72c8b138e1
Closes #3519
427 lines
29 KiB
PHP
427 lines
29 KiB
PHP
<?php
|
|
|
|
namespace Tests\Auth;
|
|
|
|
use BookStack\Auth\Role;
|
|
use BookStack\Auth\User;
|
|
use Tests\TestCase;
|
|
|
|
class Saml2Test extends TestCase
|
|
{
|
|
protected function setUp(): void
|
|
{
|
|
parent::setUp();
|
|
// Set default config for SAML2
|
|
config()->set([
|
|
'auth.method' => 'saml2',
|
|
'auth.defaults.guard' => 'saml2',
|
|
'saml2.name' => 'SingleSignOn-Testing',
|
|
'saml2.email_attribute' => 'email',
|
|
'saml2.display_name_attributes' => ['first_name', 'last_name'],
|
|
'saml2.external_id_attribute' => 'uid',
|
|
'saml2.user_to_groups' => false,
|
|
'saml2.group_attribute' => 'user_groups',
|
|
'saml2.remove_from_groups' => false,
|
|
'saml2.onelogin_overrides' => null,
|
|
'saml2.onelogin.idp.entityId' => 'http://saml.local/saml2/idp/metadata.php',
|
|
'saml2.onelogin.idp.singleSignOnService.url' => 'http://saml.local/saml2/idp/SSOService.php',
|
|
'saml2.onelogin.idp.singleLogoutService.url' => 'http://saml.local/saml2/idp/SingleLogoutService.php',
|
|
'saml2.autoload_from_metadata' => false,
|
|
'saml2.onelogin.idp.x509cert' => $this->testCert,
|
|
'saml2.onelogin.debug' => false,
|
|
'saml2.onelogin.security.requestedAuthnContext' => true,
|
|
]);
|
|
}
|
|
|
|
public function test_metadata_endpoint_displays_xml_as_expected()
|
|
{
|
|
$req = $this->get('/saml2/metadata');
|
|
$req->assertHeader('Content-Type', 'text/xml; charset=UTF-8');
|
|
$req->assertSee('md:EntityDescriptor');
|
|
$req->assertSee(url('/saml2/acs'));
|
|
}
|
|
|
|
public function test_onelogin_overrides_functions_as_expected()
|
|
{
|
|
$json = '{"sp": {"assertionConsumerService": {"url": "https://example.com/super-cats"}}, "contactPerson": {"technical": {"givenName": "Barry Scott", "emailAddress": "barry@example.com"}}}';
|
|
config()->set(['saml2.onelogin_overrides' => $json]);
|
|
|
|
$req = $this->get('/saml2/metadata');
|
|
$req->assertSee('https://example.com/super-cats');
|
|
$req->assertSee('md:ContactPerson');
|
|
$req->assertSee('<md:GivenName>Barry Scott</md:GivenName>', false);
|
|
}
|
|
|
|
public function test_login_option_shows_on_login_page()
|
|
{
|
|
$req = $this->get('/login');
|
|
$req->assertSeeText('SingleSignOn-Testing');
|
|
$this->withHtml($req)->assertElementExists('form[action$="/saml2/login"][method=POST] button');
|
|
}
|
|
|
|
public function test_login()
|
|
{
|
|
$req = $this->post('/saml2/login');
|
|
$redirect = $req->headers->get('location');
|
|
$this->assertStringStartsWith('http://saml.local/saml2/idp/SSOService.php', $redirect, 'Login redirects to SSO location');
|
|
|
|
config()->set(['saml2.onelogin.strict' => false]);
|
|
$this->assertFalse($this->isAuthenticated());
|
|
|
|
$acsPost = $this->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
|
|
$redirect = $acsPost->headers->get('Location');
|
|
$acsId = explode('?id=', $redirect)[1];
|
|
$this->assertTrue(strlen($acsId) > 12);
|
|
|
|
