diff options
| author | Thomas Lenz <thomas.lenz@egiz.gv.at> | 2020-12-26 17:45:38 +0100 | 
|---|---|---|
| committer | Thomas Lenz <thomas.lenz@egiz.gv.at> | 2020-12-26 17:45:38 +0100 | 
| commit | f06839fb716ff61bf94a32f8e23e3f313245f7e7 (patch) | |
| tree | 900e0d24444ff64a54db5ca65ef4ed1145f389a1 /connector/src/test/java/at/asitplus | |
| parent | 293f67a641f8acdef54745c85969827807404fc2 (diff) | |
| download | National_eIDAS_Gateway-f06839fb716ff61bf94a32f8e23e3f313245f7e7.tar.gz National_eIDAS_Gateway-f06839fb716ff61bf94a32f8e23e3f313245f7e7.tar.bz2 National_eIDAS_Gateway-f06839fb716ff61bf94a32f8e23e3f313245f7e7.zip | |
add jUnit test that simulates a full eIDAS authentication
Diffstat (limited to 'connector/src/test/java/at/asitplus')
3 files changed, 488 insertions, 3 deletions
| diff --git a/connector/src/test/java/at/asitplus/eidas/specific/connector/test/FullStartUpAndProcessTest.java b/connector/src/test/java/at/asitplus/eidas/specific/connector/test/FullStartUpAndProcessTest.java new file mode 100644 index 00000000..5206c2e5 --- /dev/null +++ b/connector/src/test/java/at/asitplus/eidas/specific/connector/test/FullStartUpAndProcessTest.java @@ -0,0 +1,485 @@ +package at.asitplus.eidas.specific.connector.test; + +import static org.mockito.ArgumentMatchers.any; +import static org.powermock.api.mockito.PowerMockito.when; + +import java.io.ByteArrayInputStream; +import java.io.IOException; +import java.io.UnsupportedEncodingException; +import java.net.URISyntaxException; +import java.util.Map; +import java.util.Timer; + +import javax.xml.transform.TransformerException; + +import org.apache.commons.lang3.RandomStringUtils; +import org.apache.ignite.Ignition; +import org.joda.time.DateTime; +import org.junit.AfterClass; +import org.junit.Assert; +import org.junit.Before; +import org.junit.BeforeClass; +import org.junit.Rule; +import org.junit.Test; +import org.junit.runner.RunWith; +import org.opensaml.core.config.InitializationException; +import org.opensaml.core.xml.config.XMLObjectProviderRegistrySupport; +import org.opensaml.core.xml.io.MarshallingException; +import org.opensaml.core.xml.io.UnmarshallingException; +import org.opensaml.core.xml.util.XMLObjectSupport; +import org.opensaml.saml.metadata.resolver.impl.ResourceBackedMetadataResolver; +import org.opensaml.saml.saml2.core.RequestAbstractType; +import org.opensaml.saml.saml2.core.StatusResponseType; +import org.springframework.beans.factory.annotation.Autowired; +import org.springframework.boot.test.context.SpringBootTest; +import org.springframework.boot.web.servlet.FilterRegistrationBean; +import org.springframework.core.io.ResourceLoader; +import org.springframework.mock.web.MockHttpServletRequest; +import org.springframework.mock.web.MockHttpServletResponse; +import org.springframework.test.annotation.DirtiesContext; +import org.springframework.test.annotation.DirtiesContext.ClassMode; +import org.springframework.test.context.ActiveProfiles; +import org.springframework.test.context.ContextConfiguration; +import org.springframework.test.context.TestPropertySource; +import org.springframework.test.context.junit4.SpringJUnit4ClassRunner; +import org.springframework.test.web.servlet.setup.DefaultMockMvcBuilder; +import org.springframework.test.web.servlet.setup.MockMvcBuilders; +import org.springframework.util.Base64Utils; +import org.springframework.web.context.WebApplicationContext; +import org.springframework.web.context.request.RequestContextHolder; +import org.springframework.web.context.request.ServletRequestAttributes; + +import com.skjolberg.mockito.soap.SoapServiceRule; + +import at.asitplus.eidas.specific.connector.controller.ProcessEngineSignalController; +import at.asitplus.eidas.specific.connector.controller.Pvp2SProfileEndpoint; +import at.asitplus.eidas.specific.connector.provider.PvpEndPointCredentialProvider; +import at.asitplus.eidas.specific.connector.provider.PvpMetadataProvider; +import