diff options
| author | Thomas Lenz <tlenz@iaik.tugraz.at> | 2018-07-12 16:16:29 +0200 | 
|---|---|---|
| committer | Thomas Lenz <tlenz@iaik.tugraz.at> | 2018-07-12 16:16:29 +0200 | 
| commit | 132681b9f3e00158b1671f50b23517462aa54afd (patch) | |
| tree | cda5e6b321a44fbb54a959693a4afe71eb25bd6a /id/server/idserverlib/src/test | |
| parent | 3535ae9500b29d0b2d0f317ea7f47a6c25c6f70e (diff) | |
| parent | 3b1130e2366138871a92a1f83124a27fa83885dd (diff) | |
| download | moa-id-spss-132681b9f3e00158b1671f50b23517462aa54afd.tar.gz moa-id-spss-132681b9f3e00158b1671f50b23517462aa54afd.tar.bz2 moa-id-spss-132681b9f3e00158b1671f50b23517462aa54afd.zip | |
Merge branch 'eIDAS_node_2.0_tests' into huge_refactoring
# Conflicts:
#	id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/builder/AuthenticationDataBuilder.java
#	id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/builder/BPKBuilder.java
#	id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/parser/VerifyXMLSignatureResponseParser.java
#	id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/auth/validator/VerifyXMLSignatureResponseValidator.java
#	id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/config/auth/OAAuthParameterDecorator.java
#	id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/config/auth/data/DynamicOAAuthParameters.java
#	id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/data/AuthenticationData.java
#	id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/moduls/AuthenticationManager.java
#	id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/builder/attributes/EncryptedBPKAttributeBuilder.java
#	id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/utils/AssertionAttributeExtractor.java
#	id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/utils/SAML2Utils.java
#	id/server/idserverlib/src/main/java/at/gv/egovernment/moa/id/protocols/pvp2x/verification/metadata/SchemaValidationFilter.java
#	id/server/idserverlib/src/main/resources/moaid.authentication.beans.xml
#	id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/module/test/TestRequestImpl.java
#	id/server/moa-id-commons/src/main/java/at/gv/egovernment/moa/id/commons/MOAIDAuthConstants.java
#	id/server/moa-id-commons/src/main/java/at/gv/egovernment/moa/id/commons/api/IOAAuthParameters.java
#	id/server/moa-id-commons/src/main/java/at/gv/egovernment/moa/id/commons/config/ConfigurationMigrationUtils.java
#	id/server/moa-id-commons/src/main/java/at/gv/egovernment/moa/id/commons/utils/KeyValueUtils.java
#	id/server/modules/moa-id-module-bkaMobilaAuthSAML2Test/src/main/java/at/gv/egovernment/moa/id/auth/modules/bkamobileauthtests/BKAMobileAuthModule.java
#	id/server/modules/moa-id-module-bkaMobilaAuthSAML2Test/src/main/java/at/gv/egovernment/moa/id/auth/modules/bkamobileauthtests/tasks/FirstBKAMobileAuthTask.java
#	id/server/modules/moa-id-module-sl20_authentication/src/main/java/at/gv/egovernment/moa/id/auth/modules/sl20_auth/sl20/JsonSecurityUtils.java
#	id/server/modules/moa-id-module-sl20_authentication/src/main/java/at/gv/egovernment/moa/id/auth/modules/sl20_auth/tasks/CreateQualeIDRequestTask.java
#	id/server/modules/moa-id-module-sl20_authentication/src/main/java/at/gv/egovernment/moa/id/auth/modules/sl20_auth/tasks/ReceiveQualeIDTask.java
#	id/server/modules/module-monitoring/src/main/java/at/gv/egovernment/moa/id/monitoring/IdentityLinkTestModule.java
Diffstat (limited to 'id/server/idserverlib/src/test')
8 files changed, 1546 insertions, 0 deletions
| diff --git a/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/AuthenticationDataBuilderTest.java b/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/AuthenticationDataBuilderTest.java new file mode 100644 index 000000000..16cdc9c12 --- /dev/null +++ b/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/AuthenticationDataBuilderTest.java @@ -0,0 +1,87 @@ +package at.gv.egovernment.moa.id.config.auth.data; + +import java.io.ByteArrayInputStream; +import java.util.Arrays; +import java.util.List; + +import org.junit.Test; +import org.junit.runner.RunWith; +import org.springframework.beans.factory.annotation.Autowired; +import org.springframework.test.context.ContextConfiguration; +import org.springframework.test.context.junit4.SpringJUnit4ClassRunner; + +import at.gv.egiz.eaaf.core.impl.idp.module.test.TestRequestImpl; +import at.gv.egovernment.moa.id.auth.builder.AuthenticationDataBuilder; +import at.gv.egovernment.moa.id.auth.parser.IdentityLinkAssertionParser; +import at.gv.egovernment.moa.id.commons.api.data.IAuthenticationSession; +import at.gv.egovernment.moa.id.data.IMOAAuthData; +import at.gv.egovernment.moa.util.Base64Utils; + +@RunWith(SpringJUnit4ClassRunner.class) +@ContextConfiguration("/SpringTest-context_basic_user_whitelist.xml") +public class AuthenticationDataBuilderTest { + +	@Autowired private AuthenticationDataBuilder authBuilder; +	 +	private static final String DUMMY_IDL = "PHNhbWw6QXNzZXJ0aW9uIEFzc2VydGlvbklEPSJzenIuYm1pLmd2LmF0LUFzc2VydGlvbklEMTUyNzY2OTEwMDU5MTI3NDQiIElzc3VlSW5zdGFudD0iMjAxOC0wNS0zMFQxMDozMTo0MCswMTowMCIgSXNzdWVyPSJodHRwOi8vcG9ydGFsLmJtaS5ndi5hdC9yZWYvc3pyL2lzc3VlciIgTWFqb3JWZXJzaW9uPSIxIiBNaW5vclZlcnNpb249IjAiIHhtbG5zOnNhbWw9InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjEuMDphc3NlcnRpb24iIHhtbG5zOnByPSJodHRwOi8vcmVmZXJlbmNlLmUtZ292ZXJubWVudC5ndi5hdC9uYW1lc3BhY2UvcGVyc29uZGF0YS8yMDAyMDIyOCMiIHhtbG5zOmRzaWc9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvMDkveG1sZHNpZyMiIHhtbG5zOmVjZHNhPSJodHRwOi8vd3d3LnczLm9yZy8yMDAxLzA0L3htbGRzaWctbW9yZSMiIHhtbG5zOnNpPSJodHRwOi8vd3d3LnczLm9yZy8yMDAxL1hNTFNjaGVtYS1pbnN0YW5jZSI+Cgk8c2FtbDpBdHRyaWJ1dGVTdGF0ZW1lbnQ+CgkJPHNhbWw6U3ViamVjdD4KCQkJPHNhbWw6U3ViamVjdENvbmZpcm1hdGlvbj4KCQkJCTxzYW1sOkNvbmZpcm1hdGlvbk1ldGhvZD51cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoxLjA6Y206c2VuZGVyLXZvdWNoZXM8L3NhbWw6Q29uZmlybWF0aW9uTWV0aG9kPgoJCQkJPHNhbWw6U3ViamVjdENvbmZpcm1hdGlvbkRhdGE+CgkJCQkJPHByOlBlcnNvbiBzaTp0eXBlPSJwcjpQaHlzaWNhbFBlcnNvblR5cGUiPjxwcjpJZGVudGlmaWNhdGlvbj48cHI6VmFsdWU+dHFDUUVDNytBcUdFZWVMMzkwVjVKZz09PC9wcjpWYWx1ZT48cHI6VHlwZT51cm46cHVibGljaWQ6Z3YuYXQ6YmFzZWlkPC9wcjpUeXBlPjwvcHI6SWRlbnRpZmljYXRpb24+PHByOk5hbWU+PHByOkdpdmVuTmFtZT5NYXg8L3ByOkdpdmVuTmFtZT48cHI6RmFtaWx5TmFtZSBwcmltYXJ5PSJ1bmRlZmluZWQiPk11c3Rlcm1hbm48L3ByOkZhbWlseU5hbWU+PC9wcjpOYW1lPjxwcjpEYXRlT2ZCaXJ0aD4xOTQwLTAxLTAxPC9wcjpEYXRlT2ZCaXJ0aD48L3ByOlBlcnNvbj4KCQkJCTwvc2FtbDpTdWJqZWN0Q29uZmlybWF0aW9uRGF0YT4KCQkJPC9zYW1sOlN1YmplY3RDb25maXJtYXRpb24+CgkJPC9zYW1sOlN1YmplY3Q+Cgk8c2FtbDpBdHRyaWJ1dGUgQXR0cmlidXRlTmFtZT0iQ2l0aXplblB1YmxpY0tleSIgQXR0cmlidXRlTmFtZXNwYWNlPSJ1cm46cHVibGljaWQ6Z3YuYXQ6bmFtZXNwYWNlczppZGVudGl0eWxpbms6MS4yIj48c2FtbDpBdHRyaWJ1dGVWYWx1ZT48ZHNpZzpSU0FLZXlWYWx1ZT48ZHNpZzpNb2R1bHVzPnMwWmhkR2E4REgwSW1iTlU3aTRxdDRtR25CUEFlTDk5Q0dkZmRCOEhWWE5CNWd3d2VMY1o5WE1TWUJvUHFHdFVqemh6S29zRkN5M0sNCmpsSEVrejB0L3JQemhOVGRsVjJRN0FGWEZlT2g3M3dPajQ3R1B2T2lVNzdwQjE3WnJaOHlObW1JTTEyUVE5MVN0RGFWRkUra0dxUEkNCmNFZHZiZk94blU4aGNpa3lYcWVheFZVV3oxbVdXTnRveUwyWG5wa1U0QkZVQnU1NWg5S2tYVEFQcnBUbEFMZjkvRDFKamZWb05tamwNCnBLWXh6Q3JBSmE4Sno4Ui9sNis0U0U3YXc3dGZuazNZUXkxcFVmNWZmellkeXZQS2ZxVTBUTUVKLzdpOW1ORHFCZlVwcVhBRWowdWUNCkpvRWs0UC9pa2Q5UnZuVUlsU0V1NzFHMyt1VEluSXBaaTd2UG93PT08L2RzaWc6TW9kdWx1cz48ZHNpZzpFeHBvbmVudD5BUUFCPC9kc2lnOkV4cG9uZW50PjwvZHNpZzpSU0FLZXlWYWx1ZT48L3NhbWw6QXR0cmlidXRlVmFsdWU+PC9zYW1sOkF0dHJpYnV0ZT48L3NhbWw6QXR0cmlidXRlU3RhdGVtZW50PgoJPGRzaWc6U2lnbmF0dXJlPgoJCTxkc2lnOlNpZ25lZEluZm8+CgkJCTxkc2lnOkNhbm9uaWNhbGl6YXRpb25NZXRob2QgQWxnb3JpdGhtPSJodHRwOi8vd3d3LnczLm9yZy8yMDAxLzEwL3htbC1leGMtYzE0biMiIC8+CgkJCTxkc2lnOlNpZ25hdHVyZU1ldGhvZCBBbGdvcml0aG09Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvMDkveG1sZHNpZyNyc2Etc2hhMSIgLz4KCQkJPGRzaWc6UmVmZXJlbmNlIFVSST0iIj4KCQkJCTxkc2lnOlRyYW5zZm9ybXM+CgkJCQkJPGRzaWc6VHJhbnNmb3JtIEFsZ29yaXRobT0iaHR0cDovL3d3dy53My5vcmcvVFIvMTk5OS9SRUMteHBhdGgtMTk5OTExMTYiPgoJCQkJCQk8ZHNpZzpYUGF0aD5ub3QoYW5jZXN0b3Itb3Itc2VsZjo6cHI6SWRlbnRpZmljYXRpb24pPC9kc2lnOlhQYXRoPgoJCQkJCTwvZHNpZzpUcmFuc2Zvcm0+CgkJCQkJPGRzaWc6VHJhbnNmb3JtIEFsZ29yaXRobT0iaHR0cDovL3d3dy53My5vcmcvMjAwMC8wOS94bWxkc2lnI2VudmVsb3BlZC1zaWduYXR1cmUiIC8+CgkJCQk8L2RzaWc6VHJhbnNmb3Jtcz4KCQkJCTxkc2lnOkRpZ2VzdE1ldGhvZCBBbGdvcml0aG09Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvMDkveG1sZHNpZyNzaGExIiAvPgoJCQkJPGRzaWc6RGlnZXN0VmFsdWU+QmVIdUFyYXUzSFVQcXg5dHV3QTRGaDNOSDB3PTwvZHNpZzpEaWdlc3RWYWx1ZT4KCQkJPC9kc2lnOlJlZmVyZW5jZT4KCQkJPGRzaWc6UmVmZXJlbmNlIFR5cGU9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvMDkveG1sZHNpZyNNYW5pZmVzdCIgVVJJPSIjbWFuaWZlc3QiPgoJCQkJPGRzaWc6RGlnZXN0TWV0aG9kIEFsZ29yaXRobT0iaHR0cDovL3d3dy53My5vcmcvMjAwMC8wOS94bWxkc2lnI3NoYTEiIC8+CgkJCQk8ZHNpZzpEaWdlc3RWYWx1ZT5mVEUrMjRnRHlkUlgvd0p2QlAxOUlucU54Rkk9PC9kc2lnOkRpZ2VzdFZhbHVlPgoJCQk8L2RzaWc6UmVmZXJlbmNlPgoJCTwvZHNpZzpTaWduZWRJbmZvPgoJCTxkc2lnOlNpZ25hdHVyZVZhbHVlPgogICAgUHpLMWR2N2JFMGhQcGxlc1ZaRFhHSWxhbTlUK0JxWkd4ZWs5RHVuYkhNK21GWWI3a1NaZTN2eEszUmhRZjNBV3djbXFtVWZPRlJObg0KWndxYnovNGRZd2hJRld6VGdMelVmMlZkR0JsN2szbS8wSmJXSkV1bEtobE5vV2ZSTkRrdTRZcmI2THVrWjdaQzJFcWd2UXYxa1BRTg0Kb1BvQ1I5d3hUc1RKWFNCaHdLc0lERG9vZHY3aUVpWGFCM0xmVHQrQWdYdEdvbWRRaktjby9WamJSSzRUUEkvQUVNVU1KWm9zZlJYMg0KdmE2U1BaUnV4QjBlWkwwVGVzYittRjlFaUlOVnNTSU9nbTVSRE95V1ZRZkJnVG9nYjNoWmlLVmh0a1IvaWlSNmhZNlA2b1cwTDh4ag0KMG5ZVldPRHAxSlJML3Z0ZDFhUklVYzNCQTJQaFkrRmdJR1FHTUE9PQogIDwvZHNpZzpTaWduYXR1cmVWYWx1ZT48ZHNpZzpLZXlJbmZvPjxkc2lnOlg1MDlEYXRhPjxkc2lnOlg1MDlDZXJ0aWZpY2F0ZT5NSUlGdXpDQ0JLT2dBd0lCQWdJREdTa2VNQTBHQ1NxR1NJYjNEUUVCQlFVQU1JR2ZNUXN3Q1FZRFZRUUdFd0pCDQpWREZJTUVZR0ExVUVDZ3cvUVMxVWNuVnpkQ0JIWlhNdUlHWXVJRk5wWTJobGNtaGxhWFJ6YzNsemRHVnRaU0JwDQpiU0JsYkdWcmRISXVJRVJoZEdWdWRtVnlhMlZvY2lCSGJXSklNU0l3SUFZRFZRUUxEQmxoTFhOcFoyNHRZMjl5DQpjRzl5WVhSbExXeHBaMmgwTFRBeU1TSXdJQVlEVlFRRERCbGhMWE5wWjI0dFkyOXljRzl5WVhSbExXeHBaMmgwDQpMVEF5TUI0WERURTFNRGN5T0RFMU5Ea3dOVm9YRFRJd01EY3lPREV6TkRrd05Wb3dnYll4Q3pBSkJnTlZCQVlUDQpBa0ZVTVI0d0hBWURWUVFLREJWRVlYUmxibk5qYUhWMGVtdHZiVzFwYzNOcGIyNHhJakFnQmdOVkJBc01HVk4wDQpZVzF0ZW1Gb2JISmxaMmx6ZEdWeVltVm9iMlZ5WkdVeExqQXNCZ05WQkFNTUpWTnBaMjVoZEhWeWMyVnlkbWxqDQpaU0JFWVhSbGJuTmphSFYwZW10dmJXMXBjM05wYjI0eEZUQVRCZ05WQkFVVERETXlOVGt5T0RNeU16azVPREVjDQpNQm9HQ1NxR1NJYjNEUUVKQVF3TlpITnJRR1J6YXk1bmRpNWhkRENDQVNJd0RRWUpLb1pJaHZjTkFRRUJCUUFEDQpnZ0VQQURDQ0FRb0NnZ0VCQU4rZEJTRUJHajJqVVhJSzFNcDNsVnhjL1phK3BKTWl5S3JYM0cxWnhnWC9pa3g3DQpEOXNjc1BZTXQ0NzNMbEFXbDljbUNiSGJKSytQVjJYTk5kVVJMTVVDSVgrNHZVTnMyTUhlRFRRdFg4QlhqSkZwDQp3SllTb2FSSlEzOUZWUy8xcjVzV2NyYTlIaGRtN3c1R3R4LzJ1a3lEWDBrZGt4YXdraFA0RVFFemkvU0krRnVnDQpuK1dxZ1ExbkFkbGJ4Yi9kY0J3NXcxaDliM2xtdXdVZjR6M29vUVdVRDJEZ0Eva0tkMUtlak5SNDNtTFVzbXZTDQp6ZXZQeFQ5enM3OHBPUjFPYWNCN0lzelRWSlBYZU9FYWFOWkhubkIvVWVPM2c4TEVWLzNPa1hjVWdjTWtiSUlpDQphQkhsbGw3MVBxMENPajlrcWpYb2U3T3JSakxZNWkzS3dPcGE2VE1DQXdFQUFhT0NBZVV3Z2dIaE1CRUdBMVVkDQpEZ1FLQkFoTUNBNmVHdlMxdWpBT0JnTlZIUThCQWY4RUJBTUNCTEF3RGdZSEtpZ0FDZ0VIQVFRREFRSC9NQk1HDQpBMVVkSXdRTU1BcUFDRWtjV0RwUDZBMERNQWtHQTFVZEV3UUNNQUF3RkFZSEtpZ0FDZ0VCQVFRSkRBZENVMEl0DQpSRk5MTUg4R0NDc0dBUVVGQndFQkJITXdjVEJHQmdnckJnRUZCUWN3QW9ZNmFIUjBjRG92TDNkM2R5NWhMWFJ5DQpkWE4wTG1GMEwyTmxjblJ6TDJFdGMybG5iaTFqYjNKd2IzSmhkR1V0YkdsbmFIUXRNREpoTG1OeWREQW5CZ2dyDQpCZ0VGQlFjd0FZWWJhSFIwY0RvdkwyOWpjM0F1WVMxMGNuVnpkQzVoZEM5dlkzTndNRlFHQTFVZElBUk5NRXN3DQpTUVlHS2lnQUVRRVNNRDh3UFFZSUt3WUJCUVVIQWdFV01XaDBkSEE2THk5M2QzY3VZUzEwY25WemRDNWhkQzlrDQpiMk56TDJOd0wyRXRjMmxuYmkxQmJYUnpjMmxuYm1GMGRYSXdnWjRHQTFVZEh3U0JsakNCa3pDQmtLQ0JqYUNCDQppb2FCaDJ4a1lYQTZMeTlzWkdGd0xtRXRkSEoxYzNRdVlYUXZiM1U5WVMxemFXZHVMV052Y25CdmNtRjBaUzFzDQphV2RvZEMwd01peHZQVUV0VkhKMWMzUXNZejFCVkQ5alpYSjBhV1pwWTJGMFpYSmxkbTlqWVhScGIyNXNhWE4wDQpQMkpoYzJVL2IySnFaV04wWTJ4aGMzTTlaV2xrUTJWeWRHbG1hV05oZEdsdmJrRjFkR2h2Y21sMGVUQU5CZ2txDQpoa2lHOXcwQkFRVUZBQU9DQVFFQUhRM1pDTXRBYmF6ZU1IbVdBMnpoWWxIcUhnS1ZvY1ZYRURnbU5tV0xHcUZlDQo4RUFERklzOHVHcmt0Qm1XQ1VJWGJYczdUSGNmeHMySjQ3dkh1Y29wc2RrYWJObFhFanpuZFJmbmMrMVZJbmJvDQp6TXJZZDdqZUROVEsvdElqaU9FWWRyeUlwZWtWOUNmYXc3eXU2bWVmTXpldTFhQXdmN0JuSy9odWl3SlduZW5wDQpCN2lEL1B2WittenVDN1JOZkpmRisrU3RpQlR4aTNWWXhOR01qTTFjVThHdzlWV2MwUjNFdWpPYVhXZ0NDOGk1DQpGR2hWdk9ZaE5YZnN4SlhiTnhld0VDanBBTHZEbEZMTCtpQzQ5RytBRFNvUnYwU2s5MU9QdStjSW1DajNyczNRDQp0YXNJL3A5TFlhY0c2Yy9nSTN0RTBpaHFnOVJic0tIWFFsM1BPdkVSSkE9PTwvZHNpZzpYNTA5Q2VydGlmaWNhdGU+PC9kc2lnOlg1MDlEYXRhPjwvZHNpZzpLZXlJbmZvPgoJCTxkc2lnOk9iamVjdD4KCQkJPGRzaWc6TWFuaWZlc3QgSWQ9Im1hbmlmZXN0Ij4KCQkJCTxkc2lnOlJlZmVyZW5jZSBVUkk9IiI+CgkJCQkJPGRzaWc6VHJhbnNmb3Jtcz4KCQkJCQkJPGRzaWc6VHJhbnNmb3JtIEFsZ29yaXRobT0iaHR0cDovL3d3dy53My5vcmcvVFIvMTk5OS9SRUMteHBhdGgtMTk5OTExMTYiPgoJCQkJCQkJPGRzaWc6WFBhdGg+bm90KGFuY2VzdG9yLW9yLXNlbGY6OmRzaWc6U2lnbmF0dXJlKTwvZHNpZzpYUGF0aD4KCQkJCQkJPC9kc2lnOlRyYW5zZm9ybT4KCQkJCQk8L2RzaWc6VHJhbnNmb3Jtcz4KCQkJCQk8ZHNpZzpEaWdlc3RNZXRob2QgQWxnb3JpdGhtPSJodHRwOi8vd3d3LnczLm9yZy8yMDAwLzA5L3htbGRzaWcjc2hhMSIgLz4KCQkJCQk8ZHNpZzpEaWdlc3RWYWx1ZT5wM1pwS1BvK0ZYT3ZXdEhidFJzR2VLWm9lSTQ9PC9kc2lnOkRpZ2VzdFZhbHVlPgoJCQkJPC9kc2lnOlJlZmVyZW5jZT4KCQkJPC9kc2lnOk1hbmlmZXN0PgoJCTwvZHNpZzpPYmplY3Q+Cgk8L2RzaWc6U2lnbmF0dXJlPgo8L3NhbWw6QXNzZXJ0aW9uPg=="; +	 +	@Test +	public void dummyTest() throws Exception { +		 +		 +	}   +	   +	   +	@Test +	public void buildAuthDataWithIDLOnly() throws Exception { +		TestRequestImpl pendingReq = new TestRequestImpl(); +		DummyOAConfig oaParam = new DummyOAConfig(); +		