/* * (C) Copyright 2014 Nuxeo SA (http://nuxeo.com/) and others. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * * Contributors: * Nelson Silva <nelson.silva@inevo.pt> */ package org.nuxeo.ecm.platform.auth.saml; import static junit.framework.Assert.assertEquals; import static org.mockito.Mockito.mock; import static org.mockito.Mockito.when; import com.google.common.collect.ImmutableMap; import org.junit.Before; import org.junit.Test; import org.junit.runner.RunWith; import org.nuxeo.ecm.core.api.NuxeoPrincipal; import org.nuxeo.ecm.core.test.DefaultRepositoryInit; import org.nuxeo.ecm.core.test.annotations.Granularity; import org.nuxeo.ecm.core.test.annotations.RepositoryConfig; import org.nuxeo.ecm.platform.api.login.UserIdentificationInfo; import org.nuxeo.ecm.platform.usermanager.UserManager; import org.nuxeo.runtime.test.runner.Deploy; import org.nuxeo.runtime.test.runner.Features; import org.nuxeo.runtime.test.runner.FeaturesRunner; import org.nuxeo.runtime.test.runner.LocalDeploy; import org.nuxeo.usermapper.test.UserMapperFeature; import org.opensaml.common.SAMLObject; import org.opensaml.ws.message.decoder.MessageDecodingException; import org.opensaml.xml.Configuration; import org.opensaml.xml.io.Unmarshaller; import org.opensaml.xml.io.UnmarshallingException; import org.opensaml.xml.parse.BasicParserPool; import org.opensaml.xml.parse.XMLParserException; import org.opensaml.xml.util.Base64; import org.w3c.dom.Document; import org.w3c.dom.Element; import javax.inject.Inject; import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; import java.io.ByteArrayInputStream; import java.io.File; import java.io.InputStream; import java.net.URISyntaxException; import java.net.URL; import java.util.Map; import java.util.zip.Inflater; import java.util.zip.InflaterInputStream; @RunWith(FeaturesRunner.class) @Features(UserMapperFeature.class) @RepositoryConfig(init = DefaultRepositoryInit.class, cleanup = Granularity.METHOD) @Deploy({ "org.nuxeo.ecm.platform.login.saml2" }) @LocalDeploy({"org.nuxeo.ecm.platform.auth.saml:OSGI-INF/test-sql-directory.xml","org.nuxeo.ecm.platform.auth.saml:OSGI-INF/usermapper-contribs.xml"}) public class SAMLAuthenticatorWithMapperTest { @Inject protected UserManager userManager; private SAMLAuthenticationProvider samlAuth; @Before public void doBefore() throws URISyntaxException { samlAuth = new SAMLAuthenticationProvider(); String metadata = getClass().getResource("/idp-meta.xml").toURI().getPath(); Map<String, String> params = new ImmutableMap.Builder<String, String>() // .put("metadata", metadata).build(); samlAuth.initPlugin(params); } @Test public void testRetrieveIdentity() throws Exception { HttpServletRequest req = getMockRequest("/saml-response.xml", "POST", "http://localhost:8080/login", "text/html"); HttpServletResponse resp = mock(HttpServletResponse.class); UserIdentificationInfo info = samlAuth.handleRetrieveIdentity(req, resp); assertEquals("user@dummy",info.getUserName()); NuxeoPrincipal principal = userManager.getPrincipal("user@dummy"); assertEquals("user@dummy", principal.getEmail()); } protected HttpServletRequest getMockRequest(String messageFile, String method, String url, String contentType) throws Exception { HttpServletRequest request = mock(HttpServletRequest.class); URL urlP = new URL(url); File file = new File(getClass().getResource(messageFile).toURI()); String message = Base64.encodeFromFile(file.getAbsolutePath()); when(request.getMethod()).thenReturn(method); when(request.getContentLength()).thenReturn(message.length()); when(request.getContentType()).thenReturn(contentType); when(request.getParameter("SAMLart")).thenReturn(null); when(request.getParameter("SAMLRequest")).thenReturn(null); when(request.getParameter("SAMLResponse")).thenReturn(message); when(request.getParameter("RelayState")).thenReturn(""); when(request.getParameter("Signature")).thenReturn(""); when(request.getRequestURI()).thenReturn(urlP.getPath()); when(request.getRequestURL()).thenReturn(new StringBuffer(url)); when(request.getAttribute("javax.servlet.request.X509Certificate")).thenReturn(null); when(request.isSecure()).thenReturn(false); // when(request.getAttribute(SAMLConstants.LOCAL_ENTITY_ID)).thenReturn(null); return request; } protected SAMLObject decodeMessage(String message) { try { byte[] decodedBytes = Base64.decode(message); if (decodedBytes == null) { throw new MessageDecodingException("Unable to Base64 decode incoming message"); } InputStream is = new ByteArrayInputStream(decodedBytes); is = new InflaterInputStream(is, new Inflater(true)); Document messageDoc = new BasicParserPool().parse(is); Element messageElem = messageDoc.getDocumentElement(); Unmarshaller unmarshaller = Configuration.getUnmarshallerFactory().getUnmarshaller(messageElem); return (SAMLObject) unmarshaller.unmarshall(messageElem); } catch (MessageDecodingException | XMLParserException | UnmarshallingException e) { // } return null; } }