$this->assertStringContainsString('/saml2/acs?id=', $redirect);
|
|
$this->assertTrue(cache()->has('saml2_acs:' . $acsId));
|
|
|
|
$acsGet = $this->get($redirect);
|
|
$acsGet->assertRedirect('/');
|
|
$this->assertFalse(cache()->has('saml2_acs:' . $acsId));
|
|
|
|
$this->assertTrue($this->isAuthenticated());
|
|
$this->assertDatabaseHas('users', [
|
|
'email' => 'user@example.com',
|
|
'external_auth_id' => 'user',
|
|
'email_confirmed' => false,
|
|
'name' => 'Barry Scott',
|
|
]);
|
|
}
|
|
|
|
public function test_acs_process_id_randomly_generated()
|
|
{
|
|
$acsPost = $this->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
|
|
$redirectA = $acsPost->headers->get('Location');
|
|
|
|
$acsPost = $this->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
|
|
$redirectB = $acsPost->headers->get('Location');
|
|
|
|
$this->assertFalse($redirectA === $redirectB);
|
|
}
|
|
|
|
public function test_process_acs_endpoint_cant_be_called_with_invalid_id()
|
|
{
|
|
$resp = $this->get('/saml2/acs');
|
|
$resp->assertRedirect('/login');
|
|
$this->followRedirects($resp)->assertSeeText('Login using SingleSignOn-Testing failed, system did not provide successful authorization');
|
|
|
|
$resp = $this->get('/saml2/acs?id=abc123');
|
|
$resp->assertRedirect('/login');
|
|
$this->followRedirects($resp)->assertSeeText('Login using SingleSignOn-Testing failed, system did not provide successful authorization');
|
|
}
|
|
|
|
public function test_group_role_sync_on_login()
|
|
{
|
|
config()->set([
|
|
'saml2.onelogin.strict' => false,
|
|
'saml2.user_to_groups' => true,
|
|
'saml2.remove_from_groups' => false,
|
|
]);
|
|
|
|
$memberRole = Role::factory()->create(['external_auth_id' => 'member']);
|
|
$adminRole = Role::getSystemRole('admin');
|
|
|
|
$this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
|
|
$user = User::query()->where('external_auth_id', '=', 'user')->first();
|
|
|
|
$userRoleIds = $user->roles()->pluck('id');
|
|
$this->assertContains($memberRole->id, $userRoleIds, 'User was assigned to member role');
|
|
$this->assertContains($adminRole->id, $userRoleIds, 'User was assigned to admin role');
|
|
}
|
|
|
|
public function test_group_role_sync_removal_option_works_as_expected()
|
|
{
|
|
config()->set([
|
|
'saml2.onelogin.strict' => false,
|
|
'saml2.user_to_groups' => true,
|
|
'saml2.remove_from_groups' => true,
|
|
]);
|
|
|
|
$acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
|
|
$user = User::query()->where('external_auth_id', '=', 'user')->first();
|
|
|
|
$randomRole = Role::factory()->create(['external_auth_id' => 'random']);
|
|
$user->attachRole($randomRole);
|
|
$this->assertContains($randomRole->id, $user->roles()->pluck('id'));
|
|
|
|
auth()->logout();
|
|
$acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
|
|
$this->assertNotContains($randomRole->id, $user->roles()->pluck('id'));
|
|
}
|
|
|
|
public function test_logout_link_directs_to_saml_path()
|
|
{
|
|
config()->set([
|
