Skip to content

Commit

Permalink
Disabled email name id verification (#198)
Browse files Browse the repository at this point in the history
  • Loading branch information
blen-desta authored Aug 22, 2018
1 parent 120b724 commit d59c6fc
Show file tree
Hide file tree
Showing 4 changed files with 17 additions and 15 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@ http://www.gnu.org/licenses/lgpl.html
*/
package org.codice.compliance.verification.core

import org.codice.compliance.Common.Companion.idpMetadataObject
import org.codice.compliance.SAMLComplianceException
import org.codice.compliance.SAMLCore_8_2_2_a
import org.codice.compliance.SAMLCore_8_2_3_a
Expand All @@ -26,7 +27,6 @@ import org.codice.compliance.utils.PERSISTENT_ID
import org.codice.compliance.utils.SP_NAME_QUALIFIER
import org.codice.compliance.utils.TRANSIENT_ID
import org.codice.compliance.utils.TestCommon.Companion.currentSPIssuer
import org.codice.compliance.Common.Companion.idpMetadataObject
import org.w3c.dom.DOMException
import org.w3c.dom.Node
import java.net.URI
Expand Down Expand Up @@ -64,7 +64,9 @@ internal class SamlDefinedIdentifiersVerifier(val node: Node) {
/** 8 SAML-Defined Identifiers */
fun verify() {
verifyAttributeNameFormatIdentifiers()
verifyEmailAddressIdentifier()
// Disabled email verification since it's not a requirement.
// Should be re-enabled once the CTK supports categorization of tests.
// verifyEmailAddressIdentifier()
verifyPersistentIdentifiers()
verifyTransientIdentifiers()
verifyEntityIdentifiers()
Expand Down Expand Up @@ -161,7 +163,7 @@ internal class SamlDefinedIdentifiersVerifier(val node: Node) {
SAMLCore_8_3_7_c,
message = "The Persistent ID's NameQualifier " +
"[$nameQualifier] is not equal to " +
"${idpMetadataObject.entityId}",
idpMetadataObject.entityId,
node = it)
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -131,15 +131,15 @@ class SamlDefinedIdentifiersVerifierSpec : StringSpec() {
}

/* 8.3.2 Email Address */
"valid Email name identifier" {
"valid Email name identifier".config(enabled = false) {
createResponse(
identifierValue = "[email protected]",
identifierFormat = NAME_ID_FORMAT_EMAIL).let {
SamlDefinedIdentifiersVerifier(it).verify()
}
}

"invalid Email name identifier (multiple '@'s)" {
"invalid Email name identifier (multiple '@'s)".config(enabled = false) {
createResponse(
identifierValue = "example@[email protected]",
identifierFormat = NAME_ID_FORMAT_EMAIL).let {
Expand All @@ -149,7 +149,7 @@ class SamlDefinedIdentifiersVerifierSpec : StringSpec() {
}
}

"invalid Email name identifier (no '@')" {
"invalid Email name identifier (no '@')".config(enabled = false) {
createResponse(
identifierValue = "example-email.domain.com",
identifierFormat = NAME_ID_FORMAT_EMAIL).let {
Expand All @@ -159,7 +159,7 @@ class SamlDefinedIdentifiersVerifierSpec : StringSpec() {
}
}

"invalid Email name identifier (no '.com')" {
"invalid Email name identifier (no '.com')".config(enabled = false) {
createResponse(
identifierValue = "example-email@domain",
identifierFormat = NAME_ID_FORMAT_EMAIL).let {
Expand All @@ -169,7 +169,7 @@ class SamlDefinedIdentifiersVerifierSpec : StringSpec() {
}
}

"invalid Email name identifier (end with '.')" {
"invalid Email name identifier (end with '.')".config(enabled = false) {
createResponse(
identifierValue = "example-email@domain.",
identifierFormat = NAME_ID_FORMAT_EMAIL).let {
Expand All @@ -179,7 +179,7 @@ class SamlDefinedIdentifiersVerifierSpec : StringSpec() {
}
}

"invalid Email name identifier (single word)" {
"invalid Email name identifier (single word)".config(enabled = false) {
createResponse(
identifierValue = "exampleemaildomaincom",
identifierFormat = NAME_ID_FORMAT_EMAIL).let {
Expand All @@ -189,7 +189,7 @@ class SamlDefinedIdentifiersVerifierSpec : StringSpec() {
}
}

"invalid Email name identifier (whitespace)" {
"invalid Email name identifier (whitespace)".config(enabled = false) {
createResponse(
identifierValue = "example [email protected]",
identifierFormat = NAME_ID_FORMAT_EMAIL).let {
Expand All @@ -199,7 +199,7 @@ class SamlDefinedIdentifiersVerifierSpec : StringSpec() {
}
}

"invalid Email name identifier (invalid characters)" {
"invalid Email name identifier (invalid characters)".config(enabled = false) {
createResponse(
identifierValue = "example:[email protected]",
identifierFormat = NAME_ID_FORMAT_EMAIL).let {
Expand All @@ -209,7 +209,7 @@ class SamlDefinedIdentifiersVerifierSpec : StringSpec() {
}
}

"invalid Email name identifier (comment)" {
"invalid Email name identifier (comment)".config(enabled = false) {
createResponse(
identifierValue = "[email protected](comment)",
identifierFormat = NAME_ID_FORMAT_EMAIL).let {
Expand All @@ -219,7 +219,7 @@ class SamlDefinedIdentifiersVerifierSpec : StringSpec() {
}
}

"invalid Email name identifier (surrounded by '<' and '>')" {
"invalid Email name identifier (surrounded by '<' and '>')".config(enabled = false) {
createResponse(
identifierValue = "&lt;[email protected]&gt;",
identifierFormat = NAME_ID_FORMAT_EMAIL).let {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -109,7 +109,7 @@ class PostSSOTest : StringSpec() {
}
}

"POST AuthnRequest With Email NameIDPolicy Format Test" {
"POST AuthnRequest With Email NameIDPolicy Format Test".config(enabled = false) {
val authnRequest = createDefaultAuthnRequest(HTTP_POST).apply {
nameIDPolicy = NameIDPolicyBuilder().buildObject().apply {
format = SAML2Constants.NAMEID_FORMAT_EMAIL_ADDRESS
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -149,7 +149,7 @@ class RedirectSSOTest : StringSpec() {
}
}

"Redirect AuthnRequest With Email NameID Format Test" {
"Redirect AuthnRequest With Email NameID Format Test".config(enabled = false) {
val authnRequest = createDefaultAuthnRequest(HTTP_REDIRECT).apply {
nameIDPolicy = NameIDPolicyBuilder().buildObject().apply {
format = SAML2Constants.NAMEID_FORMAT_EMAIL_ADDRESS
Expand Down

0 comments on commit d59c6fc

Please sign in to comment.