From bad291fdda5f8eebfe5a86e08c5791f1b3d25879 Mon Sep 17 00:00:00 2001 From: Shunsuke Tsutsui Date: Mon, 20 Jun 2022 10:58:09 +0900 Subject: [PATCH 1/2] Added optional Issuer check --- lib/passport-wsfed-saml2/samlp.js | 11 ++ tags | 253 ++++++++++++++++++++++++++++++ test/samlp.tests.js | 23 +++ 3 files changed, 287 insertions(+) create mode 100644 tags diff --git a/lib/passport-wsfed-saml2/samlp.js b/lib/passport-wsfed-saml2/samlp.js index 3683b2c..8e32e75 100644 --- a/lib/passport-wsfed-saml2/samlp.js +++ b/lib/passport-wsfed-saml2/samlp.js @@ -383,6 +383,17 @@ Samlp.prototype = { } var responseXML = responseXMLs[0]; + // Check Issuer if options.idpIssuer is set. + if (self.options.idpIssuer) { + const issuer = xpath.select("//*[local-name(.)='Issuer']", samlResponse); + if (issuer.length === 0) { + return callback(new Error(`No SAML issuer found.`)); + } + if (issuer[0].textContent !== self.options.idpIssuer) { + return callback(new Error(`Unknown SAML issuer. Expected ${self.options.idpIssuer}. Received: ${issuer[0].textContent}`)); + } + } + self.isValidResponseID(responseXML.getAttribute('ID'), function(err){ if (err && self.options.checkResponseID) { return callback(err); } diff --git a/tags b/tags new file mode 100644 index 0000000..5fd0eb2 --- /dev/null +++ b/tags @@ -0,0 +1,253 @@ +!_TAG_FILE_FORMAT 2 /extended format; --format=1 will not append ;" to lines/ +!_TAG_FILE_SORTED 1 /0=unsorted, 1=sorted, 2=foldcase/ +!_TAG_PROGRAM_AUTHOR Darren Hiebert /dhiebert@users.sourceforge.net/ +!_TAG_PROGRAM_NAME Exuberant Ctags // +!_TAG_PROGRAM_URL http://ctags.sourceforge.net /official site/ +!_TAG_PROGRAM_VERSION 5.8 // +AuthenticationFailedError lib/passport-wsfed-saml2/errors/AuthenticationFailedError.js /^AuthenticationFailedError.prototype = Object.create(Error.prototype);$/;" c +AuthenticationFailedError lib/passport-wsfed-saml2/errors/AuthenticationFailedError.js /^function AuthenticationFailedError (message, detail, status) {$/;" f +AuthenticationFailedError lib/passport-wsfed-saml2/samlp.js /^var AuthenticationFailedError = require('.\/errors\/AuthenticationFailedError');$/;" v +AuthenticationFailedError lib/passport-wsfed-saml2/wsfederation.js /^var AuthenticationFailedError = require('.\/errors\/AuthenticationFailedError');$/;" v +AuthenticationFailedError.constructor lib/passport-wsfed-saml2/errors/AuthenticationFailedError.js /^AuthenticationFailedError.prototype.constructor = AuthenticationFailedError;$/;" m +BINDINGS.HTTP_POST lib/passport-wsfed-saml2/samlp.js /^ HTTP_POST: 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST',$/;" p +BINDINGS.HTTP_REDIRECT lib/passport-wsfed-saml2/samlp.js /^ HTTP_REDIRECT: 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect'$/;" p +ELEMENT_NODE lib/passport-wsfed-saml2/saml.js /^var ELEMENT_NODE = 1;$/;" v +ErrorMessages.urn:oasis:names:tc:SAML:2.0:status:AuthnFailed lib/passport-wsfed-saml2/samlp.js /^ 'urn:oasis:names:tc:SAML:2.0:status:AuthnFailed' : 'The responding provider was unable to successfully authenticate the principal'$/;" p +ErrorMessages.urn:oasis:names:tc:SAML:2.0:status:Requester lib/passport-wsfed-saml2/samlp.js /^ 'urn:oasis:names:tc:SAML:2.0:status:Requester' : 'The request could not be performed due to an error on the part of the requester',$/;" p +ErrorMessages.urn:oasis:names:tc:SAML:2.0:status:Responder lib/passport-wsfed-saml2/samlp.js /^ 'urn:oasis:names:tc:SAML:2.0:status:Responder' : 'The request could not be performed due to an error on the part of the SAML responder or SAML authority',$/;" p +ErrorMessages.urn:oasis:names:tc:SAML:2.0:status:VersionMismatch lib/passport-wsfed-saml2/samlp.js /^ 'urn:oasis:names:tc:SAML:2.0:status:VersionMismatch': 'The SAML responder could not process the request because the version of the request message was incorrect.',$/;" p +EventEmitter lib/passport-wsfed-saml2/saml.js /^var EventEmitter = require('events');$/;" v +EventEmitter lib/passport-wsfed-saml2/samlp.js /^var EventEmitter = require('events');$/;" v +EventEmitter lib/passport-wsfed-saml2/strategy.js /^var EventEmitter = require('events');$/;" v +NullStateStore lib/passport-wsfed-saml2/strategy.js /^var NullStateStore = require('.\/state\/null');$/;" v +NullStore lib/passport-wsfed-saml2/state/null.js /^NullStore.prototype.store = function(req, cb) {$/;" c +NullStore lib/passport-wsfed-saml2/state/null.js /^function NullStore(options) {$/;" f +NullStore.store lib/passport-wsfed-saml2/state/null.js /^NullStore.prototype.store = function(req, cb) {$/;" m +NullStore.verify lib/passport-wsfed-saml2/state/null.js /^NullStore.prototype.verify = function(req, providedState, cb) {$/;" m +SAML lib/passport-wsfed-saml2/saml.js /^var SAML = function (options) {$/;" c +SAML.extractAndValidateCertExpiration lib/passport-wsfed-saml2/saml.js /^SAML.prototype.extractAndValidateCertExpiration = function (validatedSamlAssertion, optionsCert) {$/;" m +SAML.function.getAttributeValues lib/passport-wsfed-saml2/saml.js /^ function getAttributeValues(attribute) {$/;" f +SAML.function.getAttributes lib/passport-wsfed-saml2/saml.js /^ function getAttributes(samlAssertion) {$/;" f +SAML.function.getAuthContext20 lib/passport-wsfed-saml2/saml.js /^ function getAuthContext20(samlAssertion) {$/;" f +SAML.function.getNameID11 lib/passport-wsfed-saml2/saml.js /^ function getNameID11(samlAssertion) {$/;" f +SAML.function.getSessionIndex lib/passport-wsfed-saml2/saml.js /^ function getSessionIndex(samlAssertion) {$/;" f +SAML.parseAssertion lib/passport-wsfed-saml2/saml.js /^SAML.prototype.parseAssertion = function(samlAssertion, callback) {$/;" m +SAML.parseAttributes lib/passport-wsfed-saml2/saml.js /^SAML.prototype.parseAttributes = function (samlAssertion, version) {$/;" m +SAML.validateAudience lib/passport-wsfed-saml2/saml.js /^SAML.prototype.validateAudience = function (samlAssertion, realm, version) {$/;" m +SAML.validateExpiration lib/passport-wsfed-saml2/saml.js /^SAML.prototype.validateExpiration = function (samlAssertion, version) {$/;" m +SAML.validateNameQualifier lib/passport-wsfed-saml2/saml.js /^SAML.prototype.validateNameQualifier = function (samlAssertion, issuer) {$/;" m +SAML.validateSamlAssertion lib/passport-wsfed-saml2/saml.js /^SAML.prototype.validateSamlAssertion = function (samlAssertion, callback) {$/;" m +SAML.validateSignature lib/passport-wsfed-saml2/saml.js /^SAML.prototype.validateSignature = function (xml, options, callback) {$/;" m +Saml test/samlp.functional.tests.js /^var Saml = require('..\/lib\/passport-wsfed-saml2\/saml').SAML;$/;" v +Saml test/samlp.tests.js /^var Saml = require('..\/lib\/passport-wsfed-saml2\/saml').SAML;$/;" v +SamlAssertionParserError lib/passport-wsfed-saml2/errors/SamlAssertionParserError.js /^SamlAssertionParserError.prototype = Object.create(Error.prototype);$/;" c +SamlAssertionParserError lib/passport-wsfed-saml2/errors/SamlAssertionParserError.js /^function SamlAssertionParserError (message, detail, status) {$/;" f +SamlAssertionParserError lib/passport-wsfed-saml2/utils.js /^var SamlAssertionParserError = require('.