598 lines
21 KiB
C
598 lines
21 KiB
C
/* $Id$
|
|
*
|
|
* Lasso - A free implementation of the Liberty Alliance specifications.
|
|
*
|
|
* Copyright (C) 2004-2007 Entr'ouvert
|
|
* http://lasso.entrouvert.org
|
|
*
|
|
* Authors: See AUTHORS file in top-level directory.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
|
*/
|
|
|
|
#include "../xml/private.h"
|
|
#include "providerprivate.h"
|
|
#include "logoutprivate.h"
|
|
#include "profileprivate.h"
|
|
#include "federationprivate.h"
|
|
|
|
#include "../id-ff/providerprivate.h"
|
|
#include "../id-ff/logout.h"
|
|
#include "../id-ff/logoutprivate.h"
|
|
#include "../id-ff/identityprivate.h"
|
|
#include "../id-ff/sessionprivate.h"
|
|
#include "../id-ff/profileprivate.h"
|
|
#include "../id-ff/serverprivate.h"
|
|
|
|
#include "../xml/xml_enc.h"
|
|
|
|
#include "../xml/saml-2.0/samlp2_logout_request.h"
|
|
#include "../xml/saml-2.0/samlp2_logout_response.h"
|
|
#include "../xml/saml-2.0/saml2_assertion.h"
|
|
#include "../utils.h"
|
|
|
|
static void check_soap_support(gchar *key, LassoProvider *provider, LassoProfile *profile);
|
|
|
|
int
|
|
lasso_saml20_logout_init_request(LassoLogout *logout, LassoProvider *remote_provider,
|
|
LassoHttpMethod http_method)
|
|
{
|
|
LassoProfile *profile = LASSO_PROFILE(logout);
|
|
LassoNode *assertion_n, *name_id_n;
|
|
LassoSaml2Assertion *assertion;
|
|
LassoSaml2NameID *name_id;
|
|
LassoFederation *federation;
|
|
LassoSession *session;
|
|
LassoSamlp2RequestAbstract *request;
|
|
LassoSaml2EncryptedElement *encrypted_element = NULL;
|
|
|
|
/* session existence has been checked in id-ff/ */
|
|
session = lasso_profile_get_session(profile);
|
|
|
|
assertion_n = lasso_session_get_assertion(session, profile->remote_providerID);
|
|
if (LASSO_IS_SAML2_ASSERTION(assertion_n) == FALSE) {
|
|
return critical_error(LASSO_PROFILE_ERROR_MISSING_ASSERTION);
|
|
}
|
|
|
|
assertion = LASSO_SAML2_ASSERTION(assertion_n);
|
|
|
|
if (assertion->Subject == NULL) {
|
|
return LASSO_PROFILE_ERROR_MISSING_SUBJECT;
|
|
}
|
|
|
|
if (assertion->Subject->NameID == NULL) {
|
|
return LASSO_PROFILE_ERROR_MISSING_NAME_IDENTIFIER;
|
|
}
|
|
|
|
name_id = assertion->Subject->NameID;
|
|
if (name_id->Format && strcmp(name_id->Format,
|
|
LASSO_SAML2_NAME_IDENTIFIER_FORMAT_PERSISTENT) == 0) {
|
|
char *name_id_sp_name_qualifier = NULL;
|
|
|
|
if (LASSO_IS_IDENTITY(profile->identity) == FALSE) {
|
|
return critical_error(LASSO_PROFILE_ERROR_IDENTITY_NOT_FOUND);
|
|
}
|
|
|
|
if (remote_provider->private_data->affiliation_id) {
|
|
name_id_sp_name_qualifier = remote_provider->private_data->affiliation_id;
|
|
} else {
|
|
name_id_sp_name_qualifier = profile->remote_providerID;
|
|
}
|
|
|
|
federation = g_hash_table_lookup(profile->identity->federations,
|
|
name_id_sp_name_qualifier);
|
|
if (federation == NULL) {
|
|
return critical_error(LASSO_PROFILE_ERROR_FEDERATION_NOT_FOUND);
|
|
}
|
|
|
|
name_id_n = lasso_profile_get_nameIdentifier(profile);
|
|
if (name_id_n == NULL) {
|
|
return critical_error(LASSO_PROFILE_ERROR_NAME_IDENTIFIER_NOT_FOUND);
|
|
}
|
|
if (federation->local_nameIdentifier) {
