diff --git a/.prettierignore b/.prettierignore index 01c96ead..f1565a00 100644 --- a/.prettierignore +++ b/.prettierignore @@ -2,3 +2,5 @@ node_modules lib package-lock.json +.eslintcache +.prettierignore diff --git a/README.md b/README.md index 92dfdc0d..70d9cfa9 100644 --- a/README.md +++ b/README.md @@ -30,7 +30,8 @@ passport.use(new SamlStrategy( { path: '/login/callback', entryPoint: 'https://openidp.feide.no/simplesaml/saml2/idp/SSOService.php', - issuer: 'passport-saml' + issuer: 'passport-saml', + cert: 'fake cert', // cert must be provided }, function(profile, done) { findByEmail(profile.email, function(err, user) { @@ -53,7 +54,7 @@ const { MultiSamlStrategy } = require('passport-saml'); passport.use(new MultiSamlStrategy( { - passReqToCallback: true, //makes req available in callback + passReqToCallback: true, // makes req available in callback getSamlOptions: function(request, done) { findProvider(request, function(err, provider) { if (err) { @@ -124,18 +125,18 @@ type Profile = { - **Additional SAML behaviors** - `additionalParams`: dictionary of additional query params to add to all requests; if an object with this key is passed to `authenticate`, the dictionary of additional query params will be appended to those present on the returned URL, overriding any specified by initialization options' additional parameters (`additionalParams`, `additionalAuthorizeParams`, and `additionalLogoutParams`) - `additionalAuthorizeParams`: dictionary of additional query params to add to 'authorize' requests -- `identifierFormat`: if truthy, name identifier format to request from identity provider (default: `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress`) +- `identifierFormat`: optional name identifier format to request from identity provider (default: `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress`) - `acceptedClockSkewMs`: Time in milliseconds of skew that is acceptable between client and server when checking `OnBefore` and `NotOnOrAfter` assertion condition validity timestamps. Setting to `-1` will disable checking these conditions entirely. Default is `0`. - `attributeConsumingServiceIndex`: optional `AttributeConsumingServiceIndex` attribute to add to AuthnRequest to instruct the IDP which attribute set to attach to the response ([link](http://blog.aniljohn.com/2014/01/data-minimization-front-channel-saml-attribute-requests.html)) - `disableRequestedAuthnContext`: if truthy, do not request a specific authentication context. This is [known to help when authenticating against Active Directory](https://github.com/node-saml/passport-saml/issues/226) (AD FS) servers. - `authnContext`: if truthy, name identifier format to request auth context (default: `urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport`); array of values is also supported -- `RACComparison`: Requested Authentication Context comparison type. Possible values are 'exact','minimum','maximum','better'. Default is 'exact'. +- `racComparison`: Requested Authentication Context comparison type. Possible values are 'exact','minimum','maximum','better'. Default is 'exact'. - `forceAuthn`: if set to true, the initial SAML request from the service provider specifies that the IdP should force re-authentication of the user, even if they possess a valid session. - `providerName`: optional human-readable name of the requester for use by the presenter's user agent or the identity provider - `skipRequestCompression`: if set to true, the SAML request from the service provider won't be compressed. - `authnRequestBinding`: if set to `HTTP-POST`, will request authentication from IDP via HTTP POST binding, otherwise defaults to HTTP Redirect -- `disableRequestACSUrl`: if truthy, SAML AuthnRequest from the service provider will not include the optional AssertionConsumerServiceURL. Default is falsy so it is automatically included. +- `disableRequestAcsUrl`: if truthy, SAML AuthnRequest from the service provider will not include the optional AssertionConsumerServiceURL. Default is falsy so it is automatically included. - `scoping`: An optional configuration which implements the functionality [explained in the SAML spec paragraph "3.4.1.2 Element "](https://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf). The config object is structured as following: ```javascript diff --git a/docs/adfs/README.md b/docs/adfs/README.md index f125e887..2fc0dbdb 100644 --- a/docs/adfs/README.md +++ b/docs/adfs/README.md @@ -55,7 +55,7 @@ passport.use( identifierFormat: null, // this is configured under the Advanced tab in AD FS relying party signatureAlgorithm: "sha256", - RACComparison: "exact", // default to exact RequestedAuthnContext Comparison Type + racComparison: "exact", // default to exact RequestedAuthnContext Comparison Type }, function (profile, done) { return done(null, { diff --git a/package.json b/package.json index 3f57b57c..0cab1ad4 100644 --- a/package.json +++ b/package.json @@ -45,6 +45,7 @@ "prettier-format": "prettier --config .prettierrc.json --write .", "prettier-watch": "onchange -k -p 100 \".\" -- prettier --config .prettierrc.json --write {{file}}", "test": "npm run prettier-check && npm run lint && npm run tsc && mocha", + "test-watch": "mocha --watch", "tsc": "tsc", "tsc-watch": "tsc --watch", "watch": "concurrently --kill-others \"npm:*-watch\"" diff --git a/src/passport-saml/inmemory-cache-provider.ts b/src/passport-saml/inmemory-cache-provider.ts index d9724cd8..d568283c 100644 --- a/src/passport-saml/inmemory-cache-provider.ts +++ b/src/passport-saml/inmemory-cache-provider.ts @@ -29,15 +29,10 @@ export class CacheProvider { constructor(options: Partial) { this.cacheKeys = {}; - if (!options) { - options = {}; - } - - if (!options.keyExpirationPeriodMs) { - options.keyExpirationPeriodMs = 28800000; // 8 hours - } - - this.options = options as CacheProviderOptions; + this.options = { + ...options, + keyExpirationPeriodMs: options?.keyExpirationPeriodMs ?? 28800000, // 8 hours, + }; // Expire old cache keys const expirationTimer = setInterval(() => { diff --git a/src/passport-saml/multiSamlStrategy.ts b/src/passport-saml/multiSamlStrategy.ts index a4151368..ef07ab6f 100644 --- a/src/passport-saml/multiSamlStrategy.ts +++ b/src/passport-saml/multiSamlStrategy.ts @@ -8,35 +8,35 @@ import { AuthorizeOptions, MultiSamlConfig, RequestWithUser, + SamlConfig, VerifyWithoutRequest, VerifyWithRequest, } from "./types"; class MultiSamlStrategy extends SamlStrategy { - _options: MultiSamlConfig; + static readonly newSamlProviderOnConstruct = false; + + _options: SamlConfig & MultiSamlConfig; constructor(options: MultiSamlConfig, verify: VerifyWithRequest); constructor(options: MultiSamlConfig, verify: VerifyWithoutRequest); constructor(options: MultiSamlConfig, verify: never) { - if (!options || typeof options.getSamlOptions != "function") { + if (!options || typeof options.getSamlOptions !== "function") { throw new Error("Please provide a getSamlOptions function"); } - if (!options.requestIdExpirationPeriodMs) { - options.requestIdExpirationPeriodMs = 28800000; // 8 hours - } - - if (!options.cacheProvider) { - options.cacheProvider = new InMemoryCacheProvider({ - keyExpirationPeriodMs: options.requestIdExpirationPeriodMs, - }); - } + // Force the type on this since we've disabled `newOnConstruct` + // so the `SAML` constructor will not be called at this time + // and there are defaults for all `strategy`-required options. + const samlConfig = { + ...options, + } as SamlConfig & MultiSamlConfig; - super(options, verify); - this._options = options; + super(samlConfig, verify); + this._options = samlConfig; } - authenticate(req: RequestWithUser, options: AuthenticateOptions) { + authenticate(req: RequestWithUser, options: AuthenticateOptions): void { this._options.getSamlOptions(req, (err, samlOptions) => { if (err) { return this.error(err); @@ -90,6 +90,11 @@ class MultiSamlStrategy extends SamlStrategy { ); }); } + + // This is reduntant, but helps with testing + error(err: Error): void { + super.error(err); + } } export = MultiSamlStrategy; diff --git a/src/passport-saml/saml-post-signing.ts b/src/passport-saml/saml-post-signing.ts index 53ac67bf..ba4641fe 100644 --- a/src/passport-saml/saml-post-signing.ts +++ b/src/passport-saml/saml-post-signing.ts @@ -1,6 +1,6 @@ import { SignedXml } from "xml-crypto"; import * as algorithms from "./algorithms"; -import { SamlOptions, SamlSigningOptions } from "./types"; +import { SamlSigningOptions } from "./types"; const authnRequestXPath = '/*[local-name(.)="AuthnRequest" and namespace-uri(.)="urn:oasis:names:tc:SAML:2.0:protocol"]'; @@ -11,7 +11,11 @@ const defaultTransforms = [ "http://www.w3.org/2001/10/xml-exc-c14n#", ]; -export function signSamlPost(samlMessage: string, xpath: string, options: SamlSigningOptions) { +export function signSamlPost( + samlMessage: string, + xpath: string, + options: SamlSigningOptions +): string { if (!samlMessage) throw new Error("samlMessage is required"); if (!xpath) throw new Error("xpath is required"); if (!options) { diff --git a/src/passport-saml/saml.ts b/src/passport-saml/saml.ts index e2b91ec2..579aa7c3 100644 --- a/src/passport-saml/saml.ts +++ b/src/passport-saml/saml.ts @@ -27,13 +27,13 @@ import { SamlOptions, SamlIDPListConfig, SamlIDPEntryConfig, - SamlScopingConfig, ServiceMetadataXML, XMLInput, XMLObject, XMLOutput, - XMLValue, + SamlConfig, } from "./types"; +import { assertRequired } from "./utility"; const inflateRawAsync = util.promisify(zlib.inflateRaw); const deflateRawAsync = util.promisify(zlib.deflateRaw); @@ -62,7 +62,7 @@ async function processValidlySignedPostRequestAsync( } else { throw new Error("Missing SAML issuer"); } - const nameID = await self.getNameIDAsync(self, dom); + const nameID = await self.getNameIdAsync(self, dom); if (nameID) { profile.nameID = nameID.value!; if (nameID.format) { @@ -108,81 +108,62 @@ async function promiseWithNameID(nameid: Node): Promise { class SAML { options: SamlOptions; - cacheProvider: InMemoryCacheProvider; + // This is only for testing + cacheProvider!: InMemoryCacheProvider; - constructor(options: Partial) { - this.options = this.initialize(options); + constructor(ctorOptions: SamlConfig) { + this.options = this.initialize(ctorOptions); this.cacheProvider = this.options.cacheProvider; } - initialize(options: Partial): SamlOptions { - if (!options) { - options = {}; + + initialize(ctorOptions: SamlConfig): SamlOptions { + if (!ctorOptions) { + throw new TypeError("SamlOptions required on construction"); } - if (options.privateCert) { + if (ctorOptions.privateCert) { console.warn("options.privateCert has been deprecated; use options.privateKey instead."); - if (!options.privateKey) { - options.privateKey = options.privateCert; + if (!ctorOptions.privateKey) { + ctorOptions.privateKey = ctorOptions.privateCert; } } - if (Object.prototype.hasOwnProperty.call(options, "cert") && !options.cert) { - throw new Error("Invalid property: cert must not be empty"); - } - - if (!options.path) { - options.path = "/saml/consume"; - } - - if (!options.host) { - options.host = "localhost"; - } - - if (!options.issuer) { - options.issuer = "onelogin_saml"; - } - - if (options.identifierFormat === undefined) { - options.identifierFormat = "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress"; - } - - if (options.authnContext === undefined) { - options.authnContext = "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport"; - } - - if (!Array.isArray(options.authnContext)) { - options.authnContext = [options.authnContext]; - } - - if (!options.acceptedClockSkewMs) { - // default to no skew - options.acceptedClockSkewMs = 0; - } - - if (!options.validateInResponseTo) { - options.validateInResponseTo = false; - } - - if (!options.requestIdExpirationPeriodMs) { - options.requestIdExpirationPeriodMs = 28800000; // 8 hours - } - - if (!options.cacheProvider) { - options.cacheProvider = new InMemoryCacheProvider({ - keyExpirationPeriodMs: options.requestIdExpirationPeriodMs, - }); - } - - if (!options.logoutUrl) { - // Default to Entry Point - options.logoutUrl = options.entryPoint || ""; - } - - // sha1, sha256, or sha512 - if (!options.signatureAlgorithm) { - options.signatureAlgorithm = "sha1"; - } + const options = { + ...ctorOptions, + passive: ctorOptions.passive ?? false, + disableRequestedAuthnContext: ctorOptions.disableRequestedAuthnContext ?? false, + additionalParams: ctorOptions.additionalParams ?? {}, + additionalAuthorizeParams: ctorOptions.additionalAuthorizeParams ?? {}, + additionalLogoutParams: ctorOptions.additionalLogoutParams ?? {}, + forceAuthn: ctorOptions.forceAuthn ?? false, + skipRequestCompression: ctorOptions.skipRequestCompression ?? false, + disableRequestAcsUrl: ctorOptions.disableRequestAcsUrl ?? false, + acceptedClockSkewMs: ctorOptions.acceptedClockSkewMs ?? 0, + path: ctorOptions.path ?? "/saml/consume", + host: ctorOptions.host ?? "localhost", + issuer: ctorOptions.issuer ?? "onelogin_saml", + identifierFormat: + ctorOptions.identifierFormat === undefined + ? "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress" + : ctorOptions.identifierFormat, + authnContext: ctorOptions.authnContext ?? [ + "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", + ], + validateInResponseTo: ctorOptions.validateInResponseTo ?? false, + cert: assertRequired(ctorOptions.cert, "cert is required"), + requestIdExpirationPeriodMs: ctorOptions.requestIdExpirationPeriodMs ?? 28800000, // 8 hours + cacheProvider: + ctorOptions.cacheProvider ?? + new InMemoryCacheProvider({ + keyExpirationPeriodMs: ctorOptions.requestIdExpirationPeriodMs, + }), + logoutUrl: ctorOptions.logoutUrl ?? ctorOptions.entryPoint ?? "", // Default to Entry Point + signatureAlgorithm: ctorOptions.signatureAlgorithm ?? "sha1", // sha1, sha256, or sha512 + authnRequestBinding: ctorOptions.authnRequestBinding ?? "HTTP-Redirect", + + racComparison: ctorOptions.racComparison ?? "exact", + }; /** * List of possible values: @@ -191,16 +172,11 @@ class SAML { * - maximum: Assertion context must be no stronger than a context in the list * - better: Assertion context must be stronger than all contexts in the list */ - if ( - !options.RACComparison || - ["exact", "minimum", "maximum", "better"].indexOf(options.RACComparison) === -1 - ) { - options.RACComparison = "exact"; + if (!["exact", "minimum", "maximum", "better"].includes(options.racComparison)) { + throw new TypeError("racComparison must be one of ['exact', 'minimum', 'maximum', 'better']"); } - options.authnRequestBinding = options.authnRequestBinding || "HTTP-Redirect"; - - return options as SamlOptions; + return options; } getProtocol(req: Request | { headers?: undefined; protocol?: undefined }) { @@ -230,7 +206,9 @@ class SAML { return new Date().toISOString(); } - signRequest(samlMessage: querystring.ParsedUrlQueryInput) { + signRequest(samlMessage: querystring.ParsedUrlQueryInput): void { + this.options.privateKey = assertRequired(this.options.privateKey, "privateKey is required"); + const samlMessageToSign: querystring.ParsedUrlQueryInput = {}; samlMessage.SigAlg = algorithms.getSigningAlgorithm(this.options.signatureAlgorithm); const signer = algorithms.getSigner(this.options.signatureAlgorithm); @@ -255,9 +233,10 @@ class SAML { isPassive: boolean, isHttpPostBinding: boolean ): Promise { + this.options.entryPoint = assertRequired(this.options.entryPoint, "entryPoint is required"); + const id = "_" + this.generateUniqueID(); const instant = this.generateInstant(); - const forceAuthn = this.options.forceAuthn || false; if (this.options.validateInResponseTo) { await this.cacheProvider.saveAsync(id, instant); @@ -279,15 +258,15 @@ class SAML { if (isPassive) request["samlp:AuthnRequest"]["@IsPassive"] = true; - if (forceAuthn) { + if (this.options.forceAuthn) { request["samlp:AuthnRequest"]["@ForceAuthn"] = true; } - if (!this.options.disableRequestACSUrl) { + if (!this.options.disableRequestAcsUrl) { request["samlp:AuthnRequest"]["@AssertionConsumerServiceURL"] = this.getCallbackUrl(req); } - if (this.options.identifierFormat) { + if (this.options.identifierFormat != null) { request["samlp:AuthnRequest"]["samlp:NameIDPolicy"] = { "@xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", "@Format": this.options.identifierFormat, @@ -306,7 +285,7 @@ class SAML { request["samlp:AuthnRequest"]["samlp:RequestedAuthnContext"] = { "@xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - "@Comparison": this.options.RACComparison, + "@Comparison": this.options.racComparison, "saml:AuthnContextClassRef": authnContextClassRefs, }; } @@ -317,11 +296,11 @@ class SAML { ] = this.options.attributeConsumingServiceIndex; } - if (this.options.providerName) { + if (this.options.providerName != null) { request["samlp:AuthnRequest"]["@ProviderName"] = this.options.providerName; } - if (this.options.scoping) { + if (this.options.scoping != null) { const scoping: XMLInput = { "@xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", }; @@ -376,7 +355,7 @@ class SAML { } let stringRequest = xmlbuilder.create((request as unknown) as Record).end(); - if (isHttpPostBinding && this.options.privateKey) { + if (isHttpPostBinding && this.options.privateKey != null) { stringRequest = signAuthnRequestPost(stringRequest, this.options); } return stringRequest; @@ -457,6 +436,8 @@ class SAML { operation: string, additionalParameters: querystring.ParsedUrlQuery ): Promise { + this.options.entryPoint = assertRequired(this.options.entryPoint, "entryPoint is required"); + let buffer: Buffer; if (this.options.skipRequestCompression) { buffer = Buffer.from((request || response)!, "utf8"); @@ -485,7 +466,7 @@ class SAML { Object.keys(additionalParameters).forEach((k) => { samlMessage[k] = additionalParameters[k]; }); - if (this.options.privateKey) { + if (this.options.privateKey != null) { if (!this.options.entryPoint) { throw new Error('"entryPoint" config parameter is required for signed messages'); } @@ -508,7 +489,7 @@ class SAML { req: Request, operation: string, overrideParams?: querystring.ParsedUrlQuery - ) { + ): querystring.ParsedUrlQuery { const additionalParams: querystring.ParsedUrlQuery = {}; const RelayState = (req.query && req.query.RelayState) || (req.body && req.body.RelayState); @@ -516,24 +497,24 @@ class SAML { additionalParams.RelayState = RelayState; } - const optionsAdditionalParams = this.options.additionalParams || {}; + const optionsAdditionalParams = this.options.additionalParams; Object.keys(optionsAdditionalParams).forEach(function (k) { additionalParams[k] = optionsAdditionalParams[k]; }); let optionsAdditionalParamsForThisOperation: Record = {}; if (operation == "authorize") { - optionsAdditionalParamsForThisOperation = this.options.additionalAuthorizeParams || {}; + optionsAdditionalParamsForThisOperation = this.options.additionalAuthorizeParams; } if (operation == "logout") { - optionsAdditionalParamsForThisOperation = this.options.additionalLogoutParams || {}; + optionsAdditionalParamsForThisOperation = this.options.additionalLogoutParams; } Object.keys(optionsAdditionalParamsForThisOperation).forEach(function (k) { additionalParams[k] = optionsAdditionalParamsForThisOperation[k]; }); - overrideParams = overrideParams || {}; + overrideParams = overrideParams ?? {}; Object.keys(overrideParams).forEach(function (k) { additionalParams[k] = overrideParams![k]; }); @@ -553,7 +534,9 @@ class SAML { ); } - async getAuthorizeFormAsync(req: Request) { + async getAuthorizeFormAsync(req: Request): Promise { + this.options.entryPoint = assertRequired(this.options.entryPoint, "entryPoint is required"); + // The quoteattr() function is used in a context, where the result will not be evaluated by javascript // but must be interpreted by an XML or HTML parser, and it must absolutely avoid breaking the syntax // of an element attribute. @@ -645,13 +628,13 @@ class SAML { req: RequestWithUser, options: AuthenticateOptions & AuthorizeOptions, callback: (err: Error | null, url?: string | null) => void - ) { + ): void { util.callbackify(() => this.getLogoutResponseUrlAsync(req, options))(callback); } async getLogoutResponseUrlAsync( req: RequestWithUser, options: AuthenticateOptions & AuthorizeOptions - ) { + ): Promise { const response = this.generateLogoutResponse(req, req.samlLogoutRequest); const operation = "logout"; const overrideParams = options ? options.additionalParams || {} : {}; @@ -672,25 +655,30 @@ class SAML { return cert; } - async certsToCheck(): Promise { - if (!this.options.cert) { - return undefined; - } + async certsToCheck(): Promise { + let checkedCerts: string[]; + if (typeof this.options.cert === "function") { - return util + checkedCerts = await util .promisify(this.options.cert as CertCallback)() .then((certs) => { + certs = assertRequired(certs, "callback didn't return cert"); if (!Array.isArray(certs)) { - certs = [certs as string]; + certs = [certs]; } - return certs as string[]; + return certs; }); + } else if (Array.isArray(this.options.cert)) { + checkedCerts = this.options.cert; + } else { + checkedCerts = [this.options.cert]; } - let certs = this.options.cert; - if (!Array.isArray(certs)) { - certs = [certs]; - } - return certs; + + checkedCerts.forEach((cert) => { + assertRequired(cert, "unknown cert found"); + }); + + return checkedCerts; } // This function checks that the |currentNode| in the |fullXml| document contains exactly 1 valid @@ -698,7 +686,7 @@ class SAML { // // See https://github.com/bergie/passport-saml/issues/19 for references to some of the attack // vectors against SAML signature verification. - validateSignature(fullXml: string, currentNode: HTMLElement, certs: string[]) { + validateSignature(fullXml: string, currentNode: HTMLElement, certs: string[]): boolean { const xpathSigQuery = ".