\/errors\/SamlAssertionParserError');$/;" v +SamlAssertionParserError.constructor lib/passport-wsfed-saml2/errors/SamlAssertionParserError.js /^SamlAssertionParserError.prototype.constructor = SamlAssertionParserError;$/;" m +SamlResponseParserError lib/passport-wsfed-saml2/errors/SamlResponseParserError.js /^SamlResponseParserError.prototype = Object.create(Error.prototype);$/;" c +SamlResponseParserError lib/passport-wsfed-saml2/errors/SamlResponseParserError.js /^function SamlResponseParserError (message, detail, status) {$/;" f +SamlResponseParserError lib/passport-wsfed-saml2/utils.js /^var SamlResponseParserError = require('.\/errors\/SamlResponseParserError');$/;" v +SamlResponseParserError.constructor lib/passport-wsfed-saml2/errors/SamlResponseParserError.js /^SamlResponseParserError.prototype.constructor = SamlResponseParserError;$/;" m +Samlp lib/passport-wsfed-saml2/samlp.js /^Samlp.prototype = {$/;" c +Samlp test/samlp.functional.tests.js /^var Samlp = require('..\/lib\/passport-wsfed-saml2\/samlp');$/;" v +Samlp test/samlp.tests.js /^var Samlp = require('..\/lib\/passport-wsfed-saml2\/samlp');$/;" v +Samlp.decodeResponse lib/passport-wsfed-saml2/samlp.js /^ decodeResponse: function(req) {$/;" m +Samlp.extractAssertion lib/passport-wsfed-saml2/samlp.js /^ extractAssertion: function(samlpResponse, callback) {$/;" m +Samlp.extractAssertion.done lib/passport-wsfed-saml2/samlp.js /^ function done(err, assertion) {$/;" f +Samlp.getSamlRequestForm lib/passport-wsfed-saml2/samlp.js /^ getSamlRequestForm: function (opts, callback) {$/;" m +Samlp.getSamlRequestParams lib/passport-wsfed-saml2/samlp.js /^ getSamlRequestParams: function (opts, callback) {$/;" m +Samlp.getSamlRequestParams.model.ID lib/passport-wsfed-saml2/samlp.js /^ ID: options.request_id,$/;" p +Samlp.getSamlStatus lib/passport-wsfed-saml2/samlp.js /^ getSamlStatus: function (samlResponse) {$/;" m +Samlp.validateSamlResponse lib/passport-wsfed-saml2/samlp.js /^ validateSamlResponse: function (samlResponse, callback) {$/;" m +SessionStateStore lib/passport-wsfed-saml2/strategy.js /^var SessionStateStore = require('.\/state\/session');$/;" v +SessionStore lib/passport-wsfed-saml2/state/session.js /^function SessionStore(options) {$/;" c +SessionStore.store lib/passport-wsfed-saml2/state/session.js /^SessionStore.prototype.store = function(req, callback) {$/;" m +SessionStore.verify lib/passport-wsfed-saml2/state/session.js /^SessionStore.prototype.verify = function(req, providedState, callback) {$/;" m +SignedXml lib/passport-wsfed-saml2/samlp.js /^var SignedXml = require('xml-crypto').SignedXml;$/;" v +Strategy examples/auth0/app.js /^var Strategy = require('..\/..\/lib\/passport-wsfed-saml2\/index').Strategy;$/;" v +Strategy lib/passport-wsfed-saml2/strategy.js /^var Strategy = require('passport-strategy');$/;" v +Strategy test/fixture/samlp-server.js /^var Strategy = require('..\/..\/lib\/passport-wsfed-saml2').Strategy;$/;" v +Strategy test/fixture/wsfed-server.js /^var Strategy = require('..\/..\/lib\/passport-wsfed-saml2').Strategy;$/;" v +Strategy test/jwt.tests.js /^var Strategy = require('..\/lib\/passport-wsfed-saml2\/strategy');$/;" v +Strategy test/state/samlp.state.custom.tests.js /^var Strategy = require('..\/..\/lib\/passport-wsfed-saml2').Strategy;$/;" v +Strategy test/state/samlp.state.session.tests.js /^var Strategy = require('..\/..\/lib\/passport-wsfed-saml2').Strategy;$/;" v +Strategy test/state/wsfed.state.custom.tests.js /^var Strategy = require('..\/..\/lib\/passport-wsfed-saml2').Strategy;$/;" v +Strategy test/state/wsfed.state.session.tests.js /^var Strategy = require('..\/..\/lib\/passport-wsfed-saml2').Strategy;$/;" v +WSFederationResultParseError lib/passport-wsfed-saml2/errors/WSFederationResultParserError.js /^WSFederationResultParseError.prototype = Object.create(Error.prototype);$/;" c +WSFederationResultParseError lib/passport-wsfed-saml2/errors/WSFederationResultParserError.js /^function WSFederationResultParseError (message, detail, status) {$/;" f +WSFederationResultParseError.constructor lib/passport-wsfed-saml2/errors/WSFederationResultParserError.js /^WSFederationResultParseError.prototype.constructor = WSFederationResultParseError;$/;" m +WSFederationResultParserError lib/passport-wsfed-saml2/utils.js /^var WSFederationResultParserError = require('.\/errors\/WSFederationResultParserError');$/;" v +WsFedSaml2Strategy lib/passport-wsfed-saml2/strategy.js /^function WsFedSaml2Strategy (options, verify) {$/;" c +WsFedSaml2Strategy._authenticate_jwt lib/passport-wsfed-saml2/strategy.js /^WsFedSaml2Strategy.prototype._authenticate_jwt = function (req, state) {$/;" m +WsFedSaml2Strategy._authenticate_saml lib/passport-wsfed-saml2/strategy.js /^WsFedSaml2Strategy.prototype._authenticate_saml = function (req, state) {$/;" m +WsFedSaml2Strategy.authenticate lib/passport-wsfed-saml2/strategy.js /^WsFedSaml2Strategy.prototype.authenticate = function (req, opts) {$/;" m +WsFedSaml2Strategy.authorizationParams lib/passport-wsfed-saml2/strategy.js /^WsFedSaml2Strategy.prototype.authorizationParams = function(options) {$/;" m +WsFedSaml2Strategy.var.meta.identityProviderUrl lib/passport-wsfed-saml2/strategy.js /^ identityProviderUrl: this.options.identityProviderUrl$/;" p +WsFederation lib/passport-wsfed-saml2/wsfederation.js /^WsFederation.prototype = {$/;" c +WsFederation.extractFault lib/passport-wsfed-saml2/wsfederation.js /^ extractFault: function(req) {$/;" m +WsFederation.extractToken lib/passport-wsfed-saml2/wsfederation.js /^ extractToken: function(req) {$/;" m +WsFederation.getRequestSecurityTokenUrl lib/passport-wsfed-saml2/wsfederation.js /^ getRequestSecurityTokenUrl: function (options) {$/;" m +WsFederation.retrieveToken lib/passport-wsfed-saml2/wsfederation.js /^ retrieveToken: function(req, callback) {$/;" m +algorithms.signature lib/passport-wsfed-saml2/samlp.js /^ signature: {$/;" p +app examples/auth0/app.js /^var app = express();$/;" v +app examples/login/app.js /^var app = express();$/;" v +assert test/saml11.tests.js /^var assert = require('assert'),$/;" v +cert.pub test/jwt.tests.js /^ pub: fs.readFileSync(__dirname + '\/test-auth0.pem'),$/;" p +chai test/state/samlp.state.custom.tests.js /^var chai = require('chai');$/;" v +chai test/state/samlp.state.session.tests.js /^var chai = require('chai');$/;" v +chai test/state/wsfed.state.custom.tests.js /^var chai = require('chai');$/;" v +chai test/state/wsfed.state.session.tests.js /^var chai = require('chai');$/;" v +cheerio test/samlp.functional.tests.js /^var cheerio = require('cheerio');$/;" v +cheerio test/wsfed.tests.js /^var cheerio = require('cheerio');$/;" v +collectAncestorNamespaces lib/passport-wsfed-saml2/samlp.js /^function collectAncestorNamespaces(node, nameSpaces = [], maxDeep = 5){$/;" f +credentials.cert test/fixture/samlp-server.js /^ cert: fs.readFileSync(path.join(__dirname, '..