|
|
lasso_assign_gobject(profile->nameIdentifier, federation->local_nameIdentifier);
|
|
} else {
|
|
lasso_assign_gobject(profile->nameIdentifier, name_id_n);
|
|
}
|
|
|
|
} else {
|
|
lasso_assign_gobject(profile->nameIdentifier, name_id);
|
|
}
|
|
|
|
if (http_method == LASSO_HTTP_METHOD_ANY) {
|
|
http_method = lasso_provider_get_first_http_method(
|
|
LASSO_PROVIDER(profile->server),
|
|
remote_provider,
|
|
LASSO_MD_PROTOCOL_TYPE_SINGLE_LOGOUT);
|
|
} else {
|
|
if (lasso_provider_accept_http_method(LASSO_PROVIDER(profile->server),
|
|
remote_provider,
|
|
LASSO_MD_PROTOCOL_TYPE_SINGLE_LOGOUT,
|
|
http_method,
|
|
TRUE) == FALSE) {
|
|
if (http_method == LASSO_HTTP_METHOD_REDIRECT) {
|
|
/* it was probably used as last resort, and
|
|
* failed, since the remote provider doesn't
|
|
* support any logout. remove assertion
|
|
* unconditionnaly. */
|
|
lasso_session_remove_assertion(profile->session,
|
|
profile->remote_providerID);
|
|
if (logout->initial_remote_providerID && logout->initial_request) {
|
|
lasso_assign_string(profile->remote_providerID,
|
|
logout->initial_remote_providerID);
|
|
/* XXX: create response
|
|
profile->response = lasso_lib_logout_response_new_full(
|
|
LASSO_PROVIDER(profile->server)->ProviderID,
|
|
LASSO_SAML_STATUS_CODE_SUCCESS,
|
|
LASSO_LIB_LOGOUT_REQUEST(logout->initial_request),
|
|
LASSO_SIGNATURE_TYPE_NONE,
|
|
0);
|
|
*/
|
|
}
|
|
}
|
|
return LASSO_PROFILE_ERROR_UNSUPPORTED_PROFILE;
|
|
}
|
|
}
|
|
|
|
lasso_assign_new_gobject(profile->request, lasso_samlp2_logout_request_new());
|
|
request = LASSO_SAMLP2_REQUEST_ABSTRACT(profile->request);
|
|
lasso_assign_new_string(request->ID, lasso_build_unique_id(32));
|
|
lasso_assign_string(request->Version, "2.0");
|
|
lasso_assign_new_gobject(request->Issuer,
|
|
LASSO_SAML2_NAME_ID(lasso_saml2_name_id_new_with_string(
|
|
LASSO_PROVIDER(profile->server)->ProviderID)));
|
|
lasso_assign_new_string(request->IssueInstant, lasso_get_current_time());
|
|
|
|
lasso_assign_gobject(LASSO_SAMLP2_LOGOUT_REQUEST(request)->NameID, profile->nameIdentifier);
|
|
|
|
/* Encrypt NameID */
|
|
if (remote_provider &&
|
|
remote_provider->private_data->encryption_mode & LASSO_ENCRYPTION_MODE_NAMEID
|
|
&& remote_provider->private_data->encryption_public_key != NULL) {
|
|
encrypted_element = LASSO_SAML2_ENCRYPTED_ELEMENT(lasso_node_encrypt(
|
|
LASSO_NODE(LASSO_SAMLP2_LOGOUT_REQUEST(request)->NameID),
|
|
remote_provider->private_data->encryption_public_key,
|
|
remote_provider->private_data->encryption_sym_key_type));
|
|
if (encrypted_element != NULL) {
|
|
lasso_assign_new_gobject(LASSO_SAMLP2_LOGOUT_REQUEST(request)->EncryptedID, encrypted_element);
|
|
lasso_release_gobject(LASSO_SAMLP2_LOGOUT_REQUEST(request)->NameID)
|
|
}
|
|
}
|
|
|
|
logout->initial_http_request_method = http_method;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
int
|
|
lasso_saml20_logout_build_request_msg(LassoLogout *logout, LassoProvider *remote_provider)
|
|
{
|
|
LassoProfile *profile = LASSO_PROFILE(logout);
|
|
|
|
LASSO_SAMLP2_REQUEST_ABSTRACT(profile->request)->sign_method =