at.asitplus.eidas.specific.connector.test.saml2.Pvp2SProfileEndPointTest; +import at.asitplus.eidas.specific.modules.auth.eidas.v2.Constants; +import at.asitplus.eidas.specific.modules.auth.eidas.v2.EidasSignalServlet; +import at.asitplus.eidas.specific.modules.auth.eidas.v2.service.EidasAttributeRegistry; +import at.gv.egiz.components.spring.api.SpringBootApplicationContextInitializer; +import at.gv.egiz.eaaf.core.api.data.EaafConstants; +import at.gv.egiz.eaaf.core.exceptions.EaafException; +import at.gv.egiz.eaaf.core.impl.idp.controller.ProtocolFinalizationController; +import at.gv.egiz.eaaf.core.impl.utils.DomUtils; +import at.gv.egiz.eaaf.core.impl.utils.Random; +import at.gv.egiz.eaaf.modules.pvp2.exception.CredentialsNotAvailableException; +import at.gv.egiz.eaaf.modules.pvp2.exception.SamlSigningException; +import at.gv.egiz.eaaf.modules.pvp2.impl.opensaml.OpenSaml3ResourceAdapter; +import at.gv.egiz.eaaf.modules.pvp2.impl.opensaml.initialize.EaafOpenSaml3xInitializer; +import at.gv.egiz.eaaf.modules.pvp2.impl.utils.Saml2Utils; +import at.gv.egiz.eaaf.modules.pvp2.sp.impl.utils.AssertionAttributeExtractor; +import eu.eidas.auth.commons.attribute.AttributeDefinition; +import eu.eidas.auth.commons.attribute.ImmutableAttributeMap; +import eu.eidas.auth.commons.light.ILightRequest; +import eu.eidas.auth.commons.protocol.impl.AuthenticationResponse; +import eu.eidas.auth.commons.tx.BinaryLightToken; +import eu.eidas.specificcommunication.SpecificCommunicationDefinitionBeanNames; +import eu.eidas.specificcommunication.exception.SpecificCommunicationException; +import eu.eidas.specificcommunication.protocol.SpecificCommunicationService; +import lombok.val; +import net.shibboleth.utilities.java.support.component.ComponentInitializationException; +import net.shibboleth.utilities.java.support.xml.XMLParserException; +import szrservices.SZR; +import szrservices.SignContentEntry; +import szrservices.SignContentResponseType; + +@RunWith(SpringJUnit4ClassRunner.class) +@SpringBootTest +@ContextConfiguration(initializers = { +    org.springframework.boot.context.config.DelegatingApplicationContextInitializer.class, +    SpringBootApplicationContextInitializer.class    +    }) +@TestPropertySource(locations = { "file:src/test/resources/config/junit_config_1_springboot.properties" }) +@DirtiesContext(classMode = ClassMode.AFTER_CLASS) +@ActiveProfiles(profiles = {"JUNIT", "jUnitTestMode", "springBoot"}) +public class FullStartUpAndProcessTest { + +  private static final String FINAL_REDIRECT = "http://localhost/finalizeAuthProtocol?pendingid="; +   +  @Autowired private WebApplicationContext wac; +  @Autowired private PvpEndPointCredentialProvider credentialProvider; +  @Autowired private PvpMetadataProvider metadataProvider; +  @Autowired private ResourceLoader resourceLoader; +  @Autowired private EidasAttributeRegistry attrRegistry; +   +  @Autowired private Pvp2SProfileEndpoint sProfile; +  @Autowired private ProcessEngineSignalController signal; +  @Autowired private EidasSignalServlet eidasSignal; +  @Autowired private ProtocolFinalizationController finalize; +   +  @Rule +  public final SoapServiceRule soap = SoapServiceRule.newInstance(); +   +  private SZR szrMock; +   +  private String cc; +  private String givenName; +  private String familyName; +  private String dateOfBirth; +  private String personalId; +  private String vsz; +  private String eidasBind; +   +   +  /** +   * jUnit class initializer. +   * @throws InterruptedException In case of an error +   * @throws ComponentInitializationException  In case of an error +   * @throws InitializationException In case of an error +   * +   */ +  @BeforeClass +  public static void classInitializer() throws InterruptedException, InitializationException, ComponentInitializationException { +    final String current = new java.io.File(".").toURI().toString(); +    System.clearProperty("eidas.ms.configuration"); +     +    //eIDAS Ref. Impl. properties +    