|
'saml2.onelogin.strict' => false,
|
|
]);
|
|
|
|
$resp = $this->actingAs($this->getEditor())->get('/');
|
|
$this->withHtml($resp)->assertElementContains('form[action$="/saml2/logout"] button', 'Logout');
|
|
}
|
|
|
|
public function test_logout_sls_flow()
|
|
{
|
|
config()->set([
|
|
'saml2.onelogin.strict' => false,
|
|
]);
|
|
|
|
$handleLogoutResponse = function () {
|
|
$this->assertTrue($this->isAuthenticated());
|
|
|
|
$req = $this->get('/saml2/sls');
|
|
$req->assertRedirect('/');
|
|
$this->assertFalse($this->isAuthenticated());
|
|
};
|
|
|
|
$this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
|
|
|
|
$req = $this->post('/saml2/logout');
|
|
$redirect = $req->headers->get('location');
|
|
$this->assertStringStartsWith('http://saml.local/saml2/idp/SingleLogoutService.php', $redirect);
|
|
$this->withGet(['SAMLResponse' => $this->sloResponseData], $handleLogoutResponse);
|
|
}
|
|
|
|
public function test_logout_sls_flow_when_sls_not_configured()
|
|
{
|
|
config()->set([
|
|
'saml2.onelogin.strict' => false,
|
|
'saml2.onelogin.idp.singleLogoutService.url' => null,
|
|
]);
|
|
|
|
$this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
|
|
$this->assertTrue($this->isAuthenticated());
|
|
|
|
$req = $this->post('/saml2/logout');
|
|
$req->assertRedirect('/');
|
|
$this->assertFalse($this->isAuthenticated());
|
|
}
|
|
|
|
public function test_dump_user_details_option_works()
|
|
{
|
|
config()->set([
|
|
'saml2.onelogin.strict' => false,
|
|
'saml2.dump_user_details' => true,
|
|
]);
|
|
|
|
$acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
|
|
$acsPost->assertJsonStructure([
|
|
'id_from_idp',
|
|
'attrs_from_idp' => [],
|
|
'attrs_after_parsing' => [],
|
|
]);
|
|
}
|
|
|
|
public function test_saml_routes_are_only_active_if_saml_enabled()
|
|
{
|
|
config()->set(['auth.method' => 'standard']);
|
|
$getRoutes = ['/metadata', '/sls'];
|
|
foreach ($getRoutes as $route) {
|
|
$req = $this->get('/saml2' . $route);
|
|
$this->assertPermissionError($req);
|
|
}
|
|
|
|
$postRoutes = ['/login', '/acs', '/logout'];
|
|
foreach ($postRoutes as $route) {
|
|
$req = $this->post('/saml2' . $route);
|
|
$this->assertPermissionError($req);
|
|
}
|
|
}
|
|
|
|
public function test_forgot_password_routes_inaccessible()
|
|
{
|
|
$resp = $this->get('/password/email');
|
|
$this->assertPermissionError($resp);
|
|
|
|
$resp = $this->post('/password/email');
|
|
$this->assertPermissionError($resp);
|
|
|
|
$resp = $this->get('/password/reset/abc123');
|
|
$this->assertPermissionError($resp);
|
|
|
|
$resp = $this->post('/password/reset');
|
|
$this->assertPermissionError($resp);
|
|
}
|
|
|
|
public function test_standard_login_routes_inaccessible()
|
|
{
|
|
$resp = $this->post('/login');
|
|
$this->assertPermissionError($resp);
|
|
|
|
$resp = $this->post('/logout');
|
|
$this->assertPermissionError($resp);
|
|
}
|
|
|
|
public function test_user_invite_routes_inaccessible()
|
|
{
|
|
