3 # Copyright (C) 2015 Ipsilon project Contributors, for license see COPYING
5 from helpers.common import IpsilonTestBase # pylint: disable=relative-import
6 from helpers.http import HttpSessions # pylint: disable=relative-import
10 from string import Template
13 idp_g = {'TEMPLATES': '${TESTDIR}/templates/install',
14 'CONFDIR': '${TESTDIR}/etc',
15 'DATADIR': '${TESTDIR}/lib',
16 'HTTPDCONFD': '${TESTDIR}/${NAME}/conf.d',
17 'STATICDIR': '${ROOTDIR}',
18 'BINDIR': '${ROOTDIR}/ipsilon',
19 'WSGI_SOCKET_PREFIX': '${TESTDIR}/${NAME}/logs/wsgi'}
22 idp_a = {'hostname': '${ADDRESS}:${PORT}',
23 'admin_user': '${TEST_USER}',
24 'system_user': '${TEST_USER}',
25 'instance': '${NAME}',
31 'server_debugging': 'True'}
34 sp_g = {'HTTPDCONFD': '${TESTDIR}/${NAME}/conf.d',
35 'SAML2_TEMPLATE': '${TESTDIR}/templates/install/saml2/sp.conf',
36 'SAML2_CONFFILE': '${TESTDIR}/${NAME}/conf.d/ipsilon-saml.conf',
37 'SAML2_HTTPDIR': '${TESTDIR}/${NAME}/saml2'}
40 sp_a = {'hostname': '${ADDRESS}:${PORT}',
41 'saml_idp_metadata': 'http://127.0.0.10:45080/idp1/saml2/metadata',
42 'saml_secure_setup': 'False',
44 'httpd_user': '${TEST_USER}'}
47 sp2_g = {'HTTPDCONFD': '${TESTDIR}/${NAME}/conf.d',
48 'SAML2_TEMPLATE': '${TESTDIR}/templates/install/saml2/sp.conf',
49 'SAML2_CONFFILE': '${TESTDIR}/${NAME}/conf.d/ipsilon-saml.conf',
50 'SAML2_HTTPDIR': '${TESTDIR}/${NAME}/saml2'}
53 sp2_a = {'hostname': '${ADDRESS}:${PORT}',
54 'saml_idp_metadata': 'http://127.0.0.10:45080/idp1/saml2/metadata',
55 'saml_secure_setup': 'False',
57 'httpd_user': '${TEST_USER}'}
59 sp3_g = {'HTTPDCONFD': '${TESTDIR}/${NAME}/conf.d',
60 'SAML2_TEMPLATE': '${TESTDIR}/templates/install/saml2/sp.conf',
61 'SAML2_CONFFILE': '${TESTDIR}/${NAME}/conf.d/ipsilon-saml.conf',
62 'SAML2_HTTPDIR': '${TESTDIR}/${NAME}/saml2'}
65 sp3_a = {'hostname': '${ADDRESS}:${PORT}',
66 'saml_idp_metadata': 'http://127.0.0.10:45080/idp1/saml2/metadata',
67 'saml_secure_setup': 'False',
69 'httpd_user': '${TEST_USER}'}
72 def fixup_sp_httpd(httpdir, alias):
75 Alias /${ALIAS} ${HTTPDIR}/sp
77 <Directory ${HTTPDIR}/${ALIAS}>
83 t = Template(location)
84 text = t.substitute({'HTTPDIR': httpdir, 'ALIAS': alias})
85 with open(httpdir + '/conf.d/ipsilon-saml.conf', 'a') as f:
88 os.mkdir(httpdir + '/sp')
89 with open(httpdir + '/sp/index.html', 'w') as f:
93 class IpsilonTest(IpsilonTestBase):
96 super(IpsilonTest, self).__init__('testrest', __file__)
98 def setup_servers(self, env=None):
99 print "Installing IDP server"
103 idp = self.generate_profile(idp_g, idp_a, name, addr, port)
104 conf = self.setup_idp_server(idp, name, addr, port, env)
106 print "Starting IDP's httpd server"
107 self.start_http_server(conf, env)
109 print "Installing SP server"
113 sp = self.generate_profile(sp_g, sp_a, name, addr, port)
114 conf = self.setup_sp_server(sp, name, addr, port, env)
115 fixup_sp_httpd(os.path.dirname(conf), name)
117 print "Starting SP's httpd server"
118 self.start_http_server(conf, env)
120 print "Installing second SP server"
124 sp2 = self.generate_profile(sp2_g, sp2_a, name, addr, port)
125 conf = self.setup_sp_server(sp2, name, addr, port, env)
126 fixup_sp_httpd(os.path.dirname(conf), name)
128 print "Starting SP's httpd server"
129 self.start_http_server(conf, env)
131 print "Installing third SP server"
135 sp3 = self.generate_profile(sp3_g, sp3_a, name, addr, port)
136 conf = self.setup_sp_server(sp3, name, addr, port, env)
137 fixup_sp_httpd(os.path.dirname(conf), name)
