X-Git-Url: http://www.project-moonshot.org/gitweb/?a=blobdiff_plain;f=samltest%2Fbinding.h;h=3564bb1d752d9a3d20a3b7d8d2eca9cd60193074;hb=d32e79ee96d146f3fd1a384ddb1675e048a75f20;hp=d92280f24d1b8d6b880e5bc56f62f94bc637e0b3;hpb=0cd2ac24566bb0881143d8a9a3428292e6ad19a8;p=shibboleth%2Fcpp-opensaml.git diff --git a/samltest/binding.h b/samltest/binding.h index d92280f..3564bb1 100644 --- a/samltest/binding.h +++ b/samltest/binding.h @@ -1,5 +1,5 @@ /* - * Copyright 2001-2006 Internet2 + * Copyright 2001-2007 Internet2 * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -17,15 +17,18 @@ #include "internal.h" #include -#include -#include #include #include -#include +#include +#include #include -#include +#include +#include +#include +#include -using namespace saml2md; +using namespace opensaml::saml2md; +using namespace opensaml; using namespace xmlsignature; class SAMLBindingBaseTestCase : public HTTPRequest, public HTTPResponse @@ -33,7 +36,7 @@ class SAMLBindingBaseTestCase : public HTTPRequest, public HTTPResponse protected: CredentialResolver* m_creds; MetadataProvider* m_metadata; - opensaml::TrustEngine* m_trust; + TrustEngine* m_trust; map m_fields; map m_headers; string m_method,m_url,m_query; @@ -63,7 +66,7 @@ public: doc->getDocumentElement()->setAttributeNS(NULL,path.get(),file.get()); m_metadata = SAMLConfig::getConfig().MetadataProviderManager.newPlugin( - FILESYSTEM_METADATA_PROVIDER,doc->getDocumentElement() + XML_METADATA_PROVIDER,doc->getDocumentElement() ); m_metadata->init(); @@ -75,12 +78,11 @@ public: FILESYSTEM_CREDENTIAL_RESOLVER,doc2->getDocumentElement() ); - m_trust = SAMLConfig::getConfig().TrustEngineManager.newPlugin(EXPLICIT_KEY_SAMLTRUSTENGINE, NULL); + m_trust = XMLToolingConfig::getConfig().TrustEngineManager.newPlugin(EXPLICIT_KEY_TRUSTENGINE, NULL); m_rules.push_back(SAMLConfig::getConfig().SecurityPolicyRuleManager.newPlugin(MESSAGEFLOW_POLICY_RULE,NULL)); - m_rules.push_back(SAMLConfig::getConfig().SecurityPolicyRuleManager.newPlugin(MESSAGEROUTING_POLICY_RULE,NULL)); - m_rules.push_back(SAMLConfig::getConfig().SecurityPolicyRuleManager.newPlugin(MESSAGESIGNING_POLICY_RULE,NULL)); m_rules.push_back(SAMLConfig::getConfig().SecurityPolicyRuleManager.newPlugin(SIMPLESIGNING_POLICY_RULE,NULL)); + m_rules.push_back(SAMLConfig::getConfig().SecurityPolicyRuleManager.newPlugin(XMLSIGNING_POLICY_RULE,NULL)); } catch (XMLToolingException& ex) { TS_TRACE(ex.what()); @@ -116,8 +118,12 @@ public: return "https"; } - bool isSecure() const { - return true; + const char* getHostname() const { + return "localhost"; + } + + int getPort() const { + return 443; } string getContentType() const { @@ -128,6 +134,10 @@ public: return -1; } + const char* getRequestURI() const { + return "/"; + } + const char* getRequestURL() const { return m_url.c_str(); } @@ -172,18 +182,10 @@ public: // HTTPResponse methods - void setHeader(const char* name, const char* value) { + void setResponseHeader(const char* name, const char* value) { m_headers[name] = value ? value : ""; } - void setContentType(const char* type) { - setHeader("Content-Type", type); - } - - void setCookie(const char* name, const char* value) { - m_headers["Set-Cookie"] = string(name) + "=" + (value ? value : ""); - } - // The amount of error checking missing from this is incredible, but as long // as the test data isn't unexpected or malformed, it should work. @@ -202,7 +204,7 @@ public: pch=strchr(pch,'&'); if (pch) *pch++=0; - SAMLConfig::getConfig().getURLEncoder()->decode(value); + XMLToolingConfig::getConfig().getURLEncoder()->decode(value); m_fields[name] = value; name = pch; } @@ -238,6 +240,8 @@ public: return decoded; } + using HTTPResponse::sendResponse; + long sendResponse(std::istream& inputStream, long status) { m_method="POST"; string page,line;