Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New SAML 2024.05.30 - Not to merge but just for SAML feature branch testing #2908

Draft
wants to merge 138 commits into
base: develop
Choose a base branch
from

Commits on Jul 12, 2024

  1. remove: SAML extension library dependency

    Co-authored-by: Peter Chen <peter-h.chen@broadcom.com>
    Co-authored-by: Bruce Ricard <bruce.ricard@broadcom.com>
    Co-authored-by: Danny Faught <danny.faught@broadcom.com>
    3 people committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    dd91275 View commit details
    Browse the repository at this point in the history
  2. Ignore non-functioning SAML tests

    * Instead of calling fail(). We have a suspicion that there is a bug in
      the way the tests are running (most of them are somehow not running
      with "./gradlew test" and we have a theory that a combination of mixing
      junit4 imports and the junit5 fail() might be contributing.
    * I was careful to use @ignore for tests importing the junit4 @test, and
      @disabled for tests using the junit5 @test.
    * These annotations were added, with the idea that you can search for
      '@ignore("SAML' and '@disabled("SAML' to find the tests that need
      attention before we finish the SAML library conversion.
    @ignore("SAML test fails")
    @ignore("SAML test doesn't compile")
    @ignore("SAML test setup doesn't compile")
    @disabled("SAML test fails")
    @disabled("SAML test doesn't compile")
    * A few tests are set to ignore because they're failing for the right
      reasons, but more work is needed to finish that and get back to green.
      The goal is to start tracking these annotations instead of failing
      tests, so we can stay green.
    * Tests now running:
        server module: 3,435 (in IntelliJ) (98 total ignored)
        uaa module: 67 (command line run of "./gradlew test" for all tests
        - still needs troubleshooting)
    
    Co-authored-by: Danny Faught <danny.faught@broadcom.com>
    swalchemist authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    316af55 View commit details
    Browse the repository at this point in the history
  3. update @ignore - test now compiles

    Co-authored-by: Hongchol Sinn <hongchol.sinn@broadcom.com>
    2 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    65ac33b View commit details
    Browse the repository at this point in the history
  4. feat: switch to new Spring Security SAML library

    * Removed commented-out references to the outdated SAML extension library
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    2 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    38b3d94 View commit details
    Browse the repository at this point in the history
  5. feat: Supply metadata through /saml/metadata

    - Adds back endpoint and incorporates forwarding for new pattern saml2 endpoints, Still has some wip elements WithHttpsNotRequired > samlMetadataReturnsOk still red RelyingPartyRegistration is hardcoded in xml, /saml/metadata/ with trailing slash not working missing parity with develop
    
    [#186986697]
    
    Co-authored-by: Peter Chen <peter-h.chen@broadcom.com>
    Tallicia and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    2d6d669 View commit details
    Browse the repository at this point in the history
  6. fix: handle case when Servlet Path is null and ensures test WithHttps…

    …NotRequired -> samlMetadataReturnsOk is green
    
    - fixed one test but still WithHttpsRequired > samlMetadataReturnsOk is red after fixing this test -
    HealthzShouldNotBeProtectedMockMvcTests > WithHttpsRequired > samlMetadataRedirects() FAILED
        java.lang.AssertionError: Range for response status value 200 expected:<REDIRECTION> but was:<SUCCESSFUL>
    
    [#186986697]
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    2 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    1cefd02 View commit details
    Browse the repository at this point in the history
  7. remove: SAML extension library dependency

    Co-authored-by: Peter Chen <peter-h.chen@broadcom.com>
    Co-authored-by: Bruce Ricard <bruce.ricard@broadcom.com>
    Co-authored-by: Danny Faught <danny.faught@broadcom.com>
    3 people committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    2deef93 View commit details
    Browse the repository at this point in the history
  8. Ignore non-functioning SAML tests

    * Instead of calling fail(). We have a suspicion that there is a bug in
      the way the tests are running (most of them are somehow not running
      with "./gradlew test" and we have a theory that a combination of mixing
      junit4 imports and the junit5 fail() might be contributing.
    * I was careful to use @ignore for tests importing the junit4 @test, and
      @disabled for tests using the junit5 @test.
    * These annotations were added, with the idea that you can search for
      '@ignore("SAML' and '@disabled("SAML' to find the tests that need
      attention before we finish the SAML library conversion.
    @ignore("SAML test fails")
    @ignore("SAML test doesn't compile")
    @ignore("SAML test setup doesn't compile")
    @disabled("SAML test fails")
    @disabled("SAML test doesn't compile")
    * A few tests are set to ignore because they're failing for the right
      reasons, but more work is needed to finish that and get back to green.
      The goal is to start tracking these annotations instead of failing
      tests, so we can stay green.
    * Tests now running:
        server module: 3,435 (in IntelliJ) (98 total ignored)
        uaa module: 67 (command line run of "./gradlew test" for all tests
        - still needs troubleshooting)
    
    Co-authored-by: Danny Faught <danny.faught@broadcom.com>
    swalchemist authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    843b0ce View commit details
    Browse the repository at this point in the history
  9. feat: Supply metadata through /saml/metadata

    - Adds back endpoint and incorporates forwarding for new pattern saml2 endpoints, Still has some wip elements WithHttpsNotRequired > samlMetadataReturnsOk still red RelyingPartyRegistration is hardcoded in xml, /saml/metadata/ with trailing slash not working missing parity with develop
    
    [#186986697]
    
    Co-authored-by: Peter Chen <peter-h.chen@broadcom.com>
    Tallicia and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    9416e40 View commit details
    Browse the repository at this point in the history
  10. fix: handle case when Servlet Path is null and ensures test WithHttps…

    …NotRequired -> samlMetadataReturnsOk is green
    
    - fixed one test but still WithHttpsRequired > samlMetadataReturnsOk is red after fixing this test -
    HealthzShouldNotBeProtectedMockMvcTests > WithHttpsRequired > samlMetadataRedirects() FAILED
        java.lang.AssertionError: Range for response status value 200 expected:<REDIRECTION> but was:<SUCCESSFUL>
    
