diff options
author | Ivan Kanakarakis <ivan.kanak@gmail.com> | 2020-07-07 13:38:39 +0300 |
---|---|---|
committer | Ivan Kanakarakis <ivan.kanak@gmail.com> | 2020-07-10 20:10:51 +0300 |
commit | 0c1873da1f280d4921b9c9b3da9126388d75e701 (patch) | |
tree | d12375c1278a33ad8155f7da547e7c6a9fd4b0f2 /tests | |
parent | 1d7d4f820886c3d84ee06ea36b4e6b99c8ff49d5 (diff) | |
download | pysaml2-0c1873da1f280d4921b9c9b3da9126388d75e701.tar.gz |
Differentiate between metadata NameIDFormat and AuthnRequest NameIDPolicy Format
The `name_id_format` configuration option is used to define
1. the value of the `<NameIDFormat>` metadata element
2. and the value of the `<NameIDPolicy>` `Format` attribute in an `AuthnRequest`
The configuration option to set what the value of `<NameIDFormat>` element is in the
metadata should be different from the configuration option to specify what should be
requested in an `AuthnRequest` through the `<NameIDPolicy Format="...">` attribute.
Introduce a new option (`name_id_policy_format`), or use the same name but scoped in a
specific section for metadata and AuthnRequest.
On the side of this, pysaml2 defaults to _transient_ as the `<NameIDPolicy
Format="...">` attribute value. To omit requesting a value for the `<NameIDPolicy
Format="">` attribute the value `"None"` (a string) must be set in the configuration.
This is unintuitive. It is better to be explicit and set transient to request a
transient NameID, than not setting a value and requesting transient by default. If no
value is set, no specific `<NameIDPolicy Format="...">` should be requested.
- Refactor the name_id_format usage
- Add name_id_policy_format configuration option
- Remove the "None" convention value
Signed-off-by: Ivan Kanakarakis <ivan.kanak@gmail.com>
Diffstat (limited to 'tests')
-rw-r--r-- | tests/sp_conf_nameidpolicy.py | 2 | ||||
-rw-r--r-- | tests/test_50_server.py | 10 | ||||
-rw-r--r-- | tests/test_51_client.py | 38 |
3 files changed, 31 insertions, 19 deletions
diff --git a/tests/sp_conf_nameidpolicy.py b/tests/sp_conf_nameidpolicy.py index d15989c2..c2e81c1d 100644 --- a/tests/sp_conf_nameidpolicy.py +++ b/tests/sp_conf_nameidpolicy.py @@ -14,7 +14,7 @@ CONFIG = { "required_attributes": ["surName", "givenName", "mail"], "optional_attributes": ["title"], "idp": ["urn:mace:example.com:saml:roland:idp"], - "name_id_format": "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent", + "name_id_policy_format": "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent", "name_id_format_allow_create": "true" } }, diff --git a/tests/test_50_server.py b/tests/test_50_server.py index e61e050a..589890cc 100644 --- a/tests/test_50_server.py +++ b/tests/test_50_server.py @@ -251,7 +251,10 @@ class TestServer1(): def test_parse_ok_request(self): req_id, authn_request = self.client.create_authn_request( - message_id="id1", destination="http://localhost:8088/sso") + message_id="id1", + destination="http://localhost:8088/sso", + nameid_format=saml.NAMEID_FORMAT_TRANSIENT, + ) print(authn_request) binding = BINDING_HTTP_REDIRECT @@ -1308,7 +1311,10 @@ class TestServer1NonAsciiAva(): def test_parse_ok_request(self): req_id, authn_request = self.client.create_authn_request( - message_id="id1", destination="http://localhost:8088/sso") + message_id="id1", + destination="http://localhost:8088/sso", + nameid_format=saml.NAMEID_FORMAT_TRANSIENT, + ) print(authn_request) binding = BINDING_HTTP_REDIRECT diff --git a/tests/test_51_client.py b/tests/test_51_client.py index 302b459d..3b00865c 100644 --- a/tests/test_51_client.py +++ b/tests/test_51_client.py @@ -242,7 +242,7 @@ class TestClient: req_id, req = self.client.create_attribute_query( "https://aai-demo-idp.switch.ch/idp/shibboleth", "_e7b68a04488f715cda642fbdd90099f5", - format=saml.NAMEID_FORMAT_TRANSIENT, + format=NAMEID_FORMAT_TRANSIENT, message_id="id1") assert isinstance(req, samlp.AttributeQuery) @@ -253,12 +253,15 @@ class TestClient: assert req.issue_instant assert req.issuer.text == "urn:mace:example.com:saml:roland:sp" nameid = req.subject.name_id - assert nameid.format == saml.NAMEID_FORMAT_TRANSIENT + assert nameid.format == NAMEID_FORMAT_TRANSIENT assert nameid.text == "_e7b68a04488f715cda642fbdd90099f5" def test_create_auth_request_0(self): ar_str = "%s" % self.client.create_authn_request( - "http://www.example.com/sso", message_id="id1")[1] + "http://www.example.com/sso", + message_id="id1", + nameid_format=NAMEID_FORMAT_TRANSIENT, + )[1] ar = samlp.authn_request_from_string(ar_str) assert