diff options
author | Björn Mattsson <bjorn@sunet.se> | 2022-11-17 07:31:01 +0100 |
---|---|---|
committer | Björn Mattsson <bjorn@sunet.se> | 2022-11-17 07:31:01 +0100 |
commit | 57112e744b050ff8cfc80132f724eba89d675935 (patch) | |
tree | 1d91df596e28564a6f9753d3b1068de1f871883e | |
parent | e976aa04455e7f017b4c142bb1b1beca29bb4883 (diff) |
Cleaned out old tests
-rw-r--r-- | Makefile | 113 | ||||
-rw-r--r-- | swamid-interfederations-1.0/.xml | 44 | ||||
-rw-r--r-- | swamid-interfederations-1.0/metadata.lst | 2 |
3 files changed, 4 insertions, 155 deletions
@@ -3,7 +3,7 @@ KEY := /opt/swamid-credentials/swamid-signer.key CERT := /opt/swamid-credentials/swamid-signer.crt PASS := $(shell test -f /opt/swamid-credentials/swamid-signer-pass.txt && cat /opt/swamid-credentials/swamid-signer-pass.txt) DEST := /opt/published-metadata -SRCDIRS=swamid-2.0 +SRCDIRS=swamid-2.0 swamid-edugain swamid-testing DAYS:=15 DATE=$(shell perl scripts/expiration_date.pl $(DAYS)) @@ -42,25 +42,15 @@ sign: swamid upstream dependencies: swamid-interfederations-idp-2.0.xml swamid-interfederations-sp-2.0.xml -# kalmar obsolete -#upstream: edugain kalmar upstream: edugain -kalmar: - env SWAMID_MK_CONFIG=$(SWAMID_MK_CONFIG) $(MAKE) RPI=false CONTACTS=false swamid-kalmar-1.0.pub swamid-kalmar-testing-1.0.pub - edugain: env SWAMID_MK_CONFIG=$(SWAMID_MK_CONFIG) $(MAKE) RPI=true CONTACTS=true swamid-edugain-testing-1.0.pub swamid-edugain-1.0.pub aggregate: swamid-interfederations -# kalmar obsolete -#swamid-interfederations: swamid-interfederations1 swamid-interfederations2 swamid-interfederations: swamid-interfederations2 -swamid-interfederations1: - scripts/aggregate.sh swamid-interfederations-1.0 - swamid-interfederations2: scripts/aggregate.sh swamid-interfederations-2.0 @# Blocked by SWAMID-OPS 2021-04-21 @@ -97,7 +87,7 @@ swamid-interfederations-sp-2.0.xml: swamid-interfederations-2.0.mxml syntaxtest: clean dependencies schematest -pedantic: clean dependencies schematest testRefedsRnS testGeantCoCo testEduGAINchecks +pedantic: clean dependencies schematest testRefedsRnS testEduGAINchecks schematest: @fail=false ; for x in $(MXML); do test=`xmllint --xinclude --nowarning --noout --path schema --schema schema.xsd $$x 2>&1`; rc=$$?; echo $$test | sed 's/fails to validate/[1;31m&[0m/;s/validates/[1;32m&[0m/'; if [ $$rc -gt 0 ]; then fail=true ; fi; done ; if $$fail ; then exit 1 ; fi @@ -129,40 +119,6 @@ testRefedsRnS: fi ; \ done -testGeantCoCo: - @#echo "Checking for Geant CoCo compliance" - @#touch sp-with-coco-errors - @#for x in `cat swamid-edugain-sp-1.0.mxml swamid-edugain-testing-1.0.mxml swamid-sp-2.0.mxml swamid-testing-sp-1.0.mxml | grep -v "\.mxml$$" | grep "xi:include" | awk -F\" '{print $$2}' | xargs grep -l SPSSODescriptor | sort -u` ; do \ - #got_geant_CoCo=`cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath "/EntityDescriptor/Extensions/EntityAttributes/Attribute[@Name='http://macedir.org/entity-category']/AttributeValue" - 2>/dev/null | grep 'http://www.geant.net/uri/dataprotection-code-of-conduct/v1'` ; \ - #if [ -n "$$got_geant_CoCo" ] ; then \ - # ( \ - #mdui_check=`cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath "/EntityDescriptor/SPSSODescriptor/Extensions/UIInfo" - 2>/dev/null` ; \ - #if [ -z "$$mdui_check" ] ; then \ - # echo " Missing MDUI"'' ; \ - #else \ - # mdui_DisplayName=`cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath "/EntityDescriptor/SPSSODescriptor/Extensions/UIInfo/DisplayName" - 2>/dev/null | grep 'DisplayName'` ; \ - # if [ -z "$$mdui_DisplayName" ] ; then echo " Missing mdui:DisplayName"'' ; fi ; \ - # mdui_Descr=`cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath "/EntityDescriptor/SPSSODescriptor/Extensions/UIInfo/DisplayName" - 2>/dev/null | grep 'DisplayName'` ; \ - # if [ -z "$$mdui_Descr" ] ; then echo " Missing mdui:Description"'' ; fi ; \ - # for y in `cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath "/EntityDescriptor/SPSSODescriptor/Extensions/UIInfo" - | grep -v "UIInfo" | awk '{print $$1}' | grep "<" | cut -c2- | sort -u` ; do \ - # mdui_Test=`cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath "/EntityDescriptor/SPSSODescriptor/Extensions/UIInfo/$$y" - 2>/dev/null | grep $$y | grep 'xml:lang="en"'` ; \ - # if [ -z "$$mdui_Test" ] ; then echo " Missing xml:lang=\"en\" on mdui:$$y"'' ; fi ; \ - # done ; \ - # mdui_PrivacyStatementURL=`cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath "/EntityDescriptor/SPSSODescriptor/Extensions/UIInfo/PrivacyStatementURL" - 2>/dev/null | grep 'PrivacyStatementURL' | sed 's/&/\&/g'` ; \ - # if [ -z "$$mdui_PrivacyStatementURL" ] ; then \ - # echo " Missing PrivacyStatementURL"'' ; \ - # else \ - # if ! echo "$$mdui_PrivacyStatementURL" | grep -q 'xml:lang="en"' ; then \ - # echo " Missing PrivacyStatementURL in english"'' ; \ - # fi ; \ - # fi ; \ - #fi ; \ - #requestedAttribute=`cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath "/EntityDescriptor/SPSSODescriptor/AttributeConsumingService/RequestedAttribute" - 2>/dev/null | grep 'RequestedAttribute'` ; \ - #if [ -z "$$requestedAttribute" ] ; then echo " Missing RequestedAttribute"'' ; fi ; \ - # ) | sed "1s;..*; [1\;31m$$x[0m\n&;" | grep . && echo " " ; \ - #fi ; \ - #done | grep . && tty -s && exit 1 || exit 0 - testEduGAINchecks: @echo "Checking for attributes not allowed in entities exported to eduGAIN" @for x in `cat swamid-edugain-*.mxml | grep -v "\.mxml$$" | grep "xi:include" | awk -F\" '{print $$2}' | xargs grep -l SPSSODescriptor` ; do \ @@ -178,17 +134,8 @@ testEduGAINchecks: testMDUI: - @#echo "Checking for bad lang codes" - @## Lang = ISO_639-1 - @#for x in swamid-2.0/*.xml ; do bad_langs=`cat $$x | sed -n 's/.*xml:lang="\([^"]*\)".*/\1/p' | sort -u | grep -vxE 'cs|da|de|en|fi|fr|it|sv|no|nn|nb|is'` ; if [ -n "$$bad_langs" ] ; then echo " $$x: `echo $$bad_langs`" | sed 's/.*/[1;31m&[0m/' ; fi ; done | grep . && exit 1 || exit 0 @echo "Checking for uniq IdP MDUI DisplayName" @for lang in `cat swamid-2.0/*.xml | sed -n 's/.*xml:lang="\([^"]*\)".