Updated tests
This commit is contained in:
		| @@ -12,11 +12,11 @@ from pathutils import full_path | ||||
| BASE = "http://localhost:8088" | ||||
|  | ||||
| CONFIG = { | ||||
|     "entityid" : "urn:mace:example.com:saml:roland:idp", | ||||
|     "name" : "Rolands IdP", | ||||
|     "entityid": "urn:mace:example.com:saml:roland:idp", | ||||
|     "name": "Rolands IdP", | ||||
|     "service": { | ||||
|         "aa": { | ||||
|             "endpoints" : { | ||||
|             "endpoints": { | ||||
|                 "attribute_service": [ | ||||
|                     ("%s/aap" % BASE, BINDING_HTTP_POST), | ||||
|                     ("%s/aas" % BASE, BINDING_SOAP) | ||||
| @@ -24,15 +24,15 @@ CONFIG = { | ||||
|             }, | ||||
|         }, | ||||
|         "aq": { | ||||
|             "endpoints" : { | ||||
|             "endpoints": { | ||||
|                 "authn_query_service": [ | ||||
|                     ("%s/aqs" % BASE, BINDING_SOAP) | ||||
|                 ] | ||||
|             }, | ||||
|         }, | ||||
|         "idp": { | ||||
|             "endpoints" : { | ||||
|                 "single_sign_on_service" : [ | ||||
|             "endpoints": { | ||||
|                 "single_sign_on_service": [ | ||||
|                     ("%s/sso/redirect" % BASE, BINDING_HTTP_REDIRECT), | ||||
|                     ("%s/sso/post" % BASE, BINDING_HTTP_POST), | ||||
|                     ("%s/sso/art" % BASE, BINDING_HTTP_ARTIFACT), | ||||
| @@ -42,7 +42,7 @@ CONFIG = { | ||||
|                     ("%s/slo/soap" % BASE, BINDING_SOAP), | ||||
|                     ("%s/slo/post" % BASE, BINDING_HTTP_POST) | ||||
|                 ], | ||||
|                 "artifact_resolution_service":[ | ||||
|                 "artifact_resolution_service": [ | ||||
|                     ("%s/ars" % BASE, BINDING_SOAP) | ||||
|                 ], | ||||
|                 "assertion_id_request_service": [ | ||||
| @@ -51,13 +51,13 @@ CONFIG = { | ||||
|                 "authn_query_service": [ | ||||
|                     ("%s/aqs" % BASE, BINDING_SOAP) | ||||
|                 ], | ||||
|                 "manage_name_id_service":[ | ||||
|                 "manage_name_id_service": [ | ||||
|                     ("%s/mni/soap" % BASE, BINDING_SOAP), | ||||
|                     ("%s/mni/post" % BASE, BINDING_HTTP_POST), | ||||
|                     ("%s/mni/redirect" % BASE, BINDING_HTTP_REDIRECT), | ||||
|                     ("%s/mni/art" % BASE, BINDING_HTTP_ARTIFACT) | ||||
|                 ], | ||||
|                 "name_id_mapping_service":[ | ||||
|                 "name_id_mapping_service": [ | ||||
|                     ("%s/nim/soap" % BASE, BINDING_SOAP), | ||||
|                     ("%s/nim/post" % BASE, BINDING_HTTP_POST), | ||||
|                     ("%s/nim/redirect" % BASE, BINDING_HTTP_REDIRECT), | ||||
| @@ -66,10 +66,10 @@ CONFIG = { | ||||
|             }, | ||||
|             "policy": { | ||||
|                 "default": { | ||||
|                     "lifetime": {"minutes":15}, | ||||
|                     "lifetime": {"minutes": 15}, | ||||
|                     "attribute_restrictions": None, # means all I have | ||||
|                     "name_form": NAME_FORMAT_URI, | ||||
|                     }, | ||||
|                 }, | ||||
|                 "urn:mace:example.com:saml:roland:sp": { | ||||
|                     "lifetime": {"minutes": 5}, | ||||
|                     "nameid_format": NAMEID_FORMAT_PERSISTENT, | ||||
| @@ -82,25 +82,26 @@ CONFIG = { | ||||
|             #"subject_data": ("mongodb", "foo"), | ||||
|         }, | ||||
|     }, | ||||
|     "debug" : 1, | ||||
|     "key_file" : full_path("test.key"), | ||||
|     "cert_file" : full_path("test.pem"), | ||||
|     "xmlsec_binary" : None, | ||||
|     "debug": 1, | ||||
|     "key_file": full_path("test.key"), | ||||
|     "cert_file": full_path("test.pem"), | ||||
|     "xmlsec_binary": None, | ||||
|     "metadata": { | ||||
|         "local": [full_path("servera.xml"), | ||||
|                   full_path("vo_metadata.xml")], | ||||
|         }, | ||||
|     "attribute_map_dir" : full_path("attributemaps"), | ||||
|     }, | ||||
|     "attribute_map_dir": full_path("attributemaps"), | ||||
|     "organization": { | ||||
|         "name": "Exempel AB", | ||||
|         "display_name": [("Exempel ÄB","se"),("Example Co.","en")], | ||||
|         "url":"http://www.example.com/roland", | ||||
|         "display_name": [("Exempel ÄB", "se"), ("Example Co.", "en")], | ||||
|         "url": "http://www.example.com/roland", | ||||
|     }, | ||||
|     "contact_person": [ | ||||
|         { | ||||
|             "given_name": "John", | ||||
|             "sur_name": "Smith", | ||||
|             "email_address": ["john.smith@example.com"], | ||||
|             "contact_type": "technical", | ||||
|         }, | ||||
|     "contact_person": [{ | ||||
|                            "given_name":"John", | ||||
|                            "sur_name": "Smith", | ||||
|                            "email_address": ["john.smith@example.com"], | ||||
|                            "contact_type": "technical", | ||||
|                            }, | ||||
|                        ], | ||||
|     } | ||||
|     ], | ||||
| } | ||||
|   | ||||
| @@ -1,8 +1,11 @@ | ||||
| from saml2 import BINDING_SOAP, BINDING_HTTP_REDIRECT, BINDING_HTTP_POST | ||||
| from saml2 import BINDING_SOAP | ||||
| from saml2 import BINDING_HTTP_REDIRECT | ||||
| from saml2 import BINDING_HTTP_POST | ||||
| from saml2.saml import NAMEID_FORMAT_PERSISTENT | ||||
| from saml2.saml import NAME_FORMAT_URI | ||||
|  | ||||
| from pathutils import full_path | ||||
| from pathutils import xmlsec_path | ||||
|  | ||||
| BASE = "http://localhost:8088" | ||||
|  | ||||
| @@ -41,7 +44,7 @@ CONFIG = { | ||||
|     "debug": 1, | ||||
|     "key_file": full_path("test.key"), | ||||
|     "cert_file": full_path("test.pem"), | ||||
|     "xmlsec_binary": None, | ||||
|     "xmlsec_binary": xmlsec_path, | ||||
|     "metadata": { | ||||
|         "local": [full_path("metadata_sp_1.xml"), | ||||
|                   full_path("vo_metadata.xml")], | ||||
|   | ||||
| @@ -12,3 +12,13 @@ def dotname(module): | ||||
|         return 'tests.' + module | ||||
|     else: | ||||
|         return module | ||||
|  | ||||
| try: | ||||
|     from saml2.sigver import get_xmlsec_binary | ||||
| except ImportError: | ||||
|     get_xmlsec_binary = None | ||||
|  | ||||
| if get_xmlsec_binary: | ||||
|     xmlsec_path = get_xmlsec_binary(["/opt/local/bin"]) | ||||
| else: | ||||
|     xmlsec_path = '/usr/bin/xmlsec1' | ||||
|   | ||||
| @@ -1,6 +1,7 @@ | ||||
| from pathutils import full_path | ||||
| from pathutils import xmlsec_path | ||||
|  | ||||
| CONFIG={ | ||||
| CONFIG = { | ||||
|     "entityid" : "urn:mace:example.com:saml:roland:sp", | ||||
|     "name" : "urn:mace:example.com:saml:roland:sp", | ||||
|     "description": "My own SP", | ||||
| @@ -19,7 +20,7 @@ CONFIG={ | ||||
|     "key_file": full_path("test.key"), | ||||
|     "cert_file": full_path("test.pem"), | ||||
|     "ca_certs": full_path("cacerts.txt"), | ||||
|     "xmlsec_binary": None, | ||||
|     "xmlsec_binary": xmlsec_path, | ||||
|     "metadata": { | ||||
|         "local": [full_path("idp.xml"), full_path("vo_metadata.xml")], | ||||
|     }, | ||||
|   | ||||
| @@ -49,7 +49,7 @@ CONFIG = { | ||||
|     "key_file": full_path("test.key"), | ||||
|     "cert_file": full_path("test.pem"), | ||||
|     "ca_certs": full_path("cacerts.txt"), | ||||
|     "xmlsec_binary" : None, | ||||
|     "xmlsec_binary": None, | ||||
|     "metadata": { | ||||
|         "local": [full_path("idp_all.xml"), full_path("vo_metadata.xml")], | ||||
|     }, | ||||
|   | ||||
| @@ -42,11 +42,11 @@ from saml2.saml import NAMEID_FORMAT_EMAILADDRESS | ||||
| class TestExtensionElement: | ||||
|     def test_loadd(self): | ||||
|         ava = { | ||||
|             "attributes": {"attr":"loa", "info":"source"}, | ||||
|             "attributes": {"attr": "loa", "info": "source"}, | ||||
|             "tag": "tag", | ||||
|             "namespace": "urn:mace:example.com", | ||||
|             "text": "free text" | ||||
|             } | ||||
|         } | ||||
|  | ||||
|         ee = saml2.ExtensionElement(ava["tag"]) | ||||
|         ee.loadd(ava) | ||||
| @@ -65,33 +65,35 @@ class TestExtensionElement: | ||||
|  | ||||
|     def test_find_children(self): | ||||
|         ava = { | ||||
|             "attributes": {"attr":"loa", "info":"source"}, | ||||
|             "attributes": {"attr": "loa", "info": "source"}, | ||||
|             "tag": "tag", | ||||
|             "namespace": "urn:mace:example.com", | ||||
|             "text": "free text", | ||||
|             "children": [{ | ||||
|                 "attributes": {"foo":"bar","special":"app"}, | ||||
|                 "tag": "tag2", | ||||
|                 "namespace": "urn:mace:example.com", | ||||
|                 "text": "Just a line" | ||||
|                 }, | ||||
|                 { | ||||
|                 "attributes": {"static":"attribute","dynamic":"orgname"}, | ||||
|                 "tag": "tag3", | ||||
|                 "namespace": "urn:mace:example.com", | ||||
|                 "text": "Another line of text", | ||||
|                 "children": [{ | ||||
|                     "tag": "subtag", | ||||
|                     "namespace": "urn:mace:example.org", | ||||
|                     "text": "grandchild" | ||||
|                     }] | ||||
|                 }, | ||||
|                 { | ||||
|                 "attributes": {"entitlement":"xyz"}, | ||||
|                 "tag": "tag4", | ||||
|                 "namespace": "urn:mace:example.org", | ||||
|                 "text": "A comment" | ||||
|                 } | ||||
|                              "attributes": {"foo": "bar", "special": "app"}, | ||||
|                              "tag": "tag2", | ||||
|                              "namespace": "urn:mace:example.com", | ||||
|                              "text": "Just a line" | ||||
|                          }, | ||||
