| /* |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, |
| * software distributed under the License is distributed on an |
| * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| * KIND, either express or implied. See the License for the |
| * specific language governing permissions and limitations |
| * under the License. |
| */ |
| |
| package org.apache.sling.auth.saml2; |
| |
| import org.apache.commons.lang3.StringUtils; |
| import org.apache.jackrabbit.api.JackrabbitSession; |
| import org.apache.jackrabbit.api.security.user.Authorizable; |
| import org.apache.jackrabbit.api.security.user.Group; |
| import org.apache.jackrabbit.api.security.user.User; |
| import org.apache.jackrabbit.api.security.user.UserManager; |
| import org.apache.sling.api.resource.LoginException; |
| import org.apache.sling.api.resource.ResourceResolver; |
| import org.apache.sling.api.resource.ResourceResolverFactory; |
| import org.apache.sling.auth.core.AuthenticationSupport; |
| import org.apache.sling.auth.core.spi.AuthenticationFeedbackHandler; |
| import org.apache.sling.auth.core.spi.AuthenticationHandler; |
| import org.apache.sling.auth.core.spi.AuthenticationInfo; |
| import org.apache.sling.testing.paxexam.SlingOptions; |
| import org.apache.sling.testing.paxexam.TestSupport; |
| import org.junit.After; |
| import org.junit.Before; |
| import org.junit.Test; |
| import org.junit.runner.RunWith; |
| import org.mockito.Mockito; |
| import org.ops4j.pax.exam.Configuration; |
| import org.ops4j.pax.exam.Option; |
| import org.ops4j.pax.exam.junit.PaxExam; |
| import org.ops4j.pax.exam.options.ModifiableCompositeOption; |
| import org.ops4j.pax.exam.options.extra.VMOption; |
| import org.ops4j.pax.exam.spi.reactors.ExamReactorStrategy; |
| import org.ops4j.pax.exam.spi.reactors.PerClass; |
| import org.ops4j.pax.exam.util.Filter; |
| import org.osgi.framework.Bundle; |
| import org.osgi.framework.BundleContext; |
| import org.osgi.service.cm.ConfigurationAdmin; |
| import org.osgi.service.http.HttpService; |
| import org.slf4j.Logger; |
| import org.slf4j.LoggerFactory; |
| import javax.inject.Inject; |
| import javax.jcr.RepositoryException; |
| import javax.jcr.Session; |
| import javax.servlet.http.HttpServletRequest; |
| import javax.servlet.http.HttpServletResponse; |
| import javax.servlet.http.HttpSession; |
| import java.io.IOException; |
| import java.time.LocalDateTime; |
| import java.time.format.DateTimeFormatter; |
| import java.util.ArrayList; |
| import java.util.Arrays; |
| import java.util.Base64; |
| import java.util.Iterator; |
| import java.util.List; |
| import static org.apache.sling.auth.core.spi.AuthenticationHandler.REQUEST_LOGIN_PARAMETER; |
| import static org.apache.sling.auth.saml2.impl.JKSHelper.IDP_ALIAS; |
| import static org.apache.sling.auth.saml2.impl.JKSHelper.SP_ALIAS; |
| import static org.apache.sling.testing.paxexam.SlingOptions.logback; |
| import static org.apache.sling.testing.paxexam.SlingOptions.slingAuthForm; |
| import static org.apache.sling.testing.paxexam.SlingOptions.slingQuickstartOakTar; |
| import static org.apache.sling.testing.paxexam.SlingOptions.versionResolver; |
| import static org.junit.Assert.assertEquals; |
| import static org.junit.Assert.assertFalse; |
| import static org.junit.Assert.assertNotNull; |
| import static org.junit.Assert.assertNull; |
| import static org.junit.Assert.assertTrue; |
| import static org.junit.Assert.fail; |
| import static org.mockito.Mockito.when; |
| import static org.ops4j.pax.exam.CoreOptions.composite; |
| import static org.ops4j.pax.exam.CoreOptions.junitBundles; |
| import static org.ops4j.pax.exam.CoreOptions.mavenBundle; |
| import static org.ops4j.pax.exam.CoreOptions.systemProperty; |
| import static org.ops4j.pax.exam.CoreOptions.vmOption; |
| import static org.ops4j.pax.exam.cm.ConfigurationAdminOptions.factoryConfiguration; |
| import static org.ops4j.pax.exam.cm.ConfigurationAdminOptions.newConfiguration; |
| |
| /** |
| * PAX Exam Integration Tests for AuthenticationHandlerSaml2 and Saml2UserMgtService |
| */ |
| @RunWith(PaxExam.class) |
| @ExamReactorStrategy(PerClass.class) |
| public class SamlHandlerIT extends TestSupport { |
| |
| static int HTTP_PORT = 8080; |
| static int DEST_HTTP_PORT = 8484; |
| private static Logger logger = LoggerFactory.getLogger(SamlHandlerIT.class); |
| ResourceResolver resourceResolver = null; |
| Session session; |
| JackrabbitSession jrSession; |
| UserManager userManager; |
| |
| @Inject |
| protected BundleContext bundleContext; |
| |
| @Inject |
| protected ConfigurationAdmin configurationAdmin; |
| |
| @Inject |
| AuthenticationSupport authenticationSupport; |
| |
| @Inject |
| HttpService httpService; |
| |
| @Inject |
| ResourceResolverFactory resolverFactory; |
| |
| @Inject |
| @Filter(value = "(saml2SPEncryptAndSign=false)") |
| AuthenticationHandler authHandler; |
| |
| @Inject |
| @Filter(value = "(saml2SPEncryptAndSign=true)") |
| AuthenticationHandler authHandlerEnc; |
| |
| @Inject |
| Saml2UserMgtService saml2UserMgtService; |
| |