|
|
LASSO_SIGNATURE_METHOD_RSA_SHA1;
|
|
if (profile->server->certificate) {
|
|
LASSO_SAMLP2_REQUEST_ABSTRACT(profile->request)->sign_type =
|
|
LASSO_SIGNATURE_TYPE_WITHX509;
|
|
} else {
|
|
LASSO_SAMLP2_REQUEST_ABSTRACT(profile->request)->sign_type =
|
|
LASSO_SIGNATURE_TYPE_SIMPLE;
|
|
}
|
|
lasso_assign_string(LASSO_SAMLP2_REQUEST_ABSTRACT(profile->request)->private_key_file,
|
|
profile->server->private_key);
|
|
lasso_assign_string(LASSO_SAMLP2_REQUEST_ABSTRACT(profile->request)->certificate_file,
|
|
profile->server->certificate);
|
|
|
|
if (logout->initial_http_request_method == LASSO_HTTP_METHOD_SOAP) {
|
|
lasso_assign_new_string(profile->msg_url,
|
|
lasso_provider_get_metadata_one(remote_provider, "SingleLogoutService SOAP"));
|
|
lasso_assign_string(LASSO_SAMLP2_REQUEST_ABSTRACT(profile->request)->Destination,
|
|
profile->msg_url);
|
|
lasso_assign_new_string(profile->msg_body, lasso_node_export_to_soap(profile->request));
|
|
return 0;
|
|
}
|
|
if (logout->initial_http_request_method == LASSO_HTTP_METHOD_REDIRECT) {
|
|
return lasso_saml20_build_http_redirect_query_simple(profile, profile->request,
|
|
TRUE, "SingleLogoutService", FALSE);
|
|
}
|
|
|
|
/* XXX: artifact support */
|
|
|
|
return critical_error(LASSO_PROFILE_ERROR_INVALID_HTTP_METHOD);
|
|
}
|
|
|
|
int
|
|
lasso_saml20_logout_process_request_msg(LassoLogout *logout, char *request_msg)
|
|
{
|
|
LassoProfile *profile = NULL;
|
|
LassoSamlp2LogoutRequest *logout_request = NULL;
|
|
int rc1 = 0, rc2 = 0;
|
|
|
|
lasso_bad_param(LOGOUT, logout);
|
|
lasso_null_param(request_msg);
|
|
|
|
profile = LASSO_PROFILE(logout);
|
|
logout_request = (LassoSamlp2LogoutRequest*) lasso_samlp2_logout_request_new();
|
|
rc1 = lasso_saml20_profile_process_any_request(profile, (LassoNode*)logout_request,
|
|
request_msg);
|
|
|
|
logout_request = (LassoSamlp2LogoutRequest*)profile->request;
|
|
if (rc1 && ! logout_request) {
|
|
return rc1;
|
|
}
|
|
|
|
rc2 = lasso_saml20_profile_process_name_identifier_decryption(profile,
|
|
&logout_request->NameID,
|
|
&logout_request->EncryptedID);
|
|
|
|
|
|
lasso_release_gobject(logout_request);
|
|
if (profile->signature_status) {
|
|
return profile->signature_status;
|
|
}
|
|
if (rc1) {
|
|
return rc1;
|
|
}
|
|
return rc2;
|
|
|
|
}
|
|
|
|
int
|
|
lasso_saml20_logout_validate_request(LassoLogout *logout)
|
|
{
|
|
LassoProfile *profile = LASSO_PROFILE(logout);
|
|
LassoProvider *remote_provider;
|
|
LassoSamlp2StatusResponse *response;
|
|
LassoSaml2NameID *name_id;
|
|
LassoNode *assertion_n;
|
|
LassoSaml2Assertion *assertion;
|
|
LassoFederation *federation;
|
|
|
|
if (LASSO_IS_SAMLP2_LOGOUT_REQUEST(profile->request) == FALSE)
|
|
return LASSO_PROFILE_ERROR_MISSING_REQUEST;
|
|
|
|
lasso_assign_string(profile->remote_providerID,
|
|
LASSO_SAMLP2_REQUEST_ABSTRACT(profile->request)->Issuer->content);
|
|
|
|
/* get the provider */
|
|
remote_provider = g_hash_table_lookup(profile->server->providers,
|
|
profile->remote_providerID);
|
|
if (LASSO_IS_PROVIDER(remote_provider) == FALSE) {
|
|
return critical_error(LASSO_SERVER_ERROR_PROVIDER_NOT_FOUND);