System.setProperty("EIDAS_CONFIG_REPOSITORY", current.substring("file:".length()) +        + "../basicConfig/eIDAS/"); +    System.setProperty("SPECIFIC_CONNECTOR_CONFIG_REPOSITORY", current.substring("file:".length()) +        + "../basicConfig/eIDAS/"); +    System.setProperty("SPECIFIC_PROXY_SERVICE_CONFIG_REPOSITORY", current.substring("file:".length()) +        + "../basicConfig/eIDAS/"); +         +    EaafOpenSaml3xInitializer.eaafInitialize(); +     +  } +   +  /** +   * Test shut-down. +   * +   * @throws IOException In case of an error +   */ +  @AfterClass +  public static void closeIgniteNode() throws IOException { +    System.out.println("Closiong Ignite Node ... "); +    Ignition.stopAll(true); + +  } + +  /** +   * jUnit test set-up. +   * +   * +   */ +  @Before +  public void setup() throws IOException { +    DefaultMockMvcBuilder builder = MockMvcBuilders.webAppContextSetup(this.wac); +    @SuppressWarnings("rawtypes") +    Map<String, FilterRegistrationBean> filters = wac.getBeansOfType(FilterRegistrationBean.class); +    for (FilterRegistrationBean<?> filter : filters.values()) { +      if (filter.isEnabled()) { +        builder.addFilter(filter.getFilter(), "/*"); +       +      } +    } + +    szrMock = soap.mock(SZR.class, "http://localhost:1234/demoszr"); +     +     +     +    cc = RandomStringUtils.randomAlphabetic(2).toUpperCase(); +    personalId = cc + "/AT/" + RandomStringUtils.randomNumeric(64); +    familyName = RandomStringUtils.randomAlphabetic(10); +    givenName = RandomStringUtils.randomAlphabetic(10); +    dateOfBirth = "2015-10-12"; +     +    vsz = RandomStringUtils.randomNumeric(10); +    eidasBind = RandomStringUtils.randomAlphanumeric(50); +     +  } +   +  @Test +  public void userStopProcess() throws UnsupportedEncodingException, XMLParserException, UnmarshallingException,  +      TransformerException, IOException, MarshallingException, ComponentInitializationException, EaafException { +    //start authentication process by sending a SAML2 Authn-Request +    MockHttpServletRequest saml2Req = new MockHttpServletRequest("POST", "https://localhost/ms_connector"); +    injectSaml2AuthnReq(saml2Req); +    MockHttpServletResponse selectCountryResp = new MockHttpServletResponse(); +    RequestContextHolder.resetRequestAttributes(); +    RequestContextHolder.setRequestAttributes(new ServletRequestAttributes(saml2Req, selectCountryResp)); +     +    // send SAML2 AuthnRequest  +    sProfile.pvpIdpPostRequest(saml2Req, selectCountryResp); +     +    //check country-selection response +    Assert.assertEquals("no country-selection page", 200, selectCountryResp.getStatus()); +    Assert.assertEquals("cc-selection page", "text/html;charset=UTF-8", selectCountryResp.getContentType()); +    String selectionPage = selectCountryResp.getContentAsString(); +    Assert.assertNotNull("selectionPage is null", selectionPage); +    Assert.assertFalse("selectionPage is empty", selectionPage.isEmpty()); +     +    String pendingReqId = extractRequestToken(selectionPage,  +        "<input  type=\"hidden\" name=\"pendingid\"  value=\""); +    Assert.assertFalse("PendingReqId", pendingReqId.isEmpty()); +     +     +    // set-up user-stop request +    MockHttpServletRequest userStopReq = new MockHttpServletRequest("POST", "https://localhost/ms_connector"); +    userStopReq.setParameter("pendingid", pendingReqId); +    userStopReq.setParameter(EaafConstants.PARAM_HTTP_STOP_PROCESS, "true"); +     +    MockHttpServletResponse finalizeResp = new MockHttpServletResponse(); +    RequestContextHolder.resetRequestAttributes(); +    RequestContextHolder.setRequestAttributes(new ServletRequestAttributes(userStopReq, finalizeResp)); +     +    // send user-stop request +    signal.performGenericAuthenticationProcess(userStopReq, finalizeResp); +     +    //validate state +    Assert.assertEquals("forward to finalization", 302, finalizeResp.getStatus()); +    Assert.assertNotNull("missing redirect header", finalizeResp.getHeader("Location")); +    