diff --git a/tests/modules/core/lib/Auth/Source/Auth_Source_SP_Test.php b/tests/modules/core/lib/Auth/Source/Auth_Source_SP_Test.php new file mode 100644 index 0000000000000000000000000000000000000000..ae6600024f6e6340b687ec4d4d973aca0a5e6eea --- /dev/null +++ b/tests/modules/core/lib/Auth/Source/Auth_Source_SP_Test.php @@ -0,0 +1,193 @@ +<?php + +// Custom Exception to throw to terminate a TestCase +class ExitTestException extends Exception { + private $testResult; + + public function __construct($testResult) { + parent::__construct("ExitTestException", 0, null); + $this->testResult = $testResult; + } + + function getTestResult() { + return $this->testResult; + } +} + + +/* Wrap the SSP sspmod_saml_Auth_Source_SP class + - Use introspection to make startSSO2Test available + - Override sendSAML2AuthnRequest() to catch the AuthnRequest being sent +*/ +class sspmod_saml_Auth_Source_SP_Tester extends \sspmod_saml_Auth_Source_SP +{ + public function __construct($info, $config) { + parent::__construct($info, $config); + } + + public function startSSO2Test(SimpleSAML_Configuration $idpMetadata, array $state) { + $reflector = new ReflectionObject($this); + $method=$reflector->getMethod('startSSO2'); + $method->setAccessible(true); + $method->invoke($this, $idpMetadata, $state); + } + + // Override + public function sendSAML2AuthnRequest(array &$state, SAML2_Binding $binding, SAML2_AuthnRequest $ar) { + // Exit test. Continuing would mean running into a assert(FALSE) + throw new ExitTestException( + array( + 'state' => $state, + 'binding' => $binding, + 'ar' => $ar, + ) + ); + } +} + +class Auth_Source_SP_Test extends PHPUnit_Framework_TestCase +{ + private $idpMetadata = NULL; + private $idpConfigArray = array( + 'metadata-set' => 'saml20-idp-remote', + 'entityid' => 'https://engine.surfconext.nl/authentication/idp/metadata', + 'SingleSignOnService' => + array ( + 0 => + array ( + 'Binding' => 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect', + 'Location' => 'https://engine.surfconext.nl/authentication/idp/single-sign-on', + ), + ), + 'keys' => + array ( + 0 => + array ( + 'encryption' => false, + 'signing' => true, + 'type' => 'X509Certificate', + 'X509Certificate' => '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', + ), + ), + ); + + private function getIdpMetadata() { + + if (!$this->idpMetadata) { + $this->idpMetadata = new SimpleSAML_Configuration($this->idpConfigArray, 'Auth_Source_SP_Test::getIdpMetadata()'); + } + + return $this->idpMetadata; + } + + /** Create a SAML AuthnRequest using sspmod_saml_Auth_Source_SP + * @param $state State Array to use in the test. This is an array of the Parameters described in section 2 of + * https://simplesamlphp.org/docs/development/saml:sp + * @return SAML2_AuthnRequest + */ + private function CreateAuthnRequest($state = array()) { + $info=array( 'AuthId' => 'default-sp' ); + $config=array(); + $as = new \sspmod_saml_Auth_Source_SP_Tester($info, $config); + + /** @var SAML2_AuthnRequest $ar */ + $ar=NULL; + try { + $as->startSSO2Test($this->getIdpMetadata(), $state); + $this->assertTrue(FALSE, 'Expected ExitTestException'); + } + catch (ExitTestException $e) { + $r = $e->getTestResult(); + $ar = $r['ar']; + } + return $ar; + } + + /** Test generating a authnrequest + * @test **/ + public function TestAuthnRequest() { + /** @var SAML2_AuthnRequest $ar */ + $ar = $this->CreateAuthnRequest(); + + // Assert values in the generated AuthnRequest + /** @var $xml DOMElement */ + $xml=$ar->toSignedXML(); + // echo $xml->ownerDocument->saveXML($xml); // Print XML + $this->assertEquals( + $this->idpConfigArray['SingleSignOnService'][0]['Location'], + SAML2_Utils::xpQuery($xml, '/samlp:AuthnRequest/@Destination')[0]->value); + $this->assertEquals( + 'http://localhost/simplesaml/module.php/saml/sp/metadata.php/default-sp', + SAML2_Utils::xpQuery($xml, '/samlp:AuthnRequest/saml:Issuer')[0]->textContent); + } + + /** Test setting a Subject + * @test **/ + public function TestNameID() { + $state=array( + 'saml:NameID' => array('Value' => 'user@example.org', 'Format' => SAML2_Const::NAMEID_UNSPECIFIED) + ); + + /** @var SAML2_AuthnRequest $ar */ + $ar = $this->CreateAuthnRequest($state); + + $nameID=$ar->getNameId(); + $this->assertEquals($state['saml:NameID']['Value'], $nameID['Value']); + $this->assertEquals($state['saml:NameID']['Format'], $nameID['Format']); + + /** @var $xml DOMElement */ + $xml=$ar->toSignedXML(); + //echo $xml->ownerDocument->saveXML($xml); // Print XML + $this->assertEquals( + $state['saml:NameID']['Format'], + SAML2_Utils::xpQuery($xml, '/samlp:AuthnRequest/saml:Subject/saml:NameID/@Format')[0]->value); + $this->assertEquals( + $state['saml:NameID']['Value'], + SAML2_Utils::xpQuery($xml, '/samlp:AuthnRequest/saml:Subject/saml:NameID')[0]->textContent); + } + + /** Test setting an AuthnConextClassRef + * @test **/ + public function TestAuthnContextClassRef() { + $state=array( + 'saml:AuthnContextClassRef' => 'http://example.com/myAuthnContextClassRef' + ); + + /** @var SAML2_AuthnRequest $ar */ + $ar = $this->CreateAuthnRequest($state); + + $this->assertEquals( + $state['saml:AuthnContextClassRef'], + $ar->getRequestedAuthnContext()['AuthnContextClassRef'][0] ); + + /** @var $xml DOMElement */ + $xml=$ar->toSignedXML(); + //echo $xml->ownerDocument->saveXML($xml); // Print XML + $this->assertEquals( + $state['saml:AuthnContextClassRef'], + SAML2_Utils::xpQuery($xml, '/samlp:AuthnRequest/samlp:RequestedAuthnContext/saml:AuthnContextClassRef')[0]->textContent); + } + + /** Test setting ForcedAuthn + * @test **/ + public function TestForcedAuthn() { + $state=array( + 'ForceAuthn' => true + ); + + /** @var SAML2_AuthnRequest $ar */ + $ar = $this->CreateAuthnRequest($state); + + $this->assertEquals( + $state['ForceAuthn'], + $ar->getForceAuthn() ); + + /** @var $xml DOMElement */ + $xml=$ar->toSignedXML(); + //echo $xml->ownerDocument->saveXML($xml); // Print XML + $this->assertEquals( + $state['ForceAuthn'] ? 'true' : 'false', + SAML2_Utils::xpQuery($xml, '/samlp:AuthnRequest/@ForceAuthn')[0]->value); + } + +}