\/test-auth0.pem')),$/;" p +credentials.cert test/fixture/wsfed-server.js /^ cert: fs.readFileSync(path.join(__dirname, '..\/test-auth0.pem')),$/;" p +crlf2lf lib/passport-wsfed-saml2/utils.js /^function crlf2lf(string) {$/;" f +crypto lib/passport-wsfed-saml2/saml.js /^var crypto = require('crypto');$/;" v +crypto lib/passport-wsfed-saml2/samlp.js /^var crypto = require('crypto');$/;" v +crypto lib/passport-wsfed-saml2/utils.js /^var crypto = require('crypto');$/;" v +crypto test/samlp.functional.tests.js /^var crypto = require('crypto');$/;" v +doSamlpFlow test/samlp.functional.tests.js /^function doSamlpFlow(samlRequestUrl, callbackEndpoint, callback) {$/;" f +ejs lib/passport-wsfed-saml2/templates.js /^var ejs = require('ejs');$/;" v +encodingMappings.ISO-8859-1 lib/passport-wsfed-saml2/samlp.js /^ 'ISO-8859-1': 'binary',$/;" p +encodingMappings.UTF-8 lib/passport-wsfed-saml2/samlp.js /^ 'UTF-8': 'utf8'$/;" p +ensureAuthenticated examples/auth0/app.js /^function ensureAuthenticated(req, res, next) {$/;" f +ensureAuthenticated examples/login/app.js /^function ensureAuthenticated(req, res, next) {$/;" f +expect test/jwt.tests.js /^var expect = require('chai').expect;$/;" v +expect test/samlp.functional.tests.js /^var expect = require('chai').expect;$/;" v +expect test/samlp.tests.js /^var expect = require('chai').expect;$/;" v +expect test/state/samlp.state.custom.tests.js /^var expect = require('chai').expect;$/;" v +expect test/state/samlp.state.session.tests.js /^var expect = require('chai').expect;$/;" v +expect test/state/wsfed.state.custom.tests.js /^var expect = require('chai').expect;$/;" v +expect test/state/wsfed.state.session.tests.js /^var expect = require('chai').expect;$/;" v +expect test/utils.js /^var expect = require('chai').expect;$/;" v +expect test/wsfed.tests.js /^var expect = require('chai').expect;$/;" v +exports.generateUniqueID lib/passport-wsfed-saml2/utils.js /^exports.generateUniqueID = function() {$/;" f +exports.getAssertionID test/helpers.js /^exports.getAssertionID = function(assertion) {$/;" f +exports.getAttributes test/helpers.js /^exports.getAttributes = function(assertion) {$/;" f +exports.getAudiences test/helpers.js /^exports.getAudiences = function(assertion) {$/;" f +exports.getAuthenticationStatement test/helpers.js /^exports.getAuthenticationStatement = function(assertion) {$/;" f +exports.getConditions test/helpers.js /^exports.getConditions = function(assertion) {$/;" f +exports.getEncoding lib/passport-wsfed-saml2/utils.js /^exports.getEncoding = function(xml){$/;" f +exports.getIssueInstant test/helpers.js /^exports.getIssueInstant = function(assertion) {$/;" f +exports.getIssuer test/helpers.js /^exports.getIssuer = function(assertion) {$/;" f +exports.getNameIdentifier test/helpers.js /^exports.getNameIdentifier = function(assertion) {$/;" f +exports.getReqUrl lib/passport-wsfed-saml2/utils.js /^exports.getReqUrl = function(req){$/;" f +exports.getSamlAssertionVersion lib/passport-wsfed-saml2/utils.js /^exports.getSamlAssertionVersion = function(samlAssertion){$/;" f +exports.isValidSignature test/helpers.js /^exports.isValidSignature = function(assertion, cert) {$/;" f +exports.parseSamlAssertion lib/passport-wsfed-saml2/utils.js /^exports.parseSamlAssertion = function(xml) {$/;" f +exports.parseSamlResponse lib/passport-wsfed-saml2/utils.js /^exports.parseSamlResponse = function(xml) {$/;" f +exports.parseWsFedResponse lib/passport-wsfed-saml2/utils.js /^exports.parseWsFedResponse = function(xml) {$/;" f +exports.stringCompare lib/passport-wsfed-saml2/utils.js /^exports.stringCompare = function(a,b) {$/;" f +express examples/auth0/app.js /^var express = require('express');$/;" v +express examples/login/app.js /^var express = require('express')$/;" v +express test/fixture/samlp-server.js /^var express = require('express');$/;" v +express test/fixture/wsfed-server.js /^var express = require('express');$/;" v +fakeUser.displayName test/fixture/samlp-server.js /^ displayName: 'John Foo',$/;" p +fakeUser.displayName test/fixture/wsfed-server.js /^ displayName: 'John Foo',$/;" p +fakeUser.id test/fixture/samlp-server.js /^ id: '12345678',$/;" p +fakeUser.id test/fixture/wsfed-server.js /^ id: '12345678',$/;" p +fakeUser.name test/fixture/samlp-server.js /^ name: {$/;" p +fakeUser.name test/fixture/wsfed-server.js /^ name: {$/;" p +findByEmail examples/login/app.js /^function findByEmail(email, fn) {$/;" f +fs lib/passport-wsfed-saml2/templates.js /^var fs = require('fs');$/;" v +fs test/fixture/samlp-server.js /^var fs = require('fs');$/;" v +fs test/fixture/wsfed-server.js /^var fs = require('fs');$/;" v +fs test/jwt.tests.js /^var fs = require('fs');$/;" v +fs test/samlp.functional.tests.js /^var fs = require('fs');$/;" v +fs test/samlp.tests.js /^var fs = require('fs');$/;" v +function.executeSamlp lib/passport-wsfed-saml2/strategy.js /^ function executeSamlp(req) {$/;" f +function.executeWsfed lib/passport-wsfed-saml2/strategy.js /^ function executeWsfed(req) {$/;" f +function.getNameID20 lib/passport-wsfed-saml2/saml.js /^function getNameID20(samlAssertion) {$/;" f +function.var.loaded lib/passport-wsfed-saml2/strategy.js /^ var loaded = function (err, ok, state) {$/;" f +generateInstant lib/passport-wsfed-saml2/samlp.js /^function generateInstant() {$/;" f +getNameID20.result.value lib/passport-wsfed-saml2/saml.js /^ value: element.textContent,$/;" p +getProp lib/passport-wsfed-saml2/samlp.js /^function getProp(obj, path) {$/;" f +getReqUrl lib/passport-wsfed-saml2/strategy.js /^var getReqUrl = require('.\/utils').getReqUrl;$/;" v +helpers test/samlp.functional.tests.js /^var helpers = require('.\/helpers');$/;" v +http examples/auth0/app.js /^var http = require('http');$/;" v +http test/fixture/samlp-server.js /^var http = require('http');$/;" v +http test/fixture/wsfed-server.js /^var http = require('http');$/;" v +identityProviderUrl test/fixture/samlp-server.js /^var identityProviderUrl = 'http:\/\/localhost:5051\/samlp';$/;" v +ignoreValidationFunction lib/passport-wsfed-saml2/samlp.js /^function ignoreValidationFunction(samlResponseID, done){$/;" f +jwt lib/passport-wsfed-saml2/strategy.js /^var jwt = require('jsonwebtoken');$/;" v +jwt test/jwt.tests.js /^var jwt = require('jsonwebtoken');$/;" v +lib test/utils.js /^var lib = require('..