Assert.assertTrue("wrong redirect header", finalizeResp.getHeader("Location").startsWith(FINAL_REDIRECT)); +    String finalPendingReqId = finalizeResp.getHeader("Location").substring(FINAL_REDIRECT.length()); +    Assert.assertFalse("final pendingRequestId", finalPendingReqId.isEmpty()); +     +    //set-up finalization request +    MockHttpServletRequest finalizationReq = new MockHttpServletRequest("POST", "https://localhost/ms_connector"); +    finalizationReq.setParameter("pendingid", finalPendingReqId); +     +    MockHttpServletResponse saml2Resp = new MockHttpServletResponse(); +    RequestContextHolder.resetRequestAttributes(); +    RequestContextHolder.setRequestAttributes(new ServletRequestAttributes(finalizationReq, saml2Resp)); +     +    // exexcute finalization step +    finalize.finalizeAuthProtocol(finalizationReq, saml2Resp); +     +    //validate state +    Assert.assertEquals("forward to finalization", 200, saml2Resp.getStatus()); +    Assert.assertEquals("forward to eIDAS Node page", "text/html;charset=UTF-8", saml2Resp.getContentType()); +    String saml2RespPage = saml2Resp.getContentAsString(); +    Assert.assertNotNull("selectionPage is null", saml2RespPage); +    Assert.assertFalse("selectionPage is empty", saml2RespPage.isEmpty()); +     +    //validate SAML2 response +    String saml2RespB64 = extractRequestToken(saml2RespPage,  +        "<input type=\"hidden\" name=\"SAMLResponse\" value=\""); +    Assert.assertNotNull("SAML2 response", saml2RespB64); +     +    StatusResponseType saml2 = (StatusResponseType) XMLObjectSupport.unmarshallFromInputStream( +        XMLObjectProviderRegistrySupport.getParserPool(),  +        new ByteArrayInputStream(Base64Utils.decodeFromString(saml2RespB64))); +    Assert.assertEquals("SAML2 status", "urn:oasis:names:tc:SAML:2.0:status:Responder",  +        saml2.getStatus().getStatusCode().getValue()); +    Assert.assertEquals("ms-connector status", "1005",  +        saml2.getStatus().getStatusCode().getStatusCode().getValue()); +     +  } +   +  @Test +  public void fullSuccessProcess() throws EaafException, Exception { +    //start authentication process by sending a SAML2 Authn-Request +    MockHttpServletRequest saml2Req = new MockHttpServletRequest("POST", "https://localhost/ms_connector"); +    injectSaml2AuthnReq(saml2Req); +    MockHttpServletResponse selectCountryResp = new MockHttpServletResponse(); +    RequestContextHolder.resetRequestAttributes(); +    RequestContextHolder.setRequestAttributes(new ServletRequestAttributes(saml2Req, selectCountryResp)); +     +    // send SAML2 AuthnRequest  +    sProfile.pvpIdpPostRequest(saml2Req, selectCountryResp); +     +    //check country-selection response +    Assert.assertEquals("no country-selection page", 200, selectCountryResp.getStatus()); +    Assert.assertEquals("cc-selection page", "text/html;charset=UTF-8", selectCountryResp.getContentType()); +    String selectionPage = selectCountryResp.getContentAsString(); +    Assert.assertNotNull("selectionPage is null", selectionPage); +    Assert.assertFalse("selectionPage is empty", selectionPage.isEmpty()); +     +    String pendingReqId = extractRequestToken(selectionPage,  +        "<input  type=\"hidden\" name=\"pendingid\"  value=\""); +    Assert.assertFalse("PendingReqId", pendingReqId.isEmpty()); +     +     +    // set-up country-selection request +    MockHttpServletRequest selectCountryReq = new MockHttpServletRequest("POST", "https://localhost/ms_connector"); +    selectCountryReq.setParameter("pendingid", pendingReqId); +    selectCountryReq.setParameter("selectedCountry", cc); +     +    MockHttpServletResponse forwardEidasNodeResp = new MockHttpServletResponse(); +    RequestContextHolder.resetRequestAttributes(); +    RequestContextHolder.setRequestAttributes(new ServletRequestAttributes(selectCountryReq, forwardEidasNodeResp)); +     +    // send country-selection request +    