensaml.saml2.core.Assertion in project ddf by codice.
the class SamlAssertionValidatorImplTest method createHolderOfKeyAssertion.
private Assertion createHolderOfKeyAssertion() throws Exception {
Assertion assertion = new AssertionBuilder().buildObject();
assertion.setID(UUID.randomUUID().toString());
assertion.setIssueInstant(new DateTime());
Issuer issuer = new IssuerBuilder().buildObject();
issuer.setValue(ISSUER);
assertion.setIssuer(issuer);
NameID nameID = new NameIDBuilder().buildObject();
nameID.setFormat("urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified");
nameID.setNameQualifier("http://cxf.apache.org/sts");
nameID.setValue("admin");
X509SubjectName x509SubjectName = new X509SubjectNameBuilder().buildObject();
x509SubjectName.setValue("EMAILADDRESS=localhost@example.org, CN=localhost, OU=Dev, O=DDF, ST=AZ, C=US");
org.opensaml.xmlsec.signature.X509Certificate x509Certificate = new X509CertificateBuilder().buildObject();
byte[] certBytes = certificate.getEncoded();
String certString = new String(Base64.encode(certBytes));
x509Certificate.setValue(certString);
X509Data x509Data = new X509DataBuilder().buildObject();
x509Data.getX509SubjectNames().add(x509SubjectName);
x509Data.getX509Certificates().add(x509Certificate);
KeyInfo keyInfo = new KeyInfoBuilder().buildObject();
keyInfo.getX509Datas().add(x509Data);
KeyInfoConfirmationDataType keyInfoConfirmationDataType = new KeyInfoConfirmationDataTypeBuilder().buildObject();
keyInfoConfirmationDataType.getKeyInfos().add(keyInfo);
SubjectConfirmation subjectConfirmation = new SubjectConfirmationBuilder().buildObject();
subjectConfirmation.setMethod("urn:oasis:names:tc:SAML:2.0:cm:holder-of-key");
subjectConfirmation.setSubjectConfirmationData(keyInfoConfirmationDataType);
Subject subject = new SubjectBuilder().buildObject();
subject.setNameID(nameID);
subject.getSubjectConfirmations().add(subjectConfirmation);
assertion.setSubject(subject);
Conditions conditions = new ConditionsBuilder().buildObject();
conditions.setNotBefore(new DateTime().minusDays(3));
conditions.setNotOnOrAfter(new DateTime().plusDays(3));
assertion.setConditions(conditions);
AuthnStatement authnStatement = new AuthnStatementBuilder().buildObject();
authnStatement.setAuthnInstant(new DateTime());
AuthnContext authnContext = new AuthnContextBuilder().buildObject();
AuthnContextClassRef authnContextClassRef = new AuthnContextClassRefBuilder().buildObject();
authnContextClassRef.setAuthnContextClassRef("urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified");
authnContext.setAuthnContextClassRef(authnContextClassRef);
authnStatement.setAuthnContext(authnContext);
assertion.getAuthnStatements().add(authnStatement);
AttributeStatement attributeStatement = new AttributeStatementBuilder().buildObject();
Attribute attribute = new AttributeBuilder().buildObject();
AttributeValueType attributeValue = new AttributeValueTypeImplBuilder().buildObject();
attributeValue.setValue("admin");
attribute.setName("http://schemas.xmlsoap.org/ws/2005/05/identity/claims/role");
attribute.setNameFormat("urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified");
attribute.getAttributeValues().add(attributeValue);
attributeStatement.getAttributes().add(attribute);
assertion.getAttributeStatements().add(attributeStatement);
Signature signature = OpenSAMLUtil.buildSignature();
signature.setCanonicalizationAlgorithm(SignatureConstants.ALGO_ID_C14N_EXCL_OMIT_COMMENTS);
signature.setSignatureAlgorithm(WSS4JConstants.RSA);
BasicX509Credential signingCredential;
signingCredential = new BasicX509Credential(certificate);
signingCredential.setPrivateKey(privateKey);
signature.setSigningCredential(signingCredential);
X509KeyInfoGeneratorFactory x509KeyInfoGeneratorFactory = new X509KeyInfoGeneratorFactory();
x509KeyInfoGeneratorFactory.setEmitEntityCertificate(true);
KeyInfo signatureKeyInfo = x509KeyInfoGeneratorFactory.newInstance().generate(signingCredential);
signature.setKeyInfo(signatureKeyInfo);
assertion.setSignature(signature);
return assertion;
}
use of org.opensaml.saml2.core.Assertion in project verify-hub by alphagov.
the class IdpResponseValidatorTest method shouldValidateSamlAssertionSignature.