\/lib\/passport-wsfed-saml2');$/;" v +module.exports.start test/fixture/samlp-server.js /^module.exports.start = function(options, callback){$/;" f +module.exports.start test/fixture/wsfed-server.js /^module.exports.start = function(options, callback){$/;" f +module.exports.start.getPostURL test/fixture/samlp-server.js /^ function getPostURL (audience, samlRequestDom, req, callback) {$/;" f +module.exports.start.getPostURL test/fixture/wsfed-server.js /^ function getPostURL (wtrealm, wreply, req, callback) {$/;" f +passport examples/auth0/app.js /^var passport = require('passport');$/;" v +passport test/fixture/samlp-server.js /^var passport = require('passport');$/;" v +passport test/fixture/wsfed-server.js /^var passport = require('passport');$/;" v +passport test/state/samlp.state.custom.tests.js /^var passport = require('chai-passport-strategy');$/;" v +passport test/state/samlp.state.session.tests.js /^var passport = require('chai-passport-strategy');$/;" v +passport test/state/wsfed.state.custom.tests.js /^var passport = require('chai-passport-strategy');$/;" v +passport test/state/wsfed.state.session.tests.js /^var passport = require('chai-passport-strategy');$/;" v +path lib/passport-wsfed-saml2/templates.js /^var path = require('path');$/;" v +path test/fixture/samlp-server.js /^var path = require('path');$/;" v +path test/fixture/wsfed-server.js /^var path = require('path');$/;" v +path test/samlp.functional.tests.js /^var path = require('path');$/;" v +pemToCert test/fixture/samlp-server.js /^function pemToCert(pem) {$/;" f +qs lib/passport-wsfed-saml2/samlp.js /^var qs = require('querystring');$/;" v +qs lib/passport-wsfed-saml2/wsfederation.js /^var qs = require('querystring');$/;" v +qs test/samlp.functional.tests.js /^var qs = require('querystring');$/;" v +querystring lib/passport-wsfed-saml2/samlp.js /^var querystring = require('querystring');$/;" v +relayState test/fixture/samlp-server.js /^var relayState = 'somestate';$/;" v +removeHeaders lib/passport-wsfed-saml2/samlp.js /^var removeHeaders = function (cert) {$/;" f +request test/samlp.functional.tests.js /^var request = require('request');$/;" v +request test/wsfed.tests.js /^var request = require('request');$/;" v +router examples/login/app.js /^var router = express.Router();$/;" v +saml lib/passport-wsfed-saml2/strategy.js /^var saml = require('.\/saml');$/;" v +samlp lib/passport-wsfed-saml2/strategy.js /^var samlp = require('.\/samlp');$/;" v +samlp test/fixture/samlp-server.js /^var samlp = require('samlp');$/;" v +server test/samlp.functional.tests.js /^var server = require('.\/fixture\/samlp-server');$/;" v +server test/samlp.tests.js /^var server = require('.\/fixture\/samlp-server');$/;" v +server test/wsfed.tests.js /^var server = require('.\/fixture\/wsfed-server');$/;" v +sig.keyInfoProvider.getKey lib/passport-wsfed-saml2/saml.js /^ getKey: function (keyInfo) {$/;" m +sig.keyInfoProvider.getKey test/helpers.js /^ getKey: function (keyInfo) {$/;" m +sig.keyInfoProvider.getKeyInfo lib/passport-wsfed-saml2/saml.js /^ getKeyInfo: function (key) {$/;" m +sig.keyInfoProvider.getKeyInfo lib/passport-wsfed-saml2/samlp.js /^ getKeyInfo: function () {$/;" m +sig.keyInfoProvider.getKeyInfo test/helpers.js /^ getKeyInfo: function (key) {$/;" m +sign lib/passport-wsfed-saml2/samlp.js /^var sign = function (content, key, algorithm) {$/;" f +supplant lib/passport-wsfed-saml2/samlp.js /^var supplant = function (tmpl, o) {$/;" f +templates lib/passport-wsfed-saml2/samlp.js /^var templates = require('.\/templates');$/;" v +templates lib/passport-wsfed-saml2/templates.js /^var templates = fs.readdirSync(path.join(__dirname, 'templates'));$/;" v +trimXml lib/passport-wsfed-saml2/samlp.js /^var trimXml = function (xml) {$/;" f +uid lib/passport-wsfed-saml2/state/session.js /^var uid = require('uid2');$/;" v +uri test/state/samlp.state.session.tests.js /^var uri = require('url');$/;" v +uri test/state/wsfed.state.session.tests.js /^var uri = require('url');$/;" v +url lib/passport-wsfed-saml2/samlp.js /^var url = require('url');$/;" v +url lib/passport-wsfed-saml2/strategy.js /^var url = require('url');$/;" v +util lib/passport-wsfed-saml2/strategy.js /^var util = require('util');$/;" v +utils lib/passport-wsfed-saml2/samlp.js /^var utils = require('.\/utils');$/;" v +utils lib/passport-wsfed-saml2/strategy.js /^var utils = require('.\/utils');$/;" v +utils lib/passport-wsfed-saml2/strategy.js /^var utils = require('.\/utils');$/;" v +utils lib/passport-wsfed-saml2/wsfederation.js /^var utils = require('.\/utils');$/;" v +utils test/utils.js /^var utils = require('..\/lib\/passport-wsfed-saml2\/utils');$/;" v +validUrl lib/passport-wsfed-saml2/samlp.js /^var validUrl = require('valid-url');$/;" v +var.params.RelayState lib/passport-wsfed-saml2/samlp.js /^ RelayState: options.RelayState || (parsedUrl.query && parsedUrl.query.RelayState) || ''$/;" p +var.params.SAMLRequest lib/passport-wsfed-saml2/samlp.js /^ SAMLRequest: null,$/;" p +var.redirectToIdp lib/passport-wsfed-saml2/strategy.js /^ var redirectToIdp = function () {$/;" f +var.sendRequestToIdp lib/passport-wsfed-saml2/strategy.js /^ var sendRequestToIdp = function () {$/;" f +var.storeState lib/passport-wsfed-saml2/strategy.js /^ var storeState = function (stored) {$/;" f +var.stored lib/passport-wsfed-saml2/strategy.js /^ var stored = function (err, state) {$/;" f +var.verifyState lib/passport-wsfed-saml2/strategy.js /^ var verifyState = function (state, loaded) {$/;" f +wsfed lib/passport-wsfed-saml2/strategy.js /^var wsfed = require('.\/wsfederation');$/;" v +wsfed test/fixture/wsfed-server.js /^var wsfed = require('wsfed');$/;" v +xmlCrypto lib/passport-wsfed-saml2/saml.js /^var xmlCrypto = require('xml-crypto');$/;" v +xmlCrypto test/helpers.js /^var xmlCrypto = require('xml-crypto'),$/;" v +xmldom lib/passport-wsfed-saml2/utils.js /^var xmldom = require('@auth0\/xmldom');$/;" v +xmldom test/samlp.functional.tests.js /^var xmldom = require('@auth0\/xmldom');$/;" v +xmldom test/samlp.tests.js /^var xmldom = require('@auth0\/xmldom');$/;" v +xmlenc lib/passport-wsfed-saml2/samlp.js /^var xmlenc = require('xml-encryption');$/;" v +xpath lib/passport-wsfed-saml2/saml.js /^var xpath = require('xpath');$/;" v +xpath lib/passport-wsfed-saml2/samlp.js /^var xpath = require('xpath');$/;" v +xpath lib/passport-wsfed-saml2/wsfederation.js /^var xpath = require('xpath');$/;" v +xtend lib/passport-wsfed-saml2/samlp.js /^var xtend = require('xtend');$/;" v +xtend lib/passport-wsfed-saml2/wsfederation.js /^var xtend = require('xtend');$/;" v +xtend test/fixture/samlp-server.js /^var xtend = require('xtend');$/;" v +xtend test/fixture/wsfed-server.js /^var xtend = require('xtend');$/;" v +zlib lib/passport-wsfed-saml2/samlp.js /^var zlib = require('zlib');$/;" v +zlib test/samlp.functional.tests.js /^var zlib = require('zlib');$/;" v +zlib test/samlp.tests.js /^var zlib = require('zlib');$/;" v diff --git a/test/samlp.tests.js b/test/samlp.tests.js index 302a14a..0377a16 100644 --- a/test/samlp.tests.js +++ b/test/samlp.tests.js @@ -135,6 +135,7 @@ describe('samlp (unit tests)', function () { var samlpResponseWithStatusNotMappedStatus = 'urn:fixture-test'; var xmlWithNoSamlResponse = 'somedata'; var xmlWithSeveralSamlResponseElements = 'urn:fixture-testurn:fixture-test'; + var samlpResponseWithNoIssuer = ''; it('should return error for AuthnFailed status with generic message', function(done){ var samlp = new Samlp({ checkDestination: false }); @@ -309,6 +310,26 @@ describe('samlp (unit tests)', function () { }); }); + it('should return error for empty