]> BookStack Code Mirror - bookstack/blob - tests/Auth/Saml2Test.php
Create additional test helper classes
[bookstack] / tests / Auth / Saml2Test.php
1 <?php
2
3 namespace Tests\Auth;
4
5 use BookStack\Auth\Role;
6 use BookStack\Auth\User;
7 use Tests\TestCase;
8
9 class Saml2Test extends TestCase
10 {
11     protected function setUp(): void
12     {
13         parent::setUp();
14         // Set default config for SAML2
15         config()->set([
16             'auth.method'                                   => 'saml2',
17             'auth.defaults.guard'                           => 'saml2',
18             'saml2.name'                                    => 'SingleSignOn-Testing',
19             'saml2.email_attribute'                         => 'email',
20             'saml2.display_name_attributes'                 => ['first_name', 'last_name'],
21             'saml2.external_id_attribute'                   => 'uid',
22             'saml2.user_to_groups'                          => false,
23             'saml2.group_attribute'                         => 'user_groups',
24             'saml2.remove_from_groups'                      => false,
25             'saml2.onelogin_overrides'                      => null,
26             'saml2.onelogin.idp.entityId'                   => 'http://saml.local/saml2/idp/metadata.php',
27             'saml2.onelogin.idp.singleSignOnService.url'    => 'http://saml.local/saml2/idp/SSOService.php',
28             'saml2.onelogin.idp.singleLogoutService.url'    => 'http://saml.local/saml2/idp/SingleLogoutService.php',
29             'saml2.autoload_from_metadata'                  => false,
30             'saml2.onelogin.idp.x509cert'                   => $this->testCert,
31             'saml2.onelogin.debug'                          => false,
32             'saml2.onelogin.security.requestedAuthnContext' => true,
33         ]);
34     }
35
36     public function test_metadata_endpoint_displays_xml_as_expected()
37     {
38         $req = $this->get('/saml2/metadata');
39         $req->assertHeader('Content-Type', 'text/xml; charset=UTF-8');
40         $req->assertSee('md:EntityDescriptor');
41         $req->assertSee(url('/saml2/acs'));
42     }
43
44     public function test_metadata_endpoint_loads_when_autoloading_with_bad_url_set()
45     {
46         config()->set([
47             'saml2.autoload_from_metadata' => true,
48             'saml2.onelogin.idp.entityId' => 'http://192.168.1.1:9292',
49             'saml2.onelogin.idp.singleSignOnService.url' => null,
50         ]);
51
52         $req = $this->get('/saml2/metadata');
53         $req->assertOk();
54         $req->assertHeader('Content-Type', 'text/xml; charset=UTF-8');
55         $req->assertSee('md:EntityDescriptor');
56     }
57
58     public function test_onelogin_overrides_functions_as_expected()
59     {
60         $json = '{"sp": {"assertionConsumerService": {"url": "https://example.com/super-cats"}}, "contactPerson": {"technical": {"givenName": "Barry Scott", "emailAddress": "[email protected]"}}}';
61         config()->set(['saml2.onelogin_overrides' => $json]);
62
63         $req = $this->get('/saml2/metadata');
64         $req->assertSee('https://example.com/super-cats');
65         $req->assertSee('md:ContactPerson');
66         $req->assertSee('<md:GivenName>Barry Scott</md:GivenName>', false);
67     }
68
69     public function test_login_option_shows_on_login_page()
70     {
71         $req = $this->get('/login');
72         $req->assertSeeText('SingleSignOn-Testing');
73         $this->withHtml($req)->assertElementExists('form[action$="/saml2/login"][method=POST] button');
74     }
75
76     public function test_login()
77     {
78         $req = $this->post('/saml2/login');
79         $redirect = $req->headers->get('location');
80         $this->assertStringStartsWith('http://saml.local/saml2/idp/SSOService.php', $redirect, 'Login redirects to SSO location');
81
82         config()->set(['saml2.onelogin.strict' => false]);
83         $this->assertFalse($this->isAuthenticated());
84
85         $acsPost = $this->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
86         $redirect = $acsPost->headers->get('Location');
87         $acsId = explode('?id=', $redirect)[1];
88         $this->assertTrue(strlen($acsId) > 12);
89
90         $this->assertStringContainsString('/saml2/acs?id=', $redirect);
91         $this->assertTrue(cache()->has('saml2_acs:' . $acsId));