    [#186986697]
    
    Co-authored-by: Peter Chen <peter-h.chen@broadcom.com>
    Tallicia and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    56d7cec View commit details
    Browse the repository at this point in the history
  11. feat: reliably serve SAML SP metadata

    - With the new SAML lib, SAML SP metadata generation relies on a relyingPartyRegistration,
    which requires a valid SAML IDP
    metadata. In the context of UAA external SAML IDP login, UAA does not know what the SAML IDP
    metadata is, until the operator adds it via the /identity-providers endpoint. Also, some SAML
    IDPs might require you to supply the SAML SP metadata first before you can obtain the
    SAML IDP metadata. See relevant issue: spring-projects/spring-security#11369
    - Previously, to solve this problem, the SAML SP metadata generation relies
    on relyingPartyRegistration values in saml-providers.xml, which
    hardcodes a SAML IDP metadata URL (point to some example Okta SAML instance);
    this means that UAA's SP metadata generation relies on the
    example Okta SAML instance to be running.
    - This commit, instead, supplies a hardcoded dummy SAML IDP metadata here to unblock the SAML
    SP metadata generation, at the advice of Spring Security team, so that UAA's functioning
    does not rely on some external running Okta instance.
    - code reference: https://github.com/spring-projects/spring-security-samples/blob/1b28351693d60f01a511cbcc18b64590452a3851/servlet/java-configuration/saml2/login/src/main/java/example/SecurityConfiguration.java#L62
    
    [#186986697]
    
    Co-authored-by: Peter Chen <peter-h.chen@broadcom.com>
    peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    fbd23c9 View commit details
    Browse the repository at this point in the history
  12. Ignore failing SAML test

    - A continuation of 65d1f0f
    - This test is failing as early as
      e7beec7 due to the removal of SAML
      code, as this test is related the SAML feature
    
    [#186986697]
    
    Co-authored-by: Peter Chen <peter-h.chen@broadcom.com>
    peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    81a12a4 View commit details
    Browse the repository at this point in the history
  13. disable docs test that shouldn't be running

    * Has to be commented out of the erb file even when the test method used @disabled.
    
    Co-authored-by: Peter Chen <peter-h.chen@broadcom.com>
    swalchemist and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    236a34c View commit details
    Browse the repository at this point in the history
  14. Ignore failing SAML test

    - A continuation of 65d1f0f
    - This is a test recently added to develop branch, so
    ignoring this here because the SAML feature is still being
    built.
    
    [#186986697]
    
    Co-authored-by: Peter Chen <peter-h.chen@broadcom.com>
    swalchemist and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    044b790 View commit details
    Browse the repository at this point in the history
  15. refactor: shorten the dummy IDP metadata

    - to reflect the fact that this IDP metadata just needs
    to exist in its bare minimal form, where the specific fields
    in it do not affect the SP metadata generation
    
    [#186986697]
    
    Co-authored-by: Peter Chen <peter-h.chen@broadcom.com>
    swalchemist and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    d8d2bfd View commit details
    Browse the repository at this point in the history
  16. fix: "invalid XML" error in tests

    - previously some tests error with:
    ```
    net.shibboleth.utilities.java.support.xml.XMLParserException: Unable to parse inputstream, it contained invalid XML
    ```
    - this issue is fixed once we switch to loading
    the idp saml metadata via a file (instead of an InputStream)
    
    [186822654]
    
    Co-authored-by: Danny Faught <danny.faught@broadcom.com>
    peterhaochen47 and swalchemist committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    89f268f View commit details
    Browse the repository at this point in the history
  17. wip: configure some metadata params

    Co-authored-by: Danny Faught <danny.faught@broadcom.com>
    peterhaochen47 and swalchemist committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    c572972 View commit details
    Browse the repository at this point in the history
  18. disable failing test

    * We're reprioritizing the test to get this test to pass.
    
    Co-authored-by: Bruce Ricard <bruce.ricard@broadcom.com>
    2 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    5fcd361 View commit details
    Browse the repository at this point in the history
  19. WIP

    Co-authored-by: Duane May <duane.may@broadcom.com>
    2 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    a5fa5d8 View commit details
    Browse the repository at this point in the history
  20. wip

    Co-authored-by: Duane May <duane.may@broadcom.com>
    2 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    a4fdec9 View commit details
    Browse the repository at this point in the history
  21. wip: ensuring the endpoint for metadata works both in forward and dir…

    …ect request
    
    - Tests are failing but they are behaving as expected with curl and browser for /saml/metadata /saml/metadata/example and /saml/metadata/example/
    
    - /saml/metadata/ is not returning xml
    
    - The dispatcher ordering along with position in the filter-mapping must be set properly.
    
    [#186986697]
    
    Co-authored-by: Bruce Ricard <bruce.ricard@broadcom.com>
    2 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    2c2cfc9 View commit details
    Browse the repository at this point in the history
  22. add metadata redirect test

    Co-authored-by: Duane May <duane.may@broadcom.com>
    2 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    82d048b View commit details
    Browse the repository at this point in the history
  23. wip: ensuring the saml metadata endpoint for metadata works in Mock M…

    …VC Tests
    
    - /saml/metadata/ is not returning xml
    
    [#186986697]
    
    Co-authored-by: Filip Hanik <fhanik@vmware.com>
    2 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    f3655b5 View commit details
    Browse the repository at this point in the history
  24. wip: entityID assertion works in testSamlMetadataDefault

    Co-authored-by: Alicia Yingling <alicia.yingling@broadcom.com>
    Co-authored-by: Duane May <duane.may@broadcom.com>
    3 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    5ea4e2b View commit details
    Browse the repository at this point in the history
  25. feat: entity_id assertion passes

    Co-authored-by: Alicia Yingling <alicia.yingling@broadcom.com>
    Co-authored-by: Duane May <duane.may@broadcom.com>
    3 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    fe0ec2d View commit details
    Browse the repository at this point in the history
  26. wip: use working metadata path temporarily

    * Must be changed back to /saml/metadata later, removing "example".
    