signal.performGenericAuthenticationProcess(selectCountryReq, forwardEidasNodeResp); +     +    //check forward to eIDAS node response +    Assert.assertEquals("forward to eIDAS Node", 200, forwardEidasNodeResp.getStatus()); +    Assert.assertEquals("forward to eIDAS Node page", "text/html;charset=UTF-8", forwardEidasNodeResp.getContentType()); +    String forwardPage = forwardEidasNodeResp.getContentAsString(); +    Assert.assertNotNull("forward to eIDAS Node is null", forwardPage); +    Assert.assertFalse("forward to eIDAS Node is empty", forwardPage.isEmpty()); +     +    String eidasNodeReqToken = extractRequestToken(forwardPage,  +        "<input type=\"hidden\" name=\"token\" value=\""); +    Assert.assertFalse("eidas req. token", eidasNodeReqToken.isEmpty()); +     +    //check eIDAS node request and build respose +    String eidasRespToken = validateEidasNodeRequestAndBuildResponse(eidasNodeReqToken); +    Assert.assertFalse("eidas resp. token", eidasRespToken.isEmpty()); +     +     +    // set-up eIDAS-node response +    MockHttpServletRequest eidasNodeRespReq = new MockHttpServletRequest("POST", "https://localhost/ms_connector"); +    eidasNodeRespReq.setParameter("token", eidasRespToken); +     +    MockHttpServletResponse finalizeResp = new MockHttpServletResponse(); +    RequestContextHolder.resetRequestAttributes(); +    RequestContextHolder.setRequestAttributes(new ServletRequestAttributes(eidasNodeRespReq, finalizeResp)); +     +    injectSzrResponse(); +     +    //excute eIDAS node response +    eidasSignal.restoreEidasAuthProcess(eidasNodeRespReq, finalizeResp); +     +    //validate state +    Assert.assertEquals("forward to finalization", 302, finalizeResp.getStatus()); +    Assert.assertNotNull("missing redirect header", finalizeResp.getHeader("Location")); +    Assert.assertTrue("wrong redirect header", finalizeResp.getHeader("Location").startsWith(FINAL_REDIRECT)); +    String finalPendingReqId = finalizeResp.getHeader("Location").substring(FINAL_REDIRECT.length()); +    Assert.assertFalse("final pendingRequestId", finalPendingReqId.isEmpty()); +     +     +    //set-up finalization request +    MockHttpServletRequest finalizationReq = new MockHttpServletRequest("POST", "https://localhost/ms_connector"); +    finalizationReq.setParameter("pendingid", finalPendingReqId); +     +    MockHttpServletResponse saml2Resp = new MockHttpServletResponse(); +    RequestContextHolder.resetRequestAttributes(); +    RequestContextHolder.setRequestAttributes(new ServletRequestAttributes(finalizationReq, saml2Resp)); +     +    // exexcute finalization step +    finalize.finalizeAuthProtocol(finalizationReq, saml2Resp); +     +    //validate state +    Assert.assertEquals("forward to finalization", 200, saml2Resp.getStatus()); +    Assert.assertEquals("forward to eIDAS Node page", "text/html;charset=UTF-8", saml2Resp.getContentType()); +    String saml2RespPage = saml2Resp.getContentAsString(); +    Assert.assertNotNull("selectionPage is null", saml2RespPage); +    Assert.assertFalse("selectionPage is empty", saml2RespPage.isEmpty()); +     +    //validate SAML2 response +    String saml2RespB64 = extractRequestToken(saml2RespPage,  +        "<input type=\"hidden\" name=\"SAMLResponse\" value=\""); +    Assert.assertNotNull("SAML2 response", saml2RespB64); +     +    StatusResponseType saml2 = (StatusResponseType) XMLObjectSupport.unmarshallFromInputStream( +        XMLObjectProviderRegistrySupport.getParserPool(),  +        new ByteArrayInputStream(Base64Utils.decodeFromString(saml2RespB64))); +    Assert.assertEquals("SAML2 status", Constants.SUCCESS_URI, saml2.getStatus().getStatusCode().getValue()); +     +    final AssertionAttributeExtractor extractor = new AssertionAttributeExtractor(saml2); +    Assert.assertEquals("wrong resp attr. size", 6, extractor.getAllIncludeAttributeNames().size()); +    Assert.assertEquals("Wrong attr: LoA ", "http://eidas.europa.eu/LoA/high",  +        extractor.getSingleAttributeValue("urn:oid:1.2.40.0.10.2.1.1.261.108")); +    