/*
- * The Shibboleth License, Version 1.
- * Copyright (c) 2002
- * University Corporation for Advanced Internet Development, Inc.
- * All rights reserved
+ * Copyright 2001-2005 Internet2
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
*
+ * http://www.apache.org/licenses/LICENSE-2.0
*
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions are met:
- *
- * Redistributions of source code must retain the above copyright notice, this
- * list of conditions and the following disclaimer.
- *
- * Redistributions in binary form must reproduce the above copyright notice,
- * this list of conditions and the following disclaimer in the documentation
- * and/or other materials provided with the distribution, if any, must include
- * the following acknowledgment: "This product includes software developed by
- * the University Corporation for Advanced Internet Development
- * <http://www.ucaid.edu>Internet2 Project. Alternately, this acknowledegement
- * may appear in the software itself, if and wherever such third-party
- * acknowledgments normally appear.
- *
- * Neither the name of Shibboleth nor the names of its contributors, nor
- * Internet2, nor the University Corporation for Advanced Internet Development,
- * Inc., nor UCAID may be used to endorse or promote products derived from this
- * software without specific prior written permission. For written permission,
- * please contact shibboleth@shibboleth.org
- *
- * Products derived from this software may not be called Shibboleth, Internet2,
- * UCAID, or the University Corporation for Advanced Internet Development, nor
- * may Shibboleth appear in their name, without prior written permission of the
- * University Corporation for Advanced Internet Development.
- *
- *
- * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
- * AND WITH ALL FAULTS. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
- * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
- * PARTICULAR PURPOSE, AND NON-INFRINGEMENT ARE DISCLAIMED AND THE ENTIRE RISK
- * OF SATISFACTORY QUALITY, PERFORMANCE, ACCURACY, AND EFFORT IS WITH LICENSEE.
- * IN NO EVENT SHALL THE COPYRIGHT OWNER, CONTRIBUTORS OR THE UNIVERSITY
- * CORPORATION FOR ADVANCED INTERNET DEVELOPMENT, INC. BE LIABLE FOR ANY DIRECT,
- * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
- * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
- * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
- * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
- * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
- * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
*/
-
/* ShibConfig.cpp - Shibboleth runtime configuration
Scott Cantor
#define SHIB_INSTANTIATE
#include "internal.h"
-#include <log4cpp/Category.hh>
+
+#include <openssl/err.h>
using namespace saml;
using namespace shibboleth;
+using namespace xmltooling;
using namespace log4cpp;
using namespace std;
-SAML_EXCEPTION_FACTORY(UnsupportedProtocolException);
-SAML_EXCEPTION_FACTORY(OriginSiteMapperException);
namespace {
- ShibInternalConfig g_config;
+ ShibConfig g_config;
+ vector<Mutex*> g_openssl_locks;
+#ifdef HAVE_GOOD_STL
+ map<xmltooling::xstring,const IAttributeFactory*> attrMap;
+#else
+ map<XMLCh*,const IAttributeFactory*> attrMap;
+#endif
}
-ShibConfig::~ShibConfig() {}
-
-extern "C" IOriginSiteMapper* XMLMapperFactory(const char* source)
+extern "C" SAMLAttribute* ShibAttributeFactory(DOMElement* e)
{
- return new XMLOriginSiteMapper(source,false);
+ // First check for an explicit factory.
+#ifdef HAVE_GOOD_STL
+ map<xmltooling::xstring,const IAttributeFactory*>::const_iterator i=attrMap.find(e->getAttributeNS(NULL,L(AttributeName)));
+#else
+ const XMLCh* aname=e->getAttributeNS(NULL,L(AttributeName));
+ map<XMLCh*,const IAttributeFactory*>::const_iterator i;
+ for (i=attrMap.begin(); i!=attrMap.end(); i++)
+ if (!XMLString::compareString(aname,i->first))
+ break;
+#endif
+ if (i!=attrMap.end())
+ return i->second->build(e);
+
+ // Now check for a Scope attribute to ensure proper value handling whenever possible.
+ DOMElement* n=saml::XML::getFirstChildElement(e,saml::XML::SAML_NS,L(AttributeValue));
+ if (n && n->hasAttributeNS(NULL,ScopedAttribute::Scope))
+ return new ScopedAttribute(e);
+
+ // Just use the default class.
+ return new SAMLAttribute(e);
}
-extern "C" IOriginSiteMapper* XMLTrustMapperFactory(const char* source)
+void ShibConfig::regAttributeMapping(const XMLCh* name, const IAttributeFactory* factory)
{
- return new XMLOriginSiteMapper(source,true);
+ if (name && factory) {
+#ifdef HAVE_GOOD_STL
+ attrMap[name]=factory;
+#else
+ attrMap.insert(make_pair(XMLString::replicate(name),factory));
+#endif
+ }
}
-bool ShibInternalConfig::init()
+void ShibConfig::unregAttributeMapping(const XMLCh* name)
{
- saml::NDC ndc("init");
-
- REGISTER_EXCEPTION_FACTORY(edu.internet2.middleware.shibboleth.common,UnsupportedProtocolException);
- REGISTER_EXCEPTION_FACTORY(edu.internet2.middleware.shibboleth.common,OriginSiteMapperException);
-
- // Register extension schema.
