X-Git-Url: http://www.project-moonshot.org/gitweb/?a=blobdiff_plain;f=saml%2Fsaml2%2Fmetadata%2Fimpl%2FMetadataSchemaValidators.cpp;h=79cf31e762fc1f3afaa206643176026e18a569c2;hb=2575452b6d04f4d0e145deb829288497ff400d85;hp=21dffda003d0032944203245844a223493b03ac4;hpb=22719d9c4bff937790ab710728d5927d31784620;p=shibboleth%2Fopensaml2.git diff --git a/saml/saml2/metadata/impl/MetadataSchemaValidators.cpp b/saml/saml2/metadata/impl/MetadataSchemaValidators.cpp index 21dffda..79cf31e 100644 --- a/saml/saml2/metadata/impl/MetadataSchemaValidators.cpp +++ b/saml/saml2/metadata/impl/MetadataSchemaValidators.cpp @@ -1,5 +1,5 @@ /* -* Copyright 2001-2006 Internet2 +* Copyright 2001-2007 Internet2 * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -24,21 +24,27 @@ #include "exceptions.h" #include "saml2/metadata/Metadata.h" +#include + using namespace opensaml::saml2md; using namespace opensaml::saml2; using namespace opensaml; using namespace xmltooling; using namespace std; +using samlconstants::SAML20MD_NS; +using samlconstants::SAML20MD_QUERY_EXT_NS; namespace opensaml { namespace saml2md { + XMLOBJECTVALIDATOR_SIMPLE(SAML_DLLLOCAL,ActionNamespace); XMLOBJECTVALIDATOR_SIMPLE(SAML_DLLLOCAL,AffiliateMember); XMLOBJECTVALIDATOR_SIMPLE(SAML_DLLLOCAL,AttributeProfile); XMLOBJECTVALIDATOR_SIMPLE(SAML_DLLLOCAL,Company); XMLOBJECTVALIDATOR_SIMPLE(SAML_DLLLOCAL,EmailAddress); XMLOBJECTVALIDATOR_SIMPLE(SAML_DLLLOCAL,GivenName); XMLOBJECTVALIDATOR_SIMPLE(SAML_DLLLOCAL,NameIDFormat); + XMLOBJECTVALIDATOR_SIMPLE(SAML_DLLLOCAL,SourceID); XMLOBJECTVALIDATOR_SIMPLE(SAML_DLLLOCAL,SurName); XMLOBJECTVALIDATOR_SIMPLE(SAML_DLLLOCAL,TelephoneNumber); @@ -68,7 +74,7 @@ namespace opensaml { public: void operator()(const XMLObject* xmlObject) const { const XMLCh* ns=xmlObject->getElementQName().getNamespaceURI(); - if (XMLString::equals(ns,SAMLConstants::SAML20MD_NS) || !ns || !*ns) { + if (XMLString::equals(ns,SAML20MD_NS) || !ns || !*ns) { throw ValidationException( "Object contains an illegal extension child element ($1).", params(1,xmlObject->getElementQName().toString().c_str()) @@ -80,7 +86,7 @@ namespace opensaml { BEGIN_XMLOBJECTVALIDATOR(SAML_DLLLOCAL,Extensions); if (!ptr->hasChildren()) throw ValidationException("Extensions must have at least one child element."); - const list& anys=ptr->getXMLObjects(); + const vector& anys=ptr->getUnknownXMLObjects(); for_each(anys.begin(),anys.end(),checkWildcardNS()); END_XMLOBJECTVALIDATOR; @@ -121,13 +127,13 @@ namespace opensaml { BEGIN_XMLOBJECTVALIDATOR(SAML_DLLLOCAL,EndpointType); XMLOBJECTVALIDATOR_REQUIRE(EndpointType,Binding); XMLOBJECTVALIDATOR_REQUIRE(EndpointType,Location); - const list& anys=ptr->getXMLObjects(); + const vector& anys=ptr->getUnknownXMLObjects(); for_each(anys.begin(),anys.end(),checkWildcardNS()); END_XMLOBJECTVALIDATOR; BEGIN_XMLOBJECTVALIDATOR_SUB(SAML_DLLLOCAL,IndexedEndpointType,EndpointType); EndpointTypeSchemaValidator::validate(xmlObject); - XMLOBJECTVALIDATOR_REQUIRE(IndexedEndpointType,Index); + XMLOBJECTVALIDATOR_REQUIRE_INTEGER(IndexedEndpointType,Index); END_XMLOBJECTVALIDATOR; BEGIN_XMLOBJECTVALIDATOR_SUB(SAML_DLLLOCAL,ArtifactResolutionService,IndexedEndpointType); @@ -172,7 +178,7 @@ namespace opensaml { END_XMLOBJECTVALIDATOR; BEGIN_XMLOBJECTVALIDATOR(SAML_DLLLOCAL,AttributeConsumingService); - XMLOBJECTVALIDATOR_REQUIRE(AttributeConsumingService,Index); + XMLOBJECTVALIDATOR_REQUIRE_INTEGER(AttributeConsumingService,Index); XMLOBJECTVALIDATOR_NONEMPTY(AttributeConsumingService,ServiceName); XMLOBJECTVALIDATOR_NONEMPTY(AttributeConsumingService,RequestedAttribute); END_XMLOBJECTVALIDATOR; @@ -243,21 +249,21 @@ namespace opensaml { }; #define REGISTER_ELEMENT(cname) \ - q=QName(SAMLConstants::SAML20MD_NS,cname::LOCAL_NAME); \ + q=QName(SAML20MD_NS,cname::LOCAL_NAME); \ XMLObjectBuilder::registerBuilder(q,new cname##Builder()); \ - Validator::registerValidator(q,new cname##SchemaValidator()) + SchemaValidators.registerValidator(q,new cname##SchemaValidator()) #define REGISTER_TYPE(cname) \ - q=QName(SAMLConstants::SAML20MD_NS,cname::TYPE_NAME); \ + q=QName(SAML20MD_NS,cname::TYPE_NAME); \ XMLObjectBuilder::registerBuilder(q,new cname##Builder()); \ - Validator::registerValidator(q,new cname##SchemaValidator()) + SchemaValidators.registerValidator(q,new cname##SchemaValidator()) #define REGISTER_ELEMENT_NOVAL(cname) \ - q=QName(SAMLConstants::SAML20MD_NS,cname::LOCAL_NAME); \ + q=QName(SAML20MD_NS,cname::LOCAL_NAME); \ XMLObjectBuilder::registerBuilder(q,new cname##Builder()); #define REGISTER_TYPE_NOVAL(cname) \ - q=QName(SAMLConstants::SAML20MD_NS,cname::TYPE_NAME); \ + q=QName(SAML20MD_NS,cname::TYPE_NAME); \ XMLObjectBuilder::registerBuilder(q,new cname##Builder()); void opensaml::saml2md::registerMetadataClasses() { @@ -319,4 +325,27 @@ void opensaml::saml2md::registerMetadataClasses() { REGISTER_TYPE(PDPDescriptor); REGISTER_TYPE(RequestedAttribute); REGISTER_TYPE(SPSSODescriptor); + + q=QName(SAML20MD_NS,xmlencryption::EncryptionMethod::LOCAL_NAME); + XMLObjectBuilder::registerBuilder(q,new xmlencryption::EncryptionMethodBuilder()); + + q=QName(samlconstants::SAML1MD_NS,SourceID::LOCAL_NAME); + XMLObjectBuilder::registerBuilder(q,new SourceIDBuilder()); + SchemaValidators.registerValidator(q,new SourceIDSchemaValidator()); + + q=QName(SAML20MD_QUERY_EXT_NS,ActionNamespace::LOCAL_NAME); + XMLObjectBuilder::registerBuilder(q,new ActionNamespaceBuilder()); + SchemaValidators.registerValidator(q,new ActionNamespaceSchemaValidator()); + + q=QName(SAML20MD_QUERY_EXT_NS,AuthnQueryDescriptorType::TYPE_NAME); + XMLObjectBuilder::registerBuilder(q,new AuthnQueryDescriptorTypeBuilder()); + SchemaValidators.registerValidator(q,new RoleDescriptorSchemaValidator()); + + q=QName(SAML20MD_QUERY_EXT_NS,AttributeQueryDescriptorType::TYPE_NAME); + XMLObjectBuilder::registerBuilder(q,new AttributeQueryDescriptorTypeBuilder()); + SchemaValidators.registerValidator(q,new RoleDescriptorSchemaValidator()); + + q=QName(SAML20MD_QUERY_EXT_NS,AuthzDecisionQueryDescriptorType::TYPE_NAME); + XMLObjectBuilder::registerBuilder(q,new AuthzDecisionQueryDescriptorTypeBuilder()); + SchemaValidators.registerValidator(q,new RoleDescriptorSchemaValidator()); }