|                          { | ||||
|                              "attributes": {"static": "attribute", | ||||
|                                             "dynamic": "orgname"}, | ||||
|                              "tag": "tag3", | ||||
|                              "namespace": "urn:mace:example.com", | ||||
|                              "text": "Another line of text", | ||||
|                              "children": [{ | ||||
|                                               "tag": "subtag", | ||||
|                                               "namespace": "urn:mace:example.org", | ||||
|  | ||||
|                                               "text": "grandchild" | ||||
|                                           }] | ||||
|                          }, | ||||
|                          { | ||||
|                              "attributes": {"entitlement": "xyz"}, | ||||
|                              "tag": "tag4", | ||||
|                              "namespace": "urn:mace:example.org", | ||||
|                              "text": "A comment" | ||||
|                          } | ||||
|             ] | ||||
|         } | ||||
|  | ||||
| @@ -126,31 +128,32 @@ class TestExtensionElement: | ||||
|         c = ee.find_children() | ||||
|         assert len(c) == 3 | ||||
|  | ||||
|  | ||||
| class TestExtensionContainer: | ||||
|     def test_find_extensions(self): | ||||
|         avas = [{ | ||||
|             "attributes": {"foo":"bar","special":"app"}, | ||||
|             "tag": "tag2", | ||||
|             "namespace": "urn:mace:example.com", | ||||
|             "text": "Just a line" | ||||
|             }, | ||||
|             { | ||||
|             "attributes": {"static":"attribute","dynamic":"orgname"}, | ||||
|             "tag": "tag3", | ||||
|             "namespace": "urn:mace:example.com", | ||||
|             "text": "Another line of text", | ||||
|             "children": [{ | ||||
|                 "tag": "subtag", | ||||
|                 "namespace": "urn:mace:example.org", | ||||
|                 "text": "grandchild" | ||||
|                     "attributes": {"foo": "bar", "special": "app"}, | ||||
|                     "tag": "tag2", | ||||
|                     "namespace": "urn:mace:example.com", | ||||
|                     "text": "Just a line" | ||||
|                 }, | ||||
|                 { | ||||
|                     "attributes": {"static": "attribute", "dynamic": "orgname"}, | ||||
|                     "tag": "tag3", | ||||
|                     "namespace": "urn:mace:example.com", | ||||
|                     "text": "Another line of text", | ||||
|                     "children": [{ | ||||
|                                      "tag": "subtag", | ||||
|                                      "namespace": "urn:mace:example.org", | ||||
|                                      "text": "grandchild" | ||||
|                                  }] | ||||
|                 }, | ||||
|                 { | ||||
|                     "attributes": {"entitlement": "xyz"}, | ||||
|                     "tag": "tag4", | ||||
|                     "namespace": "urn:mace:example.org", | ||||
|                     "text": "A comment" | ||||
|                 }] | ||||
|             }, | ||||
|             { | ||||
|             "attributes": {"entitlement":"xyz"}, | ||||
|             "tag": "tag4", | ||||
|             "namespace": "urn:mace:example.org", | ||||
|             "text": "A comment" | ||||
|             }] | ||||
|  | ||||
|         ees = [saml2.ExtensionElement("").loadd(a) for a in avas] | ||||
|         print ees | ||||
| @@ -194,13 +197,14 @@ class TestExtensionContainer: | ||||
|         assert len(ec.extension_attributes) == 1 | ||||
|         assert ec.extension_attributes.keys()[0] == "foo" | ||||
|  | ||||
|  | ||||
| class TestSAMLBase: | ||||
|     def test_make_vals_dict(self): | ||||
|         ava = { | ||||
|             "sp_name_qualifier": "loa", | ||||
|             "format": NAMEID_FORMAT_EMAILADDRESS, | ||||
|             "text": "free text" | ||||
|             } | ||||
|         } | ||||
|  | ||||
|         foo = saml2.make_vals(ava, Issuer, part=True) | ||||
|         print foo | ||||
| @@ -220,7 +224,7 @@ class TestSAMLBase: | ||||
|         ava = ["foo", "bar", "lions", "saints"] | ||||
|  | ||||
|         raises(Exception, | ||||
|               "saml2.make_vals(ava, AttributeValue, Attribute(), part=True)") | ||||
|                "saml2.make_vals(ava, AttributeValue, Attribute(), part=True)") | ||||
|  | ||||
|         attr = Attribute() | ||||
|         saml2.make_vals(ava, AttributeValue, attr, prop="attribute_value") | ||||
| @@ -229,13 +233,13 @@ class TestSAMLBase: | ||||
|  | ||||
|     def test_to_string_nspair(self): | ||||
|         foo = saml2.make_vals("lions", AttributeValue, part=True) | ||||
|         str = foo.to_string() | ||||
|         nsstr = foo.to_string({"saml":saml.NAMESPACE}) | ||||
|         assert nsstr != str | ||||
|         print str | ||||
|         txt = foo.to_string() | ||||
|         nsstr = foo.to_string({"saml": saml.NAMESPACE}) | ||||
|         assert nsstr != txt | ||||
|         print txt | ||||
|         print nsstr | ||||
|         assert "saml:AttributeValue" in nsstr | ||||
|         assert "saml:AttributeValue" not in str | ||||
|         assert "saml:AttributeValue" not in txt | ||||
|  | ||||
|     def test_set_text(self): | ||||
|         av = AttributeValue() | ||||
| @@ -260,8 +264,8 @@ class TestSAMLBase: | ||||
|         foo = saml2.make_vals(False, AttributeValue, part=True) | ||||
|         assert foo.text == "false" | ||||
|  | ||||
| class TestNameID: | ||||
|  | ||||
| class TestNameID: | ||||
|     def setup_class(self): | ||||
|         self.name_id = saml.NameID() | ||||
|  | ||||
| @@ -332,7 +336,6 @@ class TestNameID: | ||||
|  | ||||
|  | ||||
| class TestIssuer: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.issuer = saml.Issuer() | ||||
|  | ||||
| @@ -357,7 +360,6 @@ class TestIssuer: | ||||
|  | ||||
|  | ||||
| class TestSubjectLocality: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.subject_locality = saml.SubjectLocality() | ||||
|  | ||||
| @@ -388,7 +390,6 @@ class TestSubjectLocality: | ||||
|  | ||||
|  | ||||
| class TestAuthnContextClassRef: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.authn_context_class_ref = saml.AuthnContextClassRef() | ||||
|         self.text = "http://www.example.com/authnContextClassRef" | ||||
| @@ -401,7 +402,7 @@ class TestAuthnContextClassRef: | ||||
|             self.authn_context_class_ref.to_string()) | ||||
|         assert new_authn_context_class_ref.text == self.text | ||||
|         assert self.authn_context_class_ref.to_string() == \ | ||||
|                     new_authn_context_class_ref.to_string() | ||||
|                new_authn_context_class_ref.to_string() | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|         """Test authn_context_class_ref_from_string() using test data""" | ||||
| @@ -411,7 +412,6 @@ class TestAuthnContextClassRef: | ||||
|  | ||||
|  | ||||
| class TestAuthnContextDeclRef: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.authn_context_decl_ref = saml.AuthnContextDeclRef() | ||||
|         self.ref = "http://www.example.com/authnContextDeclRef" | ||||
| @@ -424,7 +424,7 @@ class TestAuthnContextDeclRef: | ||||
|             self.authn_context_decl_ref.to_string()) | ||||
|         assert new_authn_context_decl_ref.text == self.ref | ||||
|         assert self.authn_context_decl_ref.to_string() == \ | ||||
|                                  new_authn_context_decl_ref.to_string() | ||||
|                new_authn_context_decl_ref.to_string() | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|         """Test authn_context_decl_ref_from_string() using test data""" | ||||
| @@ -434,7 +434,6 @@ class TestAuthnContextDeclRef: | ||||
|  | ||||
|  | ||||
| class TestAuthnContextDecl: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.authn_context_decl = saml.AuthnContextDecl() | ||||
|         self.text = "http://www.example.com/authnContextDecl" | ||||
| @@ -447,7 +446,7 @@ class TestAuthnContextDecl: | ||||
|             self.authn_context_decl.to_string()) | ||||
|         assert new_authn_context_decl.text == self.text | ||||
|         assert self.authn_context_decl.to_string() == \ | ||||
|                                  new_authn_context_decl.to_string() | ||||
|                new_authn_context_decl.to_string() | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|         """Test authn_context_decl_from_string() using test data""" | ||||
| @@ -457,7 +456,6 @@ class TestAuthnContextDecl: | ||||
|  | ||||
|  | ||||
| class TestAuthenticatingAuthority: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.authenticating_authority = saml.AuthenticatingAuthority() | ||||
|         self.text = "http://www.example.com/authenticatingAuthority" | ||||
| @@ -470,7 +468,7 @@ class TestAuthenticatingAuthority: | ||||
|             self.authenticating_authority.to_string()) | ||||
|         assert new_authenticating_authority.text == self.text | ||||
|         assert self.authenticating_authority.to_string() == \ | ||||
|                                  new_authenticating_authority.to_string() | ||||
|                new_authenticating_authority.to_string() | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|         """Test authenticating_authority_from_string() using test data""" | ||||
| @@ -478,8 +476,8 @@ class TestAuthenticatingAuthority: | ||||
|             saml2_data.TEST_AUTHENTICATING_AUTHORITY) | ||||
|         assert authenticating_authority.text.strip() == self.text | ||||
|  | ||||
| class TestAuthnContext: | ||||
|  | ||||
| class TestAuthnContext: | ||||
|     def setup_class(self): | ||||
|         self.authn_context = saml.AuthnContext() | ||||
|  | ||||
| @@ -487,37 +485,37 @@ class TestAuthnContext: | ||||
|         """Test for AuthnContext accessors""" | ||||
|         self.authn_context.authn_context_class_ref = \ | ||||
|             saml.authn_context_class_ref_from_string( | ||||
|             saml2_data.TEST_AUTHN_CONTEXT_CLASS_REF) | ||||