    Co-authored-by: Alicia Yingling <alicia.yingling@broadcom.com>
    Co-authored-by: Duane May <duane.may@broadcom.com>
    3 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    c6f79af View commit details
    Browse the repository at this point in the history
  27. wip: xml refactor

    Co-authored-by: Alicia Yingling <alicia.yingling@broadcom.com>
    Co-authored-by: Duane May <duane.may@broadcom.com>
    3 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    5883f8e View commit details
    Browse the repository at this point in the history
  28. wip: updating to non forwarding for /saml/metadata to the example def…

    …ault
    
    - Updated to use direct GetMapping
    
    [#186986697]
    
    Co-authored-by: Filip Hanik <fhanik@vmware.com>
    2 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    900c423 View commit details
    Browse the repository at this point in the history
  29. wip: Ensuring the WantsAssertionSigned and AuthnRequestsSigned are po…

    …pulated in SPSSODescriptor
    
    - Building out EntityDescriptor in the RelyingPartyRegistration which contains the SPSSODescriptor picked up by the resolve method
    
    [#186986697]
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    2 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    e4d72f7 View commit details
    Browse the repository at this point in the history
  30. wip: Adding in signature elements for SAML metadata.xml endpoint payload

    - Need to fix credential type being empty
    
    Caused by: java.lang.IllegalArgumentException: credentials types cannot be empty
    ....(SamlRelyingPartyRegistrationRepository.java:84)
    [#186986697]
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    2 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    8aa2fd9 View commit details
    Browse the repository at this point in the history
  31. wip: Adding in signature elements for SAML metadata.xml endpoint payload

    - Signature is not positioned correctly. It should be a child of EntityDescriptor, but the singingX509Credential.signing call positions it in SPSODescriptor
    
    [#186986697]
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    2 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    7839fa2 View commit details
    Browse the repository at this point in the history
  32. feat: populate SAMP SP metadata fields: entityID, NameIDFormat, Authn…

    …RequestsSigned
    
    - correctly reads off UAA configs to populate these fields, instead
    of using hardcoded values
    - refactor to directly reading `login.saml.NameID` config (a more modern approach) instead
    of constructing a bean in xml (a more legacy approach)
    - side note: update the UAA config used in mock mvc tests (/uaa/src/test/resources/integration_test_properties.yml)
    to use a non-default option of `login.saml.nameID` so that we can test
    that the correct value is being piped through
    
    Co-authored-by: Peter Chen <peter-h.chen@broadcom.com>
    duanemay and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    f1fb4ec View commit details
    Browse the repository at this point in the history
  33. refactor: clean up commented out code

    - there are many commented out codes from
    prior wip commits (which at this point, I decided, are
    too hard to fix or tidy up). Hence, in this commit,
    clean them up
    
    [186822654]
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    peterhaochen47 and duanemay committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    d344e43 View commit details
    Browse the repository at this point in the history
  34. Ignore non-functioning SAML tests

    - the SAML SP metadata is still WIP, so this IT will fail. Ignoring
    it for now so that "CI" is green along with all other SAML tests
    currently failing / non-functional due to the WIP state of the SAML
    feature.
    - see defails of this approach in 73520d9
    
    [186822654]
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    peterhaochen47 and duanemay committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    59b6605 View commit details
    Browse the repository at this point in the history
  35. Update opensaml libraries to 4.x

    https: //docs.spring.io/spring-security/reference/5.8/migration/servlet/saml2.html
    Co-authored-by: Duane May <duane.may@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    1fd65d9 View commit details
    Browse the repository at this point in the history
  36. Refactor annotations and formatting

    Use RestController, Slf4j, Getter
    Use textblocks
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    32607ed View commit details
    Browse the repository at this point in the history
  37. Refactor tests: formatting, andExpectAll and assertThat

    Use assertThat
    Use textblocks
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    6800b09 View commit details
    Browse the repository at this point in the history
  38. Change from SAML XML to Java Config

    Co-authored-by: Duane May <duane.may@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    8dcdfd6 View commit details
    Browse the repository at this point in the history
  39. feat: populate sp metadata field WantAssertionsSigned

    [#186986697]
    
    Co-authored-by: Peter Chen <peter-h.chen@broadcom.com>
    duanemay and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    f42f575 View commit details
    Browse the repository at this point in the history
  40. feat: saml sp metadata field - signing cert

    - also: refactor the UAA config used in mock mvc tests
    (/uaa/src/test/resources/integration_test_properties.yml)
    from the deprecated saml key fields (eg: login.serviceProviderKey)
    to the new ones (eg: login.saml.keys), so that we test for the
    new fields.
      - also fix the api docs test so that it now correctly marks
      the retrieve id zones response's `config.samlConfig.certificate`
      as optional (this field is only returned if you use the
      deprecated saml key config fields)
    
    [#186986697]
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    peterhaochen47 and duanemay committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    a9debd7 View commit details
    Browse the repository at this point in the history
  41. feat: saml sp metadata encryption cert

    - populate saml sp metadata field for use='encryption' cert
    - might be counter-intuitive that the setting on rp registration
    that controls this is "decryptionX509Credentials", but the resulting
    sp metadata indeed includes use='encryption' which matches
    develop branch
    
    [186822654]
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    peterhaochen47 and duanemay committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    0f259fc View commit details
    Browse the repository at this point in the history
  42. refactor: consolidate saml sp configs