92
93         $acsGet = $this->get($redirect);
94         $acsGet->assertRedirect('/');
95         $this->assertFalse(cache()->has('saml2_acs:' . $acsId));
96
97         $this->assertTrue($this->isAuthenticated());
98         $this->assertDatabaseHas('users', [
99             'email'            => '[email protected]',
100             'external_auth_id' => 'user',
101             'email_confirmed'  => false,
102             'name'             => 'Barry Scott',
103         ]);
104     }
105
106     public function test_acs_process_id_randomly_generated()
107     {
108         $acsPost = $this->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
109         $redirectA = $acsPost->headers->get('Location');
110
111         $acsPost = $this->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
112         $redirectB = $acsPost->headers->get('Location');
113
114         $this->assertFalse($redirectA === $redirectB);
115     }
116
117     public function test_process_acs_endpoint_cant_be_called_with_invalid_id()
118     {
119         $resp = $this->get('/saml2/acs');
120         $resp->assertRedirect('/login');
121         $this->followRedirects($resp)->assertSeeText('Login using SingleSignOn-Testing failed, system did not provide successful authorization');
122
123         $resp = $this->get('/saml2/acs?id=abc123');
124         $resp->assertRedirect('/login');
125         $this->followRedirects($resp)->assertSeeText('Login using SingleSignOn-Testing failed, system did not provide successful authorization');
126     }
127
128     public function test_group_role_sync_on_login()
129     {
130         config()->set([
131             'saml2.onelogin.strict'    => false,
132             'saml2.user_to_groups'     => true,
133             'saml2.remove_from_groups' => false,
134         ]);
135
136         $memberRole = Role::factory()->create(['external_auth_id' => 'member']);
137         $adminRole = Role::getSystemRole('admin');
138
139         $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
140         $user = User::query()->where('external_auth_id', '=', 'user')->first();
141
142         $userRoleIds = $user->roles()->pluck('id');
143         $this->assertContains($memberRole->id, $userRoleIds, 'User was assigned to member role');
144         $this->assertContains($adminRole->id, $userRoleIds, 'User was assigned to admin role');
145     }
146
147     public function test_group_role_sync_removal_option_works_as_expected()
148     {
149         config()->set([
150             'saml2.onelogin.strict'    => false,
151             'saml2.user_to_groups'     => true,
152             'saml2.remove_from_groups' => true,
153         ]);
154
155         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
156         $user = User::query()->where('external_auth_id', '=', 'user')->first();
157
158         $randomRole = Role::factory()->create(['external_auth_id' => 'random']);
159         $user->attachRole($randomRole);
160         $this->assertContains($randomRole->id, $user->roles()->pluck('id'));
161
162         auth()->logout();
163         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
164         $this->assertNotContains($randomRole->id, $user->roles()->pluck('id'));
165     }
166
167     public function test_logout_link_directs_to_saml_path()
168     {
169         config()->set([
170             'saml2.onelogin.strict' => false,
171         ]);
172
173         $resp = $this->actingAs($this->users->editor())->get('/');
174         $this->withHtml($resp)->assertElementContains('form[action$="/saml2/logout"] button', 'Logout');
175     }
176
177     public function test_logout_sls_flow()
178     {
179         config()->set([
180             'saml2.onelogin.strict' => false,
181         ]);
182
183         $handleLogoutResponse = function () {
184             $this->assertTrue($this->isAuthenticated());
185
186             $req = $this->get('/saml2/sls');
187             $req->assertRedirect('/');
188             $this->assertFalse($this->isAuthenticated());
189         };
190
191         $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
192
193         $req = $this->post('/saml2/logout');
194         $redirect = $req->headers->get('location');
195         $this->assertStringStartsWith('http://saml.local/saml2/idp/SingleLogoutService.php', $redirect);
196         $this->withGet(['SAMLResponse' => $this->sloResponseData], $handleLogoutResponse);