|                 saml2_data.TEST_AUTHN_CONTEXT_CLASS_REF) | ||||
|         self.authn_context.authn_context_decl_ref = \ | ||||
|             saml.authn_context_decl_ref_from_string( | ||||
|             saml2_data.TEST_AUTHN_CONTEXT_DECL_REF) | ||||
|                 saml2_data.TEST_AUTHN_CONTEXT_DECL_REF) | ||||
|         self.authn_context.authn_context_decl = \ | ||||
|             saml.authn_context_decl_from_string( | ||||
|             saml2_data.TEST_AUTHN_CONTEXT_DECL) | ||||
|                 saml2_data.TEST_AUTHN_CONTEXT_DECL) | ||||
|         self.authn_context.authenticating_authority.append( | ||||
|             saml.authenticating_authority_from_string( | ||||
|             saml2_data.TEST_AUTHENTICATING_AUTHORITY)) | ||||
|                 saml2_data.TEST_AUTHENTICATING_AUTHORITY)) | ||||
|         assert self.authn_context.authn_context_class_ref.text.strip() == \ | ||||
|                                  "http://www.example.com/authnContextClassRef" | ||||
|                "http://www.example.com/authnContextClassRef" | ||||
|         assert self.authn_context.authn_context_decl_ref.text.strip() == \ | ||||
|                                  "http://www.example.com/authnContextDeclRef" | ||||
|                "http://www.example.com/authnContextDeclRef" | ||||
|         assert self.authn_context.authn_context_decl.text.strip() == \ | ||||
|                                  "http://www.example.com/authnContextDecl" | ||||
|                "http://www.example.com/authnContextDecl" | ||||
|         assert self.authn_context.authenticating_authority[0].text.strip() == \ | ||||
|                                  "http://www.example.com/authenticatingAuthority" | ||||
|                "http://www.example.com/authenticatingAuthority" | ||||
|         new_authn_context = saml.authn_context_from_string( | ||||
|             self.authn_context.to_string()) | ||||
|         assert self.authn_context.to_string() == new_authn_context.to_string() | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|         """Test authn_context_from_string() using test data""" | ||||
|         authn_context = saml.authn_context_from_string(saml2_data.TEST_AUTHN_CONTEXT) | ||||
|         authn_context = saml.authn_context_from_string( | ||||
|             saml2_data.TEST_AUTHN_CONTEXT) | ||||
|         assert authn_context.authn_context_class_ref.text.strip() == \ | ||||
|                                  saml.AUTHN_PASSWORD | ||||
|                saml.AUTHN_PASSWORD | ||||
|  | ||||
|  | ||||
| class TestAuthnStatement: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.authn_statem = saml.AuthnStatement() | ||||
|  | ||||
| @@ -529,42 +527,42 @@ class TestAuthnStatement: | ||||
|         self.authn_statem.authn_context = saml.AuthnContext() | ||||
|         self.authn_statem.authn_context.authn_context_class_ref = \ | ||||
|             saml.authn_context_class_ref_from_string( | ||||
|             saml2_data.TEST_AUTHN_CONTEXT_CLASS_REF) | ||||
|                 saml2_data.TEST_AUTHN_CONTEXT_CLASS_REF) | ||||
|         self.authn_statem.authn_context.authn_context_decl_ref = \ | ||||
|             saml.authn_context_decl_ref_from_string( | ||||
|             saml2_data.TEST_AUTHN_CONTEXT_DECL_REF) | ||||
|                 saml2_data.TEST_AUTHN_CONTEXT_DECL_REF) | ||||
|         self.authn_statem.authn_context.authn_context_decl = \ | ||||
|             saml.authn_context_decl_from_string( | ||||
|             saml2_data.TEST_AUTHN_CONTEXT_DECL) | ||||
|                 saml2_data.TEST_AUTHN_CONTEXT_DECL) | ||||
|         self.authn_statem.authn_context.authenticating_authority.append( | ||||
|             saml.authenticating_authority_from_string( | ||||
|             saml2_data.TEST_AUTHENTICATING_AUTHORITY)) | ||||
|                 saml2_data.TEST_AUTHENTICATING_AUTHORITY)) | ||||
|  | ||||
|         new_as = saml.authn_statement_from_string(self.authn_statem.to_string()) | ||||
|         assert new_as.authn_instant == "2007-08-31T01:05:02Z" | ||||
|         assert new_as.session_index == "sessionindex" | ||||
|         assert new_as.session_not_on_or_after == "2007-09-14T01:05:02Z" | ||||
|         assert new_as.authn_context.authn_context_class_ref.text.strip() == \ | ||||
|                                  "http://www.example.com/authnContextClassRef" | ||||
|                "http://www.example.com/authnContextClassRef" | ||||
|         assert new_as.authn_context.authn_context_decl_ref.text.strip() == \ | ||||
|                                  "http://www.example.com/authnContextDeclRef" | ||||
|                "http://www.example.com/authnContextDeclRef" | ||||
|         assert new_as.authn_context.authn_context_decl.text.strip() == \ | ||||
|                                  "http://www.example.com/authnContextDecl" | ||||
|                "http://www.example.com/authnContextDecl" | ||||
|         assert new_as.authn_context.authenticating_authority[0].text.strip() \ | ||||
|                                  == "http://www.example.com/authenticatingAuthority" | ||||
|                == "http://www.example.com/authenticatingAuthority" | ||||
|         assert self.authn_statem.to_string() == new_as.to_string() | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|         """Test authn_statement_from_string() using test data""" | ||||
|         authn_statem = saml.authn_statement_from_string(saml2_data.TEST_AUTHN_STATEMENT) | ||||
|         authn_statem = saml.authn_statement_from_string( | ||||
|             saml2_data.TEST_AUTHN_STATEMENT) | ||||
|         assert authn_statem.authn_instant == "2007-08-31T01:05:02Z" | ||||
|         assert authn_statem.session_not_on_or_after == "2007-09-14T01:05:02Z" | ||||
|         assert authn_statem.authn_context.authn_context_class_ref.text.strip() == \ | ||||
|                                  saml.AUTHN_PASSWORD | ||||
|                saml.AUTHN_PASSWORD | ||||
|  | ||||
|  | ||||
| class TestAttributeValue: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.attribute_value = saml.AttributeValue() | ||||
|         self.text = "value for test attribute" | ||||
| @@ -584,6 +582,7 @@ class TestAttributeValue: | ||||
|             saml2_data.TEST_ATTRIBUTE_VALUE) | ||||
|         assert attribute_value.text.strip() == self.text | ||||
|  | ||||
|  | ||||
| BASIC_STR_AV = """<?xml version="1.0" encoding="utf-8"?> | ||||
| <Attribute xmlns="urn:oasis:names:tc:SAML:2.0:assertion" | ||||
| xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" | ||||
| @@ -650,13 +649,13 @@ FriendlyName="pre_auth_req"> | ||||
| <AttributeValue xsi:type="xs:integer">1</AttributeValue> | ||||
| </Attribute>""" | ||||
|  | ||||
| class TestAttribute: | ||||
|  | ||||
| class TestAttribute: | ||||
|     def setup_class(self): | ||||
|         self.attribute = saml.Attribute() | ||||
|         self.text = ["value of test attribute", | ||||
|             "value1 of test attribute", | ||||
|             "value2 of test attribute"] | ||||
|                      "value1 of test attribute", | ||||
|                      "value2 of test attribute"] | ||||
|  | ||||
|     def testAccessors(self): | ||||
|         """Test for Attribute accessors""" | ||||
| @@ -714,15 +713,15 @@ class TestAttribute: | ||||
|         print attribute | ||||
|         assert attribute.attribute_value[0].text.lower() == "false" | ||||
|  | ||||
| class TestAttributeStatement: | ||||
|  | ||||
| class TestAttributeStatement: | ||||
|     def setup_class(self): | ||||
|         self.attr_statem = saml.AttributeStatement() | ||||
|         self.text = ["value of test attribute", | ||||
|             "value1 of test attribute", | ||||
|             "value2 of test attribute", | ||||
|             "value1 of test attribute2", | ||||
|             "value2 of test attribute2",] | ||||
|                      "value1 of test attribute", | ||||
|                      "value2 of test attribute", | ||||
|                      "value1 of test attribute2", | ||||
|                      "value2 of test attribute2", ] | ||||
|  | ||||
|     def testAccessors(self): | ||||
|         """Test for Attribute accessors""" | ||||
| @@ -731,56 +730,73 @@ class TestAttributeStatement: | ||||
|         self.attr_statem.attribute[0].name = "testAttribute" | ||||
|         self.attr_statem.attribute[0].name_format = saml.NAME_FORMAT_URI | ||||
|         self.attr_statem.attribute[0].friendly_name = "test attribute" | ||||
|         self.attr_statem.attribute[0].attribute_value.append(saml.AttributeValue()) | ||||
|         self.attr_statem.attribute[0].attribute_value.append( | ||||
|             saml.AttributeValue()) | ||||
|         self.attr_statem.attribute[0].attribute_value[0].text = self.text[0] | ||||
|  | ||||
|         self.attr_statem.attribute[1].name = "testAttribute2" | ||||
|         self.attr_statem.attribute[1].name_format = saml.NAME_FORMAT_UNSPECIFIED | ||||
|         self.attr_statem.attribute[1].friendly_name = self.text[2] | ||||
|         self.attr_statem.attribute[1].attribute_value.append(saml.AttributeValue()) | ||||
|         self.attr_statem.attribute[1].attribute_value.append( | ||||
|             saml.AttributeValue()) | ||||
|         self.attr_statem.attribute[1].attribute_value[0].text = self.text[2] | ||||
|  | ||||
|         new_as = saml.attribute_statement_from_string(self.attr_statem.to_string()) | ||||
|         new_as = saml.attribute_statement_from_string( | ||||
|             self.attr_statem.to_string()) | ||||
|         assert new_as.attribute[0].name == "testAttribute" | ||||
|         assert new_as.attribute[0].name_format == saml.NAME_FORMAT_URI | ||||
|         assert new_as.attribute[0].friendly_name == "test attribute" | ||||
|         assert new_as.attribute[0].attribute_value[0].text.strip() == self.text[0] | ||||
|         assert new_as.attribute[0].attribute_value[0].text.strip() == self.text[ | ||||
|             0] | ||||
|         assert new_as.attribute[1].name == "testAttribute2" | ||||
|         assert new_as.attribute[1].name_format == saml.NAME_FORMAT_UNSPECIFIED | ||||
|         assert new_as.attribute[1].friendly_name == "value2 of test attribute" | ||||