|
|
}
|
|
|
|
lasso_assign_new_gobject(profile->response, lasso_samlp2_logout_response_new());
|
|
response = LASSO_SAMLP2_STATUS_RESPONSE(profile->response);
|
|
lasso_assign_new_string(response->ID, lasso_build_unique_id(32));
|
|
lasso_assign_string(response->Version, "2.0");
|
|
lasso_assign_new_gobject(response->Issuer,
|
|
LASSO_SAML2_NAME_ID(lasso_saml2_name_id_new_with_string(
|
|
LASSO_PROVIDER(profile->server)->ProviderID)));
|
|
lasso_assign_new_string(response->IssueInstant, lasso_get_current_time());
|
|
lasso_assign_string(response->InResponseTo,
|
|
LASSO_SAMLP2_REQUEST_ABSTRACT(profile->request)->ID);
|
|
lasso_saml20_profile_set_response_status(profile, LASSO_SAML2_STATUS_CODE_SUCCESS);
|
|
|
|
response->sign_method = LASSO_SIGNATURE_METHOD_RSA_SHA1;
|
|
if (profile->server->certificate) {
|
|
response->sign_type = LASSO_SIGNATURE_TYPE_WITHX509;
|
|
} else {
|
|
response->sign_type = LASSO_SIGNATURE_TYPE_SIMPLE;
|
|
}
|
|
response->private_key_file = g_strdup(profile->server->private_key);
|
|
response->certificate_file = g_strdup(profile->server->certificate);
|
|
|
|
/* verify signature status */
|
|
if (profile->signature_status != 0) {
|
|
/* XXX: which SAML2 Status Code ? */
|
|
lasso_saml20_profile_set_response_status(profile,
|
|
LASSO_LIB_STATUS_CODE_INVALID_SIGNATURE);
|
|
return profile->signature_status;
|
|
}
|
|
|
|
/* Get the name identifier */
|
|
name_id = LASSO_SAMLP2_LOGOUT_REQUEST(profile->request)->NameID;
|
|
if (name_id == NULL) {
|
|
message(G_LOG_LEVEL_CRITICAL, "Name identifier not found in logout request");
|
|
/* XXX: which status code in SAML 2.0 ? */
|
|
lasso_saml20_profile_set_response_status(
|
|
profile, LASSO_LIB_STATUS_CODE_FEDERATION_DOES_NOT_EXIST);
|
|
return LASSO_PROFILE_ERROR_NAME_IDENTIFIER_NOT_FOUND;
|
|
}
|
|
|
|
if (profile->session == NULL) {
|
|
lasso_saml20_profile_set_response_status(profile,
|
|
LASSO_SAML2_STATUS_CODE_REQUEST_DENIED);
|
|
return critical_error(LASSO_PROFILE_ERROR_SESSION_NOT_FOUND);
|
|
}
|
|
|
|
/* verify authentication */
|
|
assertion_n = lasso_session_get_assertion(profile->session, profile->remote_providerID);
|
|
if (LASSO_IS_SAML2_ASSERTION(assertion_n) == FALSE) {
|
|
message(G_LOG_LEVEL_WARNING, "%s has no assertion", profile->remote_providerID);
|
|
lasso_saml20_profile_set_response_status(profile,
|
|
LASSO_SAML2_STATUS_CODE_REQUEST_DENIED);
|
|
return LASSO_PROFILE_ERROR_MISSING_ASSERTION;
|
|
}
|
|
|
|
assertion = LASSO_SAML2_ASSERTION(assertion_n);
|
|
|
|
/* If name identifier is federated, then verify federation */
|
|
if (strcmp(name_id->Format, LASSO_SAML2_NAME_IDENTIFIER_FORMAT_PERSISTENT) == 0) {
|
|
char *name_id_sp_name_qualifier = NULL;
|
|
if (LASSO_IS_IDENTITY(profile->identity) == FALSE) {
|
|
/* XXX: which SAML 2 status code ? */
|
|
lasso_saml20_profile_set_response_status(profile,
|
|
LASSO_LIB_STATUS_CODE_FEDERATION_DOES_NOT_EXIST);
|
|
return critical_error(LASSO_PROFILE_ERROR_IDENTITY_NOT_FOUND);
|
|
}
|
|
|
|
if (remote_provider->private_data->affiliation_id) {
|
|
name_id_sp_name_qualifier = remote_provider->private_data->affiliation_id;