197     }
198
199     public function test_logout_sls_flow_when_sls_not_configured()
200     {
201         config()->set([
202             'saml2.onelogin.strict'                      => false,
203             'saml2.onelogin.idp.singleLogoutService.url' => null,
204         ]);
205
206         $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
207         $this->assertTrue($this->isAuthenticated());
208
209         $req = $this->post('/saml2/logout');
210         $req->assertRedirect('/');
211         $this->assertFalse($this->isAuthenticated());
212     }
213
214     public function test_dump_user_details_option_works()
215     {
216         config()->set([
217             'saml2.onelogin.strict'   => false,
218             'saml2.dump_user_details' => true,
219         ]);
220
221         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
222         $acsPost->assertJsonStructure([
223             'id_from_idp',
224             'attrs_from_idp'      => [],
225             'attrs_after_parsing' => [],
226         ]);
227     }
228
229     public function test_saml_routes_are_only_active_if_saml_enabled()
230     {
231         config()->set(['auth.method' => 'standard']);
232         $getRoutes = ['/metadata', '/sls'];
233         foreach ($getRoutes as $route) {
234             $req = $this->get('/saml2' . $route);
235             $this->assertPermissionError($req);
236         }
237
238         $postRoutes = ['/login', '/acs', '/logout'];
239         foreach ($postRoutes as $route) {
240             $req = $this->post('/saml2' . $route);
241             $this->assertPermissionError($req);
242         }
243     }
244
245     public function test_forgot_password_routes_inaccessible()
246     {
247         $resp = $this->get('/password/email');
248         $this->assertPermissionError($resp);
249
250         $resp = $this->post('/password/email');
251         $this->assertPermissionError($resp);
252
253         $resp = $this->get('/password/reset/abc123');
254         $this->assertPermissionError($resp);
255
256         $resp = $this->post('/password/reset');
257         $this->assertPermissionError($resp);
258     }
259
260     public function test_standard_login_routes_inaccessible()
261     {
262         $resp = $this->post('/login');
263         $this->assertPermissionError($resp);
264
265         $resp = $this->post('/logout');
266         $this->assertPermissionError($resp);
267     }
268
269     public function test_user_invite_routes_inaccessible()
270     {
271         $resp = $this->get('/register/invite/abc123');
272         $this->assertPermissionError($resp);
273
274         $resp = $this->post('/register/invite/abc123');
275         $this->assertPermissionError($resp);
276     }
277
278     public function test_user_register_routes_inaccessible()
279     {
280         $resp = $this->get('/register');
281         $this->assertPermissionError($resp);
282
283         $resp = $this->post('/register');
284         $this->assertPermissionError($resp);
285     }
286
287     public function test_email_domain_restriction_active_on_new_saml_login()
288     {
289         $this->setSettings([
290             'registration-restrict' => 'testing.com',
291         ]);
292         config()->set([
293             'saml2.onelogin.strict' => false,
294         ]);
295
296         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
297         $acsPost->assertSeeText('That email domain does not have access to this application');
298         $this->assertFalse(auth()->check());
299         $this->assertDatabaseMissing('users', ['email' => '[email protected]']);
300     }
301
302     public function test_group_sync_functions_when_email_confirmation_required()
303     {
304         setting()->put('registration-confirmation', 'true');
305         config()->set([
306             'saml2.onelogin.strict'    => false,
307             'saml2.user_to_groups'     => true,
308             'saml2.remove_from_groups' => false,
309         ]);
310
311         $memberRole = Role::factory()->create(['external_auth_id' => 'member']);
312         $adminRole = Role::getSystemRole('admin');
313
314         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
315
316         $this->assertEquals('http://localhost/register/confirm', url()->current());
317         $acsPost->assertSee('Please check your email and click the confirmation button to access BookStack.');