|         assert new_as.attribute[1].attribute_value[0].text.strip() == self.text[2] | ||||
|         assert new_as.attribute[1].attribute_value[0].text.strip() == self.text[ | ||||
|             2] | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|         """Test attribute_statement_from_string() using test data""" | ||||
|         attr_statem = saml.attribute_statement_from_string( \ | ||||
|                                     saml2_data.TEST_ATTRIBUTE_STATEMENT) | ||||
|             saml2_data.TEST_ATTRIBUTE_STATEMENT) | ||||
|         assert attr_statem.attribute[0].name == "testAttribute" | ||||
|         assert attr_statem.attribute[0].name_format == saml.NAME_FORMAT_UNSPECIFIED | ||||
|         assert attr_statem.attribute[ | ||||
|                    0].name_format == saml.NAME_FORMAT_UNSPECIFIED | ||||
|         assert attr_statem.attribute[0].friendly_name == "test attribute" | ||||
|         assert attr_statem.attribute[0].attribute_value[0].text.strip() == self.text[1] | ||||
|         assert attr_statem.attribute[0].attribute_value[1].text.strip() == self.text[2] | ||||
|         assert attr_statem.attribute[1].name == "http://www.example.com/testAttribute2" | ||||
|         assert attr_statem.attribute[0].attribute_value[0].text.strip() == \ | ||||
|                self.text[1] | ||||
|         assert attr_statem.attribute[0].attribute_value[1].text.strip() == \ | ||||
|                self.text[2] | ||||
|         assert attr_statem.attribute[ | ||||
|                    1].name == "http://www.example.com/testAttribute2" | ||||
|         assert attr_statem.attribute[1].name_format == saml.NAME_FORMAT_URI | ||||
|         assert attr_statem.attribute[1].friendly_name == "test attribute2" | ||||
|         assert attr_statem.attribute[1].attribute_value[0].text.strip() == self.text[3] | ||||
|         assert attr_statem.attribute[1].attribute_value[1].text.strip() == self.text[4] | ||||
|         assert attr_statem.attribute[1].attribute_value[0].text.strip() == \ | ||||
|                self.text[3] | ||||
|         assert attr_statem.attribute[1].attribute_value[1].text.strip() == \ | ||||
|                self.text[4] | ||||
|  | ||||
|         # test again | ||||
|         attr_statem2 = saml.attribute_statement_from_string(attr_statem.to_string()) | ||||
|         attr_statem2 = saml.attribute_statement_from_string( | ||||
|             attr_statem.to_string()) | ||||
|         assert attr_statem2.attribute[0].name == "testAttribute" | ||||
|         assert attr_statem2.attribute[0].name_format == saml.NAME_FORMAT_UNSPECIFIED | ||||
|         assert attr_statem2.attribute[ | ||||
|                    0].name_format == saml.NAME_FORMAT_UNSPECIFIED | ||||
|         assert attr_statem2.attribute[0].friendly_name == "test attribute" | ||||
|         assert attr_statem2.attribute[0].attribute_value[0].text.strip() == self.text[1] | ||||
|         assert attr_statem2.attribute[0].attribute_value[1].text.strip() == self.text[2] | ||||
|         assert attr_statem2.attribute[1].name == "http://www.example.com/testAttribute2" | ||||
|         assert attr_statem2.attribute[0].attribute_value[0].text.strip() == \ | ||||
|                self.text[1] | ||||
|         assert attr_statem2.attribute[0].attribute_value[1].text.strip() == \ | ||||
|                self.text[2] | ||||
|         assert attr_statem2.attribute[ | ||||
|                    1].name == "http://www.example.com/testAttribute2" | ||||
|         assert attr_statem2.attribute[1].name_format == saml.NAME_FORMAT_URI | ||||
|         assert attr_statem2.attribute[1].friendly_name == "test attribute2" | ||||
|         assert attr_statem2.attribute[1].attribute_value[0].text.strip() == self.text[3] | ||||
|         assert attr_statem2.attribute[1].attribute_value[1].text.strip() == self.text[4] | ||||
|         assert attr_statem2.attribute[1].attribute_value[0].text.strip() == \ | ||||
|                self.text[3] | ||||
|         assert attr_statem2.attribute[1].attribute_value[1].text.strip() == \ | ||||
|                self.text[4] | ||||
|  | ||||
|  | ||||
| class TestSubjectConfirmationData: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.scd = saml.SubjectConfirmationData() | ||||
|  | ||||
| @@ -792,7 +808,8 @@ class TestSubjectConfirmationData: | ||||
|         self.scd.recipient = "recipient" | ||||
|         self.scd.in_response_to = "responseID" | ||||
|         self.scd.address = "127.0.0.1" | ||||
|         new_scd = saml.subject_confirmation_data_from_string(self.scd.to_string()) | ||||
|         new_scd = saml.subject_confirmation_data_from_string( | ||||
|             self.scd.to_string()) | ||||
|         assert new_scd.not_before == "2007-08-31T01:05:02Z" | ||||
|         assert new_scd.not_on_or_after == "2007-09-14T01:05:02Z" | ||||
|         assert new_scd.recipient == "recipient" | ||||
| @@ -812,7 +829,6 @@ class TestSubjectConfirmationData: | ||||
|  | ||||
|  | ||||
| class TestSubjectConfirmation: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.sc = saml.SubjectConfirmation() | ||||
|  | ||||
| @@ -826,9 +842,9 @@ class TestSubjectConfirmation: | ||||
|         assert new_sc.name_id.sp_provided_id == "sp provided id" | ||||
|         assert new_sc.method == saml.SCM_BEARER | ||||
|         assert new_sc.subject_confirmation_data.not_before == \ | ||||
|                                  "2007-08-31T01:05:02Z" | ||||
|                "2007-08-31T01:05:02Z" | ||||
|         assert new_sc.subject_confirmation_data.not_on_or_after == \ | ||||
|                                  "2007-09-14T01:05:02Z" | ||||
|                "2007-09-14T01:05:02Z" | ||||
|         assert new_sc.subject_confirmation_data.recipient == "recipient" | ||||
|         assert new_sc.subject_confirmation_data.in_response_to == "responseID" | ||||
|         assert new_sc.subject_confirmation_data.address == "127.0.0.1" | ||||
| @@ -848,7 +864,6 @@ class TestSubjectConfirmation: | ||||
|  | ||||
|  | ||||
| class TestSubject: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.subject = saml.Subject() | ||||
|  | ||||
| @@ -857,13 +872,13 @@ class TestSubject: | ||||
|         self.subject.name_id = saml.name_id_from_string(saml2_data.TEST_NAME_ID) | ||||
|         self.subject.subject_confirmation.append( | ||||
|             saml.subject_confirmation_from_string( | ||||
|             saml2_data.TEST_SUBJECT_CONFIRMATION)) | ||||
|                 saml2_data.TEST_SUBJECT_CONFIRMATION)) | ||||
|         new_subject = saml.subject_from_string(self.subject.to_string()) | ||||
|         assert new_subject.name_id.sp_provided_id == "sp provided id" | ||||
|         assert new_subject.name_id.text.strip() == "tmatsuo@example.com" | ||||
|         assert new_subject.name_id.format == saml.NAMEID_FORMAT_EMAILADDRESS | ||||
|         assert isinstance(new_subject.subject_confirmation[0], | ||||
|                             saml.SubjectConfirmation) | ||||
|                           saml.SubjectConfirmation) | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|         """Test for subject_from_string() using test data.""" | ||||
| @@ -873,11 +888,10 @@ class TestSubject: | ||||
|         assert subject.name_id.text.strip() == "tmatsuo@example.com" | ||||
|         assert subject.name_id.format == saml.NAMEID_FORMAT_EMAILADDRESS | ||||
|         assert isinstance(subject.subject_confirmation[0], | ||||
|                             saml.SubjectConfirmation) | ||||
|                           saml.SubjectConfirmation) | ||||
|  | ||||
|  | ||||
| class TestCondition: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.condition = saml.Condition() | ||||
|         self.name = "{%s}type" % saml.XSI_NAMESPACE | ||||
| @@ -888,7 +902,8 @@ class TestCondition: | ||||
|         self.condition.extension_attributes['ExtendedAttribute'] = "value" | ||||
|         new_condition = saml.condition_from_string(self.condition.to_string()) | ||||
|         assert new_condition.extension_attributes[self.name] == "test" | ||||
|         assert new_condition.extension_attributes["ExtendedAttribute"] == "value" | ||||
|         assert new_condition.extension_attributes[ | ||||
|                    "ExtendedAttribute"] == "value" | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|         """Test for condition_from_string() using test data.""" | ||||
| @@ -898,7 +913,6 @@ class TestCondition: | ||||
|  | ||||
|  | ||||
| class TestAudience: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.audience = saml.Audience() | ||||
|  | ||||
| @@ -926,9 +940,9 @@ class TestAudienceRestriction: | ||||
|         self.audience_restriction.audience = \ | ||||
|             saml.audience_from_string(saml2_data.TEST_AUDIENCE) | ||||
|         new_audience = saml.audience_restriction_from_string( | ||||
|                         self.audience_restriction.to_string()) | ||||
|             self.audience_restriction.to_string()) | ||||
|         assert self.audience_restriction.audience.text.strip() == \ | ||||
|                                  "http://www.example.com/Audience" | ||||
|                "http://www.example.com/Audience" | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|         """Test audience_restriction_from_string using test data""" | ||||
| @@ -936,11 +950,10 @@ class TestAudienceRestriction: | ||||
|         audience_restriction = saml.audience_restriction_from_string( | ||||
|             saml2_data.TEST_AUDIENCE_RESTRICTION) | ||||
|         assert audience_restriction.audience[0].text.strip() == \ | ||||
|                                  "http://www.example.com/Audience" | ||||
|                "http://www.example.com/Audience" | ||||
|  | ||||
|  | ||||
| class TestOneTimeUse: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.one_time_use = saml.OneTimeUse() | ||||
|  | ||||
| @@ -951,13 +964,13 @@ class TestOneTimeUse: | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|         """Test one_time_use_from_string() using test data""" | ||||
|         one_time_use = saml.one_time_use_from_string(saml2_data.TEST_ONE_TIME_USE) | ||||
|         one_time_use = saml.one_time_use_from_string( | ||||
|             saml2_data.TEST_ONE_TIME_USE) | ||||
