#define __shibsp_sessioncache_h__
#include <shibsp/base.h>
-#include <saml/saml1/core/Assertions.h>
-#include <saml/saml2/metadata/Metadata.h>
+#ifndef SHIBSP_LITE
+# include <saml/saml1/core/Assertions.h>
+# include <saml/saml2/metadata/Metadata.h>
+#endif
#include <xmltooling/Lockable.h>
+#include <xmltooling/io/HTTPRequest.h>
+#include <xmltooling/io/HTTPResponse.h>
namespace shibsp {
class SHIBSP_API Application;
class SHIBSP_API Attribute;
+ /**
+ * Encapsulates access to a user's security session.
+ *
+ * <p>The SessionCache does not itself require locking to manage
+ * concurrency, but access to each Session is generally exclusive
+ * or at least controlled, and the caller must unlock a Session
+ * to dispose of it.
+ */
class SHIBSP_API Session : public virtual xmltooling::Lockable
{
MAKE_NONCOPYABLE(Session);
virtual ~Session() {}
public:
/**
+ * Returns the session key.
+ *
+ * @return unique ID of session
+ */
+ virtual const char* getID() const=0;
+
+ /**
+ * Returns the session's application ID.
+ *
+ * @return unique ID of application bound to session
+ */
+ virtual const char* getApplicationID() const=0;
+
+ /**
+ * Returns the session expiration.
+ *
+ * @return the session's expiration time or 0 for none
+ */
+ virtual time_t getExpiration() const=0;
+
+ /**
+ * Returns the last access time of the session.
+ *
+ * @return the session's last access time
+ */
+ virtual time_t getLastAccess() const=0;
+
+ /**
* Returns the address of the client associated with the session.
*
* @return the client's network address
* @return the IdP's entityID
*/
virtual const char* getEntityID() const=0;
-
+
+ /**
+ * Returns the protocol family used to initiate the session.
+ *
+ * @return the protocol constant that represents the general SSO protocol used
+ */
+ virtual const char* getProtocol() const=0;
+
/**
* Returns the UTC timestamp on the authentication event at the IdP.
*
*/
virtual const char* getAuthnInstant() const=0;
+#ifndef SHIBSP_LITE
/**
* Returns the NameID associated with a session.
*
* @return a SAML 2.0 NameID associated with the session, if any
*/
virtual const opensaml::saml2::NameID* getNameID() const=0;
+#endif
/**
* Returns the SessionIndex provided with the session.
/**
* Returns the resolved attributes associated with the session.
*
- * @return an immutable map of attributes keyed by attribute ID
+ * @return an immutable array of attributes
*/
- virtual const std::map<std::string,const Attribute*>& getAttributes() const=0;
-
+ virtual const std::vector<Attribute*>& getAttributes() const=0;
+
/**
- * Adds additional attributes to the session.
+ * Returns the resolved attributes associated with the session, indexed by ID
*
- * @param attributes reference to an array of Attributes to cache (will be freed by cache)
+ * @return an immutable map of attributes keyed by attribute ID
*/
- virtual void addAttributes(const std::vector<Attribute*>& attributes)=0;
+ virtual const std::multimap<std::string,const Attribute*>& getIndexedAttributes() const=0;
/**
* Returns the identifiers of the assertion(s) cached by the session.
*/
virtual const std::vector<const char*>& getAssertionIDs() const=0;
+#ifndef SHIBSP_LITE
+ /**
+ * Adds additional attributes to the session.
+ *
+ * @param attributes reference to an array of Attributes to cache (will be freed by cache)
+ */
+ virtual void addAttributes(const std::vector<Attribute*>& attributes)=0;
+
/**
* Returns an assertion cached by the session.
*
* @param assertion pointer to an assertion to cache (will be freed by cache)
*/
virtual void addAssertion(opensaml::Assertion* assertion)=0;
+#endif
};
/**
{
MAKE_NONCOPYABLE(SessionCache);
protected:
-
- /**
- * Constructor
- *
- * <p>The following XML content is supported to configure the cache:
- * <dl>
- * <dt>cacheTimeout</dt>
- * <dd>attribute containing maximum lifetime in seconds for unused sessions to remain in cache</dd>
- * </dl>
- *
- * @param e root of DOM tree to configure the cache
- */
- SessionCache(const xercesc::DOMElement* e);
-
- /** maximum lifetime in seconds for unused sessions to be cached */
- unsigned long m_cacheTimeout;
-
+ SessionCache() {}
public:
virtual ~SessionCache() {}
+#ifndef SHIBSP_LITE
/**
- * Inserts a new session into the cache.
+ * Inserts a new session into the cache and binds the session to the outgoing
+ * client response.
