2 * Licensed to the University Corporation for Advanced Internet
3 * Development, Inc. (UCAID) under one or more contributor license
4 * agreements. See the NOTICE file distributed with this work for
5 * additional information regarding copyright ownership.
7 * UCAID licenses this file to you under the Apache License,
8 * Version 2.0 (the "License"); you may not use this file except
9 * in compliance with the License. You may obtain a copy of the
12 * http://www.apache.org/licenses/LICENSE-2.0
14 * Unless required by applicable law or agreed to in writing,
15 * software distributed under the License is distributed on an
16 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
17 * either express or implied. See the License for the specific
18 * language governing permissions and limitations under the License.
24 * Helper class for SAMLArtifact mapping and retrieval.
28 #include "exceptions.h"
29 #include "binding/ArtifactMap.h"
30 #include "binding/SAMLArtifact.h"
33 #include <boost/lambda/bind.hpp>
34 #include <boost/lambda/lambda.hpp>
35 #include <xercesc/util/XMLUniDefs.hpp>
36 #include <xmltooling/logging.h>
37 #include <xmltooling/XMLObjectBuilder.h>
38 #include <xmltooling/XMLToolingConfig.h>
39 #include <xmltooling/security/SecurityHelper.h>
40 #include <xmltooling/util/NDC.h>
41 #include <xmltooling/util/ParserPool.h>
42 #include <xmltooling/util/StorageService.h>
43 #include <xmltooling/util/XMLHelper.h>
44 #include <xmltooling/util/Threads.h>
46 using namespace opensaml;
47 using namespace xmltooling::logging;
48 using namespace xmltooling;
49 using namespace boost::lambda;
50 using namespace boost;
54 // In-memory storage of mappings instead of using storage API.
55 class SAML_DLLLOCAL ArtifactMappings
58 ArtifactMappings() : m_lock(Mutex::create()) {}
59 ~ArtifactMappings() {}
61 void storeContent(XMLObject* content, const SAMLArtifact* artifact, const char* relyingParty, int TTL);
62 XMLObject* retrieveContent(const SAMLArtifact* artifact, const char* relyingParty);
63 string getRelyingParty(const SAMLArtifact* artifact);
66 struct SAML_DLLLOCAL Mapping {
67 Mapping() : m_expires(0) {}
68 auto_ptr<XMLObject> m_xml;
73 void removeMapping(const map<string,Mapping>::iterator& i);
75 auto_ptr<Mutex> m_lock;
76 map<string,Mapping> m_artMap;
77 multimap<time_t,string> m_expMap;
80 static const XMLCh artifactTTL[] = UNICODE_LITERAL_11(a,r,t,i,f,a,c,t,T,T,L);
81 static const XMLCh context[] = UNICODE_LITERAL_7(c,o,n,t,e,x,t);
82 static const XMLCh Mapping[] = UNICODE_LITERAL_7(M,a,p,p,i,n,g);
83 static const XMLCh _relyingParty[] = UNICODE_LITERAL_12(r,e,l,y,i,n,g,P,a,r,t,y);
86 void ArtifactMappings::removeMapping(const map<string,Mapping>::iterator& i)
88 // All elements in the secondary map whose key matches the expiration of the removed mapping.
89 pair<multimap<time_t,string>::iterator,multimap<time_t,string>::iterator> range =
90 m_expMap.equal_range(i->second.m_expires);
92 // Find an element in the matching range whose value matches the input key.
93 multimap<time_t,string>::iterator el = find_if(
94 range.first, range.second,
95 (lambda::bind(&multimap<time_t,string>::value_type::second, _1) == boost::ref(i->first))
97 if (el != range.second) {
104 void ArtifactMappings::storeContent(XMLObject* content, const SAMLArtifact* artifact, const char* relyingParty, int TTL)
106 Lock wrapper(m_lock.get());
108 // Garbage collect any expired artifacts.
109 time_t now = time(nullptr);
110 multimap<time_t,string>::iterator stop = m_expMap.upper_bound(now);
111 for (multimap<time_t,string>::iterator i = m_expMap.begin(); i != stop; m_expMap.erase(i++)) {
112 m_artMap.erase(i->second);
115 // Key is the hexed handle.
