773 lines
26 KiB
C
773 lines
26 KiB
C
/* $Id$
|
|
*
|
|
* Lasso - A free implementation of the Liberty Alliance specifications.
|
|
*
|
|
* Copyright (C) 2004-2007 Entr'ouvert
|
|
* http://lasso.entrouvert.org
|
|
*
|
|
* Authors: See AUTHORS file in top-level directory.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
/**
|
|
* SECTION:name_registration
|
|
* @short_description: Name Registration Profile (ID-FF)
|
|
*
|
|
**/
|
|
|
|
#include "../xml/private.h"
|
|
#include "name_registration.h"
|
|
#include "profileprivate.h"
|
|
#include "providerprivate.h"
|
|
#include "../utils.h"
|
|
|
|
/*****************************************************************************/
|
|
/* public methods */
|
|
/*****************************************************************************/
|
|
|
|
/**
|
|
* lasso_name_registration_build_request_msg:
|
|
* @name_registration: a #LassoNameRegistration
|
|
*
|
|
* Builds a register name identifier request message.
|
|
*
|
|
* It gets the register name identifier protocol profile and:
|
|
* <itemizedlist>
|
|
* <listitem><para>
|
|
* if it is a SOAP method, then it builds the register name identifier
|
|
* request SOAP message, optionally signs his node, sets @msg_body,
|
|
* gets the SoapEndpoint url and sets @msg_url.
|
|
* </para></listitem>
|
|
* <listitem><para>
|
|
* if it is a HTTP-Redirect method, then it builds the register name
|
|
* identifier request QUERY message (optionally signs the request message),
|
|
* builds the request url with register name identifier url with register
|
|
* name identifier service url, sets @msg_url in the register name
|
|
* identifier object, sets @msg_body to NULL.
|
|
* </para></listitem>
|
|
* </itemizedlist>
|
|
*
|
|
* Return value: 0 on success; or a negative value otherwise.
|
|
**/
|
|
gint
|
|
lasso_name_registration_build_request_msg(LassoNameRegistration *name_registration)
|
|
{
|
|
LassoProfile *profile;
|
|
LassoProvider *remote_provider;
|
|
char *url, *query;
|
|
|
|
g_return_val_if_fail(LASSO_IS_NAME_REGISTRATION(name_registration),
|
|
LASSO_PARAM_ERROR_INVALID_VALUE);
|
|
|
|
profile = LASSO_PROFILE(name_registration);
|
|
lasso_profile_clean_msg_info(profile);
|
|
|
|
if (profile->remote_providerID == NULL) {
|
|
/* this means lasso_logout_init_request was not called before */
|
|
return critical_error(LASSO_PROFILE_ERROR_MISSING_REMOTE_PROVIDERID);
|
|
}
|
|
|
|
remote_provider = lasso_server_get_provider(profile->server, profile->remote_providerID);
|
|
if (LASSO_IS_PROVIDER(remote_provider) == FALSE) {
|
|
return critical_error(LASSO_SERVER_ERROR_PROVIDER_NOT_FOUND);
|
|
}
|
|
|
|
if (profile->http_request_method == LASSO_HTTP_METHOD_SOAP) {
|
|
profile->msg_url = lasso_provider_get_metadata_one(
|
|
remote_provider, "SoapEndpoint");
|
|
LASSO_SAMLP_REQUEST_ABSTRACT(profile->request)->private_key_file =
|
|
profile->server->private_key;
|
|
LASSO_SAMLP_REQUEST_ABSTRACT(profile->request)->certificate_file =
|
|
profile->server->certificate;
|
|
profile->msg_body = lasso_node_export_to_soap(profile->request);
|
|
return 0;
|
|
}
|
|
|
|
if (profile->http_request_method == LASSO_HTTP_METHOD_REDIRECT) {
|
|
/* build and optionally sign the query message and build the
|
|
* register name identifier request url */
|
|
url = lasso_provider_get_metadata_one(remote_provider,
|
|
"RegisterNameIdentifierServiceURL");
|
|
if (url == NULL) {
|
|
return critical_error(LASSO_PROFILE_ERROR_UNKNOWN_PROFILE_URL);
|
|
}
|
|
query = lasso_node_export_to_query_with_password(LASSO_NODE(profile->request),
|
|
profile->server->signature_method,
|
|
profile->server->private_key,
|
|
profile->server->private_key_password);
|
|
if (query == NULL) {
|
|
lasso_release(url);
|
|
return critical_error(LASSO_PROFILE_ERROR_BUILDING_QUERY_FAILED);
|
|
}
|
|
/* build the msg_url */
|
|
profile->msg_url = lasso_concat_url_query(url, query);
|
|
profile->msg_body = NULL;
|
|
lasso_release(url);
|
|
lasso_release(query);
|
|
return 0;
|
|
}
|
|
|
|
return critical_error(LASSO_PROFILE_ERROR_INVALID_HTTP_METHOD);
|
|
}
|
|
|
|
|
|
/**
|
|
* lasso_name_registration_build_response_msg:
|
|
* @name_registration: a #LassoNameRegistration
|
|
*
|
|
* Builds the register name idendifier response message.
