X-Git-Url: http://www.project-moonshot.org/gitweb/?a=blobdiff_plain;f=samltest%2Fbinding.h;h=cdaa3bc1451654fa0c2bada70728e1ec5a98ff97;hb=b77db92eb98aa1692101a1823fdf0ea700dd35e4;hp=b412be8173760d1ee966add9dfdb6a0a2354b57f;hpb=a30857e2c0f4bcd1817aa2939ffdc0856e93a533;p=shibboleth%2Fcpp-opensaml.git diff --git a/samltest/binding.h b/samltest/binding.h index b412be8..cdaa3bc 100644 --- a/samltest/binding.h +++ b/samltest/binding.h @@ -1,5 +1,5 @@ /* - * Copyright 2001-2006 Internet2 + * Copyright 2001-2007 Internet2 * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -17,16 +17,18 @@ #include "internal.h" #include -#include -#include #include #include -#include +#include #include #include +#include +#include #include +#include using namespace opensaml::saml2md; +using namespace opensaml; using namespace xmlsignature; class SAMLBindingBaseTestCase : public HTTPRequest, public HTTPResponse @@ -39,7 +41,8 @@ protected: map m_headers; string m_method,m_url,m_query; vector m_clientCerts; - vector m_rules; + vector m_rules1; + vector m_rules2; public: void setUp() { @@ -64,7 +67,7 @@ public: doc->getDocumentElement()->setAttributeNS(NULL,path.get(),file.get()); m_metadata = SAMLConfig::getConfig().MetadataProviderManager.newPlugin( - FILESYSTEM_METADATA_PROVIDER,doc->getDocumentElement() + XML_METADATA_PROVIDER,doc->getDocumentElement() ); m_metadata->init(); @@ -78,9 +81,15 @@ public: m_trust = XMLToolingConfig::getConfig().TrustEngineManager.newPlugin(EXPLICIT_KEY_TRUSTENGINE, NULL); - m_rules.push_back(SAMLConfig::getConfig().SecurityPolicyRuleManager.newPlugin(MESSAGEFLOW_POLICY_RULE,NULL)); - m_rules.push_back(SAMLConfig::getConfig().SecurityPolicyRuleManager.newPlugin(SIMPLESIGNING_POLICY_RULE,NULL)); - m_rules.push_back(SAMLConfig::getConfig().SecurityPolicyRuleManager.newPlugin(XMLSIGNING_POLICY_RULE,NULL)); + m_rules1.push_back(SAMLConfig::getConfig().SecurityPolicyRuleManager.newPlugin(SAML1MESSAGE_POLICY_RULE,NULL)); + m_rules1.push_back(SAMLConfig::getConfig().SecurityPolicyRuleManager.newPlugin(MESSAGEFLOW_POLICY_RULE,NULL)); + m_rules1.push_back(SAMLConfig::getConfig().SecurityPolicyRuleManager.newPlugin(SIMPLESIGNING_POLICY_RULE,NULL)); + m_rules1.push_back(SAMLConfig::getConfig().SecurityPolicyRuleManager.newPlugin(XMLSIGNING_POLICY_RULE,NULL)); + + m_rules2.push_back(SAMLConfig::getConfig().SecurityPolicyRuleManager.newPlugin(SAML2MESSAGE_POLICY_RULE,NULL)); + m_rules2.push_back(SAMLConfig::getConfig().SecurityPolicyRuleManager.newPlugin(MESSAGEFLOW_POLICY_RULE,NULL)); + m_rules2.push_back(SAMLConfig::getConfig().SecurityPolicyRuleManager.newPlugin(SIMPLESIGNING_POLICY_RULE,NULL)); + m_rules2.push_back(SAMLConfig::getConfig().SecurityPolicyRuleManager.newPlugin(XMLSIGNING_POLICY_RULE,NULL)); } catch (XMLToolingException& ex) { TS_TRACE(ex.what()); @@ -91,8 +100,10 @@ public: } void tearDown() { - for_each(m_rules.begin(), m_rules.end(), xmltooling::cleanup()); - m_rules.clear(); + for_each(m_rules1.begin(), m_rules1.end(), xmltooling::cleanup()); + m_rules1.clear(); + for_each(m_rules2.begin(), m_rules2.end(), xmltooling::cleanup()); + m_rules2.clear(); delete m_creds; delete m_metadata; delete m_trust; @@ -116,8 +127,12 @@ public: return "https"; } - bool isSecure() const { - return true; + const char* getHostname() const { + return "localhost"; + } + + int getPort() const { + return 443; } string getContentType() const { @@ -128,6 +143,10 @@ public: return -1; } + const char* getRequestURI() const { + return "/"; + } + const char* getRequestURL() const { return m_url.c_str(); } @@ -172,18 +191,10 @@ public: // HTTPResponse methods - void setHeader(const char* name, const char* value) { + void setResponseHeader(const char* name, const char* value) { m_headers[name] = value ? value : ""; } - void setContentType(const char* type) { - setHeader("Content-Type", type); - } - - void setCookie(const char* name, const char* value) { - m_headers["Set-Cookie"] = string(name) + "=" + (value ? value : ""); - } - // The amount of error checking missing from this is incredible, but as long // as the test data isn't unexpected or malformed, it should work. @@ -202,7 +213,7 @@ public: pch=strchr(pch,'&'); if (pch) *pch++=0; - SAMLConfig::getConfig().getURLEncoder()->decode(value); + XMLToolingConfig::getConfig().getURLEncoder()->decode(value); m_fields[name] = value; name = pch; } @@ -238,13 +249,7 @@ public: return decoded; } - long sendResponse(std::istream& inputStream) { - return sendResponse(inputStream, HTTPResponse::SAML_HTTP_STATUS_OK); - } - - long sendError(std::istream& inputStream) { - return sendResponse(inputStream, HTTPResponse::SAML_HTTP_STATUS_ERROR); - } + using HTTPResponse::sendResponse; long sendResponse(std::istream& inputStream, long status) { m_method="POST";