Issuer', function(done){ + var samlp = new Samlp({ idpIssuer: 'urn:fixture-test' }); + samlp.validateSamlResponse(samlpResponseWithNoIssuer, function (err) { + expect(err).to.be.ok; + expect(err.name).to.equals('Error'); + expect(err.message).to.equal('No SAML issuer found.'); + done(); + }); + }); + + it('should return error if IdP Issuer is different', function(done){ + var samlp = new Samlp({ checkDestination: false, idpIssuer: 'url:fixture-test-invalid' }); + samlp.validateSamlResponse(samlpResponseWithStatusNotMappedStatus, function (err) { + expect(err).to.be.ok; + expect(err.name).to.equals('Error'); + expect(err.message).to.equal('Unknown SAML issuer. Expected url:fixture-test-invalid. Received: urn:fixture-test'); + done(); + }); + }); + it('should return profile even if the namespace is in response element', function(done){ var cert = fs.readFileSync(__dirname + '/test-auth0.cer'); var encodedSamlResponse = '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'; @@ -377,6 +398,7 @@ describe('samlp (unit tests)', function () { checkExpiration: false, checkDestination: false, checkRecipient: false, + idpIssuer: 'https://oam-stg.putnam.com/oam/fed', realm: 'urn:auth0:fireglass:putnam' }; var samlp = new Samlp(options, new Saml(options)); @@ -396,6 +418,7 @@ describe('samlp (unit tests)', function () { checkExpiration: false, checkDestination: false, checkRecipient: false, + idpIssuer: 'http://localhost:8080/simplesaml/saml2/idp/metadata.php', realm: 'urn:auth0:login0:simplephp' }; var samlp = new Samlp(options, new Saml(options)); From 902936c5d54b07ceb90e56d457e8b5bcded14a96 Mon Sep 17 00:00:00 2001 From: Shunsuke Tsutsui Date: Mon, 20 Jun 2022 12:11:40 +0900 Subject: [PATCH 2/2] Removed unnecessary tags --- tags | 253 ----------------------------------------------------------- 1 file changed, 253 deletions(-) delete mode 100644 tags diff --git a/tags b/tags deleted file mode 100644 index 5fd0eb2..0000000 --- a/tags +++ /dev/null @@ -1,253 +0,0 @@ -!_TAG_FILE_FORMAT 2 /extended format; --format=1 will not append ;" to lines/ -!_TAG_FILE_SORTED 1 /0=unsorted, 1=sorted, 2=foldcase/ -!_TAG_PROGRAM_AUTHOR Darren Hiebert /dhiebert@users.sourceforge.net/ -!_TAG_PROGRAM_NAME Exuberant Ctags // -!_TAG_PROGRAM_URL http://ctags.sourceforge.net /official site/ -!_TAG_PROGRAM_VERSION 5.8 // -AuthenticationFailedError lib/passport-wsfed-saml2/errors/AuthenticationFailedError.js /^AuthenticationFailedError.prototype = Object.create(Error.prototype);$/;" c -AuthenticationFailedError lib/passport-wsfed-saml2/errors/AuthenticationFailedError.js /^function AuthenticationFailedError (message, detail, status) {$/;" f -AuthenticationFailedError lib/passport-wsfed-saml2/samlp.js /^var AuthenticationFailedError = require('.\/errors\/AuthenticationFailedError');$/;" v -AuthenticationFailedError lib/passport-wsfed-saml2/wsfederation.js /^var AuthenticationFailedError = require('.\/errors\/AuthenticationFailedError');$/;" v -AuthenticationFailedError.constructor lib/passport-wsfed-saml2/errors/AuthenticationFailedError.js /^AuthenticationFailedError.prototype.constructor = AuthenticationFailedError;$/;" m -BINDINGS.HTTP_POST lib/passport-wsfed-saml2/samlp.js /^ HTTP_POST: 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST',$/;" p -BINDINGS.HTTP_REDIRECT lib/passport-wsfed-saml2/samlp.js /^ HTTP_REDIRECT: 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect'$/;" p -ELEMENT_NODE lib/passport-wsfed-saml2/saml.js /^var ELEMENT_NODE = 1;$/;" v -ErrorMessages.urn:oasis:names:tc:SAML:2.0:status:AuthnFailed lib/passport-wsfed-saml2/samlp.js /^ 'urn:oasis:names:tc:SAML:2.0:status:AuthnFailed' : 'The responding provider was unable to successfully authenticate the principal'$/;" p -ErrorMessages.urn:oasis:names:tc:SAML:2.0:status:Requester lib/passport-wsfed-saml2/samlp.js /^ 'urn:oasis:names:tc:SAML:2.0:status:Requester' : 'The request could not be performed due to an error on the part of the requester',$/;" p -ErrorMessages.urn:oasis:names:tc:SAML:2.0:status:Responder lib/passport-wsfed-saml2/samlp.js /^ 'urn:oasis:names:tc:SAML:2.0:status:Responder' : 'The request could not be performed due to an error on the part of the SAML responder or SAML authority',$/;" p -ErrorMessages.urn:oasis:names:tc:SAML:2.0:status:VersionMismatch lib/passport-wsfed-saml2/samlp.js /^ 'urn:oasis:names:tc:SAML:2.0:status:VersionMismatch': 'The SAML responder could not process the request because the version of the request message was incorrect.',$/;" p -EventEmitter lib/passport-wsfed-saml2/saml.js /^var EventEmitter = require('events');$/;" v -EventEmitter lib/passport-wsfed-saml2/samlp.js /^var EventEmitter = require('events');$/;" v -EventEmitter lib/passport-wsfed-saml2/strategy.js /^var EventEmitter = require('events');$/;" v -NullStateStore lib/passport-wsfed-saml2/strategy.js /^var NullStateStore = require('.\/state\/null');$/;" v -NullStore lib/passport-wsfed-saml2/state/null.js /^NullStore.prototype.store = function(req, cb) {$/;" c -NullStore lib/passport-wsfed-saml2/state/null.js /^function NullStore(options) {$/;" f -NullStore.store lib/passport-wsfed-saml2/state/null.js /^NullStore.prototype.store = function(req, cb) {$/;" m -NullStore.verify lib/passport-wsfed-saml2/state/null.js /^NullStore.prototype.verify = function(req, providedState, cb) {$/;" m -SAML lib/passport-wsfed-saml2/saml.js /^var SAML = function (options) {$/;" c -SAML.extractAndValidateCertExpiration lib/passport-wsfed-saml2/saml.js /^SAML.prototype.extractAndValidateCertExpiration = function (validatedSamlAssertion, optionsCert) {$/;" m -SAML.function.getAttributeValues lib/passport-wsfed-saml2/saml.js /^ function getAttributeValues(attribute) {$/;" f -SAML.function.getAttributes lib/passport-wsfed-saml2/saml.js /^ function getAttributes(samlAssertion) {$/;" f -SAML.function.getAuthContext20 lib/passport-wsfed-saml2/saml.js /^ function getAuthContext20(samlAssertion) {$/;" f -SAML.function.getNameID11 lib/passport-wsfed-saml2/saml.js /^ function getNameID11(samlAssertion) {$/;" f -SAML.function.getSessionIndex lib/passport-wsfed-saml2/saml.js /^ function getSessionIndex(samlAssertion) {$/;" f -SAML.parseAssertion lib/passport-wsfed-saml2/saml.js /^SAML.prototype.parseAssertion = function(samlAssertion, callback) {$/;" m -SAML.parseAttributes lib/passport-wsfed-saml2/saml.js /^SAML.prototype.parseAttributes = function (samlAssertion, version) {$/;" m -SAML.validateAudience lib/passport-wsfed-saml2/saml.js /^SAML.prototype.validateAudience = function (samlAssertion, realm, version) {$/;" m -SAML.validateExpiration lib/passport-wsfed-saml2/saml.js /^SAML.prototype.validateExpiration = function (samlAssertion, version) {$/;" m -SAML.validateNameQualifier lib/passport-wsfed-saml2/saml.js /^SAML.prototype.validateNameQualifier = function (samlAssertion, issuer) {$/;" m -SAML.validateSamlAssertion lib/passport-wsfed-saml2/saml.js /^SAML.prototype.validateSamlAssertion = function (samlAssertion, callback) {$/;" m -SAML.validateSignature lib/passport-wsfed-saml2/saml.js /^SAML.prototype.validateSignature = function (xml, options, callback) {$/;" m -Saml test/samlp.functional.tests.js /^var Saml = require('..