//*[" + "local-name(.)='Signature' and " + @@ -710,7 +698,7 @@ class SAML { const signatures = xmlCrypto.xpath(currentNode, xpathSigQuery); // This function is expecting to validate exactly one signature, so if we find more or fewer // than that, reject. - if (signatures.length != 1) { + if (signatures.length !== 1) { return false; } @@ -726,12 +714,12 @@ class SAML { cert: string, fullXml: string, currentNode: HTMLElement - ) { + ): boolean { const sig = new xmlCrypto.SignedXml(); sig.keyInfoProvider = { file: "", - getKeyInfo: (key) => "", - getKey: (keyInfo) => Buffer.from(this.certToPEM(cert)), + getKeyInfo: () => "", + getKey: () => Buffer.from(this.certToPEM(cert)), }; signature = this.normalizeNewlines(signature.toString()); sig.loadSignature(signature); @@ -781,7 +769,7 @@ class SAML { const certs = await this.certsToCheck(); // Check if this document has a valid top-level signature let validSignature = false; - if (this.options.cert && this.validateSignature(xml, doc.documentElement, certs!)) { + if (this.validateSignature(xml, doc.documentElement, certs)) { validSignature = true; } @@ -801,14 +789,10 @@ class SAML { } if (assertions.length == 1) { - if ( - this.options.cert && - !validSignature && - !this.validateSignature(xml, assertions[0], certs!) - ) { + if (!validSignature && !this.validateSignature(xml, assertions[0], certs)) { throw new Error("Invalid signature"); } - return this.processValidlySignedAssertionAsync( + return await this.processValidlySignedAssertionAsync( assertions[0].toString(), xml, inResponseTo! @@ -816,8 +800,10 @@ class SAML { } if (encryptedAssertions.length == 1) { - if (!this.options.decryptionPvk) - throw new Error("No decryption key for encrypted SAML response"); + this.options.decryptionPvk = assertRequired( + this.options.decryptionPvk, + "No decryption key for encrypted SAML response" + ); const encryptedAssertionXml = encryptedAssertions[0].toString(); @@ -834,11 +820,11 @@ class SAML { if (decryptedAssertions.length != 1) throw new Error("Invalid EncryptedAssertion content"); if ( - this.options.cert && !validSignature && - !this.validateSignature(decryptedXml, decryptedAssertions[0], certs!) - ) + !this.validateSignature(decryptedXml, decryptedAssertions[0], certs) + ) { throw new Error("Invalid signature from encrypted assertion"); + } return await this.processValidlySignedAssertionAsync( decryptedAssertions[0].toString(), @@ -873,7 +859,7 @@ class SAML { nestedStatusCode && nestedStatusCode[0].$.Value === "urn:oasis:names:tc:SAML:2.0:status:NoPassive" ) { - if (this.options.cert && !validSignature) { + if (!validSignature) { throw new Error("Invalid signature: NoPassive"); } return { profile: null, loggedOut: false }; @@ -906,7 +892,7 @@ class SAML { } throw new Error("Missing SAML assertion"); } else { - if (this.options.cert && !validSignature) { + if (!validSignature) { throw new Error("Invalid signature: No response found"); } const logoutResponse = xmljsDoc.LogoutResponse; @@ -918,14 +904,14 @@ class SAML { } } catch (err) { debug("validatePostResponse resulted in an error: %s", err); - if (this.options.validateInResponseTo) { + if (this.options.validateInResponseTo != null) { await this.cacheProvider.removeAsync(inResponseTo!); } throw err; } } - async validateInResponseTo(inResponseTo: string | null) { + async validateInResponseTo(inResponseTo: string | null): Promise { if (this.options.validateInResponseTo) { if (inResponseTo) { const result = await this.cacheProvider.getAsync(inResponseTo); @@ -975,7 +961,7 @@ class SAML { return exists[0]; }; - if (container.Signature && this.options.cert) { + if (container.Signature) { let urlString = getParam("SAMLRequest") || getParam("SAMLResponse"); if (getParam("RelayState")) { @@ -985,7 +971,7 @@ class SAML { urlString += "&" + getParam("SigAlg"); const certs = await this.certsToCheck(); - const hasValidQuerySignature = certs!.some((cert) => { + const hasValidQuerySignature = certs.some((cert) => { return this.validateSignatureForRedirect( urlString, container.Signature as string, @@ -994,7 +980,7 @@ class SAML { ); }); if (!hasValidQuerySignature) { - throw new Error("Invalid signature"); + throw new Error("Invalid query signature"); } } else { return true; @@ -1057,7 +1043,7 @@ class SAML { } verifyIssuer(samlMessage: XMLOutput) { - if (this.options.idpIssuer) { + if (this.options.idpIssuer != null) { const issuer = samlMessage.Issuer; if (issuer) { if (issuer[0]._ !== this.options.idpIssuer) @@ -1193,7 +1179,7 @@ class SAML { if (conErr) throw conErr; } - if (this.options.audience) { + if (this.options.audience != null) { const audienceErr = this.checkAudienceValidityError( this.options.audience, conditions.AudienceRestriction @@ -1305,13 +1291,13 @@ class SAML { const parser = new xml2js.Parser(parserConfig); const doc = await parser.parseStringPromise(xml); const certs = await this.certsToCheck(); - if (this.options.cert && !this.validateSignature(xml, dom.documentElement, certs!)) { + if (!this.validateSignature(xml, dom.documentElement, certs)) { throw new Error("Invalid signature on documentElement"); } return await processValidlySignedPostRequestAsync(this, doc, dom); } - async getNameIDAsync(self: SAML, doc: Node): Promise { + async getNameIdAsync(self: SAML, doc: Node): Promise { const nameIds = xmlCrypto.xpath( doc, "/*[local-name()='LogoutRequest']/*[local-name()='NameID']" @@ -1328,9 +1314,10 @@ class SAML { return promiseWithNameID(nameIds[0]); } if (encryptedIds.length === 1) { - if (!self.options.decryptionPvk) { - throw new Error("No decryption key for encrypted SAML response"); - } + self.options.decryptionPvk = assertRequired( + self.options.decryptionPvk, + "No decryption key found getting name ID for encrypted SAML response" + ); const encryptedDatas = xmlCrypto.xpath(encryptedIds[0], "./*[local-name()='EncryptedData']"); @@ -1367,14 +1354,14 @@ class SAML { }, }; - if (this.options.decryptionPvk) { + if (this.options.decryptionPvk != null) { if (!decryptionCert) { throw new Error( "Missing decryptionCert while generating metadata for decrypting service provider" ); } } - if (this.options.privateKey) { + if (this.options.privateKey != null) { if (!signingCert) { throw new Error( "Missing signingCert while generating metadata for signing service provider messages" @@ -1382,9 +1369,9 @@ class SAML { } } - if (this.options.decryptionPvk || this.options.privateKey) { + if (this.options.decryptionPvk != null || this.options.privateKey != null) { metadata.EntityDescriptor.SPSSODescriptor.KeyDescriptor = []; - if (this.options.privateKey) { + if (this.options.privateKey != null) { signingCert = signingCert!.replace(/-+BEGIN CERTIFICATE-+\r?\n?/, ""); signingCert = signingCert.replace(/-+END CERTIFICATE-+\r?\n?/, ""); signingCert = signingCert.replace(/\r\n/g, "\n"); @@ -1401,7 +1388,7 @@ class SAML { }); } - if (this.options.decryptionPvk) { + if (this.options.decryptionPvk != null) { decryptionCert = decryptionCert!.replace(/-+BEGIN CERTIFICATE-+\r?\n?/, ""); decryptionCert = decryptionCert.replace(/-+END CERTIFICATE-+\r?\n?/, ""); decryptionCert = decryptionCert.replace(/\r\n/g, "\n"); @@ -1425,14 +1412,14 @@ class SAML { } } - if (this.options.logoutCallbackUrl) { + if (this.options.logoutCallbackUrl != null) { metadata.EntityDescriptor.SPSSODescriptor.SingleLogoutService = { "@Binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", "@Location": this.options.logoutCallbackUrl, }; } - if (this.options.identifierFormat) { + if (this.options.identifierFormat != null) { metadata.EntityDescriptor.SPSSODescriptor.NameIDFormat = this.options.identifierFormat; } @@ -1447,19 +1434,25 @@ class SAML { .end({ pretty: true, indent: " ", newline: "\n" }); } - keyToPEM(key: crypto.KeyLike) { - if (!key || typeof key !== "string") return key; + keyToPEM(key: string | Buffer): typeof key extends string | Buffer ? string | Buffer : Error { + key = assertRequired(key, "key is required"); - const lines = key.split(/\r?\n/); - if (lines.length !== 1) return key; + if (typeof key !== "string") return key; + if (key.split(/\r?\n/).length !== 1) return key; + + const matchedKey = key.match(/.{1,64}/g); + + if (matchedKey) { + const wrappedKey = [ + "-----BEGIN PRIVATE KEY-----", + ...matchedKey, + "-----END PRIVATE KEY-----", + "", + ].join("\n"); + return wrappedKey; + } - const wrappedKey = [ - "-----BEGIN PRIVATE KEY-----", - ...(key.match(/.{1,64}/g) ?? []), - "-----END PRIVATE KEY-----", - "", - ].join("\n"); - return wrappedKey; + throw new Error("Invalid key"); } normalizeNewlines(xml: string): string { diff --git a/src/passport-saml/strategy.ts b/src/passport-saml/strategy.ts index 8f4fc487..8feac264 100644 --- a/src/passport-saml/strategy.ts +++ b/src/passport-saml/strategy.ts @@ -6,24 +6,26 @@ import { AuthorizeOptions, RequestWithUser, SamlConfig, + StrategyOptions, VerifyWithoutRequest, VerifyWithRequest, } from "./types"; import { Profile } from "./types"; class Strategy extends PassportStrategy { + static readonly newSamlProviderOnConstruct = true; + name: string; _verify: VerifyWithRequest | VerifyWithoutRequest; - _saml: saml.SAML; + _saml: saml.SAML | undefined; _passReqToCallback?: boolean; constructor(options: SamlConfig, verify: VerifyWithRequest); constructor(options: SamlConfig, verify: VerifyWithoutRequest); constructor(options: SamlConfig, verify: never) { super(); - if (typeof options == "function") { - verify = options; - options = {}; + if (typeof options === "function") { + throw new Error("Mandatory SAML options missing"); } if (!verify) { @@ -39,11 +41,17 @@ class Strategy extends PassportStrategy { } this._verify = verify; - this._saml = new saml.SAML(options); + if ((this.constructor as typeof Strategy).newSamlProviderOnConstruct) { + this._saml = new saml.SAML(options); + } this._passReqToCallback = !!options.passReqToCallback; } authenticate(req: RequestWithUser, options: AuthenticateOptions): void { + if (this._saml == null) { + throw new Error("Can't get authenticate without a SAML provider defined."); + } + options.samlFallback = options.samlFallback || "login-request"; const validateCallback = ({ profile, @@ -55,6 +63,10 @@ class Strategy extends PassportStrategy { if (loggedOut) { req.logout(); if (profile) { + if (this._saml == null) { + throw new Error("Can't get logout response URL without a SAML provider defined."); + } + req.samlLogoutRequest = profile; return this._saml.getLogoutResponseUrl(req, options, redirectIfSuccess); } @@ -112,6 +124,10 @@ class Strategy extends PassportStrategy { const requestHandler = { "login-request": async () => { try { + if (this._saml == null) { + throw new Error("Can't process login request without a SAML provider defined."); + } + if (this._saml.options.authnRequestBinding === "HTTP-POST") { const data = await this._saml.getAuthorizeFormAsync(req); const res = req.res!; @@ -125,6 +141,10 @@ class Strategy extends PassportStrategy { } }, "logout-request": async () => { + if (this._saml == null) { + throw new Error("Can't process logout request without a SAML provider defined."); + } + try { this.redirect(await this._saml.getLogoutUrlAsync(req, options)); } catch (err) { @@ -142,6 +162,10 @@ class Strategy extends PassportStrategy { } logout(req: RequestWithUser, callback: (err: Error | null, url?: string | null) => void): void { + if (this._saml == null) { + throw new Error("Can't logout without a SAML provider defined."); + } + this._saml .getLogoutUrlAsync(req, {}) .then((url) => callback(null, url)) @@ -152,8 +176,17 @@ class Strategy extends PassportStrategy { decryptionCert: string | null, signingCert?: string | null ): string { + if (this._saml == null) { + throw new Error("Can't generate service provider metadata without a SAML provider defined."); + } + return this._saml.generateServiceProviderMetadata(decryptionCert, signingCert); } + + // This is reduntant, but helps with testing + error(err: Error): void { + super.error(err); + } } export = Strategy; diff --git a/src/passport-saml/types.ts b/src/passport-saml/types.ts index 5cba6b79..eacd63a1 100644 --- a/src/passport-saml/types.ts +++ b/src/passport-saml/types.ts @@ -5,7 +5,7 @@ import type { CacheProvider } from "./inmemory-cache-provider"; export type CertCallback = ( callback: (err: Error | null, cert?: string | string[]) => void ) => void; -export type RACComparision = "exact" | "minimum" | "maximum" | "better"; +export type RacComparision = "exact" | "minimum" | "maximum" | "better"; export type SignatureAlgorithm = "sha1" | "sha256" | "sha512"; export interface AuthenticateOptions extends passport.AuthenticateOptions { @@ -20,40 +20,50 @@ export interface AuthorizeOptions extends AuthenticateOptions { export interface SamlSigningOptions { /** @deprecated use privateKey field instead */ privateCert?: string | Buffer; - privateKey: string | Buffer; + privateKey?: string | Buffer; signatureAlgorithm?: SignatureAlgorithm; xmlSignatureTransforms?: string[]; digestAlgorithm?: string; } -export interface SamlOptions extends SamlSigningOptions { +/** + * These are SAML options that must be provided to construct a new SAML Strategy + */ +export interface MandatorySamlOptions { + cert: string | string[] | CertCallback; +} + +/** + * The options required to use a SAML strategy + * These may be provided by means of defaults specified in the constructor + */ +export interface SamlOptions extends SamlSigningOptions, MandatorySamlOptions { // Core - callbackUrl: string; + callbackUrl?: string; path: string; - protocol: string; + protocol?: string; host: string; - entryPoint: string; + entryPoint?: string; issuer: string; - cert: string | string[] | CertCallback; - decryptionPvk: string | Buffer; + decryptionPvk?: string | Buffer; // Additional SAML behaviors additionalParams: Record; additionalAuthorizeParams: Record; - identifierFormat: string | null; + identifierFormat?: string | null; acceptedClockSkewMs: number; - attributeConsumingServiceIndex: string | null; + attributeConsumingServiceIndex?: string; disableRequestedAuthnContext: boolean; - authnContext: string | string[]; + authnContext: string[]; forceAuthn: boolean; skipRequestCompression: boolean; authnRequestBinding?: string; - RACComparison: RACComparision; - providerName: string; + racComparison: RacComparision; + providerName?: string; passive: boolean; - idpIssuer: string; - audience: string; - scoping: SamlScopingConfig; + idpIssuer?: string; + audience?: string; + scoping?: SamlScopingConfig; // InResponseTo Validation validateInResponseTo: boolean; @@ -63,19 +73,21 @@ export interface SamlOptions extends SamlSigningOptions { // Logout logoutUrl: string; additionalLogoutParams: Record; - logoutCallbackUrl: string; + logoutCallbackUrl?: string; // extras - disableRequestACSUrl: boolean; + disableRequestAcsUrl: boolean; } - -export type SamlConfig = Partial & StrategyOptions; - -interface StrategyOptions { +export interface StrategyOptions { name?: string; passReqToCallback?: boolean; } +/** + * These options are availble for configuring a SAML strategy + */ +export type SamlConfig = Partial & StrategyOptions & MandatorySamlOptions; + export interface SamlScopingConfig { idpList?: SamlIDPListConfig[]; proxyCount?: number; @@ -166,6 +178,8 @@ export type VerifyWithoutRequest = ( export type SamlOptionsCallback = (err: Error | null, samlOptions?: SamlConfig) => void; -export interface MultiSamlConfig extends SamlConfig { +interface BaseMultiSamlConfig { getSamlOptions(req: express.Request, callback: SamlOptionsCallback): void; } + +export type MultiSamlConfig = Partial & StrategyOptions & BaseMultiSamlConfig; diff --git a/src/passport-saml/utility.ts b/src/passport-saml/utility.ts new file mode 100644 index 00000000..a378170f --- /dev/null +++ b/src/passport-saml/utility.ts @@ -0,0 +1,54 @@ +import { SignedXml } from "xml-crypto"; +import { SamlSigningOptions } from "./types"; +import * as algorithms from "./algorithms"; + +export function assertRequired(value: T | null | undefined, error?: string): T { + if (value === undefined || value === null || (typeof value === "string" && value.length === 0)) { + throw new TypeError(error ?? "value does not exist"); + } else { + return value; + } +} + +export function signXml(samlMessage: string, xpath: string, options: SamlSigningOptions): string { + const defaultTransforms = [ + "http://www.w3.org/2000/09/xmldsig#enveloped-signature", + "http://www.w3.org/2001/10/xml-exc-c14n#", + ]; + + if (!samlMessage) throw new Error("samlMessage is required"); + if (!xpath) throw new Error("xpath is required"); + if (!options) { + options = {} as SamlSigningOptions; + } + + if (options.privateCert) { + console.warn("options.privateCert has been deprecated; use options.privateKey instead."); + + if (!options.privateKey) { + options.privateKey = options.privateCert; + } + } + + if (!options.privateKey) throw new Error("options.privateKey is required"); + + const transforms = options.xmlSignatureTransforms || defaultTransforms; + const sig = new SignedXml(); + if (options.signatureAlgorithm) { + sig.signatureAlgorithm = algorithms.getSigningAlgorithm(options.signatureAlgorithm); + } + sig.addReference(xpath, transforms, algorithms.getDigestAlgorithm(options.digestAlgorithm)); + sig.signingKey = options.privateKey; + sig.computeSignature(samlMessage, { + location: { reference: xpath, action: "append" }, + }); + + return sig.getSignedXml(); +} + +export function signXmlResponse(samlMessage: string, options: SamlSigningOptions): string { + const responseXpath = + '//*[local-name(.)