Projet

Général

Profil

0001-federation-file-loading-19396.patch

Paul Marillonnet, 31 mai 2018 17:44

Télécharger (102 ko)

Voir les différences:

Subject: [PATCH] federation file loading (#19396)

 README                          |  13 +
 mellon/adapters.py              | 137 ++++++--
 mellon/app_settings.py          |  20 +-
 mellon/federation_utils.py      | 233 +++++++++++++
 mellon/utils.py                 | 174 +++++++---
 mellon/views.py                 | 148 ++++++---
 setup.py                        |   1 +
 tests/conftest.py               |   7 +
 tests/dummy_md.xml              | 367 +++++++++++++++++++++
 tests/federation-sample.xml     | 557 ++++++++++++++++++++++++++++++++
 tests/test_federations_utils.py |  35 ++
 tests/test_sso_slo.py           |  88 ++++-
 tests/test_utils.py             | 112 +++++--
 tests/utils.py                  |  10 +
 14 files changed, 1759 insertions(+), 143 deletions(-)
 create mode 100644 mellon/federation_utils.py
 create mode 100644 tests/dummy_md.xml
 create mode 100644 tests/federation-sample.xml
 create mode 100644 tests/test_federations_utils.py
README
82 82
the absolute path toward a metadata file. All other keys are override
83 83
of generic settings.
84 84

  
85
MELLON_FEDERATIONS
86
------------------
87

  
88
A list of dictionaries, only one key 'FEDERATION' is mandatory in those
89
dictionaries. It should contain the local path or the remote URL for the
90
metadata file describing the SAML-based federation to be loaded in mellon. Both
91
relative and absolute paths are supported.
92
Additional parameters can be given as key/value pairs in the dictionaries, on
93
a similar basis as the aforementioned MELLON_IDENTITY_PROVIDERS config.
94
For each dictionary describing a federation, these parameters will apply to
95
any successfully-loaded provider belonging to that federation.
96
These parameters also override the global settings.
97

  
85 98
MELLON_PUBLIC_KEYS
86 99
------------------
87 100

  
mellon/adapters.py
3 3
from xml.etree import ElementTree as ET
4 4

  
5 5
import lasso
6
import requests
7
import requests.exceptions
8 6

  
9 7
from django.core.exceptions import PermissionDenied
10 8
from django.contrib import auth
11 9
from django.contrib.auth.models import Group
10
from django.utils.text import slugify
12 11

  
13 12
from . import utils, app_settings, models
13
from mellon.federation_utils import idp_metadata_store, url2filename, \
14
        idp_metadata_extract_entity_id, idp_metadata_is_cached, \
15
        idp_metadata_load, idp_settings_store, idp_settings_load
14 16

  
15 17

  
16 18
class UserCreationError(Exception):
......
23 25

  
24 26
    def get_idp(self, entity_id):
25 27
        '''Find the first IdP definition matching entity_id'''
26
        for idp in self.get_idps():
27
            if entity_id == idp['ENTITY_ID']:
28
                return idp
28
        idp = {}
29

  
30
        # First, check whether the provider is cached
31
        if idp_metadata_is_cached(entity_id):
32
            metadata_content = idp_metadata_load(entity_id)
33
            idp.update({'METADATA': metadata_content,
34
                   'ENTITY_ID': entity_id})
35
            # Extra settings loaded if the provider comes from a federation
36
            idp.update(idp_settings_load(entity_id) or {})
37

  
38
        # If not, try to fetch it from the mellon settings
39
        else:
40
            for idp in self.get_identity_providers_setting():
41
                if not idp.get('METADATA_URL') and not idp.get('METADATA'):
42
                    self.logger.error(u'missing METADATA or METADATA_URL in idp %s', idp or '')
43
                    continue
44

  
45
                elif 'METADATA_URL' in idp and 'METADATA' not in idp:
46
                    metadata = utils.get_metadata_from_url(idp)
47
                    if not metadata:
48
                        continue
49
                    idp['METADATA'] = metadata
50

  
51
                if 'ENTITY_ID' not in idp:
52
                    if idp['METADATA'].startswith('/') or idp['METADATA'].startswith('./'):
53
                    # In case the entity ID isn't provided in the settings, it
54
                    # needs to be fetched from the content of the metadata file
55
                        metadata_path = idp['METADATA']
56
                        if 'FEDERATION' in idp:
57
                            metadata_path = default_storage.path(metadata_path)
58
                        content = file(metadata_path).read()
59
                    else:
60
                        content = idp['METADATA']
61
                    idp['ENTITY_ID'] = idp_metadata_extract_entity_id(content)
62

  
63
                if idp['ENTITY_ID'] == entity_id:
64
                    break
65

  
66
        return idp.copy()
29 67

  
30 68
    def get_identity_providers_setting(self):
31
        return app_settings.IDENTITY_PROVIDERS
69
        # First, providers from federation as declared in the mellon settings
70
        for federation_data in self.get_federations():
71
            if not isinstance(federation_data, dict) or \
72
                    'FEDERATION' not in federation_data:
73
                continue
74
            fed_extra_attrs = federation_data.copy()
75
            # Federation can be declared as URLs. If so, their content needs
76
            # to be fetched and cached
77
            fed_filepath, _ = utils.get_federation_metadata(federation_data.get('FEDERATION'))
78

  
79
            try:
80
                tree = ET.parse(fed_filepath)
81
                root = tree.getroot()
82
                for child in root:
83
                    provider = {}
84
                    entity_id = idp_metadata_extract_entity_id(ET.tostring(child))
85
                    if not entity_id:
86
                        # The XML tag wasn't an IDPSSODescriptor
87
                        continue
88
                    # Store the metadata content in cache
89
                    provider['METADATA'] = idp_metadata_store(ET.tostring(child))
90
                    provider['ENTITY_ID'] = entity_id
91
                    # Add in each provider the federation-wise configuration
92
                    provider.update(fed_extra_attrs)
93
                    idp_settings_store(provider)
94
                    yield provider
95
            except:
96
                self.logger.error('Couldn\'t load federation metadata file %r',
97
                                  fed_filepath)
98
                continue
99

  
100
        # Then, the non-federated providers
101
        for extra_provider in app_settings.IDENTITY_PROVIDERS:
102
            yield extra_provider
103

  
104
    def get_federations(self):
105
        for federation in getattr(app_settings, 'FEDERATIONS', []):
106
            yield federation
32 107

  
33 108
    def get_idps(self):
34 109
        for i, idp in enumerate(self.get_identity_providers_setting()):
35 110
            if 'METADATA_URL' in idp and 'METADATA' not in idp:
36
                verify_ssl_certificate = utils.get_setting(
37
                    idp, 'VERIFY_SSL_CERTIFICATE')
38
                try:
39
                    response = requests.get(idp['METADATA_URL'], verify=verify_ssl_certificate)
40
                    response.raise_for_status()
41
                except requests.exceptions.RequestException as e:
42
                    self.logger.error(
43
                        u'retrieval of metadata URL %r failed with error %s for %d-th idp',
44
                        idp['METADATA_URL'], e, i)
111
                md_content = utils.get_metadata_from_url(idp)
112

  
113
                if not md_content:
45 114
                    continue
46
                idp['METADATA'] = response.content
47
            elif 'METADATA' in idp:
48
                if idp['METADATA'].startswith('/'):
49
                    idp['METADATA'] = file(idp['METADATA']).read()
50
            else:
115

  
116
                if 'FEDERATION' in idp:
117
                    # IdPs from federation are cached on filesystem
118
                    # only the filename is kept in memory
119
                    idp['METADATA'] = idp_metadata_store(md_content)
120
                    entity_id = idp.get('ENTITY_ID')
121
                    if not entity_id:
122
                        idp['ENTITY_ID'] = idp_metadata_extract_entity_id(md_content)
123
                    # load federation-specific configuration
124
                    idp.update(idp_settings_load(idp.get('ENTITY_ID')))
125
                else:
126
                    idp['METADATA'] = md_content
127

  
128
            elif idp.get('METADATA', '').startswith('/') or \
129
                    idp.get('METADATA', '').startswith('./') and \
130
                    'FEDERATION' not in idp:
131
                idp['METADATA'] = file(idp['METADATA']).read()
132

  
133
            elif not idp.get('METADATA'):
51 134
                self.logger.error(u'missing METADATA or METADATA_URL in %d-th idp', i)
52 135
                continue
53
            if 'ENTITY_ID' not in idp:
54
                try:
55
                    doc = ET.fromstring(idp['METADATA'])
56
                except (TypeError, ET.ParseError):
57
                    self.logger.error(u'METADATA of %d-th idp is invalid', i)
58
                    continue
59
                if doc.tag != '{%s}EntityDescriptor' % lasso.SAML2_METADATA_HREF:
60
                    self.logger.error(u'METADATA of %d-th idp has no EntityDescriptor root tag', i)
61
                    continue
62 136

  
63
                if not 'entityID' in doc.attrib:
64
                    self.logger.error(
65
                        u'METADATA of %d-th idp has no entityID attribute on its root tag', i)
66
                    continue
67
                idp['ENTITY_ID'] = doc.attrib['entityID']
68 137
            yield idp
69 138

  
70 139
    def authorize(self, idp, saml_attributes):
mellon/app_settings.py
36 36
        'LOGIN_URL': 'mellon_login',
37 37
        'LOGOUT_URL': 'mellon_logout',
38 38
        'ARTIFACT_RESOLVE_TIMEOUT': 10.0,
39
        'FEDERATIONS': [],
39 40
    }
40 41

  
42
    @property
43
    def FEDERATIONS(self):
44
        from django.conf import settings
45
        if settings.hasattr('MELLON_FEDERATIONS'):
46
            federations = settings.MELLON_FEDERATIONS
47
        if isinstance(federations, dict):
48
            federations = [federations]
49
        return federations
50

  
41 51
    @property
42 52
    def IDENTITY_PROVIDERS(self):
43 53
        from django.conf import settings
54
        idps = []
44 55
        try:
45
            idps = settings.MELLON_IDENTITY_PROVIDERS
56
            if hasattr(settings, 'MELLON_IDENTITY_PROVIDERS'):
57
                idps = settings.MELLON_IDENTITY_PROVIDERS
58
            elif not hasattr(settings, 'MELLON_FEDERATIONS'):
59
                raise AttributeError
46 60
        except AttributeError:
47 61
            from django.core.exceptions import ImproperlyConfigured
48
            raise ImproperlyConfigured('The MELLON_IDENTITY_PROVIDERS setting is mandatory')
62
            raise ImproperlyConfigured('Either the MELLON_IDENTITY_PROVIDERS '
63
                                       'or the MELLON_FEDERATIONS settings '
64
                                       'are mandatory')
49 65
        if isinstance(idps, dict):
50 66
            idps = [idps]
51 67
        return idps
mellon/federation_utils.py
1
import fcntl
2
import json
3
import lasso
4
import logging
5
import tempfile
6
from datetime import timedelta
7

  
8
from django.utils.text import slugify
9
from datetime import datetime
10

  
11
import requests
12
from xml.etree import ElementTree as ET
13
import os
14
import hashlib
15
import os.path
16

  
17
from django.core.files.storage import default_storage
18

  
19

  
20
def truncate_unique(s, length=250):
21
    if len(s) < length:
22
        return s
23
    md5 = hashlib.md5(s.encode('ascii')).hexdigest()
24
    # we should be the first and last characters from the URL
25
    l = (length - len(md5)) / 2 - 2  # four additional characters
26
    assert l > 20
27
    return s[:l] + '...' + s[-l:] + '_' + md5
28

  
29

  
30
def url2filename(url):
31
    return truncate_unique(slugify(url), 230)
32

  
33

  
34
def load_federation_cache(url):
35
    logger = logging.getLogger(__name__)
36
    try:
37
        filename = url2filename(url)
38
        path = os.path.join('metadata-cache', filename)
39

  
40
        unix_path = default_storage.path(path)
41
        dirname = os.path.dirname(unix_path)
42
        if not os.path.exists(dirname):
43
            os.makedirs(dirname)
44
        f = open(unix_path, 'w')
45
        try:
46
            fcntl.lockf(f, fcntl.LOCK_EX | fcntl.LOCK_NB)
47
        except IOError:
48
            return
49
        else:
50
            with tempfile.NamedTemporaryFile(dir=os.path.dirname(unix_path), delete=False) as temp:
51
                try:
52
                    # increase modified time by one hour to prevent too many updates
53
                    st = os.stat(unix_path)
54
                    os.utime(unix_path, (st.st_atime, st.st_mtime + 3600))
55
                    response = requests.get(url)
56
                    response.raise_for_status()
57
                    temp.write(response.content)
58
                    temp.flush()
59
                    os.rename(temp.name, unix_path)
60
                except:
61
                    logger.error('Could\'nt fetch %r', url)
62
                    os.unlink(temp.name)
63
                finally:
64
                    fcntl.lockf(f, fcntl.LOCK_UN)
65
        finally:
66
            f.close()
67
    except OSError:
68
        logger.exception(u"could create the intermediary 'metadata-cache' "
69
                         "folder")
70
        return
71
    except:
72
        logger.exception(u'failed to load federation from %s', url)
73

  
74

  
75
def get_federation_from_url(url, update_cache=False):
76
    logger = logging.getLogger(__name__)
77
    filename = url2filename(url)
78
    filepath = os.path.join('metadata-cache', filename)
79
    if not default_storage.exists(filepath) or update_cache or \
80
            default_storage.created_time(filepath) < datetime.now() - timedelta(days=1):
81
        load_federation_cache(url)
82
    else:
83
        logger.warning('federation %s has not been loaded', url)
84
    return default_storage.path(filepath)
85

  
86

  
87
def idp_metadata_filepath(entity_id):
88
    filename = url2filename(entity_id)
89
    filepath = os.path.join('./metadata-cache', filename)
90
    return filepath
91

  
92

  
93
def idp_settings_filepath(entity_id):
94
    filename = url2filename(entity_id) + "_settings.json"
95
    filepath = os.path.join('./metadata-cache', filename)
96
    return filepath
97

  
98

  
99
def idp_metadata_is_cached(entity_id):
100
    filepath = idp_metadata_filepath(entity_id)
101
    if not default_storage.exists(filepath):
102
        return False
103
    return True
104

  
105

  
106
def idp_metadata_is_file(metadata):
107
    # XXX too restrictive (e.g. 'metadata/http-somemetadataserver-com-md00.xml'
108
    # could be a file too...)
109
    # On the opposite, `if "http://" in metadata or "https://" in metadata:" is
110
    # equally restrictive.
111
    # Using a URLValidator doesn't seem adequate either.
112
    if metadata.startswith('/') or metadata.startswith('./'):
113
        return True
114

  
115

  
116
def idp_metadata_needs_refresh(entity_id, update_cache=False):
117
    filepath = idp_metadata_filepath(entity_id)
118
    if not default_storage.exists(filepath) or update_cache or \
119
            default_storage.created_time(filepath) < datetime.now() - timedelta(days=1):
120
        return True
121
    return False
122

  
123

  
124
def idp_settings_needs_refresh(entity_id, update_cache=False):
125
    filepath = idp_settings_filepath(entity_id)
126
    if not default_storage.exists(filepath) or update_cache or \
127
            default_storage.created_time(filepath) < datetime.now() - timedelta(days=1):
128
        return True
129
    return False
130

  
131

  
132
def idp_metadata_store(metadata_content):
133
    entity_id = idp_metadata_extract_entity_id(metadata_content)
134
    if not entity_id:
135
        return
136
    logger = logging.getLogger(__name__)
137
    filepath = idp_metadata_filepath(entity_id)
138

  
139
    dirname = os.path.dirname(filepath)
140
    if not default_storage.exists(dirname):
141
        os.makedirs(default_storage.path(dirname))
142

  
143
    if idp_metadata_needs_refresh(entity_id):
144
        with open(default_storage.path(filepath), 'w') as f:
145
            try:
146
                fcntl.lockf(f, fcntl.LOCK_EX | fcntl.LOCK_NB)
147
                f.write(metadata_content)
148
                fcntl.lockf(f, fcntl.LOCK_UN)
149
            except:
150
                logger.error('Couldn\'t store metadata for EntityID %r',
151
                        entity_id)
152
                return
153
    return default_storage.path(filepath)
154