|
|
*
|
|
* It gets the request message method and:
|
|
* <itemizedlist>
|
|
* <listitem><para>
|
|
* if it is a SOAP method, then it builds the response SOAP message, sets
|
|
* the msg_body attribute, gets the register name identifier service return
|
|
* url and sets @msg_url of the object.
|
|
* </para></listitem>
|
|
* <listitem><para>
|
|
* if it is a HTTP-Redirect method, then it builds the response QUERY
|
|
* message, builds the response url, sets @msg_url with the response url
|
|
* and sets the msg_body with NULL
|
|
* </para></listitem>
|
|
* </itemizedlist>
|
|
*
|
|
* If private key and certificate are set in server object it will also signs
|
|
* the message (either with X509 if SOAP or with a simple signature for query
|
|
* strings).
|
|
*
|
|
* Return value: 0 on success; or a negative value otherwise.
|
|
**/
|
|
gint
|
|
lasso_name_registration_build_response_msg(LassoNameRegistration *name_registration)
|
|
{
|
|
LassoProfile *profile;
|
|
LassoProvider *remote_provider;
|
|
char *url, *query;
|
|
|
|
g_return_val_if_fail(LASSO_IS_NAME_REGISTRATION(name_registration),
|
|
LASSO_PARAM_ERROR_INVALID_VALUE);
|
|
|
|
profile = LASSO_PROFILE(name_registration);
|
|
lasso_profile_clean_msg_info(profile);
|
|
|
|
if (profile->remote_providerID == NULL) {
|
|
/* this means lasso_logout_init_request was not called before */
|
|
return critical_error(LASSO_PROFILE_ERROR_MISSING_REMOTE_PROVIDERID);
|
|
}
|
|
|
|
remote_provider = lasso_server_get_provider(profile->server, profile->remote_providerID);
|
|
if (LASSO_IS_PROVIDER(remote_provider) == FALSE) {
|
|
return critical_error(LASSO_SERVER_ERROR_PROVIDER_NOT_FOUND);
|
|
}
|
|
|
|
if (profile->http_request_method == LASSO_HTTP_METHOD_SOAP) {
|
|
profile->msg_url = NULL;
|
|
LASSO_SAMLP_RESPONSE_ABSTRACT(profile->response)->private_key_file =
|
|
profile->server->private_key;
|
|
LASSO_SAMLP_RESPONSE_ABSTRACT(profile->response)->certificate_file =
|
|
profile->server->certificate;
|
|
profile->msg_body = lasso_node_export_to_soap(profile->response);
|
|
return 0;
|
|
}
|
|
|
|
if (profile->http_request_method == LASSO_HTTP_METHOD_REDIRECT) {
|
|
url = lasso_provider_get_metadata_one(remote_provider,
|
|
"RegisterNameIdentifierServiceReturnURL");
|
|
if (url == NULL) {
|
|
return critical_error(LASSO_PROFILE_ERROR_UNKNOWN_PROFILE_URL);
|
|
}
|
|
query = lasso_node_export_to_query_with_password(LASSO_NODE(profile->response),
|
|
profile->server->signature_method,
|
|
profile->server->private_key,
|
|
profile->server->private_key_password);
|
|
if (query == NULL) {
|
|
lasso_release(url);
|
|
return critical_error(LASSO_PROFILE_ERROR_BUILDING_QUERY_FAILED);
|
|
}
|
|
/* build the msg_url */
|
|
profile->msg_url = lasso_concat_url_query(url, query);
|
|
lasso_release(url);
|
|
lasso_release(query);
|
|
profile->msg_body = NULL;
|
|
|
|
return 0;
|
|
}
|
|
|
|
return critical_error(LASSO_PROFILE_ERROR_INVALID_HTTP_METHOD);
|
|
}
|
|
|
|
/**
|
|
* lasso_name_registration_destroy:
|
|
* @name_registration: a #LassoNameRegistration
|
|
*
|
|
* Destroys a #LassoNameRegistration object.
|
|
**/
|
|
void
|
|
lasso_name_registration_destroy(LassoNameRegistration *name_registration)
|
|
{
|
|
lasso_node_destroy(LASSO_NODE(name_registration));
|
|
}
|
|
|
|
|
|
/**
|
|
* lasso_name_registration_init_request:
|
|
* @name_registration: a #LassoNameRegistration
|
|
* @remote_providerID: the providerID of the identity provider.