139 print "Starting SP's httpd server"
140 self.start_http_server(conf, env)
143 if __name__ == '__main__':
148 sp3name = 'sp3.invalid'
149 user = pwd.getpwuid(os.getuid())[0]
151 sess = HttpSessions()
152 sess.add_server(idpname, 'http://127.0.0.10:45080', user, 'ipsilon')
153 sess.add_server(spname, 'http://127.0.0.11:45081')
154 sess.add_server(sp2name, 'http://127.0.0.10:45082')
155 sess.add_server(sp3name, 'http://127.0.0.10:45083')
157 print "testrest: Authenticate to IDP ...",
159 sess.auth_to_idp(idpname)
160 except Exception, e: # pylint: disable=broad-except
161 print >> sys.stderr, " ERROR: %s" % repr(e)
165 print "testrest: List initial Service Providers via REST ...",
167 result = sess.get_rest_sp(idpname)
168 if len(result['result']) != 0:
170 'Expected no SP and got %d' % len(result['result'])
172 except ValueError, e:
173 print >> sys.stderr, " ERROR: %s" % repr(e)
177 print "testrest: Add SP Metadata to IDP via admin ...",
179 sess.add_sp_metadata(idpname, spname)
180 except Exception, e: # pylint: disable=broad-except
181 print >> sys.stderr, " ERROR: %s" % repr(e)
185 print "testrest: List Service Providers via REST ...",
187 result = sess.get_rest_sp(idpname)
188 if len(result['result']) != 1:
190 'Expected 1 SP and got %d' % len(result['result'])
192 if result['result'][0].get('provider') != spname:
194 'Expected %s and got %s' %
195 (spname, result['result'][0].get('provider'))
197 except ValueError, e:
198 print >> sys.stderr, " ERROR: %s" % repr(e)
202 print "testrest: Add Service Provider via REST ...",
204 sess.add_sp_metadata(idpname, sp2name, rest=True)
205 except ValueError, e:
206 print >> sys.stderr, " ERROR: %s" % repr(e)
210 print "testrest: List Service Providers via REST ...",
212 result = sess.get_rest_sp(idpname)
213 if len(result['result']) != 2:
215 'Expected 2 SPs and got %d' % len(result['result'])
217 except ValueError, e:
218 print >> sys.stderr, " ERROR: %s" % repr(e)
222 print "testrest: List Specific Service Providers via REST ...",
224 result = sess.get_rest_sp(idpname, spname)
225 if len(result['result']) != 1:
227 'Expected 1 SPs and got %d' % len(result['result'])
229 if result['result'][0].get('provider') != spname:
231 'Expected %s and got %s' %
232 (spname, result['result'][0].get('provider'))
234 except ValueError, e:
235 print >> sys.stderr, " ERROR: %s" % repr(e)
239 # Now for some negative testing
241 print "testrest: Add illegally named Service Provider via REST ...",
243 sess.add_sp_metadata(idpname, sp3name, rest=True)
244 except ValueError, e:
247 print >> sys.stderr, "ERROR: " \
248 "Adding SP with invalid name should have failed and it didn't"
251 print "testrest: Fetch non-existent REST endpoint ...",
253 result = sess.fetch_rest_page(
255 '/%s/rest/providers/saml2/notfound' % idpname
257 except ValueError, e:
258 if '(501)' not in e.message:
259 print >> sys.stderr, " ERROR: %s" % repr(e)
264 print >> sys.stderr, "ERROR: should have returned a 404"
267 print "testrest: Fetch non-existent SP via REST ...",
269 result = sess.get_rest_sp(idpname, 'foo')
270 except ValueError, e:
271 if '(404)' not in e.message:
272 print >> sys.stderr, " ERROR: %s" % repr(e)
277 print >> sys.stderr, "ERROR: should have returned a 404"
280 print "testrest: Re-add Service Provider via REST ...",
282 sess.add_sp_metadata(idpname, sp2name, rest=True)
283 except ValueError, e:
286 print >> sys.stderr, "ERROR: " \
287 "Adding duplicate SP should have failed and it didn't"