  
155

  
156
def idp_metadata_load(entity_id):
157
    logger = logging.getLogger(__name__)
158
    filepath = idp_metadata_filepath(entity_id)
159
    if default_storage.exists(filepath):
160
        logger.info('Loading metadata for EntityID %r', entity_id)
161
        with open(default_storage.path(filepath), 'r') as f:
162
            return f.read()
163
    else:
164
        logger.warning('No metadata file for EntityID %r', entity_id)
165

  
166

  
167
def idp_settings_store(idp):
168
    """
169
    Stores an IDP settings when loaded from a federation.
170
    """
171
    logger = logging.getLogger(__name__)
172
    entity_id = idp.get('ENTITY_ID')
173
    filepath = idp_settings_filepath(entity_id)
174
    idp_settings = {}
175

  
176
    if not entity_id:
177
        return
178

  
179
    dirname = os.path.dirname(filepath)
180
    if not default_storage.exists(dirname):
181
        os.makedirs(default_storage.path(dirname))
182

  
183
    for key, value in idp.items():
184
        if key not in ('METADATA', 'ENTITY_ID'):
185
            idp_settings.update({key: value})
186

  
187
    if idp_settings_needs_refresh(entity_id) and idp_settings:
188
        with open(default_storage.path(filepath), 'w') as f:
189
            try:
190
                fcntl.lockf(f, fcntl.LOCK_EX | fcntl.LOCK_NB)
191
                f.write(json.dumps(idp_settings))
192
                fcntl.lockf(f, fcntl.LOCK_UN)
193
            except:
194
                logger.error('Couldn\'t store settings for EntityID %r',
195
                        entity_id)
196

  
197

  
198
def idp_settings_load(entity_id):
199
    logger = logging.getLogger(__name__)
200
    filepath = idp_settings_filepath(entity_id)
201
    if default_storage.exists(filepath):
202
        logger.info('Loading JSON settings for EntityID %r', entity_id)
203
        with open(default_storage.path(filepath), 'r') as f:
204
            try:
205
                idp_settings = json.loads(f.read())
206
            except:
207
                logger.warning('Couldn\'t load JSON settings for EntityID %r',
208
                        entity_id)
209
            else:
210
                return idp_settings
211
    else:
212
        logger.warning('No JSON settings file for EntityID %r', entity_id)
213

  
214
    return {}
215

  
216

  
217
def idp_metadata_extract_entity_id(metadata_content):
218
    logger = logging.getLogger(__name__)
219
    try:
220
        doc = ET.fromstring(metadata_content)
221
    except (TypeError, ET.ParseError):
222
        logger.error(u'METADATA of idp %r is invalid', metadata_content)
223
        return
224
    if doc.tag != '{%s}EntityDescriptor' % lasso.SAML2_METADATA_HREF:
225
        logger.error(u'METADATA of idp %r has no EntityDescriptor root tag',
226
                metadata_content)
227
        return
228
    if not 'entityID' in doc.attrib:
229
        logger.error(
230
                u'METADATA of idp %r has no entityID attribute on its root tag',
231
                metadata_content)
232
        return
233
    return doc.attrib['entityID']
mellon/utils.py
3 3
import importlib
4 4
from functools import wraps
5 5
import isodate
6
import requests
7
import requests.exceptions
6 8

  
7 9
from django.contrib import auth
10
from django.core.exceptions import ValidationError
8 11
from django.core.urlresolvers import reverse
12
from django.core.validators import URLValidator
9 13
from django.template.loader import render_to_string
10 14
from django.utils.timezone import make_aware, now, make_naive, is_aware, get_default_timezone
11 15
from django.conf import settings
......
13 17
import lasso
14 18

  
15 19
from . import app_settings
20
from federation_utils import get_federation_from_url, idp_metadata_is_file, \
21
        idp_metadata_load, idp_metadata_extract_entity_id
16 22

  
17 23

  
18 24
def create_metadata(request):
......
47 53

  
48 54
def create_server(request):
49 55
    logger = logging.getLogger(__name__)
50
    root = request.build_absolute_uri('/')
51
    cache = getattr(settings, '_MELLON_SERVER_CACHE', {})
52
    if root not in cache:
53
        metadata = create_metadata(request)
54
        if app_settings.PRIVATE_KEY:
55
            private_key = app_settings.PRIVATE_KEY
56
            private_key_password = app_settings.PRIVATE_KEY_PASSWORD
57
        elif app_settings.PRIVATE_KEYS:
58
            private_key = app_settings.PRIVATE_KEYS[0]
59
            private_key_password = None
60
            if isinstance(private_key, (tuple, list)):
61
                private_key_password = private_key[1]
62
                private_key = private_key[0]
63
        else:  # no signature
64
            private_key = None
65
            private_key_password = None
66
        server = lasso.Server.newFromBuffers(metadata, private_key_content=private_key,
67
                                             private_key_password=private_key_password)
68
        server.setEncryptionPrivateKeyWithPassword(private_key, private_key_password)
69
        private_keys = app_settings.PRIVATE_KEYS
70
        # skip first key if it is already loaded
71
        if not app_settings.PRIVATE_KEY:
72
            private_keys = app_settings.PRIVATE_KEYS[1:]
73
        for key in private_keys:
74
            password = None
75
            if isinstance(key, (tuple, list)):
76
                password = key[1]
77
                key = key[0]
78
            server.setEncryptionPrivateKeyWithPassword(key, password)
79
        for idp in get_idps():
80
            try:
81
                server.addProviderFromBuffer(lasso.PROVIDER_ROLE_IDP, idp['METADATA'])
82
            except lasso.Error as e:
83
                logger.error(u'bad metadata in idp %r', idp['ENTITY_ID'])
84
                logger.debug(u'lasso error: %s', e)
85
                continue
86
        cache[root] = server
87
        settings._MELLON_SERVER_CACHE = cache
88
    return settings._MELLON_SERVER_CACHE.get(root)
89

  
90

  
91
def create_login(request):
92
    server = create_server(request)
56
    metadata = create_metadata(request)
57
    if app_settings.PRIVATE_KEY:
58
        private_key = app_settings.PRIVATE_KEY
59
        private_key_password = app_settings.PRIVATE_KEY_PASSWORD
60
    elif app_settings.PRIVATE_KEYS:
61
        private_key = app_settings.PRIVATE_KEYS[0]
62
        private_key_password = None
63
        if isinstance(private_key, (tuple, list)):
64
            private_key_password = private_key[1]
65
            private_key = private_key[0]
66
    else:  # no signature
67
        private_key = None
68
        private_key_password = None
69
    server = lasso.Server.newFromBuffers(metadata, private_key_content=private_key,
70
                                         private_key_password=private_key_password)
71
    server.setEncryptionPrivateKeyWithPassword(private_key, private_key_password)
72
    private_keys = app_settings.PRIVATE_KEYS
73
    # skip first key if it is already loaded
74
    if not app_settings.PRIVATE_KEY:
75
        private_keys = app_settings.PRIVATE_KEYS[1:]
76
    for key in private_keys:
77
        password = None
78
        if isinstance(key, (tuple, list)):
79
            password = key[1]
80
            key = key[0]
81
        server.setEncryptionPrivateKeyWithPassword(key, password)
82
    return server
83

  
84

  
85
def get_federation_metadata(federation):
86
    logger = logging.getLogger(__name__)
87
    fedmd = None
88
    pemcert = None
89
    if (isinstance(federation, tuple) and len(federation) == 2):
90
        logger.info('Loading local cert-based federation %r',
91
                    federation)
92
        if federation[1].endswith('.pem'):
93
            fedmd = federation[0]
94
            pemcert = federation[1]
95
    else:
96
        urlval = URLValidator()
97
        try:
98
            urlval(federation)
99
        except ValidationError:
100
            logger.info('Loading file-based federation %s',
101
                        federation)
102
            fedmd = federation
103
        else:
104
            logger.info('Fetching and loading url-based federation %s',
105
                        federation)
106
            fedmd = get_federation_from_url(federation)
107
    return (fedmd, pemcert)
108

  
109

  
110
def create_login(request, server=None):
111
    if not server:
112
        server = create_server(request)
93 113
    login = lasso.Login(server)
94 114
    if not app_settings.PRIVATE_KEY and not app_settings.PRIVATE_KEYS:
95 115
        login.setSignatureHint(lasso.PROFILE_SIGNATURE_HINT_FORBID)
......
112 132
                yield idp
113 133

  
114 134

  
135
def get_federations():
136
    for adapter in get_adapters():
137
        if hasattr(adapter, 'get_federations'):
138
            for federation in adapter.get_federations():
139
                yield federation
140

  
141

  
115 142
def flatten_datetime(d):
116 143
    d = d.copy()
117 144
    for key, value in d.iteritems():
......
179 206
    return idp.get(name) or getattr(app_settings, name, default)
180 207

  
181 208

  
182
def create_logout(request):
209
def create_logout(request, server=None):
183 210
    logger = logging.getLogger(__name__)
184
    server = create_server(request)
211
    if not server:
212
        server = create_server(request)
185 213
    mellon_session = request.session.get('mellon_session', {})
186 214
    entity_id = mellon_session.get('issuer')
187 215
    session_index = mellon_session.get('session_index')
......
246 274
            break
247 275
    else:
248 276
        auth.login(request, user)
277

  
278
def recreate_server(request, remote_provider_id=None):
279

  
280
    def add_provider_from_idp(server, idp):
281
        logger = logging.getLogger(__name__)
282
        metadata = idp.get('METADATA')
283
        entity_id = idp.get('ENTITY_ID')
284
        try:
285
            if 'FEDERATION' in idp and idp_metadata_is_file(metadata):
286
                # Federated IdPs have their own cache management:
287
                if idp_metadata_is_file(metadata):
288
                    if not entity_id:
289
                        entity_id = idp_metadata_extract_entity_id(metadata)
290
                    server.addProviderFromBuffer(
291
                            lasso.PROVIDER_ROLE_IDP,
292
                            idp_metadata_load(entity_id))
293
            elif metadata.startswith('/') or metadata.startswith('./'):
294
                # Simply call the adequate built-in lasso routine
295
                server.addProvider(lasso.PROVIDER_ROLE_IDP, metadata)
296
            else:
297
                # The metadata supplied is directly the content buffer:
298
                server.addProviderFromBuffer(lasso.PROVIDER_ROLE_IDP, metadata)
299
        except lasso.ServerAddProviderFailedError as e:
300
            logger.error('Error %s: Failed to load idp %s', e, metadata)
301

  
302
    if remote_provider_id:
303
        server = create_server(request)
304
        idp = get_idp(remote_provider_id)
305
        idp_metadata = idp.get('METADATA')
306
        if not idp_metadata:
307
            return server
308
        add_provider_from_idp(server, idp)
309
    else:
310
        # No remote provider identifier was provided, but the server still needs
311
        # to be recreated:
312
        server = create_server(request)
313
        for idp in get_idps():
314
            add_provider_from_idp(server, idp)
315

  
316
    return server
317

  
318
def get_metadata_from_url(idp):
319
    logger = logging.getLogger(__name__)
320

  
321
    verify_ssl_certificate = get_setting(
322
        idp, 'VERIFY_SSL_CERTIFICATE')
323

  
324
    try:
325
        response = requests.get(idp['METADATA_URL'], verify=verify_ssl_certificate)
326
        response.raise_for_status()
327
    except requests.exceptions.RequestException as e:
328
        logger.error(
329
                u'retrieval of metadata URL %r failed with error %s',
330
                idp['METADATA_URL'], e)
331
    else:
332
        return response.content
mellon/views.py
17 17
from django.db import transaction
18 18
from django.utils.translation import ugettext as _
19 19

  
20
from . import app_settings, utils
20
from . import app_settings, utils, federation_utils
21 21

  
22 22

  
23 23
lasso.setFlag('thin-sessions')
......
108 108
        idp_message = None
109 109
        status_codes = []
110 110
        # prevent null characters in SAMLResponse
111
        try:
112
            login.processAuthnResponseMsg(request.POST['SAMLResponse'])
113
            login.acceptSso()
114
        except lasso.ProfileCannotVerifySignatureError:
115
            self.log.warning('SAML authentication failed: signature validation failed for %r',
116
                             login.remoteProviderId)
117
        except lasso.ParamError:
118
            self.log.exception('lasso param error')
119
        except (lasso.LoginStatusNotSuccessError,
120
                lasso.ProfileStatusNotSuccessError,
121
                lasso.ProfileRequestDeniedError):
122
            self.show_message_status_is_not_success(login, 'SAML authentication failed')
123
        except lasso.Error as e:
124
            return HttpResponseBadRequest('error processing the authentication response: %r' % e)
125
        else:
126
            if 'RelayState' in request.POST and utils.is_nonnull(request.POST['RelayState']):
127
                login.msgRelayState = request.POST['RelayState']
128
            return self.sso_success(request, login)
111
        worth_trying_again = True
112
        num_tries = 0
113
        while worth_trying_again:
114
            try:
115
                login.processAuthnResponseMsg(request.POST['SAMLResponse'])
116
                login.acceptSso()
117
            except lasso.ProfileCannotVerifySignatureError:
118
                worth_trying_again = False
119
                self.log.warning('SAML authentication failed: signature validation failed for %r',
120
                                 login.remoteProviderId)
121
            except lasso.ParamError:
122
                worth_trying_again = False
123
                self.log.exception('lasso param error')
124
            except (lasso.LoginStatusNotSuccessError,
125
                    lasso.ProfileStatusNotSuccessError,
126
                    lasso.ProfileRequestDeniedError):
127
                worth_trying_again = False
128
                self.show_message_status_is_not_success(login, 'SAML authentication failed')
129
            except (lasso.ProfileUnknownProviderError,
130
                    lasso.ServerProviderNotFoundError) as e:
131
                if num_tries == 1:
132
                    raise e
133
                server = utils.recreate_server(request, login.remoteProviderId)
134
                self.profile = login = utils.create_login(request, server)
135
                num_tries += 1
136
            except lasso.Error as e:
137
                return HttpResponseBadRequest('error processing the authentication response: %r' % e)
138
            else:
139
                if 'RelayState' in request.POST and utils.is_nonnull(request.POST['RelayState']):
140
                    login.msgRelayState = request.POST['RelayState']
141
                return self.sso_success(request, login)
129 142
        return self.sso_failure(request, login, idp_message, status_codes)
130 143