|
|
* @http_method: if set, then it get the protocol profile in metadata
|
|
* corresponding of this HTTP request method.
|
|
*
|
|
* Initializes a new lib:RegisterNameIdentifierRequest request; it sets
|
|
* @name_registration->nameIdentifier to the new name identifier and
|
|
* @name_registration->oldNameIdentifier to the old one.
|
|
*
|
|
* Return value: 0 on success; or a negative value otherwise.
|
|
**/
|
|
gint
|
|
lasso_name_registration_init_request(LassoNameRegistration *name_registration,
|
|
char *remote_providerID, LassoHttpMethod http_method)
|
|
{
|
|
LassoProfile *profile;
|
|
LassoProvider *remote_provider;
|
|
LassoFederation *federation;
|
|
LassoSamlNameIdentifier *spNameIdentifier, *idpNameIdentifier, *oldNameIdentifier = NULL;
|
|
|
|
g_return_val_if_fail(LASSO_IS_NAME_REGISTRATION(name_registration),
|
|
LASSO_PARAM_ERROR_INVALID_VALUE);
|
|
g_return_val_if_fail(remote_providerID != NULL, LASSO_PARAM_ERROR_INVALID_VALUE);
|
|
|
|
profile = LASSO_PROFILE(name_registration);
|
|
|
|
/* verify if the identity and session exist */
|
|
if (LASSO_IS_IDENTITY(profile->identity) == FALSE) {
|
|
return critical_error(LASSO_PROFILE_ERROR_IDENTITY_NOT_FOUND);
|
|
}
|
|
|
|
/* set the remote provider id */
|
|
profile->remote_providerID = g_strdup(remote_providerID);
|
|
|
|
remote_provider = lasso_server_get_provider(profile->server, profile->remote_providerID);
|
|
if (LASSO_IS_PROVIDER(remote_provider) == FALSE) {
|
|
return critical_error(LASSO_SERVER_ERROR_PROVIDER_NOT_FOUND);
|
|
}
|
|
|
|
/* Get federation */
|
|
federation = g_hash_table_lookup(profile->identity->federations,
|
|
profile->remote_providerID);
|
|
if (LASSO_IS_FEDERATION(federation) == FALSE) {
|
|
return critical_error(LASSO_PROFILE_ERROR_FEDERATION_NOT_FOUND);
|
|
}
|
|
|
|
/* FIXME : depending on the requester provider type, verify the format
|
|
* of the old name identifier is only federated type */
|
|
|
|
if (remote_provider->role == LASSO_PROVIDER_ROLE_IDP) {
|
|
/* Initiating it, from a SP */
|
|
spNameIdentifier = lasso_saml_name_identifier_new();
|
|
spNameIdentifier->content = lasso_build_unique_id(32);
|
|
spNameIdentifier->NameQualifier = g_strdup(profile->remote_providerID);
|
|
spNameIdentifier->Format = g_strdup(LASSO_LIB_NAME_IDENTIFIER_FORMAT_FEDERATED);
|
|
|
|
idpNameIdentifier = LASSO_SAML_NAME_IDENTIFIER(g_object_ref(federation->remote_nameIdentifier));
|
|
|
|
if (federation->local_nameIdentifier) {
|
|
/* old name identifier is from SP,
|
|
* name_registration->oldNameIdentifier must be from SP */
|
|
oldNameIdentifier = LASSO_SAML_NAME_IDENTIFIER(g_object_ref(federation->local_nameIdentifier));
|
|
} else {
|
|
/* oldNameIdentifier is none, no local name identifier at SP, old is IDP */
|
|
oldNameIdentifier = LASSO_SAML_NAME_IDENTIFIER(g_object_ref(idpNameIdentifier));
|
|
}
|
|
|
|
profile->nameIdentifier = LASSO_NODE(g_object_ref(spNameIdentifier));
|
|
name_registration->oldNameIdentifier = g_object_ref(oldNameIdentifier);
|
|
} else { /* if (remote_provider->role == LASSO_PROVIDER_ROLE_SP) { */
|
|
/* Initiating it, from an IdP */
|