="Response" and namespace-uri(.)="urn:oasis:names:tc:SAML:2.0:protocol"]'; + + return signXml(samlMessage, responseXpath, options); +} diff --git a/test/capturedSamlRequests.spec.ts b/test/capturedSamlRequests.spec.ts new file mode 100644 index 00000000..6865c9f8 --- /dev/null +++ b/test/capturedSamlRequests.spec.ts @@ -0,0 +1,1118 @@ +"use strict"; +import * as express from "express"; +import * as bodyParser from "body-parser"; +import * as passport from "passport"; +import { Strategy as SamlStrategy } from "../src/passport-saml"; +import request = require("request"); +import * as zlib from "zlib"; +import * as querystring from "querystring"; +import { parseString } from "xml2js"; +import * as fs from "fs"; +import { AuthenticateOptions, Profile, VerifiedCallback } from "../src/passport-saml/types.js"; +import * as should from "should"; +import { Server } from "http"; +import { CapturedCheck, FAKE_CERT, SamlCheck } from "./types"; + +const capturedSamlRequestChecks: SamlCheck[] = [ + { + name: "Empty Config", + config: { cert: FAKE_CERT }, + result: { + "samlp:AuthnRequest": { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + Version: "2.0", + ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", + AssertionConsumerServiceURL: "http://localhost:3033/login", + Destination: "https://wwwexampleIdp.com/saml", + }, + "saml:Issuer": [ + { _: "onelogin_saml", $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" } }, + ], + "samlp:NameIDPolicy": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + Format: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress", + AllowCreate: "true", + }, + }, + ], + "samlp:RequestedAuthnContext": [ + { + $: { "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", Comparison: "exact" }, + "saml:AuthnContextClassRef": [ + { + _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", + $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, + }, + ], + }, + ], + }, + }, + }, + { + name: "Empty Config w/ HTTP-POST binding", + config: { authnRequestBinding: "HTTP-POST", cert: FAKE_CERT }, + result: { + "samlp:AuthnRequest": { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + Version: "2.0", + ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", + AssertionConsumerServiceURL: "http://localhost:3033/login", + Destination: "https://wwwexampleIdp.com/saml", + }, + "saml:Issuer": [ + { _: "onelogin_saml", $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" } }, + ], + "samlp:NameIDPolicy": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + Format: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress", + AllowCreate: "true", + }, + }, + ], + "samlp:RequestedAuthnContext": [ + { + $: { "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", Comparison: "exact" }, + "saml:AuthnContextClassRef": [ + { + _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", + $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, + }, + ], + }, + ], + }, + }, + }, + { + name: "Config #2", + config: { + issuer: "http://exampleSp.com/saml", + identifierFormat: "alternateIdentifier", + passive: true, + attributeConsumingServiceIndex: "123", + forceAuthn: false, + cert: FAKE_CERT, + }, + result: { + "samlp:AuthnRequest": { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + Version: "2.0", + ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", + AssertionConsumerServiceURL: "http://localhost:3033/login", + AttributeConsumingServiceIndex: "123", + Destination: "https://wwwexampleIdp.com/saml", + IsPassive: "true", + }, + "saml:Issuer": [ + { + _: "http://exampleSp.com/saml", + $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, + }, + ], + "samlp:NameIDPolicy": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + Format: "alternateIdentifier", + AllowCreate: "true", + }, + }, + ], + "samlp:RequestedAuthnContext": [ + { + $: { "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", Comparison: "exact" }, + "saml:AuthnContextClassRef": [ + { + _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", + $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, + }, + ], + }, + ], + }, + }, + }, + { + name: "Uncompressed config #2", + config: { + issuer: "http://exampleSp.com/saml", + identifierFormat: "alternateIdentifier", + passive: true, + attributeConsumingServiceIndex: "123", + skipRequestCompression: true, + cert: FAKE_CERT, + }, + result: { + "samlp:AuthnRequest": { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + Version: "2.0", + ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", + AssertionConsumerServiceURL: "http://localhost:3033/login", + AttributeConsumingServiceIndex: "123", + Destination: "https://wwwexampleIdp.com/saml", + IsPassive: "true", + }, + "saml:Issuer": [ + { + _: "http://exampleSp.com/saml", + $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, + }, + ], + "samlp:NameIDPolicy": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + Format: "alternateIdentifier", + AllowCreate: "true", + }, + }, + ], + "samlp:RequestedAuthnContext": [ + { + $: { "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", Comparison: "exact" }, + "saml:AuthnContextClassRef": [ + { + _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", + $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, + }, + ], + }, + ], + }, + }, + }, + { + name: "Config #3", + config: { + issuer: "http://exampleSp.com/saml", + identifierFormat: "alternateIdentifier", + passive: true, + attributeConsumingServiceIndex: "123", + skipRequestCompression: true, + disableRequestedAuthnContext: true, + forceAuthn: true, + cert: FAKE_CERT, + }, + result: { + "samlp:AuthnRequest": { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + Version: "2.0", + ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", + AssertionConsumerServiceURL: "http://localhost:3033/login", + AttributeConsumingServiceIndex: "123", + Destination: "https://wwwexampleIdp.com/saml", + IsPassive: "true", + ForceAuthn: "true", + }, + "saml:Issuer": [ + { + _: "http://exampleSp.com/saml", + $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, + }, + ], + "samlp:NameIDPolicy": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + Format: "alternateIdentifier", + AllowCreate: "true", + }, + }, + ], + }, + }, + }, + { + name: "Config with AuthnContext", + config: { + issuer: "http://exampleSp.com/saml", + identifierFormat: "alternateIdentifier", + passive: true, + attributeConsumingServiceIndex: "123", + authnContext: ["myAuthnContext"], + cert: FAKE_CERT, + }, + result: { + "samlp:AuthnRequest": { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + Version: "2.0", + ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", + AssertionConsumerServiceURL: "http://localhost:3033/login", + AttributeConsumingServiceIndex: "123", + Destination: "https://wwwexampleIdp.com/saml", + IsPassive: "true", + }, + "saml:Issuer": [ + { + _: "http://exampleSp.com/saml", + $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, + }, + ], + "samlp:NameIDPolicy": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + Format: "alternateIdentifier", + AllowCreate: "true", + }, + }, + ], + "samlp:RequestedAuthnContext": [ + { + $: { "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", Comparison: "exact" }, + "saml:AuthnContextClassRef": [ + { + _: "myAuthnContext", + $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, + }, + ], + }, + ], + }, + }, + }, + { + name: "Config with multiple AuthnContext", + config: { + issuer: "http://exampleSp.com/saml", + identifierFormat: "alternateIdentifier", + passive: true, + attributeConsumingServiceIndex: "123", + authnContext: ["myAuthnContext", "myAuthnContext2"], + cert: FAKE_CERT, + }, + result: { + "samlp:AuthnRequest": { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + Version: "2.0", + ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", + AssertionConsumerServiceURL: "http://localhost:3033/login", + AttributeConsumingServiceIndex: "123", + Destination: "https://wwwexampleIdp.com/saml", + IsPassive: "true", + }, + "saml:Issuer": [ + { + _: "http://exampleSp.com/saml", + $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, + }, + ], + "samlp:NameIDPolicy": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + Format: "alternateIdentifier", + AllowCreate: "true", + }, + }, + ], + "samlp:RequestedAuthnContext": [ + { + $: { "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", Comparison: "exact" }, + "saml:AuthnContextClassRef": [ + { + _: "myAuthnContext", + $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, + }, + { + _: "myAuthnContext2", + $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, + }, + ], + }, + ], + }, + }, + }, + { + name: "Config with ProviderName", + config: { + issuer: "http://exampleSp.com/saml", + identifierFormat: "alternateIdentifier", + providerName: "myProviderName", + cert: FAKE_CERT, + }, + result: { + "samlp:AuthnRequest": { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + Version: "2.0", + ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", + ProviderName: "myProviderName", + AssertionConsumerServiceURL: "http://localhost:3033/login", + Destination: "https://wwwexampleIdp.com/saml", + }, + "saml:Issuer": [ + { + _: "http://exampleSp.com/saml", + $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, + }, + ], + "samlp:NameIDPolicy": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + Format: "alternateIdentifier", + AllowCreate: "true", + }, + }, + ], + "samlp:RequestedAuthnContext": [ + { + $: { "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", Comparison: "exact" }, + "saml:AuthnContextClassRef": [ + { + _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", + $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, + }, + ], + }, + ], + }, + }, + }, + { + name: "Remove NameIDPolicy, AuthnRequest, and AssertionConsumerServiceURL Config", + config: { + identifierFormat: null, + disableRequestedAuthnContext: true, + disableRequestAcsUrl: true, + cert: FAKE_CERT, + }, + result: { + "samlp:AuthnRequest": { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + Version: "2.0", + ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", + Destination: "https://wwwexampleIdp.com/saml", + }, + "saml:Issuer": [ + { _: "onelogin_saml", $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" } }, + ], + }, + }, + }, + { + name: "Config with full Scoping config", + config: { + issuer: "http://exampleSp.com/saml", + identifierFormat: "alternateIdentifier", + scoping: { + proxyCount: 2, + requesterId: "fooBarRequesterId", + idpList: [ + { + entries: [ + { + providerId: "myScopingProviderId", + name: "myScopingProviderName", + loc: "myScopingProviderLoc", + }, + ], + getComplete: "https://www.getcompleteidplist.com", + }, + ], + }, + cert: FAKE_CERT, + }, + result: { + "samlp:AuthnRequest": { + $: { + AssertionConsumerServiceURL: "http://localhost:3033/login", + Destination: "https://wwwexampleIdp.com/saml", + ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", + Version: "2.0", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "saml:Issuer": [ + { + $: { + "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", + }, + _: "http://exampleSp.com/saml", + }, + ], + "samlp:NameIDPolicy": [ + { + $: { + AllowCreate: "true", + Format: "alternateIdentifier", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + }, + ], + "samlp:RequestedAuthnContext": [ + { + $: { + Comparison: "exact", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "saml:AuthnContextClassRef": [ + { + $: { + "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", + }, + _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", + }, + ], + }, + ], + "samlp:Scoping": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + ProxyCount: "2", + }, + "samlp:IDPList": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "samlp:GetComplete": ["https://www.getcompleteidplist.com"], + "samlp:IDPEntry": [ + { + $: { + Loc: "myScopingProviderLoc", + Name: "myScopingProviderName", + ProviderID: "myScopingProviderId", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + }, + ], + }, + ], + "samlp:RequesterID": ["fooBarRequesterId"], + }, + ], + }, + }, + }, + { + name: "Config with Scoping config without proxyCount and requesterId", + config: { + issuer: "http://exampleSp.com/saml", + identifierFormat: "alternateIdentifier", + scoping: { + idpList: [ + { + entries: [ + { + providerId: "myScopingProviderId", + name: "myScopingProviderName", + loc: "myScopingProviderLoc", + }, + ], + getComplete: "https://www.getcompleteidplist.com", + }, + ], + }, + cert: FAKE_CERT, + }, + result: { + "samlp:AuthnRequest": { + $: { + AssertionConsumerServiceURL: "http://localhost:3033/login", + Destination: "https://wwwexampleIdp.com/saml", + ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", + Version: "2.0", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "saml:Issuer": [ + { + $: { + "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", + }, + _: "http://exampleSp.com/saml", + }, + ], + "samlp:NameIDPolicy": [ + { + $: { + AllowCreate: "true", + Format: "alternateIdentifier", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + }, + ], + "samlp:RequestedAuthnContext": [ + { + $: { + Comparison: "exact", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "saml:AuthnContextClassRef": [ + { + $: { + "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", + }, + _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", + }, + ], + }, + ], + "samlp:Scoping": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "samlp:IDPList": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "samlp:GetComplete": ["https://www.getcompleteidplist.com"], + "samlp:IDPEntry": [ + { + $: { + Loc: "myScopingProviderLoc", + Name: "myScopingProviderName", + ProviderID: "myScopingProviderId", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + }, + ], + }, + ], + }, + ], + }, + }, + }, + { + name: "Config with Scoping config without proxyCount, requesterId, getComplete", + config: { + issuer: "http://exampleSp.com/saml", + identifierFormat: "alternateIdentifier", + scoping: { + idpList: [ + { + entries: [ + { + providerId: "myScopingProviderId", + name: "myScopingProviderName", + loc: "myScopingProviderLoc", + }, + ], + }, + ], + }, + cert: FAKE_CERT, + }, + result: { + "samlp:AuthnRequest": { + $: { + AssertionConsumerServiceURL: "http://localhost:3033/login", + Destination: "https://wwwexampleIdp.com/saml", + ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", + Version: "2.0", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "saml:Issuer": [ + { + $: { + "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", + }, + _: "http://exampleSp.com/saml", + }, + ], + "samlp:NameIDPolicy": [ + { + $: { + AllowCreate: "true", + Format: "alternateIdentifier", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + }, + ], + "samlp:RequestedAuthnContext": [ + { + $: { + Comparison: "exact", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "saml:AuthnContextClassRef": [ + { + $: { + "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", + }, + _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", + }, + ], + }, + ], + "samlp:Scoping": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "samlp:IDPList": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "samlp:IDPEntry": [ + { + $: { + Loc: "myScopingProviderLoc", + Name: "myScopingProviderName", + ProviderID: "myScopingProviderId", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + }, + ], + }, + ], + }, + ], + }, + }, + }, + { + name: + "Config with Scoping config without proxyCount, requesterId, idpList getComplete, entry name, entry loc", + config: { + issuer: "http://exampleSp.com/saml", + identifierFormat: "alternateIdentifier", + scoping: { + idpList: [ + { + entries: [ + { + providerId: "myScopingProviderId", + }, + ], + }, + ], + }, + cert: FAKE_CERT, + }, + result: { + "samlp:AuthnRequest": { + $: { + AssertionConsumerServiceURL: "http://localhost:3033/login", + Destination: "https://wwwexampleIdp.com/saml", + ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", + Version: "2.0", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "saml:Issuer": [ + { + $: { + "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", + }, + _: "http://exampleSp.com/saml", + }, + ], + "samlp:NameIDPolicy": [ + { + $: { + AllowCreate: "true", + Format: "alternateIdentifier", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + }, + ], + "samlp:RequestedAuthnContext": [ + { + $: { + Comparison: "exact", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "saml:AuthnContextClassRef": [ + { + $: { + "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", + }, + _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", + }, + ], + }, + ], + "samlp:Scoping": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "samlp:IDPList": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "samlp:IDPEntry": [ + { + $: { + ProviderID: "myScopingProviderId", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + }, + ], + }, + ], + }, + ], + }, + }, + }, + { + name: "Config with Scoping and multiple IDPList entries", + config: { + issuer: "http://exampleSp.com/saml", + identifierFormat: "alternateIdentifier", + scoping: { + idpList: [ + { + entries: [ + { + providerId: "myScopingProviderId", + }, + { + providerId: "myOtherScopingProviderId", + }, + ], + }, + ], + }, + cert: FAKE_CERT, + }, + result: { + "samlp:AuthnRequest": { + $: { + AssertionConsumerServiceURL: "http://localhost:3033/login", + Destination: "https://wwwexampleIdp.com/saml", + ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", + Version: "2.0", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "saml:Issuer": [ + { + $: { + "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", + }, + _: "http://exampleSp.com/saml", + }, + ], + "samlp:NameIDPolicy": [ + { + $: { + AllowCreate: "true", + Format: "alternateIdentifier", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + }, + ], + "samlp:RequestedAuthnContext": [ + { + $: { + Comparison: "exact", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "saml:AuthnContextClassRef": [ + { + $: { + "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", + }, + _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", + }, + ], + }, + ], + "samlp:Scoping": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "samlp:IDPList": [ + { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + "samlp:IDPEntry": [ + { + $: { + ProviderID: "myScopingProviderId", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + }, + { + $: { + ProviderID: "myOtherScopingProviderId", + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + }, + }, + ], + }, + ], + }, + ], + }, + }, + }, +]; + +export const logoutChecks: CapturedCheck[] = [ + { + name: "Logout", + config: { + skipRequestCompression: true, + entryPoint: "https://idp.testshib.org/idp/profile/SAML2/Redirect/SSO", + cert: fs.readFileSync(__dirname + "/static/cert.pem", "ascii"), + identifierFormat: "urn:oasis:names:tc:SAML:2.0:nameid-format:transient", + }, + samlRequest: { + SAMLRequest: fs.readFileSync( + __dirname + "/static/logout_request_with_good_signature.xml", + "base64" + ), + }, + expectedStatusCode: 200, + mockDate: "2014-06-02T17:48:56.820Z", + result: { + "samlp:LogoutResponse": { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", + Version: "2.0", + Destination: "https://wwwexampleIdp.com/saml", + InResponseTo: "pfxd4d369e8-9ea1-780c-aff8-a1d11a9862a1", + }, + "saml:Issuer": ["onelogin_saml"], + "samlp:Status": [ + { + "samlp:StatusCode": [ + { + $: { + Value: "urn:oasis:names:tc:SAML:2.0:status:Success", + }, + }, + ], + }, + ], + }, + }, + }, +]; + +describe("captured SAML requests /", function () { + let server: Server; + + function testForCheck(check: SamlCheck) { + return function (done: Mocha.Done) { + const app = express(); + try { + app.use(bodyParser.urlencoded({ extended: false })); + app.use(passport.initialize()); + const config = check.config; + config.callbackUrl = "http://localhost:3033/login"; + config.entryPoint = "https://wwwexampleIdp.com/saml"; + let profile: Profile; + const strategy = new SamlStrategy( + config, + function (_profile: Profile | null | undefined, done: VerifiedCallback) { + if (_profile) { + profile = _profile; + done(null, profile); + } + } + ); + passport.use(strategy); + + let userSerialized = false; + passport.serializeUser(function (user, done) { + userSerialized = true; + done(null, user); + }); + } catch (err) { + done(err); + } + + app.get( + "/login", + passport.authenticate("saml", { + samlFallback: "login-request", + session: false, + } as AuthenticateOptions), + function (req, res) { + res.status(200).send("200 OK"); + } + ); + + app.use(function ( + err: Error | null, + req: express.Request, + res: express.Response, + next: express.NextFunction + ) { + if (err) { + done(err); + res.status(500).send("500 Internal Server Error"); + } + }); + + server = app.listen(3033, function () { + const requestOpts = { + url: "http://localhost:3033/login", + method: "get", + followRedirect: false, + }; + + function helper(err: Error | null, samlRequest: Buffer) { + try { + should.not.exist(err); + parseString(samlRequest.toString(), function (err, doc) { + try { + should.not.exist(err); + delete doc["samlp:AuthnRequest"]["$"]["ID"]; + delete doc["samlp:AuthnRequest"]["$"]["IssueInstant"]; + doc.should.eql(check.result); + done(); + } catch (err2) { + done(err2); + } + }); + } catch (err3) { + done(err3); + } + } + + // TODO remove usage of request module + request(requestOpts, function (err: Error | null, response: any, body: any) { + try { + should.not.exist(err); + + let encodedSamlRequest; + if (check.config.authnRequestBinding === "HTTP-POST") { + response.statusCode.should.equal(200); + body.should.match(/[^]*/); + encodedSamlRequest = body.match(/ undefined; describe("MultiSamlStrategy()", function () { it("extends passport Strategy", function () { - function getSamlOptions() { - return {}; + function getSamlOptions(): SamlConfig { + return { cert: FAKE_CERT }; } - const strategy = new MultiSamlStrategy({ getSamlOptions: getSamlOptions }, noop); + const strategy = new MultiSamlStrategy({ getSamlOptions }, noop); strategy.should.be.an.instanceOf(SamlStrategy); }); @@ -26,7 +27,7 @@ describe("MultiSamlStrategy()", function () { function createStrategy() { return new MultiSamlStrategy({} as MultiSamlConfig, noop); } - should.throws(createStrategy); + assert.throws(createStrategy); }); }); @@ -43,7 +44,7 @@ describe("MultiSamlStrategy#authenticate", function () { const superAuthenticateStub = this.superAuthenticateStub; function getSamlOptions(req: express.Request, fn: SamlOptionsCallback) { try { - fn(null, {}); + fn(null, { cert: FAKE_CERT }); sinon.assert.calledOnce(superAuthenticateStub); done(); } catch (err2) { @@ -53,7 +54,7 @@ describe("MultiSamlStrategy#authenticate", function () { const strategy = new MultiSamlStrategy( { - getSamlOptions: getSamlOptions, + getSamlOptions, }, noop ); @@ -65,7 +66,7 @@ describe("MultiSamlStrategy#authenticate", function () { passReqToCallback: true, getSamlOptions: function (req: express.Request, fn: SamlOptionsCallback) { try { - fn(null, {}); + fn(null, { cert: FAKE_CERT }); strategy._passReqToCallback!.should.eql(true); done(); } catch (err2) { @@ -106,7 +107,7 @@ describe("MultiSamlStrategy#authenticate", function () { } const strategy = new MultiSamlStrategy( - { getSamlOptions: getSamlOptions, cacheProvider: "mock cache provider" as any }, + { getSamlOptions, cacheProvider: "mock cache provider" as any }, noop ); strategy.authenticate("random" as any, "random" as any); @@ -114,32 +115,40 @@ describe("MultiSamlStrategy#authenticate", function () { }); describe("MultiSamlStrategy#authorize", function () { + let getAuthorizeFormStub: sinon.SinonStub; + let getAuthorizeUrlStub: sinon.SinonStub; + let errorStub: sinon.SinonStub; + beforeEach(function () { - this.getAuthorizeFormStub = sinon.stub(SAML.prototype, "getAuthorizeFormAsync").resolves(); - this.getAuthorizeUrlStub = sinon.stub(SAML.prototype, "getAuthorizeUrlAsync").resolves(); + getAuthorizeFormStub = sinon.stub(SAML.prototype, "getAuthorizeFormAsync").resolves(); + getAuthorizeUrlStub = sinon.stub(SAML.prototype, "getAuthorizeUrlAsync").resolves(); + errorStub = sinon.stub(MultiSamlStrategy.prototype, "error"); }); afterEach(function () { - this.getAuthorizeFormStub.restore(); - this.getAuthorizeUrlStub.restore(); + getAuthorizeFormStub.restore(); + getAuthorizeUrlStub.restore(); + errorStub.restore(); }); it("calls getAuthorizeForm when authnRequestBinding is HTTP-POST", function () { function getSamlOptions(req: express.Request, fn: SamlOptionsCallback) { - fn(null, { authnRequestBinding: "HTTP-POST" }); + fn(null, { authnRequestBinding: "HTTP-POST", cert: FAKE_CERT }); } const strategy = new MultiSamlStrategy({ getSamlOptions }, noop); strategy.authenticate({} as RequestWithUser, {}); - sinon.assert.calledOnce(this.getAuthorizeFormStub); + sinon.assert.notCalled(errorStub); + sinon.assert.calledOnce(getAuthorizeFormStub); }); it("calls getAuthorizeUrl when authnRequestBinding is not HTTP-POST", function () { function getSamlOptions(req: express.Request, fn: SamlOptionsCallback) { - fn(null, {}); + fn(null, { cert: FAKE_CERT }); } const strategy = new MultiSamlStrategy({ getSamlOptions }, noop); strategy.authenticate({} as RequestWithUser, {}); - sinon.assert.calledOnce(this.getAuthorizeUrlStub); + sinon.assert.notCalled(errorStub); + sinon.assert.calledOnce(getAuthorizeUrlStub); }); }); @@ -156,7 +165,7 @@ describe("MultiSamlStrategy#logout", function () { const superLogoutMock = this.superLogoutMock; function getSamlOptions(req: express.Request, fn: SamlOptionsCallback) { try { - fn(null); + fn(null, { cert: FAKE_CERT }); sinon.assert.calledOnce(superLogoutMock); done(); } catch (err2) { @@ -164,7 +173,7 @@ describe("MultiSamlStrategy#logout", function () { } } - const strategy = new MultiSamlStrategy({ getSamlOptions: getSamlOptions }, noop); + const strategy = new MultiSamlStrategy({ getSamlOptions }, noop); strategy.logout("random" as any, "random" as any); }); @@ -173,7 +182,7 @@ describe("MultiSamlStrategy#logout", function () { passReqToCallback: true, getSamlOptions: function (req: express.Request, fn: SamlOptionsCallback) { try { - fn(null, {}); + fn(null, { cert: FAKE_CERT }); strategy._passReqToCallback!.should.eql(true); done(); } catch (err2) { @@ -212,7 +221,7 @@ describe("MultiSamlStrategy#logout", function () { } } - const strategy = new MultiSamlStrategy({ getSamlOptions: getSamlOptions }, noop); + const strategy = new MultiSamlStrategy({ getSamlOptions }, noop); strategy.logout("random" as any, sinon.spy()); }); }); @@ -232,7 +241,7 @@ describe("MultiSamlStrategy#generateServiceProviderMetadata", function () { const superGenerateServiceProviderMetadata = this.superGenerateServiceProviderMetadata; function getSamlOptions(req: express.Request, fn: SamlOptionsCallback) { try { - fn(null); + fn(null, { cert: FAKE_CERT }); sinon.assert.calledOnce(superGenerateServiceProviderMetadata); superGenerateServiceProviderMetadata.calledWith("bar", "baz"); req.should.eql("foo"); @@ -242,17 +251,17 @@ describe("MultiSamlStrategy#generateServiceProviderMetadata", function () { } } - const strategy = new MultiSamlStrategy({ getSamlOptions: getSamlOptions }, noop); + const strategy = new MultiSamlStrategy({ getSamlOptions }, noop); strategy.generateServiceProviderMetadata("foo" as any, "bar", "baz", noop); }); it("passes options on to saml strategy", function (done) { - const passportOptions = { + const passportOptions: MultiSamlConfig = { passReqToCallback: true, getSamlOptions: function (req: express.Request, fn: SamlOptionsCallback) { try { - fn(null); + fn(null, { cert: FAKE_CERT }); strategy._passReqToCallback!.should.eql(true); done(); } catch (err2) { @@ -268,7 +277,7 @@ describe("MultiSamlStrategy#generateServiceProviderMetadata", function () { it("should pass error to callback function", function (done) { const passportOptions = { getSamlOptions: function (req: express.Request, fn: SamlOptionsCallback) { - fn(new Error("My error"), {}); + fn(new Error("My error")); }, }; @@ -286,7 +295,7 @@ describe("MultiSamlStrategy#generateServiceProviderMetadata", function () { it("should pass result to callback function", function (done) { const passportOptions = { getSamlOptions: function (req: express.Request, fn: SamlOptionsCallback) { - fn(null, {}); + fn(null, { cert: FAKE_CERT }); }, }; diff --git a/test/saml-post-signing-tests.spec.ts b/test/saml-post-signing-tests.spec.ts index 70509667..02bb604a 100644 --- a/test/saml-post-signing-tests.spec.ts +++ b/test/saml-post-signing-tests.spec.ts @@ -1,5 +1,4 @@ import * as fs from "fs"; -import "should"; import { signSamlPost, signAuthnRequestPost } from "../src/passport-saml/saml-post-signing"; import { SamlOptions, SamlSigningOptions } from "../src/passport-saml/types"; diff --git a/test/samlTests.spec.ts b/test/samlTests.spec.ts index c0892509..bd20826e 100644 --- a/test/samlTests.spec.ts +++ b/test/samlTests.spec.ts @@ -2,14 +2,11 @@ import * as fs from "fs"; import * as url from "url"; import * as should from "should"; -import express = require("express"); +import assert = require("assert"); import { SAML } from "../src/passport-saml/saml"; -import { - RequestWithUser, - Profile, - AuthenticateOptions, - AuthorizeOptions, -} from "../src/passport-saml/types"; +import { RequestWithUser, AuthenticateOptions, AuthorizeOptions } from "../src/passport-saml/types"; +import { assertRequired } from "../src/passport-saml/utility"; +import { FAKE_CERT } from "./types"; describe("SAML.js", function () { describe("get Urls", function () { @@ -20,6 +17,7 @@ describe("SAML.js", function () { saml = new SAML({ entryPoint: "https://exampleidp.com/path?key=value", logoutUrl: "https://exampleidp.com/path?key=value", + cert: FAKE_CERT, }); req = { protocol: "https", @@ -106,8 +104,11 @@ describe("SAML.js", function () { describe("getLogoutResponseUrl", function () { it("calls callback with right host", function (done) { saml.getLogoutResponseUrl(req, {}, function (err, target) { + should.not.exist(err); try { - url.parse(target!).host!.should.equal("exampleidp.com"); + target = assertRequired(target); + const parsed = url.parse(target); + assert.strictEqual(parsed.host, "exampleidp.com"); done(); } catch (err2) { done(err2); @@ -116,8 +117,11 @@ describe("SAML.js", function () { }); it("calls callback with right protocol", function (done) { saml.getLogoutResponseUrl(req, {}, function (err, target) { + should.not.exist(err); try { - url.parse(target!).protocol!.should.equal("https:"); + target = assertRequired(target); + const parsed = url.parse(target); + assert.strictEqual(parsed.protocol, "https:"); done(); } catch (err2) { done(err2); @@ -126,8 +130,11 @@ describe("SAML.js", function () { }); it("calls callback with right path", function (done) { saml.getLogoutResponseUrl(req, {}, function (err, target) { + should.not.exist(err); try { - url.parse(target!).pathname!.should.equal("/path"); + target = assertRequired(target); + const parsed = url.parse(target); + assert.strictEqual(parsed.pathname, "/path"); done(); } catch (err2) { done(err2); @@ -136,8 +143,11 @@ describe("SAML.js", function () { }); it("calls callback with original query string", function (done) { saml.getLogoutResponseUrl(req, {}, function (err, target) { + should.not.exist(err); try { - url.parse(target!, true).query["key"]!.should.equal("value"); + target = assertRequired(target); + const parsed = url.parse(target, true); + assert.strictEqual(parsed.query["key"], "value"); done(); } catch (err2) { done(err2); @@ -146,11 +156,13 @@ describe("SAML.js", function () { }); it("calls callback with additional run-time params in query string", function (done) { saml.getLogoutResponseUrl(req, options, function (err, target) { + should.not.exist(err); try { - Object.keys(url.parse(target!, true).query).should.have.length(3); - url.parse(target!, true).query["key"]!.should.equal("value"); - url.parse(target!, true).query["SAMLResponse"]!.should.not.be.empty(); - url.parse(target!, true).query["additionalKey"]!.should.equal("additionalValue"); + target = assertRequired(target); + const parsed = url.parse(target, true); + assert.strictEqual(parsed.query["key"], "value"); + should.exist(parsed.query["SAMLResponse"]); + assert.strictEqual(parsed.query["additionalKey"], "additionalValue"); done(); } catch (err2) { done(err2); @@ -160,8 +172,11 @@ describe("SAML.js", function () { // NOTE: This test only tests existence of the assertion, not the correctness it("calls callback with saml response object", function (done) { saml.getLogoutResponseUrl(req, {}, function (err, target) { + should.not.exist(err); try { - should(url.parse(target!, true).query).have.property("SAMLResponse"); + target = assertRequired(target); + const parsed = url.parse(target, true); + should(parsed.query).have.property("SAMLResponse"); done(); } catch (err2) { done(err2); @@ -185,9 +200,8 @@ describe("SAML.js", function () { result.should.equal(regular); }); - it("does nothing to falsy", function () { - const result = saml.keyToPEM(null as any); - should.equal(result, null); + it("fails with falsy", function () { + assert.throws(() => saml.keyToPEM(null as any)); }); it("does nothing to non strings", function () { diff --git a/test/static/response-with-uncomplete-attribute.xml b/test/static/response-with-uncomplete-attribute.xml index c219abbe..f764f35e 100644 --- a/test/static/response-with-uncomplete-attribute.xml +++ b/test/static/response-with-uncomplete-attribute.xml @@ -1,54 +1,38 @@ - - -https://evil-corp.com - - - + + + https://evil-corp.com + - - - - - - -U1QoTD0C6ikXZ1QIkJqlJ5BHQws= - - -wuA92x0HttYKetEqmdm+zzUG7SwRTt3B60hacbT0i4UEA6UBU472toKBgzDWIiVAfKGXyRr8wd7d4mxnc4XeFhREX8H2RRNGy6csMx8YObQnHs9N+WswYyB4Y6XpM1oMLC3Bj+oQyl0bTlXc1J6cscQ37GcrKBXp7uWeentzp3AxhnxY+jyERfY34ShNg8sFHppXT36wqGrj/9r2QHMY66+ydfhFD8Q1QysVF4+lsThkVoqHbnCUocmikAsQyelX5SO4QBvZG9RF3S55MTVP8v0aCa9X2NKNytDvW28NpnrKfkEVyRMEbSH/qZ4bb/mdgY80i3UFYfTvkjIz9jwqBA== - - -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 - - - - - - - - https://evil-corp.com - - vincent.vega@evil-corp.com - - - - - - - - urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport - - - - - vincent.vega@evil-corp.com - - - - Vincent - - - VEGA - - - - + H3LP+myWbIxzQ4sIEocOo7Qt7wE=R3BJOjqfCTgMcL5nP+5dnP2dAtd2LO4rRKLSpky3AMW5aNr0hQYVOrq3KiGVxNZWFZUdYoJi/VEbMbaSAMO6YWm/P/k2OnqvFCZjGGLYEfOmsm0unnlL9uQL3MsPjulOgssa29tvB1CfG1PAwBUpN/JIPMEYj2pmhxnr2/kZMGpQj2LfuFTnqRNCVX1jteSjoyB1DuzDeU+qDm8vEhNTGwe8kwqnjM7llUVW9FGe6QMDpE3QFdxb/1GwaIiFBkWpqEckjv8OUlqjehyi+3bby82l+OIywFFfu/+K4AMdXpxnt5rE56RJmKXx+u4WkWBeuwWR3ytVyqeCUFXYZYAamQ== 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 + + + + + https://evil-corp.com + + vincent.vega@evil-corp.com + + + + + + + + urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport + + + + + vincent.vega@evil-corp.com + + + + Vincent + + + VEGA + + + + \ No newline at end of file diff --git a/test/strategy.spec.ts b/test/strategy.spec.ts index 411813d1..0f64a454 100644 --- a/test/strategy.spec.ts +++ b/test/strategy.spec.ts @@ -1,36 +1,46 @@ "use strict"; import * as sinon from "sinon"; -import { Strategy as SamlStrategy, SAML } from "../src/passport-saml"; +import { SAML, Strategy as SamlStrategy } from "../src/passport-saml"; import { RequestWithUser } from "../src/passport-saml/types"; +import { FAKE_CERT } from "./types"; const noop = () => undefined; describe("strategy#authorize", function () { + let getAuthorizeFormStub: sinon.SinonStub; + let getAuthorizeUrlStub: sinon.SinonStub; + let errorStub: sinon.SinonStub; + beforeEach(function () { - this.getAuthorizeFormStub = sinon.stub(SAML.prototype, "getAuthorizeFormAsync").resolves(); - this.getAuthorizeUrlStub = sinon.stub(SAML.prototype, "getAuthorizeUrlAsync").resolves(); + getAuthorizeFormStub = sinon.stub(SAML.prototype, "getAuthorizeFormAsync").resolves(); + getAuthorizeUrlStub = sinon.stub(SAML.prototype, "getAuthorizeUrlAsync").resolves(); + errorStub = sinon.stub(SamlStrategy.prototype, "error"); }); afterEach(function () { - this.getAuthorizeFormStub.restore(); - this.getAuthorizeUrlStub.restore(); + getAuthorizeFormStub.restore(); + getAuthorizeUrlStub.restore(); + errorStub.restore(); }); it("calls getAuthorizeForm when authnRequestBinding is HTTP-POST", function () { const strategy = new SamlStrategy( { authnRequestBinding: "HTTP-POST", + cert: FAKE_CERT, }, noop ); strategy.authenticate({} as RequestWithUser, {}); - sinon.assert.calledOnce(this.getAuthorizeFormStub); + sinon.assert.notCalled(errorStub); + sinon.assert.calledOnce(getAuthorizeFormStub); }); it("calls getAuthorizeUrl when authnRequestBinding is not HTTP-POST", function () { - const strategy = new SamlStrategy({}, noop); + const strategy = new SamlStrategy({ cert: FAKE_CERT }, noop); strategy.authenticate({} as RequestWithUser, {}); - sinon.assert.calledOnce(this.getAuthorizeUrlStub); + sinon.assert.notCalled(errorStub); + sinon.assert.calledOnce(getAuthorizeUrlStub); }); }); diff --git a/test/test-signatures.spec.ts b/test/test-signatures.spec.ts index 8daac061..8bf8f7b8 100644 --- a/test/test-signatures.spec.ts +++ b/test/test-signatures.spec.ts @@ -1,7 +1,6 @@ import { SAML } from "../lib/passport-saml/index.js"; import * as fs from "fs"; import * as sinon from "sinon"; -import "should"; import assert = require("assert"); const cert = fs.readFileSync(__dirname + "/static/cert.pem", "ascii"); @@ -11,13 +10,6 @@ describe("Signatures", function () { createBody = (pathToXml: string) => ({ SAMLResponse: fs.readFileSync(__dirname + "/static/signatures" + pathToXml, "base64"), }), - tryCatchTest = (done: Mocha.Done, func: any) => (...args: any) => { - try { - func(...args); - } catch (ex) { - done(ex); - } - }, testOneResponseBody = async ( samlResponseBody: Record, shouldErrorWith: string | false | undefined, diff --git a/test/tests.spec.ts b/test/tests.spec.ts index 253b5e6b..fbe25f4e 100644 --- a/test/tests.spec.ts +++ b/test/tests.spec.ts @@ -1,1480 +1,143 @@ "use strict"; import * as express from "express"; -import * as bodyParser from "body-parser"; -import * as passport from "passport"; import { Strategy as SamlStrategy, SAML } from "../src/passport-saml"; -import request = require("request"); import url = require("url"); -import "should"; -import * as zlib from "zlib"; import * as querystring from "querystring"; import { parseString } from "xml2js"; import * as fs from "fs"; import * as sinon from "sinon"; -import { - AuthenticateOptions, - Profile, - RACComparision, - RequestWithUser, - SamlConfig, - SamlOptions, - VerifiedCallback, -} from "../src/passport-saml/types.js"; +import { RacComparision, RequestWithUser, SamlConfig } from "../src/passport-saml/types.js"; import * as should from "should"; -import { Server } from "http"; import assert = require("assert"); +import { FAKE_CERT, TEST_CERT } from "./types"; +import { signXmlResponse } from "../src/passport-saml/utility"; -// a certificate which is re-used by several tests -const TEST_CERT = - "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"; -const ALT_TEST_CERT = - "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"; - -interface CapturedCheck { - samlRequest?: any; - result?: any; - name: string; - expectedStatusCode: number; - samlResponse?: any; - config: Partial; - expectedNameIDStartsWith?: string; - mockDate: string; -} - -interface SAMLCheck { - samlRequest?: any; - result?: any; - name: string; - samlResponse?: any; - config: Partial; - expectedNameIDStartsWith?: string; -} - -const noop = () => undefined; +export const BAD_TEST_CERT = + "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"; -describe("passport-saml /", function () { - describe("captured saml responses /", function () { - let fakeClock: sinon.SinonFakeTimers; - const capturedChecks: CapturedCheck[] = [ - { - name: "Okta -- valid config should succeed", - samlResponse: { - SAMLResponse: - "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", - RelayState: "", - }, - config: { - entryPoint: - "https://subspacesw1.okta.com/app/subspacesw_subspacetest_1/kvjj46lsDQEQYUDBZIYW/sso/saml", - cert: - "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", - }, - expectedStatusCode: 200, - expectedNameIDStartsWith: "ben", - mockDate: "2014-05-27T23:29:35.426Z", - }, - { - name: "Okta -- valid encrypted response should succeed", - samlResponse: { - SAMLResponse: - "<?xml version="1.0" encoding="UTF-8"?