318         /** @var User $user */
319         $user = User::query()->where('external_auth_id', '=', 'user')->first();
320
321         $userRoleIds = $user->roles()->pluck('id');
322         $this->assertContains($memberRole->id, $userRoleIds, 'User was assigned to member role');
323         $this->assertContains($adminRole->id, $userRoleIds, 'User was assigned to admin role');
324         $this->assertFalse(boolval($user->email_confirmed), 'User email remains unconfirmed');
325
326         $this->assertNull(auth()->user());
327         $homeGet = $this->get('/');
328         $homeGet->assertRedirect('/login');
329     }
330
331     public function test_login_where_existing_non_saml_user_shows_warning()
332     {
333         $this->post('/saml2/login');
334         config()->set(['saml2.onelogin.strict' => false]);
335
336         // Make the user pre-existing in DB with different auth_id
337         User::query()->forceCreate([
338             'email'            => '[email protected]',
339             'external_auth_id' => 'old_system_user_id',
340             'email_confirmed'  => false,
341             'name'             => 'Barry Scott',
342         ]);
343
344         $acsPost = $this->followingRedirects()->post('/saml2/acs', ['SAMLResponse' => $this->acsPostData]);
345         $this->assertFalse($this->isAuthenticated());
346         $this->assertDatabaseHas('users', [
347             'email'            => '[email protected]',
348             'external_auth_id' => 'old_system_user_id',
349         ]);
350
351         $acsPost->assertSee('A user with the email [email protected] already exists but with different credentials');
352     }
353
354     public function test_login_request_contains_expected_default_authncontext()
355     {
356         $authReq = $this->getAuthnRequest();
357         $this->assertStringContainsString('samlp:RequestedAuthnContext Comparison="exact"', $authReq);
358         $this->assertStringContainsString('<saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport</saml:AuthnContextClassRef>', $authReq);
359     }
360
361     public function test_false_idp_authncontext_option_does_not_pass_authncontext_in_saml_request()
362     {
363         config()->set(['saml2.onelogin.security.requestedAuthnContext' => false]);
364         $authReq = $this->getAuthnRequest();
365         $this->assertStringNotContainsString('samlp:RequestedAuthnContext', $authReq);
366         $this->assertStringNotContainsString('<saml:AuthnContextClassRef>', $authReq);
367     }
368
369     public function test_array_idp_authncontext_option_passes_value_as_authncontextclassref_in_request()
370     {
371         config()->set(['saml2.onelogin.security.requestedAuthnContext' => ['urn:federation:authentication:windows', 'urn:federation:authentication:linux']]);
372         $authReq = $this->getAuthnRequest();
373         $this->assertStringContainsString('samlp:RequestedAuthnContext', $authReq);
374         $this->assertStringContainsString('<saml:AuthnContextClassRef>urn:federation:authentication:windows</saml:AuthnContextClassRef>', $authReq);
375         $this->assertStringContainsString('<saml:AuthnContextClassRef>urn:federation:authentication:linux</saml:AuthnContextClassRef>', $authReq);
376     }
377
378     protected function getAuthnRequest(): string
379     {
380         $req = $this->post('/saml2/login');
381         $location = $req->headers->get('Location');
382         $query = explode('?', $location)[1];
383         $params = [];
384         parse_str($query, $params);
385
386         return gzinflate(base64_decode($params['SAMLRequest']));
387     }
388
389     protected function withGet(array $options, callable $callback)
390     {
391         return $this->withGlobal($_GET, $options, $callback);
392     }
393
394     protected function withGlobal(array &$global, array $options, callable $callback)
395     {
396         $original = [];
397         foreach ($options as $key => $val) {
398             $original[$key] = $global[$key] ?? null;
399             $global[$key] = $val;
400         }
401
402         $callback();
403
404         foreach ($options as $key => $val) {
405             $val = $original[$key];
406             if ($val) {
407                 $global[$key] = $val;
408             } else {
409                 unset($global[$key]);
410             }
411         }
412     }
413
414     /**
415      * The post data for a callback for single-sign-in.