\/lib\/passport-wsfed-saml2\/saml').SAML;$/;" v -Saml test/samlp.tests.js /^var Saml = require('..\/lib\/passport-wsfed-saml2\/saml').SAML;$/;" v -SamlAssertionParserError lib/passport-wsfed-saml2/errors/SamlAssertionParserError.js /^SamlAssertionParserError.prototype = Object.create(Error.prototype);$/;" c -SamlAssertionParserError lib/passport-wsfed-saml2/errors/SamlAssertionParserError.js /^function SamlAssertionParserError (message, detail, status) {$/;" f -SamlAssertionParserError lib/passport-wsfed-saml2/utils.js /^var SamlAssertionParserError = require('.\/errors\/SamlAssertionParserError');$/;" v -SamlAssertionParserError.constructor lib/passport-wsfed-saml2/errors/SamlAssertionParserError.js /^SamlAssertionParserError.prototype.constructor = SamlAssertionParserError;$/;" m -SamlResponseParserError lib/passport-wsfed-saml2/errors/SamlResponseParserError.js /^SamlResponseParserError.prototype = Object.create(Error.prototype);$/;" c -SamlResponseParserError lib/passport-wsfed-saml2/errors/SamlResponseParserError.js /^function SamlResponseParserError (message, detail, status) {$/;" f -SamlResponseParserError lib/passport-wsfed-saml2/utils.js /^var SamlResponseParserError = require('.\/errors\/SamlResponseParserError');$/;" v -SamlResponseParserError.constructor lib/passport-wsfed-saml2/errors/SamlResponseParserError.js /^SamlResponseParserError.prototype.constructor = SamlResponseParserError;$/;" m -Samlp lib/passport-wsfed-saml2/samlp.js /^Samlp.prototype = {$/;" c -Samlp test/samlp.functional.tests.js /^var Samlp = require('..\/lib\/passport-wsfed-saml2\/samlp');$/;" v -Samlp test/samlp.tests.js /^var Samlp = require('..\/lib\/passport-wsfed-saml2\/samlp');$/;" v -Samlp.decodeResponse lib/passport-wsfed-saml2/samlp.js /^ decodeResponse: function(req) {$/;" m -Samlp.extractAssertion lib/passport-wsfed-saml2/samlp.js /^ extractAssertion: function(samlpResponse, callback) {$/;" m -Samlp.extractAssertion.done lib/passport-wsfed-saml2/samlp.js /^ function done(err, assertion) {$/;" f -Samlp.getSamlRequestForm lib/passport-wsfed-saml2/samlp.js /^ getSamlRequestForm: function (opts, callback) {$/;" m -Samlp.getSamlRequestParams lib/passport-wsfed-saml2/samlp.js /^ getSamlRequestParams: function (opts, callback) {$/;" m -Samlp.getSamlRequestParams.model.ID lib/passport-wsfed-saml2/samlp.js /^ ID: options.request_id,$/;" p -Samlp.getSamlStatus lib/passport-wsfed-saml2/samlp.js /^ getSamlStatus: function (samlResponse) {$/;" m -Samlp.validateSamlResponse lib/passport-wsfed-saml2/samlp.js /^ validateSamlResponse: function (samlResponse, callback) {$/;" m -SessionStateStore lib/passport-wsfed-saml2/strategy.js /^var SessionStateStore = require('.\/state\/session');$/;" v -SessionStore lib/passport-wsfed-saml2/state/session.js /^function SessionStore(options) {$/;" c -SessionStore.store lib/passport-wsfed-saml2/state/session.js /^SessionStore.prototype.store = function(req, callback) {$/;" m -SessionStore.verify lib/passport-wsfed-saml2/state/session.js /^SessionStore.prototype.verify = function(req, providedState, callback) {$/;" m -SignedXml lib/passport-wsfed-saml2/samlp.js /^var SignedXml = require('xml-crypto').SignedXml;$/;" v -Strategy examples/auth0/app.js /^var Strategy = require('..\/..\/lib\/passport-wsfed-saml2\/index').Strategy;$/;" v -Strategy lib/passport-wsfed-saml2/strategy.js /^var Strategy = require('passport-strategy');$/;" v -Strategy test/fixture/samlp-server.js /^var Strategy = require('..\/..\/lib\/passport-wsfed-saml2').Strategy;$/;" v -Strategy test/fixture/wsfed-server.js /^var Strategy = require('..\/..\/lib\/passport-wsfed-saml2').Strategy;$/;" v -Strategy test/jwt.tests.js /^var Strategy = require('..\/lib\/passport-wsfed-saml2\/strategy');$/;" v -Strategy test/state/samlp.state.custom.tests.js /^var Strategy = require('..\/..\/lib\/passport-wsfed-saml2').Strategy;$/;" v -Strategy test/state/samlp.state.session.tests.js /^var Strategy = require('..\/..\/lib\/passport-wsfed-saml2').Strategy;$/;" v -Strategy test/state/wsfed.state.custom.tests.js /^var Strategy = require('..\/..\/lib\/passport-wsfed-saml2').Strategy;$/;" v -Strategy test/state/wsfed.state.session.tests.js /^var Strategy = require('..\/..\/lib\/passport-wsfed-saml2').Strategy;$/;" v -WSFederationResultParseError lib/passport-wsfed-saml2/errors/WSFederationResultParserError.js /^WSFederationResultParseError.prototype = Object.create(Error.prototype);$/;" c -WSFederationResultParseError lib/passport-wsfed-saml2/errors/WSFederationResultParserError.js /^function WSFederationResultParseError (message, detail, status) {$/;" f -WSFederationResultParseError.constructor lib/passport-wsfed-saml2/errors/WSFederationResultParserError.js /^WSFederationResultParseError.prototype.constructor = WSFederationResultParseError;$/;" m -WSFederationResultParserError lib/passport-wsfed-saml2/utils.js /^var WSFederationResultParserError = require('.\/errors\/WSFederationResultParserError');$/;" v -WsFedSaml2Strategy lib/passport-wsfed-saml2/strategy.js /^function WsFedSaml2Strategy (options, verify) {$/;" c -WsFedSaml2Strategy._authenticate_jwt lib/passport-wsfed-saml2/strategy.js /^WsFedSaml2Strategy.prototype._authenticate_jwt = function (req, state) {$/;" m -WsFedSaml2Strategy._authenticate_saml lib/passport-wsfed-saml2/strategy.js /^WsFedSaml2Strategy.prototype._authenticate_saml = function (req, state) {$/;" m -WsFedSaml2Strategy.authenticate lib/passport-wsfed-saml2/strategy.js /^WsFedSaml2Strategy.prototype.authenticate = function (req, opts) {$/;" m -WsFedSaml2Strategy.authorizationParams lib/passport-wsfed-saml2/strategy.js /^WsFedSaml2Strategy.prototype.authorizationParams = function(options) {$/;" m -WsFedSaml2Strategy.var.meta.identityProviderUrl lib/passport-wsfed-saml2/strategy.js /^ identityProviderUrl: this.options.identityProviderUrl$/;" p -WsFederation lib/passport-wsfed-saml2/wsfederation.js /^WsFederation.prototype = {$/;" c -WsFederation.extractFault lib/passport-wsfed-saml2/wsfederation.js /^ extractFault: function(req) {$/;" m -WsFederation.extractToken lib/passport-wsfed-saml2/wsfederation.js /^ extractToken: function(req) {$/;" m -WsFederation.getRequestSecurityTokenUrl lib/passport-wsfed-saml2/wsfederation.js /^ getRequestSecurityTokenUrl: function (options) {$/;" m -WsFederation.retrieveToken lib/passport-wsfed-saml2/wsfederation.js /^ retrieveToken: function(req, callback) {$/;" m -algorithms.signature lib/passport-wsfed-saml2/samlp.js /^ signature: {$/;" p -app examples/auth0/app.js /^var app = express();$/;" v -app examples/login/app.js /^var app = express();$/;" v -assert test/saml11.tests.js /^var assert = require('assert'),$/;" v -cert.pub test/jwt.tests.js /^ pub: fs.readFileSync(__dirname + '\/test-auth0.pem'),$/;" p -chai test/state/samlp.state.custom.tests.js /^var chai = require('chai');$/;" v -chai test/state/samlp.state.session.tests.js /^var chai = require('chai');$/;" v -chai test/state/wsfed.state.custom.tests.js /^var chai = require('chai');$/;" v -chai test/state/wsfed.state.session.tests.js /^var chai = require('chai');$/;" v -cheerio test/samlp.functional.tests.js /^var cheerio = require('cheerio');$/;" v -cheerio test/wsfed.tests.js /^var cheerio = require('cheerio');$/;" v -collectAncestorNamespaces lib/passport-wsfed-saml2/samlp.js /^function collectAncestorNamespaces(node, nameSpaces = [], maxDeep = 5){$/;" f -credentials.cert test/fixture/samlp-server.js /^ cert: fs.readFileSync(path.join(__dirname, '..