/*
- * Copyright 2001-2007 Internet2
+ * Copyright 2001-2010 Internet2
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
#include "internal.h"
#include "exceptions.h"
+#include "binding/SecurityPolicy.h"
+#include "binding/SOAPClient.h"
#include "saml2/binding/SAML2SOAPClient.h"
#include "saml2/core/Protocols.h"
#include "saml2/metadata/Metadata.h"
+#include "saml2/metadata/MetadataProvider.h"
#include <xmltooling/logging.h>
#include <xmltooling/soap/SOAP.h>
+using namespace opensaml::saml2;
using namespace opensaml::saml2p;
using namespace opensaml::saml2md;
using namespace opensaml;
using namespace xmltooling;
using namespace std;
+SAML2SOAPClient::SAML2SOAPClient(opensaml::SOAPClient& soaper, bool fatalSAMLErrors)
+ : m_soaper(soaper), m_fatal(fatalSAMLErrors), m_correlate(nullptr)
+{
+}
+
+SAML2SOAPClient::~SAML2SOAPClient()
+{
+ XMLString::release(&m_correlate);
+}
+
void SAML2SOAPClient::sendSAML(RequestAbstractType* request, const char* from, MetadataCredentialCriteria& to, const char* endpoint)
{
auto_ptr<Envelope> env(EnvelopeBuilder::buildEnvelope());
// Check for SAML Response.
StatusResponseType* response = dynamic_cast<StatusResponseType*>(body->getUnknownXMLObjects().front());
if (response) {
-
// Check InResponseTo.
if (m_correlate && response->getInResponseTo() && !XMLString::equals(m_correlate, response->getInResponseTo()))
throw SecurityPolicyException("InResponseTo attribute did not correlate with the Request ID.");
- m_soaper.getPolicy().reset(true);
- m_soaper.getPolicy().evaluate(*response, NULL, samlconstants::SAML20P_NS);
- if (!m_soaper.getPolicy().isSecure()) {
- SecurityPolicyException ex("Security policy could not authenticate the message.");
- annotateException(&ex, m_soaper.getPolicy().getIssuerMetadata(), response->getStatus()); // throws it
- }
+ SecurityPolicy& policy = m_soaper.getPolicy();
+ policy.reset(true);
+
+ // Extract Response details.
+ policy.setMessageID(response->getID());
+ policy.setIssueInstant(response->getIssueInstantEpoch());
+
+ // Extract and re-verify Issuer if present.
+ const Issuer* issuer = response->getIssuer();
+ if (issuer)
+ policy.setIssuer(issuer); // This will throw if it conflicts with the known peer identity.
+
+ // Now run the policy.
+ policy.evaluate(*response);
// Check Status.
Status* status = response->getStatus();
if (status) {
- const XMLCh* code = status->getStatusCode() ? status->getStatusCode()->getValue() : NULL;
+ const XMLCh* code = status->getStatusCode() ? status->getStatusCode()->getValue() : nullptr;
if (code && !XMLString::equals(code,StatusCode::SUCCESS) && handleError(*status)) {
BindingException ex("SAML response contained an error.");
- annotateException(&ex, m_soaper.getPolicy().getIssuerMetadata(), status); // throws it
+ annotateException(&ex, policy.getIssuerMetadata(), status); // throws it
}
}
else
ex.raise();
}
- return NULL;
+ return nullptr;
}
bool SAML2SOAPClient::handleError(const Status& status)
{
- auto_ptr_char code((status.getStatusCode() ? status.getStatusCode()->getValue() : NULL));
- auto_ptr_char str((status.getStatusMessage() ? status.getStatusMessage()->getMessage() : NULL));
+ auto_ptr_char code((status.getStatusCode() ? status.getStatusCode()->getValue() : nullptr));
+ auto_ptr_char str((status.getStatusMessage() ? status.getStatusMessage()->getMessage() : nullptr));
Category::getInstance(SAML_LOGCAT".SOAPClient").error(
"SOAP client detected a SAML error: (%s) (%s)",
(code.get() ? code.get() : "no code"),