416      * Provides the following attributes:
417      * array:5 [
418      * "uid" => array:1 [
419      * 0 => "user"
420      * ]
421      * "first_name" => array:1 [
422      * 0 => "Barry"
423      * ]
424      * "last_name" => array:1 [
425      * 0 => "Scott"
426      * ]
427      * "email" => array:1 [
428      * 0 => "[email protected]"
429      * ]
430      * "user_groups" => array:2 [
431      * 0 => "member"
432      * 1 => "admin"
433      * ]
434      * ].
435      */
436     protected $acsPostData = '<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" ID="_4dd4564dc794061ef1baa0467d79028ced3ce54bee" Version="2.0" IssueInstant="2019-11-17T17:53:39Z" Destination="http://bookstack.local/saml2/acs" InResponseTo="ONELOGIN_6a0f4f3993040f1987fd37068b5296229ad5361c"><saml:Issuer>http://saml.local/saml2/idp/metadata.php</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
    <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
  <ds:Reference URI="#_4dd4564dc794061ef1baa0467d79028ced3ce54bee"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>vmh/S75Nf+g+ecDJCzAbZWKJVlug7BfsC+9aWNeIreQ=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>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</ds:SignatureValue>
<ds:KeyInfo><ds:X509Data><ds:X509Certificate>MIIEazCCAtOgAwIBAgIUe7a088Cnr4izmrnBEnx5q3HTMvYwDQYJKoZIhvcNAQELBQAwRTELMAkGA1UEBhMCR0IxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDAeFw0xOTExMTYxMjE3MTVaFw0yOTExMTUxMjE3MTVaMEUxCzAJBgNVBAYTAkdCMRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYDVQQKDBhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQwggGiMA0GCSqGSIb3DQEBAQUAA4IBjwAwggGKAoIBgQDzLe9FfdyplTxHp4SuQ9gQtZT3t+SDfvEL72ppCfFZw7+B5s5B/T73aXpoQ3S53pGI1RIWCge2iCUQ2tzm27aSNH0iu9aJYcUQZ/RITqd0ayyDks1NA2PT3TW6t3m7KV5re4P0Nb+YDeuyHdkz+jcMtpn8CmBoT0H+skha0hiqINkjkRPiHvLHVGp+tHUEA/I6mN4aB/UExSTLs79NsLUfteqqxe9+tvdUaToyDPrhPFjONs+9NKCkzIC6vcv7J6AtuKG6nET+zB9yOWgtGYQifXqQA2y5dL81BB0q5uMaBLS2pq3aPPjzU2F3+EysjySWTnCkfk7C5SsCXRu8Q+U95tunpNfwf5olE6Was48NMM+PwV7iCNMPkNzllq6PCiM+P8DrMSczzUZZQUSv6dSwPCo+YSVimEM0Og3XJTiNhQ5ANlaIn66Kw5gfoBfuiXmyIKiSDyAiDYmFaf4395wWwLkTR+cw8WfjaHswKZTomn1MR3OJsY2UJ0eRBYM+YSsCAwEAAaNTMFEwHQYDVR0OBBYEFImp2CYCGfcb7w91H/cShTCkXwR/MB8GA1UdIwQYMBaAFImp2CYCGfcb7w91H/cShTCkXwR/MA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggGBAA+g/C7uL9ln+W+qBknLW81kojYflgPK1I1MHIwnMvl/ZTHX4dRXKDrk7KcUq1KjqajNV66f1cakp03IijBiO0Xi1gXUZYLoCiNGUyyp9XloiIy9Xw2PiWnrw0+yZyvVssbehXXYJl4RihBjBWul9R4wMYLOUSJDe2WxcUBhJnxyNRs+P0xLSQX6B2n6nxoDko4p07s8ZKXQkeiZ2iwFdTxzRkGjthMUv704nzsVGBT0DCPtfSaO5KJZW1rCs3yiMthnBxq4qEDOQJFIl+/LD71KbB9vZcW5JuavzBFmkKGNro/6G1I7el46IR4wijTyNFCYUuD9dtignNmpWtN8OW+ptiL/jtTySWukjys0s+vLn83CVvjB0dJtVAIYOgXFdIuii66gczwwM/LGiOExJn0dTNzsJ/IYhpxL4FBEuP0pskY0o0aUlJ2LS2j+wSQTRKsBgMjyrUrekle2ODStStn3eabjIx0/FHlpFr0jNIm/oMP7kwjtUX4zaNe47QI4Gg==</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xs="http://www.w3.org/2001/XMLSchema" ID="_6842df9c659f13fe5196cd9ef6c2f028364ae943b1" Version="2.0" IssueInstant="2019-11-17T17:53:39Z"><saml:Issuer>http://saml.local/saml2/idp/metadata.php</saml:Issuer><ds:Signature xmlns:ds="http://www.w3.org/2000/09/xmldsig#">
