Skip to content

Commit 11ba40d

Browse files
committed
Create AuthnStatement object
1 parent 2d4f6d9 commit 11ba40d

File tree

2 files changed

+186
-0
lines changed

2 files changed

+186
-0
lines changed

lib/Net/SAML2/Protocol/Assertion.pm

Lines changed: 138 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,13 @@ has 'nameid_object' => (
4848
init_arg => 'nameid',
4949
predicate => 'has_nameid',
5050
);
51+
has 'authnstatement_object' => (
52+
isa => 'XML::LibXML::Element',
53+
is => 'ro',
54+
required => 0,
55+
init_arg => 'authnstatement',
56+
predicate => 'has_authnstatement',
57+
);
5158

5259
=head1 METHODS
5360
@@ -178,6 +185,11 @@ sub new_from_xml {
178185
$nameid = $global->get_node(1);
179186
}
180187

188+
my $authnstatement;
189+
if (my $node = $xpath->findnodes('/samlp:Response/saml:Assertion/saml:AuthnStatement')) {
190+
$authnstatement = $node->get_node(1);
191+
}
192+
181193
my $nodeset = $xpath->findnodes('/samlp:Response/samlp:Status/samlp:StatusCode|/samlp:ArtifactResponse/samlp:Status/samlp:StatusCode');
182194

183195
croak("Unable to parse status from assertion") unless $nodeset->size;
@@ -204,6 +216,7 @@ sub new_from_xml {
204216
in_response_to => $xpath->findvalue('//saml:Subject/saml:SubjectConfirmation/saml:SubjectConfirmationData/@InResponseTo'),
205217
response_status => $status,
206218
$sub_status ? (response_substatus => $sub_status) : (),
219+
$authnstatement ? (authnstatement => $authnstatement) : (),
207220
);
208221

209222
return $self;
@@ -290,6 +303,131 @@ sub nameid_sp_provided_id {
290303
return $self->nameid_object->getAttribute('SPProvidedID');
291304
}
292305

306+
=head2 authnstatement
307+
308+
Returns the AuthnStatement
309+
310+
=cut
311+
312+
sub authnstatement {
313+
my $self = shift;
314+
return unless $self->has_authnstatement;
315+
return $self->authnstatement_object->textContent;
316+
}
317+
318+
=head2 authnstatement_authninstant
319+
320+
Returns the AuthnStatement AuthnInstant
321+
322+
=cut
323+
324+
sub authnstatement_authninstant {
325+
my $self = shift;
326+
return unless $self->has_authnstatement;
327+
return $self->authnstatement_object->getAttribute('AuthnInstant');
328+
}
329+
330+
=head2 authnstatement_sessionindex
331+
332+
Returns the AuthnStatement SessionIndex
333+
334+
=cut
335+
336+
sub authnstatement_sessionindex {
337+
my $self = shift;
338+
return unless $self->has_authnstatement;
339+
return $self->authnstatement_object->getAttribute('SessionIndex');
340+
}
341+
342+
=head2 authnstatement_subjectlocality
343+
344+
Returns the AuthnStatement SubjectLocality
345+
346+
=cut
347+
348+
sub authnstatement_subjectlocality {
349+
my $self = shift;
350+
return unless $self->has_authnstatement;
351+
352+
my $xpc = XML::LibXML::XPathContext->new;
353+
$xpc->registerNs('saml', 'urn:oasis:names:tc:SAML:2.0:assertion');
354+
my $subjectlocality;
355+
my $xpath_base = '//saml:AuthnStatement/saml:SubjectLocality';
356+
if (my $nodes = $xpc->find($xpath_base, $self->authnstatement_object)) {
357+
my $node = $nodes->get_node(1);
358+
$subjectlocality = $node;
359+
}
360+
return $subjectlocality;
361+
}
362+
363+
=head2 subjectlocality_address
364+
365+
Returns the SubjectLocality Address
366+
367+
=cut
368+
369+
sub subjectlocality_address {
370+
my $self = shift;
371+
return unless $self->has_authnstatement;
372+
my $subjectlocality = $self->authnstatement_subjectlocality;
373+
return unless $subjectlocality;
374+
return $subjectlocality->getAttribute('Address');
375+
}
376+
377+
=head2 subjectlocality_dnsname
378+
379+
Returns the SubjectLocality DNSName
380+
381+
=cut
382+
383+
sub subjectlocality_dnsname {
384+
my $self = shift;
385+
return unless $self->has_authnstatement;
386+
my $subjectlocality = $self->authnstatement_subjectlocality;
387+
return unless $subjectlocality;
388+
return $subjectlocality->getAttribute('DNSName');
389+
}
390+
391+
=head2 authnstatement_authncontext
392+
393+
Returns the AuthnContext for the AuthnStatement
394+
395+
=cut
396+
397+
sub authnstatement_authncontext {
398+
my $self = shift;
399+
return unless $self->has_authnstatement;
400+
401+
my $xpc = XML::LibXML::XPathContext->new;
402+
$xpc->registerNs('saml', 'urn:oasis:names:tc:SAML:2.0:assertion');
403+
my $authncontext;
404+
my $xpath_base = '//saml:AuthnStatement/saml:AuthnContext';
405+
if (my $nodes = $xpc->find($xpath_base, $self->authnstatement_object)) {
406+
my $node = $nodes->get_node(1);
407+
$authncontext = $node;
408+
}
409+
return $authncontext;
410+
}
411+
412+
=head2 contextclass_authncontextclassref
413+
414+
Returns the ContextClass AuthnContextClassRef
415+
416+
=cut
417+
418+
sub contextclass_authncontextclassref {
419+
my $self = shift;
420+
return unless $self->has_authnstatement;
421+
my $authncontextclassref = $self->authnstatement_authncontext;
422+
return unless $authncontextclassref;
423+
my $xpc = XML::LibXML::XPathContext->new;
424+
$xpc->registerNs('saml', 'urn:oasis:names:tc:SAML:2.0:assertion');
425+
if (my $value = $xpc->findvalue('//saml:AuthnContextClassRef', $self->authnstatement_object)) {
426+
$authncontextclassref = $value;
427+
}
428+
return $authncontextclassref;
429+
}
430+
293431
=head2 valid( $audience, $in_response_to )
294432
295433
Returns true if this Assertion is currently valid for the given audience.