  
131 144
    def sso_failure(self, request, login, idp_message, status_codes):
......
240 253
        self.profile = login = utils.create_login(request)
241 254
        if relay_state and utils.is_nonnull(relay_state):
242 255
            login.msgRelayState = relay_state
243
        try:
244
            login.initRequest(message, method)
245
        except lasso.ProfileInvalidArtifactError:
246
            self.log.warning(u'artifact is malformed %r', artifact)
247
            return HttpResponseBadRequest(u'artifact is malformed %r' % artifact)
248
        except lasso.ServerProviderNotFoundError:
249
            self.log.warning('no entity id found for artifact %s', artifact)
250
            return HttpResponseBadRequest(
251
                'no entity id found for this artifact %r' % artifact)
256
        num_tries = 0
257
        while num_tries < 2:
258
            try:
259
                login.initRequest(message, method)
260
            except lasso.ProfileInvalidArtifactError:
261
                self.log.warning(u'artifact is malformed %r', artifact)
262
                return HttpResponseBadRequest(u'artifact is malformed %r' % artifact)
263
            except (lasso.ProfileUnknownProviderError,
264
                    lasso.ServerProviderNotFoundError,
265
                    lasso.ProfileInvalidArtifactError) as e:
266
                if num_tries == 1:
267
                    raise e
268
                server = utils.recreate_server(request, login.remoteProviderId)
269
                self.profile = login = utils.create_login(request, server)
270
                if relay_state and utils.is_nonnull(relay_state):
271
                    login.msgRelayState = relay_state
272
            except lasso.ProfileInvalidArtifactError:
273
                self.log.warning(u'artifact is malformed %r', artifact)
274
                return HttpResponseBadRequest(u'artifact is malformed %r' % artifact)
275
            except lasso.ServerProviderNotFoundError:
276
                self.log.warning('no entity id found for artifact %s', artifact)
277
                return HttpResponseBadRequest(
278
                    'no entity id found for this artifact %r' % artifact)
279
            num_tries += 1
252 280
        idp = utils.get_idp(login.remoteProviderId)
253 281
        if not idp:
254 282
            self.log.warning('entity id %r is unknown', login.remoteProviderId)
......
342 370
        if idp is None:
343 371
            return HttpResponseBadRequest('no idp found')
344 372
        self.profile = login = utils.create_login(request)
345
        self.log.debug('authenticating to %r', idp['ENTITY_ID'])
373
        self.log.debug('authenticating to %r', idp.get('ENTITY_ID') or idp['METADATA'])
374
        entity_id = idp.get('ENTITY_ID') or federation_utils.idp_metadata_extract_entity_id(idp.get('METADATA'))
375
        num_tries = 0
376
        while num_tries < 2:
377
            try:
378
                login.initAuthnRequest(entity_id, lasso.HTTP_METHOD_REDIRECT)
379
            except (lasso.ProfileUnknownProviderError,
380
                    lasso.ServerProviderNotFoundError) as e:
381
                if num_tries == 1:
382
                    raise e
383
                server = utils.recreate_server(request, login.remoteProviderId)
384
                self.profile = login = utils.create_login(request, server)
385
            except lasso.Error as e:
386
                return HttpResponseBadRequest('error initializing the authentication request: %r' % e)
387
            num_tries += 1
346 388
        try:
347
            login.initAuthnRequest(idp['ENTITY_ID'], lasso.HTTP_METHOD_REDIRECT)
348 389
            authn_request = login.request
349 390
            # configure NameID policy
350 391
            policy = authn_request.nameIdPolicy
......
395 436
    def idp_logout(self, request):
396 437
        '''Handle logout request emitted by the IdP'''
397 438
        self.profile = logout = utils.create_logout(request)
398
        try:
399
            logout.processRequestMsg(request.META['QUERY_STRING'])
400
        except lasso.Error as e:
401
            return HttpResponseBadRequest('error processing logout request: %r' % e)
439
        num_tries = 0
440
        while num_tries < 2:
441
            try:
442
                logout.processRequestMsg(request.META['QUERY_STRING'])
443
            except (lasso.ProfileUnknownProviderError,
444
                    lasso.ServerProviderNotFoundError) as e:
445
                if num_tries == 1:
446
                    raise e
447
                server = utils.recreate_server(request, logout.remoteProviderId)
448
                self.profile = logout = utils.create_logout(request, server)
449
            except lasso.Error as e:
450
                return HttpResponseBadRequest('error processing logout request: %r' % e)
451
            num_tries += 1
402 452
        try:
403 453
            logout.validateRequest()
404 454
        except lasso.Error as e:
......
454 504
        # that a concurrent SSO happened in the meantime, so we do another
455 505
        # logout to make sure.
456 506
        auth.logout(request)
457
        try:
458
            logout.processResponseMsg(request.META['QUERY_STRING'])
459
        except lasso.ProfileStatusNotSuccessError:
460
            self.show_message_status_is_not_success(logout, 'SAML logout failed')
461
        except lasso.LogoutPartialLogoutError:
462
            self.log.warning('partial logout')
463
        except lasso.Error as e:
464
            self.log.warning('unable to process a logout response: %s', e)
465
            return HttpResponseRedirect(resolve_url(settings.LOGIN_REDIRECT_URL))
507
        num_tries = 0
508
        worth_trying_again = True
509
        while worth_trying_again:
510
            try:
511
                logout.processResponseMsg(request.META['QUERY_STRING'])
512
            except lasso.ProfileStatusNotSuccessError:
513
                self.show_message_status_is_not_success(logout, 'SAML logout failed')
514
                worth_trying_again = False
515
            except lasso.LogoutPartialLogoutError:
516
                self.log.warning('partial logout')
517
                worth_trying_again = False
518
            except (lasso.ProfileUnknownProviderError,
519
                    lasso.ServerProviderNotFoundError) as e:
520
                if num_tries == 1:
521
                    raise e
522
                server = utils.recreate_server(request, logout.remoteProviderId)
523
                self.profile = logout = utils.create_logout(request, server)
524
            except lasso.Error as e:
525
                self.log.warning('unable to process a logout response: %s', e)
526
                return HttpResponseRedirect(resolve_url(settings.LOGIN_REDIRECT_URL))
527
            num_tries += 1
466 528
        next_url = self.get_next_url(default=resolve_url(settings.LOGIN_REDIRECT_URL))
467 529
        return HttpResponseRedirect(next_url)
468 530

  
setup.py
94 94
          'django>=1.5,<2.0',
95 95
          'requests',
96 96
          'isodate',
97
          'pytz',
97 98
      ],
98 99
      setup_requires=[
99 100
          'django>=1.5,<2.0',
tests/conftest.py
42 42
    caplog.handler.stream = py.io.TextIO()
43 43
    caplog.handler.records = []
44 44
    return caplog
45

  
46

  
47
# XXX temporary workaround
48
#     non-federated IdPs shouldn't have their MD cached
49
@pytest.fixture(autouse=True)
50
def mellon_settings(settings, tmpdir):
51
        settings.MEDIA_ROOT = str(tmpdir)
tests/dummy_md.xml
1
<?xml version="1.0" encoding="UTF-8" standalone="no"?><md:EntitiesDescriptor xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata" xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:mdattr="urn:oasis:names:tc:SAML:metadata:attribute" xmlns:mdrpi="urn:oasis:names:tc:SAML:metadata:rpi" xmlns:mdui="urn:oasis:names:tc:SAML:metadata:ui" xmlns:pyff="http://pyff.io/NS" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" xmlns:shibmd="urn:mace:shibboleth:metadata:1.0" xmlns:xrd="http://docs.oasis-open.org/ns/xri/xrd-1.0" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" ID="_20171018T113001Z" Name="https://federation.renater.fr/" cacheDuration="PT1H" validUntil="2017-10-27T11:30:01Z"><ds:Signature>
2
<ds:SignedInfo>
3
<ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
4
<ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
5
<ds:Reference URI="">
6
<ds:Transforms>
7
<ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
8
<ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
9
</ds:Transforms>
10
<ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/>
11
<ds:DigestValue>JKdLdd5yGvkFdb1fCAByMMnurIKYhZepRouZfOjIUrg=</ds:DigestValue>
12
</ds:Reference>
13
</ds:SignedInfo>
14
<ds:SignatureValue>
15
OTexfi8c63TsP1V9j5m6digA2NomUfqBtT8pPKhwdqEDQS5qLh6fxvT+wWkP6JaIhkP8nxwpbArl
16
7cUHkRv5ibZzcknIAjXYMhsSTtFQUq89OMcDHtZHG54jiKyHPhu2+XEbvv6DsAYanYC6SHEnGjNG
17
opnOEUB2XqeycsvvTQQIuWZEoABTVcKYyk2CW7Ij5EUmPOAPiidtbt8lzrtkV6dwLbkyoEbChAyj
18
emrL/oS01aJgT9sQoJxR8lyRMGiZ/BwQqYTareiKwOXLPdGThzsfZXD8de9T1xuysILaAM7sHPJV
19
QfrQJm80Zo2MM/GnhJTO9rc4m3kRnRhqmA6qMw==
20
</ds:SignatureValue>
21
<ds:KeyInfo>
22
<ds:KeyValue>
23
<ds:RSAKeyValue>
24
<ds:Modulus>
25
71+vTf66BPgYUF7sm4T++W69qMVyGQn9wNqpBLc6sp53eq/JRTOUD26Yehjsld5qN52Bv2r5QG7o
26
4VU123akXUYzupvq1f+tmF9NwYa7MPEPFzCzJHhNXjZNRxcsW1WLW34fhQCm0oak3oSPoNo5qeGi
27
jNsTSkgSt1mPH0P8d95af2VJnT6zbrclxvH4emqpT9oGLsWqKWLlIbZ7u1PUjuNVwLHuj909/apm
28
C13RBIpV52fey4qey34bnRHdCTknZeN/TJLTJ9hMWzz9TbdjfIFaiF7MeY+OYRXzUJeQuHHMu/2I
29
emkoR26mYi6irvmx8AdPcPCwcRKw2Ca4xLhbNw==
30
</ds:Modulus>
31
<ds:Exponent>AQAB</ds:Exponent>
32
</ds:RSAKeyValue>
33
</ds:KeyValue>
34
<ds:X509Data>
35
<ds:X509Certificate>
36
MIIC9zCCAd+gAwIBAgIEfe6j3jANBgkqhkiG9w0BAQsFADAsMSowKAYDVQQDEyFTQU1MIE1ldGFk
37
YXRhIFNpZ25pbmcgQ2VydGlmaWNhdGUwHhcNMTYwNzI5MDczNjM4WhcNMjYwNjA3MDczNjM4WjAs
38
MSowKAYDVQQDEyFTQU1MIE1ldGFkYXRhIFNpZ25pbmcgQ2VydGlmaWNhdGUwggEiMA0GCSqGSIb3
39
DQEBAQUAA4IBDwAwggEKAoIBAQDvX69N/roE+BhQXuybhP75br2oxXIZCf3A2qkEtzqynnd6r8lF
40
M5QPbph6GOyV3mo3nYG/avlAbujhVTXbdqRdRjO6m+rV/62YX03Bhrsw8Q8XMLMkeE1eNk1HFyxb
41
VYtbfh+FAKbShqTehI+g2jmp4aKM2xNKSBK3WY8fQ/x33lp/ZUmdPrNutyXG8fh6aqlP2gYuxaop
42
YuUhtnu7U9SO41XAse6P3T39qmYLXdEEilXnZ97Lip7LfhudEd0JOSdl439MktMn2ExbPP1Nt2N8
43
gVqIXsx5j45hFfNQl5C4ccy7/Yh6aShHbqZiLqKu+bHwB09w8LBxErDYJrjEuFs3AgMBAAGjITAf
44
MB0GA1UdDgQWBBTT88iZzWO+hN9SBUkpx871lmTuLTANBgkqhkiG9w0BAQsFAAOCAQEABoPpODry
45
XwiM5jjtqk6veR02FevCKHpZP6Od7Kqcfs6lg5LcQmGUOgpmW3Gg4UMjBYkgARsT2Nsnah1CJqa8
46
cjvv8p5KEIhY0hVS8iMJnrb3PDeiFSeP4xSfct/6z/ebV4+QFl22bsm2zpAC6BpFz8+IJ/jAmQzT
47
Vob4MAUeQPnwwzm3xz6yanLZx7BK5cfrTCa+hrarNQCboRjXPwiejF8WRCxpgRHH6yNs5QH/Z6o5
48
e3tUP7uEpn2Ob+kcLsEMGb9DghkoDAgkHCOZeTy+7hgxt+/T94cLTa58gVtvEOnd0GuL7Vfd+IVd
49
XgSard8RfR3OyZlf6M4aSGQA73sskQ==
50
</ds:X509Certificate>
51
</ds:X509Data>
52
</ds:KeyInfo>
53
</ds:Signature><md:EntityDescriptor entityID="https://aishib.agropolis.fr/idp/shibboleth">
54
			<md:Extensions>
55
				<mdrpi:RegistrationInfo registrationAuthority="https://federation.renater.fr/" registrationInstant="2013-06-06T11:49:20Z">
56
					<mdrpi:RegistrationPolicy xml:lang="en">https://services.renater.fr/federation/en/metadata_registration_practice_statement</mdrpi:RegistrationPolicy>
57
				</mdrpi:RegistrationInfo>
58
			</md:Extensions>
59
		<md:IDPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:1.1:protocol urn:mace:shibboleth:1.0 urn:oasis:names:tc:SAML:2.0:protocol">
60
			<md:Extensions>
61
    				<shibmd:Scope regexp="false">agropolis.fr</shibmd:Scope>
62

  
63
			    <mdui:UIInfo>
64

  
65
			      <mdui:DisplayName xml:lang="en">Agropolis International</mdui:DisplayName>
66

  
67
			      <mdui:Logo height="16" width="16">data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAIAAACQkWg2AAAACXBIWXMAAABIAAAASABGyWs+AAAACXZwQWcAAAAQAAAAEABcxq3DAAACPUlEQVQoz21SPW8TQRR8u7d3ju34Er6UCHACRqK4Bjk0oDSEjiYSBQVS8k9AkWgp+AuUASGEaCASkoPcgARVMF8iTnxJwMFJfL47397u3u6jsGVFwLzmFTN6ozdDEBEAAOD4kiRJsVgkhMA/YMfZzc3NVstnzGq1/KXlJfgf2Ii9XquVZ2YWbi5Io4MsbfPeZK4wRm0AOH6KICIivq2tV6/O5cYLHztbW9FvYTKuZaLk7PjpW+UrJXtspCHGmGazCQBnZ8svtj/0tbAINYhcy1DyThpRhHtztyedwkBDAWBnZ6dSqbzZ+7THu0IraTJplDSZ0JnQ2Y+482jj1cgSRUTHdrhW9fa3SKaxErFKIyUiKaIsjVQaKf5s631HxP1+X2vNwjB0J9zd+OgnD044Ra4lI5ZBw7XqyeRQREciaqe9xoE/K/OFfIENnqBM1uZBqlWBOYxQjYZnqieTThru8zCU3AASIAjIXNellGLePkjCUPICy1mEDAShSg7SqCsTBtQ7WfY3vlarVUYpdUsuAs5PXV7dfpe3HEYtjSbNZJwJoRUi3rl4fSrvfufctm0ySA0RD0V84+WDL1EbCCDCYIDApeKZ+uKK6faDIPA8jw7jIORUbry2eH+5Mu8ARTSAkCPW3QvX6osrE+B8bjQ8zxu2aACDaIwxxuzzsLbbePj88a8k0Mb4vr/2ei3LMoOIiGRU0iGGVuDp6pNz5fNSiKnpac/zgAABMuzSXwIggIjdbrdUKjHGYGQaAAD+AJBJecXxnEvWAAAAJXRFWHRkYXRlOmNyZWF0ZQAyMDE1LTA3LTIwVDEwOjQ4OjE1KzAyOjAwpWiGMQAAACV0RVh0ZGF0ZTptb2RpZnkAMjAxNS0wNy0yMFQxMDo0ODoxNSswMjowMNQ1Po0AAAAASUVORK5CYII=</mdui:Logo>
68
			      <mdui:InformationURL xml:lang="fr">http://www.agropolis.fr</mdui:InformationURL>
69

  
70
          		      <mdui:DisplayName xml:lang="fr">Agropolis International</mdui:DisplayName>
71

  
72
      			    </mdui:UIInfo>
73
			</md:Extensions>
74
				<md:KeyDescriptor use="signing">
75
<ds:KeyInfo>
76