|         assert isinstance(one_time_use, saml.OneTimeUse) | ||||
|         assert isinstance(one_time_use, saml.ConditionAbstractType_) | ||||
|  | ||||
|  | ||||
| class TestProxyRestriction: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.proxy_restriction = saml.ProxyRestriction() | ||||
|  | ||||
| @@ -972,7 +985,7 @@ class TestProxyRestriction: | ||||
|             self.proxy_restriction.to_string()) | ||||
|         assert new_proxy_restriction.count == "2" | ||||
|         assert new_proxy_restriction.audience[0].text.strip() == \ | ||||
|                     "http://www.example.com/Audience" | ||||
|                "http://www.example.com/Audience" | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|         """Test proxy_restriction_from_string() using test data""" | ||||
| @@ -981,10 +994,10 @@ class TestProxyRestriction: | ||||
|             saml2_data.TEST_PROXY_RESTRICTION) | ||||
|         assert proxy_restriction.count == "2" | ||||
|         assert proxy_restriction.audience[0].text.strip() == \ | ||||
|                                  "http://www.example.com/Audience" | ||||
|                "http://www.example.com/Audience" | ||||
|  | ||||
|  | ||||
| class TestConditions: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.conditions = saml.Conditions() | ||||
|  | ||||
| @@ -996,16 +1009,17 @@ class TestConditions: | ||||
|         self.conditions.audience_restriction.append(saml.AudienceRestriction()) | ||||
|         self.conditions.one_time_use.append(saml.OneTimeUse()) | ||||
|         self.conditions.proxy_restriction.append(saml.ProxyRestriction()) | ||||
|         new_conditions = saml.conditions_from_string(self.conditions.to_string()) | ||||
|         new_conditions = saml.conditions_from_string( | ||||
|             self.conditions.to_string()) | ||||
|         assert new_conditions.not_before == "2007-08-31T01:05:02Z" | ||||
|         assert new_conditions.not_on_or_after == "2007-09-14T01:05:02Z" | ||||
|         assert isinstance(new_conditions.condition[0], saml.Condition) | ||||
|         assert isinstance(new_conditions.audience_restriction[0], | ||||
|                                                         saml.AudienceRestriction) | ||||
|                           saml.AudienceRestriction) | ||||
|         assert isinstance(new_conditions.one_time_use[0], | ||||
|                                                         saml.OneTimeUse) | ||||
|                           saml.OneTimeUse) | ||||
|         assert isinstance(new_conditions.proxy_restriction[0], | ||||
|                                                         saml.ProxyRestriction) | ||||
|                           saml.ProxyRestriction) | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|         """Test conditions_from_string() using test data""" | ||||
| @@ -1014,14 +1028,14 @@ class TestConditions: | ||||
|         assert new_conditions.not_on_or_after == "2007-09-14T01:05:02Z" | ||||
|         assert isinstance(new_conditions.condition[0], saml.Condition) | ||||
|         assert isinstance(new_conditions.audience_restriction[0], | ||||
|                                                         saml.AudienceRestriction) | ||||
|                           saml.AudienceRestriction) | ||||
|         assert isinstance(new_conditions.one_time_use[0], | ||||
|                                                         saml.OneTimeUse) | ||||
|                           saml.OneTimeUse) | ||||
|         assert isinstance(new_conditions.proxy_restriction[0], | ||||
|                                                         saml.ProxyRestriction) | ||||
|                           saml.ProxyRestriction) | ||||
|  | ||||
|  | ||||
| class TestAssertionIDRef: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.assertion_id_ref = saml.AssertionIDRef() | ||||
|  | ||||
| @@ -1031,18 +1045,17 @@ class TestAssertionIDRef: | ||||
|         new_assertion_id_ref = saml.assertion_id_ref_from_string( | ||||
|             self.assertion_id_ref.to_string()) | ||||
|         assert new_assertion_id_ref.text == \ | ||||
|                                 "zzlieajngjbkjggjldmgindkckkolcblndbghlhm" | ||||
|                "zzlieajngjbkjggjldmgindkckkolcblndbghlhm" | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|         """Test assertion_id_ref_from_string() using test data""" | ||||
|         new_assertion_id_ref = saml.assertion_id_ref_from_string( | ||||
|             saml2_data.TEST_ASSERTION_ID_REF) | ||||
|         assert new_assertion_id_ref.text.strip() == \ | ||||
|                                 "zzlieajngjbkjggjldmgindkckkolcblndbghlhm" | ||||
|                "zzlieajngjbkjggjldmgindkckkolcblndbghlhm" | ||||
|  | ||||
|  | ||||
| class TestAssertionURIRef: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.assertion_uri_ref = saml.AssertionURIRef() | ||||
|  | ||||
| @@ -1052,18 +1065,17 @@ class TestAssertionURIRef: | ||||
|         new_assertion_uri_ref = saml.assertion_uri_ref_from_string( | ||||
|             self.assertion_uri_ref.to_string()) | ||||
|         assert new_assertion_uri_ref.text == \ | ||||
|                                  "http://www.example.com/AssertionURIRef" | ||||
|                "http://www.example.com/AssertionURIRef" | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|         """Test assertion_uri_ref_from_string() using test data""" | ||||
|         new_assertion_uri_ref = saml.assertion_uri_ref_from_string( | ||||
|             saml2_data.TEST_ASSERTION_URI_REF) | ||||
|         assert new_assertion_uri_ref.text.strip() == \ | ||||
|                                  "http://www.example.com/AssertionURIRef" | ||||
|                "http://www.example.com/AssertionURIRef" | ||||
|  | ||||
|  | ||||
| class TestAction: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.action = saml.Action() | ||||
|  | ||||
| @@ -1080,7 +1092,6 @@ class TestAction: | ||||
|  | ||||
|  | ||||
| class TestEvidence: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.evidence = saml.Evidence() | ||||
|  | ||||
| @@ -1094,14 +1105,14 @@ class TestEvidence: | ||||
|         print new_evidence | ||||
|         assert self.evidence.to_string() == new_evidence.to_string() | ||||
|         assert isinstance(new_evidence.assertion_id_ref[0], | ||||
|                                                         saml.AssertionIDRef) | ||||
|                           saml.AssertionIDRef) | ||||
|         assert isinstance(new_evidence.assertion_uri_ref[0], | ||||
|                                                         saml.AssertionURIRef) | ||||
|                           saml.AssertionURIRef) | ||||
|         assert len(new_evidence.assertion) == 1 | ||||
|         assert isinstance(new_evidence.assertion[0], saml.Assertion) | ||||
|         assert len(new_evidence.encrypted_assertion) == 1 | ||||
|         assert isinstance(new_evidence.encrypted_assertion[0], | ||||
|                                                         saml.EncryptedAssertion) | ||||
|                           saml.EncryptedAssertion) | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|         """Test evidence_from_string() using test data""" | ||||
| @@ -1110,7 +1121,6 @@ class TestEvidence: | ||||
|  | ||||
|  | ||||
| class TestAuthzDecisionStatement: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.authz_decision_statement = saml.AuthzDecisionStatement() | ||||
|  | ||||
| @@ -1123,15 +1133,15 @@ class TestAuthzDecisionStatement: | ||||
|         new_authz_decision_statement = saml.authz_decision_statement_from_string( | ||||
|             self.authz_decision_statement.to_string()) | ||||
|         assert self.authz_decision_statement.to_string() == \ | ||||
|                                  new_authz_decision_statement.to_string() | ||||
|                new_authz_decision_statement.to_string() | ||||
|         assert new_authz_decision_statement.resource == \ | ||||
|                                  "http://www.example.com/Resource" | ||||
|                "http://www.example.com/Resource" | ||||
|         assert new_authz_decision_statement.decision == \ | ||||
|                                  saml.DECISION_TYPE_PERMIT | ||||
|                saml.DECISION_TYPE_PERMIT | ||||
|         assert isinstance(new_authz_decision_statement.action[0], | ||||
|                                                         saml.Action) | ||||
|                           saml.Action) | ||||
|         assert isinstance(new_authz_decision_statement.evidence, | ||||
|                                                         saml.Evidence) | ||||
|                           saml.Evidence) | ||||
|  | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
| @@ -1139,8 +1149,8 @@ class TestAuthzDecisionStatement: | ||||
|         # TODO: | ||||
|         pass | ||||
|  | ||||
| class TestAdvice: | ||||
|  | ||||
| class TestAdvice: | ||||
|     def setup_class(self): | ||||
|         self.advice = saml.Advice() | ||||
|  | ||||
| @@ -1153,12 +1163,12 @@ class TestAdvice: | ||||
|         new_advice = saml.advice_from_string(self.advice.to_string()) | ||||
|         assert self.advice.to_string() == new_advice.to_string() | ||||
|         assert isinstance(new_advice.assertion_id_ref[0], | ||||
|                                                         saml.AssertionIDRef) | ||||
|                           saml.AssertionIDRef) | ||||
|         assert isinstance(new_advice.assertion_uri_ref[0], | ||||
|                                                         saml.AssertionURIRef) | ||||
|                           saml.AssertionURIRef) | ||||
|         assert isinstance(new_advice.assertion[0], saml.Assertion) | ||||
|         assert isinstance(new_advice.encrypted_assertion[0], | ||||
|                                                         saml.EncryptedAssertion) | ||||
|                           saml.EncryptedAssertion) | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|         """Test advice_from_string() using test data""" | ||||
| @@ -1167,7 +1177,6 @@ class TestAdvice: | ||||
|  | ||||
|  | ||||
| class TestAssertion: | ||||
|  | ||||
|     def setup_class(self): | ||||
|         self.assertion = saml.Assertion() | ||||
