Merge pull request #284 from rebeckag/optional_keydescriptor
KeyDescriptor is optional in metadata
This commit is contained in:
@@ -314,7 +314,43 @@ class MetaData(object):
|
|||||||
'''
|
'''
|
||||||
Returns certificates for the given Entity
|
Returns certificates for the given Entity
|
||||||
'''
|
'''
|
||||||
raise NotImplementedError
|
ent = self[entity_id]
|
||||||
|
|
||||||
|
def extract_certs(srvs):
|
||||||
|
res = []
|
||||||
|
for srv in srvs:
|
||||||
|
if "key_descriptor" in srv:
|
||||||
|
for key in srv["key_descriptor"]:
|
||||||
|
if "use" in key and key["use"] == use:
|
||||||
|
for dat in key["key_info"]["x509_data"]:
|
||||||
|
cert = repack_cert(
|
||||||
|
dat["x509_certificate"]["text"])
|
||||||
|
if cert not in res:
|
||||||
|
res.append(cert)
|
||||||
|
elif not "use" in key:
|
||||||
|
for dat in key["key_info"]["x509_data"]:
|
||||||
|
cert = repack_cert(
|
||||||
|
dat["x509_certificate"]["text"])
|
||||||
|
if cert not in res:
|
||||||
|
res.append(cert)
|
||||||
|
|
||||||
|
return res
|
||||||
|
|
||||||
|
if descriptor == "any":
|
||||||
|
res = []
|
||||||
|
for descr in ["spsso", "idpsso", "role", "authn_authority",
|
||||||
|
"attribute_authority", "pdp"]:
|
||||||
|
try:
|
||||||
|
srvs = ent["%s_descriptor" % descr]
|
||||||
|
except KeyError:
|
||||||
|
continue
|
||||||
|
|
||||||
|
res.extend(extract_certs(srvs))
|
||||||
|
else:
|
||||||
|
srvs = ent["%s_descriptor" % descriptor]
|
||||||
|
res = extract_certs(srvs)
|
||||||
|
|
||||||
|
return res
|
||||||
|
|
||||||
|
|
||||||
class InMemoryMetaData(MetaData):
|
class InMemoryMetaData(MetaData):
|
||||||
@@ -511,45 +547,6 @@ class InMemoryMetaData(MetaData):
|
|||||||
|
|
||||||
return res
|
return res
|
||||||
|
|
||||||
def certs(self, entity_id, descriptor, use="signing"):
|
|
||||||
ent = self.__getitem__(entity_id)
|
|
||||||
if descriptor == "any":
|
|
||||||
res = []
|
|
||||||
for descr in ["spsso", "idpsso", "role", "authn_authority",
|
|
||||||
"attribute_authority", "pdp"]:
|
|
||||||
try:
|
|
||||||
srvs = ent["%s_descriptor" % descr]
|
|
||||||
except KeyError:
|
|
||||||
continue
|
|
||||||
|
|
||||||
for srv in srvs:
|
|
||||||
for key in srv["key_descriptor"]:
|
|
||||||
if "use" in key and key["use"] == use:
|
|
||||||
for dat in key["key_info"]["x509_data"]:
|
|
||||||
cert = repack_cert(
|
|
||||||
dat["x509_certificate"]["text"])
|
|
||||||
if cert not in res:
|
|
||||||
res.append(cert)
|
|
||||||
elif not "use" in key:
|
|
||||||
for dat in key["key_info"]["x509_data"]:
|
|
||||||
cert = repack_cert(
|
|
||||||
dat["x509_certificate"]["text"])
|
|
||||||
if cert not in res:
|
|
||||||
res.append(cert)
|
|
||||||
else:
|
|
||||||
srvs = ent["%s_descriptor" % descriptor]
|
|
||||||
|
|
||||||
res = []
|
|
||||||
for srv in srvs:
|
|
||||||
for key in srv["key_descriptor"]:
|
|
||||||
if "use" in key and key["use"] == use:
|
|
||||||
for dat in key["key_info"]["x509_data"]:
|
|
||||||
res.append(dat["x509_certificate"]["text"])
|
|
||||||