    - to be processed by a single class "SamlConfiguration" where
    the @ConfigurationProperties(prefix="login.saml") annotation
    has the ability to process all fields under the login.saml section
    of UAA.yml
      - this is helpful because we can now centrally read, process,
      even validate all saml config fields under "login.saml"
      - pay attention to @ConfigurationProperties annotation's various
      requirements though: such as the private field names need to match
      the actually UAA.yml field name (e.g.: login.saml.fooBar -> private
      String fooBar); and that there need to be public setters and getters
      for each field
      - see: https://docs.spring.io/spring-boot/docs/current/reference/html/features.html#features.external-config.typesafe-configuration-properties.using-annotated-types
    - the exception of the saml entity id, which in UAA.yml is somehow
    outside of the login.saml context (set by login.entityID) so that
    field stays under class SamlEntityIdConfiguration
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    peterhaochen47 and duanemay committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    7861a78 View commit details
    Browse the repository at this point in the history
  43. refactor: use lombok

    - these getters and setters are required
    for @ConfigurationProperties annotation to work; use
    lombok so that we don't need to explicitly
    define them
    
    [186822654]
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    peterhaochen47 and duanemay committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    1fa24ad View commit details
    Browse the repository at this point in the history
  44. refactor: simplify lombok annotation

    - as @DaTa covers the getters and setters
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    peterhaochen47 and duanemay committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    a43bacd View commit details
    Browse the repository at this point in the history
  45. fix: maintain existing saml sp metadata file name

    - configure the file name of the saml sp metadata (the downloaded
    xml file name when accessing the metadata endpoint: http://localhost:8080/uaa/saml/metadata)
    to match the status quo on develop branch: "saml-sp.xml"
    - This file name likely do not matter, but out of caution, we should
    maintain the same file name as before
    
    [186822654]
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    peterhaochen47 and duanemay committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    c29b447 View commit details
    Browse the repository at this point in the history
  46. fix: saml sp metadata test set up

    - now that the metadata is being provided at
    the correct location: /saml/metadata, we can correct
    the test expectation to reflect that (hence matching
    the develop branch)
    
    [#186986697]
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    peterhaochen47 and duanemay committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    0e9837a View commit details
    Browse the repository at this point in the history
  47. fix: SAML SP metadata endpoint and its https redirect

    - Removed forwarding of `/saml/metadata` endpoint to `/saml/metadata/example`. It is not necessary because `/saml/metadata` endpoint method already calls `/saml/metadata/{registrationId}` with `example` as the default registrationId. (See class `SamlMetadataEndpoint`.)
    - Made `HttpsEnforcementFilter` to be added to the top of the `SecurityFilterChainPostProcessor`'s `SecurityFilterChain`.
    - Added `secFilterOpen06SAMLMetadata` to `SecurityFilterChainPostProcessor`'s  `redirectToHttps` list.
    
    [#186986697]
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    Co-authored-by: Peter Chen <peter-h.chen@broadcom.com>
    3 people committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    09685a8 View commit details
    Browse the repository at this point in the history
  48. Clean up unnecssary codes

    - Removed SamlExtensionUrlForwardingFilter. Just commented out for now in case we need it later.
    - Removed unneeded comments in test code.
    
    [#186986697]
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    2 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    2daf1bc View commit details
    Browse the repository at this point in the history
  49. Load the Saml Provider Data

    [#187084275]
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    2 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    e4de3eb View commit details
    Browse the repository at this point in the history
  50. refactor: Spring Annotations on SamlRelyingPartyRegistrationRepository

    - Change SamlRelyingPartyRegistrationRepository to Configuration
    - Use constructor args instead of Autowired
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    2 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    a4a37a9 View commit details
    Browse the repository at this point in the history
  51. fix: multiple versions of the opensaml library

    still had opensaml 3.4.6
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    2 people authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    b075cbd View commit details
    Browse the repository at this point in the history
  52. feat: send SAML authn request to IDP

    - when SAML IDP is configured via uaa.yml, when
    the user goes to "/uaa/saml2/authenticate/{saml-idp-alias}",
    they will get sent to the configured SAML IDP with
    a SAML authn request. Specifically, spring-security will do
    the following:
     - when the IDP's Binding mode is "HTTP-Redirect", the
     user is redirected to the IDP
     - when the IDP's Binding mode is "HTTP-POST", the user's
     browser is triggered to POST to the IDP. For this to work,
     the ContentSecurityPolicyFilter needs to updated to exempt
     "/saml2" from policy enforcement, such that the script that
     initiates the POST can be executed in the browser. Similar
     to how this filter exempts /saml (the existing saml-related
     path on develop branch).
    
    - refactor: update the dummy IDP metadata file
    dummy-saml-idp-metadata.xml to not point
    to example.com, but to https://www.cloudfoundry.org
    (which is more of a known destination)
    
    - refactor: use constant DEFAULT_REGISTRATION_ID
    
    [#187084275]
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    peterhaochen47 and duanemay committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    c3a2068 View commit details
    Browse the repository at this point in the history
  53. update saml link on login page

    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    6fbbdaf View commit details
    Browse the repository at this point in the history
  54. Configuration menu
    Copy the full SHA
    8eb263a View commit details
    Browse the repository at this point in the history
  55. Merge SamlConfigProps to single class

    prefix="login.saml" was in 2 ConfigProps classes before merged into 1
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    7d75dff View commit details
    Browse the repository at this point in the history
  56. Update SamlLoginIT

    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    88f9e4a View commit details
    Browse the repository at this point in the history
  57. feat: Saml Login redirects to IDP

    Reads provider info from database
    Passes the registrationId as relayState
    
    Signed-off-by: Prateek Gangwal <prateek.gangwal@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    da67d4d View commit details
    Browse the repository at this point in the history
  58. fix: click first saml link matching text

    when running multiple IT tests, the simplesamlphp2 link was also listed, and causing a conflict with url matcher
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    cb31d22 View commit details
    Browse the repository at this point in the history
  59. feat: AssertionConsumerService SAML user login

    Signed-off-by: Duane May <duane.may@broadcom.com>
    Signed-off-by: Ivan Protsiuk <ivan.protsiuk@broadcom.com>
    
    #187106956
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    2054d0f View commit details
    Browse the repository at this point in the history
  60. Clean up and reenable tests

    Signed-off-by: Ivan Protsiuk <ivan.protsiuk@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    00665f9 View commit details
    Browse the repository at this point in the history
  61. Improve Testing of SAML Request/Response

    - Improve Testing of SAML Request/Response with Saml2TestUtils
    - Configure assertionConsumerServiceLocation in one location.
    