| @Configuration |
| public Option[] configuration() { |
| // Patch versions of features provided by SlingOptions |
| HTTP_PORT = findFreePort(); |
| DEST_HTTP_PORT = findFreePort(); |
| // String OAK_VERSION = "1.32.0"; |
| String OAK_VERSION = "1.38.0"; |
| versionResolver.setVersion("commons-codec", "commons-codec", "1.14"); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "oak-jackrabbit-api", OAK_VERSION); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "oak-auth-external", OAK_VERSION); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "oak-api", OAK_VERSION); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "oak-core-spi", OAK_VERSION); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "oak-commons", OAK_VERSION); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "jackrabbit-jcr-commons", "2.20.0"); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "oak-blob-plugins", OAK_VERSION); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "oak-store-spi", OAK_VERSION); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "oak-core", OAK_VERSION); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "oak-blob", OAK_VERSION); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "oak-store-composite", OAK_VERSION); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "oak-store-document", OAK_VERSION); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "oak-jcr", OAK_VERSION); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "oak-lucene", OAK_VERSION); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "oak-authorization-principalbased", OAK_VERSION); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "oak-query-spi", OAK_VERSION); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "oak-security-spi", OAK_VERSION); |
| SlingOptions.versionResolver.setVersion("org.apache.jackrabbit", "oak-segment-tar", OAK_VERSION); |
| SlingOptions.versionResolver.setVersion("org.apache.tika", "tika-core", "1.24"); |
| SlingOptions.versionResolver.setVersion("org.apache.sling", "org.apache.sling.jcr.oak.server", "1.2.10"); |
| SlingOptions.versionResolver.setVersion("org.apache.sling", "org.apache.sling.api", "2.23.0"); |
| SlingOptions.versionResolver.setVersion("org.apache.sling", "org.apache.sling.resourceresolver", "1.7.2"); |
| SlingOptions.versionResolver.setVersion("org.apache.sling", "org.apache.sling.scripting.core", "2.3.4"); |
| SlingOptions.versionResolver.setVersion("org.apache.sling", "org.apache.sling.commons.compiler", "2.4.0"); |
| SlingOptions.versionResolver.setVersion("org.apache.sling", "org.apache.sling.servlets.resolver", "2.7.12"); |
| Option[] options = new Option[]{ |
| systemProperty("org.osgi.service.http.port").value(String.valueOf(HTTP_PORT)), |
| systemProperty("sling.home").value("./sling"), |
| baseConfiguration(), |
| slingQuickstart(), |
| slingAuthForm(), |
| failOnUnresolvedBundles(), |
| mavenBundle().groupId("org.apache.jackrabbit").artifactId("oak-jackrabbit-api").version(versionResolver), |
| mavenBundle().groupId("org.apache.jackrabbit").artifactId("oak-auth-external").version(versionResolver), |
| mavenBundle().groupId("org.apache.felix").artifactId("org.apache.felix.converter").version("1.0.14"), |
| mavenBundle().groupId("org.mockito").artifactId("mockito-core").version("3.3.3"), |
| mavenBundle().groupId("net.bytebuddy").artifactId("byte-buddy").version("1.10.5"), |
| mavenBundle().groupId("net.bytebuddy").artifactId("byte-buddy-agent").version("1.10.5"), |
| mavenBundle().groupId("org.objenesis").artifactId("objenesis").version("2.6"), |
| mavenBundle().groupId("org.bouncycastle").artifactId("bcprov-jdk15on").version("1.64"), |
| mavenBundle().groupId("org.bouncycastle").artifactId("bcpkix-jdk15on").version("1.64"), |
| mavenBundle().groupId("org.apache.sling").artifactId("org.apache.sling.commons.compiler").version(versionResolver), |
| factoryConfiguration("org.apache.sling.jcr.repoinit.RepositoryInitializer") |
| .put("scripts", new String[]{"create service user saml2-user-mgt\n\n set ACL for saml2-user-mgt\n\n allow jcr:all on /home\n\n end\n\n create group sling-authors with path /home/groups/sling-authors"}) |
| .asOption(), |
| newConfiguration("org.apache.sling.jcr.base.internal.LoginAdminWhitelist") |
| .put("whitelist.bypass", "true").asOption(), |
| // build artifact |
| junitBundles(), |
| logback(), |
| optionalRemoteDebug(), |
| optionalJacoco(), |
| factoryConfiguration("org.apache.sling.serviceusermapping.impl.ServiceUserMapperImpl.amended") |
| .put("user.mapping", new String[]{"org.apache.sling.auth.saml2:Saml2UserMgtService=saml2-user-mgt"}) |
| .asOption(), |
| newConfiguration("org.apache.sling.engine.impl.auth.SlingAuthenticator") |
| .put("auth.annonymous", false) |
| .asOption(), |
| // supply the required configuration so the auth handler service will activate |
| testBundle("bundle.filename"), // from TestSupport |
| // urn:oid:1.2.840.113549.1.9.1=profile/email |
| // urn:oid:2.5.4.4=profile/surname |
| // urn:oid:2.5.4.42=profile/givenName |
| // phone=profile/phone is configured but not included in assertion |
