lasso/lasso/id-wsf-2.0/saml2_login.c

295 lines
10 KiB
C

/* $Id$
*
* Lasso - A free implementation of the Liberty Alliance specifications.
*
* Copyright (C) 2004-2007 Entr'ouvert
* http://lasso.entrouvert.org
*
* Authors: See AUTHORS file in top-level directory.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
#include "./saml2_login.h"
#include "../xml/id-wsf-2.0/idwsf2_strings.h"
#include "identity.h"
#include "server.h"
#include "session.h"
#include "../id-ff/login.h"
#include "../saml-2.0/saml2_helper.h"
#include "../saml-2.0/provider.h"
#include "../xml/saml-2.0/saml2_assertion.h"
#include "../xml/ws/wsa_endpoint_reference.h"
#include "../xml/id-wsf-2.0/disco_abstract.h"
#include "../xml/id-wsf-2.0/disco_provider_id.h"
#include "../xml/id-wsf-2.0/disco_service_type.h"
#include "../xml/id-wsf-2.0/disco_service_context.h"
#include "../xml/id-wsf-2.0/disco_security_context.h"
#include "../xml/id-wsf-2.0/sec_token.h"
#include "../xml/id-wsf-2.0/sbf_framework.h"
#include "../id-wsf/wsf_utils.h"
#include "../xml/saml-2.0/saml2_attribute.h"
#include "../xml/saml-2.0/saml2_attribute_statement.h"
#include "../xml/saml-2.0/saml2_attribute_value.h"
#include "../xml/saml-2.0/samlp2_response.h"
#include "./idwsf2_helper.h"
#include "../xml/private.h"
/**
* lasso_server_create_assertion_as_idwsf2_security_token:
* @server: a #LassoServer object
* @name_id: a #LassoSaml2NameID object
* @tolerance: tolerance around the normal duration which is accepted
* @duration: life duration for this assertion in seconds
* @cipher: whether to cipher the NameID
* @audience:(allow-none)(optional): if @cipher is true, the provider for which to encrypt the NameID
*
* Create a new assertion usable as a security token in an ID-WSF 2.0 EndpointReference. See
* lasso_saml2_assertion_set_basic_conditions() for detail about @tolerance and @duration.
*
* Return value:(transfer full)(allow-none): a newly allocated #LassoSaml2Assertion object, or NULL.
*/
LassoSaml2Assertion*
lasso_server_create_assertion_as_idwsf2_security_token(LassoServer *server,
LassoSaml2NameID *name_id,
int tolerance,
int duration,
gboolean cipher,
LassoProvider *audience)
{
LassoSaml2Assertion *assertion;
int rc = 0;
if (! LASSO_IS_SERVER(server))
return NULL;
if (! LASSO_IS_SAML2_NAME_ID(name_id))
return NULL;
if (cipher && ! LASSO_IS_PROVIDER(audience))
return NULL;
assertion = (LassoSaml2Assertion*)lasso_saml2_assertion_new();
assertion->ID = lasso_build_unique_id(32);
assertion->Issuer = (LassoSaml2NameID*)lasso_saml2_name_id_new_with_string(server->parent.ProviderID);
assertion->Subject = (LassoSaml2Subject*)lasso_saml2_subject_new();
if (cipher) {
LassoSaml2EncryptedElement *encrypted_id =
lasso_provider_saml2_node_encrypt(audience, (LassoNode*)name_id);
if (! encrypted_id) {
lasso_release_gobject(assertion);
goto cleanup;
}
lasso_assign_gobject(assertion->Subject->EncryptedID, encrypted_id);
} else {
lasso_assign_new_gobject(assertion->Subject->NameID, name_id);
}
lasso_saml2_assertion_set_basic_conditions(assertion,
tolerance, duration, FALSE);
rc = lasso_server_saml2_assertion_setup_signature(server, assertion);
if (rc != 0) {
lasso_release_gobject(assertion);
}
cleanup:
return assertion;
}
/**
* lasso_login_idwsf2_add_discovery_bootstrap_epr:
* @login: a #LassoLogin object
* @url: the Disco service address
* @abstract: the Disco service description
* @security_mechanisms:(allow-none)(element-type utf8): the list of supported security mechanisms
* @tolerance:(default -1): see lasso_saml2_assertion_set_basic_conditions().
