Skip to content

Commit b672a6e

Browse files
authored
Merge pull request #172 from timlegge/authnstatement
Draft: Authnstatement as an object
2 parents 6b648a8 + 11ba40d commit b672a6e

File tree

2 files changed

+186
-0
lines changed

2 files changed

+186
-0
lines changed

lib/Net/SAML2/Protocol/Assertion.pm

Lines changed: 138 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,13 @@ has 'nameid_object' => (
4848
init_arg => 'nameid',
4949
predicate => 'has_nameid',
5050
);
51+
has 'authnstatement_object' => (
52+
isa => 'XML::LibXML::Element',
53+
is => 'ro',
54+
required => 0,
55+
init_arg => 'authnstatement',
56+
predicate => 'has_authnstatement',
57+
);
5158

5259
=head1 METHODS
5360
@@ -172,6 +179,11 @@ sub new_from_xml {
172179
$nameid = $global->get_node(1);
173180
}
174181

182+
my $authnstatement;
183+
if (my $node = $xpath->findnodes('/samlp:Response/saml:Assertion/saml:AuthnStatement')) {
184+
$authnstatement = $node->get_node(1);
185+
}
186+
175187
my $nodeset = $xpath->findnodes('/samlp:Response/samlp:Status/samlp:StatusCode|/samlp:ArtifactResponse/samlp:Status/samlp:StatusCode');
176188

177189
croak("Unable to parse status from assertion") unless $nodeset->size;
@@ -198,6 +210,7 @@ sub new_from_xml {
198210
in_response_to => $xpath->findvalue('//saml:Subject/saml:SubjectConfirmation/saml:SubjectConfirmationData/@InResponseTo'),
199211
response_status => $status,
200212
$sub_status ? (response_substatus => $sub_status) : (),
213+
$authnstatement ? (authnstatement => $authnstatement) : (),
201214
);
202215

203216
return $self;
@@ -285,6 +298,131 @@ sub nameid_sp_provided_id {
285298
return $self->nameid_object->getAttribute('SPProvidedID');
286299
}
287300

301+
=head2 authnstatement
302+
303+
Returns the AuthnStatement
304+
305+
=cut
306+
307+
sub authnstatement {
308+
my $self = shift;
309+
return unless $self->has_authnstatement;
310+
return $self->authnstatement_object->textContent;
311+
}
312+
313+
=head2 authnstatement_authninstant
314+
315+
Returns the AuthnStatement AuthnInstant
316+
317+
=cut
318+
319+
sub authnstatement_authninstant {
320+
my $self = shift;
321+
return unless $self->has_authnstatement;
322+
return $self->authnstatement_object->getAttribute('AuthnInstant');
323+
}
324+
325+
=head2 authnstatement_sessionindex
326+
327+
Returns the AuthnStatement SessionIndex
328+
329+
=cut
330+
331+
sub authnstatement_sessionindex {
332+
my $self = shift;
333+
return unless $self->has_authnstatement;
334+
return $self->authnstatement_object->getAttribute('SessionIndex');
335+
}
336+
337+
=head2 authnstatement_subjectlocality
338+
339+
Returns the AuthnStatement SubjectLocality
340+
341+
=cut
342+
343+
sub authnstatement_subjectlocality {
344+
my $self = shift;
345+
return unless $self->has_authnstatement;
346+
347+
my $xpc = XML::LibXML::XPathContext->new;
348+
$xpc->registerNs('saml', 'urn:oasis:names:tc:SAML:2.0:assertion');
349+
my $subjectlocality;
350+
my $xpath_base = '//saml:AuthnStatement/saml:SubjectLocality';
351+
if (my $nodes = $xpc->find($xpath_base, $self->authnstatement_object)) {
352+
my $node = $nodes->get_node(1);
353+
$subjectlocality = $node;
354+
}
355+
return $subjectlocality;
356+
}
357+
358+
=head2 subjectlocality_address
359+
360+
Returns the SubjectLocality Address
361+
362+
=cut
363+
364+
sub subjectlocality_address {
365+
my $self = shift;
366+
return unless $self->has_authnstatement;
367+
my $subjectlocality = $self->authnstatement_subjectlocality;
368+
return unless $subjectlocality;
369+
return $subjectlocality->getAttribute('Address');
370+
}
371+
372+
=head2 subjectlocality_dnsname
373+
374+
Returns the SubjectLocality DNSName
375+
376+
=cut
377+
378+
sub subjectlocality_dnsname {
379+
my $self = shift;
380+
return unless $self->has_authnstatement;
381+
my $subjectlocality = $self->authnstatement_subjectlocality;
382+
return unless $subjectlocality;
383+
return $subjectlocality->getAttribute('DNSName');
384+
}
385+
386+
=head2 authnstatement_authncontext
387+
388+
Returns the AuthnContext for the AuthnStatement
389+
390+
=cut
391+
392+
sub authnstatement_authncontext {
393+
my $self = shift;
394+
return unless $self->has_authnstatement;
395+
396+
my $xpc = XML::LibXML::XPathContext->new;
397+
$xpc->registerNs('saml', 'urn:oasis:names:tc:SAML:2.0:assertion');
398+
my $authncontext;
399+
my $xpath_base = '//saml:AuthnStatement/saml:AuthnContext';
400+
if (my $nodes = $xpc->find($xpath_base, $self->authnstatement_object)) {
401+
my $node = $nodes->get_node(1);
402+
$authncontext = $node;
403+
}
404+
return $authncontext;
405+
}
406+
407+
=head2 contextclass_authncontextclassref
408+
409+
Returns the ContextClass AuthnContextClassRef
410+
411+
=cut
412+
413+
sub contextclass_authncontextclassref {
414+
my $self = shift;
415+
return unless $self->has_authnstatement;
416+
my $authncontextclassref = $self->authnstatement_authncontext;
417+
return unless $authncontextclassref;
418+
my $xpc = XML::LibXML::XPathContext->new;
419+
$xpc->registerNs('saml', 'urn:oasis:names:tc:SAML:2.0:assertion');
420+
if (my $value = $xpc->findvalue('//saml:AuthnContextClassRef', $self->authnstatement_object)) {
421+
$authncontextclassref = $value;
422+
}
423+
return $authncontextclassref;
424+
}
425+
288426
=head2 valid( $audience, $in_response_to )
289427
290428
Returns true if this Assertion is currently valid for the given audience.

