@@ -15,7 +15,6 @@ import (
15
15
"github.com/fleetdm/fleet/v4/server/fleet"
16
16
rtvalidator "github.com/mattermost/xml-roundtrip-validator"
17
17
dsig "github.com/russellhaering/goxmldsig"
18
- "github.com/russellhaering/goxmldsig/etreeutils"
19
18
)
20
19
21
20
type Validator interface {
@@ -161,38 +160,50 @@ func (v *validator) validateSignature(elt *etree.Element) (*etree.Element, error
161
160
// If entire doc is signed, success, we're done.
162
161
return validated , nil
163
162
}
163
+ // Some IdPs (like Google) do not sign the root, and only sign the Assertion.
164
164
if err == dsig .ErrMissingSignature {
165
- // If entire document is not signed find signed assertions, remove assertions
166
- // that are not signed.
167
- err = v .validateAssertionSignature (elt )
168
- if err != nil {
165
+ if err := v .validateAssertionSignature (elt ); err != nil {
169
166
return nil , err
170
167
}
171
168
return elt , nil
172
169
}
173
-
174
170
return nil , err
175
171
}
176
172
173
+ var (
174
+ errMissingAssertion = errors .New ("missing Assertion element under namespace urn:oasis:names:tc:SAML:2.0:assertion" )
175
+ errMultipleAssertions = errors .New ("multiple Assertions elements found" )
176
+ errAssertionWithInvalidNamespace = errors .New ("Assertion with invalid namespace found" )
177
+ )
178
+
179
+ // validateAssertionSignature validates that one "Assertion" child element exists under
180
+ // the "urn:oasis:names:tc:SAML:2.0:assertion" namespace and that it's signed by the IdP.
181
+ // It returns:
182
+ // - errMissingAssertion if there is no "Assertion" child element under the given tree.
183
+ // - errMultipleAssertions if there's more than one "Assertion" element under the given tree.
184
+ // - errAssertionWithInvalidNamespace if an "Assertion" element has a namespace that's not
185
+ // "urn:oasis:names:tc:SAML:2.0:assertion"
186
+ // - an error if the signature of the one "Assertion" element is invalid.
177
187
func (v * validator ) validateAssertionSignature (elt * etree.Element ) error {
178
- validateAssertion := func (ctx etreeutils.NSContext , unverified * etree.Element ) error {
179
- if unverified .Parent () != elt {
180
- return fmt .Errorf ("assertion with unexpected parent: %s" , unverified .Parent ().Tag )
181
- }
182
- // Remove assertions that are not signed.
183
- detached , err := etreeutils .NSDetatch (ctx , unverified )
184
- if err != nil {
185
- return err
188
+ var assertion * etree.Element
189
+ for _ , child := range elt .ChildElements () {
190
+ if child .Tag == "Assertion" {
191
+ if child .NamespaceURI () != "urn:oasis:names:tc:SAML:2.0:assertion" {
192
+ return errAssertionWithInvalidNamespace
193
+ }
194
+ if assertion != nil {
195
+ return errMultipleAssertions
196
+ }
197
+ assertion = child
186
198
}
187
- signed , err := v .context .Validate (detached )
188
- if err != nil {
189
- return err
190
- }
191
- elt .RemoveChild (unverified )
192
- elt .AddChild (signed )
193
- return nil
194
199
}
195
- return etreeutils .NSFindIterate (elt , "urn:oasis:names:tc:SAML:2.0:assertion" , "Assertion" , validateAssertion )
200
+ if assertion == nil {
201
+ return errMissingAssertion
202
+ }
203
+ if _ , err := v .context .Validate (assertion ); err != nil {
204
+ return fmt .Errorf ("failed to validate assertion signature: %w" , err )
205
+ }
206
+ return nil
196
207
}
197
208
198
209
const (
@@ -221,7 +232,6 @@ func generateSAMLValidID() (string, error) {
221
232
222
233
func ValidateAudiences (metadata Metadata , auth fleet.Auth , audiences ... string ) error {
223
234
validator , err := NewValidator (metadata , WithExpectedAudience (audiences ... ))
224
-
225
235
if err != nil {
226
236
return fmt .Errorf ("create validator from metadata: %w" , err )
227
237
}
0 commit comments