2 * Copyright 2001-2007 Internet2
\r
4 * Licensed under the Apache License, Version 2.0 (the "License");
\r
5 * you may not use this file except in compliance with the License.
\r
6 * You may obtain a copy of the License at
\r
8 * http://www.apache.org/licenses/LICENSE-2.0
\r
10 * Unless required by applicable law or agreed to in writing, software
\r
11 * distributed under the License is distributed on an "AS IS" BASIS,
\r
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
\r
13 * See the License for the specific language governing permissions and
\r
14 * limitations under the License.
\r
20 * SAML Attribute Query tool layered on SP configuration
\r
23 #if defined (_MSC_VER) || defined(__BORLANDC__)
\r
24 # include "config_win32.h"
\r
26 # include "config.h"
\r
30 # define _CRT_NONSTDC_NO_DEPRECATE 1
\r
31 # define _CRT_SECURE_NO_DEPRECATE 1
\r
34 #include <shibsp/Application.h>
\r
35 #include <shibsp/exceptions.h>
\r
36 #include <shibsp/SPConfig.h>
\r
37 #include <shibsp/ServiceProvider.h>
\r
38 #include <shibsp/attribute/resolver/AttributeResolver.h>
\r
39 #include <shibsp/binding/SOAPClient.h>
\r
40 #include <shibsp/util/SPConstants.h>
\r
42 #include <saml/binding/SecurityPolicy.h>
\r
43 #include <saml/saml1/binding/SAML1SOAPClient.h>
\r
44 #include <saml/saml1/core/Assertions.h>
\r
45 #include <saml/saml1/core/Protocols.h>
\r
46 #include <saml/saml2/binding/SAML2SOAPClient.h>
\r
47 #include <saml/saml2/core/Protocols.h>
\r
48 #include <saml/saml2/metadata/Metadata.h>
\r
49 #include <xercesc/util/XMLUniDefs.hpp>
\r
50 #include <xmltooling/XMLToolingConfig.h>
\r
51 #include <xmltooling/util/XMLHelper.h>
\r
53 using namespace shibsp;
\r
54 using namespace opensaml::saml1;
\r
55 using namespace opensaml::saml1p;
\r
56 using namespace opensaml::saml2;
\r
57 using namespace opensaml::saml2p;
\r
58 using namespace opensaml::saml2md;
\r
59 using namespace opensaml;
\r
60 using namespace xmltooling;
\r
61 using namespace std;
\r
67 int main(int argc,char* argv[])
\r
76 for (int i=1; i<argc; i++) {
\r
77 if (!strcmp(argv[i],"-n") && i+1<argc)
\r
79 else if (!strcmp(argv[i],"-q") && i+1<argc)
\r
81 else if (!strcmp(argv[i],"-f") && i+1<argc)
\r
83 else if (!strcmp(argv[i],"-a") && i+1<argc)
\r
87 if (!n_param || !q_param) {
\r
88 cerr << "usage: samlquery -n <name> -q <IdP> [-f <format URI> -a <application id>]" << endl;
\r
92 path=getenv("SHIBSP_SCHEMAS");
\r
94 path=SHIBSP_SCHEMAS;
\r
95 config=getenv("SHIBSP_CONFIG");
\r
97 config=SHIBSP_CONFIG;
\r
101 XMLToolingConfig::getConfig().log_config(getenv("SHIBSP_LOGGING") ? getenv("SHIBSP_LOGGING") : SHIBSP_LOGGING);
\r
103 SPConfig& conf=SPConfig::getConfig();
\r
105 SPConfig::Metadata |
\r
107 SPConfig::Credentials |
\r
108 SPConfig::OutOfProcess
\r
110 if (!conf.init(path))
\r
114 static const XMLCh path[] = UNICODE_LITERAL_4(p,a,t,h);
\r
115 static const XMLCh validate[] = UNICODE_LITERAL_8(v,a,l,i,d,a,t,e);
\r
116 DOMDocument* dummydoc=XMLToolingConfig::getConfig().getParser().newDocument();
\r
117 XercesJanitor<DOMDocument> docjanitor(dummydoc);
\r
118 DOMElement* dummy = dummydoc->createElementNS(NULL,path);
\r
119 auto_ptr_XMLCh src(config);
\r
120 dummy->setAttributeNS(NULL,path,src.get());
\r
121 dummy->setAttributeNS(NULL,validate,xmlconstants::XML_ONE);
\r
123 conf.setServiceProvider(conf.ServiceProviderManager.newPlugin(XML_SERVICE_PROVIDER,dummy));
\r
124 conf.getServiceProvider()->init();
\r
126 catch (exception&) {
\r
131 ServiceProvider* sp=conf.getServiceProvider();
\r
135 const Application* app=sp->getApplication(a_param);
\r
137 throw ConfigurationException("Application ($1) not found in configuration.", params(1,a_param));
\r
139 auto_ptr_XMLCh domain(q_param);
\r
140 auto_ptr_XMLCh name(n_param);
\r
141 auto_ptr_XMLCh format(f_param);
\r
142 auto_ptr_XMLCh issuer(app->getString("entityID").second);
\r
144 MetadataProvider* m=app->getMetadataProvider();
\r
145 xmltooling::Locker mlocker(m);
\r
146 const EntityDescriptor* site=m->getEntityDescriptor(domain.get());
\r
148 throw MetadataException("Unable to locate metadata for IdP ($1).", params(1,q_param));
\r
150 // Try to locate an AA role.