|
if (federation->local_nameIdentifier == NULL) {
|
|
return LASSO_PROFILE_ERROR_NAME_IDENTIFIER_NOT_FOUND;
|
|
}
|
|
|
|
oldNameIdentifier = LASSO_SAML_NAME_IDENTIFIER(g_object_ref(federation->local_nameIdentifier));
|
|
|
|
spNameIdentifier = NULL;
|
|
if (federation->remote_nameIdentifier) {
|
|
spNameIdentifier = LASSO_SAML_NAME_IDENTIFIER(g_object_ref(federation->remote_nameIdentifier));
|
|
}
|
|
|
|
idpNameIdentifier = lasso_saml_name_identifier_new();
|
|
idpNameIdentifier->content = lasso_build_unique_id(32);
|
|
idpNameIdentifier->NameQualifier = g_strdup(profile->remote_providerID);
|
|
idpNameIdentifier->Format = g_strdup(LASSO_LIB_NAME_IDENTIFIER_FORMAT_FEDERATED);
|
|
|
|
profile->nameIdentifier = LASSO_NODE(g_object_ref(idpNameIdentifier));
|
|
name_registration->oldNameIdentifier = g_object_ref(oldNameIdentifier);
|
|
}
|
|
|
|
if (oldNameIdentifier == NULL) {
|
|
message(G_LOG_LEVEL_CRITICAL, "Invalid provider type"); /* ??? */
|
|
return LASSO_PROFILE_ERROR_MISSING_NAME_IDENTIFIER;
|
|
}
|
|
|
|
if (http_method == LASSO_HTTP_METHOD_ANY) {
|
|
http_method = lasso_provider_get_first_http_method(
|
|
LASSO_PROVIDER(profile->server),
|
|
remote_provider,
|
|
LASSO_MD_PROTOCOL_TYPE_REGISTER_NAME_IDENTIFIER);
|
|
} else {
|
|
if (lasso_provider_accept_http_method(LASSO_PROVIDER(profile->server),
|
|
remote_provider,
|
|
LASSO_MD_PROTOCOL_TYPE_REGISTER_NAME_IDENTIFIER,
|
|
http_method,
|
|
TRUE) == FALSE) {
|
|
return critical_error(LASSO_PROFILE_ERROR_UNSUPPORTED_PROFILE);
|
|
}
|
|
}
|
|
|
|
profile->request = lasso_lib_register_name_identifier_request_new_full(
|
|
LASSO_PROVIDER(profile->server)->ProviderID,
|
|
idpNameIdentifier, spNameIdentifier, oldNameIdentifier,
|
|
profile->server->certificate ?
|
|
LASSO_SIGNATURE_TYPE_WITHX509 : LASSO_SIGNATURE_TYPE_SIMPLE,
|
|
lasso_get_default_signature_method());
|
|
if (profile->request == NULL) {
|
|
return critical_error(LASSO_PROFILE_ERROR_BUILDING_REQUEST_FAILED);
|
|
}
|
|
LASSO_LIB_REGISTER_NAME_IDENTIFIER_REQUEST(profile->request)->RelayState =
|
|
g_strdup(profile->msg_relayState);
|
|
|
|
if (lasso_provider_get_protocol_conformance(remote_provider) < LASSO_PROTOCOL_LIBERTY_1_2) {
|
|
LASSO_SAMLP_REQUEST_ABSTRACT(profile->request)->MajorVersion = 1;
|
|
LASSO_SAMLP_REQUEST_ABSTRACT(profile->request)->MinorVersion = 1;
|
|
}
|
|
|
|
profile->http_request_method = http_method;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
/**
|
|
* lasso_name_registration_process_request_msg:
|
|
* @name_registration: a #LassoNameRegistration
|
|
* @request_msg: the register name identifier request message
|
|
*
|
|
* Processes a lib:RegisterNameIdentifierRequest message. Rebuilds a request
|
|
* object from the message and optionally verifies its signature. Sets
|
|
* profile->nameIdentifier to local name identifier. If it changed (when this
|
|
* is IdP-initiated and there was no previously defined local name identifier)
|
|
* profile->nameIdentifier will be the new one and profile->oldNameIdentiifer
|
|
* the old one.
|
|
*
|
|
* Return value: 0 on success; or a negative value otherwise.