*/\1/p' | sort -u` ; do for x in `find $(SRCDIRS) -name \*.xml | xargs grep -l IDPSSODescriptor` ; do cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath "/EntityDescriptor/IDPSSODescriptor/Extensions/UIInfo/DisplayName[@xml:lang='$$lang']" - 2>/dev/null | sed 's/^[ ]*//;s/[ ]*$$//' | tr -d '\n' | sed 's;<[^>]*>\([^<]*\)</[^>]*>;\1\n;g' | sed "s;^; $$x $$lang ;" | sed 's/.*/[1;31m&[0m/' ; done | sort -k 3 | uniq -d -f 2 ; done | grep . && exit 1 || true - @#echo "Checking for invalid IPHint" - @#for x in `find $(SRCDIRS) -name \*.xml`; do if cat $$x | sed -n 's;.*<[a-z0-9:]*IPHint>\(.*\)</[a-z0-9:]*IPHint>;\1;p' | grep -q -vE '^$$|^[0-9./a-fA-F:]*$$' ; then echo " $$x" | sed 's/.*/[1;31m&[0m/' ; fi ; done - @#echo "Checking for invalid geodata (syntax is geo:xx.yy,zz.vv)" - @#for x in `find $(SRCDIRS) -name \*.xml`; do if cat $$x | sed -n 's;.*<[a-z0-9:]*GeolocationHint>\(.*\)</[a-z0-9:]*GeolocationHint>;\1;p' | grep -q -vE '^$$|^geo:[0-9][0-9][0-9.]*,[0-9][0-9][0-9.]*$$' ; then echo " $$x" | sed 's/.*/[1;31m&[0m/' ; fi ; done - @#echo "Check for IdP:s with Logos over http" - @#for x in `find $(SRCDIRS) -name \*.xml`; do if cat $$x | sed -n '/IDPSSODescriptor/,/\/IDPSSODescriptor/p' | grep -q 'Logo .*http://' ; then echo " $$x" | sed 's/.*/[1;31m&[0m/' ; fi ; done | grep . && exit 1 || exit 0 testIdPinSP: @echo "Check that SP:s does not define IDPSSODescriptor" @@ -199,43 +146,6 @@ testMDUIreach: @cat swamid-idp-2.0.mxml swamid-sp-2.0.mxml | grep -v "\.mxml$$" | grep "xi:include" | awk -F\" '{print $$2}' | \ xargs -n1 -P 10 scripts/verify-uiinfo-urls.sh -testOrgData: - @echo "Checking for uniq IdP OrganizationDisplayName" - @for lang in `cat swamid-2.0/*.xml | sed -n 's/.*xml:lang="\(..\)".*/\1/p' | sort -u` ; do for x in `find $(SRCDIRS) -name \*.xml | xargs grep -l IDPSSODescriptor` ; do cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath "/EntityDescriptor/Organization/OrganizationDisplayName[@xml:lang='$$lang']" - 2>/dev/null | sed 's/^[ ]*//;s/[ ]*$$//' | tr -d '\n' | sed 's;<[^>]*>\([^<]*\)</[^>]*>;\1\n;g' | sed "s;^;$$x $$lang ;" | sed 's/.*/\ \ [1;31m&[0m/' ; done | sort -k 3 | uniq -d -f 2 ; done | grep . && exit 1 || true - -testEntCat: - @#echo "Checking for multiple EntityAttributes in EntityDescriptor/Extensions" - @#for x in `find $(SRCDIRS) -name \*.xml | xargs grep -l EntityAttributes` ; do if [ `grep EntityAttributes $$x | wc -l ` -gt 2 ]; then echo "Multiple EntityAttributes in $$x" | sed 's/.*/[1;31m&[0m/'; fi ; done | grep . && exit 1 || true - @#echo "Checking for entity-categories in SPSSODescriptors that should be moved to EntityDescriptor/Extensions" - @#for x in `find $(SRCDIRS) -name \*.xml`; do if cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath /EntityDescriptor/SPSSODescriptor/Extensions/EntityAttributes - 2>/dev/null | grep -q entity-category ; then echo " $$x" | sed 's/.*/[1;31m&[0m/' ; fi ; done | grep . && exit 1 || true - @#echo "Checking for entity-categories in IDPSSODescriptor that should be moved to EntityDescriptor/Extensions" - @#for x in `find $(SRCDIRS) -name \*.xml`; do if cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath /EntityDescriptor/IDPSSODescriptor/Extensions/EntityAttributes - 2>/dev/null | grep -q entity-category ; then echo " $$x" | sed 's/.