/* * JBoss, Home of Professional Open Source. * Copyright 2008, Red Hat Middleware LLC, and individual contributors * as indicated by the @author tags. See the copyright.txt file in the * distribution for a full listing of individual contributors. * * This is free software; you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as * published by the Free Software Foundation; either version 2.1 of * the License, or (at your option) any later version. * * This software is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this software; if not, write to the Free * Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA, or see the FSF site: http://www.fsf.org. */ package org.picketlink.test.identity.federation.core.parser.saml; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertNotNull; import java.io.ByteArrayInputStream; import java.io.ByteArrayOutputStream; import java.io.InputStream; import org.apache.log4j.Logger; import org.junit.Test; import org.picketlink.identity.federation.core.parsers.saml.SAMLParser; import org.picketlink.identity.federation.core.saml.v2.util.DocumentUtil; import org.picketlink.identity.federation.core.saml.v2.util.XMLTimeUtil; import org.picketlink.identity.federation.core.saml.v2.writers.SAMLRequestWriter; import org.picketlink.identity.federation.core.util.JAXPValidationUtil; import org.picketlink.identity.federation.core.util.StaxUtil; import org.picketlink.identity.federation.saml.v2.protocol.AuthnRequestType; import org.picketlink.identity.federation.saml.v2.protocol.NameIDPolicyType; import org.w3c.dom.Document; /** * Validate the SAML2 AuthnRequest parse * * @author Anil.Saldhana@redhat.com * @since Nov 2, 2010 */ public class SAMLAuthnRequestParserTestCase extends AbstractParserTest { @Test public void testSAMLAuthnRequestParse() throws Exception { ClassLoader tcl = Thread.currentThread().getContextClassLoader(); InputStream configStream = tcl.getResourceAsStream("parser/saml2/saml2-authnrequest.xml"); SAMLParser parser = new SAMLParser(); AuthnRequestType authnRequest = (AuthnRequestType) parser.parse(configStream); assertNotNull("AuthnRequestType is not null", authnRequest); assertEquals("http://localhost/org.eclipse.higgins.saml2idp.test/SAMLEndpoint", authnRequest .getAssertionConsumerServiceURL().toString()); assertEquals("http://localhost/org.eclipse.higgins.saml2idp.server/SAMLEndpoint", authnRequest.getDestination() .toString()); assertEquals("a2sffdlgdhgfg32fdldsdghdsgdgfdglgx", authnRequest.getID()); assertEquals(XMLTimeUtil.parse("2007-12-17T18:40:52.203Z"), authnRequest.getIssueInstant()); assertEquals("urn:oasis:names.tc:SAML:2.0:bindings:HTTP-Redirect", authnRequest.getProtocolBinding().toString()); assertEquals("Test SAML2 SP", authnRequest.getProviderName()); assertEquals("2.0", authnRequest.getVersion()); // Issuer assertEquals("Test SAML2 SP", authnRequest.getIssuer().getValue()); // NameID Policy NameIDPolicyType nameIDPolicy = authnRequest.getNameIDPolicy(); assertEquals("urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified", nameIDPolicy.getFormat().toString()); assertEquals(Boolean.TRUE, nameIDPolicy.isAllowCreate()); // Try out writing ByteArrayOutputStream baos = new ByteArrayOutputStream(); SAMLRequestWriter writer = new SAMLRequestWriter(StaxUtil.getXMLStreamWriter(baos)); writer.write(authnRequest); ByteArrayInputStream bis = new ByteArrayInputStream(baos.toByteArray()); Document doc = DocumentUtil.getDocument(bis); // throws exceptions JAXPValidationUtil.validate(DocumentUtil.getNodeAsStream(doc)); } @Test public void testSAMLAuthnRequestParse2() throws Exception { ClassLoader tcl = Thread.currentThread().getContextClassLoader(); InputStream configStream = tcl.getResourceAsStream("parser/saml2/saml2-authnrequest-2.xml"); JAXPValidationUtil.validate(configStream); configStream = tcl.getResourceAsStream("parser/saml2/saml2-authnrequest-2.xml"); SAMLParser parser = new SAMLParser(); AuthnRequestType authnRequest = (AuthnRequestType) parser.parse(configStream); assertNotNull("AuthnRequestType is not null", authnRequest); /* * assertEquals("http://localhost/org.eclipse.higgins.saml2idp.test/SAMLEndpoint", authnRequest * .getAssertionConsumerServiceURL().toString()); * assertEquals("http://localhost/org.eclipse.higgins.saml2idp.server/SAMLEndpoint", authnRequest.getDestination() * .toString()); assertEquals("a2sffdlgdhgfg32fdldsdghdsgdgfdglgx", authnRequest.getID()); * assertEquals(XMLTimeUtil.parse("2007-12-17T18:40:52.203Z"), authnRequest.getIssueInstant()); * assertEquals("urn:oasis:names.tc:SAML:2.0:bindings:HTTP-Redirect", authnRequest.getProtocolBinding().toString()); * assertEquals("Test SAML2 SP", authnRequest.getProviderName()); assertEquals("2.0", authnRequest.getVersion()); * * //Issuer assertEquals("Test SAML2 SP", authnRequest.getIssuer().getValue()); * * //NameID Policy NameIDPolicyType nameIDPolicy = authnRequest.getNameIDPolicy(); * assertEquals("urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified", nameIDPolicy.getFormat().toString()); * assertEquals(Boolean.TRUE, nameIDPolicy.isAllowCreate()); */ // Try out writing ByteArrayOutputStream baos = new ByteArrayOutputStream(); SAMLRequestWriter writer = new SAMLRequestWriter(StaxUtil.getXMLStreamWriter(baos)); writer.write(authnRequest); byte[] data = baos.toByteArray(); Logger.getLogger(SAMLAuthnRequestParserTestCase.class).debug(new String(data)); ByteArrayInputStream bis = new ByteArrayInputStream(data); Document doc = DocumentUtil.getDocument(bis); // throws exceptions JAXPValidationUtil.validate(DocumentUtil.getNodeAsStream(doc)); } }