    - Attempted move to OpenSaml4AuthenticationProvider
    requires a shadow dependency on opensaml to remove the need for non-FIPS compliant security provider. Not yet in place
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    Signed-off-by: Alicia Yingling <alicia.yingling@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    44a8d57 View commit details
    Browse the repository at this point in the history
  62. Break up AuthProvider

    Move user shadowing, attribute processing, and authorities processing to their own classes.
    
    Enable Authorities
    
    Signed-off-by: Ivan Protsiuk <ivan.protsiuk@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    a3fc3f6 View commit details
    Browse the repository at this point in the history
  63. Pull in OpenSaml4AuthenticationProvider

    This provides general response validation.
    
    Signed-off-by: Prateek Gangwal <prateek.gangwal@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    538233f View commit details
    Browse the repository at this point in the history
  64. Verify user attributes, roles, user name, email extraction

    Signed-off-by: Prateek Gangwal <prateek.gangwal@broadcom.com>
    
    #187809240
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    f2d6a42 View commit details
    Browse the repository at this point in the history
  65. Add editor and lombok config

    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    8f3bc78 View commit details
    Browse the repository at this point in the history
  66. Run kill_uaa as part of integrationTests

    Signed-off-by: Duane May <duane.may@broadcom.com>
    Signed-off-by: Hongchol Sinn <hongchol.sinn@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    6d6beea View commit details
    Browse the repository at this point in the history
  67. Annotate Disabled tests with more information

    Signed-off-by: Hongchol Sinn <hongchol.sinn@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    48a6cc1 View commit details
    Browse the repository at this point in the history
  68. feat: SAML Logout

    - Main logout flows are working
    - IDP Initiated logout is working
    - Handle metadata XML passed in instead of metadata location for both bootstrap and SamlIdentityProviderConfigurator
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    0fe1b04 View commit details
    Browse the repository at this point in the history
  69. fix Selenium HomePage can be one of two urls.

    - clean up the rest of the pageObjects package
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    5ae1b3e View commit details
    Browse the repository at this point in the history
  70. Update BootstrapTests

    - now attempts to retrieve the non-existent url https://simplesamlphp.uaa.com/saml2/idp/metadata.php
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    5455ef6 View commit details
    Browse the repository at this point in the history
  71. feature: Zone-aware SAML SP metadata

    - Implemented to the same level as the default IdenityZone's SP metadata generation.
    - Minus `NameIDFormat` value populaition and registration-ID specific implementation.
    
    [#187846376]
    hsinn0 authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    f331940 View commit details
    Browse the repository at this point in the history
  72. Disable findByRegistrationIdWhenNoneFound test as the assertion is …

    …not valid anymore.
    hsinn0 authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    52a4894 View commit details
    Browse the repository at this point in the history
  73. Update counter script

    - No longer have Ignored tests only Disabled
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    eb5baeb View commit details
    Browse the repository at this point in the history
  74. Update IdentityZone related classes and tests

    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    cdc6590 View commit details
    Browse the repository at this point in the history
  75. feat: basic SAML SP metadata for non-default ID zone

    - correctly populates the basic fields of non-default zone SAML SP metadata (such as
    WantAssertionsSigned and AuthnRequestsSigned), so that for default vs. non-default zones, the
    SP metadatas have feature parity.
    
    [#187846376]
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    Signed-off-by: Peter Chen <peter-h.chen@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 12, 2024
    Configuration menu
    Copy the full SHA
    748f5f2 View commit details
    Browse the repository at this point in the history

Commits on Jul 15, 2024

  1. wip: zoned metadata fixes and zoned login

    Signed-off-by: Peter Chen <peter-h.chen@broadcom.com>
    peterhaochen47 committed Jul 15, 2024
    Configuration menu
    Copy the full SHA
    c1a3677 View commit details
    Browse the repository at this point in the history

Commits on Jul 16, 2024

  1. Merge remote-tracking branch 'refs/remotes/origin/develop' into new-s…

    …aml-0530
    
    # Conflicts:
    #	model/src/main/java/org/cloudfoundry/identity/uaa/provider/SamlIdentityProviderDefinition.java
    #	server/src/main/java/org/cloudfoundry/identity/uaa/provider/saml/BootstrapSamlIdentityProviderData.java
    #	server/src/main/java/org/cloudfoundry/identity/uaa/provider/saml/SamlIdentityProviderConfigurator.java
    #	server/src/test/java/org/cloudfoundry/identity/uaa/config/IdentityProviderBootstrapTest.java
    #	server/src/test/java/org/cloudfoundry/identity/uaa/provider/saml/BootstrapSamlIdentityProviderDataTests.java
    #	server/src/test/java/org/cloudfoundry/identity/uaa/provider/saml/SamlIdentityProviderConfiguratorTests.java
    strehle committed Jul 16, 2024
    Configuration menu
    Copy the full SHA
    114af0c View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    8998521 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    a4455e7 View commit details
    Browse the repository at this point in the history
  4. Enable some passing SamlLoginIT tests

    Co-authored-by: Duane May <duane.may@broadcom.com>
    peterhaochen47 and duanemay committed Jul 16, 2024
    Configuration menu
    Copy the full SHA
    96bce18 View commit details
    Browse the repository at this point in the history
  5. refactor entityId and entityIdAlias resolution

    - created a base class BaseUaaRelyingPartyRegistrationRepository, used by ConfiguratorRelyingPartyRegistrationRepository and DefaultRelyingPartyRegistrationRepository.
    - moved getZoneEntityId and getZoneEntityIdAlias to base class
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    Signed-off-by: Peter Chen <peter-h.chen@broadcom.com>
    peterhaochen47 and duanemay committed Jul 16, 2024
    Configuration menu
    Copy the full SHA
    f248b1a View commit details
    Browse the repository at this point in the history
  6. Merge branch 'develop' into new-saml-0530

    Co-authored-by: Duane May <duane.may@broadcom.com>
    peterhaochen47 and duanemay committed Jul 16, 2024
    Configuration menu
    Copy the full SHA
    6182292 View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    fe383e4 View commit details
    Browse the repository at this point in the history

Commits on Jul 17, 2024

  1. Enable SAML Automatic Redirect

    Requires changing from discovery URL to the authentication request URL.
    