|
|
**/
|
|
gint lasso_name_registration_process_request_msg(LassoNameRegistration *name_registration,
|
|
char *request_msg)
|
|
{
|
|
LassoProfile *profile;
|
|
LassoProvider *remote_provider;
|
|
LassoMessageFormat format;
|
|
LassoLibRegisterNameIdentifierRequest *request;
|
|
|
|
g_return_val_if_fail(LASSO_IS_NAME_REGISTRATION(name_registration),
|
|
LASSO_PARAM_ERROR_INVALID_VALUE);
|
|
g_return_val_if_fail(request_msg != NULL,
|
|
LASSO_PARAM_ERROR_INVALID_VALUE);
|
|
|
|
profile = LASSO_PROFILE(name_registration);
|
|
|
|
profile->request = lasso_lib_register_name_identifier_request_new();
|
|
format = lasso_node_init_from_message(LASSO_NODE(profile->request), request_msg);
|
|
if (format == LASSO_MESSAGE_FORMAT_UNKNOWN || format == LASSO_MESSAGE_FORMAT_ERROR) {
|
|
return critical_error(LASSO_PROFILE_ERROR_INVALID_MSG);
|
|
}
|
|
|
|
remote_provider = lasso_server_get_provider(profile->server,
|
|
LASSO_LIB_REGISTER_NAME_IDENTIFIER_REQUEST(profile->request)->ProviderID);
|
|
if (LASSO_IS_PROVIDER(remote_provider) == FALSE) {
|
|
return critical_error(LASSO_SERVER_ERROR_PROVIDER_NOT_FOUND);
|
|
}
|
|
|
|
/* verify signatures */
|
|
profile->signature_status = lasso_provider_verify_signature(
|
|
remote_provider, request_msg, "RequestID", format);
|
|
|
|
if (format == LASSO_MESSAGE_FORMAT_SOAP)
|
|
profile->http_request_method = LASSO_HTTP_METHOD_SOAP;
|
|
if (format == LASSO_MESSAGE_FORMAT_QUERY)
|
|
profile->http_request_method = LASSO_HTTP_METHOD_REDIRECT;
|
|
|
|
request = LASSO_LIB_REGISTER_NAME_IDENTIFIER_REQUEST(profile->request);
|
|
|
|
name_registration->oldNameIdentifier = NULL;
|
|
if (remote_provider->role == LASSO_PROVIDER_ROLE_IDP) {
|
|
/* IdP initiated */
|
|
if (request->SPProvidedNameIdentifier) {
|
|
profile->nameIdentifier = LASSO_NODE(g_object_ref(request->SPProvidedNameIdentifier));
|
|
} else {
|
|
profile->nameIdentifier = LASSO_NODE(g_object_ref(request->IDPProvidedNameIdentifier));
|
|
name_registration->oldNameIdentifier = g_object_ref(
|
|
request->OldProvidedNameIdentifier);
|
|
}
|
|
} else if (remote_provider->role == LASSO_PROVIDER_ROLE_SP) {
|
|
/* SP initiated, profile->name */
|
|
profile->nameIdentifier = LASSO_NODE(g_object_ref(request->IDPProvidedNameIdentifier));
|
|
}
|
|
|
|
return profile->signature_status;
|
|
}
|
|
|
|
|
|
/**
|
|
* lasso_name_registration_process_response_msg:
|
|
* @name_registration: a #LassoNameRegistration
|
|
* @response_msg: the register name identifier response message
|
|
*
|
|
* Processes a lib:RegisterNameIdentifierResponse message. Rebuilds a response
|
|
* object from the message and optionally verifies its signature.
|
|
*
|
|
* If the response depicts Success it will also update Principal federation.
|
|
*
|
|
* Return value: 0 on success; or a negative value otherwise.
|
|
**/
|
|
gint
|
|
lasso_name_registration_process_response_msg(LassoNameRegistration *name_registration,
|
|
char *response_msg)
|
|
{
|
|
LassoProfile *profile;
|
|
LassoProvider *remote_provider;
|
|
LassoFederation *federation;
|
|
LassoSamlNameIdentifier *nameIdentifier = NULL;
|
|
LassoLibStatusResponse *response;
|
|
LassoMessageFormat format;
|
|
int rc = 0;
|
|
char *statusCodeValue;
|
|
|
|
g_return_val_if_fail(LASSO_IS_NAME_REGISTRATION(name_registration),
|
|
LASSO_PARAM_ERROR_INVALID_VALUE);
|
|
g_return_val_if_fail(response_msg != NULL, LASSO_PARAM_ERROR_INVALID_VALUE);
|
|
|
|
profile = LASSO_PROFILE(name_registration);
|
|
|
|
/* build register name identifier response from message */
|
|
profile->response = lasso_lib_register_name_identifier_response_new();
|
|
format = lasso_node_init_from_message(LASSO_NODE(profile->response), response_msg);
|
|
if (format == LASSO_MESSAGE_FORMAT_UNKNOWN || format == LASSO_MESSAGE_FORMAT_ERROR) {
|
|
return critical_error(LASSO_PROFILE_ERROR_INVALID_MSG);
|
|
}
|
|
|
|
remote_provider = lasso_server_get_provider(profile->server,
|
|
LASSO_LIB_STATUS_RESPONSE(profile->response)->ProviderID);
|
|
if (LASSO_IS_PROVIDER(remote_provider) == FALSE) {
|
|
return critical_error(LASSO_SERVER_ERROR_PROVIDER_NOT_FOUND);
|
