1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129
|
/**
* Licensed to the University Corporation for Advanced Internet
* Development, Inc. (UCAID) under one or more contributor license
* agreements. See the NOTICE file distributed with this work for
* additional information regarding copyright ownership.
*
* UCAID licenses this file to you under the Apache License,
* Version 2.0 (the "License"); you may not use this file except
* in compliance with the License. You may obtain a copy of the
* License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
* either express or implied. See the License for the specific
* language governing permissions and limitations under the License.
*/
/**
* SOAPClient.cpp
*
* Implements SOAP 1.1 messaging over a transport.
*/
#include "internal.h"
#include "exceptions.h"
#include "version.h"
#include "binding/SecurityPolicy.h"
#include "binding/SOAPClient.h"
#include "saml2/metadata/Metadata.h"
#include "saml2/metadata/MetadataCredentialCriteria.h"
#include "saml2/metadata/MetadataProvider.h"
#include <xmltooling/security/X509TrustEngine.h>
#include <xmltooling/soap/SOAP.h>
#include <xmltooling/soap/HTTPSOAPTransport.h>
#include <xsec/framework/XSECDefs.hpp>
using namespace opensaml::saml2;
using namespace opensaml::saml2md;
using namespace opensaml;
using namespace xmltooling;
using namespace std;
SOAPClient::SOAPClient(SecurityPolicy& policy)
: soap11::SOAPClient(policy.getValidating()), m_policy(policy), m_force(true), m_peer(nullptr), m_criteria(nullptr)
{
}
SOAPClient::~SOAPClient()
{
}
void SOAPClient::forceTransportAuthentication(bool force)
{
m_force = force;
}
void SOAPClient::send(const soap11::Envelope& env, const char* from, MetadataCredentialCriteria& to, const char* endpoint)
{
// Clear policy.
m_policy.reset();
m_criteria = &to;
m_peer = &(to.getRole());
const xmltooling::QName& role = m_peer->getElementQName();
if (XMLString::equals(role.getLocalPart(),RoleDescriptor::LOCAL_NAME))
m_policy.setRole(m_peer->getSchemaType());
else
m_policy.setRole(&role);
// Establish the "expected" issuer identity.
const XMLCh* entityID = dynamic_cast<const EntityDescriptor*>(m_peer->getParent())->getEntityID();
m_policy.setIssuer(entityID);
if (!m_policy.getIssuerMetadata())
m_policy.setIssuerMetadata(m_peer);
// Call the base class.
auto_ptr_char pn(entityID);
soap11::SOAPClient::send(env, SOAPTransport::Address(from, pn.get(), endpoint));
}
void SOAPClient::prepareTransport(xmltooling::SOAPTransport& transport)
{
HTTPSOAPTransport* http = dynamic_cast<HTTPSOAPTransport*>(&transport);
if (http) {
http->setRequestHeader("SOAPAction", "http://www.oasis-open.org/committees/security");
http->setRequestHeader("Xerces-C", XERCES_FULLVERSIONDOT);
http->setRequestHeader("XML-Security-C", XSEC_FULLVERSIONDOT);
http->setRequestHeader("OpenSAML-C", OPENSAML_FULLVERSIONDOT);
}
const X509TrustEngine* engine = dynamic_cast<const X509TrustEngine*>(m_policy.getTrustEngine());
if (engine) {
if (!transport.setTrustEngine(engine, m_policy.getMetadataProvider(), m_criteria, m_force))
throw BindingException("Unable to install X509TrustEngine into SOAPTransport.");
}
}
soap11::Envelope* SOAPClient::receive()
{
auto_ptr<soap11::Envelope> env(soap11::SOAPClient::receive());
if (env.get()) {
if (m_peer && m_transport->isAuthenticated()) {
// Set flag based on peer identity.
m_policy.setAuthenticated(true);
}
// Run policy against SOAP layer.
m_policy.evaluate(*(env.get()));
}
return env.release();
}
void SOAPClient::reset()
{
m_criteria = nullptr;
m_peer = nullptr;
soap11::SOAPClient::reset();
m_policy.reset();
}
SecurityPolicy& SOAPClient::getPolicy() const
{
return m_policy;
}
|