    Enable the following tests in SamlLoginIT:
    - samlInvitationAutomaticRedirectInZone2
    - samlLoginClientIDPAuthorizationAutomaticRedirect
    - samlLoginClientIDPAuthorizationAutomaticRedirectInZone1
    - samlLoginMapGroupsInZone1
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    Signed-off-by: Peter Chen <peter-h.chen@broadcom.com>
    duanemay authored and peterhaochen47 committed Jul 17, 2024
    Configuration menu
    Copy the full SHA
    57db423 View commit details
    Browse the repository at this point in the history

Commits on Jul 18, 2024

  1. build(deps): bump org.gradle:test-retry-gradle-plugin

    Bumps org.gradle:test-retry-gradle-plugin from 1.5.9 to 1.5.10.
    
    Co-authored-by: Peter Chen <peter-h.chen@broadcom.com>
    
    ---
    updated-dependencies:
    - dependency-name: org.gradle:test-retry-gradle-plugin
      dependency-type: direct:production
      update-type: version-update:semver-patch
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    dependabot[bot] authored and duanemay committed Jul 18, 2024
    Configuration menu
    Copy the full SHA
    61752af View commit details
    Browse the repository at this point in the history
  2. Fix regression in identity-provider endpoint (#2962)

    * Fix regression in identity-provider endpoint
    
    Issue:
    If existing entries in identity-provider with new external_key the field is null, which is expected.
    If external_key is null, this must not overwrite the issuer in rest endpoint, but it does
    
    For SAML there is no issue, because here the entityId is really new in REST output and in DB.
    For OIDC and OAuth2 the issuer was used in REST already and there was no check before overwrite it from external_key.
    
    * review
    
    * add case if issuer is null from config, allowed for oauth2 IdP
    
    * spelling
    
    * revert the logic of external key, stay with issuer
    
    * set entityId on update
    
    * test coverage
    
    Co-authored-by: Peter Chen <peter-h.chen@broadcom.com>
    2 people authored and duanemay committed Jul 18, 2024
    Configuration menu
    Copy the full SHA
    79286e0 View commit details
    Browse the repository at this point in the history
  3. build(deps): bump k8s.io/client-go from 0.30.2 to 0.30.3 in /k8s (#2964)

    Bumps [k8s.io/client-go](https://github.com/kubernetes/client-go) from 0.30.2 to 0.30.3.
    - [Changelog](https://github.com/kubernetes/client-go/blob/master/CHANGELOG.md)
    - [Commits](kubernetes/client-go@v0.30.2...v0.30.3)
    
    ---
    updated-dependencies:
    - dependency-name: k8s.io/client-go
      dependency-type: direct:production
      update-type: version-update:semver-patch
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    dependabot[bot] authored and duanemay committed Jul 18, 2024
    Configuration menu
    Copy the full SHA
    56668db View commit details
    Browse the repository at this point in the history
  4. Replace SamlLegacyAliasResponseForwardingFilter

    - Added a RelayStateRelyingPartyRegistrationResolver which looks for the Registration Id from the RelayState, instead of the last part of the URL.
    - The url contains entity id, for backward compatibility, instead of the registration Id.
    - The filter required redirect filter processing, which broke the CSRF Filter (noticed on LoginServerSecurityIntegrationTests)
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    Signed-off-by: Peter Chen <peter-h.chen@broadcom.com>
    peterhaochen47 and duanemay committed Jul 18, 2024
    Configuration menu
    Copy the full SHA
    f551b40 View commit details
    Browse the repository at this point in the history
  5. Merge branch 'develop' into new-saml-0530

    Co-authored-by: Duane May <duane.may@broadcom.com>
    peterhaochen47 and duanemay committed Jul 18, 2024
    Configuration menu
    Copy the full SHA
    54eb154 View commit details
    Browse the repository at this point in the history
  6. fix: correct test expectation

    - the saml assertion consumer endpoint should end with
    the configured login.entityID in UAA.yml (when login.saml.entityIDAlias is not set)
    peterhaochen47 committed Jul 18, 2024
    Configuration menu
    Copy the full SHA
    2c91ee8 View commit details
    Browse the repository at this point in the history

Commits on Jul 19, 2024

  1. Merge branch 'develop' into new-saml-0530

    Co-authored-by: Peter Chen <peter-h.chen@broadcom.com>
    duanemay and peterhaochen47 committed Jul 19, 2024
    Configuration menu
    Copy the full SHA
    99af302 View commit details
    Browse the repository at this point in the history
  2. Update test classes

    - DefaultIntegrationTestConfig: use Durations
    - IdentityZoneEndpointsMockMvcTests sonar, asserts
    - LdapIntegrationTests: junit5, sonar, asserts
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Jul 19, 2024
    Configuration menu
    Copy the full SHA
    6fac772 View commit details
    Browse the repository at this point in the history

Commits on Jul 22, 2024

  1. Update scripts for testing

    - kill_uaa: make port aware
    - debug_uaa: for running uaa in debug or suspended debug mode
    - create_test_providers: adds providers to running UAA via API
    - create_test_zones: adds zones and providers to running UAA via API
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Jul 22, 2024
    Configuration menu
    Copy the full SHA
    09b30ee View commit details
    Browse the repository at this point in the history

Commits on Jul 25, 2024

  1. check entityId in validate SAML (#2970)

    * WIP: replace SamlLegacyAliasResponseForwardingFilter
    
    - the receiveAuthnResponseFromIdpToLegacyAliasUrl test still failing, see
    comments within this test
    