| factoryConfiguration("org.apache.sling.auth.saml2.AuthenticationHandlerSAML2") |
| .put("path", "/") |
| .put("entityID", "http://localhost:8080/") |
| .put("acsPath", "/sp/consumer") |
| .put("saml2userIDAttr", "urn:oid:0.9.2342.19200300.100.1.1") |
| .put("saml2userHome", "/home/users/saml") |
| .put("saml2groupMembershipAttr", "urn:oid:2.16.840.1.113719.1.1.4.1.25") |
| .put("syncAttrs", new String[]{"urn:oid:2.5.4.4=./profile/surname","urn:oid:2.5.4.42=./profile/givenName","phone=./profile/phone","urn:oid:1.2.840.113549.1.9.1=./profile/email"}) |
| .put("saml2SPEnabled", true) |
| .put("saml2SPEncryptAndSign", false) |
| .put("jksFileLocation", "") |
| .put("jksStorePassword", "") |
| .put("idpCertAlias","") |
| .put("spKeysAlias","") |
| .put("spKeysPassword","") |
| .asOption(), |
| factoryConfiguration("org.apache.sling.auth.saml2.AuthenticationHandlerSAML2") |
| .put("path", "/") |
| .put("entityID", "http://localhost:8080/") |
| .put("acsPath", "/sp/consumer") |
| .put("saml2userIDAttr", "username") |
| .put("saml2userHome", "/home/users/saml") |
| .put("saml2groupMembershipAttr", "groupMembership") |
| .put("syncAttrs", new String[]{"urn:oid:2.5.4.4","urn:oid:2.5.4.42","phone","urn:oid:1.2.840.113549.1.9.1"}) |
| .put("saml2SPEnabled", true) |
| .put("saml2SPEncryptAndSign", true) |
| .put("jksFileLocation", "./src/test/resources/exampleSaml2.jks") |
| .put("jksStorePassword", "password") |
| .put("idpCertAlias",IDP_ALIAS) |
| .put("spKeysAlias",SP_ALIAS) |
| .put("spKeysPassword","sppassword") |
| .asOption(), |
| }; |
| return options; |
| } |
| |
| /** |
| * Optionally configure remote debugging on the port supplied by the "debugPort" |
| * system property. |
| */ |
| protected ModifiableCompositeOption optionalRemoteDebug() { |
| VMOption option = null; |
| String property = System.getProperty("debugPort"); |
| if (property != null) { |
| option = vmOption(String.format("-Xrunjdwp:transport=dt_socket,server=y,suspend=y,address=%s", property)); |
| } |
| return composite(option); |
| } |
| |
| protected ModifiableCompositeOption optionalJacoco(){ |
| VMOption jacocoCommand = null; |
| final String jacocoOpt = System.getProperty("jacoco.command"); |
| if (StringUtils.isNotEmpty(jacocoOpt)) { |
| jacocoCommand = new VMOption(jacocoOpt); |
| } |
| return composite(jacocoCommand); |
| } |
| |
| protected Option slingQuickstart() { |
| final String workingDirectory = workingDirectory(); // from TestSupport |
| return composite( |
| slingQuickstartOakTar(workingDirectory, HTTP_PORT) // from SlingOptions |
| ); |
| } |
| |
| protected Bundle findBundle(final String symbolicName) { |
| for (final Bundle bundle : bundleContext.getBundles()) { |
| if (symbolicName.equals(bundle.getSymbolicName())) { |
| return bundle; |
| } |
| } |
| return null; |
| } |
| |
| void logBundles() { |
| for (final Bundle bundle : bundleContext.getBundles()) { |
| // logs to target/test.log |
| String active = bundle.getState() == Bundle.ACTIVE ? "active" : ""+bundle.getState(); |
| logger.info(bundle.getSymbolicName()+":"+bundle.getVersion().toString()+ "state:"+active); |
| } |
| } |
| |
| @Before |
| public void before(){ |
| try { |
| resourceResolver = resolverFactory.getAdministrativeResourceResolver(null); |
| session = resourceResolver.adaptTo(Session.class); |
| jrSession = (JackrabbitSession) session; |
| userManager = jrSession.getUserManager(); |
| } catch (RepositoryException | LoginException e) { |
| fail(e.getMessage()); |
| } |
| saml2UserMgtService.setUp(); |
| } |
| |
| @After |
| public void after(){ |
| resourceResolver.close(); |
| saml2UserMgtService.cleanUp(); |
| session = null; |
| jrSession = null; |
| userManager = null; |
| } |
| |
| @Test |
| public void test_setup(){ |
| assertNotNull(bundleContext); |
| assertNotNull(configurationAdmin); |
| assertNotNull(authenticationSupport); |
| assertNotNull(httpService); |
| assertNotNull(resolverFactory); |
| assertNotNull(saml2UserMgtService); |
| assertNotNull(authHandler); |
| assertNotNull(authHandlerEnc); |
| logBundles(); |
| } |
| |
| @Test |
| public void test_samlBundleActive(){ |
| Bundle samlBundle = findBundle("org.apache.sling.auth.saml2"); |
| assertTrue(samlBundle.getState() == Bundle.ACTIVE); |
| } |
| |
| @Test |
| public void test_userServiceSetup(){ |
| assertTrue(saml2UserMgtService.setUp()); |
| } |
| |
| @Test |
| public void test_getOrCreateSamlUser(){ |
| saml2UserMgtService.setUp(); |
| Saml2User saml2User = new Saml2User(); |
| saml2User.setId("example-saml"); |
| User user = saml2UserMgtService.getOrCreateSamlUser(saml2User); |
| assertNotNull(user); |
| assertTrue(saml2UserMgtService.updateUserProperties(saml2User)); |
| try { |
| user.getPath().startsWith("/home/users/saml"); |
| } catch (RepositoryException e) { |
| fail(e.getMessage()); |
| } |
| saml2UserMgtService.cleanUp(); |
| } |
| |
| @Test |
| public void test_createSamlUserWithHomePath(){ |
| saml2UserMgtService.setUp(); |
| Saml2User saml2User = new Saml2User(); |
| saml2User.setId("example-saml"); |
| User user = saml2UserMgtService.getOrCreateSamlUser(saml2User,"/home/users/mypath"); |
