Saml2 Metadata generator class
authorSimo Sorce <simo@redhat.com>
Tue, 18 Mar 2014 18:44:05 +0000 (14:44 -0400)
committerSimo Sorce <simo@redhat.com>
Thu, 20 Mar 2014 21:28:03 +0000 (17:28 -0400)
This class generates metadata files for IDP and SP services and is meant
to be used at install/configure time.
It uses the certs module to generate certificates.

With tests!

Signed-off-by: Simo Sorce <simo@redhat.com>
ipsilon/providers/saml2/metadata.py [new file with mode: 0755]

diff --git a/ipsilon/providers/saml2/metadata.py b/ipsilon/providers/saml2/metadata.py
new file mode 100755 (executable)
index 0000000..0effd4c
--- /dev/null
@@ -0,0 +1,159 @@
+#!/usr/bin/python
+#
+# Copyright (C) 2014  Simo Sorce <simo@redhat.com>
+#
+# see file 'COPYING' for use and warranty information
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation, either version 3 of the License, or
+# (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program.  If not, see <http://www.gnu.org/licenses/>.
+
+from ipsilon.providers.saml2.certs import Certificate
+from lxml import etree
+import lasso
+
+
+EDESC = '{%s}EntityDescriptor' % lasso.SAML2_METADATA_HREF
+NSMAP = {
+    'md': lasso.SAML2_METADATA_HREF,
+    'ds': lasso.DS_HREF
+}
+
+IDPDESC = 'IDPSSODescriptor'
+SPDESC = 'SPSSODescriptor'
+
+IDP_ROLE = 'idp'
+SP_ROLE = 'sp'
+
+SSO_SERVICE = 'SingleSignOnService'
+LOGOUT_SERVICE = 'SingleLogoutService'
+ASSERTION_SERVICE = 'AssertionConsumerService'
+
+
+def mdElement(_parent, _tag, **kwargs):
+    tag = '{%s}%s' % (lasso.SAML2_METADATA_HREF, _tag)
+    return etree.SubElement(_parent, tag, **kwargs)
+
+
+def dsElement(_parent, _tag, **kwargs):
+    tag = '{%s}%s' % (lasso.DS_HREF, _tag)
+    return etree.SubElement(_parent, tag, **kwargs)
+
+
+class Metadata(object):
+
+    def __init__(self, role=None):
+        self.root = etree.Element(EDESC, nsmap=NSMAP)
+        self.entityid = None
+        self.role = None
+        self.set_role(role)
+
+    def set_entity_id(self, url):
+        self.entityid = url
+        self.root.set('entityID', url)
+
+    def set_role(self, role):
+        if role is None:
+            return
+        elif role == IDP_ROLE:
+            description = IDPDESC
+        elif role == SP_ROLE:
+            description = SPDESC
+        else:
+            raise ValueError('invalid role: %s' % role)
+        self.role = mdElement(self.root, description)
+        self.role.set('protocolSupportEnumeration', lasso.SAML2_PROTOCOL_HREF)
+        return self.role
+
+    def add_cert(self, certdata, use):
+        desc = mdElement(self.role, 'KeyDescriptor')
+        desc.set('use', use)
+        info = dsElement(desc, 'KeyInfo')
+        data = dsElement(info, 'X509Data')
+        cert = dsElement(data, 'X509Certificate')
+        cert.text = certdata
+
+    def add_certs(self, signcert=None, enccert=None):
+        if signcert:
+            self.add_cert(signcert.get_cert(), 'signing')
+        if enccert:
+            self.add_cert(enccert.get_cert(), 'encryption')
+
+    def add_service(self, svctype, binding, location):
+        svc = mdElement(self.role, svctype)
+        svc.set('Binding', binding)
+        svc.set('Location', location)
+
+    def add_allowed_name_format(self, name_format):
+        nameidfmt = mdElement(self.role, 'NameIDFormat')
+        nameidfmt.text = name_format
+
+    def output(self, path):
+        data = etree.tostring(self.root, xml_declaration=True,
+                              encoding='UTF-8', pretty_print=True)
+        with open(path, 'w') as f:
+            f.write(data)
+
+
+if __name__ == '__main__':
+    from ipsilon.providers.saml2.provider import NAMEID_MAP
+    import tempfile
+    import shutil
+    import os
+
+    tmpdir = tempfile.mkdtemp()
+
+    try:
+        # Test IDP generation
+        sign_cert = Certificate(tmpdir)
+        sign_cert.generate('idp-signing-cert', 'idp.ipsilon.example.com')
+        enc_cert = Certificate(tmpdir)
+        enc_cert.generate('idp-encryption-cert', 'idp.ipsilon.example.com')
+        idp = Metadata()
+        idp.set_entity_id('https://ipsilon.example.com/idp/metadata')
+        idp.set_role(IDP_ROLE)
+        idp.add_certs(sign_cert, enc_cert)
+        idp.add_service(SSO_SERVICE, lasso.SAML2_METADATA_BINDING_POST,
+                        'https://ipsilon.example.com/idp/saml2/POST')
+        idp.add_service(SSO_SERVICE, lasso.SAML2_METADATA_BINDING_REDIRECT,
+                        'https://ipsilon.example.com/idp/saml2/Redirect')
+        for k in NAMEID_MAP:
+            idp.add_allowed_name_format(NAMEID_MAP[k])
+        md_file = os.path.join(tmpdir, 'metadata.xml')
+        idp.output(md_file)
+        with open(md_file) as fd:
+            text = fd.read()
+        print '==================== IDP ===================='
+        print text
+        print '============================================='
+
+        # Test SP generation
+        sign_cert = Certificate(tmpdir)
+        sign_cert.generate('sp-signing-cert', 'sp.ipsilon.example.com')
+        sp = Metadata()
+        sp.set_entity_id('https://ipsilon.example.com/samlsp/metadata')
+        sp.set_role(SP_ROLE)
+        sp.add_certs(sign_cert)
+        sp.add_service(LOGOUT_SERVICE, lasso.SAML2_METADATA_BINDING_REDIRECT,
+                       'https://ipsilon.example.com/samlsp/logout')
+        sp.add_service(ASSERTION_SERVICE, lasso.SAML2_METADATA_BINDING_POST,
+                       'https://ipsilon.example.com/samlsp/postResponse')
+        md_file = os.path.join(tmpdir, 'metadata.xml')
+        sp.output(md_file)
+        with open(md_file) as fd:
+            text = fd.read()
+        print '===================== SP ===================='
+        print text
+        print '============================================='
+
+    finally:
+        shutil.rmtree(tmpdir)