$resp = $this->get('/register/invite/abc123');
|
|
$this->assertPermissionError($resp);
|
|
|
|
$resp = $this->post('/register/invite/abc123');
|
|
$this->assertPermissionError($resp);
|
|
}
|
|
|
|
public function test_user_register_routes_inaccessible()
|
|
{
|
|
$resp = $this->get('/register');
|
|
$this->assertPermissionError($resp);
|
|
|
|
$resp = $this->post('/register');
|
|
$this->assertPermissionError($resp);
|
|
}
|
|
|
|
public function test_email_domain_restriction_active_on_new_saml_login()
|
|
{
|
|
$this->setSettings([
|
|
'registration-restrict' => 'testing.com',
|
|
]);
|
|
config()->set([
|
|
'saml2.onelogin.strict' => false,
|
|
]);
|
|
|
|
$acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
|
|
$acsPost->assertSeeText('That email domain does not have access to this application');
|
|
$this->assertFalse(auth()->check());
|
|
$this->assertDatabaseMissing('users', ['email' => 'user@example.com']);
|
|
}
|
|
|
|
public function test_group_sync_functions_when_email_confirmation_required()
|
|
{
|
|
setting()->put('registration-confirmation', 'true');
|
|
config()->set([
|
|
'saml2.onelogin.strict' => false,
|
|
'saml2.user_to_groups' => true,
|
|
'saml2.remove_from_groups' => false,
|
|
]);
|
|
|
|
$memberRole = Role::factory()->create(['external_auth_id' => 'member']);
|
|
$adminRole = Role::getSystemRole('admin');
|
|
|
|
$acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
|
|
|
|
$this->assertEquals('http://localhost/register/confirm', url()->current());
|
|
$acsPost->assertSee('Please check your email and click the confirmation button to access BookStack.');
|
|
/** @var User $user */
|
|
$user = User::query()->where('external_auth_id', '=', 'user')->first();
|
|
|
|
$userRoleIds = $user->roles()->pluck('id');
|
|
$this->assertContains($memberRole->id, $userRoleIds, 'User was assigned to member role');
|
|
$this->assertContains($adminRole->id, $userRoleIds, 'User was assigned to admin role');
|
|
$this->assertFalse(boolval($user->email_confirmed), 'User email remains unconfirmed');
|
|
|
|
$this->assertNull(auth()->user());
|
|
$homeGet = $this->get('/');
|
|
$homeGet->assertRedirect('/login');
|
|
}
|
|
|
|
public function test_login_where_existing_non_saml_user_shows_warning()
|
|
{
|
|
$this->post('/saml2/login');
|
|
config()->set(['saml2.onelogin.strict' => false]);
|
|
|
|
// Make the user pre-existing in DB with different auth_id
|
|
User::query()->forceCreate([
|
|
'email' => 'user@example.com',
|
|
'external_auth_id' => 'old_system_user_id',
|
|
'email_confirmed' => false,
|
|
'name' => 'Barry Scott',
|
|
]);
|
|
|
|
$acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
|
|
$this->assertFalse($this->isAuthenticated());
|
|
$this->assertDatabaseHas('users', [
|
|
'email' => 'user@example.com',
|
|
'external_auth_id' => 'old_system_user_id',
|
|
]);
|
|
|
|
$acsPost->assertSee('A user with the email user@example.com already exists but with different credentials');
|
|
}
|
|
|
|