\/test-auth0.pem')),$/;" p -credentials.cert test/fixture/wsfed-server.js /^ cert: fs.readFileSync(path.join(__dirname, '..\/test-auth0.pem')),$/;" p -crlf2lf lib/passport-wsfed-saml2/utils.js /^function crlf2lf(string) {$/;" f -crypto lib/passport-wsfed-saml2/saml.js /^var crypto = require('crypto');$/;" v -crypto lib/passport-wsfed-saml2/samlp.js /^var crypto = require('crypto');$/;" v -crypto lib/passport-wsfed-saml2/utils.js /^var crypto = require('crypto');$/;" v -crypto test/samlp.functional.tests.js /^var crypto = require('crypto');$/;" v -doSamlpFlow test/samlp.functional.tests.js /^function doSamlpFlow(samlRequestUrl, callbackEndpoint, callback) {$/;" f -ejs lib/passport-wsfed-saml2/templates.js /^var ejs = require('ejs');$/;" v -encodingMappings.ISO-8859-1 lib/passport-wsfed-saml2/samlp.js /^ 'ISO-8859-1': 'binary',$/;" p -encodingMappings.UTF-8 lib/passport-wsfed-saml2/samlp.js /^ 'UTF-8': 'utf8'$/;" p -ensureAuthenticated examples/auth0/app.js /^function ensureAuthenticated(req, res, next) {$/;" f -ensureAuthenticated examples/login/app.js /^function ensureAuthenticated(req, res, next) {$/;" f -expect test/jwt.tests.js /^var expect = require('chai').expect;$/;" v -expect test/samlp.functional.tests.js /^var expect = require('chai').expect;$/;" v -expect test/samlp.tests.js /^var expect = require('chai').expect;$/;" v -expect test/state/samlp.state.custom.tests.js /^var expect = require('chai').expect;$/;" v -expect test/state/samlp.state.session.tests.js /^var expect = require('chai').expect;$/;" v -expect test/state/wsfed.state.custom.tests.js /^var expect = require('chai').expect;$/;" v -expect test/state/wsfed.state.session.tests.js /^var expect = require('chai').expect;$/;" v -expect test/utils.js /^var expect = require('chai').expect;$/;" v -expect test/wsfed.tests.js /^var expect = require('chai').expect;$/;" v -exports.generateUniqueID lib/passport-wsfed-saml2/utils.js /^exports.generateUniqueID = function() {$/;" f -exports.getAssertionID test/helpers.js /^exports.getAssertionID = function(assertion) {$/;" f -exports.getAttributes test/helpers.js /^exports.getAttributes = function(assertion) {$/;" f -exports.getAudiences test/helpers.js /^exports.getAudiences = function(assertion) {$/;" f -exports.getAuthenticationStatement test/helpers.js /^exports.getAuthenticationStatement = function(assertion) {$/;" f -exports.getConditions test/helpers.js /^exports.getConditions = function(assertion) {$/;" f -exports.getEncoding lib/passport-wsfed-saml2/utils.js /^exports.getEncoding = function(xml){$/;" f -exports.getIssueInstant test/helpers.js /^exports.getIssueInstant = function(assertion) {$/;" f -exports.getIssuer test/helpers.js /^exports.getIssuer = function(assertion) {$/;" f -exports.getNameIdentifier test/helpers.js /^exports.getNameIdentifier = function(assertion) {$/;" f -exports.getReqUrl lib/passport-wsfed-saml2/utils.js /^exports.getReqUrl = function(req){$/;" f -exports.getSamlAssertionVersion lib/passport-wsfed-saml2/utils.js /^exports.getSamlAssertionVersion = function(samlAssertion){$/;" f -exports.isValidSignature test/helpers.js /^exports.isValidSignature = function(assertion, cert) {$/;" f -exports.parseSamlAssertion lib/passport-wsfed-saml2/utils.js /^exports.parseSamlAssertion = function(xml) {$/;" f -exports.parseSamlResponse lib/passport-wsfed-saml2/utils.js /^exports.parseSamlResponse = function(xml) {$/;" f -exports.parseWsFedResponse lib/passport-wsfed-saml2/utils.js /^exports.parseWsFedResponse = function(xml) {$/;" f -exports.stringCompare lib/passport-wsfed-saml2/utils.js /^exports.stringCompare = function(a,b) {$/;" f -express examples/auth0/app.js /^var express = require('express');$/;" v -express examples/login/app.js /^var express = require('express')$/;" v -express test/fixture/samlp-server.js /^var express = require('express');$/;" v -express test/fixture/wsfed-server.js /^var express = require('express');$/;" v -fakeUser.displayName test/fixture/samlp-server.js /^ displayName: 'John Foo',$/;" p -fakeUser.displayName test/fixture/wsfed-server.js /^ displayName: 'John Foo',$/;" p -fakeUser.id test/fixture/samlp-server.js /^ id: '12345678',$/;" p -fakeUser.id test/fixture/wsfed-server.js /^ id: '12345678',$/;" p -fakeUser.name test/fixture/samlp-server.js /^ name: {$/;" p -fakeUser.name test/fixture/wsfed-server.js /^ name: {$/;" p -findByEmail examples/login/app.js /^function findByEmail(email, fn) {$/;" f -fs lib/passport-wsfed-saml2/templates.js /^var fs = require('fs');$/;" v -fs test/fixture/samlp-server.js /^var fs = require('fs');$/;" v -fs test/fixture/wsfed-server.js /^var fs = require('fs');$/;" v -fs test/jwt.tests.js /^var fs = require('fs');$/;" v -fs test/samlp.functional.tests.js /^var fs = require('fs');$/;" v -fs test/samlp.tests.js /^var fs = require('fs');$/;" v -function.executeSamlp lib/passport-wsfed-saml2/strategy.js /^ function executeSamlp(req) {$/;" f -function.executeWsfed lib/passport-wsfed-saml2/strategy.js /^ function executeWsfed(req) {$/;" f -function.getNameID20 lib/passport-wsfed-saml2/saml.js /^function getNameID20(samlAssertion) {$/;" f -function.var.loaded lib/passport-wsfed-saml2/strategy.js /^ var loaded = function (err, ok, state) {$/;" f -generateInstant lib/passport-wsfed-saml2/samlp.js /^function generateInstant() {$/;" f -getNameID20.result.value lib/passport-wsfed-saml2/saml.js /^ value: element.textContent,$/;" p -getProp lib/passport-wsfed-saml2/samlp.js /^function getProp(obj, path) {$/;" f -getReqUrl lib/passport-wsfed-saml2/strategy.js /^var getReqUrl = require('.\/utils').getReqUrl;$/;" v -helpers test/samlp.functional.tests.js /^var helpers = require('.\/helpers');$/;" v -http examples/auth0/app.js /^var http = require('http');$/;" v -http test/fixture/samlp-server.js /^var http = require('http');$/;" v -http test/fixture/wsfed-server.js /^var http = require('http');$/;" v -identityProviderUrl test/fixture/samlp-server.js /^var identityProviderUrl = 'http:\/\/localhost:5051\/samlp';$/;" v -ignoreValidationFunction lib/passport-wsfed-saml2/samlp.js /^function ignoreValidationFunction(samlResponseID, done){$/;" f -jwt lib/passport-wsfed-saml2/strategy.js /^var jwt = require('jsonwebtoken');$/;" v -jwt test/jwt.tests.js /^var jwt = require('jsonwebtoken');$/;" v -lib test/utils.js /^var lib = require('..