* @duration:(default 0): see lasso_saml2_assertion_set_basic_conditions().
*
* Add the needed bootstrap attribute to the #LassoSaml2Assertion currently container in the
* #LassoLogin object. This function should be called after lasso_login_build_assertion() by an IdP
* also having the Discovery service role.
*
* The default @tolerance and @duration are respectively ten minutes and two days.
*
* Return value: 0 if successfull, otherwise #LASSO_PROFILE_ERROR_MISSING_ASSERTION if no assertion is present
* in the #LassoLogin object, #LASSO_PARAM_ERROR_BAD_TYPE_OR_NULL_OBJ if login is not a #LassoLogin
* object.
*/
int
lasso_login_idwsf2_add_discovery_bootstrap_epr(LassoLogin *login, const char *url,
const char *abstract, GList *security_mechanisms, int tolerance, int duration)
{
LassoWsAddrEndpointReference *epr = NULL;
LassoWsAddrMetadata *metadata = NULL;
LassoSaml2AttributeStatement *attributeStatement = NULL;
LassoSaml2Attribute *attribute = NULL;
LassoSaml2AttributeValue *attributeValue = NULL;
LassoIdWsf2DiscoSecurityContext *security_context = NULL;
LassoIdWsf2SecToken *sec_token = NULL;
LassoSaml2Assertion *assertion_identity_token = NULL;
LassoSaml2Assertion *assertion = NULL;
LassoServer *server = NULL;
LassoSaml2NameID *name_id = NULL;
int rc = 0;
lasso_bad_param(LOGIN, login);
lasso_null_param(url);
lasso_null_param(abstract);
/* Check for the presence of an assertion */
assertion = (LassoSaml2Assertion*) lasso_login_get_assertion (login);
if (! LASSO_IS_SAML2_ASSERTION (assertion)) {
lasso_release_gobject(assertion);
return LASSO_PROFILE_ERROR_MISSING_ASSERTION;
}
lasso_extract_node_or_fail(server, login->parent.server, SERVER,
LASSO_PROFILE_ERROR_MISSING_SERVER);
/* Warn if the assertion is not a fresh one, we should not modify received assertion */
if (lasso_node_get_original_xmlnode((LassoNode*)assertion) != NULL) {
message(G_LOG_LEVEL_WARNING, "%s should only be called after lasso_login_build_assertion", __func__);
}
/* Build EndpointReference */
epr = lasso_wsa_endpoint_reference_new_for_idwsf2_service(
url, LASSO_IDWSF2_DISCOVERY_HREF, server->parent.ProviderID, abstract);
/* Security/Identity token */
if (duration <= 0) {
duration = 2 * LASSO_DURATION_DAY;
}
if (tolerance < 0) {
tolerance = 10*LASSO_DURATION_MINUTE;
}
/* If the NameID is encrypted try to get to he unencrypted one */
if (assertion->Subject->NameID) {
name_id = assertion->Subject->NameID;
} else if (assertion->Subject->EncryptedID &&
LASSO_IS_SAML2_NAME_ID(assertion->Subject->EncryptedID->original_data)) {
name_id = (LassoSaml2NameID*)assertion->Subject->EncryptedID->original_data;
}
goto_cleanup_if_fail_with_rc (name_id, LASSO_PROFILE_ERROR_MISSING_NAME_IDENTIFIER);
assertion_identity_token = lasso_server_create_assertion_as_idwsf2_security_token(server,
name_id, tolerance, duration, TRUE, &server->parent);
/* Add the assertion to the EPR */
rc = lasso_wsa_endpoint_reference_add_security_token(epr,
(LassoNode*)assertion_identity_token, security_mechanisms);
goto_cleanup_if_fail(rc == 0);
/* Add the EPR to the assertion as a SAML attribute */
rc = lasso_saml2_assertion_add_attribute_with_node(assertion,
LASSO_SAML2_ATTRIBUTE_NAME_EPR, LASSO_SAML2_ATTRIBUTE_NAME_FORMAT_URI, (LassoNode*)epr);
cleanup:
lasso_release_gobject(assertion);
lasso_release_gobject(epr);
lasso_release_gobject(metadata);
lasso_release_gobject(attributeStatement);
lasso_release_gobject(attribute);
lasso_release_gobject(attributeValue);
lasso_release_gobject(security_context);
lasso_release_gobject(sec_token);
lasso_release_gobject(assertion_identity_token);
return rc;
}
/**
* lasso_saml2_assertion_idwsf2_get_discovery_bootstrap_epr:
* @assertion: a #LassoSaml2Assertion object
*
* Extract the Discovery bootstrap EPR from @assertion.
