X-Git-Url: http://www.project-moonshot.org/gitweb/?a=blobdiff_plain;f=saml%2FSAMLConfig.cpp;h=49869c2b7e48ef3db191427fb87071251fa16aff;hb=5d4b679f292a46494e822e9634f0ffa06f8f421c;hp=5d342219e5ed4117df029e4954d926236017a9e0;hpb=ceba6432d156e82a9016190c06ae4640c651a257;p=shibboleth%2Fcpp-opensaml.git diff --git a/saml/SAMLConfig.cpp b/saml/SAMLConfig.cpp index 5d34221..49869c2 100644 --- a/saml/SAMLConfig.cpp +++ b/saml/SAMLConfig.cpp @@ -1,6 +1,6 @@ /* - * Copyright 2001-2006 Internet2 + * Copyright 2001-2007 Internet2 * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -28,13 +28,13 @@ #include "binding/MessageDecoder.h" #include "binding/MessageEncoder.h" #include "binding/SAMLArtifact.h" -#include "binding/URLEncoder.h" +#include "binding/SecurityPolicyRule.h" #include "saml1/core/Assertions.h" #include "saml1/core/Protocols.h" #include "saml2/core/Protocols.h" #include "saml2/metadata/Metadata.h" +#include "saml2/metadata/MetadataFilter.h" #include "saml2/metadata/MetadataProvider.h" -#include "security/TrustEngine.h" #include "util/SAMLConstants.h" #include @@ -45,7 +45,6 @@ #include #include #include -#include using namespace opensaml; using namespace xmlsignature; @@ -67,9 +66,14 @@ extern "C" void SAML_API xmltooling_extension_term() SAMLConfig::getConfig().term(false); } -DECL_EXCEPTION_FACTORY(ArtifactException,opensaml); -DECL_EXCEPTION_FACTORY(MetadataFilterException,opensaml::saml2md); -DECL_EXCEPTION_FACTORY(BindingException,opensaml); +DECL_XMLTOOLING_EXCEPTION_FACTORY(ArtifactException,opensaml); +DECL_XMLTOOLING_EXCEPTION_FACTORY(SecurityPolicyException,opensaml); +DECL_XMLTOOLING_EXCEPTION_FACTORY(MetadataException,opensaml::saml2md); +DECL_XMLTOOLING_EXCEPTION_FACTORY(MetadataFilterException,opensaml::saml2md); +DECL_XMLTOOLING_EXCEPTION_FACTORY(BindingException,opensaml); +DECL_XMLTOOLING_EXCEPTION_FACTORY(ProfileException,opensaml); +DECL_XMLTOOLING_EXCEPTION_FACTORY(FatalProfileException,opensaml); +DECL_XMLTOOLING_EXCEPTION_FACTORY(RetryableProfileException,opensaml); namespace opensaml { SAMLInternalConfig g_config; @@ -91,12 +95,6 @@ void SAMLConfig::setArtifactMap(ArtifactMap* artifactMap) m_artifactMap = artifactMap; } -void SAMLConfig::setURLEncoder(URLEncoder* urlEncoder) -{ - delete m_urlEncoder; - m_urlEncoder = urlEncoder; -} - bool SAMLInternalConfig::init(bool initXMLTooling) { #ifdef _DEBUG @@ -110,9 +108,14 @@ bool SAMLInternalConfig::init(bool initXMLTooling) log.debug("XMLTooling library initialized"); } - REGISTER_EXCEPTION_FACTORY(ArtifactException,opensaml); - REGISTER_EXCEPTION_FACTORY(MetadataFilterException,opensaml::saml2md); - REGISTER_EXCEPTION_FACTORY(BindingException,opensaml); + REGISTER_XMLTOOLING_EXCEPTION_FACTORY(ArtifactException,opensaml); + REGISTER_XMLTOOLING_EXCEPTION_FACTORY(SecurityPolicyException,opensaml); + REGISTER_XMLTOOLING_EXCEPTION_FACTORY(MetadataException,opensaml::saml2md); + REGISTER_XMLTOOLING_EXCEPTION_FACTORY(MetadataFilterException,opensaml::saml2md); + REGISTER_XMLTOOLING_EXCEPTION_FACTORY(BindingException,opensaml); + REGISTER_XMLTOOLING_EXCEPTION_FACTORY(ProfileException,opensaml); + REGISTER_XMLTOOLING_EXCEPTION_FACTORY(FatalProfileException,opensaml); + REGISTER_XMLTOOLING_EXCEPTION_FACTORY(RetryableProfileException,opensaml); saml1::registerAssertionClasses(); saml1p::registerProtocolClasses(); @@ -122,12 +125,9 @@ bool SAMLInternalConfig::init(bool initXMLTooling) saml2md::registerMetadataProviders(); saml2md::registerMetadataFilters(); registerSAMLArtifacts(); - registerTrustEngines(); registerMessageEncoders(); registerMessageDecoders(); registerSecurityPolicyRules(); - - m_urlEncoder = new URLEncoder(); log.info("library initialization complete"); return true; @@ -142,7 +142,6 @@ void SAMLInternalConfig::term(bool termXMLTooling) MessageDecoderManager.deregisterFactories(); MessageEncoderManager.deregisterFactories(); - TrustEngineManager.deregisterFactories(); SecurityPolicyRuleManager.deregisterFactories(); SAMLArtifactManager.deregisterFactories(); MetadataFilterManager.deregisterFactories(); @@ -150,8 +149,6 @@ void SAMLInternalConfig::term(bool termXMLTooling) delete m_artifactMap; m_artifactMap = NULL; - delete m_urlEncoder; - m_urlEncoder = NULL; if (termXMLTooling) { XMLToolingConfig::getConfig().term(); @@ -220,22 +217,6 @@ string SAMLInternalConfig::hashSHA1(const char* s, bool toHex) throw XMLSecurityException("Unable to generate SHA-1 hash."); } -void opensaml::log_openssl() -{ - const char* file; - const char* data; - int flags,line; - - unsigned long code=ERR_get_error_line_data(&file,&line,&data,&flags); - while (code) { - Category& log=Category::getInstance("OpenSSL"); - log.errorStream() << "error code: " << code << " in " << file << ", line " << line << CategoryStream::ENDLINE; - if (data && (flags & ERR_TXT_STRING)) - log.errorStream() << "error data: " << data << CategoryStream::ENDLINE; - code=ERR_get_error_line_data(&file,&line,&data,&flags); - } -} - using namespace saml2md; void opensaml::annotateException(XMLToolingException* e, const EntityDescriptor* entity, bool rethrow)