elif not "use" in key:
|
|
||||||
for dat in key["key_info"]["x509_data"]:
|
|
||||||
res.append(dat["x509_certificate"]["text"])
|
|
||||||
return res
|
|
||||||
|
|
||||||
def signed(self):
|
def signed(self):
|
||||||
if self.entities_descr and self.entities_descr.signature:
|
if self.entities_descr and self.entities_descr.signature:
|
||||||
return True
|
return True
|
||||||
@@ -567,8 +564,8 @@ class InMemoryMetaData(MetaData):
|
|||||||
return True
|
return True
|
||||||
|
|
||||||
node_name = self.node_name \
|
node_name = self.node_name \
|
||||||
or "%s:%s" % (md.EntitiesDescriptor.c_namespace,
|
or "%s:%s" % (md.EntitiesDescriptor.c_namespace,
|
||||||
md.EntitiesDescriptor.c_tag)
|
md.EntitiesDescriptor.c_tag)
|
||||||
|
|
||||||
if self.security.verify_signature(
|
if self.security.verify_signature(
|
||||||
txt, node_name=node_name, cert_file=self.cert):
|
txt, node_name=node_name, cert_file=self.cert):
|
||||||
@@ -752,7 +749,7 @@ class MetaDataMDX(InMemoryMetaData):
|
|||||||
raise KeyError
|
raise KeyError
|
||||||
|
|
||||||
|
|
||||||
class MetadataStore(object):
|
class MetadataStore(MetaData):
|
||||||
def __init__(self, onts, attrc, config, ca_certs=None,
|
def __init__(self, onts, attrc, config, ca_certs=None,
|
||||||
check_validity=True,
|
check_validity=True,
|
||||||
disable_ssl_certificate_validation=False,
|
disable_ssl_certificate_validation=False,
|
||||||
@@ -1062,45 +1059,6 @@ class MetadataStore(object):
|
|||||||
return name(_md[entity_id], langpref)
|
return name(_md[entity_id], langpref)
|
||||||
return None
|
return None
|
||||||
|
|
||||||
def certs(self, entity_id, descriptor, use="signing"):
|
|
||||||
ent = self.__getitem__(entity_id)
|
|
||||||
if descriptor == "any":
|
|
||||||
res = []
|
|
||||||
for descr in ["spsso", "idpsso", "role", "authn_authority",
|
|
||||||
"attribute_authority", "pdp"]:
|
|
||||||
try:
|
|
||||||
srvs = ent["%s_descriptor" % descr]
|
|
||||||
except KeyError:
|
|
||||||
continue
|
|
||||||
|
|
||||||
for srv in srvs:
|
|
||||||
for key in srv["key_descriptor"]:
|
|
||||||
if "use" in key and key["use"] == use:
|
|
||||||
for dat in key["key_info"]["x509_data"]:
|
|
||||||
cert = repack_cert(
|
|
||||||
dat["x509_certificate"]["text"])
|
|
||||||
if cert not in res:
|
|
||||||
res.append(cert)
|
|
||||||
elif not "use" in key:
|
|
||||||
for dat in key["key_info"]["x509_data"]:
|
|
||||||
cert = repack_cert(
|
|
||||||
dat["x509_certificate"]["text"])
|
|
||||||
if cert not in res:
|
|
||||||
res.append(cert)
|
|
||||||
else:
|
|
||||||
srvs = ent["%s_descriptor" % descriptor]
|
|
||||||
|
|
||||||
res = []
|
|
||||||
for srv in srvs:
|
|
||||||
for key in srv["key_descriptor"]:
|
|
||||||
if "use" in key and key["use"] == use:
|
|
||||||
for dat in key["key_info"]["x509_data"]:
|
|
||||||
res.append(dat["x509_certificate"]["text"])
|
|
||||||
elif not "use" in key:
|
|
||||||
for dat in key["key_info"]["x509_data"]:
|
|
||||||
res.append(dat["x509_certificate"]["text"])
|
|
||||||