Assert.assertEquals("Wrong attr: PVP_VERSION ", "2.2",  +        extractor.getSingleAttributeValue("urn:oid:1.2.40.0.10.2.1.1.261.10")); +    Assert.assertEquals("Wrong attr: EID_ISSUER_NATION  ", cc,  +        extractor.getSingleAttributeValue("urn:oid:1.2.40.0.10.2.1.1.261.32")); +    Assert.assertEquals("Wrong attr: eidasBind", eidasBind,  +        extractor.getSingleAttributeValue("urn:eidgvat:attributes.eidbind")); +    Assert.assertNotNull("Wrong attr:  authBlock",  +        extractor.getSingleAttributeValue("urn:eidgvat:attributes.authblock.signed")); +    Assert.assertNotNull("Wrong attr: piiTras.Id ",  +        extractor.getSingleAttributeValue("urn:eidgvat:attributes.piiTransactionId")); +     +  } + +  private void injectSzrResponse() throws Exception { +     +    when(szrMock, "getStammzahlEncrypted", any(), any()).thenReturn(vsz); +    val signContentResp = new SignContentResponseType(); +    final SignContentEntry signContentEntry = new SignContentEntry(); +    signContentEntry.setValue(eidasBind); +    signContentResp.getOut().add(signContentEntry); +    when(szrMock, "signContent", any(), any(), any()).thenReturn(signContentResp); +     +  } + +  private String validateEidasNodeRequestAndBuildResponse(String eidasNodeReqToken)  +      throws SpecificCommunicationException, URISyntaxException { +    final SpecificCommunicationService springManagedSpecificConnectorCommunicationService = +        (SpecificCommunicationService) wac.getBean( +            SpecificCommunicationDefinitionBeanNames.SPECIFIC_CONNECTOR_COMMUNICATION_SERVICE.toString()); +     +    //read request and validate basic properties  +    ILightRequest req = springManagedSpecificConnectorCommunicationService.getAndRemoveRequest(eidasNodeReqToken,  +        attrRegistry.getCoreAttributeRegistry().getAttributes()); +     +    Assert.assertNotNull("eIDAS Node req", req); +    Assert.assertEquals("Wrong CC", cc, req.getCitizenCountryCode()); +    Assert.assertEquals("Wrong CC", EaafConstants.EIDAS_LOA_SUBSTANTIAL, req.getLevelOfAssurance()); +     +     +    //set response from eIDAS node +    BinaryLightToken respoToken = springManagedSpecificConnectorCommunicationService.putResponse( +        buildDummyAuthResponse(Constants.SUCCESS_URI, req.getId())); +    return Base64Utils.encodeToString(respoToken.getTokenBytes()); +     +  } + +  private AuthenticationResponse buildDummyAuthResponse(String statusCode, String reqId) throws URISyntaxException { +    final AttributeDefinition attributeDef = attrRegistry.getCoreAttributeRegistry().getByFriendlyName( +        Constants.eIDAS_ATTR_PERSONALIDENTIFIER).first(); +    final AttributeDefinition attributeDef2 = attrRegistry.getCoreAttributeRegistry().getByFriendlyName( +        Constants.eIDAS_ATTR_CURRENTFAMILYNAME).first(); +    final AttributeDefinition attributeDef3 = attrRegistry.getCoreAttributeRegistry().getByFriendlyName( +        Constants.eIDAS_ATTR_CURRENTGIVENNAME).first(); +    final AttributeDefinition attributeDef4 = attrRegistry.getCoreAttributeRegistry().getByFriendlyName( +        Constants.eIDAS_ATTR_DATEOFBIRTH).first(); +    +    final ImmutableAttributeMap attributeMap = ImmutableAttributeMap.builder() +        .put(attributeDef, personalId) +        .put(attributeDef2, familyName) +        .put(attributeDef3, givenName) +        .put(attributeDef4, dateOfBirth).build(); + +    val b = new AuthenticationResponse.Builder(); +    return b.id("_".concat(Random.nextHexRandom16())) +        .issuer(RandomStringUtils.randomAlphabetic(10)) +        .subject(RandomStringUtils.randomAlphabetic(10)) +        .statusCode(statusCode) +        .inResponseTo(reqId) +        .subjectNameIdFormat("afaf") +        .levelOfAssurance(EaafConstants.EIDAS_LOA_HIGH) +        .attributes(attributeMap) +        .build(); +     +  } +   +  private String extractRequestToken(String selectionPage, String selector) { +    int start = selectionPage.indexOf(selector); +    