Skip to content

Commit cef514c

Browse files
committed
Merge branch 'new-tests'
2 parents e3752e9 + 68dc4c5 commit cef514c

File tree

476 files changed

+46030
-28868
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

476 files changed

+46030
-28868
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,37 @@
1+
{
2+
"test suite": {
3+
"name": "Single test",
4+
"description": "One test only",
5+
"filter messages": true
6+
},
7+
"tests": [
8+
{
9+
"test": {
10+
"name": "var0",
11+
"description": "var1",
12+
"type": "passive",
13+
"sessions": "session0",
14+
"operations": [
15+
{
16+
"message type": "var2",
17+
"decode operations": [
18+
{
19+
"from": "var3",
20+
"decode param": "var4",
21+
"type": "jwt",
22+
"checks": [
23+
{
24+
"in": "var5",
25+
"check": "$var6",
26+
"not matches regex": "var7"
27+
}
28+
]
29+
}
30+
]
31+
}
32+
],
33+
"result": "correct flow s1"
34+
}
35+
}
36+
]
37+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
{
2+
"test suite": {
3+
"name": "Single test",
4+
"description": "One test only",
5+
"filter messages": true
6+
},
7+
"tests": [
8+
{
9+
"test": {
10+
"name": "Does the AA metadata contain correct type authorization_endpoint claim",
11+
"description": "In this test the AA metadata in the AA Entity Configuration are taken and the value of the authorization_endpoint claim in the 'federation_entity' entity type is \"private\"",
12+
"type": "passive",
13+
"sessions": [
14+
"s1"
15+
],
16+
"operations": [
17+
{
18+
"message type": "Entity Configuration response AA",
19+
"decode operations": [
20+
{
21+
"from": "body",
22+
"decode param": "[^\\n\\r]*",
23+
"type": "jwt",
24+
"checks": [
25+
{
26+
"in": "payload",
27+
"check": "$.metadata.federation_entity",
28+
"json schema compliant": "{\"type\": \"object\",\"properties\": {\"authorization_endpoint\": {\"type\": \"string\",\"const\": \"private\"}},\"required\": [\"authorization_endpoint\"]}"
29+
}
30+
]
31+
}
32+
]
33+
}
34+
],
35+
"result": "correct flow s1"
36+
}
37+
}
38+
]
39+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
{
2+
"test suite": {
3+
"name": "Single test",
4+
"description": "One test only",
5+
"filter messages": true
6+
},
7+
"tests": [
8+
{
9+
"test": {
10+
"name": "Does the AA metadata contain correct type logo_uri claim",
11+
"description": "In this test the SA metadata in the TA Entity Configuration are taken and the value of the logo_uri claim in the 'federation_entity' entity type is an URL with an .svg file",
12+
"type": "passive",
13+
"sessions": [
14+
"s1"
15+
],
16+
"operations": [
17+
{
18+
"message type": "Entity Configuration response AA",
19+
"decode operations": [
20+
{
21+
"from": "body",
22+
"decode param": "[^\\n\\r]*",
23+
"type": "jwt",
24+
"checks": [
25+
{
26+
"in": "payload",
27+
"check": "$.metadata.federation_entity",
28+
"json schema compliant": "{\"type\":\"object\", \"properties\":{\"logo_uri\":{\"type\":\"string\", \"format\":\"uri\", \"pattern\":\"^https://.*\\\\.svg$\"}},\"required\":[\"logo_uri\"]}"
29+
}
30+
]
31+
}
32+
]
33+
}
34+
],
35+
"result": "correct flow s1"
36+
}
37+
}
38+
]
39+
}

testplans/spid-cie-oidc/implementations/spid-cie-oidc-django/input/mig-t/tests/single/RP/RP-Token response-Assertion-aud-type.json testplans/spid-cie-oidc/implementations/spid-cie-oidc-django/input/mig-t/tests/single/AA/AA-Entity Configuration response-metadata-op_policy_uri-type.json