  
77
					  <ds:X509Data>
78
					    <ds:X509Certificate>
79
					      MIIDNzCCAh+gAwIBAgIUYY3sGXwChkj2CRy6QFDvkdj2zlAwDQYJKoZIhvcNAQEF
80
BQAwHjEcMBoGA1UEAxMTYWlzaGliLmFncm9wb2xpcy5mcjAeFw0xMzA1MTUxMzM3
81
MTJaFw0zMzA1MTUxMzM3MTJaMB4xHDAaBgNVBAMTE2Fpc2hpYi5hZ3JvcG9saXMu
82
ZnIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCxrDy6lrhIBjcxv16n
83
4UJ2cEMYPO4wSmfDwhO6feoSIEuIblYRHE2nQKirMokwD6seF4rbDHyxLXg/ColL
84
VLv+0CJteIOZjSCgSN90WzQRrC1Ex5sJfPu6yPEXvW8H1906gEg6ok8rlCIHRGfE
85
15pHK5eqxQS5f2n8c2t/Uk33/FBj79/hb3Cd7vE4mdlvReD3AFswC0lV4bPmj3Ka
86
KUuMj9xwipwnfWCu6p2/ZJF4M3ADU5grXHJ2Vqmd8DWm5raaObKjYwJddbRBByI8
87
bJJLIwAQQmX4Dh4hf1QKlf2oqWPWVQxLQp0erL1U8IWmj1RG8TTH9xOJl6kkEhYq
88
Z2gfAgMBAAGjbTBrMEoGA1UdEQRDMEGCE2Fpc2hpYi5hZ3JvcG9saXMuZnKGKmh0
89
dHBzOi8vYWlzaGliLmFncm9wb2xpcy5mci9pZHAvc2hpYmJvbGV0aDAdBgNVHQ4E
90
FgQU9A7iQ8Qo+t2JCpKuOOV9YBoYs4MwDQYJKoZIhvcNAQEFBQADggEBAG0LOW6I
91
F+M8n2NpzyQjfVCJCA6QhWjbXrfemiPJFZGZZb2dVmHof4yCpCUYgHOBoZaXPOlB
92
nLYsUWvFZ6V2GELZpLHzHSSrYidieW07qQkh1DwcIYpvtZgLviOtT/tCEGsk925f
93
DUoGdeIqpqt54WZcW9+TbKicvjg3JT4BFOQ17bFNwPW+YjTbvsWYxen+e0mRp4vM
94
V0yMu2f3bccVhePASSZGL3yod3sJ1dPvlrJO9c35BekhtirolVjZqMQ0AYPVifua
95
yIU0dWXsZkAOcBL9kZFbJcYRUIxMgvp8U2Zdv1+ZlwOyXnnWDOOh9wjuT7FAyObU
96
ChvjHlgZHkvLwJI=
97
					    </ds:X509Certificate>
98
					  </ds:X509Data>
99

  
100
					</ds:KeyInfo>
101
				</md:KeyDescriptor>
102

  
103

  
104

  
105

  
106

  
107
			<md:NameIDFormat>urn:mace:shibboleth:1.0:nameIdentifier</md:NameIDFormat>
108
			<md:NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</md:NameIDFormat>
109

  
110

  
111
			<md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://aishib.agropolis.fr/idp/profile/SAML2/POST/SSO"/>
112

  
113
	        <md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://aishib.agropolis.fr/idp/profile/SAML2/Redirect/SSO"/>
114

  
115

  
116
			<md:SingleSignOnService Binding="urn:mace:shibboleth:1.0:profiles:AuthnRequest" Location="https://aishib.agropolis.fr/idp/profile/Shibboleth/SSO"/>
117

  
118

  
119
		</md:IDPSSODescriptor>
120

  
121

  
122

  
123
		<md:Organization>
124

  
125
			<md:OrganizationName xml:lang="en">Agropolis International</md:OrganizationName>
126
			<md:OrganizationDisplayName xml:lang="en">Agropolis International</md:OrganizationDisplayName>
127
			<md:OrganizationURL xml:lang="en">http://www.agropolis.fr</md:OrganizationURL>
128

  
129
		</md:Organization>
130

  
131

  
132

  
133
			    <md:ContactPerson contactType="technical">
134
				 <md:SurName>Jean Cerda</md:SurName>
135
				 <md:EmailAddress>cerda@agropolis.fr</md:EmailAddress>
136
		        </md:ContactPerson>
137

  
138

  
139

  
140
			    <md:ContactPerson contactType="technical">
141
				 <md:SurName>Jean-Pierre  Allano</md:SurName>
142
				 <md:EmailAddress>allano@agropolis.fr</md:EmailAddress>
143
		        </md:ContactPerson>
144

  
145

  
146

  
147

  
148
	</md:EntityDescriptor><md:EntityDescriptor entityID="https://ambre.vetagro-sup.fr/idp/shibboleth">
149
			<md:Extensions>
150
				<mdrpi:RegistrationInfo registrationAuthority="https://federation.renater.fr/" registrationInstant="2013-01-14T16:11:53Z">
151
					<mdrpi:RegistrationPolicy xml:lang="en">https://services.renater.fr/federation/en/metadata_registration_practice_statement</mdrpi:RegistrationPolicy>
152
				</mdrpi:RegistrationInfo>
153
			</md:Extensions>
154
		<md:IDPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:1.1:protocol urn:mace:shibboleth:1.0 urn:oasis:names:tc:SAML:2.0:protocol">
155
			<md:Extensions>
156
    				<shibmd:Scope regexp="false">vetagro-sup.fr</shibmd:Scope>
157

  
158
			    <mdui:UIInfo>
159

  
160
			      <mdui:DisplayName xml:lang="en">Vetagro Sup</mdui:DisplayName>
161

  
162
			      <mdui:Logo height="16" width="16">data:image/png;base64,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</mdui:Logo>
163
			      <mdui:InformationURL xml:lang="fr">http://www.vetagro-sup.fr</mdui:InformationURL>
164

  
165
          		      <mdui:DisplayName xml:lang="fr">Vetagro Sup</mdui:DisplayName>
166

  
167
      			    </mdui:UIInfo>
168
			</md:Extensions>
169
				<md:KeyDescriptor use="signing">
170
<ds:KeyInfo>
171

  
172
					  <ds:X509Data>
173
					    <ds:X509Certificate>
174
					      MIIDPDCCAiSgAwIBAgIVAL9PsuadPSIZcMHNxlK/oevezmzWMA0GCSqGSIb3DQEB
175
BQUAMB8xHTAbBgNVBAMTFGFtYnJlLnZldGFncm8tc3VwLmZyMB4XDTEyMTEwODEw
176
MTQwNFoXDTMyMTEwODEwMTQwNFowHzEdMBsGA1UEAxMUYW1icmUudmV0YWdyby1z
177
dXAuZnIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCc/ptfpmkomwmT
178
4RsID+1Ce1dX0eUjcLgSOZN8hVpHWLag2ERWkpmvB5aK7BAFcI5i//Gk80tAiasu
179
JtlZhBnEw54aTJRGpyL2CVkHyl6SMRxprIi1Ji67IoGqEgUeGaheAxo+tG5e1WSc
180
bIbldcSKdwvjAV+7HSB4C6NqLsAzJH25++yaRH2uf2LTD0TDzNR9Q2hVj/VyYWR+
181
K3HWI1Snjn/i7aFfZZhYmBkwHuQOaPhwCM+khikg5XicMsxUhHCMi93UgHGIsdkr
182
IEGj4xydBTUKsLaykeuFS8EgXbWwCLGkeX76w8xDoFIpnppU/yFd9v7Zg3EBfn4p
183
kTW3GdIjAgMBAAGjbzBtMEwGA1UdEQRFMEOCFGFtYnJlLnZldGFncm8tc3VwLmZy
184
hitodHRwczovL2FtYnJlLnZldGFncm8tc3VwLmZyL2lkcC9zaGliYm9sZXRoMB0G
185
A1UdDgQWBBTPTqWkVHrHXFjmxMWkNt/sp2h5ozANBgkqhkiG9w0BAQUFAAOCAQEA
186
FvXMtfBUmRZCzz8CjanGzr1TBUPmnkrKci5AtkseKw9YlfUmBXTHB01y697nYq6m
187
RB6KhvfW212h9CF0IOEEjoadgDhXqGYhq8PnAOtT4Ty3XDy8SbRh8aQWfvnfSngv
188
FdpHRiSpj5UXXuT5zTtkf59h58XKtEfCkMbUzvdOgUobJzpD0WISmQHPQnx+Neg6
189
9j7oMRrDiZjS39Om8Imu9xvsnddDM3PlsDBIsvrr1o7K5iLkEdR1YYX0ZNDbiFuw
190
QXXl2dwQPB8KrScPUvCe57slU2gFQvvIBzjQysxC6V6TPSuM3A/ee56lACuB3jKj
191
oYkHQc5Gj/1rSMLmu9aLMg==
192
					    </ds:X509Certificate>
193
					  </ds:X509Data>
194

  
195
					</ds:KeyInfo>
196
				</md:KeyDescriptor>
197

  
198

  
199

  
200

  
201

  
202
			<md:NameIDFormat>urn:mace:shibboleth:1.0:nameIdentifier</md:NameIDFormat>
203
			<md:NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</md:NameIDFormat>
204

  
205

  
206
			<md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://ambre.vetagro-sup.fr/idp/profile/SAML2/POST/SSO"/>
207

  
208
	        <md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://ambre.vetagro-sup.fr/idp/profile/SAML2/Redirect/SSO"/>
209

  
210

  
211
			<md:SingleSignOnService Binding="urn:mace:shibboleth:1.0:profiles:AuthnRequest" Location="https://ambre.vetagro-sup.fr/idp/profile/Shibboleth/SSO"/>
212

  
213

  
214
		</md:IDPSSODescriptor>
215

  
216

  
217

  
218
		<md:Organization>
219

  
220
			<md:OrganizationName xml:lang="en">Vetagro Sup</md:OrganizationName>
221
			<md:OrganizationDisplayName xml:lang="en">Vetagro Sup</md:OrganizationDisplayName>
222
			<md:OrganizationURL xml:lang="en">http://www.vetagro-sup.fr</md:OrganizationURL>
223

  
224
		</md:Organization>
225

  
226

  
227

  
228
			    <md:ContactPerson contactType="technical">
229
				 <md:SurName>Nicolas Aulas</md:SurName>
230
				 <md:EmailAddress>nicolas.aulas@vetagro-sup.fr</md:EmailAddress>
231
		        </md:ContactPerson>
232

  
233

  
234

  
235

  
236

  
237

  
238
	</md:EntityDescriptor><md:EntityDescriptor entityID="https://antimoine.insa-strasbourg.fr/idp/shibboleth">
239
			<md:Extensions>
240
				<mdrpi:RegistrationInfo registrationAuthority="https://federation.renater.fr/" registrationInstant="2014-02-11T08:44:08Z">
241
					<mdrpi:RegistrationPolicy xml:lang="en">https://services.renater.fr/federation/en/metadata_registration_practice_statement</mdrpi:RegistrationPolicy>
242
				</mdrpi:RegistrationInfo>
243
			</md:Extensions>
244
		<md:IDPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:1.1:protocol urn:mace:shibboleth:1.0 urn:oasis:names:tc:SAML:2.0:protocol">
245
			<md:Extensions>
246
    				<shibmd:Scope regexp="false">insa-strasbourg.fr</shibmd:Scope>
247

  
248
			    <mdui:UIInfo>
249

  
250
			      <mdui:DisplayName xml:lang="en">INSA Strasbourg</mdui:DisplayName>
251

  
252
			      <mdui:Logo height="16" width="16">data:image/png;base64,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</mdui:Logo>
253
			      <mdui:InformationURL xml:lang="fr">http://www.insa-strasbourg.fr</mdui:InformationURL>
254

  
255
          		      <mdui:DisplayName xml:lang="fr">INSA Strasbourg</mdui:DisplayName>
256

  
257
      			    </mdui:UIInfo>
258
			</md:Extensions>
259
				<md:KeyDescriptor use="signing">
260
<ds:KeyInfo>
261

  
262
					  <ds:X509Data>
263
					    <ds:X509Certificate>
264
					      MIIDUDCCAjigAwIBAgIVAIbX8U0uAqAhuXm1jWxiFpggtDTDMA0GCSqGSIb3DQEB
265
CwUAMCQxIjAgBgNVBAMMGXNvdWZyZS5pbnNhLXN0cmFzYm91cmcuZnIwHhcNMTYw
266
OTI3MTIzNjIxWhcNMzYwOTI3MTIzNjIxWjAkMSIwIAYDVQQDDBlzb3VmcmUuaW5z
267
YS1zdHJhc2JvdXJnLmZyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
268
sEE02sLRPAG5N81DMHEeGpI2MYF8yG/RiwH07cFIlLqgV80ewOmi0FWPYijxMb8A
269
bmx0RwUMvJBVI6WMxtT9fykhID20k8rWOuYOzvaynzVqCktqVgKoEAxP1PFE9b0n
270
iGKFprjjNl9ZD90GOUsxbAO7yXG9Q4WBa/eThl6XkUvNkSaZp5hcdWrgcAdsae3q
271
iD/uxFa38NXNNeRLGyfxjd2K5qYSzbwBza9s9TOq1+pfw7sxu3/4BnfQ0RLGO6co
272
4tH4Mufh0ome4cyYk4pvW5DOd1AznxDb8HpqvE0zwEsa69c/FDX0akgFZydmc77a
273
j6USn6JKjjbO49yGtG1gVQIDAQABo3kwdzAdBgNVHQ4EFgQUjzMsxZYiokPYxper
274
9zadM8J0F0kwVgYDVR0RBE8wTYIZc291ZnJlLmluc2Etc3RyYXNib3VyZy5mcoYw
275
aHR0cHM6Ly9zb3VmcmUuaW5zYS1zdHJhc2JvdXJnLmZyL2lkcC9zaGliYm9sZXRo
276
MA0GCSqGSIb3DQEBCwUAA4IBAQBFJKsiS3yfWuDB/E+iqQ0TuQJzL5+JIcloN0dw
277
BFxW3VZOju15zeQ7LwRBg9S4SGLMPJU+LM1lvr68cK9brut/FjF51SETIXEeCWo3
278
7+PIqgOCzraLNinmpU/OtN8ENalOPvpS6Jvbd23qB2t+IqOtZ+j15b0Yq4/on1E3
279
W2F9CVzKpe4EwmmtCPQbe7U1wvhgFylEx797pex8veWs79YSYwqvcKMh79dzl8Fo
280
/CgsO5pDrfKmc6SGMkByq75dZj+PqhZDzZ9EFTxbrXOTaS08VRN6a5Rh2iYRnGxq
281
yZl66tPcaIm5PHgOEmu5X4lPkUoY+Jt36Gj3SGCbYt8qH5S0
282
					    </ds:X509Certificate>
283
					  </ds:X509Data>
284

  
285
					</ds:KeyInfo>
286
				</md:KeyDescriptor>
287

  
288

  
289

  
290
				<md:KeyDescriptor use="signing">
291
				       <ds:KeyInfo>
292
					  <ds:X509Data>
293
					    <ds:X509Certificate>
294
					      MIIDXDCCAkSgAwIBAgIVAKI+qiqDCk9wTTqn7OVAoZrvj/CpMA0GCSqGSIb3DQEB
295
BQUAMCcxJTAjBgNVBAMTHGFudGltb2luZS5pbnNhLXN0cmFzYm91cmcuZnIwHhcN
296
MTQwMTEzMTAzOTU4WhcNMzQwMTEzMTAzOTU4WjAnMSUwIwYDVQQDExxhbnRpbW9p
297
bmUuaW5zYS1zdHJhc2JvdXJnLmZyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
298
CgKCAQEAtuM8lRjlVjjmrHq9VtguaOMQL+Wd99BiOs56kL3Mbctg1FwH69LYThCW
299
6dOz6WJg/jU/naF7jEikXKc71xGyu7Ph7Iqa9S5hoXXAT8u/0q2nZDeTOraJqKe1
300
FMF2RzXhEEMyQO3CiKNK9b+tbKoNZS7FQCixMZklWZPt4EcEKd6jyRq1WYX3dpnb
301
r9I/aCdhtK/PGvGe5gKTDoTR2HKyWKJTc/obf8x/vlYIEwiaGgdlqI2KiBE0x48n
302
zQdP6XVi3T8ZWbnkLmCfgJtP2C8PtEJuwDRAy0Z9N4DSwvxn5YCVYgBLSi0TLa10
303
B/lUqqBezZrTrA9p9Lt8JtGXW5YGHwIDAQABo38wfTBcBgNVHREEVTBTghxhbnRp
304
bW9pbmUuaW5zYS1zdHJhc2JvdXJnLmZyhjNodHRwczovL2FudGltb2luZS5pbnNh
305
LXN0cmFzYm91cmcuZnIvaWRwL3NoaWJib2xldGgwHQYDVR0OBBYEFLFkjPZUc9JY
306
qrWjldJ/iGGkKAt4MA0GCSqGSIb3DQEBBQUAA4IBAQBSk/wU1mRn4VF2ifmy261K
307
DK7uX+t1H1hh8S38fKSFU7HoNXJTV3vQnmBOpYIGC1gtvmb+qjqpNtikU2zO84Gq
308
Q0bXHxYF2d9RUP89mKaFxE5uNcXFmlOA3ChZY3pMT5zwAPI/T60tGrex7zci7OLn
309
JDAQj/q4Yk9ejx6JTFggQSCCVh+oV/SDIMd2p5AY6H3mto3b6XCk7Lssa8a/D30k
310
pEkZnhTKdN82eRyynuOR7UDU4tasV4d7Mi/j53f5ihnRcsvwh/pYodjoVYY8cEcZ
311
JLnAXYF8coSwh8UN4D/0NHsvTuSOFQc85hGrqacMsvxiQiw9mv01AX5+A5YLEbVQ
312
					    </ds:X509Certificate>
313
					  </ds:X509Data>
314
					</ds:KeyInfo>
315
				</md:KeyDescriptor>
316