|  | ||||
| @@ -1179,7 +1188,8 @@ class TestAssertion: | ||||
|         self.assertion.issuer = saml.issuer_from_string(saml2_data.TEST_ISSUER) | ||||
|         self.assertion.signature = ds.signature_from_string( | ||||
|             ds_data.TEST_SIGNATURE) | ||||
|         self.assertion.subject = saml.subject_from_string(saml2_data.TEST_SUBJECT) | ||||
|         self.assertion.subject = saml.subject_from_string( | ||||
|             saml2_data.TEST_SUBJECT) | ||||
|         self.assertion.conditions = saml.conditions_from_string( | ||||
|             saml2_data.TEST_CONDITIONS) | ||||
|         self.assertion.advice = saml.Advice() | ||||
| @@ -1190,7 +1200,7 @@ class TestAssertion: | ||||
|             saml.AuthzDecisionStatement()) | ||||
|         self.assertion.attribute_statement.append( | ||||
|             saml.attribute_statement_from_string( | ||||
|             saml2_data.TEST_ATTRIBUTE_STATEMENT)) | ||||
|                 saml2_data.TEST_ATTRIBUTE_STATEMENT)) | ||||
|  | ||||
|         new_assertion = saml.assertion_from_string(self.assertion.to_string()) | ||||
|         assert new_assertion.id == "assertion id" | ||||
| @@ -1203,11 +1213,11 @@ class TestAssertion: | ||||
|         assert isinstance(new_assertion.advice, saml.Advice) | ||||
|         assert isinstance(new_assertion.statement[0], saml.Statement) | ||||
|         assert isinstance(new_assertion.authn_statement[0], | ||||
|                                                 saml.AuthnStatement) | ||||
|                           saml.AuthnStatement) | ||||
|         assert isinstance(new_assertion.authz_decision_statement[0], | ||||
|                                                 saml.AuthzDecisionStatement) | ||||
|                           saml.AuthzDecisionStatement) | ||||
|         assert isinstance(new_assertion.attribute_statement[0], | ||||
|                                                 saml.AttributeStatement) | ||||
|                           saml.AttributeStatement) | ||||
|  | ||||
|  | ||||
|     def testUsingTestData(self): | ||||
|   | ||||
| @@ -19,7 +19,7 @@ except ImportError: | ||||
|         from elementtree import ElementTree | ||||
|  | ||||
| ITEMS = { | ||||
|     NameID:["""<?xml version="1.0" encoding="utf-8"?> | ||||
|     NameID: ["""<?xml version="1.0" encoding="utf-8"?> | ||||
| <NameID xmlns="urn:oasis:names:tc:SAML:2.0:assertion" | ||||
|   Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress" | ||||
|   SPProvidedID="sp provided id"> | ||||
| @@ -35,7 +35,7 @@ Format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent" | ||||
| NameQualifier="http://authentic.example.com/saml/metadata" | ||||
| SPNameQualifier="http://auth.example.com/saml/metadata">test | ||||
| </NameID>"""], | ||||
|     Issuer:"""<?xml version="1.0" encoding="utf-8"?> | ||||
|     Issuer: """<?xml version="1.0" encoding="utf-8"?> | ||||
| <Issuer xmlns="urn:oasis:names:tc:SAML:2.0:assertion"> | ||||
|   http://www.example.com/test | ||||
| </Issuer> | ||||
| @@ -45,14 +45,14 @@ SPNameQualifier="http://auth.example.com/saml/metadata">test | ||||
|   Address="127.0.0.1" DNSName="localhost"/> | ||||
| """, | ||||
|     SubjectConfirmationData: | ||||
| """<?xml version="1.0" encoding="utf-8"?> | ||||
|         """<?xml version="1.0" encoding="utf-8"?> | ||||
| <SubjectConfirmationData xmlns="urn:oasis:names:tc:SAML:2.0:assertion" | ||||
| InResponseTo="_1683146e27983964fbe7bf8f08961108d166a652e5"  | ||||
| NotOnOrAfter="2010-02-18T13:52:13.959Z"  | ||||
| NotBefore="2010-01-16T12:00:00Z"  | ||||
| Recipient="http://192.168.0.10/saml/sp" />""", | ||||
|     SubjectConfirmation: | ||||
|     """<?xml version="1.0" encoding="utf-8"?> | ||||
|         """<?xml version="1.0" encoding="utf-8"?> | ||||
| <SubjectConfirmation xmlns="urn:oasis:names:tc:SAML:2.0:assertion" | ||||
| Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><NameID | ||||
| Format="urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress" | ||||
| @@ -69,9 +69,10 @@ InResponseTo="_59B3A01B03334032C31E434C63F89E3E"/></SubjectConfirmation>""" | ||||
| #        for tcl,xml in ITEMS.items(): | ||||
| #            metafunc.addcall(funcargs={"target_class":tcl,"xml_string":xml}) | ||||
|  | ||||
| def _eq(l1,l2): | ||||
| def _eq(l1, l2): | ||||
|     return set(l1) == set(l2) | ||||
|  | ||||
|  | ||||
| def test_create_class_from_xml_string_nameid(): | ||||
|     kl = create_class_from_xml_string(NameID, ITEMS[NameID][0]) | ||||
|     assert kl != None | ||||
| @@ -81,7 +82,7 @@ def test_create_class_from_xml_string_nameid(): | ||||
|     assert _eq(kl.keyswv(), ['sp_provided_id', 'format', 'text']) | ||||
|     assert class_name(kl) == "urn:oasis:names:tc:SAML:2.0:assertion:NameID" | ||||
|     assert _eq(kl.keys(), ['sp_provided_id', 'sp_name_qualifier', | ||||
|                             'name_qualifier', 'format', 'text']) | ||||
|                            'name_qualifier', 'format', 'text']) | ||||
|  | ||||
|     kl = create_class_from_xml_string(NameID, ITEMS[NameID][1]) | ||||
|     assert kl != None | ||||
| @@ -98,9 +99,10 @@ def test_create_class_from_xml_string_nameid(): | ||||
|     assert kl.sp_name_qualifier == "http://auth.example.com/saml/metadata" | ||||
|     assert kl.text.strip() == "test" | ||||
|     assert _eq(kl.keyswv(), ['sp_name_qualifier', 'format', 'name_qualifier', | ||||
|                             'text']) | ||||
|                              'text']) | ||||
|     assert class_name(kl) == "urn:oasis:names:tc:SAML:2.0:assertion:NameID" | ||||
|  | ||||
|  | ||||
| def test_create_class_from_xml_string_issuer(): | ||||
|     kl = create_class_from_xml_string(Issuer, ITEMS[Issuer]) | ||||
|     assert kl != None | ||||
| @@ -108,33 +110,37 @@ def test_create_class_from_xml_string_issuer(): | ||||
|     assert _eq(kl.keyswv(), ['text']) | ||||
|     assert class_name(kl) == "urn:oasis:names:tc:SAML:2.0:assertion:Issuer" | ||||
|  | ||||
|  | ||||
| def test_create_class_from_xml_string_subject_locality(): | ||||
|     kl = create_class_from_xml_string(SubjectLocality, ITEMS[SubjectLocality]) | ||||
|     assert kl != None | ||||
|     assert _eq(kl.keyswv(), ['address', "dns_name"]) | ||||
|     assert kl.address == "127.0.0.1" | ||||
|     assert kl.dns_name == "localhost" | ||||
|     assert class_name(kl) == "urn:oasis:names:tc:SAML:2.0:assertion:SubjectLocality" | ||||
|     assert class_name( | ||||
|         kl) == "urn:oasis:names:tc:SAML:2.0:assertion:SubjectLocality" | ||||
|  | ||||
|  | ||||
| def test_create_class_from_xml_string_subject_confirmation_data(): | ||||
|     kl = create_class_from_xml_string(SubjectConfirmationData, | ||||
|                                         ITEMS[SubjectConfirmationData]) | ||||
|                                       ITEMS[SubjectConfirmationData]) | ||||
|     assert kl != None | ||||
|     assert _eq(kl.keyswv(), ['in_response_to', 'not_on_or_after', | ||||
|                                 'not_before', 'recipient']) | ||||
|                              'not_before', 'recipient']) | ||||
|     assert kl.in_response_to == "_1683146e27983964fbe7bf8f08961108d166a652e5" | ||||
|     assert kl.not_on_or_after == "2010-02-18T13:52:13.959Z" | ||||
|     assert kl.not_before == "2010-01-16T12:00:00Z" | ||||
|     assert kl.recipient == "http://192.168.0.10/saml/sp" | ||||
|     assert class_name(kl) == \ | ||||
|                 "urn:oasis:names:tc:SAML:2.0:assertion:SubjectConfirmationData" | ||||
|            "urn:oasis:names:tc:SAML:2.0:assertion:SubjectConfirmationData" | ||||
|  | ||||
|  | ||||
| def test_create_class_from_xml_string_subject_confirmation(): | ||||
|     kl = create_class_from_xml_string(SubjectConfirmation, | ||||
|                                         ITEMS[SubjectConfirmation]) | ||||
|                                       ITEMS[SubjectConfirmation]) | ||||
|     assert kl != None | ||||
|     assert _eq(kl.keyswv(), ['method', 'name_id', | ||||
|                                 'subject_confirmation_data']) | ||||
|                              'subject_confirmation_data']) | ||||
|     assert kl.method == "urn:oasis:names:tc:SAML:2.0:cm:bearer" | ||||
|     name_id = kl.name_id | ||||
|     assert _eq(name_id.keyswv(), ['format', 'name_qualifier', 'text']) | ||||
| @@ -143,20 +149,23 @@ def test_create_class_from_xml_string_subject_confirmation(): | ||||
|     assert name_id.text.strip() == "test@example.com" | ||||
|     subject_confirmation_data = kl.subject_confirmation_data | ||||
|     assert _eq(subject_confirmation_data.keyswv(), ['not_on_or_after', | ||||
|                             'recipient', 'in_response_to']) | ||||
|                                                     'recipient', | ||||
|                                                     'in_response_to']) | ||||
|     assert subject_confirmation_data.recipient == \ | ||||
|                     "http://auth.example.com/saml/proxySingleSignOnRedirect" | ||||
|            "http://auth.example.com/saml/proxySingleSignOnRedirect" | ||||
|     assert subject_confirmation_data.not_on_or_after == "2010-02-17T17:02:38Z" | ||||
|     assert subject_confirmation_data.in_response_to == \ | ||||
|                     "_59B3A01B03334032C31E434C63F89E3E" | ||||
|            "_59B3A01B03334032C31E434C63F89E3E" | ||||
|     assert class_name(kl) == \ | ||||
|                 "urn:oasis:names:tc:SAML:2.0:assertion:SubjectConfirmation" | ||||
|            "urn:oasis:names:tc:SAML:2.0:assertion:SubjectConfirmation" | ||||
|  | ||||
|  | ||||
| def test_create_class_from_xml_string_wrong_class_spec(): | ||||
|     kl = create_class_from_xml_string(SubjectConfirmationData, | ||||
|                                         ITEMS[SubjectConfirmation]) | ||||
|                                       ITEMS[SubjectConfirmation]) | ||||
|     assert kl == None | ||||
|  | ||||
|  | ||||
| def test_ee_1(): | ||||
|     ee = saml2.extension_element_from_string( | ||||
|         """<?xml version='1.0' encoding='UTF-8'?><foo>bar</foo>""") | ||||
| @@ -168,17 +177,19 @@ def test_ee_1(): | ||||
|     assert ee.children == [] | ||||
|     assert ee.text == "bar" | ||||
|  | ||||
|  | ||||
| def test_ee_2(): | ||||