*/[1;31m&[0m/' ; fi ; done | grep . && exit 1 || true - @#echo "Checking for MDUI in EntityDescriptor/Extensions" - @#for x in `find $(SRCDIRS) -name \*.xml`; do if cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath /EntityDescriptor/Extensions/UIInfo - 2>/dev/null | grep -q . ; then echo " $$x" | sed 's/.*/[1;31m&[0m/' ; fi ; done | grep . && exit 1 || true - @#echo "Checking for entitycategories for IdPs that should be entity-category-support" - @#for x in `find $(SRCDIRS) -name \*.xml | xargs grep -l IDPSSODescriptor` ; do if cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath '/EntityDescriptor/Extensions/EntityAttributes/Attribute[attribute::Name="http://macedir.org/entity-category"]/AttributeValue/text()' - 2>/dev/null | grep -q http://refeds.org/category/research-and-scholarship ; then echo " $$x" | sed 's/.*/[1;31m&[0m/' ; fi ; done | grep . && exit 1 || true - @#echo "Checking for wrong Name in EntityAttributes/Attribute" - @#for x in `find $(SRCDIRS) -name \*.xml | xargs grep -l "Attribute "` ; do if cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath '/EntityDescriptor/Extensions/EntityAttributes/Attribute' - 2>/dev/null | grep "Attribute " | sed 's/.* Name="//' | sed -e 's/ NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"//' -e 's/">//' | egrep -v "http://macedir.org/entity-category|http://macedir.org/entity-category-support|urn:oasis:names:tc:SAML:attribute:assurance-certification|urn:oasis:names:tc:SAML:profiles:subject-id:req|http://www.swamid.se/assurance-requirement" ; then echo " $$x" | sed 's/.*/[1;31m&[0m/' ; fi ; done | grep . && exit 1 || true - @#echo "Checking for wrong AttributeValue in EntityAttributes/Attribute http://macedir.org/entity-category" - @#for x in `find $(SRCDIRS) -name \*.xml | xargs grep -l "http://macedir.org/entity-category"` ; do if cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath '/EntityDescriptor/Extensions/EntityAttributes/Attribute[attribute::Name="http://macedir.org/entity-category"]' - 2>/dev/null | grep "AttributeValue" | egrep -v ">http://refeds.org/category/research-and-scholarship<|>http://www.geant.net/uri/dataprotection-code-of-conduct/v1<|>http://www.swamid.se/category/research-and-education<|>http://www.swamid.se/category/hei-service<|>http://www.swamid.se/category/nren-service<|>http://www.swamid.se/category/sfs-1993-1153<|>http://www.swamid.se/category/eu-adequate-protection<|>http://refeds.org/category/hide-from-discovery<|>http://id.elegnamnden.se/st/1.0/sigservice<|>http://id.elegnamnden.se/ec/1.0/loa3-pnr<|>http://id.elegnamnden.se/ec/1.0/eidas-naturalperson<|>https://refeds.org/category/anonymous<|>https://myacademicid.org/entity-categories/esi<|>https://refeds.org/category/personalized<|>https://refeds.org/category/pseudonymous<" ; then echo " $$x" | sed 's/.