- saml::XML::registerSchema(XML::SHIB_NS,XML::SHIB_SCHEMA_ID);
-
- if (!aapFile.empty())
- {
- try
- {
- m_AAP=new AAP(aapFile.c_str());
- }
- catch(SAMLException& e)
- {
- Category::getInstance(SHIB_LOGCAT".ShibConfig").fatal("init: failed to initialize AAP: %s", e.what());
- return false;
+ if (name) {
+#ifdef HAVE_GOOD_STL
+ attrMap.erase(name);
+#else
+ for (map<XMLCh*,const IAttributeFactory*>::iterator i=attrMap.begin(); i!=attrMap.end(); i++) {
+ if (!XMLString::compareString(name,i->first)) {
+ XMLCh* temp=i->first;
+ XMLString::release(&temp);
+ attrMap.erase(i);
+ break;
+ }
}
+#endif
}
+}
- m_lock=Mutex::create();
- if (!m_lock)
- {
- Category::getInstance(SHIB_LOGCAT".ShibConfig").fatal("init: failed to create mapper lock");
- delete m_AAP;
- return false;
+void ShibConfig::clearAttributeMappings()
+{
+#ifndef HAVE_GOOD_STL
+ for (map<XMLCh*,const IAttributeFactory*>::iterator i=attrMap.begin(); i!=attrMap.end(); i++) {
+ XMLCh* temp=i->first;
+ XMLString::release(&temp);
}
-
- regFactory("edu.internet2.middleware.shibboleth.metadata.origin.XML",&XMLMapperFactory);
- regFactory("edu.internet2.middleware.shibboleth.metadata.origin.XMLTrust",&XMLTrustMapperFactory);
-
- return true;
+#endif
+ attrMap.clear();
}
-void ShibInternalConfig::term()
+extern "C" void openssl_locking_callback(int mode,int n,const char *file,int line)
{
- for (OriginMapperMap::iterator i=m_originMap.begin(); i!=m_originMap.end(); i++)
- delete i->second;
- delete m_lock;
- delete m_AAP;
+ if (mode & CRYPTO_LOCK)
+ g_openssl_locks[n]->lock();
+ else
+ g_openssl_locks[n]->unlock();
}
-void ShibInternalConfig::regFactory(const char* type, OriginSiteMapperFactory* factory)
+#ifndef WIN32
+extern "C" unsigned long openssl_thread_id(void)
{
- if (type && factory)
- m_originFactoryMap[type]=factory;
+ return (unsigned long)(pthread_self());
}
+#endif
-void ShibInternalConfig::unregFactory(const char* type)
+bool ShibConfig::init()
{
- if (type)
- m_originFactoryMap.erase(type);
+ // Set up OpenSSL locking.
+ for (int i=0; i<CRYPTO_num_locks(); i++)
+ g_openssl_locks.push_back(Mutex::create());
+ CRYPTO_set_locking_callback(openssl_locking_callback);
+#ifndef WIN32
+ CRYPTO_set_id_callback(openssl_thread_id);
+#endif
+
+ SAMLAttribute::setFactory(&ShibAttributeFactory);
+ return true;
}
-bool ShibInternalConfig::addMapper(const char* type, const char* source)
+void ShibConfig::term()
{
- saml::NDC ndc("addMapper");
-
- bool ret=false;
- m_lock->lock();
- try
- {
- OriginMapperFactoryMap::const_iterator i=m_originFactoryMap.find(type);
- if (i!=m_originFactoryMap.end())
- {
- if (m_originMap.find(pair<string,string>(type,source))==m_originMap.end())
- {
- m_originMap[pair<string,string>(type,source)]=(i->second)(source);
- ret=true;
- }
- else
- throw OriginSiteMapperException("ShibConfig::addMapper() cannot add a duplicate mapper");
- }
- else
- throw OriginSiteMapperException("ShibConfig::addMapper() unable to locate a mapper factory of the requested type");
-
- }
- catch (SAMLException& e)
- {
- Category::getInstance(SHIB_LOGCAT".ShibConfig").error(
- "failed to add %s mapper to system using source '%s': %s", type, source, e.what()
- );
- }
- catch (...)
- {
- Category::getInstance(SHIB_LOGCAT".ShibConfig").error(
- "failed to add %s mapper to system using source '%s': unknown exception", type, source
- );
- }
- m_lock->unlock();
- return ret;
+ SAMLAttribute::setFactory(NULL);
+ clearAttributeMappings();
+
+ CRYPTO_set_locking_callback(NULL);
+ for (vector<Mutex*>::iterator j=g_openssl_locks.begin(); j!=g_openssl_locks.end(); j++)
+ delete (*j);
+ g_openssl_locks.clear();
}
ShibConfig& ShibConfig::getConfig()