|
}
|
|
|
|
/* verify signature */
|
|
rc = lasso_provider_verify_signature(remote_provider, response_msg, "ResponseID", format);
|
|
|
|
response = LASSO_LIB_STATUS_RESPONSE(profile->response);
|
|
if (response->Status == NULL || response->Status->StatusCode == NULL
|
|
|| response->Status->StatusCode->Value == NULL) {
|
|
return critical_error(LASSO_PROFILE_ERROR_MISSING_STATUS_CODE);
|
|
}
|
|
statusCodeValue = response->Status->StatusCode->Value;
|
|
|
|
if (strcmp(statusCodeValue, LASSO_SAML_STATUS_CODE_SUCCESS) != 0) {
|
|
message(G_LOG_LEVEL_CRITICAL, "Status code not success: %s", statusCodeValue);
|
|
return LASSO_PROFILE_ERROR_STATUS_NOT_SUCCESS;
|
|
}
|
|
|
|
/* Update federation with the nameIdentifier attribute. NameQualifier
|
|
* is local ProviderID and format is Federated type */
|
|
if (LASSO_IS_IDENTITY(profile->identity) == FALSE) {
|
|
return critical_error(LASSO_PROFILE_ERROR_IDENTITY_NOT_FOUND);
|
|
}
|
|
|
|
federation = g_hash_table_lookup(profile->identity->federations,
|
|
profile->remote_providerID);
|
|
if (LASSO_IS_FEDERATION(federation) == FALSE) {
|
|
return critical_error(LASSO_PROFILE_ERROR_FEDERATION_NOT_FOUND);
|
|
}
|
|
|
|
remote_provider = lasso_server_get_provider(profile->server, profile->remote_providerID);
|
|
if (LASSO_IS_PROVIDER(remote_provider) == FALSE) {
|
|
return critical_error(LASSO_SERVER_ERROR_PROVIDER_NOT_FOUND);
|
|
}
|
|
|
|
if (remote_provider->role == LASSO_PROVIDER_ROLE_SP) {
|
|
nameIdentifier = LASSO_LIB_REGISTER_NAME_IDENTIFIER_REQUEST(
|
|
profile->request)->IDPProvidedNameIdentifier;
|
|
}
|
|
if (remote_provider->role == LASSO_PROVIDER_ROLE_IDP) {
|
|
nameIdentifier = LASSO_LIB_REGISTER_NAME_IDENTIFIER_REQUEST(
|
|
profile->request)->SPProvidedNameIdentifier;
|
|
}
|
|
if (nameIdentifier == NULL) {
|
|
message(G_LOG_LEVEL_CRITICAL, "Invalid provider role"); /* ??? */
|
|
return LASSO_PROFILE_ERROR_MISSING_NAME_IDENTIFIER;
|
|
}
|
|
|
|
if (federation->local_nameIdentifier)
|
|
lasso_node_destroy(LASSO_NODE(federation->local_nameIdentifier));
|
|
federation->local_nameIdentifier = LASSO_NODE(g_object_ref(nameIdentifier));
|
|
profile->identity->is_dirty = TRUE;
|
|
|
|
/* set the relay state */
|
|
profile->msg_relayState = g_strdup(
|
|
LASSO_LIB_STATUS_RESPONSE(profile->response)->RelayState);
|
|
|
|
return rc;
|
|
}
|
|
|
|
|
|
/**
|
|
* lasso_name_registration_validate_request:
|
|
* @name_registration: a #LassoNameRegistration
|
|
*
|
|
* Checks profile request with regards to message status and principal
|
|
* federations, update them accordingly and prepares a
|
|
* lib:RegisterNameIdentifierResponse accordingly.
|
|
*
|
|
* Return value: 0 on success; or a negative value otherwise.
|
|
**/
|
|
gint
|
|
lasso_name_registration_validate_request(LassoNameRegistration *name_registration)
|
|
{
|
|
LassoProfile *profile;
|
|
LassoProvider *remote_provider;
|
|
LassoFederation *federation;
|
|
LassoLibRegisterNameIdentifierRequest *request;
|
|
LassoSamlNameIdentifier *providedNameIdentifier = NULL;
|
|
|
|
g_return_val_if_fail(LASSO_IS_NAME_REGISTRATION(name_registration),
|
|
LASSO_PARAM_ERROR_INVALID_VALUE);
|
|
|
|
profile = LASSO_PROFILE(name_registration);
|
|
|
|
/* verify the register name identifier request */
|
|
if (LASSO_IS_LIB_REGISTER_NAME_IDENTIFIER_REQUEST(profile->request) == FALSE) {
|
|
message(G_LOG_LEVEL_CRITICAL, "Register Name Identifier request not found");
|
|
return LASSO_PROFILE_ERROR_MISSING_REQUEST;
|
|
}
|
|
|
|
request = LASSO_LIB_REGISTER_NAME_IDENTIFIER_REQUEST(profile->request);
|
|
|
|
/* set the remote provider id from the request */
|
|
profile->remote_providerID = g_strdup(request->ProviderID);
|
|
if (profile->remote_providerID == NULL) {
|
|
return LASSO_PROFILE_ERROR_MISSING_REMOTE_PROVIDERID;
|
|
}
|
|
|
|
/* set register name identifier response */
|
|
profile->response = lasso_lib_register_name_identifier_response_new_full(
|
|
LASSO_PROVIDER(profile->server)->ProviderID,
|
|
LASSO_SAML_STATUS_CODE_SUCCESS,
|
|
LASSO_LIB_REGISTER_NAME_IDENTIFIER_REQUEST(profile->request),
|
|
profile->server->certificate ?