|
|
} else {
|
|
name_id_sp_name_qualifier = profile->remote_providerID;
|
|
}
|
|
|
|
federation = g_hash_table_lookup(profile->identity->federations,
|
|
name_id_sp_name_qualifier);
|
|
if (LASSO_IS_FEDERATION(federation) == FALSE) {
|
|
/* XXX: which status code in SAML 2 ? */
|
|
lasso_saml20_profile_set_response_status(profile,
|
|
LASSO_LIB_STATUS_CODE_FEDERATION_DOES_NOT_EXIST);
|
|
return critical_error(LASSO_PROFILE_ERROR_FEDERATION_NOT_FOUND);
|
|
}
|
|
|
|
if (lasso_federation_verify_name_identifier(federation,
|
|
LASSO_NODE(name_id)) == FALSE) {
|
|
message(G_LOG_LEVEL_WARNING, "No name identifier for %s",
|
|
profile->remote_providerID);
|
|
lasso_saml20_profile_set_response_status(profile,
|
|
LASSO_LIB_STATUS_CODE_FEDERATION_DOES_NOT_EXIST);
|
|
return LASSO_LOGOUT_ERROR_FEDERATION_NOT_FOUND;
|
|
}
|
|
}
|
|
|
|
/* if SOAP request method at IDP then verify all the remote service providers support
|
|
SOAP protocol profile.
|
|
If one remote authenticated principal service provider doesn't support SOAP
|
|
then return UnsupportedProfile to original service provider */
|
|
if (remote_provider->role == LASSO_PROVIDER_ROLE_SP &&
|
|
profile->http_request_method == LASSO_HTTP_METHOD_SOAP) {
|
|
|
|
logout->private_data->all_soap = TRUE;
|
|
g_hash_table_foreach(profile->server->providers,
|
|
(GHFunc)check_soap_support, profile);
|
|
|
|
if (logout->private_data->all_soap == FALSE) {
|
|
lasso_saml20_profile_set_response_status(profile,
|
|
LASSO_LIB_STATUS_CODE_UNSUPPORTED_PROFILE);
|
|
return LASSO_LOGOUT_ERROR_UNSUPPORTED_PROFILE;
|
|
}
|
|
}
|
|
|
|
/* authentication is ok, federation is ok, propagation support is ok, remove assertion */
|
|
lasso_session_remove_assertion(profile->session, profile->remote_providerID);
|
|
|
|
/* if at IDP and nb sp logged > 1, then backup remote provider id,
|
|
* request and response
|
|
*/
|
|
if (remote_provider->role == LASSO_PROVIDER_ROLE_SP &&
|
|
lasso_session_count_assertions(profile->session) >= 1) {
|
|
lasso_transfer_string(logout->initial_remote_providerID,
|
|
profile->remote_providerID);
|
|
lasso_transfer_gobject(logout->initial_request, profile->request);
|
|
lasso_transfer_gobject(logout->initial_response, profile->response);
|
|
}
|
|
|
|
return 0;
|
|
|
|
|
|
}
|
|
|
|
static void
|
|
check_soap_support(G_GNUC_UNUSED gchar *key, LassoProvider *provider, LassoProfile *profile)
|
|
{
|
|
GList *supported_profiles;
|
|
LassoSaml2Assertion *assertion;
|
|
LassoNode *assertion_n;
|
|
|
|
if (strcmp(provider->ProviderID, profile->remote_providerID) == 0)
|
|
return; /* original service provider (initiated logout) */
|
|
|
|
assertion_n = lasso_session_get_assertion(profile->session, provider->ProviderID);
|
|
if (LASSO_IS_SAML2_ASSERTION(assertion_n) == FALSE) {
|
|
return; /* not authenticated with this provider */
|
|
}
|
|
|
|
assertion = LASSO_SAML2_ASSERTION(assertion_n);
|
|
|
|
supported_profiles = lasso_provider_get_metadata_list(provider,
|
|
"SingleLogoutService SOAP");
|
|
|
|
if (supported_profiles)
|
|
return; /* provider support profile */
|
|
|
|
LASSO_LOGOUT(profile)->private_data->all_soap = FALSE;