\/lib\/passport-wsfed-saml2');$/;" v -module.exports.start test/fixture/samlp-server.js /^module.exports.start = function(options, callback){$/;" f -module.exports.start test/fixture/wsfed-server.js /^module.exports.start = function(options, callback){$/;" f -module.exports.start.getPostURL test/fixture/samlp-server.js /^ function getPostURL (audience, samlRequestDom, req, callback) {$/;" f -module.exports.start.getPostURL test/fixture/wsfed-server.js /^ function getPostURL (wtrealm, wreply, req, callback) {$/;" f -passport examples/auth0/app.js /^var passport = require('passport');$/;" v -passport test/fixture/samlp-server.js /^var passport = require('passport');$/;" v -passport test/fixture/wsfed-server.js /^var passport = require('passport');$/;" v -passport test/state/samlp.state.custom.tests.js /^var passport = require('chai-passport-strategy');$/;" v -passport test/state/samlp.state.session.tests.js /^var passport = require('chai-passport-strategy');$/;" v -passport test/state/wsfed.state.custom.tests.js /^var passport = require('chai-passport-strategy');$/;" v -passport test/state/wsfed.state.session.tests.js /^var passport = require('chai-passport-strategy');$/;" v -path lib/passport-wsfed-saml2/templates.js /^var path = require('path');$/;" v -path test/fixture/samlp-server.js /^var path = require('path');$/;" v -path test/fixture/wsfed-server.js /^var path = require('path');$/;" v -path test/samlp.functional.tests.js /^var path = require('path');$/;" v -pemToCert test/fixture/samlp-server.js /^function pemToCert(pem) {$/;" f -qs lib/passport-wsfed-saml2/samlp.js /^var qs = require('querystring');$/;" v -qs lib/passport-wsfed-saml2/wsfederation.js /^var qs = require('querystring');$/;" v -qs test/samlp.functional.tests.js /^var qs = require('querystring');$/;" v -querystring lib/passport-wsfed-saml2/samlp.js /^var querystring = require('querystring');$/;" v -relayState test/fixture/samlp-server.js /^var relayState = 'somestate';$/;" v -removeHeaders lib/passport-wsfed-saml2/samlp.js /^var removeHeaders = function (cert) {$/;" f -request test/samlp.functional.tests.js /^var request = require('request');$/;" v -request test/wsfed.tests.js /^var request = require('request');$/;" v -router examples/login/app.js /^var router = express.Router();$/;" v -saml lib/passport-wsfed-saml2/strategy.js /^var saml = require('.\/saml');$/;" v -samlp lib/passport-wsfed-saml2/strategy.js /^var samlp = require('.\/samlp');$/;" v -samlp test/fixture/samlp-server.js /^var samlp = require('samlp');$/;" v -server test/samlp.functional.tests.js /^var server = require('.\/fixture\/samlp-server');$/;" v -server test/samlp.tests.js /^var server = require('.\/fixture\/samlp-server');$/;" v -server test/wsfed.tests.js /^var server = require('.\/fixture\/wsfed-server');$/;" v -sig.keyInfoProvider.getKey lib/passport-wsfed-saml2/saml.js /^ getKey: function (keyInfo) {$/;" m -sig.keyInfoProvider.getKey test/helpers.js /^ getKey: function (keyInfo) {$/;" m -sig.keyInfoProvider.getKeyInfo lib/passport-wsfed-saml2/saml.js /^ getKeyInfo: function (key) {$/;" m -sig.keyInfoProvider.getKeyInfo lib/passport-wsfed-saml2/samlp.js /^ getKeyInfo: function () {$/;" m -sig.keyInfoProvider.getKeyInfo test/helpers.js /^ getKeyInfo: function (key) {$/;" m -sign lib/passport-wsfed-saml2/samlp.js /^var sign = function (content, key, algorithm) {$/;" f -supplant lib/passport-wsfed-saml2/samlp.js /^var supplant = function (tmpl, o) {$/;" f -templates lib/passport-wsfed-saml2/samlp.js /^var templates = require('.\/templates');$/;" v -templates lib/passport-wsfed-saml2/templates.js /^var templates = fs.readdirSync(path.join(__dirname, 'templates'));$/;" v -trimXml lib/passport-wsfed-saml2/samlp.js /^var trimXml = function (xml) {$/;" f -uid lib/passport-wsfed-saml2/state/session.js /^var uid = require('uid2');$/;" v -uri test/state/samlp.state.session.tests.js /^var uri = require('url');$/;" v -uri test/state/wsfed.state.session.tests.js /^var uri = require('url');$/;" v -url lib/passport-wsfed-saml2/samlp.js /^var url = require('url');$/;" v -url lib/passport-wsfed-saml2/strategy.js /^var url = require('url');$/;" v -util lib/passport-wsfed-saml2/strategy.js /^var util = require('util');$/;" v -utils lib/passport-wsfed-saml2/samlp.js /^var utils = require('.\/utils');$/;" v -utils lib/passport-wsfed-saml2/strategy.js /^var utils = require('.\/utils');$/;" v -utils lib/passport-wsfed-saml2/strategy.js /^var utils = require('.\/utils');$/;" v -utils lib/passport-wsfed-saml2/wsfederation.js /^var utils = require('.\/utils');$/;" v -utils test/utils.js /^var utils = require('..\/lib\/passport-wsfed-saml2\/utils');$/;" v -validUrl lib/passport-wsfed-saml2/samlp.js /^var validUrl = require('valid-url');$/;" v -var.params.RelayState lib/passport-wsfed-saml2/samlp.js /^ RelayState: options.RelayState || (parsedUrl.query && parsedUrl.query.RelayState) || ''$/;" p -var.params.SAMLRequest lib/passport-wsfed-saml2/samlp.js /^ SAMLRequest: null,$/;" p -var.redirectToIdp lib/passport-wsfed-saml2/strategy.js /^ var redirectToIdp = function () {$/;" f -var.sendRequestToIdp lib/passport-wsfed-saml2/strategy.js /^ var sendRequestToIdp = function () {$/;" f -var.storeState lib/passport-wsfed-saml2/strategy.js /^ var storeState = function (stored) {$/;" f -var.stored lib/passport-wsfed-saml2/strategy.js /^ var stored = function (err, state) {$/;" f -var.verifyState lib/passport-wsfed-saml2/strategy.js /^ var verifyState = function (state, loaded) {$/;" f -wsfed lib/passport-wsfed-saml2/strategy.js /^var wsfed = require('.\/wsfederation');$/;" v -wsfed test/fixture/wsfed-server.js /^var wsfed = require('wsfed');$/;" v -xmlCrypto lib/passport-wsfed-saml2/saml.js /^var xmlCrypto = require('xml-crypto');$/;" v -xmlCrypto test/helpers.js /^var xmlCrypto = require('xml-crypto'),$/;" v -xmldom lib/passport-wsfed-saml2/utils.js /^var xmldom = require('@auth0\/xmldom');$/;" v -xmldom test/samlp.functional.tests.js /^var xmldom = require('@auth0\/xmldom');$/;" v -xmldom test/samlp.tests.js /^var xmldom = require('@auth0\/xmldom');$/;" v -xmlenc lib/passport-wsfed-saml2/samlp.js /^var xmlenc = require('xml-encryption');$/;" v -xpath lib/passport-wsfed-saml2/saml.js /^var xpath = require('xpath');$/;" v -xpath lib/passport-wsfed-saml2/samlp.js /^var xpath = require('xpath');$/;" v -xpath lib/passport-wsfed-saml2/wsfederation.js /^var xpath = require('xpath');$/;" v -xtend lib/passport-wsfed-saml2/samlp.js /^var xtend = require('xtend');$/;" v -xtend lib/passport-wsfed-saml2/wsfederation.js /^var xtend = require('xtend');$/;" v -xtend test/fixture/samlp-server.js /^var xtend = require('xtend');$/;" v -xtend test/fixture/wsfed-server.js /^var xtend = require('xtend');$/;" v -zlib lib/passport-wsfed-saml2/samlp.js /^var zlib = require('zlib');$/;" v -zlib test/samlp.functional.tests.js /^var zlib = require('zlib');$/;" v -zlib test/samlp.tests.js /^var zlib = require('zlib');$/;" v