|
|
LASSO_SIGNATURE_TYPE_WITHX509 : LASSO_SIGNATURE_TYPE_SIMPLE,
|
|
lasso_get_default_signature_method());
|
|
if (LASSO_IS_LIB_REGISTER_NAME_IDENTIFIER_RESPONSE(profile->response) == FALSE) {
|
|
return critical_error(LASSO_PROFILE_ERROR_BUILDING_RESPONSE_FAILED);
|
|
}
|
|
|
|
/* verify federation */
|
|
if (profile->identity == NULL) {
|
|
return critical_error(LASSO_PROFILE_ERROR_IDENTITY_NOT_FOUND);
|
|
}
|
|
|
|
federation = g_hash_table_lookup(profile->identity->federations,
|
|
profile->remote_providerID);
|
|
if (LASSO_IS_FEDERATION(federation) == FALSE) {
|
|
return critical_error(LASSO_PROFILE_ERROR_FEDERATION_NOT_FOUND);
|
|
}
|
|
|
|
if (request->OldProvidedNameIdentifier == NULL) {
|
|
message(G_LOG_LEVEL_CRITICAL, "Old provided name identifier not found");
|
|
return LASSO_PROFILE_ERROR_MISSING_NAME_IDENTIFIER;
|
|
}
|
|
|
|
if (lasso_federation_verify_name_identifier(federation, LASSO_NODE(
|
|
request->OldProvidedNameIdentifier)) == FALSE) {
|
|
message(G_LOG_LEVEL_CRITICAL, "No name identifier");
|
|
return LASSO_PROFILE_ERROR_MISSING_NAME_IDENTIFIER;
|
|
}
|
|
|
|
remote_provider = lasso_server_get_provider(profile->server, profile->remote_providerID);
|
|
if (LASSO_IS_PROVIDER(remote_provider) == FALSE) {
|
|
return critical_error(LASSO_SERVER_ERROR_PROVIDER_NOT_FOUND);
|
|
}
|
|
|
|
/* update name identifier in federation */
|
|
if (remote_provider->role == LASSO_PROVIDER_ROLE_SP) {
|
|
providedNameIdentifier = request->SPProvidedNameIdentifier;
|
|
}
|
|
if (remote_provider->role == LASSO_PROVIDER_ROLE_IDP) {
|
|
providedNameIdentifier = request->IDPProvidedNameIdentifier;
|
|
}
|
|
if (providedNameIdentifier == NULL) {
|
|
message(G_LOG_LEVEL_CRITICAL, "Sp provided name identifier not found");
|
|
return LASSO_PROFILE_ERROR_MISSING_NAME_IDENTIFIER;
|
|
}
|
|
|
|
if (federation->remote_nameIdentifier)
|
|
lasso_node_destroy(LASSO_NODE(federation->remote_nameIdentifier));
|
|
federation->remote_nameIdentifier = LASSO_NODE(g_object_ref(providedNameIdentifier));
|
|
profile->identity->is_dirty = TRUE;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
|
|
/*****************************************************************************/
|
|
/* private methods */
|
|
/*****************************************************************************/
|
|
|
|
static struct XmlSnippet schema_snippets[] = {
|
|
{ "OldNameIdentifier", SNIPPET_NODE_IN_CHILD,
|
|
G_STRUCT_OFFSET(LassoNameRegistration, oldNameIdentifier), NULL, NULL, NULL},
|
|
{ "NameRegistrationDumpVersion", SNIPPET_ATTRIBUTE, 0, NULL, NULL, NULL},
|
|
{NULL, 0, 0, NULL, NULL, NULL}
|
|
};
|
|
|
|
static LassoNodeClass *parent_class = NULL;
|
|
|
|
static xmlNode*
|
|
get_xmlNode(LassoNode *node, gboolean lasso_dump)
|
|
{
|
|
xmlNode *xmlnode;
|
|
|
|
xmlnode = parent_class->get_xmlNode(node, lasso_dump);
|
|
xmlSetProp(xmlnode, (xmlChar*)"NameRegistrationDumpVersion", (xmlChar*)"2");
|
|
|
|
return xmlnode;
|
|
}
|
|
|
|
static int
|
|
init_from_xml(LassoNode *node, xmlNode *xmlnode)
|
|
{
|
|
return parent_class->init_from_xml(node, xmlnode);
|
|
}
|
|
|
|
/*****************************************************************************/
|