*
- * <p>The SSO token remains owned by the caller and is copied by the
- * cache. Any Attributes supplied become the property of the cache.
+ * <p>The SSO tokens and Attributes remain owned by the caller and are copied by the cache.
*
- * @param expires expiration time of session
* @param application reference to Application that owns the Session
- * @param client_addr network address of client
+ * @param httpRequest request that initiated session
+ * @param httpResponse current response to client
+ * @param expires expiration time of session
* @param issuer issuing metadata of assertion issuer, if known
+ * @param protocol protocol family used to initiate the session
* @param nameid principal identifier, normalized to SAML 2, if any
* @param authn_instant UTC timestamp of authentication at IdP, if known
* @param session_index index of session between principal and IdP, if any
* @param authncontext_class method/category of authentication event, if known
* @param authncontext_decl specifics of authentication event, if known
* @param tokens assertions to cache with session, if any
- * @param attributes optional set of resolved Attributes to cache with session
- * @return newly created session's key
+ * @param attributes optional array of resolved Attributes to cache with session
*/
- virtual std::string insert(
- time_t expires,
+ virtual void insert(
const Application& application,
- const char* client_addr=NULL,
+ const xmltooling::HTTPRequest& httpRequest,
+ xmltooling::HTTPResponse& httpResponse,
+ time_t expires,
const opensaml::saml2md::EntityDescriptor* issuer=NULL,
+ const XMLCh* protocol=NULL,
const opensaml::saml2::NameID* nameid=NULL,
- const char* authn_instant=NULL,
- const char* session_index=NULL,
- const char* authncontext_class=NULL,
- const char* authncontext_decl=NULL,
+ const XMLCh* authn_instant=NULL,
+ const XMLCh* session_index=NULL,
+ const XMLCh* authncontext_class=NULL,
+ const XMLCh* authncontext_decl=NULL,
const std::vector<const opensaml::Assertion*>* tokens=NULL,
const std::vector<Attribute*>* attributes=NULL
)=0;
/**
- * Locates an existing session.
+ * Determines whether the Session bound to a client request matches a set of input criteria.
+ *
+ * @param application reference to Application that owns the Session
+ * @param request request in which to locate Session
+ * @param issuer required source of session(s)
+ * @param nameid required name identifier
+ * @param indexes session indexes
+ * @return true iff the Session exists and matches the input criteria
+ */
+ virtual bool matches(
+ const Application& application,
+ const xmltooling::HTTPRequest& request,
+ const opensaml::saml2md::EntityDescriptor* issuer,
+ const opensaml::saml2::NameID& nameid,
+ const std::set<std::string>* indexes
+ )=0;
+
+ /**
+ * Executes a test of the cache's general health.
+ */
+ virtual void test()=0;
+#endif
+
+ /**
+ * Returns the ID of the session bound to the specified client request, if possible.
+ *
+ * @param application reference to Application that owns the Session
+ * @param request request from client containing session, or a reference to it
+ * @return ID of session, if any known, or an empty string
+ */
+ virtual std::string active(const Application& application, const xmltooling::HTTPRequest& request)=0;
+
+ /**
+ * Locates an existing session bound to a request.
*
* <p>If the client address is supplied, then a check will be performed against
* the address recorded in the record.
*
- * @param key session key
* @param application reference to Application that owns the Session
+ * @param request request from client containing session, or a reference to it
* @param client_addr network address of client (if known)
- * @param timeout inactivity timeout to enforce (0 for none)
+ * @param timeout inactivity timeout to enforce (0 for none, NULL to bypass check/update of last access)
* @return pointer to locked Session, or NULL
*/
- virtual Session* find(const char* key, const Application& application, const char* client_addr=NULL, time_t timeout=0)=0;
-
+ virtual Session* find(
+ const Application& application, const xmltooling::HTTPRequest& request, const char* client_addr=NULL, time_t* timeout=NULL
+ )=0;
+
/**
- * Deletes an existing session.
+ * Deletes an existing session bound to a request.
*
- * @param key session key
* @param application reference to Application that owns the Session
- * @param client_addr network address of client (if known)
+ * @param request request from client containing session, or a reference to it
+ * @param response optional response to client enabling removal of session or reference
*/
- virtual void remove(const char* key, const Application& application, const char* client_addr)=0;
+ virtual void remove(const Application& application, const xmltooling::HTTPRequest& request, xmltooling::HTTPResponse* response=NULL)=0;
};
- /** SessionCache implementation that delegates to a remoted version. */
- #define REMOTED_SESSION_CACHE "Remoted"
-
/** SessionCache implementation backed by a StorageService. */
#define STORAGESERVICE_SESSION_CACHE "StorageService"