  
317

  
318

  
319
			   <md:SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://antimoine.insa-strasbourg.fr/idp/profile/SAML2/Redirect/SLO"/>
320

  
321
			   <md:SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://antimoine.insa-strasbourg.fr/idp/profile/SAML2/POST/SLO"/>
322

  
323
			   <md:SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:SOAP" Location="https://antimoine.insa-strasbourg.fr/idp/profile/SAML2/SOAP/SLO"/>
324

  
325

  
326
			<md:NameIDFormat>urn:mace:shibboleth:1.0:nameIdentifier</md:NameIDFormat>
327
			<md:NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</md:NameIDFormat>
328

  
329

  
330
			<md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://antimoine.insa-strasbourg.fr/idp/profile/SAML2/POST/SSO"/>
331

  
332
	        <md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://antimoine.insa-strasbourg.fr/idp/profile/SAML2/Redirect/SSO"/>
333

  
334

  
335
			<md:SingleSignOnService Binding="urn:mace:shibboleth:1.0:profiles:AuthnRequest" Location="https://antimoine.insa-strasbourg.fr/idp/profile/Shibboleth/SSO"/>
336

  
337

  
338
		</md:IDPSSODescriptor>
339

  
340

  
341

  
342
		<md:Organization>
343

  
344
			<md:OrganizationName xml:lang="en">INSA Strasbourg</md:OrganizationName>
345
			<md:OrganizationDisplayName xml:lang="en">INSA Strasbourg</md:OrganizationDisplayName>
346
			<md:OrganizationURL xml:lang="en">http://www.insa-strasbourg.fr</md:OrganizationURL>
347

  
348
		</md:Organization>
349

  
350

  
351

  
352
			    <md:ContactPerson contactType="technical">
353
				 <md:SurName>Lahsen BOUZID</md:SurName>
354
				 <md:EmailAddress>lahsen.bouzid@insa-strasbourg.fr</md:EmailAddress>
355
		        </md:ContactPerson>
356

  
357

  
358

  
359
			    <md:ContactPerson contactType="technical">
360
				 <md:SurName>Simon SCHERRER</md:SurName>
361
				 <md:EmailAddress>simon.scherrer@insa-strasbourg.fr</md:EmailAddress>
362
		        </md:ContactPerson>
363

  
364

  
365

  
366

  
367
	</md:EntityDescriptor></md:EntitiesDescriptor>
tests/federation-sample.xml
1
<?xml version="1.0" encoding="UTF-8" standalone="no"?><md:EntitiesDescriptor xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata" xmlns:ds="http://www.w3.org/2000/09/xmldsig#" xmlns:mdattr="urn:oasis:names:tc:SAML:metadata:attribute" xmlns:mdrpi="urn:oasis:names:tc:SAML:metadata:rpi" xmlns:mdui="urn:oasis:names:tc:SAML:metadata:ui" xmlns:pyff="http://pyff.io/NS" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" xmlns:shibmd="urn:mace:shibboleth:metadata:1.0" xmlns:xrd="http://docs.oasis-open.org/ns/xri/xrd-1.0" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" ID="_20171018T113001Z" Name="https://federation.renater.fr/" cacheDuration="PT1H" validUntil="2017-10-27T11:30:01Z"><ds:Signature>
2
<ds:SignedInfo>
3
<ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
4
<ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
5
<ds:Reference URI="">
6
<ds:Transforms>
7
<ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
8
<ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
9
</ds:Transforms>
10
<ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/>
11
<ds:DigestValue>JKdLdd5yGvkFdb1fCAByMMnurIKYhZepRouZfOjIUrg=</ds:DigestValue>
12
</ds:Reference>
13
</ds:SignedInfo>
14
<ds:SignatureValue>
15
OTexfi8c63TsP1V9j5m6digA2NomUfqBtT8pPKhwdqEDQS5qLh6fxvT+wWkP6JaIhkP8nxwpbArl
16
7cUHkRv5ibZzcknIAjXYMhsSTtFQUq89OMcDHtZHG54jiKyHPhu2+XEbvv6DsAYanYC6SHEnGjNG
17
opnOEUB2XqeycsvvTQQIuWZEoABTVcKYyk2CW7Ij5EUmPOAPiidtbt8lzrtkV6dwLbkyoEbChAyj
18
emrL/oS01aJgT9sQoJxR8lyRMGiZ/BwQqYTareiKwOXLPdGThzsfZXD8de9T1xuysILaAM7sHPJV
19
QfrQJm80Zo2MM/GnhJTO9rc4m3kRnRhqmA6qMw==
20
</ds:SignatureValue>
21
<ds:KeyInfo>
22
<ds:KeyValue>
23
<ds:RSAKeyValue>
24
<ds:Modulus>
25
71+vTf66BPgYUF7sm4T++W69qMVyGQn9wNqpBLc6sp53eq/JRTOUD26Yehjsld5qN52Bv2r5QG7o
26
4VU123akXUYzupvq1f+tmF9NwYa7MPEPFzCzJHhNXjZNRxcsW1WLW34fhQCm0oak3oSPoNo5qeGi
27
jNsTSkgSt1mPH0P8d95af2VJnT6zbrclxvH4emqpT9oGLsWqKWLlIbZ7u1PUjuNVwLHuj909/apm
28
C13RBIpV52fey4qey34bnRHdCTknZeN/TJLTJ9hMWzz9TbdjfIFaiF7MeY+OYRXzUJeQuHHMu/2I
29
emkoR26mYi6irvmx8AdPcPCwcRKw2Ca4xLhbNw==
30
</ds:Modulus>
31
<ds:Exponent>AQAB</ds:Exponent>
32
</ds:RSAKeyValue>
33
</ds:KeyValue>
34
<ds:X509Data>
35
<ds:X509Certificate>
36
MIIC9zCCAd+gAwIBAgIEfe6j3jANBgkqhkiG9w0BAQsFADAsMSowKAYDVQQDEyFTQU1MIE1ldGFk
37
YXRhIFNpZ25pbmcgQ2VydGlmaWNhdGUwHhcNMTYwNzI5MDczNjM4WhcNMjYwNjA3MDczNjM4WjAs
38
MSowKAYDVQQDEyFTQU1MIE1ldGFkYXRhIFNpZ25pbmcgQ2VydGlmaWNhdGUwggEiMA0GCSqGSIb3
39
DQEBAQUAA4IBDwAwggEKAoIBAQDvX69N/roE+BhQXuybhP75br2oxXIZCf3A2qkEtzqynnd6r8lF
40
M5QPbph6GOyV3mo3nYG/avlAbujhVTXbdqRdRjO6m+rV/62YX03Bhrsw8Q8XMLMkeE1eNk1HFyxb
41
VYtbfh+FAKbShqTehI+g2jmp4aKM2xNKSBK3WY8fQ/x33lp/ZUmdPrNutyXG8fh6aqlP2gYuxaop
42
YuUhtnu7U9SO41XAse6P3T39qmYLXdEEilXnZ97Lip7LfhudEd0JOSdl439MktMn2ExbPP1Nt2N8
43
gVqIXsx5j45hFfNQl5C4ccy7/Yh6aShHbqZiLqKu+bHwB09w8LBxErDYJrjEuFs3AgMBAAGjITAf
44
MB0GA1UdDgQWBBTT88iZzWO+hN9SBUkpx871lmTuLTANBgkqhkiG9w0BAQsFAAOCAQEABoPpODry
45
XwiM5jjtqk6veR02FevCKHpZP6Od7Kqcfs6lg5LcQmGUOgpmW3Gg4UMjBYkgARsT2Nsnah1CJqa8
46
cjvv8p5KEIhY0hVS8iMJnrb3PDeiFSeP4xSfct/6z/ebV4+QFl22bsm2zpAC6BpFz8+IJ/jAmQzT
47
Vob4MAUeQPnwwzm3xz6yanLZx7BK5cfrTCa+hrarNQCboRjXPwiejF8WRCxpgRHH6yNs5QH/Z6o5
48
e3tUP7uEpn2Ob+kcLsEMGb9DghkoDAgkHCOZeTy+7hgxt+/T94cLTa58gVtvEOnd0GuL7Vfd+IVd
49
XgSard8RfR3OyZlf6M4aSGQA73sskQ==
50
</ds:X509Certificate>
51
</ds:X509Data>
52
</ds:KeyInfo>
53
</ds:Signature><md:EntityDescriptor entityID="https://access-check.edugain.org/simplesaml/saml2/idp/metadata.php">
54
			<md:Extensions>
55
				<mdrpi:RegistrationInfo registrationAuthority="https://federation.renater.fr/" registrationInstant="2015-01-30T15:32:58Z">
56
					<mdrpi:RegistrationPolicy xml:lang="en">https://services.renater.fr/federation/en/metadata_registration_practice_statement</mdrpi:RegistrationPolicy>
57
				</mdrpi:RegistrationInfo>
58
			</md:Extensions>
59
		<md:IDPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
60
			<md:Extensions>
61
    				<shibmd:Scope regexp="false">access-check.edugain.org</shibmd:Scope>
62

  
63
			    <mdui:UIInfo>
64

  
65
			      <mdui:DisplayName xml:lang="en">eduGAIN Access Check</mdui:DisplayName>
66

  
67
			      <mdui:Logo height="16" width="16">data:image/png;base64,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</mdui:Logo>
68
			      <mdui:InformationURL xml:lang="fr">http://www.renater.fr</mdui:InformationURL>
69
			      <mdui:Description xml:lang="en">eduGAIN Access Check allows administrators of a Service Provider (SP) registered in eduGAIN to create test accounts with different profiles to validate the behaviour and test federated login. The test accounts can only be used to access own services.</mdui:Description>
70
          		      <mdui:DisplayName xml:lang="fr">eduGAIN Access Check</mdui:DisplayName>
71
          		      <mdui:Description xml:lang="fr">eduGAIN Access Check allows administrators of a Service Provider (SP) registered in eduGAIN to create test accounts with different profiles to validate the behaviour and test federated login. The test accounts can only be used to access own services.</mdui:Description>
72
      			    </mdui:UIInfo>
73
			</md:Extensions>
74
				<md:KeyDescriptor use="signing">
75
<ds:KeyInfo>
76

  
77
					  <ds:X509Data>
78
					    <ds:X509Certificate>
79
					      MIID2zCCAsOgAwIBAgIJAJpdV2MFitUqMA0GCSqGSIb3DQEBBQUAMIGDMQswCQYD
80
VQQGEwJGUjEVMBMGA1UEBwwMRGVmYXVsdCBDaXR5MQ4wDAYDVQQKDAVHRUFOVDEd
81
MBsGA1UEAwwUdGVzdC1pZHAuZWR1Z2Fpbi5vcmcxLjAsBgkqhkiG9w0BCQEWH3Rl
82
c3RpZHBhY2NvdW50bWFuYWdlckBnZWFudC5uZXQwHhcNMTQxMjE4MTAxODU5WhcN
83
MjQxMjE3MTAxODU5WjCBgzELMAkGA1UEBhMCRlIxFTATBgNVBAcMDERlZmF1bHQg
84
Q2l0eTEOMAwGA1UECgwFR0VBTlQxHTAbBgNVBAMMFHRlc3QtaWRwLmVkdWdhaW4u
85
b3JnMS4wLAYJKoZIhvcNAQkBFh90ZXN0aWRwYWNjb3VudG1hbmFnZXJAZ2VhbnQu
86
bmV0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAo48FFP0P/81e3WHb
87
U91F/TYDZC/JypEqO2XQNH50baXpk2JrJFVFOWdgdK6qWHsLznuxngRsfOasAaVA
88
Ob1Bf3g2xgPUd2htSLxds+o/Y24DOM6ZairxbWJk2rOvLhJFchlrcNWCpMtUCkfJ
89
xmqGmeo93XAud5byj3wQ1NuH2o8rjTPAkMgQdr8D2b8EG1NYEH00AqRlXZTFCWGL
90
KDEuZwyta6vgMQYT4K6UF/F+HWF2wzbmVgRTHguJ0rzNqz6t+9CtLkhyZO+/57Ro
91
4U0ikshVWkUOENPKCnB1t+ebs/AsNozbIGA/HcdtwUwDgIowv/K0hdnLDC1vz6/S
92
F3rnGQIDAQABo1AwTjAdBgNVHQ4EFgQUgWN9jmJxOEHYU5m8D0atl895HxowHwYD
93
VR0jBBgwFoAUgWN9jmJxOEHYU5m8D0atl895HxowDAYDVR0TBAUwAwEB/zANBgkq
94
hkiG9w0BAQUFAAOCAQEAXvlBHMaBK6m0PQNanTqGBRdRAFt8Xkr5texD5mPTmS/7
95
nqnxlN0orqYWGCaARmQE+T77EB2a2n9g2s130pUXwJxcbUwIOdPKH6CMKEHT/512
96
bndJXQ3DyhkuVSLtRFOdfleIhi8qUkNC9FWxM4jDHDTTQtNEHnCjFxlhxw+ri5QJ
97
AVKpH9MkcuIkM6Jx+QhNwTDwCRIJffoDOH420yR5EWx/sQ4tjKQGiFOPv/WHFjXd
98
LqHU+X8ErzxeNmUHHST6pHePWRCMtoPTdCPhEroJhou6NMHh8ylQOIVHt6gggc7r
99
kUWMUybDUxPp49qMeNkdKqFPby2aW7ouKRoOXuxZhg==
100
					    </ds:X509Certificate>
101
					  </ds:X509Data>
102

  
103
					</ds:KeyInfo>
104
				</md:KeyDescriptor>
105

  
106

  
107

  
108

  
109

  
110

  
111
			<md:NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</md:NameIDFormat>
112

  
113

  
114

  
115
	        <md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://access-check.edugain.org/simplesaml/saml2/idp/SSOService.php"/>
116

  
117

  
118

  
119
		</md:IDPSSODescriptor>
120

  
121

  
122

  
123
		<md:Organization>
124

  
125
			<md:OrganizationName xml:lang="en">eduGAIN Access Check</md:OrganizationName>
126
			<md:OrganizationDisplayName xml:lang="en">eduGAIN Access Check</md:OrganizationDisplayName>
127
			<md:OrganizationURL xml:lang="en">http://www.renater.fr</md:OrganizationURL>
128

  
129
		</md:Organization>
130

  
131

  
132
			    <md:ContactPerson contactType="technical">
133
			     <md:EmailAddress>edugain-integration@geant.net</md:EmailAddress>
134
		        </md:ContactPerson>
135

  
136

  
137
	</md:EntityDescriptor><md:EntityDescriptor entityID="https://aishib.agropolis.fr/idp/shibboleth">
138
			<md:Extensions>
139
				<mdrpi:RegistrationInfo registrationAuthority="https://federation.renater.fr/" registrationInstant="2013-06-06T11:49:20Z">
140
					<mdrpi:RegistrationPolicy xml:lang="en">https://services.renater.fr/federation/en/metadata_registration_practice_statement</mdrpi:RegistrationPolicy>
141
				</mdrpi:RegistrationInfo>
142
			</md:Extensions>
143
		<md:IDPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:1.1:protocol urn:mace:shibboleth:1.0 urn:oasis:names:tc:SAML:2.0:protocol">
144
			<md:Extensions>
145
    				<shibmd:Scope regexp="false">agropolis.fr</shibmd:Scope>
146

  
147
			    <mdui:UIInfo>
148

  
149
			      <mdui:DisplayName xml:lang="en">Agropolis International</mdui:DisplayName>
150