|     ee = saml2.extension_element_from_string( | ||||
|         """<?xml version='1.0' encoding='UTF-8'?><foo id="xyz">bar</foo>""") | ||||
|     assert ee != None | ||||
|     print ee.__dict__ | ||||
|     assert ee.attributes == {"id":"xyz"} | ||||
|     assert ee.attributes == {"id": "xyz"} | ||||
|     assert ee.tag == "foo" | ||||
|     assert ee.namespace == None | ||||
|     assert ee.children == [] | ||||
|     assert ee.text == "bar" | ||||
|  | ||||
|  | ||||
| def test_ee_3(): | ||||
|     ee = saml2.extension_element_from_string( | ||||
|         """<?xml version='1.0' encoding='UTF-8'?> | ||||
| @@ -186,12 +197,13 @@ def test_ee_3(): | ||||
|         id="xyz">bar</foo>""") | ||||
|     assert ee != None | ||||
|     print ee.__dict__ | ||||
|     assert ee.attributes == {"id":"xyz"} | ||||
|     assert ee.attributes == {"id": "xyz"} | ||||
|     assert ee.tag == "foo" | ||||
|     assert ee.namespace == "urn:mace:example.com:saml:ns" | ||||
|     assert ee.children == [] | ||||
|     assert ee.text == "bar" | ||||
|  | ||||
|  | ||||
| def test_ee_4(): | ||||
|     ee = saml2.extension_element_from_string( | ||||
|         """<?xml version='1.0' encoding='UTF-8'?> | ||||
| @@ -204,17 +216,18 @@ def test_ee_4(): | ||||
|     assert ee.namespace == "urn:mace:example.com:saml:ns" | ||||
|     assert len(ee.children) == 2 | ||||
|     assert ee.text.strip() == "" | ||||
|     id = ee.find_children("id", "urn:mace:example.com:saml:namespace") | ||||
|     assert id == [] | ||||
|     cid = ee.find_children("id", "urn:mace:example.com:saml:namespace") | ||||
|     assert cid == [] | ||||
|     ids = ee.find_children("id", "urn:mace:example.com:saml:ns") | ||||
|     assert ids != [] | ||||
|     id = ids[0] | ||||
|     print id.__dict__ | ||||
|     assert id.attributes == {} | ||||
|     assert id.tag == "id" | ||||
|     assert id.namespace == "urn:mace:example.com:saml:ns" | ||||
|     assert id.children == [] | ||||
|     assert id.text.strip() == "xyz" | ||||
|     cid = ids[0] | ||||
|     print cid.__dict__ | ||||
|     assert cid.attributes == {} | ||||
|     assert cid.tag == "id" | ||||
|     assert cid.namespace == "urn:mace:example.com:saml:ns" | ||||
|     assert cid.children == [] | ||||
|     assert cid.text.strip() == "xyz" | ||||
|  | ||||
|  | ||||
| def test_ee_5(): | ||||
|     ee = saml2.extension_element_from_string( | ||||
| @@ -242,12 +255,13 @@ def test_ee_5(): | ||||
|     assert len(child) == 1 | ||||
|     child = ee.find_children(namespace="urn:mace:example.com:saml:ns") | ||||
|     assert len(child) == 0 | ||||
|     child = ee.find_children("educause","urn:mace:example.com:saml:cu") | ||||
|     child = ee.find_children("educause", "urn:mace:example.com:saml:cu") | ||||
|     assert len(child) == 1 | ||||
|     child = ee.find_children("edugain","urn:mace:example.com:saml:cu") | ||||
|     child = ee.find_children("edugain", "urn:mace:example.com:saml:cu") | ||||
|     assert len(child) == 0 | ||||
|     print ee.to_string() | ||||
|  | ||||
|  | ||||
| def test_ee_6(): | ||||
|     ee = saml2.extension_element_from_string( | ||||
|         """<?xml version='1.0' encoding='UTF-8'?> | ||||
| @@ -277,9 +291,9 @@ def test_ee_6(): | ||||
|     assert len(child) == 1 | ||||
|     child = pee.find_children(namespace="urn:mace:example.com:saml:ns") | ||||
|     assert len(child) == 0 | ||||
|     child = pee.find_children("educause","urn:mace:example.com:saml:cu") | ||||
|     child = pee.find_children("educause", "urn:mace:example.com:saml:cu") | ||||
|     assert len(child) == 1 | ||||
|     child = pee.find_children("edugain","urn:mace:example.com:saml:cu") | ||||
|     child = pee.find_children("edugain", "urn:mace:example.com:saml:cu") | ||||
|     assert len(child) == 0 | ||||
|     print pee.to_string() | ||||
|  | ||||
| @@ -294,6 +308,7 @@ NAMEID_WITH_ATTRIBUTE_EXTENSION = """<?xml version="1.0" encoding="utf-8"?> | ||||
| </NameID> | ||||
| """ | ||||
|  | ||||
|  | ||||
| def test_nameid_with_extension(): | ||||
|     kl = create_class_from_xml_string(NameID, NAMEID_WITH_ATTRIBUTE_EXTENSION) | ||||
|     assert kl != None | ||||
| @@ -302,12 +317,13 @@ def test_nameid_with_extension(): | ||||
|     assert kl.sp_provided_id == "sp provided id" | ||||
|     assert kl.text.strip() == "roland@example.com" | ||||
|     assert _eq(kl.keyswv(), ['sp_provided_id', 'format', | ||||
|                             'extension_attributes', 'text']) | ||||
|                              'extension_attributes', 'text']) | ||||
|     assert class_name(kl) == "urn:oasis:names:tc:SAML:2.0:assertion:NameID" | ||||
|     assert _eq(kl.keys(), ['sp_provided_id', 'sp_name_qualifier', | ||||
|                             'name_qualifier', 'format', 'text']) | ||||
|                            'name_qualifier', 'format', 'text']) | ||||
|     assert kl.extension_attributes == { | ||||
|                             '{urn:mace:example.com:saml:assertion}Foo': 'BAR'} | ||||
|         '{urn:mace:example.com:saml:assertion}Foo': 'BAR'} | ||||
|  | ||||
|  | ||||
| SUBJECT_CONFIRMATION_WITH_MEMBER_EXTENSION = """<?xml version="1.0" encoding="utf-8"?> | ||||
| <SubjectConfirmation xmlns="urn:oasis:names:tc:SAML:2.0:assertion" | ||||
| @@ -325,9 +341,10 @@ Excellent | ||||
| </local:Trustlevel> | ||||
| </SubjectConfirmation>""" | ||||
|  | ||||
|  | ||||
| def test_subject_confirmation_with_extension(): | ||||
|     kl = create_class_from_xml_string(SubjectConfirmation, | ||||
|                                     SUBJECT_CONFIRMATION_WITH_MEMBER_EXTENSION) | ||||
|                                       SUBJECT_CONFIRMATION_WITH_MEMBER_EXTENSION) | ||||
|     assert kl != None | ||||
|     print kl.__dict__ | ||||
|     assert kl.extension_attributes == {} | ||||
| @@ -339,23 +356,25 @@ def test_subject_confirmation_with_extension(): | ||||
|     assert name_id.text.strip() == "test@example.com" | ||||
|     subject_confirmation_data = kl.subject_confirmation_data | ||||
|     assert _eq(subject_confirmation_data.keyswv(), ['not_on_or_after', | ||||
|                             'recipient', 'in_response_to']) | ||||
|                                                     'recipient', | ||||
|                                                     'in_response_to']) | ||||
|     assert subject_confirmation_data.recipient == \ | ||||
|                     "http://auth.example.com/saml/proxySingleSignOnRedirect" | ||||
|            "http://auth.example.com/saml/proxySingleSignOnRedirect" | ||||
|     assert subject_confirmation_data.not_on_or_after == "2010-02-17T17:02:38Z" | ||||
|     assert subject_confirmation_data.in_response_to == \ | ||||
|                     "_59B3A01B03334032C31E434C63F89E3E" | ||||
|            "_59B3A01B03334032C31E434C63F89E3E" | ||||
|     assert len(kl.extension_elements) == 1 | ||||
|     ee = kl.extension_elements[0] | ||||
|     assert ee.tag == "Trustlevel" | ||||
|     assert ee.namespace == "urn:mace:example.com:saml:assertion" | ||||
|     assert ee.text.strip() == "Excellent" | ||||
|  | ||||
|  | ||||
| def test_to_fro_string_1(): | ||||
|     kl = create_class_from_xml_string(SubjectConfirmation, | ||||
|                                     SUBJECT_CONFIRMATION_WITH_MEMBER_EXTENSION) | ||||
|     str = kl.to_string() | ||||
|     cpy = create_class_from_xml_string(SubjectConfirmation, str) | ||||
|                                       SUBJECT_CONFIRMATION_WITH_MEMBER_EXTENSION) | ||||
|     txt = kl.to_string() | ||||
|     cpy = create_class_from_xml_string(SubjectConfirmation, txt) | ||||
|  | ||||
|     print kl.__dict__ | ||||
|     print cpy.__dict__ | ||||
| @@ -371,15 +390,17 @@ def test_to_fro_string_1(): | ||||
|  | ||||
|  | ||||
| def test_make_vals_str(): | ||||
|     kl = make_vals("Jeter",md.GivenName, part=True) | ||||
|     kl = make_vals("Jeter", md.GivenName, part=True) | ||||
|     assert isinstance(kl, md.GivenName) | ||||
|     assert kl.text == "Jeter" | ||||
|  | ||||
|  | ||||
| def test_make_vals_list_of_strs(): | ||||
|     cp = md.ContactPerson() | ||||
|     make_vals(["Derek","Sanderson"], md.GivenName, cp, "given_name") | ||||
|     make_vals(["Derek", "Sanderson"], md.GivenName, cp, "given_name") | ||||
|     assert len(cp.given_name) == 2 | ||||
|     assert _eq([i.text for i in cp.given_name],["Sanderson","Derek"]) | ||||
|     assert _eq([i.text for i in cp.given_name], ["Sanderson", "Derek"]) | ||||
|  | ||||
|  | ||||
| def test_attribute_element_to_extension_element(): | ||||
|     attr = create_class_from_xml_string(Attribute, saml2_data.TEST_ATTRIBUTE) | ||||
| @@ -387,17 +408,18 @@ def test_attribute_element_to_extension_element(): | ||||
|     print ee.__dict__ | ||||
|     assert ee.tag == "Attribute" | ||||
|     assert ee.namespace == 'urn:oasis:names:tc:SAML:2.0:assertion' | ||||
|     assert _eq(ee.attributes.keys(),['FriendlyName', 'Name', 'NameFormat']) | ||||
|     assert _eq(ee.attributes.keys(), ['FriendlyName', 'Name', 'NameFormat']) | ||||
|     assert ee.attributes["FriendlyName"] == 'test attribute' | ||||
|     assert ee.attributes["Name"] == "testAttribute" | ||||
|     assert ee.attributes["NameFormat"] == \ | ||||
|                 'urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified' | ||||
|            'urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified' | ||||
|     assert len(ee.children) == 2 | ||||
|     for child in ee.children: | ||||
|         # children are also extension element instances | ||||
|         assert child.namespace == 'urn:oasis:names:tc:SAML:2.0:assertion' | ||||
|         assert child.tag == "AttributeValue" | ||||
|  | ||||
|  | ||||
| def test_ee_7(): | ||||
|     ee = saml2.extension_element_from_string( | ||||
|         """<?xml version='1.0' encoding='UTF-8'?> | ||||
| @@ -418,85 +440,91 @@ def test_ee_7(): | ||||
|     assert len(ee.children) == 2 | ||||
|     for child in ee.children: | ||||
|         assert child.namespace == "urn:oasis:names:tc:SAML:metadata:dynamicsaml" | ||||
|     assert _eq(["AssertingEntity","RetrievalEndpoint"], | ||||
|                 [c.tag for c in ee.children]) | ||||
|     assert _eq(["AssertingEntity", "RetrievalEndpoint"], | ||||