oaParam.setHasBaseIdTransferRestriction(false); +		oaParam.setTarget("urn:publicid:gv.at:cdid+ZP-MH"); +		oaParam.setForeignbPKSectors(Arrays.asList("wbpk+FN+195738a")); +		pendingReq.setSpConfig(oaParam); +				 +		IAuthenticationSession session = new DummyAuthSession(); +		session.setIdentityLink(new IdentityLinkAssertionParser(new ByteArrayInputStream(Base64Utils.decode(DUMMY_IDL, false))).parseIdentityLink()); +		pendingReq.setGenericDataToSession(session.getKeyValueRepresentationFromAuthSession()); +		 +		 +		IMOAAuthData authData = (IMOAAuthData) authBuilder.buildAuthenticationData(pendingReq); +		 +		if (!authData.getFamilyName().equals("Mustermann")) +			throw new Exception("Familyname wrong"); +		 +		if (!authData.getGivenName().equals("Max")) +			throw new Exception("GivenName wrong"); +						 +		if (!authData.getFormatedDateOfBirth().equals("1940-01-01")) +			throw new Exception("DateOfBirth wrong"); +		  +		 +		if (!authData.getIdentificationValue().equals("tqCQEC7+AqGEeeL390V5Jg==")) +			throw new Exception("baseId wrong"); +		 +		if (!authData.getIdentificationType().equals("urn:publicid:gv.at:baseid")) +			throw new Exception("baseIdType wrong"); +		 +	 +		if (!authData.getBPK().equals("DJ6nGg2JgcPH768BhqTNXVsGhOY=")) +			throw new Exception("bPK wrong"); +		 +		if (!authData.getBPKType().equals("urn:publicid:gv.at:cdid+ZP-MH")) +			throw new Exception("bPKType wrong"); +		 +		 +		List<String> foreignbPKs = authData.getEncbPKList(); +		if (foreignbPKs.isEmpty()) +			throw new Exception("NO foreign bPK list is null"); +		 +		if (foreignbPKs.size() != 1) +			throw new Exception("NO or MORE THAN ONE foreign bPK"); +		 +		if (!foreignbPKs.get(0).startsWith("(wbpk+FN+195738a|") && !(foreignbPKs.get(0).endsWith(")"))) +			throw new Exception("foreign bPK has wrong prefix"); +				 +	} +	 +} diff --git a/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/DummyAuthConfig.java b/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/DummyAuthConfig.java new file mode 100644 index 000000000..befaa9bd7 --- /dev/null +++ b/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/DummyAuthConfig.java @@ -0,0 +1,460 @@ +package at.gv.egovernment.moa.id.config.auth.data; + +import java.io.IOException; +import java.net.URI; +import java.net.URL; +import java.util.HashMap; +import java.util.List; +import java.util.Map; +import java.util.Properties; + +import at.gv.egiz.eaaf.core.api.idp.ISPConfiguration; +import at.gv.egiz.eaaf.core.exceptions.EAAFConfigurationException; +import at.gv.egiz.eaaf.core.exceptions.EAAFException; +import at.gv.egovernment.moa.id.auth.builder.AuthenticationDataBuilder; +import at.gv.egovernment.moa.id.auth.modules.internal.tasks.UserRestrictionTask; +import at.gv.egovernment.moa.id.commons.api.AuthConfiguration; +import at.gv.egovernment.moa.id.commons.api.ConnectionParameterInterface; +import at.gv.egovernment.moa.id.commons.api.IOAAuthParameters; +import at.gv.egovernment.moa.id.commons.api.IStorkConfig; +import at.gv.egovernment.moa.id.commons.api.data.ProtocolAllowed; +import at.gv.egovernment.moa.id.commons.api.exceptions.ConfigurationException; +import at.gv.util.config.EgovUtilPropertiesConfiguration; + +public class DummyAuthConfig implements AuthConfiguration { + +	@Override +	public String getRootConfigFileDir() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getDefaultChainingMode() { +		// TODO Auto-generated method stub +		return null;  +	} + +	@Override +	public String getTrustedCACertificates() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean isTrustmanagerrevoationchecking() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public String[] getActiveProfiles() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public Properties getGeneralPVP2ProperiesConfig() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public Properties getGeneralOAuth20ProperiesConfig() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public ProtocolAllowed getAllowedProtocols() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public Map<String, String> getConfigurationWithPrefix(String Prefix) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getConfigurationWithKey(String key) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getBasicConfiguration(String key) { +		if (UserRestrictionTask.CONFIG_PROPS_CSV_USER_FILE.equals(key)) { +			String current; +			try { +				current = new java.io.File( "." ).getCanonicalPath(); +				return "file:" + current + "/src/test/resources/BPK-Whitelist_20180607.csv"; +			} catch (IOException e) { +				e.printStackTrace(); +			} +			  +		} else if (UserRestrictionTask.CONFIG_PROPS_CSV_USER_SECTOR.equals(key)) { +			return "urn:publicid:gv.at:cdid+ZP-MH"; +			 +		}  +		 +		 +		return null; +	} + +	@Override +	public String getBasicConfiguration(String key, String defaultValue) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public Map<String, String> getBasicMOAIDConfigurationWithPrefix(String prefix) { +		Map<String, String> result = new HashMap<String, String>(); +		if (AuthenticationDataBuilder.CONFIGURATION_PROP_FOREIGN_BPK_ENC_KEYS.equals(prefix)) { +			result.put("BMI+T1", "MIICuTCCAaGgAwIBAgIEWQMr6TANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDARyb290MB4XDTE3MDQyODExNDgyN1oXDTE4MDQyODExNDgyN1owDzENMAsGA1UEAwwEcm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKavdekY9h6te6UoCvahSKqhlNk+ZMGq1aBvj129J10wJoz3BsO86cK/ounvzrE9g6FOOeEtlb/lRRTwhO601o9/dXhIvSalpKgAF4owTuhxKUEhEUNJr4pUxFSm8OkPHEXqSXsn6W7tg/G0r12z246RAApw5jpzDDdYYY8gEZFXURf1xYnbKFPoNlPIyFj0vN7Afe+Fo8v3Brb05iQkC3wBxMnL2LZ7XLK8uu93VG/mOrUrEtZkFzOWg0c3WBKQgxCD/F5BMouXBSsNu7lzV2qEyX0uIiEQrv75Fk32DjQqx41S31lByFnL8YbYWX4lsCv0O9Smhjrn6+k91JsvcDECAwEAAaMdMBswDAYDVR0TBAUwAwEB/zALBgNVHQ8EBAMCAb4wDQYJKoZIhvcNAQELBQADggEBAAFQVd6PHrpBDTw+YUYj3yOgjFlKiSTEb4s59O74CZGbgElE2k36bqEJwki8W2ZiK+L3aeA1XCYF9cuI8QBWHJXg3UQFtDMF2zieOy/BBEA0HN6q4IjQKbt9cNR3w7nMp+lJ/BUlX6AIqfmSgJ6bKVlUsu4yuhstDBXy7QOAuQ8q76qkk7j6uiahWCyBRb5R9TDj7mQn0nM/tbeUUZa7Mxje/W4YhdatNYasTnExCyEE4S6lpSiJQdrkFGlRWp6Ia41/r6GZsAZ6pss+xyxDbJySqbVn2ro6WV4kMbrh/gX1HbmrF5UGIO/qvM+5yM6+wUfLtqPCK0PtLkI940E3WfM="); +			result.put("wbpk+FN+468924i", "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"); +			result.put("wbpk+FN+195738a", "MIIF2TCCA8GgAwIBAgIEL2AV4zANBgkqhkiG9w0BAQsFADCBizELMAkGA1UEBhMC\r\n" +  +					"QVQxSDBGBgNVBAoMP0EtVHJ1c3QgR2VzLiBmLiBTaWNoZXJoZWl0c3N5c3RlbWUg\r\n" +  +					"aW0gZWxla3RyLiBEYXRlbnZlcmtlaHIgR21iSDEYMBYGA1UECwwPYS1zaWduLWxp\r\n" +  +					"Z2h0LTA1MRgwFgYDVQQDDA9hLXNpZ24tbGlnaHQtMDUwHhcNMTgwNjA4MTA0MzEy\r\n" +  +					"WhcNMjMwNjA4MDg0MzEyWjBoMQswCQYDVQQGEwJBVDEbMBkGA1UEAwwSZS1UcmVz\r\n" +  +					"b3IgRnJlbWQtYlBLMRIwEAYDVQQEDAlGcmVtZC1iUEsxETAPBgNVBCoMCGUtVHJl\r\n" +  +					"c29yMRUwEwYDVQQFEwwxMTc3MDQwMzU4MjUwggEgMA0GCSqGSIb3DQEBAQUAA4IB\r\n" +  +					"DQAwggEIAoIBAQC9jQHCrCK4r8bKsist/h53yP7RzqDZhDGy3j6BLiGMGeQ8Qekf\r\n" +  +					"k+Onmy6k7PfOfBZgiOd/Zs8JXZMISycz5/G9WJp0d1iFjmRDNWmM4MEN8k+mAnW+\r\n" +  +					"Omn7sTJStaL5hRME/YdJpI/k08MasQuc13M6i6szpKA0eMfLf0nTWgEWt5e/x3Gj\r\n" +  +					"+Br7dxYtv8RDeHHVhk5EkXwbhuVi9fO/UCNEAEsKCkiTGCwVRek/c+LQ42cnuLKN\r\n" +  +					"Kg4LKJaIrr9uyMkibYpDZi1nXwQR9Jxsg4lzfpyAvSJIZtqMN0C66cwnzflLt9M8\r\n" +  +					"GwO08KzvONEo4oiodKx7IcMGGbjukHX2NY7BAgERo4IBZzCCAWMwdAYIKwYBBQUH\r\n" +  +					"AQEEaDBmMDsGCCsGAQUFBzAChi9odHRwOi8vd3d3LmEtdHJ1c3QuYXQvY2VydHMv\r\n" +  +					"YS1zaWduLWxpZ2h0LTA1LmNydDAnBggrBgEFBQcwAYYbaHR0cDovL29jc3AuYS10\r\n" +  +					"cnVzdC5hdC9vY3NwMBMGA1UdIwQMMAqACEhCh7VWr5ysMB0GA1UdEQQWMBSBEnRl\r\n" +  +					"Y2huaWtAYS10cnVzdC5hdDARBgNVHQ4ECgQIRnNIDj8iCQcwDgYDVR0PAQH/BAQD\r\n" +  +					"AgSwMAkGA1UdEwQCMAAwTQYDVR0gBEYwRDBCBgYqKAARAQkwODA2BggrBgEFBQcC\r\n" +  +					"ARYqaHR0cDovL3d3dy5hLXRydXN0LmF0L2RvY3MvY3AvYS1zaWduLWxpZ2h0MDoG\r\n" +  +					"A1UdHwQzMDEwL6AtoCuGKWh0dHA6Ly9jcmwuYS10cnVzdC5hdC9jcmwvYS1zaWdu\r\n" +  +					"LWxpZ2h0LTA1MA0GCSqGSIb3DQEBCwUAA4ICAQAh7plfW9U3hh5brYS0OmWhKJrM\r\n" +  +					"jBDn9TyKsdetZ3AU3/GJONSq1GrZbTv6dq6vAH0G20cNQaLSNl2/9U3WBqX2T2Ik\r\n" +  +					"vek8925+9HAFRVZiwnNX5CT0dQGNkqkagVzfd8dj8n+KiQZZZN9WroR9MoRXNlw1\r\n" +  +					"DERzlXLlYFtK+F4323LtbolSLnN793p/6al4k8RheKG0Jy+pEtpCy6KNohkl34ZE\r\n" +  +					"xtGrQLrJDtRtbCJcJ1t2fsM8iP9vi+K+0hOolIM7qwELRftwhvLyB+Gtlke2zLod\r\n" +  +					"SR0AA6fLoNISdKpSEIu1OJ88R70T3q3sEYWLHc8GHPO6WjaF/tq8iI/lPeUc0c2u\r\n" +  +					"gZOpH6Q3jWZo9UmhAbcyIwQTtVg9lS35EM3xPt+GC9DTsyNkTJObICZXUGsUswCp\r\n" +  +					"Vj76888biAR/ey9pr6fctj11w4jEwOP5pIcKdv1vX6KZl58O8kIUV3IUbvFY/M1n\r\n" +  +					"bfCrmm8uT4780NAIv3v8jgB/wK6EjntXoACPyGwB3lbdWJ2lZ4y5QCYEbW/8LLzJ\r\n" +  +					"6kGERNrFGBn4pK8GhZg8Tq1GigOyUrGteHeYUylKqLRoIvby53tYHnMx5fS/N/OU\r\n" +  +					"uKuAqGNHDTNkYI2jWhS6gFjUdTiaVVdKo/GSS4eDU5hsKOBRHTKWLT9E1DryCUkD\r\n" +  +					"u4SwB63SrCEshSczfA==\r\n"); +			 +		} +		 +		return result; +	} + +	@Override +	public int getTransactionTimeOut() { +		// TODO Auto-generated method stub +		return 0; +	} + +	@Override +	public int getSSOCreatedTimeOut() { +		// TODO Auto-generated method stub +		return 0; +	} + +	@Override +	public int getSSOUpdatedTimeOut() { +		// TODO Auto-generated method stub +		return 0; +	} + +	@Override +	public String getAlternativeSourceID() throws ConfigurationException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public List<String> getLegacyAllowedProtocols() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getMoaSpAuthBlockTrustProfileID(boolean useTestTrustStore) throws ConfigurationException { +		if (useTestTrustStore) +			return "MOAIDBuergerkarteAuthentisierungsDatenMitTestkarten"; +		else +			return "MOAIDBuergerkarteAuthentisierungsDaten"; +	} + +	@Override +	public List<String> getMoaSpAuthBlockVerifyTransformsInfoIDs() throws ConfigurationException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public ConnectionParameterInterface getMoaSpConnectionParameter() throws ConfigurationException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public ConnectionParameterInterface getOnlineMandatesConnectionParameter(IOAAuthParameters oaParameters) +			throws ConfigurationException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getMoaSpIdentityLinkTrustProfileID(boolean useTestTrustStore) throws ConfigurationException { +		if (useTestTrustStore)			 +			return "MOAIDBuergerkartePersonenbindungMitTestkarten"; +		else +			return "MOAIDBuergerkartePersonenbindung"; +	} + +	@Override +	public List<String> getTransformsInfos() throws ConfigurationException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public List<String> getIdentityLinkX509SubjectNames() throws ConfigurationException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public List<String> getSLRequestTemplates() throws ConfigurationException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getSLRequestTemplates(String type) throws ConfigurationException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public List<String> getDefaultBKUURLs() throws ConfigurationException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getDefaultBKUURL(String type) throws ConfigurationException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getSSOTagetIdentifier() throws ConfigurationException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getSSOFriendlyName() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getSSOSpecialText() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getMOASessionEncryptionKey() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getMOAConfigurationEncryptionKey() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean isIdentityLinkResigning() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public String getIdentityLinkResigningKey() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean isMonitoringActive() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public String getMonitoringTestIdentityLinkURL() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getMonitoringMessageSuccess() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean isAdvancedLoggingActive() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public List<String> getPublicURLPrefix() throws ConfigurationException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean isVirtualIDPsEnabled() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public boolean isPVP2AssertionEncryptionActive() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public boolean isCertifiacteQCActive() { +		return true; +	} + +	@Override +	public IStorkConfig getStorkConfig() throws ConfigurationException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public EgovUtilPropertiesConfiguration geteGovUtilsConfig() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getDocumentServiceUrl() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean isStorkFakeIdLActive() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public List<String> getStorkFakeIdLCountries() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public List<String> getStorkNoSignatureCountries() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getStorkFakeIdLResigningKey() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean