Used to validate the following Unicon docker images:
- shibboleth-idp: https://hub.docker.com/r/unicon/shibboleth-idp.
- shibboleth-sp: https://hub.docker.com/r/unicon/shibboleth-sp.
- simplesamlphp: https://hub.docker.com/r/unicon/simplesamlphp.
More documentation is forthcoming, but it's a full working IDP, SP, and LDAP server that runs under docker-compose
.
- Update the
idp/Dockerfile
with the version of the base image you want to test. - Call
docker-compose build
and thendocker-compose up
(ordocker-compose up -d
to run as a daemon). - Browse to
https://shibboleth.ubuntu.nameid.io/
(after setting up anetc/hosts
file entry pointing to your Docker Host IP), and you can login withstaff1
andpassword
. ctrl+c
thendocker-compose rm
cleans everything up to try again.
cp /opt/gluu-server/etc/certs/\*.ubuntu.nameid.io.cer /home/malotian/dockerized-idp-testbed/httpd-proxy/etc-httpd/ssl/domain.crt
cp /opt/gluu-server/etc/certs/\*.ubuntu.nameid.io.key /home/malotian/dockerized-idp-testbed/httpd-proxy/etc-httpd/ssl/domain.key
If testing the Shibboleth IdP build process locally, you'll want to make sure to docker pull centos:centos7
to ensure that you have the latest before building the IdP. This will ensure that your version will match what Docker Hub will use when it builds.
Build the IdP with docker build --tag="unicon/shibboleth-idp:<version>" .
. Make sure the FROM
entry in testbed's idp/Dockerfile
matches the tag used in the idp build or Docker Compose will pull the wrong version when running the Testbed (see step #1).
If testing the SimpleSAMLphp build process locally, you'll want to make sure to docker pull centos:centos7
to ensure that you have the latest before building the image. This will ensure that your version will match what Docker Hub will use when it builds.
Build the application with docker build --tag="unicon/simplesamlphp:<version>" .
. Make sure the FROM
entry in testbed's simplesamlphp/Dockerfile
matches the tag used in the ssp build or Docker Compose will pull the wrong version when running the Testbed (see step #1).
HTTP/2 support can be added to Jetty by doing the following:
- Adding the following to the
idp-http2/Dockerfile
:
RUN cd /opt/shib-jetty-base \
&& /opt/jre-home/bin/java -jar ../jetty-home/start.jar --add-to-startd=http2 -Dorg.eclipse.jetty.start.ack.licenses=true
ADD shib-jetty-base/alpn.ini /opt/shib-jetty-base/start.d/
This will automatically accept the GPLv2 license used by the ALPN library utilized by Jetty.
- Create and populate
idp-http2/shib-jetty-base/alpn.ini
:
# ---------------------------------------
# Module: alpn
--module=alpn
## Overrides the order protocols are chosen by the server.
## The default order is that specified by the order of the
## modules declared in start.ini.
# jetty.alpn.protocols=h2-16,http/1.1
## Specifies what protocol to use when negotiation fails.
jetty.alpn.defaultProtocol=http/1.1
## ALPN debug logging on System.err
# jetty.alpn.debug=false
-
Run the container(s):
docker-compose -f docker-compose-http2.yml build && docker-compose -f docker-compose-http2.yml up
. -
Test:
- Open the browser network analyzer tools.
- Ensure that the
protocol
type is shown. 1. - Browse to
https://shibboleth.ubuntu.nameid.io/idp/
. Chrome, firefox, and safari should show a protocol of "h2". - Try
curl -k -v https://shibboleth.ubuntu.nameid.io/idp/
. "HTTP/1.1" will likely be shown as curl (at least on OS X) does not have http/2 support.