116 string hexed = SAMLArtifact::toHex(artifact->getMessageHandle());
117 Mapping& m = m_artMap[hexed];
118 m.m_xml.reset(content);
120 m.m_relying = relyingParty;
121 m.m_expires = now + TTL;
122 m_expMap.insert(pair<const time_t,string>(m.m_expires,hexed));
125 XMLObject* ArtifactMappings::retrieveContent(const SAMLArtifact* artifact, const char* relyingParty)
127 Category& log=Category::getInstance(SAML_LOGCAT".ArtifactMap");
128 Lock wrapper(m_lock.get());
130 map<string,Mapping>::iterator i = m_artMap.find(SAMLArtifact::toHex(artifact->getMessageHandle()));
131 if (i == m_artMap.end())
132 throw BindingException("Requested artifact not in map or may have expired.");
134 if (!(i->second.m_relying.empty())) {
135 if (!relyingParty || i->second.m_relying != relyingParty) {
137 "request from (%s) for artifact issued to (%s)",
138 relyingParty ? relyingParty : "unknown", i->second.m_relying.c_str()
141 throw BindingException("Unauthorized artifact mapping request.");
145 if (time(nullptr) >= i->second.m_expires) {
147 throw BindingException("Requested artifact has expired.");
150 log.debug("resolved artifact for (%s)", relyingParty ? relyingParty : "unknown");
151 XMLObject* ret = i->second.m_xml.release();
156 string ArtifactMappings::getRelyingParty(const SAMLArtifact* artifact)
158 map<string,Mapping>::iterator i = m_artMap.find(SAMLArtifact::toHex(artifact->getMessageHandle()));
159 if (i == m_artMap.end())
160 throw BindingException("Requested artifact not in map or may have expired.");
161 return i->second.m_relying;
164 ArtifactMap::ArtifactMap(xmltooling::StorageService* storage, const char* context, unsigned int artifactTTL)
165 : m_storage(storage), m_context((context && *context) ? context : "opensaml::ArtifactMap"), m_artifactTTL(artifactTTL)
168 m_mappings.reset(new ArtifactMappings());
171 ArtifactMap::ArtifactMap(const DOMElement* e, xmltooling::StorageService* storage)
172 : m_storage(storage), m_artifactTTL(180)
175 auto_ptr_char c(e->getAttributeNS(nullptr, context));
176 if (c.get() && *c.get()) {
178 if (storage && m_context.length() > m_storage->getCapabilities().getContextSize()) {
179 throw IOException("ArtifactMap context length exceeds capacity of storage service.");
183 m_context = "opensaml::ArtifactMap";
186 const XMLCh* TTL = e->getAttributeNS(nullptr, artifactTTL);
188 m_artifactTTL = XMLString::parseInt(TTL);
195 m_mappings.reset(new ArtifactMappings());
198 ArtifactMap::~ArtifactMap()
202 void ArtifactMap::storeContent(XMLObject* content, const SAMLArtifact* artifact, const char* relyingParty)
204 if (content->getParent())
205 throw BindingException("Cannot store artifact mapping for XML content with parent.");
207 return m_mappings->storeContent(content, artifact, relyingParty, m_artifactTTL);
209 // Marshall with defaulted document, to reuse existing DOM and/or create a bound Document.
210 DOMElement* root = content->marshall();
212 // Build a DOM with the same document to store the relyingParty mapping.
214 auto_ptr_XMLCh temp(relyingParty);
215 root = root->getOwnerDocument()->createElementNS(nullptr,Mapping);
216 root->setAttributeNS(nullptr,_relyingParty,temp.get());
217 root->appendChild(content->getDOM());
220 // Serialize the root element, whatever it is, for storage.
222 XMLHelper::serialize(root, xmlbuf);
224 // Use hex form of message handler as storage key unless it's too big.
225 string key = artifact->getMessageHandle();
226 if (key.length() > m_storage->getCapabilities().getKeySize())
227 key = SecurityHelper::doHash("SHA1", key.data(), key.length());
229 key = SAMLArtifact::toHex(key);
231 if (!m_storage->createText(
235 time(nullptr) + m_artifactTTL
237 throw IOException("Attempt to insert duplicate artifact into map.");
240 // Cleanup by destroying XML.
244 XMLObject* ArtifactMap::retrieveContent(const SAMLArtifact* artifact, const char* relyingParty)
247 xmltooling::NDC ndc("retrieveContent");
249 Category& log=Category::getInstance(SAML_LOGCAT".ArtifactMap");
252 return m_mappings->retrieveContent(artifact, relyingParty);
254 // Use hex form of message handler as storage key unless it's too big.
255 string key = artifact->getMessageHandle();
256 if (key.length() > m_storage->getCapabilities().getKeySize())
257 key = SecurityHelper::doHash("SHA1", key.data(), key.length());
259 key = SAMLArtifact::toHex(key);
261 // Read the mapping and then delete it.
263 if (!m_storage->readText(m_context.c_str(), key.c_str(), &xmlbuf))
264 throw BindingException("Artifact not found in mapping database.");
265 m_storage->deleteText(m_context.c_str(), key.c_str());
267 // Parse the data back into XML.
268 istringstream is(xmlbuf);
269 DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(is);
270 XercesJanitor<DOMDocument> janitor(doc);
272 // Check the root element.
273 DOMElement* messageRoot = doc->getDocumentElement();
274 if (XMLHelper::isNodeNamed(messageRoot, nullptr, Mapping)) {
275 auto_ptr_char temp(messageRoot->getAttributeNS(nullptr,_relyingParty));
276 if (!relyingParty || strcmp(temp.get(),relyingParty)) {
277 log.warn("request from (%s) for artifact issued to (%s)", relyingParty ? relyingParty : "unknown", temp.get());
278 throw BindingException("Unauthorized artifact mapping request.");
280 messageRoot = XMLHelper::getFirstChildElement(messageRoot);
284 XMLObject* xmlObject = XMLObjectBuilder::buildOneFromElement(messageRoot, true); // bind document
287 log.debug("resolved artifact for (%s)", relyingParty ? relyingParty : "unknown");
291 string ArtifactMap::getRelyingParty(const SAMLArtifact* artifact)
294 return m_mappings->getRelyingParty(artifact);
296 // Use hex form of message handler as storage key unless it's too big.
297 string key = artifact->getMessageHandle();
298 if (key.length() > m_storage->getCapabilities().getKeySize())
299 key = SecurityHelper::doHash("SHA1", key.data(), key.length());
301 key = SAMLArtifact::toHex(key);
304 if (!m_storage->readText(m_context.c_str(), key.c_str(), &xmlbuf))
305 throw BindingException("Artifact not found in mapping database.");
307 // Parse the data back into XML.
308 istringstream is(xmlbuf);
309 DOMDocument* doc=XMLToolingConfig::getConfig().getParser().parse(is);
310 XercesJanitor<DOMDocument> janitor(doc);
312 // Check the root element.
313 DOMElement* messageRoot = doc->getDocumentElement();
314 if (XMLHelper::isNodeNamed(messageRoot, nullptr, Mapping)) {
315 auto_ptr_char temp(messageRoot->getAttributeNS(nullptr,_relyingParty));