><saml2p:Response xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol" Destination="https://64f4094f.ngrok.io/sso/saml/callback" ID="id195238933970448223940497" InResponseTo="_c60537dad34fa4ecb613" IssueInstant="2016-08-19T01:13:38.139Z" Version="2.0"><saml2:Issuer xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">http://www.okta.com/exk7xdi6axPfombzx0h7</saml2:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><ds:SignatureMethod Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/><ds:Reference URI="#id195238933970448223940497"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>zt7xnrL0uVkzk3u4xdKxUGFmluKjc8yyC9fojrx5qCo=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>eFes3TPB/eQeQPmPpObP4P3QZIJDc1cW02NT8reTJu0oedICNo/NBDxOk1bh81I39Lv/t1dE3Fwk0kgI3EK0WK4QZlIfvZB+NJOJTceoBRzmMtAxr9qYNEiGIlYxgpKPChoy8t3rYLWvBeZIsjJ8/bbdnuxcHV7mzoxY24wmaqnqq14nPI1AgIHcSgMTa/YjhRpZ2eSJ6MOE1M/40r/uoEIOX5c0UhHMFo8wbiv4+oi2O+dO9WakpC7V9puFzU49Qz0dzl1WhR0bZxTmSar6YF65s0fNCRz+HbykXwxVx8Z4M51EBG7SLuiPTUIN1MYTWeuhfYz1/Osf/pj1lqKbVA==</ds:SignatureValue><ds:KeyInfo><ds:X509Data><ds:X509Certificate>MIIDoDCCAoigAwIBAgIGAVaZ04POMA0GCSqGSIb3DQEBBQUAMIGQMQswCQYDVQQGEwJVUzETMBEG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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><saml2p:Status xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol"><saml2p:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></saml2p:Status><saml2:EncryptedAssertion xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion"><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" Id="_9e8fd2ce4ad0212c98e7091ca8765fb4" Type="http://www.w3.org/2001/04/xmlenc#Element"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes256-cbc" xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"/><ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:RetrievalMethod Type="http://www.w3.org/2001/04/xmlenc#EncryptedKey" URI="#_2aea7a651dbb687902c483432ed85780"/></ds:KeyInfo><xenc:CipherData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"><xenc:CipherValue>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</xenc:CipherValue></xenc:CipherData></xenc:EncryptedData><xenc:EncryptedKey xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" Id="_2aea7a651dbb687902c483432ed85780"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p" xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"><ds:DigestMethod xmlns:ds="http://www.w3.org/2000/09/xmldsig#" Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/></xenc:EncryptionMethod><ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:X509Data><ds:X509Certificate>MIIEsDCCApigAwIBAgIBADANBgkqhkiG9w0BAQUFADATMREwDwYDVQQDEwgxMC4wLjEuNDAeFw0x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</ds:X509Certificate></ds:X509Data></ds:KeyInfo><xenc:CipherData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"><xenc:CipherValue>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</xenc:CipherValue></xenc:CipherData><xenc:ReferenceList><xenc:DataReference URI="#_9e8fd2ce4ad0212c98e7091ca8765fb4"/></xenc:ReferenceList></xenc:EncryptedKey></saml2:EncryptedAssertion></saml2p:Response>", - RelayState: "", - }, - config: { - entryPoint: - "https://frontapp.oktapreview.com/app/frontdev584714_front_1/exk7xdi6axPfombzx0h7/sso/saml", - cert: - "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", - decryptionPvk: fs.readFileSync(__dirname + "/static/testshib encryption pvk.pem"), - }, - expectedStatusCode: 200, - expectedNameIDStartsWith: "xavier", - mockDate: "2016-08-19T01:15:32.681Z", - }, - { - name: "Onelogin -- invalid cert (from Okta case) should fail", - samlResponse: { - SAMLResponse: - "PHNhbWxwOlJlc3BvbnNlIHhtbG5zOnNhbWw9InVybjpvYXNpczpuYW1lczp0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\r\nc2U+Cgo=\r\n", - }, - config: { - entryPoint: - "https://subspacesw1.okta.com/app/subspacesw_subspacetest_1/kvjj46lsDQEQYUDBZIYW/sso/saml", - cert: - "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", - }, - expectedStatusCode: 500, - mockDate: "2014-05-28T00:16:08Z", - }, - { - name: "Onelogin -- valid config should succeed", - samlResponse: { - SAMLResponse: - "PHNhbWxwOlJlc3BvbnNlIHhtbG5zOnNhbWw9InVybjpvYXNpczpuYW1lczp0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\r\nc2U+Cgo=\r\n", - }, - config: { - entryPoint: "https://app.onelogin.com/trust/saml2/http-post/sso/371755", - cert: TEST_CERT, - }, - expectedStatusCode: 200, - expectedNameIDStartsWith: "ploer", - mockDate: "2014-05-28T00:16:08Z", - }, - { - name: "Testshib -- valid encrypted response should succeed", - samlResponse: { - SAMLResponse: - "<?xml version="1.0" encoding="UTF-8"?><saml2p:Response xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol" Destination="http://localhost/browserSamlLogin" ID="_7f9e95c711654aa41b326f8b847f7a13" InResponseTo="_3138d675d6ed416d43d6" IssueInstant="2014-06-02T17:48:56.820Z" Version="2.0"><saml2:Issuer xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity">https://idp.testshib.org/idp/shibboleth</saml2:Issuer><saml2p:Status><saml2p:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></saml2p:Status><saml2:EncryptedAssertion xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion"><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" Id="_fbb14743510a6292f8750efde39ba726" Type="http://www.w3.org/2001/04/xmlenc#Element"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes128-cbc" xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"/><ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><xenc:EncryptedKey Id="_44a1099405dc8102ea1ffc7f94c2af92" xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p" xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"><ds:DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"/></xenc:EncryptionMethod><ds:KeyInfo><ds:X509Data><ds:X509Certificate>MIIEsDCCApigAwIBAgIBADANBgkqhkiG9w0BAQUFADATMREwDwYDVQQDEwgxMC4wLjEuNDAeFw0x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</ds:X509Certificate></ds:X509Data></ds:KeyInfo><xenc:CipherData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"><xenc:CipherValue>QOTLhfiNCSh6Gn5dPZd5B0wHBEPMgHliWxzLJvx9QMlczSWujgiJwwlw7c8PvSMKMeu1h8am7tdE0rp2wRiIBczzGNXTnnqhS571s0PKohQ7HxeTWgF1I2btW2Y0sIBl6V/juxnPUB1wIHPqwLaYovCzzyVyekByYjb6YJuxCOGLF/u9105/ScIt1wXckCkMINqf4uGZOAM8fJA1sAoew6CrruPnNjECZcaqSAf6EP/x0b0iu/zVQOOY0tY1TQBjLD1Q9QhKo6MhB/gXM/pinxJu3xQqA5HXKsTgVJiwIYBBWppqsoVVQdFQq+bY29ZGX9sM+0skglbVBnts8CBqMttHJLS54MFrxi2tcLu8uszNk4azj5NvlY2Qfi2SLgol3ZM/C4b0DDFKLWsf8+YdhFh6yOoYd7cfgxde9j+F+Tr6Szsyyrn73NuOwHIXuv7a1dwnKzH3ohWfAJ3ukrSmfjEckEDd6i1Adbj0XeHX0ClfiM+B+G9whCaWEHxTb/tcxuW17Icpxq2HjFBRc4nEHhTK9TpprJ8QObBSgjnelH63z2lRIQVsyXP6fWd8gqa4mdCuZPk7ajit56vPqrPYRMrG557EZR92Vn6efrkgClkhRq4VjOlMFMfX6CJUpsInGTyHJtjtX/GU55dboWjTKtndqxC256Km2e3sVOfT9Js=</xenc:CipherValue></xenc:CipherData></xenc:EncryptedKey></ds:KeyInfo><xenc:CipherData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"><xenc:CipherValue>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</xenc:CipherValue></xenc:CipherData></xenc:EncryptedData></saml2:EncryptedAssertion></saml2p:Response>", - }, - config: { - entryPoint: "https://idp.testshib.org/idp/profile/SAML2/Redirect/SSO", - cert: - "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", - identifierFormat: "urn:oasis:names:tc:SAML:2.0:nameid-format:transient", - decryptionPvk: fs.readFileSync(__dirname + "/static/testshib encryption pvk.pem"), - }, - expectedStatusCode: 200, - mockDate: "2014-06-02T17:48:56.820Z", - }, - ]; - - let server: Server; - - function testForCheck(check: CapturedCheck) { - return function (done: Mocha.Done) { - const pp = new passport.Authenticator(); - const app = express(); - app.use(bodyParser.urlencoded({ extended: false })); - app.use(pp.initialize()); - const config = check.config; - config.callbackUrl = "http://localhost:3033/login"; - let profile: Profile; - pp.use( - new SamlStrategy( - config, - function (_profile: Profile | null | undefined, done: VerifiedCallback): void { - if (_profile) { - profile = _profile; - done(null, { id: profile.nameID }); - } - } - ) - ); - - let userSerialized = false; - pp.serializeUser(function (user, done) { - userSerialized = true; - done(null, user); - }); - - fakeClock = sinon.useFakeTimers(Date.parse(check.mockDate)); - - app.post("/login", pp.authenticate("saml"), function (req, res) { - res.status(200).send("200 OK"); - }); - - app.use(function ( - err: Error, - _req: express.Request, - res: express.Response, - _next: express.NextFunction - ) { - res.status(500).send(err.stack); - }); - - server = app.listen(3033, function () { - const requestOpts = { - url: "http://localhost:3033/login", - method: "POST", - form: check.samlResponse, - }; - // TODO remove usage of request module - request(requestOpts, function (err: Error | null, response: any, body: any) { - try { - should.not.exist(err); - response.statusCode.should.equal(check.expectedStatusCode, body); - if (response.statusCode == 200) { - userSerialized.should.be.true; - if (check.expectedNameIDStartsWith) - profile!.nameID!.should.startWith(check.expectedNameIDStartsWith); - } - done(); - } catch (err2) { - done(err2); - } - }); - }); - }; - } - - function testPassReqToCallback(check: CapturedCheck) { - return function (done: Mocha.Done) { - const pp = new passport.Authenticator(); - const app = express(); - app.use(bodyParser.urlencoded({ extended: false })); - app.use(pp.initialize()); - const config = { ...check.config }; - config.callbackUrl = "http://localhost:3033/login"; - config.passReqToCallback = true; - let passedRequest: express.Request | null = null; - pp.use( - new SamlStrategy( - config, - function ( - req: express.Request, - _profile: Profile | null | undefined, - done: VerifiedCallback - ) { - if (_profile) { - passedRequest = req; - done(null, { id: _profile!.nameID }); - } - } - ) - ); - pp.serializeUser(function (user, done) { - done(null, user); - }); - fakeClock = sinon.useFakeTimers(Date.parse(check.mockDate)); - app.post("/login", pp.authenticate("saml"), function (req, res) { - res.status(200).send("200 OK"); - }); - app.use(function ( - err: Error | null, - req: express.Request, - res: express.Response, - next: express.NextFunction - ) { - // console.log( err.stack ); - res.status(500).send("500 Internal Server Error"); - }); - server = app.listen(3033, function () { - const requestOpts = { - url: "http://localhost:3033/login", - method: "POST", - form: check.samlResponse, - }; - // TODO remove usage of request module - request(requestOpts, function (err: any, response: any, body: any) { - try { - should.not.exist(err); - response.statusCode.should.equal(check.expectedStatusCode); - if (response.statusCode == 200) { - should.exist(passedRequest); - passedRequest!.url!.should.eql("/login"); - passedRequest!.method!.should.eql("POST"); - should(passedRequest!.body).match(check.samlResponse); - } else { - should.not.exist(passedRequest); - } - done(); - } catch (err2) { - done(err2); - } - }); - }); - }; - } +export const noop = (): void => undefined; - for (const check of capturedChecks) { - it(check.name, testForCheck(check)); - it(check.name + " passReqToCallback", testPassReqToCallback(check)); - } +describe("passport-saml /", function () { + describe("saml.js / ", function () { + it("should throw an error if cert property is provided to saml constructor but is empty", function () { + should(function () { + const strategy = new SAML({ cert: undefined as any }); + typeof strategy.options.cert === "undefined"; + }).throw("cert is required"); + }); - afterEach(function (done) { - fakeClock.restore(); - server.close(done); + it("generateUniqueID should generate 20 char IDs", function () { + const samlObj = new SAML({ entryPoint: "foo", cert: FAKE_CERT }); + for (let i = 0; i < 200; i++) { + samlObj.generateUniqueID().length.should.eql(20); + } }); - }); - describe("captured SAML requests /", function () { - const logoutChecks: CapturedCheck[] = [ - { - name: "Logout", - config: { - skipRequestCompression: true, - entryPoint: "https://idp.testshib.org/idp/profile/SAML2/Redirect/SSO", - cert: fs.readFileSync(__dirname + "/static/cert.pem", "ascii"), - identifierFormat: "urn:oasis:names:tc:SAML:2.0:nameid-format:transient", - }, - samlRequest: { - SAMLRequest: fs.readFileSync( - __dirname + "/static/logout_request_with_good_signature.xml", - "base64" - ), - }, - expectedStatusCode: 200, - mockDate: "2014-06-02T17:48:56.820Z", - result: { - "samlp:LogoutResponse": { + it("generateLogoutRequest", function (done) { + try { + const expectedRequest = { + "samlp:LogoutRequest": { $: { "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", + //ID: '_85ba0a112df1ffb57805', Version: "2.0", - Destination: "https://wwwexampleIdp.com/saml", - InResponseTo: "pfxd4d369e8-9ea1-780c-aff8-a1d11a9862a1", - }, - "saml:Issuer": ["onelogin_saml"], - "samlp:Status": [ - { - "samlp:StatusCode": [ - { - $: { - Value: "urn:oasis:names:tc:SAML:2.0:status:Success", - }, - }, - ], - }, - ], - }, - }, - }, - ]; - - const capturedChecks: SAMLCheck[] = [ - { - name: "Empty Config", - config: {}, - result: { - "samlp:AuthnRequest": { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - Version: "2.0", - ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", - AssertionConsumerServiceURL: "http://localhost:3033/login", - Destination: "https://wwwexampleIdp.com/saml", + //IssueInstant: '2014-05-29T03:32:23Z', + Destination: "foo", }, "saml:Issuer": [ { _: "onelogin_saml", $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" } }, ], - "samlp:NameIDPolicy": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - Format: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress", - AllowCreate: "true", - }, - }, - ], - "samlp:RequestedAuthnContext": [ - { - $: { "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", Comparison: "exact" }, - "saml:AuthnContextClassRef": [ - { - _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", - $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, - }, - ], - }, - ], - }, - }, - }, - { - name: "Empty Config w/ HTTP-POST binding", - config: { authnRequestBinding: "HTTP-POST" }, - result: { - "samlp:AuthnRequest": { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - Version: "2.0", - ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", - AssertionConsumerServiceURL: "http://localhost:3033/login", - Destination: "https://wwwexampleIdp.com/saml", - }, - "saml:Issuer": [ - { _: "onelogin_saml", $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" } }, - ], - "samlp:NameIDPolicy": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - Format: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress", - AllowCreate: "true", - }, - }, - ], - "samlp:RequestedAuthnContext": [ - { - $: { "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", Comparison: "exact" }, - "saml:AuthnContextClassRef": [ - { - _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", - $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, - }, - ], - }, - ], + "saml:NameID": [{ _: "bar", $: { Format: "foo" } }], }, - }, - }, - { - name: "Config #2", - config: { - issuer: "http://exampleSp.com/saml", - identifierFormat: "alternateIdentifier", - passive: true, - attributeConsumingServiceIndex: "123", - forceAuthn: false, - }, - result: { - "samlp:AuthnRequest": { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - Version: "2.0", - ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", - AssertionConsumerServiceURL: "http://localhost:3033/login", - AttributeConsumingServiceIndex: "123", - Destination: "https://wwwexampleIdp.com/saml", - IsPassive: "true", - }, - "saml:Issuer": [ - { - _: "http://exampleSp.com/saml", - $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, - }, - ], - "samlp:NameIDPolicy": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - Format: "alternateIdentifier", - AllowCreate: "true", - }, - }, - ], - "samlp:RequestedAuthnContext": [ - { - $: { "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", Comparison: "exact" }, - "saml:AuthnContextClassRef": [ - { - _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", - $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, - }, - ], - }, - ], - }, - }, - }, - { - name: "Uncompressed config #2", - config: { - issuer: "http://exampleSp.com/saml", - identifierFormat: "alternateIdentifier", - passive: true, - attributeConsumingServiceIndex: "123", - skipRequestCompression: true, - }, - result: { - "samlp:AuthnRequest": { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - Version: "2.0", - ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", - AssertionConsumerServiceURL: "http://localhost:3033/login", - AttributeConsumingServiceIndex: "123", - Destination: "https://wwwexampleIdp.com/saml", - IsPassive: "true", - }, - "saml:Issuer": [ - { - _: "http://exampleSp.com/saml", - $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, - }, - ], - "samlp:NameIDPolicy": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - Format: "alternateIdentifier", - AllowCreate: "true", - }, - }, - ], - "samlp:RequestedAuthnContext": [ - { - $: { "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", Comparison: "exact" }, - "saml:AuthnContextClassRef": [ - { - _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", - $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, - }, - ], - }, - ], - }, - }, - }, - { - name: "Config #3", - config: { - issuer: "http://exampleSp.com/saml", - identifierFormat: "alternateIdentifier", - passive: true, - attributeConsumingServiceIndex: "123", - skipRequestCompression: true, - disableRequestedAuthnContext: true, - forceAuthn: true, - }, - result: { - "samlp:AuthnRequest": { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - Version: "2.0", - ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", - AssertionConsumerServiceURL: "http://localhost:3033/login", - AttributeConsumingServiceIndex: "123", - Destination: "https://wwwexampleIdp.com/saml", - IsPassive: "true", - ForceAuthn: "true", - }, - "saml:Issuer": [ - { - _: "http://exampleSp.com/saml", - $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, - }, - ], - "samlp:NameIDPolicy": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - Format: "alternateIdentifier", - AllowCreate: "true", - }, - }, - ], - }, - }, - }, - { - name: "Config with AuthnContext", - config: { - issuer: "http://exampleSp.com/saml", - identifierFormat: "alternateIdentifier", - passive: true, - attributeConsumingServiceIndex: "123", - authnContext: "myAuthnContext", - }, - result: { - "samlp:AuthnRequest": { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - Version: "2.0", - ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", - AssertionConsumerServiceURL: "http://localhost:3033/login", - AttributeConsumingServiceIndex: "123", - Destination: "https://wwwexampleIdp.com/saml", - IsPassive: "true", - }, - "saml:Issuer": [ - { - _: "http://exampleSp.com/saml", - $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, - }, - ], - "samlp:NameIDPolicy": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - Format: "alternateIdentifier", - AllowCreate: "true", - }, - }, - ], - "samlp:RequestedAuthnContext": [ - { - $: { "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", Comparison: "exact" }, - "saml:AuthnContextClassRef": [ - { - _: "myAuthnContext", - $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, - }, - ], - }, - ], - }, - }, - }, - { - name: "Config with multiple AuthnContext", - config: { - issuer: "http://exampleSp.com/saml", - identifierFormat: "alternateIdentifier", - passive: true, - attributeConsumingServiceIndex: "123", - authnContext: ["myAuthnContext", "myAuthnContext2"], - }, - result: { - "samlp:AuthnRequest": { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - Version: "2.0", - ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", - AssertionConsumerServiceURL: "http://localhost:3033/login", - AttributeConsumingServiceIndex: "123", - Destination: "https://wwwexampleIdp.com/saml", - IsPassive: "true", - }, - "saml:Issuer": [ - { - _: "http://exampleSp.com/saml", - $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, - }, - ], - "samlp:NameIDPolicy": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - Format: "alternateIdentifier", - AllowCreate: "true", - }, - }, - ], - "samlp:RequestedAuthnContext": [ - { - $: { "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", Comparison: "exact" }, - "saml:AuthnContextClassRef": [ - { - _: "myAuthnContext", - $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, - }, - { - _: "myAuthnContext2", - $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, - }, - ], - }, - ], - }, - }, - }, - { - name: "Config with ProviderName", - config: { - issuer: "http://exampleSp.com/saml", - identifierFormat: "alternateIdentifier", - providerName: "myProviderName", - }, - result: { - "samlp:AuthnRequest": { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - Version: "2.0", - ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", - ProviderName: "myProviderName", - AssertionConsumerServiceURL: "http://localhost:3033/login", - Destination: "https://wwwexampleIdp.com/saml", - }, - "saml:Issuer": [ - { - _: "http://exampleSp.com/saml", - $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, - }, - ], - "samlp:NameIDPolicy": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - Format: "alternateIdentifier", - AllowCreate: "true", - }, - }, - ], - "samlp:RequestedAuthnContext": [ - { - $: { "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", Comparison: "exact" }, - "saml:AuthnContextClassRef": [ - { - _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", - $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" }, - }, - ], - }, - ], + }; + + const samlObj = new SAML({ entryPoint: "foo", cert: FAKE_CERT }); + const logoutRequestPromise = samlObj.generateLogoutRequest({ + user: { + nameIDFormat: "foo", + nameID: "bar", }, - }, - }, - { - name: "Remove NameIDPolicy, AuthnRequest, and AssertionConsumerServiceURL Config", - config: { - identifierFormat: null, - disableRequestedAuthnContext: true, - disableRequestACSUrl: true, - }, - result: { - "samlp:AuthnRequest": { + } as RequestWithUser); + + logoutRequestPromise + .then(function (logoutRequest) { + parseString(logoutRequest, function (err, doc) { + try { + delete doc["samlp:LogoutRequest"]["$"]["ID"]; + delete doc["samlp:LogoutRequest"]["$"]["IssueInstant"]; + doc.should.eql(expectedRequest); + done(); + } catch (err2) { + done(err2); + } + }); + }) + .catch((err: Error) => { + done(err); + }); + } catch (err3) { + done(err3); + } + }); + + it("generateLogoutRequest adds the NameQualifier and SPNameQualifier to the saml request", function (done) { + try { + const expectedRequest = { + "samlp:LogoutRequest": { $: { "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", + //ID: '_85ba0a112df1ffb57805', Version: "2.0", - ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", - Destination: "https://wwwexampleIdp.com/saml", + //IssueInstant: '2014-05-29T03:32:23Z', + Destination: "foo", }, "saml:Issuer": [ { _: "onelogin_saml", $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" } }, ], - }, - }, - }, - { - name: "Config with full Scoping config", - config: { - issuer: "http://exampleSp.com/saml", - identifierFormat: "alternateIdentifier", - scoping: { - proxyCount: 2, - requesterId: "fooBarRequesterId", - idpList: [ - { - entries: [ - { - providerId: "myScopingProviderId", - name: "myScopingProviderName", - loc: "myScopingProviderLoc", - }, - ], - getComplete: "https://www.getcompleteidplist.com", - }, - ], - }, - }, - result: { - "samlp:AuthnRequest": { - $: { - AssertionConsumerServiceURL: "http://localhost:3033/login", - Destination: "https://wwwexampleIdp.com/saml", - ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", - Version: "2.0", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "saml:Issuer": [ - { - $: { - "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", - }, - _: "http://exampleSp.com/saml", - }, - ], - "samlp:NameIDPolicy": [ - { - $: { - AllowCreate: "true", - Format: "alternateIdentifier", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - }, - ], - "samlp:RequestedAuthnContext": [ + "saml:NameID": [ { - $: { - Comparison: "exact", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "saml:AuthnContextClassRef": [ - { - $: { - "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", - }, - _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", - }, - ], - }, - ], - "samlp:Scoping": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - ProxyCount: "2", - }, - "samlp:IDPList": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "samlp:GetComplete": ["https://www.getcompleteidplist.com"], - "samlp:IDPEntry": [ - { - $: { - Loc: "myScopingProviderLoc", - Name: "myScopingProviderName", - ProviderID: "myScopingProviderId", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - }, - ], - }, - ], - "samlp:RequesterID": ["fooBarRequesterId"], - }, - ], - }, - }, - }, - { - name: "Config with Scoping config without proxyCount and requesterId", - config: { - issuer: "http://exampleSp.com/saml", - identifierFormat: "alternateIdentifier", - scoping: { - idpList: [ - { - entries: [ - { - providerId: "myScopingProviderId", - name: "myScopingProviderName", - loc: "myScopingProviderLoc", - }, - ], - getComplete: "https://www.getcompleteidplist.com", - }, - ], - }, - }, - result: { - "samlp:AuthnRequest": { - $: { - AssertionConsumerServiceURL: "http://localhost:3033/login", - Destination: "https://wwwexampleIdp.com/saml", - ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", - Version: "2.0", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "saml:Issuer": [ - { - $: { - "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", - }, - _: "http://exampleSp.com/saml", - }, - ], - "samlp:NameIDPolicy": [ - { - $: { - AllowCreate: "true", - Format: "alternateIdentifier", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - }, - ], - "samlp:RequestedAuthnContext": [ - { - $: { - Comparison: "exact", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "saml:AuthnContextClassRef": [ - { - $: { - "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", - }, - _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", - }, - ], - }, - ], - "samlp:Scoping": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "samlp:IDPList": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "samlp:GetComplete": ["https://www.getcompleteidplist.com"], - "samlp:IDPEntry": [ - { - $: { - Loc: "myScopingProviderLoc", - Name: "myScopingProviderName", - ProviderID: "myScopingProviderId", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - }, - ], - }, - ], - }, - ], - }, - }, - }, - { - name: "Config with Scoping config without proxyCount, requesterId, getComplete", - config: { - issuer: "http://exampleSp.com/saml", - identifierFormat: "alternateIdentifier", - scoping: { - idpList: [ - { - entries: [ - { - providerId: "myScopingProviderId", - name: "myScopingProviderName", - loc: "myScopingProviderLoc", - }, - ], - }, - ], - }, - }, - result: { - "samlp:AuthnRequest": { - $: { - AssertionConsumerServiceURL: "http://localhost:3033/login", - Destination: "https://wwwexampleIdp.com/saml", - ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", - Version: "2.0", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "saml:Issuer": [ - { - $: { - "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", - }, - _: "http://exampleSp.com/saml", - }, - ], - "samlp:NameIDPolicy": [ - { - $: { - AllowCreate: "true", - Format: "alternateIdentifier", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - }, - ], - "samlp:RequestedAuthnContext": [ - { - $: { - Comparison: "exact", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "saml:AuthnContextClassRef": [ - { - $: { - "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", - }, - _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", - }, - ], - }, - ], - "samlp:Scoping": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "samlp:IDPList": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "samlp:IDPEntry": [ - { - $: { - Loc: "myScopingProviderLoc", - Name: "myScopingProviderName", - ProviderID: "myScopingProviderId", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - }, - ], - }, - ], - }, - ], - }, - }, - }, - { - name: - "Config with Scoping config without proxyCount, requesterId, idpList getComplete, entry name, entry loc", - config: { - issuer: "http://exampleSp.com/saml", - identifierFormat: "alternateIdentifier", - scoping: { - idpList: [ - { - entries: [ - { - providerId: "myScopingProviderId", - }, - ], - }, - ], - }, - }, - result: { - "samlp:AuthnRequest": { - $: { - AssertionConsumerServiceURL: "http://localhost:3033/login", - Destination: "https://wwwexampleIdp.com/saml", - ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", - Version: "2.0", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "saml:Issuer": [ - { - $: { - "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", - }, - _: "http://exampleSp.com/saml", - }, - ], - "samlp:NameIDPolicy": [ - { - $: { - AllowCreate: "true", - Format: "alternateIdentifier", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - }, - ], - "samlp:RequestedAuthnContext": [ - { - $: { - Comparison: "exact", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "saml:AuthnContextClassRef": [ - { - $: { - "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", - }, - _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", - }, - ], - }, - ], - "samlp:Scoping": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "samlp:IDPList": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "samlp:IDPEntry": [ - { - $: { - ProviderID: "myScopingProviderId", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - }, - ], - }, - ], - }, - ], - }, - }, - }, - { - name: "Config with Scoping and multiple IDPList entries", - config: { - issuer: "http://exampleSp.com/saml", - identifierFormat: "alternateIdentifier", - scoping: { - idpList: [ - { - entries: [ - { - providerId: "myScopingProviderId", - }, - { - providerId: "myOtherScopingProviderId", - }, - ], - }, - ], - }, - }, - result: { - "samlp:AuthnRequest": { - $: { - AssertionConsumerServiceURL: "http://localhost:3033/login", - Destination: "https://wwwexampleIdp.com/saml", - ProtocolBinding: "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST", - Version: "2.0", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "saml:Issuer": [ - { - $: { - "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", - }, - _: "http://exampleSp.com/saml", - }, - ], - "samlp:NameIDPolicy": [ - { - $: { - AllowCreate: "true", - Format: "alternateIdentifier", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - }, - ], - "samlp:RequestedAuthnContext": [ - { - $: { - Comparison: "exact", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "saml:AuthnContextClassRef": [ - { - $: { - "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", - }, - _: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport", - }, - ], - }, - ], - "samlp:Scoping": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "samlp:IDPList": [ - { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - "samlp:IDPEntry": [ - { - $: { - ProviderID: "myScopingProviderId", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - }, - { - $: { - ProviderID: "myOtherScopingProviderId", - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - }, - }, - ], - }, - ], - }, - ], - }, - }, - }, - ]; - - let server: Server; - - function testForCheck(check: SAMLCheck) { - return function (done: Mocha.Done) { - const app = express(); - app.use(bodyParser.urlencoded({ extended: false })); - app.use(passport.initialize()); - const config = check.config; - config.callbackUrl = "http://localhost:3033/login"; - config.entryPoint = "https://wwwexampleIdp.com/saml"; - let profile: Profile; - passport.use( - new SamlStrategy( - config, - function (_profile: Profile | null | undefined, done: VerifiedCallback) { - if (_profile) { - profile = _profile; - done(null, profile); - } - } - ) - ); - - let userSerialized = false; - passport.serializeUser(function (user, done) { - userSerialized = true; - done(null, user); - }); - - app.get( - "/login", - passport.authenticate("saml", { - samlFallback: "login-request", - session: false, - } as AuthenticateOptions), - function (req, res) { - res.status(200).send("200 OK"); - } - ); - - app.use(function ( - err: Error | null, - req: express.Request, - res: express.Response, - next: express.NextFunction - ) { - // console.log( err.stack ); - res.status(500).send("500 Internal Server Error"); - }); - - server = app.listen(3033, function () { - const requestOpts = { - url: "http://localhost:3033/login", - method: "get", - followRedirect: false, - }; - - function helper(err: Error | null, samlRequest: Buffer) { - try { - should.not.exist(err); - parseString(samlRequest.toString(), function (err, doc) { - try { - should.not.exist(err); - delete doc["samlp:AuthnRequest"]["$"]["ID"]; - delete doc["samlp:AuthnRequest"]["$"]["IssueInstant"]; - doc.should.eql(check.result); - done(); - } catch (err2) { - done(err2); - } - }); - } catch (err2) { - done(err2); - } - } - - // TODO remove usage of request module - request(requestOpts, function (err: Error | null, response: any, body: any) { - try { - should.not.exist(err); - - let encodedSamlRequest; - if (check.config.authnRequestBinding === "HTTP-POST") { - response.statusCode.should.equal(200); - body.should.match(/[^]*/); - encodedSamlRequest = body.match(/ { + done(err); + }); + } catch (err3) { + done(err3); + } }); it("generateLogoutResponse", function (done) { @@ -1498,7 +161,7 @@ describe("passport-saml /", function () { }, }; - const samlObj = new SAML({ entryPoint: "foo" }); + const samlObj = new SAML({ entryPoint: "foo", cert: FAKE_CERT }); const logoutRequest = samlObj.generateLogoutResponse({} as express.Request, { ID: "quux" }); parseString(logoutRequest, function (err, doc) { try { @@ -1512,48 +175,56 @@ describe("passport-saml /", function () { }); }); - it("generateLogoutRequest", function (done) { - const expectedRequest = { - "samlp:LogoutRequest": { - $: { - "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", - "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", - //ID: '_85ba0a112df1ffb57805', - Version: "2.0", - //IssueInstant: '2014-05-29T03:32:23Z', - Destination: "foo", + it("generateLogoutRequest with session index", function (done) { + try { + const expectedRequest = { + "samlp:LogoutRequest": { + $: { + "xmlns:samlp": "urn:oasis:names:tc:SAML:2.0:protocol", + "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion", + //ID: '_85ba0a112df1ffb57805', + Version: "2.0", + //IssueInstant: '2014-05-29T03:32:23Z', + Destination: "foo", + }, + "saml:Issuer": [ + { _: "onelogin_saml", $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" } }, + ], + "saml:NameID": [{ _: "bar", $: { Format: "foo" } }], + "saml2p:SessionIndex": [ + { _: "session-id", $: { "xmlns:saml2p": "urn:oasis:names:tc:SAML:2.0:protocol" } }, + ], }, - "saml:Issuer": [ - { _: "onelogin_saml", $: { "xmlns:saml": "urn:oasis:names:tc:SAML:2.0:assertion" } }, - ], - "saml:NameID": [{ _: "bar", $: { Format: "foo" } }], - "saml2p:SessionIndex": [ - { _: "session-id", $: { "xmlns:saml2p": "urn:oasis:names:tc:SAML:2.0:protocol" } }, - ], - }, - }; - - const samlObj = new SAML({ entryPoint: "foo" }); - const logoutRequestPromise = samlObj.generateLogoutRequest({ - user: { - nameIDFormat: "foo", - nameID: "bar", - sessionIndex: "session-id", - }, - } as RequestWithUser); + }; - logoutRequestPromise.then(function (logoutRequest) { - parseString(logoutRequest, function (err, doc) { - try { - delete doc["samlp:LogoutRequest"]["$"]["ID"]; - delete doc["samlp:LogoutRequest"]["$"]["IssueInstant"]; - doc.should.eql(expectedRequest); - done(); - } catch (err2) { - done(err2); - } - }); - }); + const samlObj = new SAML({ entryPoint: "foo", cert: FAKE_CERT }); + const logoutRequestPromise = samlObj.generateLogoutRequest({ + user: { + nameIDFormat: "foo", + nameID: "bar", + sessionIndex: "session-id", + }, + } as RequestWithUser); + + logoutRequestPromise + .then(function (logoutRequest) { + parseString(logoutRequest, function (err, doc) { + try { + delete doc["samlp:LogoutRequest"]["$"]["ID"]; + delete doc["samlp:LogoutRequest"]["$"]["IssueInstant"]; + doc.should.eql(expectedRequest); + done(); + } catch (err2) { + done(err2); + } + }); + }) + .catch((err: Error) => { + done(err); + }); + } catch (err3) { + done(err3); + } }); it("generateLogoutRequest saves id and instant to cache", function (done) { @@ -1577,7 +248,7 @@ describe("passport-saml /", function () { }, }; - const samlObj = new SAML({ entryPoint: "foo" }); + const samlObj = new SAML({ entryPoint: "foo", cert: FAKE_CERT }); const cacheSaveSpy = sinon.spy(samlObj.cacheProvider, "saveAsync"); const logoutRequestPromise = samlObj.generateLogoutRequest({ user: { @@ -1607,7 +278,7 @@ describe("passport-saml /", function () { describe("generateServiceProviderMetadata tests /", function () { function testMetadata( - samlConfig: Partial, + samlConfig: SamlConfig, expectedMetadata: string, signingCert?: string ) { @@ -1627,11 +298,12 @@ describe("passport-saml /", function () { } it("config with callbackUrl and decryptionPvk should pass", function () { - const samlConfig: Partial = { + const samlConfig = { issuer: "http://example.serviceprovider.com", callbackUrl: "http://example.serviceprovider.com/saml/callback", identifierFormat: "urn:oasis:names:tc:SAML:2.0:nameid-format:transient", decryptionPvk: fs.readFileSync(__dirname + "/static/testshib encryption pvk.pem"), + cert: FAKE_CERT, }; const expectedMetadata = fs.readFileSync( __dirname + "/static/expected metadata.xml", @@ -1646,6 +318,7 @@ describe("passport-saml /", function () { issuer: "http://example.serviceprovider.com", callbackUrl: "http://example.serviceprovider.com/saml/callback", identifierFormat: "urn:oasis:names:tc:SAML:2.0:nameid-format:transient", + cert: FAKE_CERT, }; const expectedMetadata = fs.readFileSync( __dirname + "/static/expected metadata without key.xml", @@ -1663,6 +336,7 @@ describe("passport-saml /", function () { path: "/saml/callback", identifierFormat: "urn:oasis:names:tc:SAML:2.0:nameid-format:transient", decryptionPvk: fs.readFileSync(__dirname + "/static/testshib encryption pvk.pem"), + cert: FAKE_CERT, }; const expectedMetadata = fs.readFileSync( __dirname + "/static/expected metadata.xml", @@ -1679,6 +353,7 @@ describe("passport-saml /", function () { host: "example.serviceprovider.com", path: "/saml/callback", identifierFormat: "urn:oasis:names:tc:SAML:2.0:nameid-format:transient", + cert: FAKE_CERT, }; const expectedMetadata = fs.readFileSync( __dirname + "/static/expected metadata without key.xml", @@ -1697,6 +372,7 @@ describe("passport-saml /", function () { identifierFormat: "urn:oasis:names:tc:SAML:2.0:nameid-format:transient", decryptionPvk: fs.readFileSync(__dirname + "/static/testshib encryption pvk.pem"), privateCert: fs.readFileSync(__dirname + "/static/acme_tools_com.key"), + cert: FAKE_CERT, }; const expectedMetadata = fs.readFileSync( __dirname + "/static/expectedMetadataWithBothKeys.xml", @@ -1716,6 +392,7 @@ describe("passport-saml /", function () { identifierFormat: "urn:oasis:names:tc:SAML:2.0:nameid-format:transient", decryptionPvk: fs.readFileSync(__dirname + "/static/testshib encryption pvk.pem"), privateKey: fs.readFileSync(__dirname + "/static/acme_tools_com.key"), + cert: FAKE_CERT, }; const expectedMetadata = fs.readFileSync( __dirname + "/static/expectedMetadataWithBothKeys.xml", @@ -1734,6 +411,7 @@ describe("passport-saml /", function () { identifierFormat: "urn:oasis:names:tc:SAML:2.0:nameid-format:transient", decryptionPvk: fs.readFileSync(__dirname + "/static/testshib encryption pvk.pem"), logoutCallbackUrl: "http://example.serviceprovider.com/logout", + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); @@ -1746,7 +424,7 @@ describe("passport-saml /", function () { metadata.should.containEql(samlConfig.logoutCallbackUrl); }); - it("#certToPEM should generate valid certificate", function (done) { + it("#certToPEM should generate valid certificate", function () { const samlConfig = { entryPoint: "https://app.onelogin.com/trust/saml2/http-post/sso/371755", cert: "-----BEGIN CERTIFICATE-----" + TEST_CERT + "-----END CERTIFICATE-----", @@ -1755,14 +433,21 @@ describe("passport-saml /", function () { const samlObj = new SAML(samlConfig); const certificate = samlObj.certToPEM(samlConfig.cert); - if (certificate.match(/BEGIN/g)!.length == 1 && certificate.match(/END/g)!.length == 1) { - done(); - } else { - done("Certificate should have only 1 BEGIN and 1 END block"); + if (!(certificate.match(/BEGIN/g)!.length == 1 && certificate.match(/END/g)!.length == 1)) { + throw Error("Certificate should have only 1 BEGIN and 1 END block"); } }); describe("validatePostResponse checks /", function () { + let fakeClock: sinon.SinonFakeTimers; + + afterEach(() => { + if (fakeClock) { + // If fakeClock is retored in a test, it will cause intermittant problems for other tests + fakeClock.restore(); + } + }); + it("response with junk content should explain the XML or base64 is not valid", async () => { const samlObj = new SAML({ cert: TEST_CERT }); await assert.rejects(samlObj.validatePostResponseAsync({ SAMLResponse: "BOOM" }), { @@ -1787,28 +472,30 @@ describe("passport-saml /", function () { 'https://idp.testshib.org/idp/shibboleth'; const base64xml = Buffer.from(xml).toString("base64"); const container = { SAMLResponse: base64xml }; - const samlObj = new SAML({}); + const samlObj = new SAML({ cert: FAKE_CERT }); await assert.rejects(samlObj.validatePostResponseAsync(container), { message: /Responder.*InvalidNameIDPolicy/, }); }); it("accept response with an attributeStatement element without attributeValue", async () => { - const fakeClock = sinon.useFakeTimers(Date.parse("2015-08-31T08:55:00+00:00")); + fakeClock = sinon.useFakeTimers(Date.parse("2015-08-31T08:55:00+00:00")); + const container = { SAMLResponse: fs .readFileSync(__dirname + "/static/response-with-uncomplete-attribute.xml") .toString("base64"), }; - const samlObj = new SAML({}); + + const signingCert = fs.readFileSync(__dirname + "/static/cert.pem", "utf-8"); + + const samlObj = new SAML({ cert: signingCert }); const { profile } = await samlObj.validatePostResponseAsync(container); profile!.issuer!.should.eql("https://evil-corp.com"); profile!.nameID!.should.eql("vincent.vega@evil-corp.com"); should(profile).have.property("evil-corp.egroupid").eql("vincent.vega@evil-corp.com"); // attributes without attributeValue child should be ignored should(profile).not.have.property("evilcorp.roles"); - - fakeClock.restore(); }); it("removes InResponseTo value if response validation fails", async () => { @@ -1830,24 +517,21 @@ describe("passport-saml /", function () { // Mock the SAML request being passed through Passport-SAML await samlObj.cacheProvider.saveAsync(requestId, new Date().toISOString()); - try { - await samlObj.validatePostResponseAsync(container); - should.not.exist(true); - } catch (err) { - should.exist(err); - err!.message!.should.match("Invalid signature"); - } - try { - await samlObj.validatePostResponseAsync(container); - should.not.exist(true); - } catch (err) { - should.exist(err); - err!.message!.should.match("InResponseTo is not valid"); - } + + await assert.rejects(samlObj.validatePostResponseAsync(container), { + message: /Invalid signature/, + }); + + await assert.rejects(samlObj.validatePostResponseAsync(container), { + message: /InResponseTo is not valid/, + }); }); describe("validatePostResponse xml signature checks /", function () { + const ALT_TEST_CERT = + "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"; let fakeClock: sinon.SinonFakeTimers; + beforeEach(function () { fakeClock = sinon.useFakeTimers(Date.parse("2014-05-28T00:13:09Z")); }); @@ -1859,6 +543,32 @@ describe("passport-saml /", function () { entryPoint: "https://app.onelogin.com/trust/saml2/http-post/sso/371755", cert: TEST_CERT, }; + const noCertSamlConfig = { + entryPoint: "https://app.onelogin.com/trust/saml2/http-post/sso/371755", + } as SamlConfig; + const badCertSamlConfig = { + entryPoint: "https://app.onelogin.com/trust/saml2/http-post/sso/371755", + cert: BAD_TEST_CERT, + }; + + it("must have a cert to construct a SAML object", function () { + try { + new SAML(noCertSamlConfig); + } catch (err) { + should.exist(err); + err!.message!.should.match(/cert is required/); + } + }); + + it("must have a valid cert to construct a SAML object", function () { + try { + new SAML(badCertSamlConfig); + } catch (err) { + should.exist(err); + err!.message!.should.match(/cert is required/); + } + }); + it("valid onelogin xml document should validate", async () => { const xml = 'https://app.onelogin.com/saml/metadata/371755' + @@ -1873,26 +583,62 @@ describe("passport-saml /", function () { const { profile } = await samlObj.validatePostResponseAsync(container); profile!.nameID!.should.startWith("ploer"); }); - - it("onelogin xml document with altered assertion should fail", async () => { + it("valid onelogin xml document should fail with no cert", function () { const xml = 'https://app.onelogin.com/saml/metadata/371755' + 'https://app.onelogin.com/saml/metadata/371755DCnPTQYBb1hKspbe6fg1U3q8xn4=e0+aFomA0+JAY0f9tKqzIuqIVSSw7LiFUsneEDKPBWdiTz1sMdgr/2y1e9+rjaS2mRmCi/vSQLY3zTYz0hp6nJNU19+TWoXo9kHQyWT4KkeQL4Xs/gZ/AoKC20iHVKtpPps0IQ0Ml/qRoouSitt6Sf/WDz2LV/pWcH2hx5tv3xSw36hK2NQc7qw7r1mEXnvcjXReYo8rrVf7XHGGxNoRIEICUIi110uvsWemSXf0Z0dyb0FVYOWuSsQMDlzNpheADBifFO4UTfSEhFZvn8kVCGZUIwrbOhZ2d/+YEtgyuTg+qtslgfy4dwd4TvEcfuRzQTazeefprSFyiQckAXOjcw==' + TEST_CERT + - 'ben@subspacesw.com{audience}urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport' + + 'ploer@subspacesw.com{audience}urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport' + ""; const base64xml = Buffer.from(xml).toString("base64"); const container = { SAMLResponse: base64xml }; - const samlObj = new SAML(samlConfig); try { - await samlObj.validatePostResponseAsync(container); - should.not.exist(true); + const samlObj = new SAML(noCertSamlConfig); } catch (err) { should.exist(err); - err!.message!.should.match("Invalid signature"); + err!.message!.should.match(/cert is required/); } }); + it("onelogin xml document with altered NameID should fail", async () => { + const xml = + 'https://app.onelogin.com/saml/metadata/371755' + + 'https://app.onelogin.com/saml/metadata/371755DCnPTQYBb1hKspbe6fg1U3q8xn4=e0+aFomA0+JAY0f9tKqzIuqIVSSw7LiFUsneEDKPBWdiTz1sMdgr/2y1e9+rjaS2mRmCi/vSQLY3zTYz0hp6nJNU19+TWoXo9kHQyWT4KkeQL4Xs/gZ/AoKC20iHVKtpPps0IQ0Ml/qRoouSitt6Sf/WDz2LV/pWcH2hx5tv3xSw36hK2NQc7qw7r1mEXnvcjXReYo8rrVf7XHGGxNoRIEICUIi110uvsWemSXf0Z0dyb0FVYOWuSsQMDlzNpheADBifFO4UTfSEhFZvn8kVCGZUIwrbOhZ2d/+YEtgyuTg+qtslgfy4dwd4TvEcfuRzQTazeefprSFyiQckAXOjcw==' + + TEST_CERT + + 'aaaaaaaa@bbbbb.local{audience}urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport' + + ""; + const base64xml = Buffer.from(xml).toString("base64"); + const container = { SAMLResponse: base64xml }; + const samlObj = new SAML(samlConfig); + await assert.rejects(samlObj.validatePostResponseAsync(container), /Invalid signature/); + }); + + it("onelogin xml document with altered assertion name should fail", async () => { + const xml = + 'https://app.onelogin.com/saml/metadata/371755' + + 'https://app.onelogin.com/saml/metadata/371755DCnPTQYBb1hKspbe6fg1U3q8xn4=e0+aFomA0+JAY0f9tKqzIuqIVSSw7LiFUsneEDKPBWdiTz1sMdgr/2y1e9+rjaS2mRmCi/vSQLY3zTYz0hp6nJNU19+TWoXo9kHQyWT4KkeQL4Xs/gZ/AoKC20iHVKtpPps0IQ0Ml/qRoouSitt6Sf/WDz2LV/pWcH2hx5tv3xSw36hK2NQc7qw7r1mEXnvcjXReYo8rrVf7XHGGxNoRIEICUIi110uvsWemSXf0Z0dyb0FVYOWuSsQMDlzNpheADBifFO4UTfSEhFZvn8kVCGZUIwrbOhZ2d/+YEtgyuTg+qtslgfy4dwd4TvEcfuRzQTazeefprSFyiQckAXOjcw==' + + TEST_CERT + + 'aaaaaaaa@bbbbb.local{audience}urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport' + + ""; + const base64xml = Buffer.from(xml).toString("base64"); + const container = { SAMLResponse: base64xml }; + const samlObj = new SAML(samlConfig); + await assert.rejects(samlObj.validatePostResponseAsync(container), /Invalid signature/); + }); + + it("onelogin xml document with altered assertion should fail", async () => { + const xml = + 'https://app.onelogin.com/saml/metadata/371755' + + 'https://app.onelogin.com/saml/metadata/371755DCnPTQYBb1hKspbe6fg1U3q8xn4=e0+aFomA0+JAY0f9tKqzIuqIVSSw7LiFUsneEDKPBWdiTz1sMdgr/2y1e9+rjaS2mRmCi/vSQLY3zTYz0hp6nJNU19+TWoXo9kHQyWT4KkeQL4Xs/gZ/AoKC20iHVKtpPps0IQ0Ml/qRoouSitt6Sf/WDz2LV/pWcH2hx5tv3xSw36hK2NQc7qw7r1mEXnvcjXReYo8rrVf7XHGGxNoRIEICUIi110uvsWemSXf0Z0dyb0FVYOWuSsQMDlzNpheADBifFO4UTfSEhFZvn8kVCGZUIwrbOhZ2d/+YEtgyuTg+qtslgfy4dwd4TvEcfuRzQTazeefprSFyiQckAXOjcw==' + + TEST_CERT + + 'ben@subspacesw.com{audience}urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport' + + ""; + const base64xml = Buffer.from(xml).toString("base64"); + const container = { SAMLResponse: base64xml }; + const samlObj = new SAML(samlConfig); + await assert.rejects(samlObj.validatePostResponseAsync(container), /Invalid signature/); + }); + it("onelogin xml document with duplicate altered assertion should fail", async () => { const xml = 'https://app.onelogin.com/saml/metadata/371755' + @@ -1906,13 +652,7 @@ describe("passport-saml /", function () { const base64xml = Buffer.from(xml).toString("base64"); const container = { SAMLResponse: base64xml }; const samlObj = new SAML(samlConfig); - try { - await samlObj.validatePostResponseAsync(container); - should.not.exist(true); - } catch (err) { - should.exist(err); - err!.message!.should.match(/Invalid signature/); - } + await assert.rejects(samlObj.validatePostResponseAsync(container), /Invalid signature/); }); it("onelogin xml document with extra unsigned & altered assertion should fail", async () => { @@ -1926,13 +666,7 @@ describe("passport-saml /", function () { const base64xml = Buffer.from(xml).toString("base64"); const container = { SAMLResponse: base64xml }; const samlObj = new SAML(samlConfig); - try { - await samlObj.validatePostResponseAsync(container); - should.not.exist(true); - } catch (err) { - should.exist(err); - err!.message!.should.match(/Invalid signature/); - } + await assert.rejects(samlObj.validatePostResponseAsync(container), /Invalid signature/); }); it("onelogin xml document with extra nexted assertion should fail", async () => { @@ -1949,13 +683,7 @@ describe("passport-saml /", function () { const base64xml = Buffer.from(xml).toString("base64"); const container = { SAMLResponse: base64xml }; const samlObj = new SAML(samlConfig); - try { - await samlObj.validatePostResponseAsync(container); - should.not.exist(true); - } catch (err) { - should.exist(err); - err!.message!.should.match("Invalid signature"); - } + await assert.rejects(samlObj.validatePostResponseAsync(container), /Invalid signature/); }); it("multiple certs should validate with one of the certs", async () => { @@ -1977,7 +705,7 @@ describe("passport-saml /", function () { }); it("cert as a function should validate with the returned cert", async () => { - const functionCertSamlConfig: Partial = { + const functionCertSamlConfig: SamlConfig = { entryPoint: samlConfig.entryPoint, cert: function (callback) { callback(null, samlConfig.cert); @@ -1997,7 +725,7 @@ describe("passport-saml /", function () { }); it("cert as a function should validate with one of the returned certs", async () => { - const functionMultiCertSamlConfig: Partial = { + const functionMultiCertSamlConfig: SamlConfig = { entryPoint: samlConfig.entryPoint, cert: function (callback) { callback(null, [ALT_TEST_CERT, samlConfig.cert]); @@ -2018,7 +746,7 @@ describe("passport-saml /", function () { it("cert as a function should return an error if the cert function returns an error", async () => { const errorToReturn = new Error("test"); - const functionErrorCertSamlConfig: Partial = { + const functionErrorCertSamlConfig: SamlConfig = { entryPoint: samlConfig.entryPoint, cert: function (callback) { callback(errorToReturn); @@ -2048,8 +776,8 @@ describe("passport-saml /", function () { const spNameQualifier = "https://sp.example.org/sp/entity"; const format = "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent"; const xml = - "" + - '' + + '' + + '' + "" + '' + "" + @@ -2067,9 +795,14 @@ describe("passport-saml /", function () { "" + "" + ""; - const base64xml = Buffer.from(xml).toString("base64"); + + const signingKey = fs.readFileSync(__dirname + "/static/key.pem"); + const signingCert = fs.readFileSync(__dirname + "/static/cert.pem", "utf-8"); + const signedXml = signXmlResponse(xml, { privateKey: signingKey }); + + const base64xml = Buffer.from(signedXml).toString("base64"); const container = { SAMLResponse: base64xml }; - const samlObj = new SAML({}); + const samlObj = new SAML({ cert: signingCert }); const { profile } = await samlObj.validatePostResponseAsync(container); const eptid = profile!["urn:oid:1.3.6.1.4.1.5923.1.1.1.10"] as any; const nameid = eptid["NameID"][0]; @@ -2078,27 +811,65 @@ describe("passport-saml /", function () { nameid.$.SPNameQualifier.should.equal(spNameQualifier); nameid.$.Format.should.equal(format); }); - }); - it("An undefined value given with an object should still be undefined", async () => { - const xml = - "" + - '' + - "" + - '' + - '' + - "" + - "" + - "" + - ""; - const base64xml = Buffer.from(xml).toString("base64"); - const container = { SAMLResponse: base64xml }; - const samlObj = new SAML({}); - const { profile } = await samlObj.validatePostResponseAsync(container); - should(profile!["attributeName"]).be.undefined(); + it("XML AttributeValue without signature should throw", async () => { + const nameid_opaque_string = "*******************************"; + const nameQualifier = "https://idp.example.org/idp/saml"; + const spNameQualifier = "https://sp.example.org/sp/entity"; + const format = "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent"; + const xml = + "" + + '' + + "" + + '' + + "" + + '' + + nameid_opaque_string + + "" + + "" + + "" + + "" + + "" + + ""; + const base64xml = Buffer.from(xml).toString("base64"); + const container = { SAMLResponse: base64xml }; + const samlObj = new SAML({ cert: TEST_CERT }); + await assert.rejects(samlObj.validatePostResponseAsync(container), { + message: "Invalid signature", + }); + }); + + it("An undefined value given with an object should still be undefined", async () => { + const xml = + '' + + '' + + "" + + '' + + '' + + "" + + "" + + "" + + ""; + + const signingKey = fs.readFileSync(__dirname + "/static/key.pem"); + const signingCert = fs.readFileSync(__dirname + "/static/cert.pem", "utf-8"); + const signedXml = signXmlResponse(xml, { privateKey: signingKey }); + + const base64xml = Buffer.from(signedXml).toString("base64"); + const container = { SAMLResponse: base64xml }; + const samlObj = new SAML({ cert: signingCert }); + const { profile } = await samlObj.validatePostResponseAsync(container); + should(profile!