t/03-assertions.t

Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -114,6 +114,22 @@ $assertion->{not_before} = DateTime->now->add(minutes => 5);
114114
is($assertion->valid('http://ct.local'), 0, "and invalid again - InResponseTo not Checked");
115115
is($assertion->valid('http://ct.local', 'N3k95Hg41WCHdwc9mqXynLPhB'), 0, "and invalid again - InResponseTo Checked");
116116

117+
is($assertion->authnstatement_authninstant,
118+
'2010-10-12T12:58:34Z',
119+
"AuthnStatement AuthnInstant is ok");
120+
is($assertion->authnstatement_sessionindex,
121+
's2b087bdce06dbbf9cd4662af82b8b853d4d285c01',
122+
"AuthnStatement SessionIndex is ok");
123+
is($assertion->subjectlocality_address,
124+
undef,
125+
"SubjectLocality Address is ok");
126+
is($assertion->subjectlocality_dnsname,
127+
undef,
128+
"SubjectLocality DNSName is ok");
129+
is($assertion->contextclass_authncontextclassref,
130+
'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport',
131+
"AuthnContext AuthnContextClassRef is ok");
132+
117133
my $assertion_b64 = <<'BASE64';
118134
<?xml version="1.0" encoding="UTF-8"?><saml2p:Response xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol" Destination="https://netsaml2-testapp.local/consumer-post" ID="_b160e710ec868cb78e7d303b8db9b536" InResponseTo="NETSAML2_743421ef5c9302186d8050c4c5bab7e76a8b8fd4e329b0f9a39a182356760de1" IssueInstant="2023-01-14T14:37:15.814Z" Version="2.0"><saml2:Issuer xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">https://idp.shibboleth.local/idp/shibboleth</saml2:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><ds:Reference URI="#_b160e710ec868cb78e7d303b8db9b536"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>cfQgrmymQlljx+6+XKgETRKrMrV0gfa2kbUJkVvba1E=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>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</ds:SignatureValue><ds:KeyInfo><ds:X509Data><ds:X509Certificate>MIIEOzCCAqOgAwIBAgIUU2fynUQZS+sXRqj0Oc4YgF4mIOowDQYJKoZIhvcNAQELBQAwHzEdMBsG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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><saml2p:Status><saml2p:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></saml2p:Status><saml2:Assertion xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" ID="_61f377717caad87ce2af0e7946cb97b1" IssueInstant="2023-01-14T14:37:15.814Z" Version="2.0"><saml2:Issuer>https://idp.shibboleth.local/idp/shibboleth</saml2:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><ds:Reference URI="#_61f377717caad87ce2af0e7946cb97b1"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>MwBFLs34YYkMRe3q1DkWgMjqi6V8bHbT3JCTfxyZLJk=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>oqevIAEnWLQwSZx8hxiSApNBVrWZLoF1Z4KOTRbvOGdYvgqw7meBvdoRUlGupy3C/jn0UQPB5ZSoUWwPgebLmF5OayWKAcC6MYoQ+Zttq+4kOTJ+DKPaKO2fEsCzCS+HX8ac+LuajHfKvqtd1mKP9U1TQ63Z1joDo2H1EXMQdOZnRwWXgKFeXAWPJab0vfvVfYauVUrn1ZC20QaNLzBjRDC0d6loXL3g7CTy/YNf2mJNcRjWF4ER4cqOdUwDdtBgXVFGjQs345rK3/oN8lO5T7Timgl1aMPxCof+EivsWjkbiAxTs9M05QEWRj/BWzKGYGyu9srDZMid+Z5BacCQIzFZ1/8kKGI6+UYVDxaUCLT9aQow4lEuT10k2l4LXqjaXA/ymOih4nIKJ1AsGH13UMul4BOEyLO5AFAXz57H3oxrdlvW7CaSwby0yhxyTcK54VoL2lC0hFaz9XLvsh1jSHwyZfN+63VBu8w50S5egn4eAYBezYLwzLukHXRwIazC</ds:SignatureValue><ds:KeyInfo><ds:X509Data><ds:X509Certificate>MIIEOzCCAqOgAwIBAgIUU2fynUQZS+