public function test_login_request_contains_expected_default_authncontext()
|
|
{
|
|
$authReq = $this->getAuthnRequest();
|
|
$this->assertStringContainsString('samlp:RequestedAuthnContext Comparison="exact"', $authReq);
|
|
$this->assertStringContainsString('<saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml:AuthnContextClassRef>', $authReq);
|
|
}
|
|
|
|
public function test_false_idp_authncontext_option_does_not_pass_authncontext_in_saml_request()
|
|
{
|
|
config()->set(['saml2.onelogin.security.requestedAuthnContext' => false]);
|
|
$authReq = $this->getAuthnRequest();
|
|
$this->assertStringNotContainsString('samlp:RequestedAuthnContext', $authReq);
|
|
$this->assertStringNotContainsString('<saml:AuthnContextClassRef>', $authReq);
|
|
}
|
|
|
|
public function test_array_idp_authncontext_option_passes_value_as_authncontextclassref_in_request()
|
|
{
|
|
config()->set(['saml2.onelogin.security.requestedAuthnContext' => ['urn:federation:authentication:windows', 'urn:federation:authentication:linux']]);
|
|
$authReq = $this->getAuthnRequest();
|
|
$this->assertStringContainsString('samlp:RequestedAuthnContext', $authReq);
|
|
$this->assertStringContainsString('<saml:AuthnContextClassRef>urn:federation:authentication:windows</saml:AuthnContextClassRef>', $authReq);
|
|
$this->assertStringContainsString('<saml:AuthnContextClassRef>urn:federation:authentication:linux</saml:AuthnContextClassRef>', $authReq);
|
|
}
|
|
|
|
protected function getAuthnRequest(): string
|
|
{
|
|
$req = $this->post('/saml2/login');
|
|
$location = $req->headers->get('Location');
|
|
$query = explode('?', $location)[1];
|
|
$params = [];
|
|
parse_str($query, $params);
|
|
|
|
return gzinflate(base64_decode($params['SAMLRequest']));
|
|
}
|
|
|
|
protected function withGet(array $options, callable $callback)
|
|
{
|
|
return $this->withGlobal($_GET, $options, $callback);
|
|
}
|
|
|
|
protected function withGlobal(array &$global, array $options, callable $callback)
|
|
{
|
|
$original = [];
|
|
foreach ($options as $key => $val) {
|
|
$original[$key] = $global[$key] ?? null;
|
|
$global[$key] = $val;
|
|
}
|
|
|
|
$callback();
|
|
|
|
foreach ($options as $key => $val) {
|
|
$val = $original[$key];
|
|
if ($val) {
|
|
$global[$key] = $val;
|
|
} else {
|
|
unset($global[$key]);
|
|
}
|
|
}
|
|
}
|
|
|
|
/**
|
|
* The post data for a callback for single-sign-in.
|
|
* Provides the following attributes:
|
|
* array:5 [
|
|
* "uid" => array:1 [
|
|
* 0 => "user"
|
|
* ]
|
|
* "first_name" => array:1 [
|
|
* 0 => "Barry"
|
|
* ]
|
|
* "last_name" => array:1 [
|
|
* 0 => "Scott"
|
|
* ]
|
|
* "email" => array:1 [
|
|
* 0 => "user@example.com"
|
|
* ]
|
|
* "user_groups" => array:2 [
|
|
* 0 => "member"
|
|
* 1 => "admin"
|
|
* ]
|
|
* ].
|
|
*/
|
|