isPVPSchemaValidationActive() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public Map<String, String> getConfigurationWithWildCard(String key) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public List<Integer> getDefaultRevisionsLogEventCodes() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean isHTTPAuthAllowed() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public String[] getRevocationMethodOrder() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean getBasicMOAIDConfigurationBoolean(String key, boolean defaultValue) { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public URI getConfigurationFilePath() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public URI getConfigurationRootDirectory() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public Properties getFullConfigurationProperties() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public ISPConfiguration getServiceProviderConfiguration(String arg0) throws EAAFConfigurationException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public <T> T getServiceProviderConfiguration(String arg0, Class<T> arg1) throws EAAFConfigurationException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String validateIDPURL(URL arg0) throws EAAFException { +		// TODO Auto-generated method stub +		return null; +	} + +} diff --git a/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/DummyAuthSession.java b/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/DummyAuthSession.java new file mode 100644 index 000000000..ad68e089e --- /dev/null +++ b/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/DummyAuthSession.java @@ -0,0 +1,296 @@ +package at.gv.egovernment.moa.id.config.auth.data; + +import java.util.Date; +import java.util.HashMap; +import java.util.List; +import java.util.Map; + +import at.gv.egiz.eaaf.core.api.idp.auth.data.IIdentityLink; +import at.gv.egiz.eaaf.core.exceptions.EAAFStorageException; +import at.gv.egovernment.moa.id.commons.api.data.AuthProzessDataConstants; +import at.gv.egovernment.moa.id.commons.api.data.ExtendedSAMLAttribute; +import at.gv.egovernment.moa.id.commons.api.data.IAuthenticationSession; +import at.gv.egovernment.moa.id.commons.api.data.IMISMandate; +import at.gv.egovernment.moa.id.commons.api.data.IVerifiyXMLSignatureResponse; +import iaik.x509.X509Certificate; + +public class DummyAuthSession implements IAuthenticationSession, AuthProzessDataConstants { + +	private IIdentityLink idl; +  +	@Override +	public boolean isAuthenticated() { +		return true; +	} + +	@Override +	public void setAuthenticated(boolean authenticated) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public X509Certificate getSignerCertificate() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public byte[] getEncodedSignerCertificate() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public void setSignerCertificate(X509Certificate signerCertificate) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public IIdentityLink getIdentityLink() { +		return this.idl; +	} + +	@Override +	public void setIdentityLink(IIdentityLink identityLink) { +		this.idl = identityLink; +		 +	} + +	@Override +	public String getBkuURL() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public void setBkuURL(String bkuURL) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public String getAuthBlock() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public void setAuthBlock(String authBlock) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public List<ExtendedSAMLAttribute> getExtendedSAMLAttributesAUTH() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public void setExtendedSAMLAttributesAUTH(List<ExtendedSAMLAttribute> extendedSAMLAttributesAUTH) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public List<ExtendedSAMLAttribute> getExtendedSAMLAttributesOA() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public void setExtendedSAMLAttributesOA(List<ExtendedSAMLAttribute> extendedSAMLAttributesOA) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public boolean getSAMLAttributeGebeORwbpk() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public void setSAMLAttributeGebeORwbpk(boolean samlAttributeGebeORwbpk) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public String getIssueInstant() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public void setIssueInstant(String issueInstant) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public void setUseMandate(String useMandate) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public void setUseMandates(boolean useMandates) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public boolean isMandateUsed() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public void setMISSessionID(String misSessionID) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public String getMISSessionID() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getMandateReferenceValue() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public void setMandateReferenceValue(String mandateReferenceValue) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public boolean isForeigner() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public void setForeigner(boolean isForeigner) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public IVerifiyXMLSignatureResponse getXMLVerifySignatureResponse() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public void setXMLVerifySignatureResponse(IVerifiyXMLSignatureResponse xMLVerifySignatureResponse) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public IMISMandate getMISMandate() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public void setMISMandate(IMISMandate mandate) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public boolean isOW() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public void setOW(boolean isOW) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public String getAuthBlockTokken() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public void setAuthBlockTokken(String authBlockTokken) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public String getQAALevel() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public void setQAALevel(String qAALevel) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public Date getSessionCreated() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public Map<String, Object> getGenericSessionDataStorage() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public Object getGenericDataFromSession(String key) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public <T> T getGenericDataFromSession(String key, Class<T> clazz) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getSSOSessionID() { +		return "123456789abcd"; +	} + +	@Override +	public void setSSOSessionID(String sessionId) { +		// TODO Auto-generated method stub +		 +	} + +	@Override +	public Map<String, Object> getKeyValueRepresentationFromAuthSession() { +		Map<String, Object> result = new HashMap<String, Object>(); +		result.put(VALUE_IDENTITYLINK, getIdentityLink());		 +		return result; +		 +	} + +	@Override +	public void setGenericDataToSession(String arg0, Object arg1) throws EAAFStorageException { +		 +	} + +	 +} diff --git a/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/DummyAuthStorage.java b/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/DummyAuthStorage.java new file mode 100644 index 000000000..846819868 --- /dev/null +++ b/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/DummyAuthStorage.java @@ -0,0 +1,180 @@ +package at.gv.egovernment.moa.id.config.auth.data; + +import java.util.Date; +import java.util.List; + +import at.gv.egiz.eaaf.core.api.IRequest; +import at.gv.egiz.eaaf.core.api.idp.slo.SLOInformationInterface; +import at.gv.egiz.eaaf.modules.pvp2.sp.exception.AssertionAttributeExtractorExeption; +import at.gv.egiz.eaaf.modules.pvp2.sp.impl.utils.AssertionAttributeExtractor; +import at.gv.egovernment.moa.id.auth.data.AuthenticationSession; +import at.gv.egovernment.moa.id.auth.data.AuthenticationSessionExtensions; +import at.gv.egovernment.moa.id.auth.exception.AuthenticationException; +import at.gv.egovernment.moa.id.auth.exception.BuildException; +import at.gv.egovernment.moa.id.commons.api.data.IAuthenticationSession; +import at.gv.egovernment.moa.id.commons.db.dao.session.AuthenticatedSessionStore; +import at.gv.egovernment.moa.id.commons.db.dao.session.InterfederationSessionStore; +import at.gv.egovernment.moa.id.commons.db.dao.session.OASessionStore; +import at.gv.egovernment.moa.id.commons.db.dao.session.OldSSOSessionIDStore; +import at.gv.egovernment.moa.id.commons.db.ex.MOADatabaseException; +import at.gv.egovernment.moa.id.storage.IAuthenticationSessionStoreage; + +public class DummyAuthStorage implements IAuthenticationSessionStoreage { + +	@Override +	public AuthenticationSession createInternalSSOSession(IRequest target) throws MOADatabaseException, BuildException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public AuthenticationSession getInternalSSOSession(String internalSsoSessionID) throws MOADatabaseException { +		// TODO Auto-generated method stub +		return null; +	} +  +	@Override +	public AuthenticationSessionExtensions getAuthenticationSessionExtensions(String internalSsoSessionID) +			throws MOADatabaseException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public void setAuthenticationSessionExtensions(String internalSsoSessionID, +			AuthenticationSessionExtensions sessionExtensions) throws MOADatabaseException { +		// TODO Auto-generated method stub + +	} + +	@Override +	public void destroyInternalSSOSession(String internalSsoSessionID) throws MOADatabaseException { +		// TODO Auto-generated method stub + +	} + +	@Override +	public void setAuthenticated(String internalSsoSessionID, boolean isAuthenticated) { +		// TODO Auto-generated method stub + +	} + +	@Override +	public boolean isSSOSession(String sessionID) throws MOADatabaseException { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public AuthenticatedSessionStore isValidSessionWithSSOID(String SSOId) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public void addSSOInformation(String moaSessionID, String SSOSessionID, SLOInformationInterface SLOInfo, +			IRequest protocolRequest) throws AuthenticationException { +		// TODO Auto-generated method stub + +	} + +	@Override +	public OASessionStore searchActiveOASSOSession(IAuthenticationSession moaSession, String oaID, +			String protocolType) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public IAuthenticationSession getSessionWithUserNameID(String nameID) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public InterfederationSessionStore searchInterfederatedIDPFORSSOWithMOASession(String sessionID) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public InterfederationSessionStore searchInterfederatedIDPFORSSOWithMOASessionIDPID(String sessionID, +			String idpID) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public void addFederatedSessionInformation(IRequest req, String idpEntityID, AssertionAttributeExtractor extractor) +			throws MOADatabaseException, AssertionAttributeExtractorExeption, BuildException { +		// TODO Auto-generated method stub + +	} + +	@Override +	public InterfederationSessionStore searchInterfederatedIDPFORAttributeQueryWithSessionID(String moaSessionID) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean removeInterfederetedSession(String entityID, String pedingRequestID) { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public void clean(Date now, long authDataTimeOutCreated, long authDataTimeOutUpdated) { +		// TODO Auto-generated method stub + +	} + +	@Override +	public void markOAWithAttributeQueryUsedFlag(IAuthenticationSession session, String oaurl, String requestedModule) { +		// TODO Auto-generated method stub + +	} + +	@Override +	public void deleteIdpInformation(InterfederationSessionStore nextIDPInformation) { +		// TODO Auto-generated method stub + +	} + +	@Override +	public void persistIdpInformation(InterfederationSessionStore nextIDPInformation) { +		// TODO Auto-generated method stub + +	} + +	@Override +	public OldSSOSessionIDStore checkSSOTokenAlreadyUsed(String ssoId) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getInternalSSOSessionWithSSOID(String externelSSOId) throws MOADatabaseException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public List<OASessionStore> getAllActiveOAFromMOASession(String ssoSessionId) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public List<InterfederationSessionStore> getAllActiveIDPsFromMOASession(String ssoSessionId) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String searchSSOSessionWithNameIDandOAID(String oaID, String userNameID) { +		// TODO Auto-generated method stub +		return null; +	} + +} diff --git a/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/DummyOAConfig.java b/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/DummyOAConfig.java new file mode 100644 index 000000000..61e765f55 --- /dev/null +++ b/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/DummyOAConfig.java @@ -0,0 +1,350 @@ +package at.gv.egovernment.moa.id.config.auth.data; + +import java.security.PrivateKey; +import java.util.Collection; +import java.util.List; +import java.util.Map; + +import at.gv.egovernment.moa.id.commons.api.IOAAuthParameters; +import at.gv.egovernment.moa.id.commons.api.data.CPEPS; +import at.gv.egovernment.moa.id.commons.api.data.SAML1ConfigurationParameters; +import at.gv.egovernment.moa.id.commons.api.data.StorkAttribute; +import at.gv.egovernment.moa.id.commons.api.data.StorkAttributeProviderPlugin; +import at.gv.egovernment.moa.id.commons.api.exceptions.ConfigurationException; + +public class DummyOAConfig implements IOAAuthParameters { + +	/** +	 *  +	 */ +	private static final long serialVersionUID = 1L; +	private List<String> foreignbPKSectors; +	private String target; +	private boolean hasBaseIdTransferRestriction; +	 +	@Override +	public Map<String, String> getFullConfiguration() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getConfigurationValue(String key) { +		// TODO Auto-generated method stub +		return null; +	}  + +	@Override +	public String getFriendlyName() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getPublicURLPrefix() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean hasBaseIdInternalProcessingRestriction() { +		return false; +	} + +	@Override +	public boolean hasBaseIdTransferRestriction() { +		return hasBaseIdTransferRestriction; +	} + +	@Override +	public String getAreaSpecificTargetIdentifier() { +		return target; +	} + +/////////////////////////////// +	 +	@Override +	public boolean containsConfigurationKey(String arg0) { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public String getConfigurationValue(String arg0, String arg1) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getLoAMatchingMode() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public List<String> getRequiredLoA() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public List<String> getTargetsWithNoBaseIdInternalProcessingRestriction() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public List<String> getTargetsWithNoBaseIdTransferRestriction() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getUniqueIdentifier() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public Boolean isConfigurationValue(String arg0) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean isConfigurationValue(String arg0, boolean arg1) { +		// TODO Auto-generated method stub +		return false; +	} + +	///////////////////////////////// +	 +	@Override +	public String getAreaSpecificTargetIdentifierFriendlyName() throws ConfigurationException { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean isInderfederationIDP() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public boolean isSTORKPVPGateway() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public boolean isRemovePBKFromAuthBlock() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public String getKeyBoxIdentifier() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public SAML1ConfigurationParameters getSAML1Parameter() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public List<String> getTemplateURL() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getAditionalAuthBlockText() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getBKUURL(String bkutype) { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public List<String> getBKUURL() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean useSSO() { +		return false; +	} + +	@Override +	public boolean useSSOQuestion() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public List<String> getMandateProfiles() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean isShowMandateCheckBox() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public boolean isOnlyMandateAllowed() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public boolean isShowStorkLogin() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public String getQaaLevel() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean isRequireConsentForStorkAttributes() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public Collection<StorkAttribute> getRequestedSTORKAttributes() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public byte[] getBKUSelectionTemplate() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public byte[] getSendAssertionTemplate() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public Collection<CPEPS> getPepsList() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public String getIDPAttributQueryServiceURL() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean isInboundSSOInterfederationAllowed() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public boolean isInterfederationSSOStorageAllowed() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public boolean isOutboundSSOInterfederationAllowed() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public boolean isTestCredentialEnabled() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public List<String> getTestCredentialOIDs() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean isUseIDLTestTrustStore() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public boolean isUseAuthBlockTestTestStore() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public PrivateKey getBPKDecBpkDecryptionKey() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public boolean isPassivRequestUsedForInterfederation() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public boolean isPerformLocalAuthenticationOnInterfederationError() { +		// TODO Auto-generated method stub +		return false; +	} + +	@Override +	public Collection<StorkAttributeProviderPlugin> getStorkAPs() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public List<Integer> getReversionsLoggingEventCodes() { +		// TODO Auto-generated method stub +		return null; +	} + +	@Override +	public List<String> foreignbPKSectorsRequested() { +		return foreignbPKSectors; +		 +	} + +	public void setForeignbPKSectors(List<String> foreignSectors) { +		this.foreignbPKSectors = foreignSectors; +		 +	} + +	public void setTarget(String target) { +		this.target = target; +	} + +	public void setHasBaseIdTransferRestriction(boolean hasBaseIdTransferRestriction) { +		this.hasBaseIdTransferRestriction = hasBaseIdTransferRestriction; +	} +		 +} diff --git a/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/UserRestrictionWhiteListTest.java b/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/UserRestrictionWhiteListTest.java new file mode 100644 index 000000000..3cd9d9476 --- /dev/null +++ b/id/server/idserverlib/src/test/java/at/gv/egovernment/moa/id/config/auth/data/UserRestrictionWhiteListTest.java @@ -0,0 +1,130 @@ +package at.gv.egovernment.moa.id.config.auth.data; + +import org.junit.Test; +import org.junit.runner.RunWith; +import org.springframework.beans.factory.annotation.Autowired; +import org.springframework.test.context.ContextConfiguration; +import org.springframework.test.context.junit4.SpringJUnit4ClassRunner;  + + +@RunWith(SpringJUnit4ClassRunner.class) +@ContextConfiguration("/SpringTest-context_basic_user_whitelist.xml") +public class UserRestrictionWhiteListTest { + +	@Autowired(required=true) UserWhitelistStore whitelistStore; +	 +	private static String bPK_1 = "/7eNkLgqP71U8dBwa0lSI8/2EFY="; +	private static String bPK_2 = "gr88V4oH5KLlurBCcCAbKJNMF18="; +	private static String bPK_3 = "0Fq3KqgYTbK8MsxymLe7tbuXhpA="; +	private static String bPK_4 = "JWiLzwktCITGg+ztRKEAwWloSNM="; +	 +	private static String bPK_5 = "JWiLzwktCIXXX+ztRKEAwWloSNM="; +	private static String bPK_6 = "WtHxBxLqOThNU9YF8fzXXXcZLBs="; +	 +	@Test +	public void checkNumberOfEntries() throws Exception { +		if (whitelistStore.getNumberOfEntries() != 12) +			throw new Exception("Number of entries not valid"); +			 +	} +	 +	 +	@Test +	public void checkEntry_1() throws Exception { +		String bPK = bPK_1; +		if (!whitelistStore.isUserbPKInWhitelist(bPK)) +			throw new Exception("bPK: " + bPK + " is NOT found in whitelist"); +			 +	} +	 +	@Test +	public void checkEntryDynamic_1() throws Exception { +		String bPK = bPK_1; +		if (!whitelistStore.isUserbPKInWhitelistDynamic(bPK, true)) +			throw new Exception("bPK: " + bPK + " is NOT found in whitelist"); +			 +	} + +	@Test +	public void checkEntry_2() throws Exception { +		String bPK = bPK_2; +		if (!whitelistStore.isUserbPKInWhitelist(bPK)) +			throw new Exception("bPK: " + bPK + " is NOT found in whitelist"); +			 +	} +	 +	@Test +	public void checkEntryDynamic_2() throws Exception { +		String bPK = bPK_2; +		if (!whitelistStore.isUserbPKInWhitelistDynamic(bPK, true)) +			throw new Exception("bPK: " + bPK + " is NOT found in whitelist"); +			 +	} +	 +	 +	@Test +	public void checkEntry_3() throws Exception { +		String bPK = bPK_3; +		if (!whitelistStore.isUserbPKInWhitelist(bPK)) +			throw new Exception("bPK: " + bPK + " is NOT found in whitelist"); +			 +	} +	 +	@Test +	public void checkEntryDynamic_3() throws Exception { +		String bPK = bPK_3; +		if (!whitelistStore.isUserbPKInWhitelistDynamic(bPK, true)) +			throw new Exception("bPK: " + bPK + " is NOT found in whitelist"); +			 +	} +	 +	@Test +	public void checkEntry_4() throws Exception { +		String bPK = bPK_4; +		if (!whitelistStore.isUserbPKInWhitelist(bPK)) +			throw new Exception("bPK: " + bPK + " is NOT found in whitelist"); +			 +	} +	 +	@Test +	public void checkEntryDynamic_4() throws Exception { +		String bPK = bPK_4; +		if (!whitelistStore.isUserbPKInWhitelistDynamic(bPK, true)) +			throw new Exception("bPK: " + bPK + " is NOT found in whitelist"); +			 +	} +	 +	@Test +	public void checkEntry_5() throws Exception { +		String bPK = bPK_5; +		if (whitelistStore.isUserbPKInWhitelist(bPK)) +			throw new Exception("bPK: " + bPK + " is NOT found in whitelist"); +			 +	} +	 +	@Test +	public void checkEntryDynamic_5() throws Exception { +		String bPK = bPK_5; +		if (whitelistStore.isUserbPKInWhitelistDynamic(bPK, true)) +			throw new Exception("bPK: " + bPK + " is NOT found in whitelist"); +			 +	} +	 +	@Test +	public void checkEntry_6() throws Exception { +		String bPK = bPK_6; +		if (whitelistStore.isUserbPKInWhitelist(bPK)) +			throw new Exception("bPK: " + bPK + " is NOT found in whitelist"); +			 +	} +	 +	@Test +	public void checkEntryDynamic_6() throws Exception { +		String bPK = bPK_6; +		if (whitelistStore.isUserbPKInWhitelistDynamic(bPK, true)) +			throw new Exception("bPK: " + bPK + " is NOT found in whitelist"); +			 +	} +	 +	 +} diff --git a/id/server/idserverlib/src/test/resources/BPK-Whitelist_20180607.csv b/id/server/idserverlib/src/test/resources/BPK-Whitelist_20180607.csv new file mode 100644 index 000000000..c33de9970 --- /dev/null +++ b/id/server/idserverlib/src/test/resources/BPK-Whitelist_20180607.csv @@ -0,0 +1,12 @@ +/7eNkLgqP71U8dBwa0lSI8/2EFY=,ZP-MH:xm1zT43aGLfTRLnDsxYoFk3XwDU=,ZP-MH:gr88V4oH5KLlurBCcCAbKJNMF18=,
 +ZP-MH:LvrdIGoL4MXTjy7EJgPhoz3koL4=,
 +ZP-MH:EcILNYQIZ4qfhLlZFzHivCu0Hfc=,
 +ZP-MH:WtHxBxLqOThNU9YF8fzyvXcZLBs=,
 +ZP-MH:0Fq3KqgYTbK8MsxymLe7tbuXhpA=,
 +ZP-MH:DJ6nGg2JgcPH768BhqTNXVsGhOY=,
 +JWiLzwktCITGg+ztRKEAwWloSNM=,
 +ZP-MH:+cyQbhr1fQ8hLhazL62tFRq47iY=,
 +ZP-MH:AFmfywfYPHcl2Lxp138upielmrs=,
 +ZP-MH:yPAOTsc9LY5/jnbkWn2MWY6hjg0=,
 +ZP-MH:yPAOTsc9LY5/jnbkWn2MWY6hjg0=:asdfadsfasdf,
 +ZP-AT:yPAOTsc9LY5/jnbkWn2MWY6hjg0=
 diff --git a/id/server/idserverlib/src/test/resources/SpringTest-context_basic_user_whitelist.xml b/id/server/idserverlib/src/test/resources/SpringTest-context_basic_user_whitelist.xml new file mode 100644 index 000000000..be2c6d068 --- /dev/null +++ b/id/server/idserverlib/src/test/resources/SpringTest-context_basic_user_whitelist.xml @@ -0,0 +1,31 @@ +<?xml version="1.0" encoding="UTF-8"?> +<beans xmlns="http://www.springframework.org/schema/beans" +	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" +	xmlns:context="http://www.springframework.org/schema/context" +	xmlns:tx="http://www.springframework.org/schema/tx" +	xmlns:aop="http://www.springframework.org/schema/aop" +	xsi:schemaLocation="http://www.springframework.org/schema/aop http://www.springframework.org/schema/aop/spring-aop-3.1.xsd +		http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans.xsd +		http://www.springframework.org/schema/context http://www.springframework.org/schema/context/spring-context-3.1.xsd +		http://www.springframework.org/schema/tx http://www.springframework.org/schema/tx/spring-tx-3.0.xsd"> + +	<!-- Prod. classes from MOA-ID lib --> +			 +	<bean id="UserWhiteList_Store"  +				class="at.gv.egovernment.moa.id.config.auth.data.UserWhitelistStore"/> +								 +	<bean id="AuthenticationDataBuilder"  +				class="at.gv.egovernment.moa.id.auth.builder.AuthenticationDataBuilder"/> +				 +	<bean id="MOAIDLoALevelMapper"  +				class="at.gv.egovernment.moa.id.util.LoALevelMapper"/>				 +				 +				 +	<!-- Dummy test classes -->				 +				 +	<bean id="DummyAuthConfig"  +				class="at.gv.egovernment.moa.id.config.auth.data.DummyAuthConfig"/> +				 +	<bean id="DummyAuthStorage"  +				class="at.gv.egovernment.moa.id.config.auth.data.DummyAuthStorage"/>								 +</beans> | 