| assertNotNull(user); |
| try { |
| user.getPath().startsWith("/home/users/mypath"); |
| } catch (RepositoryException e) { |
| fail(e.getMessage()); |
| } |
| saml2UserMgtService.cleanUp(); |
| } |
| |
| @Test |
| public void test_groupMembership(){ |
| saml2UserMgtService.setUp(); |
| Saml2User saml2User = new Saml2User(); |
| saml2User.setId("example-saml"); |
| saml2User.addGroupMembership("sling-authors"); |
| assertTrue(saml2UserMgtService.updateGroupMembership(saml2User)); |
| try { |
| Authorizable user = userManager.getAuthorizable("example-saml"); |
| Group group = (Group) userManager.getAuthorizable("sling-authors"); |
| // confirm that group sling-authors now has a property called managedGroup set to true |
| assertTrue(group.isMember(user)); |
| // confirm that group sling-authors now has a member example-saml |
| assertTrue(group.hasProperty("managedGroup")); |
| // and is a managed group |
| assertTrue(Arrays.stream(group.getProperty("managedGroup")).anyMatch(value -> true)); |
| } catch (RepositoryException e) { |
| fail(e.getMessage()); |
| } |
| saml2UserMgtService.cleanUp(); |
| } |
| |
| @Test |
| public void test_request_credentials() throws IOException { |
| HttpServletRequest requestIgnore = Mockito.mock(HttpServletRequest.class); |
| HttpServletResponse response = Mockito.mock(HttpServletResponse.class); |
| when(requestIgnore.getParameter(REQUEST_LOGIN_PARAMETER)).thenReturn("FORM"); |
| // request credentials returns false when param ?sling:authRequestLogin=<something other than SAML2> |
| assertFalse(authHandler.requestCredentials(requestIgnore,response)); |
| HttpServletRequest request = Mockito.mock(HttpServletRequest.class); |
| HttpSession httpSession = Mockito.mock(HttpSession.class); |
| when(request.getRequestURL()).thenReturn(new StringBuffer("/")); |
| when(request.getContextPath()).thenReturn("/"); |
| when(request.getMethod()).thenReturn("POST"); |
| when(request.getHeader("Referer")).thenReturn("/not/my/sp/consumer"); |
| when(request.getSession()).thenReturn(httpSession); |
| // requestCredentials returns true when SAML is enabled and request is not specifying another auth handler |
| assertTrue(authHandler.requestCredentials(request,response)); |
| } |
| |
| @Test |
| public void test_encACSPath(){ |
| String base64EndSamlResp = "<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" Destination="http://localhost:8080/sp/consumer" ID="ID_b8fab508-d9c7-43ba-8c83-4cb53f7f9ffa" InResponseTo="_4e68b1b1596d142f0e2aac3624c41d1b" IssueInstant="2021-04-05T18:21:16.321Z" Version="2.0"><saml:Issuer>http://localhost:8484/auth/realms/sling</saml:Issuer><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:EncryptedAssertion><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#" Type="http://www.w3.org/2001/04/xmlenc#Element"><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#aes128-cbc"/><ds:KeyInfo xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><xenc:EncryptedKey><xenc:EncryptionMethod Algorithm="http://www.w3.org/2001/04/xmlenc#rsa-oaep-mgf1p"/><xenc:CipherData><xenc:CipherValue>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</xenc:CipherValue></xenc:CipherData></xenc:EncryptedKey></ds:KeyInfo><xenc:CipherData><xenc:CipherValue>k3SJXT1WOyJTXW8K291Ien2H2V/MLd7zZV7hF9wOEpMbNkC/eDM68dVoC+c2g0QzF0TGalVxrxVMivaKmZ+5N+3ElRNqsSqXjlT+09y7F3WdU2UxYtlUcegOWuo1B0U/tZcTbFKQahyZCr/j0IMY64alTZ7wRHDI4xZCeMdQ9ATFWV7G3UIll1rhj3s0giwN/dDCD30XG/MNVuHd9VYLx0tABy5gYBnzxWDzlO/OxiIu9G4uwHV1nSPDIxmo9bo35e0rkllqfQKmSyVsEgICLaSNIvYO209dL2d7uFChdLkinHCb8Pq596UhTMRg1uFLoQkowg7Kh5x+53kUXJ3Lob2d/Sd33/EBgQbFqqb835vM/06BH3FzASdmHF71aKfk4einJhLNmdK9R4G43HfAPWIoCFTeXSZR1L3PBE9YgBFkK4odjEoVJhd6nRc1zpt2cywp4z1E83kMCgXUP00YybldvI9+YwpEvpgcKJHAuTMfK2SzyBtb5sc6AsrYV6GltFrBvjw6rV/29hHtQ7cobcSTYKHZJCojq9hRHrTpeEMqMLOryJkxrGGshvoGrKVVHbvCsRbwChXFEz759QghywFYryJg4jizth6OmiyzaGt7TJQlsQJEwc+H94GpBQQc+ZBR/fxuaxeln8GUMXFNfElGoMmFTo+IG6hWF1lJdjsdWAoNzgepG7wY0TUKJWCP1ukkBMz+Hk2hQiQ8yFMr6ZYyiFdUzrFQiqUQcQJhGzAf2P5oBsqnB17KiRg5MX5Rl/zI+G37g0BoKxa+frBy8Webnuzcx5/BGvpHImFRom/NDlS5A2I0i1eBM7l/YsdRjO606iUbRbP81glefInABHATSQgM7uriIkg8C6bHTukuPEK/M6LzJeCb89GfmaKgW4NERFkJn1RLcFLPCzT38A4jb9m4RHa/bduMkXw5Jp1TzTguUkGnscwZnYEyXxG5Gaq2byg7hbK6F8AWwc4FteqJOiVuotK0RQZeFzjocjCvDTYaN3tuYvKoK388RCYQUFLucjJpWHDhUWaDS+qzGDwKiyIGNaolqeIuclm9PHhV8mLsPeTQV9KvILHSN0GlBZbfNyEqKg/pEQbsfujbaNEN7PHZqvNKHcj2e7mbvZb4cbR8WLYhCoA5dvR4fK4JBRa01EbSBhPowOsoKE2+H7nkCSVio0GpSIACsHeHkKZlSu5EwCnmQt73mLaRyFqSRCrW/4OQPQZF7wWMi0cnuX+nqu4KrdATUI+iHANCO24kutR4V+viOz3OyX2K22EGie0PyLWg6dYIMs+BfkLrCa8uvyoRFOP9fj4osrcjSuesEO99Mpl7JC0DUBQMgPkQ7cM1RhCi0is2maM5ss7m1HAgQ3OPl7GkmHRL69tBQ3OFlg76LAG7cmkbx8JNuNeYgDrSCgRTPJEIai+eEPA6kuvDWh9eu6Jw3j5kxb6a+KPqCEhC+C7eccxamNP7DTQnOxFCxCZ0nmldtVk1QOzMbsocgKxTS/q9Q2STJR83WuYcrYFRybGx7kQTaLDQ6e8yN6mY10fkd9g0D8egVsx5mJ4R6dZSlMhfRBXFtx6qysjog6cxEExhztXisVY0T8bKc5ksGQw11kTzIG/PbUyb+4YX/HfMc749yeo+ITMLHM0Dzodk2nh6hIvvptujA6kTH9p6RsOVI4FXNq4E1YMnzuBSLSJ4hGJO/U8Zb5/YHauk38UcdipMb6/g+qhh5ZY2j3jejT6WHLOmeUGZooX7oZeAjUvC+jV2aOqF4fP+PZ09rvRuZflqR3WmMZTD+4mJsItP7m78UhwX+/y+LRorijb2N+LxCSS9MA0hqdXDzz94cNXWLUDhW6xfSf2FvKKwP5E62W9HCn38W8B3jkyy0XVpz+XFQceLPfkQ/BPhWdIU8PAPm8zEr30/qEiPsHTZFks9MNQlBOxlBpqY9E/gmkxfIKlrJvxI7286zq4QaGEmEa+nFGqiN3XOKTH4o8eRaSzc2OBfPVCffpvPELIcKRUC9CGvTmI4HvWkdOSFlaJ0OhwTmYU50ZvjQX7dkP1STHAYP9R7Rn9wpc07/H5Skb24pSpJulY4opbShXD2Rl+i+Q4iY3HYsIs6CAYl5LLMJCQkTm23H5/LYCfebPiw80AsvJMjr01xt+hTSIXApPul6Adg53fWBJFn1Q+MYrgnUFtGrAqkHNERzoxidUq8wwI0qz7+k4Q0TK9+IRwrCWNDMVu55MjI3buOHh1rslEkgLh7L12PF3O64IYnRSYmG84dUvoWCKcdEz/0dKr4QGN0TREz5Jwx3Xh/qa3V9ddbPq4ZFmusDYyC0p54ZCBsqmjju3c3leck+mwbVeFpsOARKBXSlsfZF+t7FxEw2DvPglF4Oh+0UgwiKLLIzn42JmGbo2KKAlwSSpTK/pwsZU3DMWh5DGNCrE1rCnZGmAyGFFbdc1iHW6Jhqkuf3/7oKJPZSm3AvdKBue9q+S6BdHeXz6XQ5ArdpZfNOBaUL40QZr86/fUTtnQVSeXPMx5I9WrOMVbRmgOzdXBuPqTKrgG/pmiGDZ+Aao4rmAjMLTAzrZV46kO2HQTfB0U7i8xHCKYlvoTBQQY1KRBPxUUrGzCYyssGEvzj1JiAWoemOEM92bFNGJF3ZXPji/2pYPOZF8vqz5eZTTqgNP8FpY4A2DcMhdf5nJCt/derkpCIpDJOjb7A5j0TswrZbGiCtYvCBQiNy6QBwi6xQjHsxXtdUy+CWrVQP0Zm1IoJ2aq1whc6LTHbuSnTyLQVRHNhc7qzM/vfhQyn+697zkK2SWYo32zeK2wpCA3Kk0VzjzVUQbJGA35JBJVR/BYuLs+WYqv36/7Pf0bVH1NgevY0TnsF+oL2Fy7dg2Mw3s2iWxpMOZTtH7GoNUnUCCr3ovEvQzWsnf8vcI/l7PDUeSF7no1gGHKY75zY6kPxU99Il1D7zDywmxyIu5GgW9st1/1nXEhHeWuklm05FrJ+vN6yNs/bgpdsk4VrjlHEA7WQ0RdPLpMHqym2r9qvrHeAseBZKqbqqVsH82gofKsJSMRPfEhJVwn0Xa4M4UqTS9Sp5/kSeb7ZCVYxjuMbb2wXcdgEf3GgVahlVQmVGpfA5gFb+6zZlczLih+LcK9LXOuU5uTp5bJ0pNDdfSUxZOpnuQHJKcHvUyekGPo6gCObMZcuxgwnGg47azNZjslaoKGMQewA7L0Gv1ClWRy0uOyNTqsFE7imb/HIKHAFIoOqmG45aD11Tx8Lr0CFV4uzrtYxrYcqnCIfAee3kZvcIm5IrRY7N4p75zATDoat6qe1dt74Z49YxSkk7+6ilEOHFlpDNlpL4xqZ2Udx/3abHQgqcoDknWtqOlg/KxjTz7i3h68yU0Xk1R3QkiiCJXUhoq5iqt2qHokNf8nEtFn4qxSSt6UEbytB5k09xewRAlYnFOzSuvwMeZQzvZAhT62IYa7q8Ejeq4qpicz0UuQO2SIaY+DnRizmLzaL+3U5RcyIBHVMoje8wmvdgyztsWBHmklvqHXCu8p4wIqEbaqQ69Rn6qkNZAzuMLlMJWSDchHKLNoR4ytqfXT6rBKTvdtNntw+3tn/G/kJquIgpdoVqZSuWPrUTLlZb3rGhKRIjzHXYnAY+MypnpWrkj/XzwHzkHWadA7Pt4S43CCDB9fjz8MZsAX2ubUf04gmtcEuh2AqYyKToU1h292NyPpFWgaXCZoUA8f4x+HeLkXwFXxdjbhEZtFHoP8crV34FMDapQdeRSzdvV4kjusN4gZ4zlqSYlVVl3HlIP7sMyzxcGEALkOZmqECHYGoSdp9y+zuStUmYzCLsjRxhcK6+GAK0CPywXg69WXXDwpRRg4jOBGD427KHjdU6mMtVO54g16sOYln8+hdN8nxDGU+F/F46HPqp7MFRrKg2WWuS5ZW56FER2AAMoRlGh1imccUlhoiriWyCQ1RKgKW0oua2rcrphEbPPdME6n6glh/02UvlOmq5zQs9fQUZ4GsPkc4GMGihpgrRvLsWH1a/smhUzsWJKke7VWVrqELE2lVzPm7NfEC4reJY0P0izRzf13g843zopKJwFzZCKKs2F8HpRJ0eJOLBuMfJ52ePpb8RnzF16iVJd7ogjJoBvqjj8xKkm3lk9cFZFnt7NHHAtHBUAZkv92Tar6r89eKJKESOmBWdpy2ImEZOHfCRcEwAkDhMvqxDIO9+uo+zMSY0KqePiGXwpzxWsoblEnv3CZGvC0lChRyMvwyhATIWtJPdQdM65oiHK8U+NI5qMT4UFgmpbL0AEKoKvF/8Jkhtsc0zbkWxoV2zPnwl5biJo57tiSToGdhecvx7OIZs9I1YZ9CGn/BZwZzru7e8GHH0BZ0A1totqygoweY/e7khcOP1BHupXTZEth+faETTDYquI8HLEK2OJLqp8OS3FsK7w+ngS5EksbbmPyiJWQlUMQKG818njcxPHuH3x/ptIXAjm+rPrX0VU5Aud47DBSkRUD+TkfQi5Xv4FW2EJZ9UdSqpOu/c0DMOoW8mnVRWTi7BfLrzel75QOtWUWpY1X54h4HztwEW8j8Ui98DZ2cFMhN7lyW+cpjFSSZ4wNsrgJn3M2EfRyR83FnhK4bipvQGhAoWvyISv3HdEIrDsxdA8ys/3YcNg1PuvZKnpe7bkny2OhaeiNb6aTxu4582hUfP0etnHdEKoH1wQq4Jsrx9y2tRsz8ywtNgVoYEd346iERYrpW02KW1CzVdgjGcnDTuwV71t4Bij4syB3rnefjLxCf/8TfoKgCCzONVoQ+dERdLvUpoGwP8JOiyeyIVlg+STtDYrGN9xieQvet3t+SCiKanB90geNXj5wCDkpIuuX7NjlW6EQvMNBE+QL3W0iS6ZYoTGkVx068YPMCyDGD9C8wch2DZ8DM0aSBj1YZ1e+tB11FN1Nad9xsUsKEq2r+7GEgoqqm0EucTS9lL043VxoazBKZp/0hqmcr/5St1wJOHgaJs10RUkDI81tWK6qpERKGk5mVKY9pwH7ijP4HzX7Rd98O3ErQxmnnil/KMMXsQzgwwctuuIaKYmfvRzBZqRg6iJsjOqY4nRWq/8gUcWuc00tJOod7HIYjx7soFyz6zr93aCiLpZpML32XShshnDYcJnDPvT9FH8oQqCpzmaYcZs7roMj5ywZnOZUwBxxB3huBERyspx+42NYFS9016+cB2bDM+3Eb5lLF5wCdiZ53nGd++cl934L087B6iqqjFSNRnzLC5MzQ+vupqZvpzsUIQbZuQfknnaq09cfbV0zXB4jnFEhebRrKhOzLF5E75rsqvntjFWKcaZPkUo5IKI440IYbSeAKEUG7GMJe+U76iK/suF+OeLhdjPUvEzi73y6HhQVyAyk6Wr+70YRKrrbvPxSkcXEDoQZ++fuZPLXbFCAA9un5xM9YKzMLU4P5rhx3I86t0S9PvEJmRp2Ft6SSau3jzF1vhoF8SJjul3KJPFd3d6D3bj/5WxsB+Krth3rSqT29UdW2n/gQ7Lj0PxBGTXmskeNr3AVZpdGE98w+ljKBGnLpQJylpVEnl4+9JDvtC10j5vhOFK7OfUBnUc5Upb653X70tPeiGoKGMGD0gThkR6/LjoThAEJVCz8miO9Apzb2vK84v4qCctqeAJq/NgqLbQs1zJYafF1xWmJHws2fJGjefvoBsE6XXsM9fMk+DtbOCZba/CdzlSMsCRrIgBXuQN7eSekhXK9OfFsOSjAIMyvbCY5Doh8y50UdQCRekkWAxnUy20CzUHtgG7LNH5ttkvWv9OKbAnXwRNhAjnEaVqSJ/2v3pEdRbDVNgc/1qRggZdcUHnruxGPRdGzchZi78RXqmw0kKtQusckV4VPUolPoaZtVAllxTcIQpr/Cy1WrluE+voDFRZNPL7CvlhJqJ0OwDjbXjvGVv3EmM31FV6SYOxPksbspwvkV1SNk/iDTnSPrdOOoeOnb6W+ixGjGNfNF6d1bXuXWZpWQr1WgjPpO0fUhINgX6Y6gYNhe3onLnXBaasHc9avDwnBqerywA1jCDm70+UeT7u4SLQaHsFAN468umivLSI5ceQ8avnkSjJsws1dqAtOZJZbl++smge5frNnmytP7p/3nE/NfewrX2akaKdqaD/1IZTsfw43Ze33JIaDbZHtffpSwnWukbBg3vWYxSugm4uhNfIx3uv3lrMBEbB76eK1LuyZlX7XCWLMLUm3fKXpnr1AEUPJyn7g5OtmLoyaW6WD9nagtNdwac/odwlEli9bWE9spKNXWgMgDe26GL8Ept5rT/T5qTiPi2lJ+sfuHnoWTBBLE+HG6ufnqrybJdZSNJNA+wUpx/QhP8wkDiYgkstK/JEOdRSEr6NLWr+1+yptO+PZWOE3/TLpJfEiiHgzNo+Fbrh6X064/0aa4z9Pz5BOZ1lcbUgVrLAEvR4CiXa7gTJ2aKLPKsqlgPno+Nqq/Z6rYHN99O8Z0ycM7llRR2JOb+gDNPQ8WhNSMyFEvBioZNANTRGX/iD2xuUc9hi1MOxQEqecTjfAMSYQAqIBkf5rrKAtZKykNyUTZwl5037/V3iA8nfyQaY8zsWwl7YjLqK7386Q+gSDnPyJGcSvoRo/SX7Jv92Q+B5yPKWKUMCAXs5z4TOMmyqMS60K5Wc6mzHI47Gwdz9ikrgfihebuvITwlpA0KFubN1sGtLLJJByAsBryn49wRo7e2WYumj3ENnS01VeUZUIDZ1aS/N4pTlj7Uv3Vp/8g0O7jvcjpzlhpeIRcqj1clsa8K/wa+F6y9kDSFQaIQZ3RfYw5kmklSGVMoelXzHv05lRhuQWgyQq+AX/rzL7SFmOvgxyd+ahhnxPR8qv32sZ0OVdKDbOF5bX94VQF3Brhalr8NgSG6j/mMBytreTrWFdMKfHPw