return res
|
|
||||||
|
|
||||||
def vo_members(self, entity_id):
|
def vo_members(self, entity_id):
|
||||||
ad = self.__getitem__(entity_id)["affiliation_descriptor"]
|
ad = self.__getitem__(entity_id)["affiliation_descriptor"]
|
||||||
return [m["text"] for m in ad["affiliate_member"]]
|
return [m["text"] for m in ad["affiliate_member"]]
|
||||||
|
|||||||
@@ -5,11 +5,9 @@ import re
|
|||||||
from six.moves.urllib.parse import quote_plus
|
from six.moves.urllib.parse import quote_plus
|
||||||
from saml2.config import Config
|
from saml2.config import Config
|
||||||
from saml2.httpbase import HTTPBase
|
from saml2.httpbase import HTTPBase
|
||||||
|
|
||||||
from saml2.mdstore import MetadataStore, MetaDataMDX
|
from saml2.mdstore import MetadataStore, MetaDataMDX
|
||||||
from saml2.mdstore import destinations
|
from saml2.mdstore import destinations
|
||||||
from saml2.mdstore import name
|
from saml2.mdstore import name
|
||||||
|
|
||||||
from saml2 import md
|
from saml2 import md
|
||||||
from saml2 import sigver
|
from saml2 import sigver
|
||||||
from saml2 import BINDING_SOAP
|
from saml2 import BINDING_SOAP
|
||||||
@@ -20,7 +18,6 @@ from saml2 import saml
|
|||||||
from saml2 import config
|
from saml2 import config
|
||||||
from saml2.attribute_converter import ac_factory
|
from saml2.attribute_converter import ac_factory
|
||||||
from saml2.attribute_converter import d_to_local_name
|
from saml2.attribute_converter import d_to_local_name
|
||||||
|
|
||||||
from saml2.extension import mdui
|
from saml2.extension import mdui
|
||||||
from saml2.extension import idpdisc
|
from saml2.extension import idpdisc
|
||||||
from saml2.extension import dri
|
from saml2.extension import dri
|
||||||
@@ -29,12 +26,27 @@ from saml2.extension import ui
|
|||||||
from saml2.s_utils import UnknownPrincipal
|
from saml2.s_utils import UnknownPrincipal
|
||||||
from saml2 import xmldsig
|
from saml2 import xmldsig
|
||||||
from saml2 import xmlenc
|
from saml2 import xmlenc
|
||||||
|
|
||||||
from pathutils import full_path
|
from pathutils import full_path
|
||||||
|
|
||||||
sec_config = config.Config()
|
sec_config = config.Config()
|
||||||
# sec_config.xmlsec_binary = sigver.get_xmlsec_binary(["/opt/local/bin"])
|
# sec_config.xmlsec_binary = sigver.get_xmlsec_binary(["/opt/local/bin"])
|
||||||
|
|
||||||
|
TEST_CERT = """MIICsDCCAhmgAwIBAgIJAJrzqSSwmDY9MA0GCSqGSIb3DQEBBQUAMEUxCzAJBgNV
|
||||||
|
BAYTAkFVMRMwEQYDVQQIEwpTb21lLVN0YXRlMSEwHwYDVQQKExhJbnRlcm5ldCBX
|
||||||
|
aWRnaXRzIFB0eSBMdGQwHhcNMDkxMDA2MTk0OTQxWhcNMDkxMTA1MTk0OTQxWjBF
|
||||||
|
MQswCQYDVQQGEwJBVTETMBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50
|
||||||
|
ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB
|
||||||
|
gQDJg2cms7MqjniT8Fi/XkNHZNPbNVQyMUMXE9tXOdqwYCA1cc8vQdzkihscQMXy
|
||||||
|
3iPw2cMggBu6gjMTOSOxECkuvX5ZCclKr8pXAJM5cY6gVOaVO2PdTZcvDBKGbiaN
|
||||||
|
efiEw5hnoZomqZGp8wHNLAUkwtH9vjqqvxyS/vclc6k2ewIDAQABo4GnMIGkMB0G
|
||||||
|