["attributeName"]).be.undefined(); + }); }); }); @@ -2112,18 +883,20 @@ describe("passport-saml /", function () { }); it("acme_tools request signed with sha256", async () => { - const samlConfig: Partial = { + const samlConfig: SamlConfig = { entryPoint: "https://adfs.acme_tools.com/adfs/ls/", issuer: "acme_tools_com", callbackUrl: "https://relyingparty/adfs/postResponse", privateCert: fs.readFileSync(__dirname + "/static/acme_tools_com.key", "utf-8"), - authnContext: + authnContext: [ "http://schemas.microsoft.com/ws/2008/06/identity/authenticationmethod/password", + ], identifierFormat: null, signatureAlgorithm: "sha256", additionalParams: { customQueryStringParam: "CustomQueryStringParamValue", }, + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); samlObj.generateUniqueID = function () { @@ -2138,18 +911,20 @@ describe("passport-saml /", function () { qry.customQueryStringParam?.should.match("CustomQueryStringParamValue"); }); it("acme_tools request signed with sha256 when using privateKey", async () => { - const samlConfig: Partial = { + const samlConfig: SamlConfig = { entryPoint: "https://adfs.acme_tools.com/adfs/ls/", issuer: "acme_tools_com", callbackUrl: "https://relyingparty/adfs/postResponse", privateKey: fs.readFileSync(__dirname + "/static/acme_tools_com.key", "utf-8"), - authnContext: + authnContext: [ "http://schemas.microsoft.com/ws/2008/06/identity/authenticationmethod/password", + ], identifierFormat: null, signatureAlgorithm: "sha256", additionalParams: { customQueryStringParam: "CustomQueryStringParamValue", }, + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); samlObj.generateUniqueID = function () { @@ -2164,17 +939,19 @@ describe("passport-saml /", function () { qry.customQueryStringParam?.should.match("CustomQueryStringParamValue"); }); it("acme_tools request not signed if missing entry point", async () => { - const samlConfig: Partial = { + const samlConfig: SamlConfig = { entryPoint: "", issuer: "acme_tools_com", callbackUrl: "https://relyingparty/adfs/postResponse", privateCert: fs.readFileSync(__dirname + "/static/acme_tools_com.key", "utf-8"), - authnContext: + authnContext: [ "http://schemas.microsoft.com/ws/2008/06/identity/authenticationmethod/password", + ], signatureAlgorithm: "sha256", additionalParams: { customQueryStringParam: "CustomQueryStringParamValue", }, + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); samlObj.generateUniqueID = function () { @@ -2184,21 +961,23 @@ describe("passport-saml /", function () { const request = 'onelogin_samlurn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport'; await assert.rejects(samlObj.requestToUrlAsync(request, null, "authorize", {}), { - message: '"entryPoint" config parameter is required for signed messages', + message: "entryPoint is required", }); }); it("acme_tools request not signed if missing entry point when using privateKey", async () => { - const samlConfig: Partial = { + const samlConfig: SamlConfig = { entryPoint: "", issuer: "acme_tools_com", callbackUrl: "https://relyingparty/adfs/postResponse", privateKey: fs.readFileSync(__dirname + "/static/acme_tools_com.key", "utf-8"), - authnContext: + authnContext: [ "http://schemas.microsoft.com/ws/2008/06/identity/authenticationmethod/password", + ], signatureAlgorithm: "sha256", additionalParams: { customQueryStringParam: "CustomQueryStringParamValue", }, + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); samlObj.generateUniqueID = function () { @@ -2208,22 +987,23 @@ describe("passport-saml /", function () { const request = 'onelogin_samlurn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport'; await assert.rejects(samlObj.requestToUrlAsync(request, null, "authorize", {}), { - message: '"entryPoint" config parameter is required for signed messages', + message: "entryPoint is required", }); }); it("acme_tools request signed with sha1", async () => { - const samlConfig: Partial = { + const samlConfig: SamlConfig = { entryPoint: "https://adfs.acme_tools.com/adfs/ls/", issuer: "acme_tools_com", callbackUrl: "https://relyingparty/adfs/postResponse", - privateCert: fs.readFileSync(__dirname + "/static/acme_tools_com.key", "utf-8"), - authnContext: + privateKey: fs.readFileSync(__dirname + "/static/acme_tools_com.key", "utf-8"), + authnContext: [ "http://schemas.microsoft.com/ws/2008/06/identity/authenticationmethod/password", - identifierFormat: null, + ], signatureAlgorithm: "sha1", additionalParams: { customQueryStringParam: "CustomQueryStringParamValue", }, + cert: fs.readFileSync(__dirname + "/static/acme_tools_com.cert", "utf-8"), }; const samlObj = new SAML(samlConfig); samlObj.generateUniqueID = function () { @@ -2233,23 +1013,25 @@ describe("passport-saml /", function () { const qry = querystring.parse(url.parse(authorizeUrl).query || ""); qry.SigAlg?.should.match("http://www.w3.org/2000/09/xmldsig#rsa-sha1"); qry.Signature?.should.match( - "MeFo+LjufxP5A+sCRwzR/YH/RV6W14aYSFjUdie62JxkI6hDcVhoSZQUJ3wtWMhL59gJj05tTFnXAZRqUQVsavyy41cmUZVeCsat0gaHBQOILXpp9deB0iSJt1EVQTOJkVx8uu2/WYu/bBiH7w2bpwuCf1gJhlqZb/ca3B6yjHSMjnnVfc2LbNPWHpE5464lrs79VjDXf9GQWfrBr95dh3P51IAb7C+77KDWQUl9WfZfyyuEgS83vyZ0UGOxT4AObJ6NOcLs8+iidDdWJJkBaKQev6U+AghCjLQUYOrflivLIIyqATKu2q9PbOse6Phmnxok50+broXSG23+e+742Q==" + "GrRJDEmwB74g4CjGS4gjDhzR9Mnpo7S1DJyhaLxVRA97tumydsrJNpqbKDAsepnoFcZeS+mWn3hZSE/blsyCUJn5+010MsgQ8KWmRgaFEYPOfbBa2KK1atXNN8zcSdNukpd/rI17fB1HDeCPG8t+rtaE/QviL7DpsF6hGXbWSTi8eSRSNmLKFIntvS81CNiZdub1NI8hSd/rU873u7RfWnv6ChPltCs41Znj49ke6UJaSrHX7kNlnbzqw5WLJp73d3/yT2Yew+xpGDKAGrjYtbQEY0zZ8chfKWyTobLV9vNF1DCFRDeZbLrCzL29elo/aZ8BuIEdTNv/IOZoOMZxRA==" ); qry.customQueryStringParam?.should.match("CustomQueryStringParamValue"); }); it("acme_tools request signed with sha1 when using privateKey", async () => { - const samlConfig: Partial = { + const samlConfig: SamlConfig = { entryPoint: "https://adfs.acme_tools.com/adfs/ls/", issuer: "acme_tools_com", callbackUrl: "https://relyingparty/adfs/postResponse", privateKey: fs.readFileSync(__dirname + "/static/acme_tools_com.key", "utf-8"), - authnContext: + authnContext: [ "http://schemas.microsoft.com/ws/2008/06/identity/authenticationmethod/password", + ], identifierFormat: null, signatureAlgorithm: "sha1", additionalParams: { customQueryStringParam: "CustomQueryStringParamValue", }, + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); samlObj.generateUniqueID = function () { @@ -2269,6 +1051,7 @@ describe("passport-saml /", function () { it("should not pass any additional params by default", function () { const samlConfig = { entryPoint: "https://app.onelogin.com/trust/saml2/http-post/sso/371755", + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); @@ -2281,6 +1064,7 @@ describe("passport-saml /", function () { it("should not pass any additional params by default apart from the RelayState in request query", function () { const samlConfig = { entryPoint: "https://app.onelogin.com/trust/saml2/http-post/sso/371755", + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); @@ -2298,6 +1082,7 @@ describe("passport-saml /", function () { it("should not pass any additional params by default apart from the RelayState in request body", function () { const samlConfig = { entryPoint: "https://app.onelogin.com/trust/saml2/http-post/sso/371755", + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); @@ -2318,6 +1103,7 @@ describe("passport-saml /", function () { additionalParams: { queryParam: "queryParamValue", }, + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); @@ -2334,6 +1120,7 @@ describe("passport-saml /", function () { additionalAuthorizeParams: { queryParam: "queryParamValue", }, + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); @@ -2354,6 +1141,7 @@ describe("passport-saml /", function () { additionalLogoutParams: { queryParam: "queryParamValue", }, + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); @@ -2380,6 +1168,7 @@ describe("passport-saml /", function () { additionalLogoutParams: { queryParam2: "queryParamValueLogout", }, + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); @@ -2413,6 +1202,7 @@ describe("passport-saml /", function () { additionalLogoutParams: { queryParam2: "queryParamValueLogout", }, + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); const options = { @@ -2458,6 +1248,7 @@ describe("passport-saml /", function () { additionalLogoutParams: { queryParam: "queryParamValueLogout", }, + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); @@ -2485,6 +1276,7 @@ describe("passport-saml /", function () { additionalLogoutParams: { queryParam: "queryParamValueLogout", }, + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); const options = { @@ -2510,24 +1302,36 @@ describe("passport-saml /", function () { additionalLogoutParams.should.containEql({ queryParam: "queryParamRuntimeValue" }); }); - it("should check the value of the option `RACComparison`", function () { - const samlObjBadComparisonType = new SAML({ RACComparison: "bad_value" as any }); + it("should check the value of the option `racComparison`", function () { + assert.throws( + () => { + new SAML({ + racComparison: "bad_value" as RacComparision, + cert: FAKE_CERT, + }).options; + }, + { message: "racComparison must be one of ['exact', 'minimum', 'maximum', 'better']" } + ); + + const samlObjBadComparisonType = new SAML({ + cert: FAKE_CERT, + }); should.equal( - samlObjBadComparisonType.options.RACComparison, + samlObjBadComparisonType.options.racComparison, "exact", - "the default value of the option `RACComparison` must be exact" + "the default value of the option `racComparison` must be exact" ); - const validComparisonTypes: RACComparision[] = ["exact", "minimum", "maximum", "better"]; + const validComparisonTypes: RacComparision[] = ["exact", "minimum", "maximum", "better"]; let samlObjValidComparisonType: SAML; - validComparisonTypes.forEach(function (RACComparison) { - samlObjValidComparisonType = new SAML({ RACComparison: RACComparison }); - should.equal(samlObjValidComparisonType.options.RACComparison, RACComparison); + validComparisonTypes.forEach(function (racComparison) { + samlObjValidComparisonType = new SAML({ racComparison, cert: FAKE_CERT }); + should.equal(samlObjValidComparisonType.options.racComparison, racComparison); }); }); }); - describe("InResponseTo validation checks /", function () { + describe("InResponseTo validation checks /", () => { let fakeClock: sinon.SinonFakeTimers; afterEach(function () { @@ -2702,20 +1506,21 @@ describe("passport-saml /", function () { should.not.exist(value); }); - describe("InResponseTo server cache expiration tests /", function () { + describe("InResponseTo server cache expiration tests /", () => { it("should expire a cached request id after the time", async () => { const requestId = "_dfab47d5d46374cd4b71"; const samlConfig = { validateInResponseTo: true, requestIdExpirationPeriodMs: 100, + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); // Mock the SAML request being passed through Passport-SAML await samlObj.cacheProvider.saveAsync(requestId, new Date().toISOString()); - await new Promise((resolve) => setTimeout(resolve, 300)); + await (() => new Promise((resolve) => setTimeout(resolve, 300)))(); const value = await samlObj.cacheProvider.getAsync(requestId); should.not.exist(value); }); @@ -2728,6 +1533,7 @@ describe("passport-saml /", function () { const samlConfig = { validateInResponseTo: true, requestIdExpirationPeriodMs: 100, + cert: FAKE_CERT, }; const samlObj = new SAML(samlConfig); @@ -2744,7 +1550,7 @@ describe("passport-saml /", function () { should.not.exist(value2); const value3 = await samlObj.cacheProvider.getAsync(requestId); should.exist(value3); - await new Promise((resolve) => setTimeout(resolve, 300)); + await (() => new Promise((resolve) => setTimeout(resolve, 300)))(); const value4 = await samlObj.cacheProvider.getAsync(requestId); should.not.exist(value4); }); @@ -2886,13 +1692,33 @@ describe("passport-saml /", function () { profile!.nameID!.should.startWith("ploer"); }); - it("onelogin xml document with audience and no AudienceRestriction should not pass", async function () { - const xml = - 'https://app.onelogin.com/saml/metadata/371755' + - 'https://app.onelogin.com/saml/metadata/371755DCnPTQYBb1hKspbe6fg1U3q8xn4=e0+aFomA0+JAY0f9tKqzIuqIVSSw7LiFUsneEDKPBWdiTz1sMdgr/2y1e9+rjaS2mRmCi/vSQLY3zTYz0hp6nJNU19+TWoXo9kHQyWT4KkeQL4Xs/gZ/AoKC20iHVKtpPps0IQ0Ml/qRoouSitt6Sf/WDz2LV/pWcH2hx5tv3xSw36hK2NQc7qw7r1mEXnvcjXReYo8rrVf7XHGGxNoRIEICUIi110uvsWemSXf0Z0dyb0FVYOWuSsQMDlzNpheADBifFO4UTfSEhFZvn8kVCGZUIwrbOhZ2d/+YEtgyuTg+qtslgfy4dwd4TvEcfuRzQTazeefprSFyiQckAXOjcw==' + - TEST_CERT + - 'ploer@subspacesw.comurn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport' + - ""; + it("onelogin xml document with audience and no AudienceRestriction should not pass", async () => { + const signingCert = fs.readFileSync(__dirname + "/static/cert.pem", "utf-8"); + const xml = ` + https://app.onelogin.com/saml/metadata/371755 + + + EiaOqK9GBBENUFaN2AVlYOvlq8E=vUf14oqiSWa2xhU1hZBEF3Z9JcYsVzWq+B1vXg0vQfN8GEfmooRogtA3oLs2SKhtpcVwEPuIVf6hRnEL713STMBbYxhnk/om+zMor82bQgn+eR/n3g3AWFPbLGxHbYXK06X47Vo+RRm5H8xVb9FiECXYs6CUCtVksAnitDp0pFgB8G5FKx2OwKALg1LNsKItkzWfI7yaQPKyywFwGgDqXVJYiD1v1HKb3JEvpiL96vVOYSI1+7j/Jy2brYJfs4ADnuAKEXVDgYdtaIQrGa+0x2W9KInCWgR+H40nBTHecE5NGeE01/s0is8nVbmSVrdpBpw44t2xcnp+TzozTGTm2g== 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 + + + + + https://app.onelogin.com/saml/metadata/371755 + + ploer@subspacesw.com + + + + + + + + urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport + + + +`; const base64xml = Buffer.from(xml).toString("base64"); const container = { SAMLResponse: base64xml }; @@ -2900,6 +1726,7 @@ describe("passport-saml /", function () { entryPoint: "https://app.onelogin.com/trust/saml2/http-post/sso/371755", audience: "http://sp.example.com", acceptedClockSkewMs: -1, + cert: signingCert, }; const samlObj = new SAML(samlConfig); await assert.rejects(samlObj.validatePostResponseAsync(container), { @@ -2908,12 +1735,36 @@ describe("passport-saml /", function () { }); it("onelogin xml document with audience not matching AudienceRestriction should not pass", async () => { - const xml = - 'https://app.onelogin.com/saml/metadata/371755' + - 'https://app.onelogin.com/saml/metadata/371755DCnPTQYBb1hKspbe6fg1U3q8xn4=e0+aFomA0+JAY0f9tKqzIuqIVSSw7LiFUsneEDKPBWdiTz1sMdgr/2y1e9+rjaS2mRmCi/vSQLY3zTYz0hp6nJNU19+TWoXo9kHQyWT4KkeQL4Xs/gZ/AoKC20iHVKtpPps0IQ0Ml/qRoouSitt6Sf/WDz2LV/pWcH2hx5tv3xSw36hK2NQc7qw7r1mEXnvcjXReYo8rrVf7XHGGxNoRIEICUIi110uvsWemSXf0Z0dyb0FVYOWuSsQMDlzNpheADBifFO4UTfSEhFZvn8kVCGZUIwrbOhZ2d/+YEtgyuTg+qtslgfy4dwd4TvEcfuRzQTazeefprSFyiQckAXOjcw==' + - TEST_CERT + - 'ploer@subspacesw.com{audience}urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport' + - ""; + const signingCert = fs.readFileSync(__dirname + "/static/cert.pem", "utf-8"); + const xml = ` + https://app.onelogin.com/saml/metadata/371755 + + + SYyNspaWBrl3SgQGlt8RysQRfXI=km4aqMCXkupbpp/YR2+dOD2BbnGKO1MDVRMPKSzSx3BwsXhBBYlFNx1ht46zZDSQF60iAHd/vHGcJV8V7QNCeuIgfmTNkh2jtcF5ghRNfmvgpLRwRt1dT/UqApzo8kdRKXcUu0yxziPKFoE6EEvF/NR+YV/aAngEH3dCbOsN1u56zBOa4DZ7EMoWgwmPodaHOgNy4xazv5+Cb+mQM8YC1060EvipIrRU28BWIb3teUlfHL3L8AMlyCqjkw21dkbVOcHNy080oWW+MkjMGbt6r3y2iwpDfJMk5R63T5fXFDIStbVD7ss2BzqGccBykHomm/hU9GYWoO+0kW/reLiXiw== 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 + + + + + https://app.onelogin.com/saml/metadata/371755 + + ploer@subspacesw.com + + + + + + + {audience} + + + + + urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport + + + +`; const base64xml = Buffer.from(xml).toString("base64"); const container = { SAMLResponse: base64xml }; @@ -2921,6 +1772,7 @@ describe("passport-saml /", function () { entryPoint: "https://app.onelogin.com/trust/saml2/http-post/sso/371755", audience: "http://sp.example.com", acceptedClockSkewMs: -1, + cert: signingCert, }; const samlObj = new SAML(samlConfig); await assert.rejects(samlObj.validatePostResponseAsync(container), { @@ -2929,12 +1781,36 @@ describe("passport-saml /", function () { }); it("onelogin xml document with audience matching AudienceRestriction should pass", async () => { - const xml = - 'https://app.onelogin.com/saml/metadata/371755' + - 'https://app.onelogin.com/saml/metadata/371755DCnPTQYBb1hKspbe6fg1U3q8xn4=e0+aFomA0+JAY0f9tKqzIuqIVSSw7LiFUsneEDKPBWdiTz1sMdgr/2y1e9+rjaS2mRmCi/vSQLY3zTYz0hp6nJNU19+TWoXo9kHQyWT4KkeQL4Xs/gZ/AoKC20iHVKtpPps0IQ0Ml/qRoouSitt6Sf/WDz2LV/pWcH2hx5tv3xSw36hK2NQc7qw7r1mEXnvcjXReYo8rrVf7XHGGxNoRIEICUIi110uvsWemSXf0Z0dyb0FVYOWuSsQMDlzNpheADBifFO4UTfSEhFZvn8kVCGZUIwrbOhZ2d/+YEtgyuTg+qtslgfy4dwd4TvEcfuRzQTazeefprSFyiQckAXOjcw==' + - TEST_CERT + - 'ploer@subspacesw.comhttp://sp.example.comurn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport' + - ""; + const signingCert = fs.readFileSync(__dirname + "/static/cert.pem", "utf-8"); + const xml = ` + https://app.onelogin.com/saml/metadata/371755 + + + SWMNMbWptW3RzRXBEHv4kvu3rbU=LiyXwB09CavCEDR3SkjRzuoUn2Mruk8pBfWyN1K7zefjbtahezIljOYIIumZAsC8hrVndeG7Pk2rE6pL04vcRcASmPlmyytb0yYwyjmhEhTR6nmfBMS0a9mwvQE5/4+TecVW4yWUcMd7m12EhWz8+RcmHRnKWSCsVDxlF0zPUHgJc8n6Yr489mNcRFGKpaWtcH9vEvf689jxNgdqXjS5SvSBJClZd6ir0KFH799etbY5TORx3p0zR+okq7ZP4A9XVcnHWZw4e3KBJ04xQ31fDcr2Cgi3qkLEaaj5HkKAE4PWZ/5G75VHFM3xAZ9rsVL5mwQAJRXFgNbSYCWOUZ4NCg== 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 + + + + + https://app.onelogin.com/saml/metadata/371755 + + ploer@subspacesw.com + + + + + + + http://sp.example.com + + + + + urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport + + + +`; const base64xml = Buffer.from(xml).toString("base64"); const container = { SAMLResponse: base64xml }; @@ -2942,6 +1818,7 @@ describe("passport-saml /", function () { entryPoint: "https://app.onelogin.com/trust/saml2/http-post/sso/371755", audience: "http://sp.example.com", acceptedClockSkewMs: -1, + cert: signingCert, }; const samlObj = new SAML(samlConfig); @@ -3074,6 +1951,7 @@ describe("passport-saml /", function () { "jF3SNJh0SmHoT62vc+cJqPxMDP6E7Q1nZxsEyaAkKr2H4dSM4SlRm0VB+bS+jXsz\n" + "PCiRGSm8eupuxfix05LMMreo4mC7e3Ir4JhdCsXxAMZIvbNyXcvUMA==\n" + "-----END CERTIFICATE-----\n", + cert: FAKE_CERT, }); const request = 'onelogin_samlurn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport'; @@ -3111,6 +1989,7 @@ describe("passport-saml /", function () { "jF3SNJh0SmHoT62vc+cJqPxMDP6E7Q1nZxsEyaAkKr2H4dSM4SlRm0VB+bS+jXsz\n" + "PCiRGSm8eupuxfix05LMMreo4mC7e3Ir4JhdCsXxAMZIvbNyXcvUMA==\n" + "-----END CERTIFICATE-----\n", + cert: FAKE_CERT, }); const request = 'onelogin_samlurn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport'; @@ -3123,6 +2002,7 @@ describe("passport-saml /", function () { describe("validateRedirect()", function () { describe("idp slo", function () { let samlObj: SAML; + let fakeClock: sinon.SinonFakeTimers; beforeEach(function () { samlObj = new SAML({ cert: fs.readFileSync(__dirname + "/static/acme_tools_com.cert", "ascii"), @@ -3132,10 +2012,10 @@ describe("validateRedirect()", function () { {}, JSON.parse(fs.readFileSync(__dirname + "/static/idp_slo_redirect.json", "utf8")) ); - this.clock = sinon.useFakeTimers(Date.parse("2018-04-11T14:08:00Z")); + fakeClock = sinon.useFakeTimers(Date.parse("2018-04-11T14:08:00Z")); }); afterEach(function () { - this.clock.restore(); + fakeClock.restore(); }); it("errors if bad xml", async function () { const body = { @@ -3154,7 +2034,9 @@ describe("validateRedirect()", function () { ); }); it("errors if request has expired", async function () { - this.clock.restore(); + fakeClock.restore(); + fakeClock = sinon.useFakeTimers(Date.parse("2100-04-11T14:08:00Z")); + await assert.rejects( samlObj.validateRedirectAsync(this.request, this.request.originalQuery), { message: "SAML assertion expired" } @@ -3164,7 +2046,7 @@ describe("validateRedirect()", function () { this.request.Signature = "foo"; await assert.rejects( samlObj.validateRedirectAsync(this.request, this.request.originalQuery), - { message: "Invalid signature" } + { message: "Invalid query signature" } ); }); it("returns profile for valid signature including session index", async function () { @@ -3183,6 +2065,7 @@ describe("validateRedirect()", function () { }); describe("sp slo", function () { let samlObj: SAML; + beforeEach(function () { samlObj = new SAML({ cert: fs.readFileSync(__dirname + "/static/acme_tools_com.cert", "ascii"), @@ -3193,10 +2076,8 @@ describe("validateRedirect()", function () { {}, JSON.parse(fs.readFileSync(__dirname + "/static/sp_slo_redirect.json", "utf8")) ); - this.clock = sinon.useFakeTimers(Date.parse("2018-04-11T14:08:00Z")); }); afterEach(async function () { - this.clock.restore(); await samlObj.cacheProvider.removeAsync("_79db1e7ad12ca1d63e5b"); }); it("errors if bad xml", async function () { @@ -3235,7 +2116,7 @@ describe("validateRedirect()", function () { this.request.Signature = "foo"; await assert.rejects( samlObj.validateRedirectAsync(this.request, this.request.originalQuery), - { message: "Invalid signature" } + { message: "Invalid query signature" } ); }); diff --git a/test/types.ts b/test/types.ts new file mode 100644 index 00000000..65bfd848 --- /dev/null +++ b/test/types.ts @@ -0,0 +1,26 @@ +import { SamlConfig } from "../src/passport-saml/types"; + +// a certificate which is re-used by several tests +export const TEST_CERT = + "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"; + +export const FAKE_CERT = "fake cert"; +export interface CapturedCheck { + samlRequest?: any; + result?: any; + name: string; + expectedStatusCode: number; + samlResponse?: any; + config: SamlConfig; + expectedNameIDStartsWith?: string; + mockDate: string; +} + +export interface SamlCheck { + samlRequest?: any; + result?: any; + name: string; + samlResponse?: any; + config: SamlConfig; + expectedNameIDStartsWith?: string; +}