    Co-authored-by: Duane May <duane.may@broadcom.com>
    
    * WIP: check entityId in validate SAML
    
    * WIP: re-establish validation of metadata in /identity-providers endpoint
    
    * WIP: test fix
    
    ---------
    
    Co-authored-by: Peter Chen <peter-h.chen@broadcom.com>
    Co-authored-by: Duane May <duane.may@broadcom.com>
    3 people committed Jul 25, 2024
    Configuration menu
    Copy the full SHA
    5ee57e1 View commit details
    Browse the repository at this point in the history
  2. feat: Handle Multiple SAML keys

    - Rotation Tests working
    - Uses keys from SamlConfig for each zone
    - Fall back to default keys if none set
    
    [#187994938]
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Jul 25, 2024
    Configuration menu
    Copy the full SHA
    ae14c2f View commit details
    Browse the repository at this point in the history
  3. fix: Couple of failing test cases due to 500 INTERNAL_SERVER_ERROR

    …from `/oauth/token` endpoint
    
    - Stepping through the server code revealed that an exception was thrown as follows:
    ```
    org.cloudfoundry.identity.uaa.util.JsonUtils$JsonUtilException: com.fasterxml.jackson.databind.exc.UnrecognizedPropertyException: Unrecognized field "relyingPartyRegistrationId" (class org.cloudfoundry.identity.uaa.authentication.UaaPrincipal), not marked as ignorable (6 known properties: "origin", "zoneId", "id", "email", "externalId", "name"])
    at [Source: REDACTED (StreamReadFeature.INCLUDE_SOURCE_IN_LOCATION disabled); line: 1, column: 205] (through reference chain: org.cloudfoundry.identity.uaa.authentication.UaaPrincipal["relyingPartyRegistrationId"])
    ```
    - Added a `jackson` annotation to ignore the 3 properties in UaaSamlPrincipal that were causing the `UnrecognizedPropertyException`.
    - Added back a line that sets zoneId in a test case, which apparently had been removed by mistake.
    
    [#187986233]
    [#187986220]
    hsinn0 committed Jul 25, 2024
    Configuration menu
    Copy the full SHA
    88033f1 View commit details
    Browse the repository at this point in the history

Commits on Jul 26, 2024

  1. Merge pull request #2978 from cloudfoundry/new-saml-fix-oauth-token-e…

    …ndpoint-500
    
    fix: Couple of failing test cases due to `500 INTERNAL_SERVER_ERROR` …
    duanemay authored Jul 26, 2024
    Configuration menu
    Copy the full SHA
    f61f842 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    8f682fa View commit details
    Browse the repository at this point in the history
  3. Clean up and reimplement SamlKeyManager and SamlKeyManagerFactory

    - added these methods back to IdentityZoneHolder, even though that has been Deprecated
    - Migrate BouncyCastle Setup and IdentityZoneHolderInitializer from XML to Java
    - Removed some of the old classes that were in this area
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Jul 26, 2024
    Configuration menu
    Copy the full SHA
    053f7b7 View commit details
    Browse the repository at this point in the history

Commits on Jul 29, 2024

  1. Migrate tests from ZoneAwareMetadataGeneratorTests

    - Moved tests for rotation to SamlMetadataEndpointKeyRotationTests
    - Moved tests related to SamlRedirectUtils to SamlRedirectUtilsTest
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Jul 29, 2024
    Configuration menu
    Copy the full SHA
    d878109 View commit details
    Browse the repository at this point in the history

Commits on Jul 31, 2024

  1. feature: Handle icorrect SAML response

    - Set the `Saml2WebSsoAuthenticationFilter`'s `AuthenticationFailureHandler` to the custom failure handler.
    - Updated the test case's page source validation condition to check for the string that is based on the new exception message.
    
    [#187986112]
    hsinn0 committed Jul 31, 2024
    Configuration menu
    Copy the full SHA
    0f5567e View commit details
    Browse the repository at this point in the history

Commits on Aug 1, 2024

  1. Merge pull request #2988 from cloudfoundry/new-saml-auth-failure-handler

    feature: Handle icorrect SAML response
    duanemay authored Aug 1, 2024
    Configuration menu
    Copy the full SHA
    e376f3f View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    5639565 View commit details
    Browse the repository at this point in the history
  3. Remove duplicate tests

    Various calls to metadata endpoint with and without trailing / and /example in HealthzShouldNotBeProtectedMockMvcTests were duplicated in SamlMetadataMockMvcTests
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Aug 1, 2024
    Configuration menu
    Copy the full SHA
    6f4beda View commit details
    Browse the repository at this point in the history
  4. Add signatures to Metadata and AuthnRequest

    Includes:
    - getting configured SignatureAlgorithm
    - getting configured signMetadata
    - Add Signature Algorithm and Digest Algorithm to Metadata
    - Generate Signature Value and Digest Value to Metadata
    - Add SignatureAlgorithm and keys to the RelyingPartyRegistration
    - Sign the AuthnRequest
    
    TPCF-6869
    TPCF-6938
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Aug 1, 2024
    Configuration menu
    Copy the full SHA
    c59e230 View commit details
    Browse the repository at this point in the history

Commits on Aug 2, 2024

  1. Add tests for alternate config of signRequest and signMetaData

    TPCF-6869
    TPCF-6938
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Aug 2, 2024
    Configuration menu
    Copy the full SHA
    3f5f5a8 View commit details
    Browse the repository at this point in the history
  2. Enable tests in BootstrapSamlIdentityProviderDataTests

    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Aug 2, 2024
    Configuration menu
    Copy the full SHA
    48eae87 View commit details
    Browse the repository at this point in the history

Commits on Aug 5, 2024

  1. Enable test in HomeControllerViewTests

    - Removed commented out Disabled annotation in SamlIdentityProviderConfiguratorTests
    - TestClassNullifier moved to junit5
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Aug 5, 2024
    Configuration menu
    Copy the full SHA
    ba5dfc9 View commit details
    Browse the repository at this point in the history