  
151
			      <mdui:Logo height="16" width="16">data:image/png;base64,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</mdui:Logo>
152
			      <mdui:InformationURL xml:lang="fr">http://www.agropolis.fr</mdui:InformationURL>
153

  
154
          		      <mdui:DisplayName xml:lang="fr">Agropolis International</mdui:DisplayName>
155

  
156
      			    </mdui:UIInfo>
157
			</md:Extensions>
158
				<md:KeyDescriptor use="signing">
159
<ds:KeyInfo>
160

  
161
					  <ds:X509Data>
162
					    <ds:X509Certificate>
163
					      MIIDNzCCAh+gAwIBAgIUYY3sGXwChkj2CRy6QFDvkdj2zlAwDQYJKoZIhvcNAQEF
164
BQAwHjEcMBoGA1UEAxMTYWlzaGliLmFncm9wb2xpcy5mcjAeFw0xMzA1MTUxMzM3
165
MTJaFw0zMzA1MTUxMzM3MTJaMB4xHDAaBgNVBAMTE2Fpc2hpYi5hZ3JvcG9saXMu
166
ZnIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCxrDy6lrhIBjcxv16n
167
4UJ2cEMYPO4wSmfDwhO6feoSIEuIblYRHE2nQKirMokwD6seF4rbDHyxLXg/ColL
168
VLv+0CJteIOZjSCgSN90WzQRrC1Ex5sJfPu6yPEXvW8H1906gEg6ok8rlCIHRGfE
169
15pHK5eqxQS5f2n8c2t/Uk33/FBj79/hb3Cd7vE4mdlvReD3AFswC0lV4bPmj3Ka
170
KUuMj9xwipwnfWCu6p2/ZJF4M3ADU5grXHJ2Vqmd8DWm5raaObKjYwJddbRBByI8
171
bJJLIwAQQmX4Dh4hf1QKlf2oqWPWVQxLQp0erL1U8IWmj1RG8TTH9xOJl6kkEhYq
172
Z2gfAgMBAAGjbTBrMEoGA1UdEQRDMEGCE2Fpc2hpYi5hZ3JvcG9saXMuZnKGKmh0
173
dHBzOi8vYWlzaGliLmFncm9wb2xpcy5mci9pZHAvc2hpYmJvbGV0aDAdBgNVHQ4E
174
FgQU9A7iQ8Qo+t2JCpKuOOV9YBoYs4MwDQYJKoZIhvcNAQEFBQADggEBAG0LOW6I
175
F+M8n2NpzyQjfVCJCA6QhWjbXrfemiPJFZGZZb2dVmHof4yCpCUYgHOBoZaXPOlB
176
nLYsUWvFZ6V2GELZpLHzHSSrYidieW07qQkh1DwcIYpvtZgLviOtT/tCEGsk925f
177
DUoGdeIqpqt54WZcW9+TbKicvjg3JT4BFOQ17bFNwPW+YjTbvsWYxen+e0mRp4vM
178
V0yMu2f3bccVhePASSZGL3yod3sJ1dPvlrJO9c35BekhtirolVjZqMQ0AYPVifua
179
yIU0dWXsZkAOcBL9kZFbJcYRUIxMgvp8U2Zdv1+ZlwOyXnnWDOOh9wjuT7FAyObU
180
ChvjHlgZHkvLwJI=
181
					    </ds:X509Certificate>
182
					  </ds:X509Data>
183

  
184
					</ds:KeyInfo>
185
				</md:KeyDescriptor>
186

  
187

  
188

  
189

  
190

  
191
			<md:NameIDFormat>urn:mace:shibboleth:1.0:nameIdentifier</md:NameIDFormat>
192
			<md:NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</md:NameIDFormat>
193

  
194

  
195
			<md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://aishib.agropolis.fr/idp/profile/SAML2/POST/SSO"/>
196

  
197
	        <md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://aishib.agropolis.fr/idp/profile/SAML2/Redirect/SSO"/>
198

  
199

  
200
			<md:SingleSignOnService Binding="urn:mace:shibboleth:1.0:profiles:AuthnRequest" Location="https://aishib.agropolis.fr/idp/profile/Shibboleth/SSO"/>
201

  
202

  
203
		</md:IDPSSODescriptor>
204

  
205

  
206

  
207
		<md:Organization>
208

  
209
			<md:OrganizationName xml:lang="en">Agropolis International</md:OrganizationName>
210
			<md:OrganizationDisplayName xml:lang="en">Agropolis International</md:OrganizationDisplayName>
211
			<md:OrganizationURL xml:lang="en">http://www.agropolis.fr</md:OrganizationURL>
212

  
213
		</md:Organization>
214

  
215

  
216

  
217
			    <md:ContactPerson contactType="technical">
218
				 <md:SurName>Jean Cerda</md:SurName>
219
				 <md:EmailAddress>cerda@agropolis.fr</md:EmailAddress>
220
		        </md:ContactPerson>
221

  
222

  
223

  
224
			    <md:ContactPerson contactType="technical">
225
				 <md:SurName>Jean-Pierre  Allano</md:SurName>
226
				 <md:EmailAddress>allano@agropolis.fr</md:EmailAddress>
227
		        </md:ContactPerson>
228

  
229

  
230

  
231

  
232
	</md:EntityDescriptor><md:EntityDescriptor entityID="https://ambre.vetagro-sup.fr/idp/shibboleth">
233
			<md:Extensions>
234
				<mdrpi:RegistrationInfo registrationAuthority="https://federation.renater.fr/" registrationInstant="2013-01-14T16:11:53Z">
235
					<mdrpi:RegistrationPolicy xml:lang="en">https://services.renater.fr/federation/en/metadata_registration_practice_statement</mdrpi:RegistrationPolicy>
236
				</mdrpi:RegistrationInfo>
237
			</md:Extensions>
238
		<md:IDPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:1.1:protocol urn:mace:shibboleth:1.0 urn:oasis:names:tc:SAML:2.0:protocol">
239
			<md:Extensions>
240
    				<shibmd:Scope regexp="false">vetagro-sup.fr</shibmd:Scope>
241

  
242
			    <mdui:UIInfo>
243

  
244
			      <mdui:DisplayName xml:lang="en">Vetagro Sup</mdui:DisplayName>
245

  
246
			      <mdui:Logo height="16" width="16">data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABAAAAAQCAYAAAAf8/9hAAAABmJLR0QA/wD/AP+gvaeTAAAACXBIWXMAAABIAAAASABGyWs+AAAACXZwQWcAAAAQAAAAEABcxq3DAAAB/klEQVQ4y2NkQAP///+X+/jxI/PO7dujP3/7kf7v778ffDzciw2MDFaqq6t/Y2RkfIysngndAEZGxkezZ8/25xEQqVDTs5eRVrNU4RQUL7x9+7YtumasBjAwMDBISIgbcvBKct998p7h1fvfDKyc4nz//jF6yjAwSBNlwM+fP3/9/PmT4dbl4wysrCwMf//9Z/r7959UcFISD1EGPH107xgfD9sbTg52hrcvHjDw87Aw/Pz+7tLEefNuEmWAm6ffxvu3Ll4zMjZleHz/KsO7lw+f3bh+czs2tVgNsLS0fPfs4b3VnKy//wrycW84e2L/uobmtg0MpIKurt6N////Z8jPzxcnWTMDAwPD79//tbq7+9bhU8OMTfD//8cMP79L1X/8tjxMQYHXT0Uh88aBgyuvEW3Aly+8ntw8jLU3bx20cnH/xPz2jTyvk9OGpTt3NhIOxP//GRgkJGR8tPVeyElIvWA4dfIqg57Bff0nD+eHExULIb5dqkYmYgYm5r8YPH3vMzx//omBk+edpI4+vxVRBnz5zPqbi4vt7a9fv//9+cvAYG79jIGZmZWBg4NJiCgDdh4sfHD/7u9j714Z/BYWiGBQVkxjePNK8+erV5+uYDOABTMM/nP09y9Z8+OHgNjli9ahf//++8vGwrlAS0tp/v///7kYGRm/IasHAIVTy8DG/VpJAAAAJXRFWHRkYXRlOmNyZWF0ZQAyMDE1LTA3LTIwVDEwOjUwOjA5KzAyOjAwfDtz7wAAACV0RVh0ZGF0ZTptb2RpZnkAMjAxNS0wNy0yMFQxMDo1MDowOSswMjowMA1my1MAAAAASUVORK5CYII=</mdui:Logo>
247
			      <mdui:InformationURL xml:lang="fr">http://www.vetagro-sup.fr</mdui:InformationURL>
248

  
249
          		      <mdui:DisplayName xml:lang="fr">Vetagro Sup</mdui:DisplayName>
250

  
251
      			    </mdui:UIInfo>
252
			</md:Extensions>
253
				<md:KeyDescriptor use="signing">
254
<ds:KeyInfo>
255

  
256
					  <ds:X509Data>
257
					    <ds:X509Certificate>
258
					      MIIDPDCCAiSgAwIBAgIVAL9PsuadPSIZcMHNxlK/oevezmzWMA0GCSqGSIb3DQEB
259
BQUAMB8xHTAbBgNVBAMTFGFtYnJlLnZldGFncm8tc3VwLmZyMB4XDTEyMTEwODEw
260
MTQwNFoXDTMyMTEwODEwMTQwNFowHzEdMBsGA1UEAxMUYW1icmUudmV0YWdyby1z
261
dXAuZnIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCc/ptfpmkomwmT
262
4RsID+1Ce1dX0eUjcLgSOZN8hVpHWLag2ERWkpmvB5aK7BAFcI5i//Gk80tAiasu
263
JtlZhBnEw54aTJRGpyL2CVkHyl6SMRxprIi1Ji67IoGqEgUeGaheAxo+tG5e1WSc
264
bIbldcSKdwvjAV+7HSB4C6NqLsAzJH25++yaRH2uf2LTD0TDzNR9Q2hVj/VyYWR+
265
K3HWI1Snjn/i7aFfZZhYmBkwHuQOaPhwCM+khikg5XicMsxUhHCMi93UgHGIsdkr
266
IEGj4xydBTUKsLaykeuFS8EgXbWwCLGkeX76w8xDoFIpnppU/yFd9v7Zg3EBfn4p
267
kTW3GdIjAgMBAAGjbzBtMEwGA1UdEQRFMEOCFGFtYnJlLnZldGFncm8tc3VwLmZy
268
hitodHRwczovL2FtYnJlLnZldGFncm8tc3VwLmZyL2lkcC9zaGliYm9sZXRoMB0G
269
A1UdDgQWBBTPTqWkVHrHXFjmxMWkNt/sp2h5ozANBgkqhkiG9w0BAQUFAAOCAQEA
270
FvXMtfBUmRZCzz8CjanGzr1TBUPmnkrKci5AtkseKw9YlfUmBXTHB01y697nYq6m
271
RB6KhvfW212h9CF0IOEEjoadgDhXqGYhq8PnAOtT4Ty3XDy8SbRh8aQWfvnfSngv
272
FdpHRiSpj5UXXuT5zTtkf59h58XKtEfCkMbUzvdOgUobJzpD0WISmQHPQnx+Neg6
273
9j7oMRrDiZjS39Om8Imu9xvsnddDM3PlsDBIsvrr1o7K5iLkEdR1YYX0ZNDbiFuw
274
QXXl2dwQPB8KrScPUvCe57slU2gFQvvIBzjQysxC6V6TPSuM3A/ee56lACuB3jKj
275
oYkHQc5Gj/1rSMLmu9aLMg==
276
					    </ds:X509Certificate>
277
					  </ds:X509Data>
278

  
279
					</ds:KeyInfo>
280
				</md:KeyDescriptor>
281

  
282

  
283

  
284

  
285

  
286
			<md:NameIDFormat>urn:mace:shibboleth:1.0:nameIdentifier</md:NameIDFormat>
287
			<md:NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</md:NameIDFormat>
288

  
289

  
290
			<md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://ambre.vetagro-sup.fr/idp/profile/SAML2/POST/SSO"/>
291

  
292
	        <md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://ambre.vetagro-sup.fr/idp/profile/SAML2/Redirect/SSO"/>
293

  
294

  
295
			<md:SingleSignOnService Binding="urn:mace:shibboleth:1.0:profiles:AuthnRequest" Location="https://ambre.vetagro-sup.fr/idp/profile/Shibboleth/SSO"/>
296

  
297

  
298
		</md:IDPSSODescriptor>
299

  
300

  
301

  
302
		<md:Organization>
303

  
304
			<md:OrganizationName xml:lang="en">Vetagro Sup</md:OrganizationName>
305
			<md:OrganizationDisplayName xml:lang="en">Vetagro Sup</md:OrganizationDisplayName>
306
			<md:OrganizationURL xml:lang="en">http://www.vetagro-sup.fr</md:OrganizationURL>
307

  
308
		</md:Organization>
309

  
310

  
311

  
312
			    <md:ContactPerson contactType="technical">
313
				 <md:SurName>Nicolas Aulas</md:SurName>
314
				 <md:EmailAddress>nicolas.aulas@vetagro-sup.fr</md:EmailAddress>
315
		        </md:ContactPerson>
316

  
317

  
318

  
319

  
320

  
321

  
322
	</md:EntityDescriptor><md:EntityDescriptor entityID="https://antimoine.insa-strasbourg.fr/idp/shibboleth">
323
			<md:Extensions>
324
				<mdrpi:RegistrationInfo registrationAuthority="https://federation.renater.fr/" registrationInstant="2014-02-11T08:44:08Z">
325
					<mdrpi:RegistrationPolicy xml:lang="en">https://services.renater.fr/federation/en/metadata_registration_practice_statement</mdrpi:RegistrationPolicy>
326
				</mdrpi:RegistrationInfo>
327
			</md:Extensions>
328
		<md:IDPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:1.1:protocol urn:mace:shibboleth:1.0 urn:oasis:names:tc:SAML:2.0:protocol">
329
			<md:Extensions>
330
    				<shibmd:Scope regexp="false">insa-strasbourg.fr</shibmd:Scope>
331

  
332
			    <mdui:UIInfo>
333

  
334
			      <mdui:DisplayName xml:lang="en">INSA Strasbourg</mdui:DisplayName>
335

  
336
			      <mdui:Logo height="16" width="16">data:image/png;base64,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</mdui:Logo>
337
			      <mdui:InformationURL xml:lang="fr">http://www.insa-strasbourg.fr</mdui:InformationURL>
338

  
339
          		      <mdui:DisplayName xml:lang="fr">INSA Strasbourg</mdui:DisplayName>
340

  
341
      			    </mdui:UIInfo>
342
			</md:Extensions>
343
				<md:KeyDescriptor use="signing">
344
<ds:KeyInfo>
345

  
346
					  <ds:X509Data>
347
					    <ds:X509Certificate>
348
					      MIIDUDCCAjigAwIBAgIVAIbX8U0uAqAhuXm1jWxiFpggtDTDMA0GCSqGSIb3DQEB
349
CwUAMCQxIjAgBgNVBAMMGXNvdWZyZS5pbnNhLXN0cmFzYm91cmcuZnIwHhcNMTYw
350
OTI3MTIzNjIxWhcNMzYwOTI3MTIzNjIxWjAkMSIwIAYDVQQDDBlzb3VmcmUuaW5z
351
YS1zdHJhc2JvdXJnLmZyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
352
sEE02sLRPAG5N81DMHEeGpI2MYF8yG/RiwH07cFIlLqgV80ewOmi0FWPYijxMb8A
353
bmx0RwUMvJBVI6WMxtT9fykhID20k8rWOuYOzvaynzVqCktqVgKoEAxP1PFE9b0n
354
iGKFprjjNl9ZD90GOUsxbAO7yXG9Q4WBa/eThl6XkUvNkSaZp5hcdWrgcAdsae3q
355
iD/uxFa38NXNNeRLGyfxjd2K5qYSzbwBza9s9TOq1+pfw7sxu3/4BnfQ0RLGO6co
356
4tH4Mufh0ome4cyYk4pvW5DOd1AznxDb8HpqvE0zwEsa69c/FDX0akgFZydmc77a
357
j6USn6JKjjbO49yGtG1gVQIDAQABo3kwdzAdBgNVHQ4EFgQUjzMsxZYiokPYxper
358
9zadM8J0F0kwVgYDVR0RBE8wTYIZc291ZnJlLmluc2Etc3RyYXNib3VyZy5mcoYw
359
aHR0cHM6Ly9zb3VmcmUuaW5zYS1zdHJhc2JvdXJnLmZyL2lkcC9zaGliYm9sZXRo
360
MA0GCSqGSIb3DQEBCwUAA4IBAQBFJKsiS3yfWuDB/E+iqQ0TuQJzL5+JIcloN0dw
361
BFxW3VZOju15zeQ7LwRBg9S4SGLMPJU+LM1lvr68cK9brut/FjF51SETIXEeCWo3
362
7+PIqgOCzraLNinmpU/OtN8ENalOPvpS6Jvbd23qB2t+IqOtZ+j15b0Yq4/on1E3
363
W2F9CVzKpe4EwmmtCPQbe7U1wvhgFylEx797pex8veWs79YSYwqvcKMh79dzl8Fo
364
/CgsO5pDrfKmc6SGMkByq75dZj+PqhZDzZ9EFTxbrXOTaS08VRN6a5Rh2iYRnGxq
365
yZl66tPcaIm5PHgOEmu5X4lPkUoY+Jt36Gj3SGCbYt8qH5S0
366
					    </ds:X509Certificate>
367
					  </ds:X509Data>
368