t/03-assertions.t

Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -114,6 +114,22 @@ $assertion->{not_before} = DateTime->now->add(minutes => 5);
114114
is($assertion->valid('http://ct.local'), 0, "and invalid again - InResponseTo not Checked");
115115
is($assertion->valid('http://ct.local', 'N3k95Hg41WCHdwc9mqXynLPhB'), 0, "and invalid again - InResponseTo Checked");
116116

117+
is($assertion->authnstatement_authninstant,
118+
'2010-10-12T12:58:34Z',
119+
"AuthnStatement AuthnInstant is ok");
120+
is($assertion->authnstatement_sessionindex,
121+
's2b087bdce06dbbf9cd4662af82b8b853d4d285c01',
122+
"AuthnStatement SessionIndex is ok");
123+
is($assertion->subjectlocality_address,
124+
undef,
125+
"SubjectLocality Address is ok");
126+
is($assertion->subjectlocality_dnsname,
127+
undef,
128+
"SubjectLocality DNSName is ok");
129+
is($assertion->contextclass_authncontextclassref,
130+
'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport',
131+
"AuthnContext AuthnContextClassRef is ok");
132+
117133
my $assertion_b64 = <<'BASE64';
118134
<?xml version="1.0" encoding="UTF-8"?><saml2p:Response xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol" Destination="https://netsaml2-testapp.local/consumer-post" ID="_b160e710ec868cb78e7d303b8db9b536" InResponseTo="NETSAML2_743421ef5c9302186d8050c4c5bab7e76a8b8fd4e329b0f9a39a182356760de1" IssueInstant="2023-01-14T14:37:15.814Z" Version="2.0"><saml2:Issuer xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">https://idp.shibboleth.local/idp/shibboleth</saml2:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><ds:Reference URI="#_b160e710ec868cb78e7d303b8db9b536"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>cfQgrmymQlljx+6+XKgETRKrMrV0gfa2kbUJkVvba1E=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>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</ds:SignatureValue><ds:KeyInfo><ds:X509Data><ds:X509Certificate>MIIEOzCCAqOgAwIBAgIUU2fynUQZS+sXRqj0Oc4YgF4mIOowDQYJKoZIhvcNAQELBQAwHzEdMBsG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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><saml2p:Status><saml2p:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></saml2p:Status><saml2:Assertion xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion" ID="_61f377717caad87ce2af0e7946cb97b1" IssueInstant="2023-01-14T14:37:15.814Z" Version="2.0"><saml2:Issuer>https://idp.shibboleth.local/idp/shibboleth</saml2:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><ds:Reference URI="#_61f377717caad87ce2af0e7946cb97b1"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>MwBFLs34YYkMRe3q1DkWgMjqi6V8bHbT3JCTfxyZLJk=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>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</ds:SignatureValue><ds:KeyInfo><ds:X509Data><ds:X509Certificate>MIIEOzCCAqOgAwIBAgIUU2fynUQZS+sXRqj0Oc4YgF4mIOowDQYJKoZIhvcNAQELBQAwHzEdMBsG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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><saml2:Subject><saml2:NameID