diff options
author | Simo Sorce <simo@redhat.com> | 2014-03-18 14:44:05 -0400 |
---|---|---|
committer | Simo Sorce <simo@redhat.com> | 2014-03-20 17:28:03 -0400 |
commit | 7a9858c4c93aecde396910607821487513a84191 (patch) | |
tree | ed53b2aaa33260b1799c120c2a5fe7184e698b5a | |
parent | 76520e6e044dc5ef04158242753e5a1653d77c25 (diff) | |
download | ipsilon-7a9858c4c93aecde396910607821487513a84191.tar.gz ipsilon-7a9858c4c93aecde396910607821487513a84191.tar.xz ipsilon-7a9858c4c93aecde396910607821487513a84191.zip |
Saml2 Metadata generator class
This class generates metadata files for IDP and SP services and is meant
to be used at install/configure time.
It uses the certs module to generate certificates.
With tests!
Signed-off-by: Simo Sorce <simo@redhat.com>
-rwxr-xr-x | ipsilon/providers/saml2/metadata.py | 159 |
1 files changed, 159 insertions, 0 deletions
diff --git a/ipsilon/providers/saml2/metadata.py b/ipsilon/providers/saml2/metadata.py new file mode 100755 index 0000000..0effd4c --- /dev/null +++ b/ipsilon/providers/saml2/metadata.py @@ -0,0 +1,159 @@ +#!/usr/bin/python +# +# Copyright (C) 2014 Simo Sorce <simo@redhat.com> +# +# see file 'COPYING' for use and warranty information +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. + +from ipsilon.providers.saml2.certs import Certificate +from lxml import etree +import lasso + + +EDESC = '{%s}EntityDescriptor' % lasso.SAML2_METADATA_HREF +NSMAP = { + 'md': lasso.SAML2_METADATA_HREF, + 'ds': lasso.DS_HREF +} + +IDPDESC = 'IDPSSODescriptor' +SPDESC = 'SPSSODescriptor' + +IDP_ROLE = 'idp' +SP_ROLE = 'sp' + +SSO_SERVICE = 'SingleSignOnService' +LOGOUT_SERVICE = 'SingleLogoutService' +ASSERTION_SERVICE = 'AssertionConsumerService' + + +def mdElement(_parent, _tag, **kwargs): + tag = '{%s}%s' % (lasso.SAML2_METADATA_HREF, _tag) + return etree.SubElement(_parent, tag, **kwargs) + + +def dsElement(_parent, _tag, **kwargs): + tag = '{%s}%s' % (lasso.DS_HREF, _tag) + return etree.SubElement(_parent, tag, **kwargs) + + +class Metadata(object): + + def __init__(self, role=None): + self.root = etree.Element(EDESC, nsmap=NSMAP) + self.entityid = None + self.role = None + self.set_role(role) + + def set_entity_id(self, url): + self.entityid = url + self.root.set('entityID', url) + + def set_role(self, role): + if role is None: + return + elif role == IDP_ROLE: + description = IDPDESC + elif role == SP_ROLE: + description = SPDESC + else: + raise ValueError('invalid role: %s' % role) + self.role = mdElement(self.root, description) + self.role.set('protocolSupportEnumeration', lasso.SAML2_PROTOCOL_HREF) + return self.role + + def add_cert(self, certdata, use): + desc = mdElement(self.role, 'KeyDescriptor') + desc.set('use', use) + info = dsElement(desc, 'KeyInfo') + data = dsElement(info, 'X509Data') + cert = dsElement(data, 'X509Certificate') + cert.text = certdata + + def add_certs(self, signcert=None, enccert=None): + if signcert: + self.add_cert(signcert.get_cert(), 'signing') + if enccert: + self.add_cert(enccert.get_cert(), 'encryption') + + def add_service(self, svctype, binding, location): + svc = mdElement(self.role, svctype) + svc.set('Binding', binding) + svc.set('Location', location) + + def add_allowed_name_format(self, name_format): + nameidfmt = mdElement(self.role, 'NameIDFormat') + nameidfmt.text = name_format + + def output(self, path): + data = etree.tostring(self.root, xml_declaration=True, + encoding='UTF-8', pretty_print=True) + with open(path, 'w') as f: + f.write(data) + + +if __name__ == '__main__': + from ipsilon.providers.saml2.provider import NAMEID_MAP + import tempfile + import shutil + import os + + tmpdir = tempfile.mkdtemp() + + try: + # Test IDP generation + sign_cert = Certificate(tmpdir) + sign_cert.generate('idp-signing-cert', 'idp.ipsilon.example.com') + enc_cert = Certificate(tmpdir) + enc_cert.generate('idp-encryption-cert', 'idp.ipsilon.example.com') + idp = Metadata() + idp.set_entity_id('https://ipsilon.example.com/idp/metadata') + idp.set_role(IDP_ROLE) + idp.add_certs(sign_cert, enc_cert) + idp.add_service(SSO_SERVICE, lasso.SAML2_METADATA_BINDING_POST, + 'https://ipsilon.example.com/idp/saml2/POST') + idp.add_service(SSO_SERVICE, lasso.SAML2_METADATA_BINDING_REDIRECT, + 'https://ipsilon.example.com/idp/saml2/Redirect') + for k in NAMEID_MAP: + idp.add_allowed_name_format(NAMEID_MAP[k]) + md_file = os.path.join(tmpdir, 'metadata.xml') + idp.output(md_file) + with open(md_file) as fd: + text = fd.read() + print '==================== IDP ====================' + print text + print '=============================================' + + # Test SP generation + sign_cert = Certificate(tmpdir) + sign_cert.generate('sp-signing-cert', 'sp.ipsilon.example.com') + sp = Metadata() + sp.set_entity_id('https://ipsilon.example.com/samlsp/metadata') + sp.set_role(SP_ROLE) + sp.add_certs(sign_cert) + sp.add_service(LOGOUT_SERVICE, lasso.SAML2_METADATA_BINDING_REDIRECT, + 'https://ipsilon.example.com/samlsp/logout') + sp.add_service(ASSERTION_SERVICE, lasso.SAML2_METADATA_BINDING_POST, + 'https://ipsilon.example.com/samlsp/postResponse') + md_file = os.path.join(tmpdir, 'metadata.xml') + sp.output(md_file) + with open(md_file) as fd: + text = fd.read() + print '===================== SP ====================' + print text + print '=============================================' + + finally: + shutil.rmtree(tmpdir) |