  
369
					</ds:KeyInfo>
370
				</md:KeyDescriptor>
371

  
372

  
373

  
374
				<md:KeyDescriptor use="signing">
375
				       <ds:KeyInfo>
376
					  <ds:X509Data>
377
					    <ds:X509Certificate>
378
					      MIIDXDCCAkSgAwIBAgIVAKI+qiqDCk9wTTqn7OVAoZrvj/CpMA0GCSqGSIb3DQEB
379
BQUAMCcxJTAjBgNVBAMTHGFudGltb2luZS5pbnNhLXN0cmFzYm91cmcuZnIwHhcN
380
MTQwMTEzMTAzOTU4WhcNMzQwMTEzMTAzOTU4WjAnMSUwIwYDVQQDExxhbnRpbW9p
381
bmUuaW5zYS1zdHJhc2JvdXJnLmZyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
382
CgKCAQEAtuM8lRjlVjjmrHq9VtguaOMQL+Wd99BiOs56kL3Mbctg1FwH69LYThCW
383
6dOz6WJg/jU/naF7jEikXKc71xGyu7Ph7Iqa9S5hoXXAT8u/0q2nZDeTOraJqKe1
384
FMF2RzXhEEMyQO3CiKNK9b+tbKoNZS7FQCixMZklWZPt4EcEKd6jyRq1WYX3dpnb
385
r9I/aCdhtK/PGvGe5gKTDoTR2HKyWKJTc/obf8x/vlYIEwiaGgdlqI2KiBE0x48n
386
zQdP6XVi3T8ZWbnkLmCfgJtP2C8PtEJuwDRAy0Z9N4DSwvxn5YCVYgBLSi0TLa10
387
B/lUqqBezZrTrA9p9Lt8JtGXW5YGHwIDAQABo38wfTBcBgNVHREEVTBTghxhbnRp
388
bW9pbmUuaW5zYS1zdHJhc2JvdXJnLmZyhjNodHRwczovL2FudGltb2luZS5pbnNh
389
LXN0cmFzYm91cmcuZnIvaWRwL3NoaWJib2xldGgwHQYDVR0OBBYEFLFkjPZUc9JY
390
qrWjldJ/iGGkKAt4MA0GCSqGSIb3DQEBBQUAA4IBAQBSk/wU1mRn4VF2ifmy261K
391
DK7uX+t1H1hh8S38fKSFU7HoNXJTV3vQnmBOpYIGC1gtvmb+qjqpNtikU2zO84Gq
392
Q0bXHxYF2d9RUP89mKaFxE5uNcXFmlOA3ChZY3pMT5zwAPI/T60tGrex7zci7OLn
393
JDAQj/q4Yk9ejx6JTFggQSCCVh+oV/SDIMd2p5AY6H3mto3b6XCk7Lssa8a/D30k
394
pEkZnhTKdN82eRyynuOR7UDU4tasV4d7Mi/j53f5ihnRcsvwh/pYodjoVYY8cEcZ
395
JLnAXYF8coSwh8UN4D/0NHsvTuSOFQc85hGrqacMsvxiQiw9mv01AX5+A5YLEbVQ
396
					    </ds:X509Certificate>
397
					  </ds:X509Data>
398
					</ds:KeyInfo>
399
				</md:KeyDescriptor>
400

  
401

  
402

  
403
			   <md:SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://antimoine.insa-strasbourg.fr/idp/profile/SAML2/Redirect/SLO"/>
404

  
405
			   <md:SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://antimoine.insa-strasbourg.fr/idp/profile/SAML2/POST/SLO"/>
406

  
407
			   <md:SingleLogoutService Binding="urn:oasis:names:tc:SAML:2.0:bindings:SOAP" Location="https://antimoine.insa-strasbourg.fr/idp/profile/SAML2/SOAP/SLO"/>
408

  
409

  
410
			<md:NameIDFormat>urn:mace:shibboleth:1.0:nameIdentifier</md:NameIDFormat>
411
			<md:NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</md:NameIDFormat>
412

  
413

  
414
			<md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://antimoine.insa-strasbourg.fr/idp/profile/SAML2/POST/SSO"/>
415

  
416
	        <md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect" Location="https://antimoine.insa-strasbourg.fr/idp/profile/SAML2/Redirect/SSO"/>
417

  
418

  
419
			<md:SingleSignOnService Binding="urn:mace:shibboleth:1.0:profiles:AuthnRequest" Location="https://antimoine.insa-strasbourg.fr/idp/profile/Shibboleth/SSO"/>
420

  
421

  
422
		</md:IDPSSODescriptor>
423

  
424

  
425

  
426
		<md:Organization>
427

  
428
			<md:OrganizationName xml:lang="en">INSA Strasbourg</md:OrganizationName>
429
			<md:OrganizationDisplayName xml:lang="en">INSA Strasbourg</md:OrganizationDisplayName>
430
			<md:OrganizationURL xml:lang="en">http://www.insa-strasbourg.fr</md:OrganizationURL>
431

  
432
		</md:Organization>
433

  
434

  
435

  
436
			    <md:ContactPerson contactType="technical">
437
				 <md:SurName>Lahsen BOUZID</md:SurName>
438
				 <md:EmailAddress>lahsen.bouzid@insa-strasbourg.fr</md:EmailAddress>
439
		        </md:ContactPerson>
440

  
441

  
442

  
443
			    <md:ContactPerson contactType="technical">
444
				 <md:SurName>Simon SCHERRER</md:SurName>
445
				 <md:EmailAddress>simon.scherrer@insa-strasbourg.fr</md:EmailAddress>
446
		        </md:ContactPerson>
447

  
448

  
449

  
450

  
451
        </md:EntityDescriptor>
452
    
453
<md:EntityDescriptor entityID="http://idp5/metadata">
454
<md:IDPSSODescriptor
455
    WantAuthnRequestsSigned="true"
456
    protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
457
<md:KeyDescriptor use="signing">
458
    <ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
459
      <ds:X509Data><ds:X509Certificate>
460
MIIDnjCCAoagAwIBAgIBATANBgkqhkiG9w0BAQUFADBUMQswCQYDVQQGEwJGUjEP
461
MA0GA1UECBMGRnJhbmNlMQ4wDAYDVQQHEwVQYXJpczETMBEGA1UEChMKRW50cm91
462
dmVydDEPMA0GA1UEAxMGRGFtaWVuMB4XDTA2MTAyNzA5MDc1NFoXDTExMTAyNjA5
463
MDc1NFowVDELMAkGA1UEBhMCRlIxDzANBgNVBAgTBkZyYW5jZTEOMAwGA1UEBxMF
464
UGFyaXMxEzARBgNVBAoTCkVudHJvdXZlcnQxDzANBgNVBAMTBkRhbWllbjCCASIw
465
DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM06Hx6VgHYR9wUf/tZVVTRkVWNq
466
h9x+PvHA2qH4OYMuqGs4Af6lU2YsZvnrmRdcFWv0+UkdAgXhReCWAZgtB1pd/W9m
467
6qDRldCCyysow6xPPKRz/pOTwRXm/fM0QGPeXzwzj34BXOIOuFu+n764vKn18d+u
468
uVAEzk1576pxTp4pQPzJfdNLrLeQ8vyCshoFU+MYJtp1UA+h2JoO0Y8oGvywbUxH
469
ioHN5PvnzObfAM4XaDQohmfxM9Uc7Wp4xKAc1nUq5hwBrHpjFMRSz6UCfMoJSGIi
470
+3xJMkNCjL0XEw5NKVc5jRKkzSkN5j8KTM/k1jPPsDHPRYzbWWhnNtd6JlkCAwEA
471
AaN7MHkwCQYDVR0TBAIwADAsBglghkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0
472
ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFP2WWMDShux3iF74+SoO1xf6qhqaMB8G
473
A1UdIwQYMBaAFGjl6TRXbQDHzSlZu+e8VeBaZMB5MA0GCSqGSIb3DQEBBQUAA4IB
474
AQAZ/imK7UMognXbs5RfSB8cMW6iNAI+JZqe9XWjvtmLfIIPbHM96o953SiFvrvQ
475
BZjGmmPMK3UH29cjzDx1R/RQaYTyMrHyTePLh3BMd5mpJ/9eeJCSxPzE2ECqWRUa
476
pkjukecFXqmRItwgTxSIUE9QkpzvuQRb268PwmgroE0mwtiREADnvTFkLkdiEMew
477
fiYxZfJJLPBqwlkw/7f1SyzXoPXnz5QbNwDmrHelga6rKSprYKb3pueqaIe8j/AP
478
NC1/bzp8cGOcJ88BD5+Ny6qgPVCrMLE5twQumJ12V3SvjGNtzFBvg2c/9S5OmVqR
479
LlTxKnCrWAXftSm1rNtewTsF
480
</ds:X509Certificate></ds:X509Data>
481
    </ds:KeyInfo>
482
  </md:KeyDescriptor>
483
<md:KeyDescriptor use="encryption">
484
    <ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
485
      <ds:KeyValue>
486
MIIDnjCCAoagAwIBAgIBATANBgkqhkiG9w0BAQUFADBUMQswCQYDVQQGEwJGUjEP
487
MA0GA1UECBMGRnJhbmNlMQ4wDAYDVQQHEwVQYXJpczETMBEGA1UEChMKRW50cm91
488
dmVydDEPMA0GA1UEAxMGRGFtaWVuMB4XDTA2MTAyNzA5MDc1NFoXDTExMTAyNjA5
489
MDc1NFowVDELMAkGA1UEBhMCRlIxDzANBgNVBAgTBkZyYW5jZTEOMAwGA1UEBxMF
490
UGFyaXMxEzARBgNVBAoTCkVudHJvdXZlcnQxDzANBgNVBAMTBkRhbWllbjCCASIw
491
DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM06Hx6VgHYR9wUf/tZVVTRkVWNq
492
h9x+PvHA2qH4OYMuqGs4Af6lU2YsZvnrmRdcFWv0+UkdAgXhReCWAZgtB1pd/W9m
493
6qDRldCCyysow6xPPKRz/pOTwRXm/fM0QGPeXzwzj34BXOIOuFu+n764vKn18d+u
494
uVAEzk1576pxTp4pQPzJfdNLrLeQ8vyCshoFU+MYJtp1UA+h2JoO0Y8oGvywbUxH
495
ioHN5PvnzObfAM4XaDQohmfxM9Uc7Wp4xKAc1nUq5hwBrHpjFMRSz6UCfMoJSGIi
496
+3xJMkNCjL0XEw5NKVc5jRKkzSkN5j8KTM/k1jPPsDHPRYzbWWhnNtd6JlkCAwEA
497
AaN7MHkwCQYDVR0TBAIwADAsBglghkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0
498
ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFP2WWMDShux3iF74+SoO1xf6qhqaMB8G
499
A1UdIwQYMBaAFGjl6TRXbQDHzSlZu+e8VeBaZMB5MA0GCSqGSIb3DQEBBQUAA4IB
500
AQAZ/imK7UMognXbs5RfSB8cMW6iNAI+JZqe9XWjvtmLfIIPbHM96o953SiFvrvQ
501
BZjGmmPMK3UH29cjzDx1R/RQaYTyMrHyTePLh3BMd5mpJ/9eeJCSxPzE2ECqWRUa
502
pkjukecFXqmRItwgTxSIUE9QkpzvuQRb268PwmgroE0mwtiREADnvTFkLkdiEMew
503
fiYxZfJJLPBqwlkw/7f1SyzXoPXnz5QbNwDmrHelga6rKSprYKb3pueqaIe8j/AP
504
NC1/bzp8cGOcJ88BD5+Ny6qgPVCrMLE5twQumJ12V3SvjGNtzFBvg2c/9S5OmVqR
505
LlTxKnCrWAXftSm1rNtewTsF
506
</ds:KeyValue>
507
    </ds:KeyInfo>
508
  </md:KeyDescriptor>
509

  
510
  <md:ArtifactResolutionService isDefault="true" index="0"
511
    Binding="urn:oasis:names:tc:SAML:2.0:bindings:SOAP"
512
    Location="http://idp5/artifact" />
513
  <md:SingleLogoutService
514
    Binding="urn:oasis:names:tc:SAML:2.0:bindings:SOAP"
515
    Location="http://idp5/singleLogoutSOAP" />
516
  <md:SingleLogoutService
517
    Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect"
518
    Location="http://idp5/singleLogout"
519
    ResponseLocation="http://idp5/singleLogoutReturn" />
520
  <md:ManageNameIDService
521
    Binding="urn:oasis:names:tc:SAML:2.0:bindings:SOAP"
522
    Location="http://idp5/manageNameIdSOAP" />
523
  <md:ManageNameIDService
524
    Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect"
525
    Location="http://idp5/manageNameId"
526
    ResponseLocation="http://idp5/manageNameIdReturn" />
527
  <md:SingleSignOnService
528
    Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect"
529
    Location="http://idp5/singleSignOn" />
530
  <md:SingleSignOnService
531
    Binding="urn:oasis:names:tc:SAML:2.0:bindings:SOAP"
532
    Location="http://idp5/singleSignOnSOAP" />
533
</md:IDPSSODescriptor>
534
<md:AuthnAuthorityDescriptor
535
    protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
536
	<md:AuthnQueryService Binding="urn:oasis:names:tc:SAML:2.0:bindings:SOAP" Location="http://idp6/authnQueryService"/>
537
	<md:AssertionIDRequestService Binding="urn:oasis:names:tc:SAML:2.0:bindings:URI" Location="http://idp6/authnAuthAssertionIDRequestService"/>
538
	<md:NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</md:NameIDFormat>
539
</md:AuthnAuthorityDescriptor>
540
<md:PDPDescriptor
541
    protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
542
	<md:AuthzService Binding="urn:oasis:names:tc:SAML:2.0:bindings:SOAP" Location="http://idp6/authzService"/>
543
	<md:AssertionIDRequestService Binding="urn:oasis:names:tc:SAML:2.0:bindings:URI" Location="http://idp6/PDPAuthAssertionIDRequestService"/>
544
	<md:NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:kerberos</md:NameIDFormat>
545
</md:PDPDescriptor>
546
<md:AttributeAuthorityDescriptor
547
    protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol">
548
	<md:AttributeService Binding="urn:oasis:names:tc:SAML:2.0:bindings:SOAP" Location="http://idp6/attributeService"/>
549
	<md:AssertionIDRequestService Binding="urn:oasis:names:tc:SAML:2.0:bindings:URI" Location="http://idp6/AttributeAuthAssertionIDRequestService"/>
550
	<md:NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName</md:NameIDFormat>
551
</md:AttributeAuthorityDescriptor>
552
<md:Organization>
553
   <md:OrganizationName xml:lang="en">Entr'ouvert</md:OrganizationName>
554
</md:Organization>
555

  
556
</md:EntityDescriptor>
557
    </md:EntitiesDescriptor>
tests/test_federations_utils.py
1
import os
2
import time
3