*/[1;31m&[0m/' ; fi ; done | grep . && exit 1 || true - @#echo "Checking for wrong AttributeValue in EntityAttributes/Attribute http://macedir.org/entity-category-support" - @#for x in `find $(SRCDIRS) -name \*.xml | xargs grep -l "http://macedir.org/entity-category-support"` ; do if cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath '/EntityDescriptor/Extensions/EntityAttributes/Attribute[attribute::Name="http://macedir.org/entity-category-support"]' - 2>/dev/null | grep "AttributeValue" | egrep -v ">http://refeds.org/category/research-and-scholarship<|>http://www.geant.net/uri/dataprotection-code-of-conduct/v1<" ; then echo " $$x" | sed 's/.*/[1;31m&[0m/' ; fi ; done | grep . && exit 1 || true - @#echo "Checking for wrong AttributeValue in EntityAttributes/Attribute http://www.swamid.se/assurance-requirement" - @#for x in `find $(SRCDIRS) -name \*.xml | xargs grep -l "http://www.swamid.se/assurance-requirement"` ; do if cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath '/EntityDescriptor/Extensions/EntityAttributes/Attribute[attribute::Name="http://www.swamid.se/assurance-requirement"]' - 2>/dev/null | grep "AttributeValue" | egrep -v ">http://www.swamid.se/policy/assurance/al1<|>http://www.swamid.se/policy/assurance/al2<" ; then echo " $$x" | sed 's/.*/[1;31m&[0m/' ; fi ; done | grep . && exit 1 || true - @#echo "Checking for wrong AttributeValue in EntityAttributes/Attribute urn:oasis:names:tc:SAML:attribute:assurance-certification" - @#for x in `find $(SRCDIRS) -name \*.xml | xargs grep -l "urn:oasis:names:tc:SAML:attribute:assurance-certification"` ; do if cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath '/EntityDescriptor/Extensions/EntityAttributes/Attribute[attribute::Name="urn:oasis:names:tc:SAML:attribute:assurance-certification"]' - 2>/dev/null | grep "AttributeValue" | egrep -v ">https://refeds.org/sirtfi<|>http://www.swamid.se/policy/assurance/al1<|>http://www.swamid.se/policy/assurance/al2<|>http://www.swamid.se/policy/assurance/al3<|>http://www.swamid.se/policy/authentication/swamid-al2-mfa<|>http://www.swamid.se/policy/authentication/swamid-al2-mfa-hi<" ; then echo " $$x" | sed 's/.*/[1;31m&[0m/' ; fi ; done | grep . && exit 1 || true - -testValidContact: - @#echo "Checking for valid Contact Information" - @#for x in swamid-2.0/*.xml ; do if ( cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath "/EntityDescriptor/ContactPerson" - 2>/dev/null | grep 'EmailAddress' | grep -qv ">mailto:") ; then echo "[1;31m Missing mailto in ContactPerson in file $$x [0m" ; fi ; done | grep . && exit 1 || true - @#echo "Checking for empty ContactPerson tags" - @#if grep -H -E '<(Company|SurName|EmailAddress|TelephoneNumber)/>' swamid-2.0/*.xml | sed 's/^/ /' | grep . ; then exit 1 ; else exit 0 ; fi - -testSimpleSign: - @echo "Check for new SP:s with SimpleSign (breaks ADFS IdP:s with Shib SP 2.5+)" - @for x in `grep -v "#" sp-with-simplesign`; do if [ ! -r swamid-2.0/$$x ] ; then echo $$x saknas; fi ; done | grep . && exit 1 || exit 0 - @for x in `find $(SRCDIRS) -name \*.xml`; do if ! grep -qx `basename $$x` sp-with-simplesign && grep -q HTTP-POST-SimpleSign $$x ; then echo " $$x" | sed 's/.