+7-9
Original file line numberDiff line numberDiff line change
@@ -7,34 +7,32 @@
77
"tests": [
88
{
99
"test": {
10-
"name": "Does the signed JWT assertion contain a correct aud claim",
11-
"description": "This test can be performed by taking the JWT present in the 'client_assertion' field of the RP's request, base64url decoding the payload and checking the aud. Its value must be an URL",
10+
"name": "Does the AA metadata contain correct type op_policy_uri claim",
11+
"description": "In this test the AA metadata in the AA Entity Configuration are taken and the value of the op_policy_uri claim in the 'openid_provider' entity type is \"private\"",
1212
"type": "passive",
1313
"sessions": [
1414
"s1"
1515
],
1616
"operations": [
1717
{
18-
"message type": "Token response",
18+
"message type": "Entity Configuration response AA",
1919
"decode operations": [
2020
{
2121
"from": "body",
22-
"decode param": "(?<=client_assertion=)([^&]+)",
22+
"decode param": "[^\\n\\r]*",
2323
"type": "jwt",
2424
"checks": [
2525
{
2626
"in": "payload",
27-
"check": "$",
28-
"json schema compliant": "{\"type\": \"object\", \"properties\": {\"aud\": {\"type\": \"string\", \"format\": \"uri-reference\"}}, \"required\": [\"aud\"]}"
27+
"check": "$.metadata.openid_provider",
28+
"json schema compliant": "{\"type\": \"object\",\"properties\": {\"op_policy_uri\": {\"type\": \"string\",\"format\": \"uri\"}},\"required\": [\"op_policy_uri\"]}"
2929
}
3030
]
3131
}
3232
]
3333
}
3434
],
35-
"result": [
36-
"s1"
37-
]
35+
"result": "correct flow s1"
3836
}
3937
}
4038
]

testplans/spid-cie-oidc/implementations/spid-cie-oidc-django/input/mig-t/tests/single/AA/AA-Entity Configuration response-metadata-op_policy_uri.json