  <ds:SignedInfo><ds:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/>
    <ds:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
  <ds:Reference URI="#_6842df9c659f13fe5196cd9ef6c2f028364ae943b1"><ds:Transforms><ds:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><ds:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></ds:Transforms><ds:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><ds:DigestValue>krb5w6S8toXc/eSwZPUOBvQzn3os4JACuxxrJkxpgFw=</ds:DigestValue></ds:Reference></ds:SignedInfo><ds:SignatureValue>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</ds:SignatureValue>
<ds:KeyInfo><ds:X509Data><ds:X509Certificate>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</ds:X509Certificate></ds:X509Data></ds:KeyInfo></ds:Signature><saml:Subject><saml:NameID SPNameQualifier="http://bookstack.local/saml2/metadata" Format="urn:oasis:names:tc:SAML:2.0:nameid-format:transient">_2c7ab86eb8f1d1063443f219cc5868ff66708912e3</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData NotOnOrAfter="2019-11-17T17:58:39Z" Recipient="http://bookstack.local/saml2/acs" InResponseTo="ONELOGIN_6a0f4f3993040f1987fd37068b5296229ad5361c"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2019-11-17T17:53:09Z" NotOnOrAfter="2019-11-17T17:58:39Z"><saml:AudienceRestriction><saml:Audience>http://bookstack.local/saml2/metadata</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2019-11-17T17:53:39Z" SessionNotOnOrAfter="2019-11-18T01:53:39Z" SessionIndex="_4fe7c0d1572d64b27f930aa6f236a6f42e930901cc"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:Password</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute Name="uid" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">user</saml:AttributeValue></saml:Attribute><saml:Attribute Name="first_name" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">Barry</saml:AttributeValue></saml:Attribute><saml:Attribute Name="last_name" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">Scott</saml:AttributeValue></saml:Attribute><saml:Attribute Name="email" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">user@example.com</saml:AttributeValue></saml:Attribute><saml:Attribute Name="user_groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xsi:type="xs:string">member</saml:AttributeValue><saml:AttributeValue xsi:type="xs:string">admin</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>';
437
438     protected $sloResponseData = 'fZHRa8IwEMb/lZJ3bdJa04a2MOYYglOY4sNe5JKms9gmpZfC/vxF3ZjC8OXgLvl938ddjtC1vVjZTzu6d429NaiDr641KC5PBRkHIyxgg8JAp1E4JbZPbysRTanoB+ussi25QR4TgKgH11hDguWiIIeawTxOaK1iPYt5XcczHUlJeVRlMklBJjOuM1qDVCTY6wE9WRAv5HHEUS8NOjDOjyjLJoxNGN+xVESpSNgHCRYaXWPAXaijc70IQ2ntyUPqNG2tgjY8Z45CbNFLmt8V7GxBNuuX1eZ1uT7EcZJKAE4TJhXPaMxlVlFffPKKJnXE5ryusoiU+VlMXJIN5Y/feXRn1VR92GkHFTiY9sc+D2+p/HqRrQM34n33bCsd7KEd9eMd4+W32I5KaUQSlleHP9Hwv6uX3w==';
439
440     protected $testCert = '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';
441 }