ar.assertion_consumer_service_url == ("http://lingon.catalogix" @@ -270,7 +273,7 @@ class TestClient: assert ar.issuer.text == "urn:mace:example.com:saml:roland:sp" nid_policy = ar.name_id_policy assert nid_policy.allow_create is None - assert nid_policy.format == saml.NAMEID_FORMAT_TRANSIENT + assert nid_policy.format == NAMEID_FORMAT_TRANSIENT node_requested_attributes = None for e in ar.extensions.extension_elements: @@ -892,7 +895,7 @@ class TestClient: subject=factory(saml.Subject, text="_aaa", name_id=factory( saml.NameID, - format=saml.NAMEID_FORMAT_TRANSIENT)), + format=NAMEID_FORMAT_TRANSIENT)), attribute_statement=do_attribute_statement( { ("", "", "sn"): ("Jeter", ""), @@ -976,7 +979,7 @@ class TestClient: self.client.config.entityid, self.server.config.attribute_converters, self.server.config.getattr("policy", "idp"), - name_id=factory(saml.NameID, format=saml.NAMEID_FORMAT_TRANSIENT), + name_id=factory(saml.NameID, format=NAMEID_FORMAT_TRANSIENT), issuer=self.server._issuer(), authn_class=INTERNETPROTOCOLPASSWORD, authn_auth="http://www.example.com/login", @@ -1037,7 +1040,7 @@ class TestClient: 'in_response_to': "_012345", 'subject_confirmation_method': saml.SCM_BEARER } - name_id = factory(saml.NameID, format=saml.NAMEID_FORMAT_TRANSIENT) + name_id = factory(saml.NameID, format=NAMEID_FORMAT_TRANSIENT) farg = add_path( {}, @@ -1149,7 +1152,7 @@ class TestClient: farg['assertion']['subject']['subject_confirmation'], ['subject_confirmation_data', 'recipient', "http://lingon.catalogix.se:8087/"]) - name_id = factory(saml.NameID, format=saml.NAMEID_FORMAT_TRANSIENT) + name_id = factory(saml.NameID, format=NAMEID_FORMAT_TRANSIENT) assertion_1 = asser_1.construct( self.client.config.entityid, @@ -1796,7 +1799,7 @@ class TestClientNonAsciiAva: req_id, req = self.client.create_attribute_query( "https://aai-demo-idp.switch.ch/idp/shibboleth", "_e7b68a04488f715cda642fbdd90099f5", - format=saml.NAMEID_FORMAT_TRANSIENT, + format=NAMEID_FORMAT_TRANSIENT, message_id="id1") assert isinstance(req, samlp.AttributeQuery) @@ -1807,12 +1810,15 @@ class TestClientNonAsciiAva: assert req.issue_instant assert req.issuer.text == "urn:mace:example.com:saml:roland:sp" nameid = req.subject.name_id - assert nameid.format == saml.NAMEID_FORMAT_TRANSIENT + assert nameid.format == NAMEID_FORMAT_TRANSIENT assert nameid.text == "_e7b68a04488f715cda642fbdd90099f5" def test_create_auth_request_0(self): ar_str = "%s" % self.client.create_authn_request( - "http://www.example.com/sso", message_id="id1")[1] + "http://www.example.com/sso", + message_id="id1", + nameid_format=NAMEID_FORMAT_TRANSIENT, + )[1] ar = samlp.authn_request_from_string(ar_str) assert ar.assertion_consumer_service_url == ("http://lingon.catalogix" @@ -1824,7 +1830,7 @@ class TestClientNonAsciiAva: assert ar.issuer.text == "urn:mace:example.com:saml:roland:sp" nid_policy = ar.name_id_policy assert nid_policy.allow_create is None - assert nid_policy.format == saml.NAMEID_FORMAT_TRANSIENT + assert nid_policy.format == NAMEID_FORMAT_TRANSIENT node_requested_attributes = None for e in ar.extensions.extension_elements: @@ -2464,7 +2470,7 @@ class TestClientNonAsciiAva: subject=factory(saml.Subject, text="_aaa", name_id=factory( saml.NameID, - format=saml.NAMEID_FORMAT_TRANSIENT)), + format=NAMEID_FORMAT_TRANSIENT)), attribute_statement=do_attribute_statement( { ("", "", "sn"): ("Jeter", ""), @@ -2548,7 +2554,7 @@ class TestClientNonAsciiAva: self.client.config.entityid, self.server.config.attribute_converters, self.server.config.getattr("policy", "idp"), - name_id=factory(saml.NameID, format=saml.NAMEID_FORMAT_TRANSIENT), + name_id=factory(saml.NameID, format=NAMEID_FORMAT_TRANSIENT), issuer=self.server._issuer(), authn_class=INTERNETPROTOCOLPASSWORD, authn_auth="http://www.example.com/login", @@ -2609,7 +2615,7 @@ class TestClientNonAsciiAva: 'in_response_to': "_012345", 'subject_confirmation_method': saml.SCM_BEARER } - name_id = factory(saml.NameID, format=saml.NAMEID_FORMAT_TRANSIENT) + name_id = factory(saml.NameID, format=NAMEID_FORMAT_TRANSIENT) farg = add_path( {}, @@ -2722,7 +2728,7 @@ class TestClientNonAsciiAva: farg['assertion']['subject']['subject_confirmation'], ['subject_confirmation_data', 'recipient', "http://lingon.catalogix.se:8087/"]) - name_id = factory(saml.NameID, format=saml.NAMEID_FORMAT_TRANSIENT) + name_id = factory(saml.NameID, format=NAMEID_FORMAT_TRANSIENT) assertion_1 = asser_1.construct( self.client.config.entityid, |