@Test
public void shouldValidateSamlAssertionSignature() {
Assertion assertion = mock(Assertion.class);
List<Assertion> assertions = ImmutableList.of(assertion);
ValidatedResponse validatedResponse = mock(ValidatedResponse.class);
when(samlResponseSignatureValidator.validate(response, IDPSSODescriptor.DEFAULT_ELEMENT_NAME)).thenReturn(validatedResponse);
when(assertionDecrypter.decryptAssertions(validatedResponse)).thenReturn(assertions);
validator.validate(response);
verify(samlAssertionsSignatureValidator).validate(assertions, IDPSSODescriptor.DEFAULT_ELEMENT_NAME);
}
use of org.opensaml.saml2.core.Assertion in project verify-hub by alphagov.
the class IdpResponseValidatorTest method shouldIncrementCounterWheneverADecrypterFailsToDecrypt.
@Test
public void shouldIncrementCounterWheneverADecrypterFailsToDecrypt() throws Exception {
String issuerValue = "issuerValue";
Assertion assertion = mock(Assertion.class);
List<Assertion> assertions = ImmutableList.of(assertion);
ValidatedResponse validatedResponse = mock(ValidatedResponse.class);
Issuer responseIssuer = mock(Issuer.class);
Counter idpDecryptionErrorCounter = mock(Counter.class);
Counter.Child childCounter = mock(Counter.Child.class);
setFinalStatic(IdpResponseValidator.class.getDeclaredField("idpDecryptionErrorCounter"), idpDecryptionErrorCounter);
when(validatedResponse.getIssuer()).thenReturn(responseIssuer);
when(responseIssuer.getValue()).thenReturn(issuerValue);
when(samlResponseSignatureValidator.validate(response, IDPSSODescriptor.DEFAULT_ELEMENT_NAME)).thenReturn(validatedResponse);
when(assertionDecrypter.decryptAssertions(validatedResponse)).thenThrow(SamlFailedToDecryptException.class);
when(badAssertionDecrypter.decryptAssertions(validatedResponse)).thenReturn(assertions);
when(idpDecryptionErrorCounter.labels(anyString())).thenReturn(childCounter);
doNothing().when(childCounter).inc();
validator.validate(response);
String expectedMessage = String.format("IdpResponseValidator failed to decrypt assertions from issuerValue with one of the decrypters", issuerValue);
verify(mockAppender).doAppend(captorLoggingEvent.capture());
LoggingEvent loggingEvent = captorLoggingEvent.getValue();
assertThat(loggingEvent.getLevel()).isEqualTo(Level.WARN);
assertThat(loggingEvent.getFormattedMessage()).isEqualTo(expectedMessage);
verify(idpDecryptionErrorCounter).labels(validatedResponse.getIssuer().getValue());
verify(childCounter).inc();
}
use of org.opensaml.saml2.core.Assertion in project verify-hub by alphagov.
the class EncryptedResponseFromMatchingServiceValidatorTest method validateResponse_shouldThrowExceptionIfResponseHasUnencryptedAssertion.
@Test
public void validateResponse_shouldThrowExceptionIfResponseHasUnencryptedAssertion() throws Exception {
Assertion assertion = anAssertion().buildUnencrypted();
Response response = aResponse().withStatus(happyStatus).addAssertion(assertion).build();
assertValidationFailure(response, unencryptedAssertion());
}
use of org.opensaml.saml2.core.Assertion in project verify-hub by alphagov.
the class MatchingServiceResponseValidatorTest method shouldValidateSamlAssertionSignature.
@Test
public void shouldValidateSamlAssertionSignature() {
Assertion assertion = mock(Assertion.class);
List<Assertion> assertions = ImmutableList.of(assertion);
ValidatedResponse validatedResponse = mock(ValidatedResponse.class);
when(samlResponseSignatureValidator.validate(response, AttributeAuthorityDescriptor.DEFAULT_ELEMENT_NAME)).thenReturn(validatedResponse);
when(assertionDecrypter.decryptAssertions(validatedResponse)).thenReturn(assertions);
validator.validate(response);
verify(samlAssertionsSignatureValidator).validate(assertions, AttributeAuthorityDescriptor.DEFAULT_ELEMENT_NAME);
}
Aggregations