X-Git-Url: http://www.project-moonshot.org/gitweb/?a=blobdiff_plain;f=xmltooling%2FXMLToolingConfig.cpp;h=5427e6fa7c5c208e7f81377eb3ed5dadc14260b0;hb=a514742cd7ede892f18ad7e2deefed1c1712a517;hp=7b9d378942f78ab15f714c3d7c5745cff3e2d644;hpb=a84e39caa065a850880467b8eeaf2061bccfbf6d;p=shibboleth%2Fcpp-xmltooling.git diff --git a/xmltooling/XMLToolingConfig.cpp b/xmltooling/XMLToolingConfig.cpp index 7b9d378..5427e6f 100644 --- a/xmltooling/XMLToolingConfig.cpp +++ b/xmltooling/XMLToolingConfig.cpp @@ -23,10 +23,14 @@ #include "internal.h" #include "exceptions.h" #include "XMLToolingConfig.h" +#include "encryption/Encryption.h" #include "impl/UnknownElement.h" -#include "signature/KeyInfo.h" -#include "signature/Signature.h" +#include "security/TrustEngine.h" +#include "security/OpenSSLCryptoX509CRL.h" +#include "signature/CredentialResolver.h" +#include "soap/SOAP.h" #include "util/NDC.h" +#include "util/StorageService.h" #include "util/XMLConstants.h" #include "validation/Validator.h" @@ -34,16 +38,18 @@ # include #endif +#include #include #include #include #include #ifndef XMLTOOLING_NO_XMLSEC #include + #include #endif -#include - +using namespace soap11; +using namespace xmlencryption; using namespace xmlsignature; using namespace xmltooling; using namespace log4cpp; @@ -57,6 +63,8 @@ DECL_EXCEPTION_FACTORY(UnknownElementException,xmltooling); DECL_EXCEPTION_FACTORY(UnknownAttributeException,xmltooling); DECL_EXCEPTION_FACTORY(UnknownExtensionException,xmltooling); DECL_EXCEPTION_FACTORY(ValidationException,xmltooling); +DECL_EXCEPTION_FACTORY(XMLSecurityException,xmltooling); +DECL_EXCEPTION_FACTORY(IOException,xmltooling); #ifndef XMLTOOLING_NO_XMLSEC DECL_EXCEPTION_FACTORY(SignatureException,xmlsignature); @@ -156,11 +164,29 @@ bool XMLToolingInternalConfig::init() m_parserPool=new ParserPool(); m_validatingPool=new ParserPool(true,true); m_lock=xercesc::XMLPlatformUtils::makeMutex(); + + // Load catalogs from path. + if (!catalog_path.empty()) { + char* catpath=strdup(catalog_path.c_str()); + char* sep=NULL; + char* start=catpath; + while (start && *start) { + sep=strchr(start,PATH_SEPARATOR_CHAR); + if (sep) + *sep=0; + auto_ptr_XMLCh temp(start); + m_validatingPool->loadCatalog(temp.get()); + start = sep ? sep + 1 : NULL; + } + free(catpath); + } // default registrations XMLObjectBuilder::registerDefaultBuilder(new UnknownElementBuilder()); registerKeyInfoClasses(); + registerEncryptionClasses(); + registerSOAPClasses(); REGISTER_EXCEPTION_FACTORY(XMLParserException,xmltooling); REGISTER_EXCEPTION_FACTORY(XMLObjectException,xmltooling); @@ -169,11 +195,21 @@ bool XMLToolingInternalConfig::init() REGISTER_EXCEPTION_FACTORY(UnknownElementException,xmltooling); REGISTER_EXCEPTION_FACTORY(UnknownAttributeException,xmltooling); REGISTER_EXCEPTION_FACTORY(ValidationException,xmltooling); + REGISTER_EXCEPTION_FACTORY(XMLSecurityException,xmltooling); + REGISTER_EXCEPTION_FACTORY(IOException,xmltooling); #ifndef XMLTOOLING_NO_XMLSEC XMLObjectBuilder::registerBuilder(QName(XMLConstants::XMLSIG_NS,Signature::LOCAL_NAME),new SignatureBuilder()); REGISTER_EXCEPTION_FACTORY(SignatureException,xmlsignature); + registerKeyResolvers(); + registerCredentialResolvers(); + registerTrustEngines(); #endif + registerStorageServices(); + + // Register xml:id as an ID attribute. + static const XMLCh xmlid[] = UNICODE_LITERAL_2(i,d); + AttributeExtensibleXMLObject::registerIDAttribute(QName(XMLConstants::XML_NS, xmlid)); } catch (const xercesc::XMLException&) { log.fatal("caught exception while initializing Xerces"); @@ -186,9 +222,16 @@ bool XMLToolingInternalConfig::init() void XMLToolingInternalConfig::term() { + SchemaValidators.destroyValidators(); XMLObjectBuilder::destroyBuilders(); - Validator::destroyValidators(); XMLToolingException::deregisterFactories(); + AttributeExtensibleXMLObject::deregisterIDAttributes(); + +#ifndef XMLTOOLING_NO_XMLSEC + TrustEngineManager.deregisterFactories(); + CredentialResolverManager.deregisterFactories(); + KeyResolverManager.deregisterFactories(); +#endif for (vector::reverse_iterator i=m_libhandles.rbegin(); i!=m_libhandles.rend(); i++) { #if defined(WIN32) @@ -228,10 +271,10 @@ void XMLToolingInternalConfig::term() Category::getInstance(XMLTOOLING_LOGCAT".XMLToolingConfig").info("library shutdown complete"); } -Lockable& XMLToolingInternalConfig::lock() +Lockable* XMLToolingInternalConfig::lock() { xercesc::XMLPlatformUtils::lockMutex(m_lock); - return *this; + return this; } void XMLToolingInternalConfig::unlock() @@ -314,3 +357,26 @@ bool XMLToolingInternalConfig::load_library(const char* path, void* context) log.info("loaded extension: %s", path); return true; } + +#ifndef XMLTOOLING_NO_XMLSEC +void xmltooling::log_openssl() +{ + const char* file; + const char* data; + int flags,line; + + unsigned long code=ERR_get_error_line_data(&file,&line,&data,&flags); + while (code) { + Category& log=Category::getInstance("OpenSSL"); + log.errorStream() << "error code: " << code << " in " << file << ", line " << line << CategoryStream::ENDLINE; + if (data && (flags & ERR_TXT_STRING)) + log.errorStream() << "error data: " << data << CategoryStream::ENDLINE; + code=ERR_get_error_line_data(&file,&line,&data,&flags); + } +} + +XSECCryptoX509CRL* XMLToolingInternalConfig::X509CRL() const +{ + return new OpenSSLCryptoX509CRL(); +} +#endif