\r
152 const AttributeAuthorityDescriptor* AA=NULL;
\r
153 if (AA=site->getAttributeAuthorityDescriptor(samlconstants::SAML20P_NS))
\r
155 else if (AA=site->getAttributeAuthorityDescriptor(samlconstants::SAML11_PROTOCOL_ENUM))
\r
157 else if (AA=site->getAttributeAuthorityDescriptor(samlconstants::SAML10_PROTOCOL_ENUM))
\r
160 throw MetadataException("No AttributeAuthority role found in metadata.");
\r
162 shibsp::SecurityPolicy policy(*app);
\r
163 shibsp::SOAPClient soaper(policy);
\r
164 MetadataCredentialCriteria mcc(*AA);
\r
167 auto_ptr_XMLCh binding(samlconstants::SAML20_BINDING_SOAP);
\r
168 opensaml::saml2p::StatusResponseType* srt=NULL;
\r
169 const vector<AttributeService*>& endpoints=AA->getAttributeServices();
\r
170 for (vector<AttributeService*>::const_iterator ep=endpoints.begin(); !srt && ep!=endpoints.end(); ++ep) {
\r
172 if (!XMLString::equals((*ep)->getBinding(),binding.get()))
\r
174 auto_ptr_char loc((*ep)->getLocation());
\r
175 NameID* nameid = NameIDBuilder::buildNameID();
\r
176 opensaml::saml2::Subject* subject = opensaml::saml2::SubjectBuilder::buildSubject();
\r
177 subject->setNameID(nameid);
\r
178 opensaml::saml2p::AttributeQuery* query = opensaml::saml2p::AttributeQueryBuilder::buildAttributeQuery();
\r
179 query->setSubject(subject);
\r
180 Issuer* iss = IssuerBuilder::buildIssuer();
\r
181 query->setIssuer(iss);
\r
182 nameid->setName(name.get());
\r
183 nameid->setFormat(format.get() ? format.get() : NameID::TRANSIENT);
\r
184 nameid->setNameQualifier(domain.get());
\r
185 iss->setName(issuer.get());
\r
186 SAML2SOAPClient client(soaper);
\r
187 client.sendSAML(query, mcc, loc.get());
\r
188 srt = client.receiveSAML();
\r
190 catch (exception& ex) {
\r
191 cerr << "Caught exception: " << ex.what() << endl << endl;
\r
197 throw BindingException("Unable to successfully query for attributes.");
\r
198 const opensaml::saml2p::Response* response = dynamic_cast<opensaml::saml2p::Response*>(srt);
\r
200 const vector<opensaml::saml2::Assertion*>& assertions = response->getAssertions();
\r
201 if (assertions.size())
\r
202 cout << *assertions.front();
\r
204 cout << "No assertions found.";
\r
209 auto_ptr_XMLCh binding(samlconstants::SAML1_BINDING_SOAP);
\r
210 const opensaml::saml1p::Response* response=NULL;
\r
211 const vector<AttributeService*>& endpoints=AA->getAttributeServices();
\r
212 for (vector<AttributeService*>::const_iterator ep=endpoints.begin(); !response && ep!=endpoints.end(); ++ep) {
\r
214 if (!XMLString::equals((*ep)->getBinding(),binding.get()))
\r
216 auto_ptr_char loc((*ep)->getLocation());
\r
217 NameIdentifier* nameid = NameIdentifierBuilder::buildNameIdentifier();
\r
218 opensaml::saml1::Subject* subject = opensaml::saml1::SubjectBuilder::buildSubject();
\r
219 subject->setNameIdentifier(nameid);
\r
220 opensaml::saml1p::AttributeQuery* query = opensaml::saml1p::AttributeQueryBuilder::buildAttributeQuery();
\r
221 query->setSubject(subject);
\r
222 Request* request = RequestBuilder::buildRequest();
\r
223 request->setAttributeQuery(query);
\r
224 nameid->setName(name.get());
\r
225 nameid->setFormat(format.get() ? format.get() : shibspconstants::SHIB1_NAMEID_FORMAT_URI);
\r
226 nameid->setNameQualifier(domain.get());
\r
227 query->setResource(issuer.get());
\r
228 request->setMinorVersion(ver==v11 ? 1 : 0);
\r
229 SAML1SOAPClient client(soaper);
\r
230 client.sendSAML(request, mcc, loc.get());
\r
231 response = client.receiveSAML();
\r
233 catch (exception& ex) {
\r
234 cerr << "Caught exception: " << ex.what() << endl << endl;
\r
240 throw BindingException("Unable to successfully query for attributes.");
\r
242 const vector<opensaml::saml1::Assertion*>& assertions = response->getAssertions();
\r
243 if (assertions.size())
\r
244 cout << *assertions.front();
\r
246 cout << "No assertions found.";
\r
248 delete const_cast<opensaml::saml1p::Response*>(response);
\r
251 catch(exception& ex) {
\r
252 cerr << ex.what() << endl;
\r