0mUWPmbxCkF8ckIeuTR1ntfA+Eb+C26XUnGwDX7ZJHnhZetoHm161YFLW2kHg17jsTieoY17kiFc5P0FtXZzK2C3Zo62vA1fBa3ti23tgKy2yy8mIad+X5hFrWqbk0ARIxxyNYGuyDOh1o/DhpkNg2vtz7r920FTfN52a6SZlOTklvY8Xq00mTYCaurqDfNyQFcDARI50NWVvb4Vys/+Nftt/llSVQJlwFddAficlGlQf/XtkWzi+C9JsLQIodivw4FdLi6iUz2P6hTtxC+wANRFTtiMrmDzmvWyZTbQ+7+Vs3BVBwIUJEe27MQo5MKer/Lpcwfwrb8fxALmScVlbuIZezoXB42HxOn5US8MlWJu4n3vFXIwnS2GJGEEvXLN7GCmZ9FC8WRdObR9zxVE4IaYub6++gBGutOF1yqpfEu9MUlzRtFR8fIaX880fQP9E4zBTUylIp0ExxdmXdx0ITMbiSDv2KA8aOKQgNGHjSGES0vHwNcizoRvToWKj0dNydTuioZ503tJ0wRgRdhJJeJ1PAnC8LkoqcfXDkRsDy12oARWx1PvIV4QQd5bkiP14EklHe865ID1TiUndh1BbhhPa4beIOesug2/7lFeh3z2LUclTms5Z2My6YYnPLs6XzR5XYkjpvNij4vbHE/ogemU1vqCJk3lI6KryEnDCXu61qDMTyxG7zx2VseCS/ABr+99j64FjG5kCtPAlInHETbboYxYfLVHvmZmEtsJDYLgXigVUJSPZ2fBntfOJ4YXKPkwY6NAimwvU4BL2bdn9aTC8L++kL6+bDAeWwK10GpVCKHDpH51cYPCzn3hvW0QFzUbz8DNWOa0qqQenX3EVqQiDuhVyEMtrmm6NxqPmeN//JGNakkZK9KK++9Xaw+yH864Wa6a1W9x7P5rfkQMprQmGpOhLYHzVOORMzFD6TWjhx6dWnDVyQU+/oyLNwYRN/+04lmVhP+pt6aa8Gt1NCQziqqTm3bxUqx4u8goFD5V/zZL/pTWUcQxQNr5H6hBGNSiTf3B1Bq3+F5ByGJ5ZIpkvuiFgynOJdz1VLkcPSaKCL9H8YM4kwH/JME9q+fmy3cEzZ/Xqy4cSZTguuaMe1zmCa4By7JYt9gQi9wiPh4fOrhUh12CEhfokRiqZt1qTTl5tNjGTRa/0JQ0BEzJjeMwLA092jFy5lY2v0wL6ZedXaqardw3QhYkRiQy/CFGZuewcJzMwWqAA2bNtWG+HXhc0KRxuV4L9jVEcU3bX6EKoIVZixl0PzTO+dOrOmT2U7L/GYurGfCwlq+0EsPRR86sSZyKmUvzpP/adSolGHXNql8LZyaRWfVKgpthijmb9lgMjATjTjFCePkXy3BXPhqovc/YTIuV3JW/SkSWQHn6+vJvc290UBsovrHxveeU0t3f2qLkCgiq/A4a2XYNfvXvDzNb4xkcQwgfYvxME0+Cdma1DegbNn66wuylA6gW55LMu5rvLCh6ZbauuG0+H4QQVtcNZiNmyllfL7B2rs0vuj1FOZ8ytclfMdfDZsqzxSnOzvU7KHRrgTTz93DuHq55j/sUiLEdtXjMHN2rAXpMjKcq9RSbaHhCZ5xMPX+g6rhsO6Rhp7YqX0Pb1J+cHXc+c1V4EJWN387CTmmEnbSNxMfSvM1c+UbT15oikdIdJthn+e58AeTSmQmqPVh5gVB0KFnlWzqFG6wpTDNSZWcDW30PgmboqwrwdrmZMIW66X5ju+qsHKaqLxY0pa6Gx0PIxTfFHRapkbpVjLIXeOpVzTw3CjL1R4IMsvP9uy85Ez1et2AJv90kDJqPocJioek7hVaRWyEe4BovArdZ3RDRi8ZWWaKRfe1cB41KV4dt+f73NhXMHNLift2OlEK28/4j9HRTKiOxdHRhWz3XHVML14Co8LRV9KCwPuOE9d661UpJ6kn5iW5QgQpbtEKRARKkfHPjV1XSNe/3Z8JAC8X3hL/uEAav/qmAP7G8jhDAHcZSJAmr2w6DCJptVncHho79YTe3HZ7V3SKfX0zW79Ep61JT+YEye+GGmozK8EePGMrm5O2PQn3oEoHQvhlW6shOD1bwMc0jitYWkZmssmtOAkf/ipLs/r+SKaWMxgcJQEO1sQbE0eMAzDubgBb03dY68wk2XwpOG10rCC6cxlyj8HXi3/zKPqK4rCOCZ6uU2SStCdDiS+//XzjFYXknmcdQjM7dzim0TKIZSDyRp/1kbrfTF953sD564Uog1XTyvru2qmF6CbxgVffHQvE0mzAX0Fo1+ZVI7y/MmlIfrKhzeSVRJC+XZGvEIqt8hFIIz9md6exm65jMVLiwW1gc50C+hbTtKvHWSTQt6cOFa+nJ6k55dd56xXgJzhvLerngCMe90PLC67K9yNJvP1THePrtGZYY+4cYS06jb0oDO4xwD1c+mjXR+w7rRsWMLBFEIECWlNCBHvxg/EqzCF3vvqwDDHp9/LskqFLQfI0wuZ4Y0fElV08kS2zaFfEU9qmUOivyUgmNW4z6655rMXOqx8PYAyiU8Vu0AIIyQhU47QzI710RlNZd1B3SEIDOH5l0pnS5kvsqdVD0kV6N4KXsFWsagQfRRdTBci/gxkDyjcPX1ReCgdu/vSRd28U+fO8Y9H53nBQwHOuid82CP+gtsUjBr9VDkQjihiYMDN2+u02GlNQfBBwbmKCiyU452EznW3VZUYc26ZPKsr+Pgll3lv6CDvdEiiQGntHWBuRcnA2GQmFAfxHzKCMuatO8/cGOlXK4k/0mjpUPecTTvC0rcJdIMPwLRYFZjPmZc1nF/9YBEwQZ3ejzvSm6tBdzAfaoZrTMyP6QBhH6S0b62TzmLYaCMDGraRm8dS/YgvrLYhp+SSvAAYUVVSGzyc3sdZN9a29E10eXa+xxgzvQwdwSBqlIszVwTqmBqDU6JMOrgDGtJOBLh9Bl6aoGwxxPJJutf9FLGfs9SuriW5xRJQvl/eNWos0azw5xx1vL/o04UhH4j2S71JRriatj9Mh5TicoKQp90+h2xjxKSaDp5KQgrxu7FmqdL9TSJ3WjekjObSVBh9301wHSA6459iJNScgKaNQcr1WDyb7BOPvvggoHermrxIy6khDLEgiSKpE076tIfON1PUJ+4I1+zsC09EPAz91ybZq2FeKoiVC9FpLaUjqiA/ls69wIu62ZpFHW0eooDTmSIaEz59RU9E8/Rov4XoCZ1qXmxzcBpj6aJb/EgbCIRDDfJvScIpW5TTHLgKmrDrAwHAM3gN/JZf3qai0VQzjpdV02lu/fOZ04EDWdVa8EgvIJf82H5sk+1/U+Lo8scg72mtMPrqEiZvK5+lD/Edts2S3/JxuD4PybwGXDCQwGaw+Mo3nc3xT3ai2bDSoiX/PZV2W9B8x7thsR379sUyACizsrYGKEs0zzvb352t1+KD6Rq5BrxmJf2LVLihkObe7jlzgTMLEjV/TgW38MErMKrNWPk+exuZAK/5O26Vlu7brfRSU4osmMQSeQ3PpczFlWRghp4wHSqteNT9yrzpVjbnGPmqZvI5Y9EjApOUZJDdW/yyw2w2iIwPc/nMYeOsttJwdEH8VbMMWpwvIWJAjb6vCfaEIEkP4PeBUif78B27ZmWhMUwfIQKLtRyLfoL5QZkThnRRs1Aaab5uV4135NaANvypFF9D14S3GuwwgAsLmDwK2SSjWNS0zal04U86fL3GTHP/ieDZdmu+cP4rSmz8SqUc4FTw7ttgTmW+g/493j1afIWqtPQcwMge8C123ZBTA00bS7QCzYzP7QI1o6MD8wy4fiGFKcm/iuRGxF5GM6PnQOwU56MtHDztjXD6AWMV/am0owqWyDMeUpvFIeV8+guYn0UHY5/rvM9dit2mJLQKGdbYDX1E/A5C2TRh4HfgtC830n+iWXmncgFNhuxPUZVUaCqRvXK/Hs4rVW9vZlKXE+D7ViK+KPfUdapSMIize4rvLv+FWm18T8D49flkBMm3KquoEnxiD88jivgonaguvgrecjS1zTE9uc7jMnkKQ/qroCi8u0BxIWVeVFgkoYYLodcq7qPKx4OoGgVj1nax/YcGf4EYfJ/+wy+oya8QXesx8v281awgzg8IbxkmrjIHiZWIfHz9kVOB+XlnS2Dxl/nxQceyZPiQeBGo35f1dsJL/KtXnwzeHvEbPHrPTuPHmnW2gOVVWJJkDQTETGrkuRPv/zGSwOwJi6EKGCmp6bxSgkO/oLq6KMGZQs+1UETpyPbRbI7HOec4ijdDPtCTcDTxJ5Xjbtu5IZI6t5ZzknjRufrQQNze1f3tEm87NKKXOsPu5lTX2UwbtR+iTcsFGiyKoeMCpYEnJtvIMNL4W9S1J/rlDBl1+YZ0gYv42/3NMtL9I82Uru8aLAa19VjtpoXQ+OXAETUlUPG2aQHSEsPIneXcckywvGvTDmFfPYjCRc6eZ1eItZF5+L8YhfnB4w0XLfqiPX1sYI6bBuRhP2ROxGjBCBAiUzn7w/hxtJHYKWlxiyVy6Wz9elevwTQOtd4apmfoyKSvlTae6d5OsbCMF1o+a3gBPjbE+Slrze3rW+Nl6LKLVh0LM0D54LU+YKMxcZWT6DbPM2S5Cepy5Tz/LAodjSZ+9l1znGBdBk57V1rMgcjP5He2vRLQWDhJ8S30z9V4FdTiXa7ux+Yl8BBhOH6OFZJfGnIQ/8ocozh41l/AMx8qXhZpCLixgFBCqKBxwSE8wnnvpFR/g4C/Pci4kQZHyCvgpnSL2hA/1rAtWeayQtx19yN1ctC0j/+AHwPIHbWvte4Zkp4z4s60j8rxKCC9V7pA2hzvJlHOcALcYPLO/Vmbw8DZvKnszejNCzfUio3N+vgGr94CMN0sKwTPq5ZqUHMRCL0FHO+7A0oKrYPovPh11s6FcSRAnTcH5ACd7jqH/01mX/LvzjvmhpypaZp/vogh23X/nlVPVmN+QdhpyCuJoN5i8x1XuURQZi1rD3aHWeeB8Kwd4H9T+YaSNRNDM+a+Kg8DSdkH2IryJStdne7+YsCVGhkbs99Y6LEmpOkZPLD8PZYptw0nH//GPipi/otzQg99byV+dhTvPMGDvTEJpWMVwnPzPjWqFjOaWfKR+EaOqyAVnqG4roWN0YoUM9L/Rukm5zI50gx3yIJiK4N5zpEWNwFPGmsqMMYJ/yyfOTz72RBjxw3c7HM0BgN29zT5gqDi48/HCpJ1l4xFw9IM/1B1UljDI/v6a6laVu1eTH3/3joep3mdzaVXumooOfuCDVU9AVOUeogPtztW7jFRxgoWOXbzpe9IASe6mjKLhFfkiz/B0Rw58XRDhjnWO/TrNkZjNSocCMolm1TUSqC5P8V+NF7OFHZeUDN5L2w5Gm6ggm+GNhQvNIq7N6zAAhikECyYVRbwYa9xmPS41r2rr/C0zyFfuIbVkKQzuZ0ovE6UmzoUxnWKmoDWDoszvwPE90BOVzrr51Np0XUc8rpnoeyaS7c35bg/geEElsNDA2Vip9o7hrmXmATFWovT1L2IzNs8tkxwFyN0eUU+l3wspn916+loKa/DgVS8fW9NNJmiEoAi5s4sQuJjyeAgcSdd1/EPTYxEemAeIYqPuO3FuiQIsTb2W7iBSzol9AfW+I0oAmEtXOlAbeat0Ix0M3O4OGYb28htKCuFLOi9SKdePJTyiM7y/nSkdVzIOfkU3jStrG++Aewe0KZo8gdG8D5GSRCreay4=</xenc:CipherValue></xenc:CipherData></xenc:EncryptedData></saml:EncryptedAssertion></samlp:Response>"; |