Commits on Aug 6, 2024

  1. Configuration menu
    Copy the full SHA
    3c5ed78 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    18c8818 View commit details
    Browse the repository at this point in the history

Commits on Aug 7, 2024

  1. feat: Add NameIdFormat to AuthnRequest

    This comes from the property, login.saml.nameID
    
    Also refactored the RelyingPartyRegistrationBuilder to use a Params object with builder since the param list was 8 items
    
    TPCF-6874
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Aug 7, 2024
    Configuration menu
    Copy the full SHA
    3786026 View commit details
    Browse the repository at this point in the history

Commits on Aug 8, 2024

  1. Support for login.saml.socket.* settings

    TPCF-6882
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Aug 8, 2024
    Configuration menu
    Copy the full SHA
    2239057 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    a9817a7 View commit details
    Browse the repository at this point in the history

Commits on Aug 12, 2024

  1. Only show failed tests

    make it easier to find the failed tests in output
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Aug 12, 2024
    Configuration menu
    Copy the full SHA
    5d3cac2 View commit details
    Browse the repository at this point in the history
  2. Caffeine Caching

    Guava Cache recommends moving to Caffeine
    Mostly a drop in replacement
    Although the refreshAfterWrite works a little different
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Aug 12, 2024
    Configuration menu
    Copy the full SHA
    6c8b795 View commit details
    Browse the repository at this point in the history
  3. Log Malformed Saml Responses

    The mechanism to achieve this in the old SAML library is no longer there. Added this in to the SamlLoginAuthenticationFailureHandler.
    
    Left the logger name as SamlResponseLoggerBinding for backward compatibility, for jobs looking for the messages.
    
    [TPCF-25429]
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Aug 12, 2024
    Configuration menu
    Copy the full SHA
    d4c4c5e View commit details
    Browse the repository at this point in the history

Commits on Aug 13, 2024

  1. Clean up and Sonar

    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Aug 13, 2024
    Configuration menu
    Copy the full SHA
    c05fe37 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    99255f9 View commit details
    Browse the repository at this point in the history

Commits on Aug 20, 2024

  1. Configuration menu
    Copy the full SHA
    493e3ee View commit details
    Browse the repository at this point in the history
  2. Update to LoginInfoEndpoint

    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Aug 20, 2024
    Configuration menu
    Copy the full SHA
    1e2f024 View commit details
    Browse the repository at this point in the history

Commits on Aug 21, 2024

  1. Add Oauth Token endpoint to metadata

    maintains existing functionality
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Aug 21, 2024
    Configuration menu
    Copy the full SHA
    29693bb View commit details
    Browse the repository at this point in the history
  2. Update tests

    SamlLoginIT.springSamlEndpointsWithEmptyContext - functionality changed redirects
    ZoneAwareKeyManagerTest - was 0 coverage, all calls are proxied to SamlKeyManager in the ThreadLocal managed by IdentityZoneHolder.
    
    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Aug 21, 2024
    Configuration menu
    Copy the full SHA
    ee64060 View commit details
    Browse the repository at this point in the history

Commits on Aug 23, 2024

  1. Configuration menu
    Copy the full SHA
    a4f74bf View commit details
    Browse the repository at this point in the history
  2. Resolve Sonar security hotspots

    Replace the //NOSONAR comment with a error specific SuppressWarnings annotation
    duanemay committed Aug 23, 2024
    Configuration menu
    Copy the full SHA
    658d271 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    dbbd346 View commit details
    Browse the repository at this point in the history

Commits on Sep 23, 2024

  1. Configuration menu
    Copy the full SHA
    cdd5fba View commit details
    Browse the repository at this point in the history

Commits on Sep 25, 2024

  1. Update JavaPluginExtension settings

    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Sep 25, 2024
    Configuration menu
    Copy the full SHA
    fe06d4f View commit details
    Browse the repository at this point in the history
  2. Implement Saml2 Bearer Grants

    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Sep 25, 2024
    Configuration menu
    Copy the full SHA
    eaac889 View commit details
    Browse the repository at this point in the history

Commits on Sep 26, 2024

  1. Configuration menu
    Copy the full SHA
    75b95ff View commit details
    Browse the repository at this point in the history
  2. Merge remote-tracking branch 'origin/develop' into new-saml-0530

    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Sep 26, 2024
    Configuration menu
    Copy the full SHA
    6931e01 View commit details
    Browse the repository at this point in the history
  3. Unjava-doc-ify the copyright notices

    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Sep 26, 2024
    Configuration menu
    Copy the full SHA
    0067298 View commit details
    Browse the repository at this point in the history

Commits on Sep 27, 2024

  1. Fix tests for Invitations and Passcodes

    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Sep 27, 2024
    Configuration menu
    Copy the full SHA
    efb7e6c View commit details
    Browse the repository at this point in the history

Commits on Oct 3, 2024

  1. Sonar fixes

    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Oct 3, 2024
    Configuration menu
    Copy the full SHA
    03b50d7 View commit details
    Browse the repository at this point in the history
  2. Update tests with awaitility

    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Oct 3, 2024
    Configuration menu
    Copy the full SHA
    b2517f1 View commit details
    Browse the repository at this point in the history

Commits on Oct 4, 2024

  1. Update discovery urls to authenticate

    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Oct 4, 2024
    Configuration menu
    Copy the full SHA
    8cf3b9d View commit details
    Browse the repository at this point in the history

Commits on Oct 7, 2024

  1. Configuration menu
    Copy the full SHA
    485bf3c View commit details
    Browse the repository at this point in the history

Commits on Oct 9, 2024

  1. Enable tests and update disabled reasons for remaining

    Signed-off-by: Duane May <duane.may@broadcom.com>
    duanemay committed Oct 9, 2024
    Configuration menu
    Copy the full SHA
    8b05365 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    d2b1cfd View commit details
    Browse the repository at this point in the history