*/[1;31m&[0m/' ; fi ; done | grep . && exit 1 || exit 0 - testALlevel: @echo Fixa så att vi kollar!!!!! @echo "Check for IdP:s with AL3 without AL2" @@ -248,19 +158,6 @@ testBadStrings: @for x in `find $(SRCDIRS) -name \*.xml`; do grep -E 'ServiceName xml:lang="[^"]*"/>' $$x | sed 's/^/ /' ; done | grep . && exit 1 || exit 0 testRoleDescriptor: - @#echo "Check for RoleDescriptor that should be removed" - @#for x in `find $(SRCDIRS) -name \*.xml`; do \ - #grep -EH 'RoleDescriptor.*xsi:type="fed:(ApplicationServiceType|SecurityTokenServiceType)"' $$x | \ - #sed -e 's/^/ /' -e 's/xmlns.*xsi:type="fed:/xsi:type="fed:/' -e 's/ protocol.*>/>/' -e 's/.*/[1;31m&[0m/' ; \ - #done | grep . && exit 1 || exit 0 - -testAttributeInIdP: - @#echo "Check for Attribute inside IDPSSODescriptor" - @#for x in `find $(SRCDIRS) -name \*.xml`; do \ - #if cat $$x | sed 's;\(</*\)[a-z0-9]*:;\1;g' | sed 's/xmlns="[^"]*"//' | xmllint --xpath "/EntityDescriptor/IDPSSODescriptor" - 2>/dev/null | grep -q " <Attribute Name" ; then \ - #echo " $$x" | sed 's/.*/[1;31m&[0m/' ;\ - #fi;\ - #done | grep . && exit 1 || exit 0 testRegistrationAuthority: @echo "Check for registrationAuthority="http://www.swamid.se/" in EntityDescriptor/Extensions" @@ -278,11 +175,9 @@ checkInvalidChars: fi;\ done | grep . && exit 1 || exit 0 -#test: syntaxtest testMDUI testOrgData testEntCat testSimpleSign testALlevel testEduGAINchecks testRefedsRnS testGeantCoCo testMetadataUsage testBadStrings testIdPinSP testRoleDescriptor testAttributeInIdP testValidContact testRegistrationAuthority -test: syntaxtest testMDUI testEntCat testALlevel testEduGAINchecks testRefedsRnS testGeantCoCo testMetadataUsage testBadStrings testIdPinSP testRoleDescriptor testAttributeInIdP testValidContact testRegistrationAuthority checkInvalidChars +test: syntaxtest testMDUI testALlevel testEduGAINchecks testRefedsRnS testMetadataUsage testBadStrings testIdPinSP testRegistrationAuthority checkInvalidChars -test2: $(SWAMIDXML) schematest testEntCat testALlevel testEduGAINchecks testRefedsRnS testGeantCoCo testMetadataUsage testBadStrings testIdPinSP testRoleDescriptor testAttributeInIdP testValidContact testRegistrationAuthority checkInvalidChars -#test2: $(SWAMIDXML) +test2: $(SWAMIDXML) schematest testALlevel testEduGAINchecks testRefedsRnS testMetadataUsage testBadStrings testIdPinSP testRegistrationAuthority checkInvalidChars .time/%.time: swamid-2.0/%.xml @# make schematest diff --git a/swamid-interfederations-1.0/.xml b/swamid-interfederations-1.0/.xml deleted file mode 100644 index 01371f28..00000000 --- a/swamid-interfederations-1.0/.xml +++ /dev/null @@ -1,44 +0,0 @@ -<?xml version="1.0"?> -<md:EntityDescriptor xmlns:md="urn:oasis:names:tc:SAML:2.0:metadata" xmlns:mdrpi="urn:oasis:names:tc:SAML:metadata:rpi" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:mdui="urn:oasis:names:tc:SAML:metadata:ui" xmlns:ds="http://www.w3.org/2000/09/xmldsig#" entityID="urn:ibistic:prod:services.ibistic.net" validUntil="2015-06-23T02:17:03Z"> - <md:Extensions> - <mdrpi:RegistrationInfo xmlns:wayf="http://wayf.dk/2014/08/wayf" registrationInstant="2011-09-21T15:08:32Z" registrationAuthority="https://www.wayf.dk"> - <mdrpi:RegistrationPolicy