| HttpServletRequest request = Mockito.mock(HttpServletRequest.class); |
| HttpServletResponse response = Mockito.mock(HttpServletResponse.class); |
| when(request.getRequestURI()).thenReturn("/sp/consumer"); |
| when(request.getMethod()).thenReturn("POST"); |
| when(request.getParameter("RelayState")).thenReturn("kojit9j9o1ff9q6vpeo8dnsfc9"); |
| when(request.getHeader("Origin")).thenReturn("http://localhost:8484"); |
| when(request.getHeader("Referer")).thenReturn("http://localhost:8484/"); |
| HttpSession httpSession = Mockito.mock(HttpSession.class); |
| when(httpSession.getAttribute("saml2AuthInfo")).thenReturn("kojit9j9o1ff9q6vpeo8dnsfc9"); |
| when(httpSession.getAttribute("saml2RequestID")).thenReturn("_4e68b1b1596d142f0e2aac3624c41d1b"); |
| when(request.getSession(false)).thenReturn(httpSession); |
| when(request.getParameter("SAMLResponse")).thenReturn(base64EndSamlResp); |
| assertNull(authHandlerEnc.extractCredentials(request, response)); |
| ((AuthenticationFeedbackHandler)authHandler).authenticationFailed(request,response,null); |
| } |
| |
| @Test |
| public void test_goodLogin() throws IOException, RepositoryException { |
| userManager.createGroup("all_tenants"); |
| userManager.createGroup("pcms-authors"); |
| session.save(); |
| String base64EndSamlResp = buildAuthResponse(); |
| HttpServletRequest request = Mockito.mock(HttpServletRequest.class); |
| HttpServletResponse response = Mockito.mock(HttpServletResponse.class); |
| when(request.getRequestURI()).thenReturn("/sp/consumer"); |
| when(request.getMethod()).thenReturn("POST"); |
| when(request.getParameter("RelayState")).thenReturn("ncu7lhndv8o4o096im9065ijqn"); |
| when(request.getHeader("Origin")).thenReturn("http://localhost:8484"); |
| when(request.getHeader("Referer")).thenReturn("http://localhost:8484/"); |
| HttpSession httpSession = Mockito.mock(HttpSession.class); |
| when(httpSession.getAttribute("saml2AuthInfo")).thenReturn("ncu7lhndv8o4o096im9065ijqn"); |
| when(httpSession.getAttribute("saml2RequestID")).thenReturn("_f96afa62dc16b1cc99efab06db0c750d"); |
| when(request.getSession(false)).thenReturn(httpSession); |
| when(request.getSession()).thenReturn(httpSession); |
| when(request.getParameter("SAMLResponse")).thenReturn(base64EndSamlResp); |
| AuthenticationInfo authenticationInfo = authHandler.extractCredentials(request, response); |
| assertNotNull(authenticationInfo); |
| assertTrue(((AuthenticationFeedbackHandler)authHandler).authenticationSucceeded(request,response,authenticationInfo)); |
| authHandler.dropCredentials(request,response); |
| User user = (User) userManager.getAuthorizable("saml2Example"); |
| assertNotNull(user); |
| // verify user properties sync |
| assertEquals("saml2@example.com", user.getProperty("./profile/email")[0].getString()); |
| assertEquals("Saml2", user.getProperty("./profile/surname")[0].getString()); |
| assertEquals("Example", user.getProperty("./profile/givenName")[0].getString()); |
| // verify group membership |
| List groups = new ArrayList<String>(); |
| groups.add("all_tenants"); |
| groups.add("authors"); |
| groups.add("pcms-authors"); |
| Iterator<Group> groupsIt = user.declaredMemberOf(); |
| while (groupsIt.hasNext()){ |
| Group group = groupsIt.next(); |
| assertTrue(groups.contains(group.getID())); |
| // verify managedGroup flag |
| assertTrue(group.getProperty("managedGroup")[0].getBoolean()); |
| } |
| // authors group was not created initially and still does not exist |
| assertNull(userManager.getAuthorizable("authors")); |
| } |
| |
| String buildAuthResponse(){ |
| LocalDateTime dateTime = LocalDateTime.now(); |
| LocalDateTime notBefore = LocalDateTime.now().minusSeconds(3); |
| LocalDateTime notOnOrAfter = LocalDateTime.now().plusMinutes(5); |
| String currentTime = dateTime.format(DateTimeFormatter.ISO_DATE_TIME); |
| String notOnOrAfterTime = notOnOrAfter.format(DateTimeFormatter.ISO_DATE_TIME); |
| String notBeforeTime = notBefore.format(DateTimeFormatter.ISO_DATE_TIME); |
| String samlResp0 = "<samlp:Response Destination=\"http://localhost:8080/sp/consumer\" ID=\"ID_5232eed3-8fd5-4562-92bb-69af0246c341\" InResponseTo=\"_f96afa62dc16b1cc99efab06db0c750d\" "; |
| String issueInstance = "IssueInstant=\""+currentTime+"\" "; |