protected $acsPostData = '<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="_4dd4564dc794061ef1baa0467d79028ced3ce54bee" Version="2.0" IssueInstant="2019-11-17T17:53:39Z" Destination="http://bookstack.local/saml2/acs" InResponseTo="ONELOGIN_6a0f4f3993040f1987fd37068b5296229ad5361c"><saml:Issuer>http://saml.local/saml2/idp/metadata.php</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
    <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
  <ds:Reference URI="#_4dd4564dc794061ef1baa0467d79028ced3ce54bee"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>vmh/S75Nf+g+ecDJCzAbZWKJVlug7BfsC+9aWNeIreQ=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>vragKJXscVnT62EhI7li80DTXsNLbNsyp5fvBu8Z1XHKEQP7AjO6G1qPphjVCgQ37zNWUU6oS+PxP7P9Gxnq/xJz4TOyGpry7Th+jHpw4aesA7kNjzUNuRe6sYmY9kExvV3/NbQf4N2S6cdaDr3XThvYUT71c405UG8RiB2ZcybXr1eMrX+WP0gSd+sAvDLjN0IszUZUT58ZtZDTMrkVF/JHlPECN/UmlaPAz+SqBxsnqNwY+Z1aKw2yjxTe6u13OJooN9SuDJ04M++awFV76B8qq2O31kqAl2bnmpLlmMgQ4Q+iIg/wBsOZm5urZa9bNl3KTHmMPWlZdmhl/8/3/HOTq7kaXk7ryVDtKpYlgqTj3aEJn/Gp3j8HZy1EbjTb94QOVP0nHC0uWhBhMwN7sV1kQ+1SccRZTerJHiRUD/GK+MX73F+o2ULTH/VzNoR3j87hN/6uP/IxnZ3Tntdu0VOe/npGUZ0R0oRXXpkbS/jh5i5f54EsxyvuTC94wJhC</ds:SignatureValue>
<ds:KeyInfo><ds:X509Data><ds:X509Certificate>MIIEazCCAtOgAwIBAgIUe7a088Cnr4izmrnBEnx5q3HTMvYwDQYJKoZIhvcNAQELBQAwRTELMAkGA1UEBhMCR0IxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDAeFw0xOTExMTYxMjE3MTVaFw0yOTExMTUxMjE3MTVaMEUxCzAJBgNVBAYTAkdCMRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYDVQQKDBhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQwggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDzLe9FfdyplTxHp4SuQ9gQtZT3t+SDfvEL72ppCfFZw7+B5s5B/T73aXpoQ3S53pGI1RIWCge2iCUQ2tzm27aSNH0iu9aJYcUQZ/RITqd0ayyDks1NA2PT3TW6t3m7KV5re4P0Nb+YDeuyHdkz+jcMtpn8CmBoT0H+skha0hiqINkjkRPiHvLHVGp+tHUEA/I6mN4aB/UExSTLs79NsLUfteqqxe9+tvdUaToyDPrhPFjONs+9NKCkzIC6vcv7J6AtuKG6nET+zB9yOWgtGYQifXqQA2y5dL81BB0q5uMaBLS2pq3aPPjzU2F3+EysjySWTnCkfk7C5SsCXRu8Q+U95tunpNfwf5olE6Was48NMM+PwV7iCNMPkNzllq6PCiM+P8DrMSczzUZZQUSv6dSwPCo+YSVimEM0Og3XJTiNhQ5ANlaIn66Kw5gfoBfuiXmyIKiSDyAiDYmFaf4395wWwLkTR+cw8WfjaHswKZTomn1MR3OJsY2UJ0eRBYM+YSsCAwEAAaNTMFEwHQYDVR0OBBYEFImp2CYCGfcb7w91H/cShTCkXwR/MB8GA1UdIwQYMBaAFImp2CYCGfcb7w91H/cShTCkXwR/MA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggGBAA+g/C7uL9ln+W+qBknLW81kojYflgPK1I1MHIwnMvl/ZTHX4dRXKDrk7KcUq1KjqajNV66f1cakp03IijBiO0Xi1gXUZYLoCiNGUyyp9XloiIy9Xw2PiWnrw0+yZyvVssbehXXYJl4RihBjBWul9R4wMYLOUSJDe2WxcUBhJnxyNRs+P0xLSQX6B2n6nxoDko4p07s8ZKXQkeiZ2iwFdTxzRkGjthMUv704nzsVGBT0DCPtfSaO5KJZW1rCs3yiMthnBxq4qEDOQJFIl+/LD71KbB9vZcW5JuavzBFmkKGNro/6G1I7el46IR4wijTyNFCYUuD9dtignNmpWtN8OW+ptiL/jtTySWukjys0s+vLn83CVvjB0dJtVAIYOgXFdIuii66gczwwM/LGiOExJn0dTNzsJ/IYhpxL4FBEuP0pskY0o0aUlJ2LS2j+wSQTRKsBgMjyrUrekle2ODStStn3eabjIx0/FHlpFr0jNIm/oMP7kwjtUX4zaNe47QI4Gg==</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xs="http://www.w3.org/2001/XMLSchema" ID="_6842df9c659f13fe5196cd9ef6c2f028364ae943b1" Version="2.0" IssueInstant="2019-11-17T17:53:39Z"><saml:Issuer>http://saml.local/saml2/idp/metadata.php</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
    <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