|                [c.tag for c in ee.children]) | ||||
|     aes = [c for c in ee.children if c.tag == "AssertingEntity"] | ||||
|     assert len(aes) == 1 | ||||
|     assert len(aes[0].children) == 1 | ||||
|     assert _eq(aes[0].attributes.keys(),[]) | ||||
|     assert _eq(aes[0].attributes.keys(), []) | ||||
|     nid = aes[0].children[0] | ||||
|     assert nid.tag == "NameID" | ||||
|     assert nid.namespace == "urn:oasis:names:tc:SAML:metadata:dynamicsaml" | ||||
|     assert len(nid.children) == 0 | ||||
|     assert _eq(nid.attributes.keys(),["Format"]) | ||||
|     assert _eq(nid.attributes.keys(), ["Format"]) | ||||
|     assert nid.text.strip() == "http://federationX.org" | ||||
|  | ||||
|  | ||||
| def test_extension_element_loadd(): | ||||
|     ava = {'attributes': {}, | ||||
|         'tag': 'ExternalEntityAttributeAuthority',  | ||||
|         'namespace': 'urn:oasis:names:tc:SAML:metadata:dynamicsaml',  | ||||
|         'children': [{ | ||||
|             "tag": "AssertingEntity", | ||||
|             "namespace": "urn:oasis:names:tc:SAML:metadata:dynamicsaml", | ||||
|             "children": [{ | ||||
|                 "tag":"NameID", | ||||
|                 "namespace": "urn:oasis:names:tc:SAML:metadata:dynamicsaml", | ||||
|                 "text": "http://federationX.org", | ||||
|                 "attributes":{  | ||||
|                     "Format":"urn:oasis:names:tc:SAML:2.0:nameid-format:entity" | ||||
|                     }, | ||||
|                 }] | ||||
|             }, { | ||||
|             "tag":"RetrievalEndpoint", | ||||
|             "namespace": "urn:oasis:names:tc:SAML:metadata:dynamicsaml", | ||||
|             "text":"https://federationX.org/?ID=a87s76a5765da76576a57as", | ||||
|         }],  | ||||
|         } | ||||
|            'tag': 'ExternalEntityAttributeAuthority', | ||||
|            'namespace': 'urn:oasis:names:tc:SAML:metadata:dynamicsaml', | ||||
|            'children': [{ | ||||
|                             "tag": "AssertingEntity", | ||||
|                             "namespace": "urn:oasis:names:tc:SAML:metadata:dynamicsaml", | ||||
|  | ||||
|                             "children": [{ | ||||
|                                              "tag": "NameID", | ||||
|                                              "namespace": "urn:oasis:names:tc:SAML:metadata:dynamicsaml", | ||||
|                                              "text": "http://federationX.org", | ||||
|                                              "attributes": { | ||||
|                                                  "Format": "urn:oasis:names:tc:SAML:2.0:nameid-format:entity" | ||||
|                                              }, | ||||
|                                          }] | ||||
|                         }, { | ||||
|                             "tag": "RetrievalEndpoint", | ||||
|                             "namespace": "urn:oasis:names:tc:SAML:metadata" | ||||
|                                          ":dynamicsaml", | ||||
|                             "text": "https://federationX.org/?ID=a87s76a5765da76576a57as", | ||||
|                         }], | ||||
|     } | ||||
|  | ||||
|     ee = saml2.ExtensionElement(ava["tag"]).loadd(ava) | ||||
|     print ee.__dict__ | ||||
|     assert len(ee.children) == 2 | ||||
|     for child in ee.children: | ||||
|         assert child.namespace == "urn:oasis:names:tc:SAML:metadata:dynamicsaml" | ||||
|     assert _eq(["AssertingEntity","RetrievalEndpoint"], | ||||
|                 [c.tag for c in ee.children]) | ||||
|     assert _eq(["AssertingEntity", "RetrievalEndpoint"], | ||||
|                [c.tag for c in ee.children]) | ||||
|     aes = [c for c in ee.children if c.tag == "AssertingEntity"] | ||||
|     assert len(aes) == 1 | ||||
|     assert len(aes[0].children) == 1 | ||||
|     assert _eq(aes[0].attributes.keys(),[]) | ||||
|     assert _eq(aes[0].attributes.keys(), []) | ||||
|     nid = aes[0].children[0] | ||||
|     assert nid.tag == "NameID" | ||||
|     assert nid.namespace == "urn:oasis:names:tc:SAML:metadata:dynamicsaml" | ||||
|     assert len(nid.children) == 0 | ||||
|     assert _eq(nid.attributes.keys(),["Format"]) | ||||
|     assert _eq(nid.attributes.keys(), ["Format"]) | ||||
|     assert nid.text.strip() == "http://federationX.org" | ||||
|  | ||||
|  | ||||
| def test_extensions_loadd(): | ||||
|     ava = {"extension_elements":[{'attributes': {},  | ||||
|         'tag': 'ExternalEntityAttributeAuthority',  | ||||
|         'namespace': 'urn:oasis:names:tc:SAML:metadata:dynamicsaml',  | ||||
|         'children': [{ | ||||
|             "tag": "AssertingEntity", | ||||
|             "namespace": "urn:oasis:names:tc:SAML:metadata:dynamicsaml", | ||||
|             "children": [{ | ||||
|                 "tag":"NameID", | ||||
|                 "namespace": "urn:oasis:names:tc:SAML:metadata:dynamicsaml", | ||||
|                 "text": "http://federationX.org", | ||||
|                 "attributes":{  | ||||
|                     "Format":"urn:oasis:names:tc:SAML:2.0:nameid-format:entity" | ||||
|                     }, | ||||
|                 }] | ||||
|             }, { | ||||
|             "tag":"RetrievalEndpoint", | ||||
|             "namespace": "urn:oasis:names:tc:SAML:metadata:dynamicsaml", | ||||
|             "text":"https://federationX.org/?ID=a87s76a5765da76576a57as", | ||||
|         }],  | ||||
|         }], | ||||
|         "extension_attributes": { | ||||
|             "foo":"bar", | ||||
|             } | ||||
|         } | ||||
|     ava = {"extension_elements": [ | ||||
|         { | ||||
|             'attributes': {}, | ||||
|             'tag': 'ExternalEntityAttributeAuthority', | ||||
|             'namespace': 'urn:oasis:names:tc:SAML:metadata:dynamicsaml', | ||||
|             'children': [ | ||||
|                 {"tag": "AssertingEntity", | ||||
|                  "namespace": "urn:oasis:names:tc:SAML:metadata:dynamicsaml", | ||||
|                  "children": [ | ||||
|                      {"tag": "NameID", | ||||
|                       "namespace": "urn:oasis:names:tc:SAML:metadata:dynamicsaml", | ||||
|                       "text": "http://federationX.org", | ||||
|                       "attributes": { | ||||
|                           "Format": "urn:oasis:names:tc:SAML:2.0:nameid-format:entity" | ||||
|                           }, | ||||
|                       }] | ||||
|                 }, | ||||
|                 { | ||||
|                     "tag": "RetrievalEndpoint", | ||||
|                     "namespace": "urn:oasis:names:tc:SAML:metadata:dynamicsaml", | ||||
|                     "text": "https://federationX.org/?ID=a87s76a5765da76576a57as", | ||||
|                 }], | ||||
|             }], | ||||
|            "extension_attributes": { | ||||
|                "foo": "bar", | ||||
|            } | ||||
|     } | ||||
|  | ||||
|     extension = saml2.SamlBase() | ||||
|     extension.loadd(ava) | ||||
| @@ -507,17 +535,17 @@ def test_extensions_loadd(): | ||||
|     assert len(ee.children) == 2 | ||||
|     for child in ee.children: | ||||
|         assert child.namespace == "urn:oasis:names:tc:SAML:metadata:dynamicsaml" | ||||
|     assert _eq(["AssertingEntity","RetrievalEndpoint"], | ||||
|                 [c.tag for c in ee.children]) | ||||
|     assert _eq(["AssertingEntity", "RetrievalEndpoint"], | ||||
|                [c.tag for c in ee.children]) | ||||
|     aes = [c for c in ee.children if c.tag == "AssertingEntity"] | ||||
|     assert len(aes) == 1 | ||||
|     assert len(aes[0].children) == 1 | ||||
|     assert _eq(aes[0].attributes.keys(),[]) | ||||
|     assert _eq(aes[0].attributes.keys(), []) | ||||
|     nid = aes[0].children[0] | ||||
|     assert nid.tag == "NameID" | ||||
|     assert nid.namespace == "urn:oasis:names:tc:SAML:metadata:dynamicsaml" | ||||
|     assert len(nid.children) == 0 | ||||
|     assert _eq(nid.attributes.keys(),["Format"]) | ||||
|     assert _eq(nid.attributes.keys(), ["Format"]) | ||||
|     assert nid.text.strip() == "http://federationX.org" | ||||
|  | ||||
|     assert extension.extension_attributes.keys() == ["foo"] | ||||
|   | ||||
| @@ -56,16 +56,15 @@ class TestSP(): | ||||
|         ava = { "givenName": ["Derek"], "surName": ["Jeter"], | ||||
|                 "mail": ["derek@nyy.mlb.com"], "title":["The man"]} | ||||
|  | ||||
|         resp_str = "%s" % self.server.create_authn_response(ava, "id1", | ||||
|                                             "http://lingon.catalogix.se:8087/", | ||||
|                                             "urn:mace:example.com:saml:roland:sp", | ||||
|                                             trans_name_policy, | ||||
|                                             "foba0001@example.com", | ||||
|                                             authn=AUTHN) | ||||
|         resp_str = "%s" % self.server.create_authn_response( | ||||
|             ava, "id1", "http://lingon.catalogix.se:8087/", | ||||
|             "urn:mace:example.com:saml:roland:sp", trans_name_policy, | ||||
|             "foba0001@example.com", authn=AUTHN) | ||||
|  | ||||
|         resp_str = base64.encodestring(resp_str) | ||||
|         self.sp.outstanding_queries = {"id1":"http://www.example.com/service"} | ||||
|         session_info = self.sp._eval_authn_response({},{"SAMLResponse":resp_str}) | ||||
|         session_info = self.sp._eval_authn_response({}, | ||||
|             {"SAMLResponse": resp_str}) | ||||
|          | ||||
|         assert len(session_info) > 1 | ||||
|         assert session_info["came_from"] == 'http://www.example.com/service' | ||||
| @@ -73,3 +72,8 @@ class TestSP(): | ||||
|                                         'mail': ['derek@nyy.mlb.com'],  | ||||
|                                         'sn': ['Jeter'], | ||||
|                                         'title': ['The man']} | ||||
|  | ||||
| if __name__ == "__main__": | ||||
|     _sp = TestSP() | ||||
|     _sp.setup_class() | ||||
|     _sp.test_identify() | ||||
|   | ||||
		Reference in New Issue
	
	Block a user
	 Roland Hedberg
					Roland Hedberg