| String samlResp1 ="Version=\"2.0\" xmlns:saml=\"urn:oasis:names:tc:SAML:2.0:assertion\" xmlns:samlp=\"urn:oasis:names:tc:SAML:2.0:protocol\"><saml:Issuer>http://localhost:8484/auth/realms/sling</saml:Issuer><samlp:Status><samlp:StatusCode Value=\"urn:oasis:names:tc:SAML:2.0:status:Success\"/></samlp:Status><saml:Assertion ID=\"ID_c78146f1-6c37-4ad5-b2ee-0371667c3aeb\" "; |
| //issueInstance |
| String samlResp2 = "Version=\"2.0\" xmlns=\"urn:oasis:names:tc:SAML:2.0:assertion\"><saml:Issuer>http://localhost:8484/auth/realms/sling</saml:Issuer><saml:Subject><saml:NameID Format=\"urn:oasis:names:tc:SAML:2.0:nameid-format:transient\">G-212b1981-a621-4c67-84ac-cd75551a0250</saml:NameID><saml:SubjectConfirmation Method=\"urn:oasis:names:tc:SAML:2.0:cm:bearer\"><saml:SubjectConfirmationData InResponseTo=\"_f96afa62dc16b1cc99efab06db0c750d\" "; |
| String samlResp3 = "Recipient=\"http://localhost:8080/sp/consumer\"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions "; |
| String notBeforeStr = "NotBefore=\""+notBeforeTime+"\" "; |
| String notOnOrAfterStr = "NotOnOrAfter=\""+notOnOrAfterTime+"\" "; |
| String samlResp4 = "><saml:AudienceRestriction><saml:Audience>http://localhost:8080/</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement "; |
| String authInstance = "AuthnInstant=\""+notBeforeTime+"\" "; |
| String session = "SessionIndex=\"4d647e71-cc20-4779-ad58-7df15816a8c5::901bf7ca-3984-4a5b-8f8b-c1c737738102\" "; |
| String sessionNotOnOrAfter = "SessionNotOnOrAfter=\""+notOnOrAfterTime+"\"> "; |
| String samlResp5 = "<saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute FriendlyName=\"givenName\" Name=\"urn:oid:2.5.4.42\" NameFormat=\"urn:oasis:names:tc:SAML:2.0:attrname-format:basic\"> <saml:AttributeValue xmlns:xs=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"xs:string\">Example</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName=\"lastName\" Name=\"lastName\" NameFormat=\"urn:oasis:names:tc:SAML:2.0:attrname-format:basic\"><saml:AttributeValue xmlns:xs=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"xs:string\">Saml2</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName=\"groupMembership\" Name=\"urn:oid:2.16.840.1.113719.1.1.4.1.25\" NameFormat=\"urn:oasis:names:tc:SAML:2.0:attrname-format:uri\"><saml:AttributeValue xmlns:xs=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"xs:string\">all_tenants</saml:AttributeValue><saml:AttributeValue xmlns:xs=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"xs:string\">authors</saml:AttributeValue><saml:AttributeValue xmlns:xs=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"xs:string\">pcms-authors</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName=\"email\" Name=\"urn:oid:1.2.840.113549.1.9.1\" NameFormat=\"urn:oasis:names:tc:SAML:2.0:attrname-format:basic\"><saml:AttributeValue xmlns:xs=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"xs:string\">saml2@example.com</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName=\"userid\" Name=\"urn:oid:0.9.2342.19200300.100.1.1\" NameFormat=\"urn:oasis:names:tc:SAML:2.0:attrname-format:uri\"><saml:AttributeValue xmlns:xs=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"xs:string\">saml2Example</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName=\"surname\" Name=\"urn:oid:2.5.4.4\" NameFormat=\"urn:oasis:names:tc:SAML:2.0:attrname-format:basic\"><saml:AttributeValue xmlns:xs=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"xs:string\">Saml2</saml:AttributeValue></saml:Attribute><saml:Attribute Name=\"Role\" NameFormat=\"urn:oasis:names:tc:SAML:2.0:attrname-format:basic\"><saml:AttributeValue xmlns:xs=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"xs:string\">uma_authorization</saml:AttributeValue></saml:Attribute><saml:Attribute Name=\"Role\" NameFormat=\"urn:oasis:names:tc:SAML:2.0:attrname-format:basic\"><saml:AttributeValue xmlns:xs=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"xs:string\">offline_access</saml:AttributeValue></saml:Attribute><saml:Attribute Name=\"Role\" NameFormat=\"urn:oasis:names:tc:SAML:2.0:attrname-format:basic\"><saml:AttributeValue xmlns:xs=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"xs:string\">view-profile</saml:AttributeValue></saml:Attribute><saml:Attribute Name=\"Role\" NameFormat=\"urn:oasis:names:tc:SAML:2.0:attrname-format:basic\"><saml:AttributeValue xmlns:xs=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"xs:string\">manage-account-links</saml:AttributeValue></saml:Attribute><saml:Attribute Name=\"Role\" NameFormat=\"urn:oasis:names:tc:SAML:2.0:attrname-format:basic\"> <saml:AttributeValue xmlns:xs=\"http://www.w3.org/2001/XMLSchema\" xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" xsi:type=\"xs:string\">manage-account</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>"; |
| String preEncoding = |
| samlResp0 + |
| issueInstance + |
| samlResp1 + |
| issueInstance + |
| samlResp2 + |
| notOnOrAfterStr + |
| samlResp3 + |
| notBeforeStr + |
| notOnOrAfterStr + |
| samlResp4 + |
| authInstance + |
| session + |
| sessionNotOnOrAfter + |
| samlResp5; |
| return Base64.getEncoder().encodeToString(preEncoding.getBytes()); |
| } |
| } |