Major revamp of credential and trust handling code, PKIX engine still needs work.
[shibboleth/cpp-opensaml.git] / saml / binding / impl / SOAPClient.cpp
1 /*
2  *  Copyright 2001-2007 Internet2
3  * 
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *     http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16
17 /**
18  * SOAPClient.cpp
19  * 
20  * Implements SOAP 1.1 messaging over a transport.
21  */
22
23 #include "internal.h"
24 #include "exceptions.h"
25 #include "version.h"
26 #include "binding/SOAPClient.h"
27 #include "saml2/metadata/Metadata.h"
28 #include "saml2/metadata/MetadataProvider.h"
29
30 #include <xmltooling/security/X509TrustEngine.h>
31 #include <xmltooling/soap/SOAP.h>
32 #include <xmltooling/soap/HTTPSOAPTransport.h>
33
34 using namespace opensaml::saml2;
35 using namespace opensaml::saml2md;
36 using namespace opensaml;
37 using namespace xmltooling;
38 using namespace std;
39
40 void SOAPClient::send(const soap11::Envelope& env, MetadataCredentialCriteria& peer, const char* endpoint)
41 {
42     // Clear policy.
43     m_policy.reset();
44
45     m_criteria = &peer;
46     m_peer = &(peer.getRole());
47     
48     const QName& role = m_peer->getElementQName();
49     if (XMLString::equals(role.getLocalPart(),RoleDescriptor::LOCAL_NAME))
50         m_policy.setRole(m_peer->getSchemaType());
51     else
52         m_policy.setRole(&role);
53
54     auto_ptr_char pn(dynamic_cast<const EntityDescriptor*>(m_peer->getParent())->getEntityID());
55     soap11::SOAPClient::send(env, pn.get(), endpoint);
56 }
57
58 void SOAPClient::prepareTransport(xmltooling::SOAPTransport& transport)
59 {
60     HTTPSOAPTransport* http = dynamic_cast<HTTPSOAPTransport*>(&transport);
61     if (http) {
62         http->setRequestHeader("SOAPAction", "http://www.oasis-open.org/committees/security");
63         http->setRequestHeader("Xerces-C", XERCES_FULLVERSIONDOT);
64         http->setRequestHeader("XML-Security-C", XSEC_FULLVERSIONDOT);
65         http->setRequestHeader("OpenSAML-C", OPENSAML_FULLVERSIONDOT);
66     }
67     
68     const X509TrustEngine* engine = dynamic_cast<const X509TrustEngine*>(m_policy.getTrustEngine());
69     if (engine) {
70         if (!transport.setTrustEngine(engine, m_policy.getMetadataProvider(), m_criteria, m_force))
71             throw BindingException("Unable to install X509TrustEngine into SOAPTransport.");
72     }
73 }
74
75 soap11::Envelope* SOAPClient::receive()
76 {
77     auto_ptr<soap11::Envelope> env(soap11::SOAPClient::receive());
78     if (env.get()) {
79         if (m_peer && m_transport->isSecure()) {
80             // Set issuer based on peer identity.
81             m_policy.setIssuer(dynamic_cast<EntityDescriptor*>(m_peer->getParent())->getEntityID());
82             m_policy.setIssuerMetadata(m_peer);
83             m_policy.setSecure(true);
84         }
85         m_policy.evaluate(*(env.get()));
86     }
87     return env.release();
88 }
89
90 void SOAPClient::reset()
91 {
92     m_criteria = NULL;
93     m_peer = NULL;
94     soap11::SOAPClient::reset();
95     m_policy.reset();
96 }