sXRqj0Oc4YgF4mIOowDQYJKoZIhvcNAQELBQAwHzEdMBsG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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><saml2:Subject><saml2:NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent" NameQualifier="https://idp.shibboleth.local/idp/shibboleth" SPNameQualifier="https://netsaml2-testapp.local" xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">7VTBH4WVXMCYOKWXKVAFJLMTMGNIIGMX</saml2:NameID><saml2:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml2:SubjectConfirmationData Address="192.168.122.1" InResponseTo="NETSAML2_743421ef5c9302186d8050c4c5bab7e76a8b8fd4e329b0f9a39a182356760de1" NotOnOrAfter="2023-01-14T14:42:15.826Z" Recipient="https://netsaml2-testapp.local/consumer-post"/></saml2:SubjectConfirmation></saml2:Subject><saml2:Conditions NotBefore="2023-01-14T14:37:15.814Z" NotOnOrAfter="2023-01-14T14:42:15.814Z"><saml2:AudienceRestriction><saml2:Audience>https://netsaml2-testapp.local</saml2:Audience></saml2:AudienceRestriction></saml2:Conditions><saml2:AuthnStatement AuthnInstant="2023-01-14T14:37:15.781Z" SessionIndex="_121cef54191d57f90753619ff81856bd"><saml2:SubjectLocality Address="192.168.122.1"/><saml2:AuthnContext><saml2:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml2:AuthnContextClassRef></saml2:AuthnContext></saml2:AuthnStatement><saml2:AttributeStatement><saml2:Attribute FriendlyName="schacHomeOrganization" Name="urn:oid:1.3.6.1.4.1.25178.1.2.9" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml2:AttributeValue>shibboleth.local</saml2:AttributeValue></saml2:Attribute></saml2:AttributeStatement></saml2:Assertion></saml2p:Response>
119135
BASE64
@@ -132,6 +148,22 @@ is($assertion->nameid_sp_provided_id,
132148
undef,
133149
"nameid_sp_provided_id undefined as expected");
134150

151+
is($assertion->authnstatement_authninstant,
152+
'2023-01-14T14:37:15.781Z',
153+
"AuthnStatement AuthnInstant is ok");
154+
is($assertion->authnstatement_sessionindex,
155+
'_121cef54191d57f90753619ff81856bd',
156+
"AuthnStatement SessionIndex is ok");
157+
is($assertion->subjectlocality_address,
158+
'192.168.122.1',
159+
"SubjectLocality Address is ok");
160+
is($assertion->subjectlocality_dnsname,
161+
undef,
162+
"SubjectLocality DNSName is ok");
163+
is($assertion->contextclass_authncontextclassref,
164+
'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport',
165+
"AuthnContext AuthnContextClassRef is ok");
166+
135167
is($assertion->id,
136168
"_61f377717caad87ce2af0e7946cb97b1",
137169
"Assertion id is as expected");
@@ -186,4 +218,20 @@ is(
186218
isa_ok($assertion, 'Net::SAML2::Protocol::Assertion');
187219
}
188220

221+
is($assertion->authnstatement_authninstant,
222+
'2018-07-25T07:54:35.599Z',
223+
"AuthnStatement AuthnInstant is ok");
224+
is($assertion->authnstatement_sessionindex,
225+
undef,
226+
"AuthnStatement SessionIndex is ok");
227+
is($assertion->subjectlocality_address,
228+
undef,
229+
"SubjectLocality Address is ok");
230+
is($assertion->subjectlocality_dnsname,
231+
undef,
232+
"SubjectLocality DNSName is ok");
233+
is($assertion->contextclass_authncontextclassref,
234+
'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport',
235+
"AuthnContext AuthnContextClassRef is ok");
236+
189237
done_testing;

0 commit comments

Comments
 (0)