  <ds:Reference URI="#_6842df9c659f13fe5196cd9ef6c2f028364ae943b1"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>krb5w6S8toXc/eSwZPUOBvQzn3os4JACuxxrJkxpgFw=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>2qqmAkxnqxNksyyxyvqST51L89U/YtzckkuzAxr/aCRS+SOG85bAMZo/SznswtMYAbQQCEFoDujgMvZsHYw6TvvaGjyWYJQ5VrahezfZIiBUE44pmXak8+0WItY5gvpFIxqXVZFgERKvTLfeQB38d1VPsFUgDXut8U/Pvn7uvpuvcUz+1E29EJGaY/GgvxT7KrYORA8wJ+MuTsQVmjseRxoyRSz08Nbwe2H8jWBzEYcqYl2+Fg+hp5gtKmzVhKFpd5vA67AIz55stBcG5+04rUijEK4sr/qkLyBkJB7KvL3jvJpo3B8qbLXyxKoWRJdgk8J4s/MZuAi7Ae1QsSN9vgvSuTesEBR5iHrnKYklJQYskmD3m++za8SSQnpe3E3aFAczzpITuD8bABZdjqI6NHkJaQApfoHV5T+gn8z7TMk+I+TSbeADnmLBKyg0tZmmt/FJl5zyj0VlpsWsMS69Q6mFIU+jpHRjzNoaK1S5vT7emGmHJIJtqiNurQ7KdBPI</ds:SignatureValue>
<ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><saml:Subject><saml:NameID SPNameQualifier="http://bookstack.local/saml2/metadata" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">_2c7ab86eb8f1d1063443f219cc5868ff66708912e3</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData NotOnOrAfter="2019-11-17T17:58:39Z" Recipient="http://bookstack.local/saml2/acs" InResponseTo="ONELOGIN_6a0f4f3993040f1987fd37068b5296229ad5361c"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2019-11-17T17:53:09Z" NotOnOrAfter="2019-11-17T17:58:39Z"><saml:AudienceRestriction><saml:Audience>http://bookstack.local/saml2/metadata</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2019-11-17T17:53:39Z" SessionNotOnOrAfter="2019-11-18T01:53:39Z" SessionIndex="_4fe7c0d1572d64b27f930aa6f236a6f42e930901cc"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:Password</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute Name="uid" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">user</saml:AttributeValue></saml:Attribute><saml:Attribute Name="first_name" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">Barry</saml:AttributeValue></saml:Attribute><saml:Attribute Name="last_name" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">Scott</saml:AttributeValue></saml:Attribute><saml:Attribute Name="email" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">user@example.com</saml:AttributeValue></saml:Attribute><saml:Attribute Name="user_groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">member</saml:AttributeValue><saml:AttributeValue xsi:type="xs:string">admin</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>';
|
|
|
|
protected $sloResponseData = 'fZHRa8IwEMb/lZJ3bdJa04a2MOYYglOY4sNe5JKms9gmpZfC/vxF3ZjC8OXgLvl938ddjtC1vVjZTzu6d429NaiDr641KC5PBRkHIyxgg8JAp1E4JbZPbysRTanoB+ussi25QR4TgKgH11hDguWiIIeawTxOaK1iPYt5XcczHUlJeVRlMklBJjOuM1qDVCTY6wE9WRAv5HHEUS8NOjDOjyjLJoxNGN+xVESpSNgHCRYaXWPAXaijc70IQ2ntyUPqNG2tgjY8Z45CbNFLmt8V7GxBNuuX1eZ1uT7EcZJKAE4TJhXPaMxlVlFffPKKJnXE5ryusoiU+VlMXJIN5Y/feXRn1VR92GkHFTiY9sc+D2+p/HqRrQM34n33bCsd7KEd9eMd4+W32I5KaUQSlleHP9Hwv6uX3w==';
|
|
|
|
protected $testCert = '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';
|
|
}
|