xml:lang="en">http://wayf.dk/images/stories/WAYF-filer/metadataregistrationpracticestatementwayf.pdf</mdrpi:RegistrationPolicy> - </mdrpi:RegistrationInfo> - <saml:Attribute Name="tags"> - <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xsi:type="xs:string">kalmar</saml:AttributeValue> - <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xsi:type="xs:string">denmark</saml:AttributeValue> - <saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xsi:type="xs:string">iceland</saml:AttributeValue> - </saml:Attribute> - </md:Extensions> - <md:SPSSODescriptor protocolSupportEnumeration="urn:oasis:names:tc:SAML:2.0:protocol" AuthnRequestsSigned="true"> - <md:Extensions> - <mdui:UIInfo xmlns:wayf="http://wayf.dk/2014/08/wayf"> - <mdui:Description xml:lang="da">Formålet er at håndtere og godkende leverandørfakturarer i en webbaseret løsning.</mdui:Description> - <mdui:Description xml:lang="en">The purpose is to handle and approve supplier invoices in a web-based solution.</mdui:Description> - <mdui:DisplayName xml:lang="da">Ibistic Services</mdui:DisplayName> - <mdui:DisplayName xml:lang="en">Ibistic Services</mdui:DisplayName> - </mdui:UIInfo> - </md:Extensions> - <md:KeyDescriptor> - <ds:KeyInfo> - <ds:X509Data> - <ds:X509Certificate>MIIHXzCCBkegAwIBAgIQDMeEM2c3CblrZFIKO0GQjzANBgkqhkiG9w0BAQsFADB1 MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMTQwMgYDVQQDEytEaWdpQ2VydCBTSEEyIEV4dGVuZGVk IFZhbGlkYXRpb24gU2VydmVyIENBMB4XDTE1MDUwODAwMDAwMFoXDTE3MDUyNjEy MDAwMFowgfMxHTAbBgNVBA8MFFByaXZhdGUgT3JnYW5pemF0aW9uMRMwEQYLKwYB BAGCNzwCAQMTAkRLMREwDwYDVQQFEwgyNzc2ODM5MzEcMBoGA1UECQwTw4VyaHVz Z2FkZSA4OCBTYWwgMTENMAsGA1UEERMEMjE1MDELMAkGA1UEBhMCREsxEzARBgNV BAgMCkvDuGJlbmhhdm4xETAPBgNVBAcTCE5vcmRoYXZuMSkwJwYDVQQKEyBJYmlz dGljIFRlY2hub2xvZ2llcyBEZW5tYXJrIEEvUzEdMBsGA1UEAxMUc2VydmljZXMu aWJpc3RpYy5uZXQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDeu9hD FugX9bZh30fItW4XhUbcbWnPke78qYgoTI9xXEHYlgllWMta5/ETFcx1By9KQqlf uCj9gEJKZUrY7HkpUHcnBh9uy5AHKgr25nDQDexo4KEI6A7iFhhtm9XqeBTwbWDv 3hO797o5axvSVYihHgyP6XHU3J/NZWSVXj8hGpPNjFDl0Y55j35zVEKRIRlUgNQw idRtYlAUZ4psja65xxS3NVip92aQJbsUws2P4slMl/TOlRdUXFtuXjehR/0/DWr2 7RgTb/UveHVFwd49D7iHZASkupNoTkEXmABil2C3+x/aFrc+wL0zcuPLOa/omUmr wHjtUHz6a2ACn6sNAgMBAAGjggNqMIIDZjAfBgNVHSMEGDAWgBQ901Cl1qCt7vNK YApl0yHU+PjWDzAdBgNVHQ4EFgQUgqS5gDRU87YDX5zvYnkzGlGcF+YwHwYDVR0R BBgwFoIUc2VydmljZXMuaWJpc3RpYy5uZXQwDgYDVR0PAQH/BAQDAgWgMB0GA1Ud JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjB1BgNVHR8EbjBsMDSgMqAwhi5odHRw Oi8vY3JsMy5kaWdpY2VydC5jb20vc2hhMi1ldi1zZXJ2ZXItZzEuY3JsMDSgMqAw hi5odHRwOi8vY3JsNC5kaWdpY2VydC5jb20vc2hhMi1ldi1zZXJ2ZXItZzEuY3Js MEIGA1UdIAQ7MDkwNwYJYIZIAYb9bAIBMCowKAYIKwYBBQUHAgEWHGh0dHBzOi8v d3d3LmRpZ2ljZXJ0LmNvbS9DUFMwgYgGCCsGAQUFBwEBBHwwejAkBggrBgEFBQcw AYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMFIGCCsGAQUFBzAChkZodHRwOi8v Y2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRTSEEyRXh0ZW5kZWRWYWxpZGF0 aW9uU2VydmVyQ0EuY3J0MAwGA1UdEwEB/wQCMAAwggF+BgorBgEEAdZ5AgQCBIIB bgSCAWoBaAB1AKS5CZC0GFgUh7sTosxncAo8NZgE+RvfuON3zQ7IDdwQAAABTTJ8 