+4-4
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@
77
"tests": [
88
{
99
"test": {
10-
"name": "Does the AA metadata contain the op_policy_uri claim",
11-
"description": "In this test the AA metadata in the AA Entity Configuration are taken and the presence of the op_policy_uri claim in the 'oauth_authorization_server' entity type is checked.",
10+
"name": "Does the AA metadata contain op_policy_uri claim",
11+
"description": "In this test the AA metadata in the AA Entity Configuration are taken and the presence of the op_policy_uri claim in the 'openid_provider' entity type is checked",
1212
"type": "passive",
1313
"sessions": [
1414
"s1"
@@ -19,12 +19,12 @@
1919
"decode operations": [
2020
{
2121
"from": "body",
22-
"decode regex": "[^\\r\\n]*",
22+
"decode param": "[^\\n\\r]*",
2323
"type": "jwt",
2424
"checks": [
2525
{
2626
"in": "payload",
27-
"check": "$.metadata.oauth_authorization_server.op_policy_uri",
27+
"check": "$..metadata.openid_provider.op_policy_uri",
2828
"is present": "true"
2929
}
3030
]
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
{
2+
"test suite": {
3+
"name": "Single test",
4+
"description": "One test only",
5+
"filter messages": true
6+
},
7+
"tests": [
8+
{
9+
"test": {
10+
"name": "Does the AA metadata contain correct type resource claim",
11+
"description": "In this test the AA metadata in the AA Entity Configuration are taken and the value of the resource claim in the 'federation_entity' entity type is an HTTPS URL",
12+
"type": "passive",
13+
"sessions": [
14+
"s1"
15+
],
16+
"operations": [
17+
{
18+
"message type": "Entity Configuration response AA",
19+
"decode operations": [
20+
{
21+
"from": "body",
22+
"decode param": "[^\\n\\r]*",
23+
"type": "jwt",
24+
"checks": [
25+
{
26+
"in": "payload",
27+
"check": "$.metadata.federation_entity",
28+
"json schema compliant": "{\"type\": \"object\",\"properties\": {\"resource\": {\"oneOf\": [{\"type\": \"string\", \"format\": \"uri\", \"pattern\": \"^https://\"},{\"type\": \"array\",\"items\": {\"type\": \"string\", \"format\": \"uri\", \"pattern\": \"^https://\"},\"minItems\": 1}]}},\"required\": [\"resource\"]}"
29+
}
30+
]
31+
}
32+
]
33+
}
34+
],
35+
"result": "correct flow s1"
36+
}
37+
}
38+
]
39+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
{
2+
"test suite": {
3+
"name": "Single test",
4+
"description": "One test only",
5+
"filter messages": true
6+
},
7+
"tests": [
8+
{
9+
"test": {
10+
"name": "Does the entity return a correct Content-Type in the EC response",
11+
"description": "In this test a correct request to the entity's /.well-known/openid-federation endpoint is made and the response is analyzed. It must have a Content-Type parameter set to application/entity-statement+jwt",
12+
"type": "passive",
13+
"sessions": [
14+
"s1"
15+
],
16+
"operations": [
17+
{
18+
"message type": "Entity Configuration response AA",
19+
"checks": [
20+
{
21+
"in": "head",
22+
"url decode": false,
23+
"is": "application/entity-statement+jwt",
24+
"check param": "Content-Type"
25+
}
26+
]
27+
}
28+
],
29+
"result": "correct flow s1"
30+
}
31+
}
32+
]
33+
}
Original file line numberDiff line numberDiff line change
@@ -7,15 +7,15 @@
77
"tests": [
88
{
99
"test": {
10-
"name": "Does the Entity's trust mark status endpoint correctly response to valid Trust Marks",
11-
"description": "In order to check if the trust mark status endpoint of a TA or SA correctly verifies valid trust marks, a valid trust mark can be sent to the endpoint and the response analyzed",
10+
"name": "Does the entity return a correct HTTP code in the EC response",
11+
"description": "In this test a correct request to the entity's /.well-known/openid-federation endpoint is made and the response is analyzed. It must be an HTTP 200 OK response",
1212
"type": "passive",
1313
"sessions": [
1414
"s1"
1515
],
1616
"operations": [
1717
{
18-
"message type": "Trust Mark status response",
18+
"message type": "Entity Configuration response AA",
1919
"checks": [
2020
{
2121
"in": "head",
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
{
2+
"test suite": {
3+
"name": "Single test",
4+
"description": "One test only",
5+
"filter messages": true
6+
},
7+
"tests": [
8+
{
9+
"test": {
10+
"name": "Does entity configuration contain a correct exp parameter",
11+
"description": "To accomplish this test, the Entity configuration of the interested entity is taken, the payload is decoded (Base64 encoding) and the presence of the exp parameter is checked",
12+
"type": "passive",
13+
"sessions": [
14+
"s1"
15+
],
16+
"operations": [
17+
{
18+
"message type": "Entity Configuration response AA",
19+
"decode operations": [
20+
{
21+
"from": "body",
22+
"decode param": "[^\\r\\n]*",
23+
"type": "jwt",
24+
"checks": [
25+
{
26+
"in": "payload",
27+
"check": "$",
28+
"json schema compliant": "{\"type\": \"object\", \"properties\": {\"exp\": {\"type\": \"integer\", \"minimum\": 0}}, \"required\": [\"exp\"]}"
29+
}
30+
]
31+
}
32+
]
33+
}
34+
],
35+
"result": "correct flow s1"
36+
}
37+
}
38+
]
39+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
{
2+
"test suite": {
3+
"name": "Single test",
4+
"description": "One test only",
5+
"filter messages": true
6+
},
7+
"tests": [
8+
{
9+
"test": {
10+
"name": "Does entity configuration contain the exp parameter",
11+
"description": "To accomplish this test, the Entity configuration of the interested entity is taken, the payload is decoded (Base64 encoding) and the presence of the exp parameter is checked",
12+
"type": "passive",
13+
"sessions": [
14+
"s1"
15+
],
16+
"operations": [
17+
{
18+
"message type": "Entity Configuration response AA",
19+
"decode operations": [
20+
{
21+
"from": "body",
22+
"decode param": "[^\\r\\n]*",
23+
"type": "jwt",
24+
"checks": [
25+
{
26+
"in": "payload",
27+
"check": "$.exp",
28+
"is present": "true"
29+
}
30+
]
31+
}
32+
]
33+
}
34+
],
35+
"result": "correct flow s1"
36+
}
37+
}
38+
]
39+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
{
2+
"test suite": {
3+
"name": "Single test",
4+
"description": "One test only",
5+
"filter messages": true
6+
},
7+
"tests": [
8+
{
9+
"test": {
10+
"name": "Does the Entity expose the /.well-known/openid-federation endpoint",
11+
"description": "In order to check the presence and correctness of the /.well-known/openid-federation endpoint, an HTTP GET request to the entity's endpoint is done and its entity configuration is expected as response.",
12+
"type": "passive",
13+
"sessions": [
14+
"s1"
15+
],
16+
"operations": [
17+
{
18+
"message type": "Entity Configuration response AA",
19+
"checks": [
20+
{
21+
"in": "head",
22+
"check regex": "HTTP/?\\d?\\.?\\d?\\s200",
23+
"is present": "true"
24+
}
25+
]
26+
}
27+
],
28+
"result": "correct flow s1"
29+
}
30+
}
31+
]
32+
}

0 commit comments

Comments
 (0)