A1UdDgQWBBRePsKHKYJsiojE78ZWXccK9K4aJTB1BgNVHSMEbjBsgBRePsKHKYJs
|
||||||
|
iojE78ZWXccK9K4aJaFJpEcwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgTClNvbWUt
|
||||||
|
U3RhdGUxITAfBgNVBAoTGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZIIJAJrzqSSw
|
||||||
|
mDY9MAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQADgYEAJSrKOEzHO7TL5cy6
|
||||||
|
h3qh+3+JAk8HbGBW+cbX6KBCAw/mzU8flK25vnWwXS3dv2FF3Aod0/S7AWNfKib5
|
||||||
|
U/SA9nJaz/mWeF9S0farz9AQFc8/NSzAzaVq7YbM4F6f6N2FRl7GikdXRCed45j6
|
||||||
|
mrPzGzk3ECbupFnqyREH3+ZPSdk="""
|
||||||
|
|
||||||
TEST_METADATA_STRING = """
|
TEST_METADATA_STRING = """
|
||||||
<EntitiesDescriptor
|
<EntitiesDescriptor
|
||||||
xmlns="urn:oasis:names:tc:SAML:2.0:metadata"
|
xmlns="urn:oasis:names:tc:SAML:2.0:metadata"
|
||||||
@@ -51,21 +63,8 @@ TEST_METADATA_STRING = """
|
|||||||
<ds:KeyInfo>
|
<ds:KeyInfo>
|
||||||
<ds:X509Data>
|
<ds:X509Data>
|
||||||
<ds:X509Certificate>
|
<ds:X509Certificate>
|
||||||
MIICsDCCAhmgAwIBAgIJAJrzqSSwmDY9MA0GCSqGSIb3DQEBBQUAMEUxCzAJBgNV
|
{cert_data}
|
||||||
BAYTAkFVMRMwEQYDVQQIEwpTb21lLVN0YXRlMSEwHwYDVQQKExhJbnRlcm5ldCBX
|
</ds:X509Certificate>
|
||||||
aWRnaXRzIFB0eSBMdGQwHhcNMDkxMDA2MTk0OTQxWhcNMDkxMTA1MTk0OTQxWjBF
|
|
||||||
MQswCQYDVQQGEwJBVTETMBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50
|
|
||||||
ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB
|
|
||||||
gQDJg2cms7MqjniT8Fi/XkNHZNPbNVQyMUMXE9tXOdqwYCA1cc8vQdzkihscQMXy
|
|
||||||
3iPw2cMggBu6gjMTOSOxECkuvX5ZCclKr8pXAJM5cY6gVOaVO2PdTZcvDBKGbiaN
|
|
||||||
efiEw5hnoZomqZGp8wHNLAUkwtH9vjqqvxyS/vclc6k2ewIDAQABo4GnMIGkMB0G
|
|
||||||
A1UdDgQWBBRePsKHKYJsiojE78ZWXccK9K4aJTB1BgNVHSMEbjBsgBRePsKHKYJs
|
|
||||||
iojE78ZWXccK9K4aJaFJpEcwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgTClNvbWUt
|
|
||||||
U3RhdGUxITAfBgNVBAoTGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZIIJAJrzqSSw
|
|
||||||
mDY9MAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQADgYEAJSrKOEzHO7TL5cy6
|
|
||||||
h3qh+3+JAk8HbGBW+cbX6KBCAw/mzU8flK25vnWwXS3dv2FF3Aod0/S7AWNfKib5
|
|
||||||
U/SA9nJaz/mWeF9S0farz9AQFc8/NSzAzaVq7YbM4F6f6N2FRl7GikdXRCed45j6
|
|
||||||
mrPzGzk3ECbupFnqyREH3+ZPSdk=</ds:X509Certificate>
|
|
||||||
</ds:X509Data>
|
</ds:X509Data>
|
||||||
</ds:KeyInfo>
|
</ds:KeyInfo>
|
||||||
</KeyDescriptor>
|
</KeyDescriptor>
|
||||||
@@ -85,7 +84,7 @@ TEST_METADATA_STRING = """
|
|||||||
</ContactPerson>
|
</ContactPerson>
|
||||||
</EntityDescriptor>
|
</EntityDescriptor>
|
||||||
</EntitiesDescriptor>
|
</EntitiesDescriptor>
|
||||||
"""
|
""".format(cert_data=TEST_CERT)
|
||||||
|
|
||||||
ONTS = {
|
ONTS = {
|
||||||
saml.NAMESPACE: saml,
|
saml.NAMESPACE: saml,
|
||||||
@@ -149,7 +148,7 @@ METADATACONF = {
|
|||||||
}],
|
}],
|
||||||
"11": [{
|
"11": [{
|
||||||
"class": "saml2.mdstore.InMemoryMetaData",
|
"class": "saml2.mdstore.InMemoryMetaData",
|
||||||
"metadata": [(TEST_METADATA_STRING, )]
|
"metadata": [(TEST_METADATA_STRING,)]
|
||||||
}],
|
}],
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -372,7 +371,7 @@ def test_load_string():