  
4
from django.core.files.storage import default_storage
5
from django.utils.text import slugify
6
from httmock import HTTMock
7

  
8
from mellon.federation_utils import get_federation_from_url, truncate_unique
9
from utils import sample_federation_response
10

  
11

  
12
def test_mock_fedmd_caching():
13
    url = u'https://dummy.mdserver/metadata.xml'
14
    filepath = default_storage.path(os.path.join('metadata-cache/', truncate_unique(slugify(url))))
15

  
16
    with HTTMock(sample_federation_response):
17
        tmp = get_federation_from_url(url)
18

  
19
    assert default_storage.path(tmp) == filepath
20

  
21
    st = os.stat(filepath)
22

  
23
    assert os.path.isfile(filepath)
24
    assert st.st_mtime < time.time() + 3600
25

  
26
    with HTTMock(sample_federation_response):
27
        get_federation_from_url(url)
28
    stnew = os.stat(filepath)
29

  
30
    assert stnew.st_ctime == st.st_ctime
31
    assert stnew.st_mtime == st.st_mtime
32

  
33
    storig = os.stat(os.path.join('tests', 'federation-sample.xml'))
34

  
35
    assert storig.st_size == st.st_size
tests/test_sso_slo.py
4 4

  
5 5
from django.core.urlresolvers import reverse
6 6

  
7
from mellon.utils import create_metadata
7
from mellon.utils import create_metadata, create_server
8
from django.utils.http import urlencode
8 9

  
9 10
from httmock import all_requests, HTTMock, response as mock_response
10 11

  
......
16 17
    return open('tests/metadata.xml').read()
17 18

  
18 19

  
20
@fixture
21
def federation_metadata():
22
    return './tests/federation-sample.xml'
23

  
24

  
19 25
@fixture
20 26
def idp_private_key():
21 27
    return open('tests/idp-private-key.pem').read()
......
43 49
    return private_settings
44 50

  
45 51

  
52
@fixture
53
def federated_sp_settings(private_settings, federation_metadata, sp_private_key, public_key):
54
    private_settings.MELLON_FEDERATIONS = [{
55
        'FEDERATION': federation_metadata,
56
    }]
57
    private_settings.MELLON_PUBLIC_KEYS = [public_key]
58
    private_settings.MELLON_PRIVATE_KEYS = [sp_private_key]
59
    private_settings.MELLON_NAME_ID_POLICY_FORMAT = lasso.SAML2_NAME_IDENTIFIER_FORMAT_PERSISTENT
60
    private_settings.LOGIN_REDIRECT_URL = '/'
61
    return private_settings
62

  
63

  
46 64
@fixture
47 65
def sp_metadata(sp_settings, rf):
48 66
    request = rf.get('/')
49 67
    return create_metadata(request)
50 68

  
51 69

  
70
@fixture
71
def federated_sp_metadata(federated_sp_settings, rf):
72
    request = rf.get('/')
73
    return create_metadata(request)
74

  
75

  
52 76
class MockIdp(object):
53 77
    def __init__(self, idp_metadata, private_key, sp_metadata):
54 78
        self.server = server = lasso.Server.newFromBuffers(idp_metadata, private_key)
......
103 127
    return MockIdp(idp_metadata, idp_private_key, sp_metadata)
104 128

  
105 129

  
130
@fixture
131
def federated_idp(federated_sp_settings, idp_metadata, idp_private_key, federated_sp_metadata):
132
    return MockIdp(idp_metadata, idp_private_key, federated_sp_metadata)
133

  
134

  
106 135
def test_sso_slo(db, app, idp, caplog, sp_settings):
107 136
    response = app.get(reverse('mellon_login'))
108 137
    url, body = idp.process_authn_request_redirect(response['Location'])
......
171 200
    assert 'created new user' in caplog.text
172 201
    assert 'logged in using SAML' in caplog.text
173 202
    assert response['Location'].endswith(sp_settings.LOGIN_REDIRECT_URL)
203

  
204

  
205
def test_login_federation(db, app, federated_idp, caplog, federated_sp_settings):
206
    qs = urlencode({
207
        'entityID': 'http://idp5/metadata',
208
    })
209
    response = app.get('/login/?' + qs)
210
    url, body = federated_idp.process_authn_request_redirect(response['Location'])
211
    assert url.endswith(reverse('mellon_login'))
212
    response = app.post(reverse('mellon_login'), params={'SAMLResponse': body})
213
    assert 'created new user' in caplog.text
214
    assert 'logged in using SAML' in caplog.text
215
    assert response['Location'].endswith(federated_sp_settings.LOGIN_REDIRECT_URL)
216

  
217

  
218
def test_sso_artifact_federation(db, app, caplog, federated_sp_settings, idp_metadata, idp_private_key, rf):
219
    qs = urlencode({
220
        'entityID': 'http://idp5/metadata',
221
    })
222
    federated_sp_settings.MELLON_DEFAULT_ASSERTION_CONSUMER_BINDING = 'artifact'
223
    request = rf.get('/')
224
    federated_sp_metadata = create_metadata(request)
225
    idp = MockIdp(idp_metadata, idp_private_key, federated_sp_metadata)
226
    response = app.get('/login/?' + qs)
227
    url, body = idp.process_authn_request_redirect(response['Location'])
228
    assert body is None
229
    assert reverse('mellon_login') in url
230
    assert 'SAMLart' in url
231
    acs_artifact_url = url.split('testserver', 1)[1]
232
    with HTTMock(idp.mock_artifact_resolver()):
233
        response = app.get(acs_artifact_url)
234
    assert 'created new user' in caplog.text
235
    assert 'logged in using SAML' in caplog.text
236
    assert response['Location'].endswith(federated_sp_settings.LOGIN_REDIRECT_URL)
237
    # force delog
238
    app.session.flush()
239
    assert 'dead artifact' not in caplog.text
240
    with HTTMock(idp.mock_artifact_resolver()):
241
        response = app.get(acs_artifact_url)
242
    # verify retry login was asked
243
    assert 'dead artifact' in caplog.text
244
    assert response.status_code == 302
245
    assert reverse('mellon_login') in url
246
    response = response.follow()
247
    url, body = idp.process_authn_request_redirect(response['Location'])
248
    reset_caplog(caplog)
249
    # verify caplog has been cleaned
250
    assert 'created new user' not in caplog.text
251
    assert body is None
252
    assert reverse('mellon_login') in url
253
    assert 'SAMLart' in url
254
    acs_artifact_url = url.split('testserver', 1)[1]
255
    with HTTMock(idp.mock_artifact_resolver()):
256
        response = app.get(acs_artifact_url)
257
    assert 'created new user' in caplog.text
258
    assert 'logged in using SAML' in caplog.text
259
    assert response['Location'].endswith(federated_sp_settings.LOGIN_REDIRECT_URL)
tests/test_utils.py
1
import os
1 2
import re
2 3
import datetime
4
import logging
3 5

  
4 6
import mock
5 7
import lasso
6 8
import requests.exceptions
7 9
from httmock import HTTMock
8 10

  
9
from mellon.utils import create_server, create_metadata, iso8601_to_datetime, flatten_datetime
11
from mellon.utils import create_server, create_metadata, iso8601_to_datetime, \
12
        flatten_datetime, get_idp, recreate_server
10 13
import mellon.utils
11 14
from xml_utils import assert_xml_constraints
12 15

  
13
from utils import error_500, metadata_response
16
from utils import error_500, metadata_response, sample_federation_response, \
17
        html_response, dummy_md_response
14 18

  
15 19

  
16
def test_create_server_connection_error(mocker, rf, private_settings, caplog):
20
def test_create_server_connection_error_lazy(mocker, rf, private_settings, caplog):
17 21
    mocker.patch('requests.get',
18 22
                 side_effect=requests.exceptions.ConnectionError('connection error'))
19 23
    private_settings.MELLON_IDENTITY_PROVIDERS = [
......
23 27
    ]
24 28
    request = rf.get('/')
25 29
    create_server(request)
26
    assert 'connection error' in caplog.text
30
    assert 'failed with error' not in caplog.text
31
    recreate_server(request, 'whatever')
32
    assert 'failed with error' in caplog.text
27 33

  
28 34

  
29
def test_create_server_internal_server_error(mocker, rf, private_settings, caplog):
35
def test_create_server_internal_server_error_lazy(mocker, rf, private_settings, caplog):
30 36
    private_settings.MELLON_IDENTITY_PROVIDERS = [
31 37
        {
32 38
            'METADATA_URL': 'http://example.com/metadata',
33 39
        }
34 40
    ]
35 41
    request = rf.get('/')
36
    assert not 'failed with error' in caplog.text
42
    assert 'failed with error' not in caplog.text
37 43
    with HTTMock(error_500):
38 44
        create_server(request)
45
    assert 'failed with error' not in caplog.text
46
    with HTTMock(error_500):
47
        recreate_server(request, 'whatever')
39 48
    assert 'failed with error' in caplog.text
40 49

  
41 50

  
42
def test_create_server_invalid_metadata(mocker, rf, private_settings, caplog):
51
def test_load_federation_file_lazy(mocker, rf, private_settings, caplog, tmpdir):
52
    private_settings.MELLON_FEDERATIONS = [
53
            {'FEDERATION': 'tests/federation-sample.xml'},
54
    ]
55
    request = rf.get('/')
56
    assert 'failed with error' not in caplog.text
57
    with HTTMock(html_response):
58
        server = create_server(request)
59
    assert len(server.providers) == 0
60
    with HTTMock(html_response):
61
        server = recreate_server(request, "https://aishib.agropolis.fr/idp/shibboleth")
62
    assert len(server.providers) == 1
63

  
64

  
65
def test_load_federation_url_lazy(mocker, rf, private_settings, caplog, tmpdir):
66
    private_settings.MELLON_FEDERATIONS = [
67
            {'FEDERATION': 'https://dummy.server/metadata.xml'},
68
    ]
69
    request = rf.get('/')
70
    assert 'failed with error' not in caplog.text
71
    with HTTMock(dummy_md_response):
72
        server = create_server(request)
73
    assert len(server.providers) == 0
74
    with HTTMock(dummy_md_response):
75
        server = recreate_server(request, "https://ambre.vetagro-sup.fr/idp/shibboleth")
76
    assert len(server.providers) == 1
77

  
78

  
79
def test_federation_parameters_lazy(mocker, rf, private_settings, caplog, tmpdir):
80
    private_settings.MELLON_FEDERATIONS = [{
81
            'FEDERATION': 'tests/federation-sample.xml',
82
            'VERIFY_SSL_CERTIFICATE': False,
83
            'ERROR_REDIRECT_AFTER_TIMEOUT': 150,
84
            'PROVISION': True
85
    }]
86
    request = rf.get('/')
87
    assert 'failed with error' not in caplog.text
88
    with HTTMock(html_response):
89
        server = create_server(request)
90
    assert len(server.providers) == 0
91
    with HTTMock(dummy_md_response):
92
        server = recreate_server(request, "https://ambre.vetagro-sup.fr/idp/shibboleth")
93
    assert len(server.providers) == 1
94
    for entity_id in server.providers.keys():
95
        idp = get_idp(entity_id)
96
        assert idp
97
        assert idp['VERIFY_SSL_CERTIFICATE'] is False
98
        assert idp['ERROR_REDIRECT_AFTER_TIMEOUT'] == 150
99
        assert idp['PROVISION'] is True
100

  
101

  
102
def test_create_server_invalid_metadata_lazy(mocker, rf, private_settings, caplog):
103
    caplog.set_level(logging.DEBUG)
43 104
    private_settings.MELLON_IDENTITY_PROVIDERS = [
44 105
        {
45 106
            'METADATA': 'xxx',
......
49 110
    assert not 'failed with error' in caplog.text
50 111
    with HTTMock(error_500):
51 112
        create_server(request)
52
    assert len(caplog.records) == 1
53
    assert re.search('METADATA.*is invalid', caplog.text)
113
    assert len(caplog.records) == 0
114
    assert not re.search('METADATA.*is invalid|bad metadata in idp', caplog.text)
115

  
116
    # Server recreated for one single provider:
117
    with HTTMock(error_500):
118
        recreate_server(request, "whatever")
119
    assert len(caplog.records) == 4
120
    assert re.search('METADATA.*is invalid|bad metadata in idp', caplog.text)
54 121

  
55 122

  
56
def test_create_server_invalid_metadata_file(mocker, rf, private_settings, caplog):
123
def test_create_server_invalid_metadata_file_lazy(mocker, rf, private_settings, caplog):
57 124
    private_settings.MELLON_IDENTITY_PROVIDERS = [
58 125
        {
59 126
            'METADATA': '/xxx',
......
67 134
    assert len(server.providers) == 0
68 135

  
69 136

  
70
def test_create_server_good_metadata_file(mocker, rf, private_settings, caplog):
137
def test_create_server_good_metadata_file_lazy(mocker, rf, private_settings, caplog):
71 138
    private_settings.MELLON_IDENTITY_PROVIDERS = [
72 139
        {
73
            'METADATA': '/xxx',
140
            'METADATA': './tests/metadata.xml',
74 141
        }
75 142
    ]
76 143
    request = rf.get('/')
77
    with mock.patch(
78
        'mellon.adapters.file', mock.mock_open(read_data=file('tests/metadata.xml').read()),
79
            create=True):
144
    with HTTMock(html_response):
80 145
        server = create_server(request)
81 146
    assert 'ERROR' not in caplog.text
147
    assert len(server.providers) == 0
148
    with HTTMock(html_response):
149
        server = recreate_server(request, "http://idp5/metadata")
82 150
    assert len(server.providers) == 1
83 151

  
84 152

  
85
def test_create_server_good_metadata(mocker, rf, private_settings, caplog):
153
def test_create_server_good_metadata_lazy(mocker, rf, private_settings, caplog):
86 154
    private_settings.MELLON_IDENTITY_PROVIDERS = [
87 155
        {
88 156
            'METADATA': file('tests/metadata.xml').read(),
......
92 160
    assert not 'failed with error' in caplog.text
93 161
    server = create_server(request)
94 162
    assert 'ERROR' not in caplog.text
163
    assert len(server.providers) == 0
164
    server = recreate_server(request, "http://idp5/metadata")
95 165
    assert len(server.providers) == 1
96 166

  
97 167

  
98
def test_create_server_invalid_idp_dict(mocker, rf, private_settings, caplog):
168
def test_create_server_invalid_idp_dict_lazy(mocker, rf, private_settings, caplog):
99 169
    private_settings.MELLON_IDENTITY_PROVIDERS = [
100 170
        {
101 171
        }
......
103 173
    request = rf.get('/')
104 174
    assert not 'failed with error' in caplog.text
105 175
    create_server(request)
176
    assert 'missing METADATA' not in caplog.text
177
    recreate_server(request, "whatever")
106 178
    assert 'missing METADATA' in caplog.text
107 179

  
108 180

  
109
def test_create_server_good_metadata_url(mocker, rf, private_settings, caplog):
181
def test_create_server_good_metadata_url_lazy(mocker, rf, private_settings, caplog):
110 182
    private_settings.MELLON_IDENTITY_PROVIDERS = [
111 183
        {
112 184
            'METADATA_URL': 'http://example.com/metadata',
......
118 190
    with HTTMock(metadata_response):
119 191
        server = create_server(request)
120 192
    assert 'ERROR' not in caplog.text
193
    assert len(server.providers) == 0
194

  
195
    with HTTMock(dummy_md_response):
196
        server = recreate_server(request, "http://idp5/metadata")
121 197
    assert len(server.providers) == 1
122 198

  
123 199

  
tests/utils.py
16 16
    return response(200, content=file('tests/metadata.xml').read())
17 17

  
18 18

  
19
@all_requests
20
def dummy_md_response(url, request):
21
    return response(200, content=file('tests/dummy_md.xml').read())
22

  
23

  
24
@all_requests
25
def sample_federation_response(url, request):
26
    return response(200, content=file('tests/federation-sample.xml').read())
27

  
28

  
19 29
def reset_caplog(cap):
20 30
    cap.handler.stream.truncate(0)
21 31
    cap.handler.records = []
22
-