Assert.assertTrue("find no pendingReqId location start", start > 0); +    int end = selectionPage.indexOf("\"", start + selector.length()); +    Assert.assertTrue("find no pendingReqId location end", end > 0); +    return selectionPage.substring(start + selector.length(), end); +     +  } + +  private void injectSaml2AuthnReq(MockHttpServletRequest saml2Req) throws XMLParserException, UnmarshallingException,  +      SamlSigningException, CredentialsNotAvailableException, UnsupportedEncodingException, TransformerException,  +      IOException, MarshallingException, ComponentInitializationException { +    final RequestAbstractType authnReq = (RequestAbstractType) XMLObjectSupport.unmarshallFromInputStream( +        XMLObjectProviderRegistrySupport.getParserPool(), +        Pvp2SProfileEndPointTest.class.getResourceAsStream("/data/pvp2_authn_1.xml")); +    authnReq.setIssueInstant(DateTime.now());     +    RequestAbstractType signedAuthnReq =  +        Saml2Utils.signSamlObject(authnReq, credentialProvider.getMessageSigningCredential(), true);            +    String b64 = Base64Utils.encodeToString(DomUtils.serializeNode( +          XMLObjectSupport.getMarshaller(signedAuthnReq).marshall(signedAuthnReq)).getBytes("UTF-8"));     +    saml2Req.setParameter("SAMLRequest", b64); +             +    final org.springframework.core.io.Resource resource = resourceLoader.getResource( +        "classpath:/data/metadata_valid_without_encryption.xml"); +    Timer timer = new Timer("PVP metadata-resolver refresh"); +    ResourceBackedMetadataResolver fileSystemResolver =  +        new ResourceBackedMetadataResolver(timer, new OpenSaml3ResourceAdapter(resource)); +    fileSystemResolver.setId("test"); +    fileSystemResolver.setParserPool(XMLObjectProviderRegistrySupport.getParserPool()); +    fileSystemResolver.initialize();                     +    metadataProvider.addMetadataResolverIntoChain(fileSystemResolver); +     +  } +} diff --git a/connector/src/test/java/at/asitplus/eidas/specific/connector/test/MainClassExecutableModeTest.java b/connector/src/test/java/at/asitplus/eidas/specific/connector/test/MainClassExecutableModeTest.java index 66147971..5fd39383 100644 --- a/connector/src/test/java/at/asitplus/eidas/specific/connector/test/MainClassExecutableModeTest.java +++ b/connector/src/test/java/at/asitplus/eidas/specific/connector/test/MainClassExecutableModeTest.java @@ -81,7 +81,7 @@ public class MainClassExecutableModeTest {    @Test -  public void validConfigLocation() throws ClientProtocolException, IOException { +  public void validConfigLocation() throws Throwable {      SpringBootApplicationInitializer          .main(new String[] {              "--spring.config.location=src/test/resources/config/junit_config_1_springboot.properties,classpath:/application.properties", diff --git a/connector/src/test/java/at/asitplus/eidas/specific/connector/test/MainClassWebAppModeTest.java b/connector/src/test/java/at/asitplus/eidas/specific/connector/test/MainClassWebAppModeTest.java index 265edfb6..ae0a45db 100644 --- a/connector/src/test/java/at/asitplus/eidas/specific/connector/test/MainClassWebAppModeTest.java +++ b/connector/src/test/java/at/asitplus/eidas/specific/connector/test/MainClassWebAppModeTest.java @@ -72,7 +72,7 @@ public class MainClassWebAppModeTest {    }    @Test -  public void wrongConfigLocation() { +  public void wrongConfigLocation() throws Throwable {      //MS-specific connector property      final String current = new java.io.File(".").toURI().toString();      System.setProperty("eidas.ms.configuration", current @@ -93,7 +93,7 @@ public class MainClassWebAppModeTest {    @Test -  public void systemdConfigLocation() throws ClientProtocolException, IOException {     +  public void systemdConfigLocation() throws Throwable {          //MS-specific connector property      final String current = new java.io.File(".").toURI().toString();      System.setProperty("eidas.ms.configuration", current | 