*
* Return value:(transfer none): a #LassoWsAddrEndpointReference or NULL if no bootstrap EPR is found.
*/
LassoWsAddrEndpointReference*
lasso_saml2_assertion_idwsf2_get_discovery_bootstrap_epr(LassoSaml2Assertion *assertion)
{
LassoSaml2AttributeStatement *attribute_statement = NULL;
LassoSaml2Attribute *attribute = NULL;
LassoSaml2AttributeValue *attribute_value = NULL;
GList *i = NULL, *j = NULL, *k = NULL;
LassoWsAddrEndpointReference *rc = NULL;
if (! LASSO_IS_SAML2_ASSERTION (assertion)) {
return NULL;
}
lasso_foreach (i, assertion->AttributeStatement)
{
if (! LASSO_IS_SAML2_ATTRIBUTE_STATEMENT (i->data))
continue;
attribute_statement = LASSO_SAML2_ATTRIBUTE_STATEMENT(i->data);
lasso_foreach (j, attribute_statement->Attribute)
{
if (! LASSO_IS_SAML2_ATTRIBUTE(j->data))
continue;
attribute = LASSO_SAML2_ATTRIBUTE(j->data);
if (lasso_strisnotequal(attribute->Name,LASSO_SAML2_ATTRIBUTE_NAME_EPR))
continue;
/* There should only one attribute value, and the EPR should be the first
* contained node */
if (! attribute->AttributeValue)
continue;
if (! LASSO_IS_SAML2_ATTRIBUTE_VALUE (attribute->AttributeValue->data))
continue;
attribute_value = (LassoSaml2AttributeValue*)attribute->AttributeValue->data;
lasso_foreach (k, attribute_value->any) {
if (! k->data) {
message(G_LOG_LEVEL_CRITICAL, "found a NULL in attribute_value->any");
break; /* NULL here ? bad... */
}
if (! LASSO_IS_WSA_ENDPOINT_REFERENCE (k->data))
continue;
rc = (LassoWsAddrEndpointReference*)g_object_ref(k->data);
goto cleanup;
}
}
}
cleanup:
return rc;
}
/**
* lasso_login_idwsf2_get_discovery_bootstrap_epr:
* @login: a #LassoLogin object
*
* Extract the Discovery boostrap EPR from the attribute named #LASSO_SAML2_ATTRIBUTE_NAME_EPR.
*
* Return value:(transfer none): a caller owned #LassoWsAddrEndpointReference object, or NULL if none can be found.
*/
LassoWsAddrEndpointReference *
lasso_login_idwsf2_get_discovery_bootstrap_epr(LassoLogin *login)
{
LassoProfile *profile = NULL;
LassoSaml2Assertion *assertion = NULL;
LassoWsAddrEndpointReference *rc = NULL;
g_return_val_if_fail (LASSO_IS_LOGIN (login), NULL);
profile = &login->parent;
assertion = (LassoSaml2Assertion*)lasso_login_get_assertion(login);
rc = lasso_saml2_assertion_idwsf2_get_discovery_bootstrap_epr(assertion);
lasso_release_gobject(assertion);
return rc;
}