|
|||||||
disable_ssl_certificate_validation=True)
|
disable_ssl_certificate_validation=True)
|
||||||
|
|
||||||
mds.imp(METADATACONF["11"])
|
mds.imp(METADATACONF["11"])
|
||||||
#print(mds)
|
# print(mds)
|
||||||
assert len(mds.keys()) == 1
|
assert len(mds.keys()) == 1
|
||||||
idps = mds.with_descriptor("idpsso")
|
idps = mds.with_descriptor("idpsso")
|
||||||
|
|
||||||
@@ -384,5 +383,52 @@ def test_load_string():
|
|||||||
assert len(certs) == 1
|
assert len(certs) == 1
|
||||||
|
|
||||||
|
|
||||||
|
def test_get_certs_from_metadata():
|
||||||
|
mds = MetadataStore(ONTS.values(), ATTRCONV, None)
|
||||||
|
mds.imp(METADATACONF["11"])
|
||||||
|
certs1 = mds.certs("http://xenosmilus.umdc.umu.se/simplesaml/saml2/idp/metadata.php", "any")
|
||||||
|
certs2 = mds.certs("http://xenosmilus.umdc.umu.se/simplesaml/saml2/idp/metadata.php", "idpsso")
|
||||||
|
|
||||||
|
assert certs1[0] == certs2[0] == TEST_CERT
|
||||||
|
|
||||||
|
|
||||||
|
def test_get_certs_from_metadata_without_keydescriptor():
|
||||||
|
mds = MetadataStore(ONTS.values(), ATTRCONV, None)
|
||||||
|
mds.imp([{
|
||||||
|
"class": "saml2.mdstore.InMemoryMetaData",
|
||||||
|
"metadata": [("""
|
||||||
|
<EntitiesDescriptor
|
||||||
|
xmlns="urn:oasis:names:tc:SAML:2.0:metadata"
|
||||||
|
xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata"
|
||||||
|
xmlns:shibmeta="urn:mace:shibboleth:metadata:1.0"
|
||||||
|
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||||
|
xmlns:ds="http://www.w3.org/2000/09/xmldsig#"
|
||||||
|
Name="urn:mace:example.com:test-1.0">
|
||||||
|
<EntityDescriptor
|
||||||
|
entityID="http://xenosmilus.umdc.umu.se/simplesaml/saml2/idp/metadata.php"
|
||||||
|
xml:base="swamid-1.0/idp.umu.se-saml2.xml">
|
||||||
|
<IDPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
|
||||||
|
<NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>
|
||||||
|
<SingleSignOnService
|
||||||
|
Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect"
|
||||||
|
Location="http://xenosmilus.umdc.umu.se/simplesaml/saml2/idp/metadata.php"/>
|
||||||
|
</IDPSSODescriptor>
|
||||||
|
<Organization>
|
||||||
|
<OrganizationName xml:lang="en">Catalogix</OrganizationName>
|
||||||
|
<OrganizationDisplayName xml:lang="en">Catalogix</OrganizationDisplayName>
|
||||||
|
<OrganizationURL xml:lang="en">http://www.catalogix.se</OrganizationURL>
|
||||||
|
</Organization>
|
||||||
|
<ContactPerson contactType="technical">
|
||||||
|
<SurName>Hedberg</SurName>
|
||||||
|
<EmailAddress>datordrift@catalogix.se</EmailAddress>
|
||||||
|
</ContactPerson>
|
||||||
|
</EntityDescriptor>
|
||||||
|
</EntitiesDescriptor>""",)]
|
||||||
|
}])
|
||||||
|
certs = mds.certs("http://xenosmilus.umdc.umu.se/simplesaml/saml2/idp/metadata.php", "idpsso")
|
||||||
|
|
||||||
|
assert len(certs) == 0
|
||||||
|
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
test_load_local()
|
test_get_certs_from_metadata()
|
||||||
|
|||||||
Reference in New Issue
Block a user