|
/* instance and class init functions */
|
|
/*****************************************************************************/
|
|
|
|
static void
|
|
instance_init(LassoNameRegistration *name_registration, G_GNUC_UNUSED void *unused)
|
|
{
|
|
name_registration->oldNameIdentifier = NULL;
|
|
}
|
|
|
|
static void
|
|
class_init(LassoNameRegistrationClass *klass, void *unused G_GNUC_UNUSED)
|
|
{
|
|
LassoNodeClass *nclass = LASSO_NODE_CLASS(klass);
|
|
|
|
parent_class = g_type_class_peek_parent(klass);
|
|
nclass->get_xmlNode = get_xmlNode;
|
|
nclass->init_from_xml = init_from_xml;
|
|
nclass->node_data = g_new0(LassoNodeClassData, 1);
|
|
lasso_node_class_set_nodename(nclass, "NameRegistration");
|
|
lasso_node_class_set_ns(nclass, LASSO_LASSO_HREF, LASSO_LASSO_PREFIX);
|
|
lasso_node_class_add_snippets(nclass, schema_snippets);
|
|
}
|
|
|
|
GType
|
|
lasso_name_registration_get_type()
|
|
{
|
|
static GType this_type = 0;
|
|
|
|
if (!this_type) {
|
|
static const GTypeInfo this_info = {
|
|
sizeof (LassoNameRegistrationClass),
|
|
NULL,
|
|
NULL,
|
|
(GClassInitFunc) class_init,
|
|
NULL,
|
|
NULL,
|
|
sizeof(LassoNameRegistration),
|
|
0,
|
|
(GInstanceInitFunc) instance_init,
|
|
NULL
|
|
};
|
|
|
|
this_type = g_type_register_static(LASSO_TYPE_PROFILE,
|
|
"LassoNameRegistration", &this_info, 0);
|
|
}
|
|
return this_type;
|
|
}
|
|
|
|
/**
|
|
* lasso_name_registration_new:
|
|
* @server: the #LassoServer
|
|
*
|
|
* Creates a new #LassoNameRegistration.
|
|
*
|
|
* Return value: a newly created #LassoNameRegistration object; or NULL if
|
|
* an error occured
|
|
**/
|
|
LassoNameRegistration *
|
|
lasso_name_registration_new(LassoServer *server)
|
|
{
|
|
LassoNameRegistration *name_registration;
|
|
|
|
g_return_val_if_fail(LASSO_IS_SERVER(server), NULL);
|
|
|
|
name_registration = g_object_new(LASSO_TYPE_NAME_REGISTRATION, NULL);
|
|
LASSO_PROFILE(name_registration)->server = g_object_ref(server);
|
|
|
|
return name_registration;
|
|
}
|
|
|
|
/**
|
|
* lasso_name_registration_new_from_dump:
|
|
* @server: the #LassoServer
|
|
* @dump: XML logout dump
|
|
*
|
|
* Restores the @dump to a new #LassoNameRegistration.
|
|
*
|
|
* Return value: a newly created #LassoNameRegistration; or NULL if an error
|
|
* occured
|
|
**/
|
|
LassoNameRegistration*
|
|
lasso_name_registration_new_from_dump(LassoServer *server, const char *dump)
|
|
{
|
|
LassoNameRegistration *name_registration;
|
|
xmlDoc *doc;
|
|
|
|
if (dump == NULL)
|
|
return NULL;
|
|
|
|
name_registration = lasso_name_registration_new(server);
|
|
doc = xmlParseMemory(dump, strlen(dump));
|
|
init_from_xml(LASSO_NODE(name_registration), xmlDocGetRootElement(doc));
|
|
lasso_release_doc(doc);
|
|
|
|
return name_registration;
|
|
}
|
|
|
|
/**
|
|
* lasso_name_registration_dump:
|
|
* @name_registration: a #LassoNameRegistration
|
|
*
|
|
* Dumps @name_registration content to an XML string.
|
|
*
|
|
* Return value:(transfer full): the dump string. It must be freed by the caller.
|
|
**/
|
|
gchar *
|
|
lasso_name_registration_dump(LassoNameRegistration *name_registration)
|
|
{
|
|
return lasso_node_dump(LASSO_NODE(name_registration));
|
|
}
|