GxYAAAQDAEYwRAIgBBRuMiDiJZa5zANatXS03c2D7qhpYfloN5oaK/T+OB0CIG/X gIau1AT8F/M5t0c6VCFTkQNhuAwE1Zqg6wETHKxbAHcAaPaY+B9kgr46jO65KB1M /HFRXWeT1ETRCmesu09P+8QAAAFNMnwa4wAABAMASDBGAiEA7Xw5JKAslun8W4fE pa/U8aOIU29tHxIb6/8wcAdsPDoCIQD74Zr3vEV9BnpvH0D2dEDvD4lPKgNJbbyD 3YXWfEPRLgB2AFYUBpov18Ls0/XhvUSyPsdGdrm8mRFcwO+UmFXWidDdAAABTTJ8 HCEAAAQDAEcwRQIhAJQDPNlM/gc6dKnTZFtU2rB7f7btnNPF05x8C57I/rf8AiBY jeGTJ/QsymHdFFT124Qfbi10OMYBVLcWByRJpO3FeTANBgkqhkiG9w0BAQsFAAOC AQEAoshqkbqYBa5eoDKbF6JYoH7uLf4v82aVUi0zR1UDjF9gWYD8JKrlBbNQHtFu GoTsLcK2662DSXMpXPLtxKSnhIqfh2CrROCCrd4FX0gF8pCRrvkH4eW3fkEdoi/W ouuSogo4ESGhHPa/2MNtruvBbYW9bgdoRYZusjcRC619b/hf9cnEElqxh6QsOkXl LqJGnEPb6LeYVsyNxrlXQCZSre4npf/mLSnZG71+QxXjyphYRiGG0XsXYFHt/YGs PHusR4lxKGn03xb831m7G36mremKV6ma9dqgnSEQfsQn68UDhWJQNU9G3pD7cNWl mKpVPzsaEHAm1FpiDI50bKTFhw==</ds:X509Certificate> - </ds:X509Data> - </ds:KeyInfo> - </md:KeyDescriptor> - <md:NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</md:NameIDFormat> - <md:AssertionConsumerService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://services.ibistic.net/sso/wayf/saml/post/ac" index="1"/> - <md:AttributeConsumingService index="1" isDefault="true"> - <md:ServiceName xml:lang="da">Ibistic Services</md:ServiceName> - <md:ServiceName xml:lang="en">Ibistic Services</md:ServiceName> - <md:ServiceDescription xml:lang="da">Formålet er at håndtere og godkende leverandørfakturarer i en webbaseret løsning.</md:ServiceDescription> - <md:ServiceDescription xml:lang="en">The purpose is to handle and approve supplier invoices in a web-based solution.</md:ServiceDescription> - <md:RequestedAttribute Name="urn:oid:1.3.6.1.4.1.5923.1.1.1.6" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri" FriendlyName="eduPersonPrincipalName" isRequired="true"/> - <md:RequestedAttribute Name="urn:oid:2.5.4.42" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri" FriendlyName="gn" isRequired="true"/> - <md:RequestedAttribute Name="urn:oid:2.5.4.4" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri" FriendlyName="sn" isRequired="true"/> - <md:RequestedAttribute Name="urn:oid:0.9.2342.19200300.100.1.3" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri" FriendlyName="mail" isRequired="true"/> - <md:RequestedAttribute Name="urn:oid:1.3.6.1.4.1.25178.1.2.9" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri" FriendlyName="schacHomeOrganization" isRequired="true"/> - <md:RequestedAttribute Name="urn:oid:1.3.6.1.4.1.5923.1.1.1.10" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri" FriendlyName="eduPersonTargetedID" isRequired="true"/> - </md:AttributeConsumingService> - </md:SPSSODescriptor> -</md:EntityDescriptor> diff --git a/swamid-interfederations-1.0/metadata.lst b/swamid-interfederations-1.0/metadata.lst deleted file mode 100644 index 83d1db8b..00000000 --- a/swamid-interfederations-1.0/metadata.lst +++ /dev/null @@ -1,2 +0,0 @@ -#https://kalmar2.org/simplesaml/module.php/aggregator/?id=kalmarcentral2&set=saml2&exclude=sweden&mimetype=application/xml kalmar-signer.crt -#https://callback-prod.inloggning.se/authify/metadata/?fed_name=swamidfederation |