Format="urn:oasis:names:tc:SAML:2.0:nameid-format:persistent" NameQualifier="https://idp.shibboleth.local/idp/shibboleth" SPNameQualifier="https://netsaml2-testapp.local" xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion">7VTBH4WVXMCYOKWXKVAFJLMTMGNIIGMX</saml2:NameID><saml2:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml2:SubjectConfirmationData Address="192.168.122.1" InResponseTo="NETSAML2_743421ef5c9302186d8050c4c5bab7e76a8b8fd4e329b0f9a39a182356760de1" NotOnOrAfter="2023-01-14T14:42:15.826Z" Recipient="https://netsaml2-testapp.local/consumer-post"/></saml2:SubjectConfirmation></saml2:Subject><saml2:Conditions NotBefore="2023-01-14T14:37:15.814Z" NotOnOrAfter="2023-01-14T14:42:15.814Z"><saml2:AudienceRestriction><saml2:Audience>https://netsaml2-testapp.local</saml2:Audience></saml2:AudienceRestriction></saml2:Conditions><saml2:AuthnStatement AuthnInstant="2023-01-14T14:37:15.781Z" SessionIndex="_121cef54191d57f90753619ff81856bd"><saml2:SubjectLocality Address="192.168.122.1"/><saml2:AuthnContext><saml2:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml2:AuthnContextClassRef></saml2:AuthnContext></saml2:AuthnStatement><saml2:AttributeStatement><saml2:Attribute FriendlyName="schacHomeOrganization" Name="urn:oid:1.3.6.1.4.1.25178.1.2.9" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"><saml2:AttributeValue>shibboleth.local</saml2:AttributeValue></saml2:Attribute></saml2:AttributeStatement></saml2:Assertion></saml2p:Response>
119135
BASE64
@@ -132,6 +148,22 @@ is($assertion->nameid_sp_provided_id,
132148
undef,
133149
"nameid_sp_provided_id undefined as expected");
134150

151+
is($assertion->authnstatement_authninstant,
152+
'2023-01-14T14:37:15.781Z',
153+
"AuthnStatement AuthnInstant is ok");
154+
is($assertion->authnstatement_sessionindex,
155+
'_121cef54191d57f90753619ff81856bd',
156+
"AuthnStatement SessionIndex is ok");
157+
is($assertion->subjectlocality_address,
158+
'192.168.122.1',
159+
"SubjectLocality Address is ok");
160+
is($assertion->subjectlocality_dnsname,
161+
undef,
162+
"SubjectLocality DNSName is ok");
163+
is($assertion->contextclass_authncontextclassref,
164+
'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport',
165+
"AuthnContext AuthnContextClassRef is ok");
166+
135167
is($assertion->id,
136168
"_61f377717caad87ce2af0e7946cb97b1",
137169
"Assertion id is as expected");
@@ -186,4 +218,20 @@ is(
186218
isa_ok($assertion, 'Net::SAML2::Protocol::Assertion');
187219
}
188220

221+
is($assertion->authnstatement_authninstant,
222+
'2018-07-25T07:54:35.599Z',
223+
"AuthnStatement AuthnInstant is ok");
224+
is($assertion->authnstatement_sessionindex,
225+
undef,
226+
"AuthnStatement SessionIndex is ok");
227+
is($assertion->subjectlocality_address,
228+
undef,
229+
"SubjectLocality Address is ok");
230+
is($assertion->subjectlocality_dnsname,
231+
undef,
232+
"SubjectLocality DNSName is ok");
233+
is($assertion->contextclass_authncontextclassref,
234+
'urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport',
235+
"AuthnContext AuthnContextClassRef is ok");
236+
189237
done_testing;

0 commit comments

Comments
 (0)