|
|
}
|
|
|
|
int
|
|
lasso_saml20_logout_build_response_msg(LassoLogout *logout)
|
|
{
|
|
LassoProfile *profile = LASSO_PROFILE(logout);
|
|
LassoSamlp2StatusResponse *response;
|
|
|
|
if (profile->response == NULL) {
|
|
/* no response set here means request denied */
|
|
lasso_assign_new_gobject(profile->response, lasso_samlp2_logout_response_new());
|
|
response = LASSO_SAMLP2_STATUS_RESPONSE(profile->response);
|
|
lasso_assign_new_string(response->ID, lasso_build_unique_id(32));
|
|
lasso_assign_string(response->Version, "2.0");
|
|
lasso_assign_new_gobject(response->Issuer, LASSO_SAML2_NAME_ID(lasso_saml2_name_id_new_with_string(
|
|
LASSO_PROVIDER(profile->server)->ProviderID)));
|
|
lasso_assign_new_string(response->IssueInstant, lasso_get_current_time());
|
|
if (profile->request) {
|
|
lasso_assign_string(response->InResponseTo,
|
|
LASSO_SAMLP2_REQUEST_ABSTRACT(profile->request)->ID);
|
|
}
|
|
lasso_saml20_profile_set_response_status(profile,
|
|
LASSO_SAML2_STATUS_CODE_REQUEST_DENIED);
|
|
|
|
response->sign_method = LASSO_SIGNATURE_METHOD_RSA_SHA1;
|
|
if (profile->server->certificate) {
|
|
response->sign_type = LASSO_SIGNATURE_TYPE_WITHX509;
|
|
} else {
|
|
response->sign_type = LASSO_SIGNATURE_TYPE_SIMPLE;
|
|
}
|
|
lasso_assign_string(response->private_key_file, profile->server->private_key);
|
|
lasso_assign_string(response->certificate_file, profile->server->certificate);
|
|
}
|
|
|
|
if (profile->remote_providerID == NULL || profile->response == NULL) {
|
|
/* no remote provider id set or no response set, this means
|
|
* this function got called before validate_request, probably
|
|
* because there were no active session */
|
|
return critical_error(LASSO_SERVER_ERROR_PROVIDER_NOT_FOUND);
|
|
}
|
|
|
|
/* build logout response message */
|
|
if (profile->http_request_method == LASSO_HTTP_METHOD_SOAP) {
|
|
lasso_release_string(profile->msg_url);
|
|
lasso_assign_new_string(profile->msg_body, lasso_node_export_to_soap(profile->response));
|
|
return 0;
|
|
}
|
|
|
|
if (profile->http_request_method == LASSO_HTTP_METHOD_REDIRECT) {
|
|
return lasso_saml20_build_http_redirect_query_simple(profile, profile->response, TRUE, "SingleLogoutService", TRUE);
|
|
}
|
|
|
|
return LASSO_PROFILE_ERROR_MISSING_REQUEST;
|
|
}
|
|
|
|
int
|
|
lasso_saml20_logout_process_response_msg(LassoLogout *logout, const char *response_msg)
|
|
{
|
|
LassoProfile *profile = LASSO_PROFILE(logout);
|
|
LassoHttpMethod response_method;
|
|
LassoProvider *remote_provider = NULL;
|
|
LassoSamlp2StatusResponse *response = NULL;
|
|
LassoMessageFormat format;
|
|
char *status_code_value = NULL;
|
|
int rc;
|
|
|
|
lasso_assign_new_gobject(profile->response, lasso_samlp2_logout_response_new());
|
|
format = lasso_node_init_from_message(LASSO_NODE(profile->response), response_msg);
|
|
|
|
switch (format) {
|
|
case LASSO_MESSAGE_FORMAT_SOAP:
|
|
response_method = LASSO_HTTP_METHOD_SOAP;
|
|
break;
|
|
case LASSO_MESSAGE_FORMAT_QUERY:
|
|
response_method = LASSO_HTTP_METHOD_REDIRECT;
|
|
break;
|
|
default:
|
|
return critical_error(LASSO_PROFILE_ERROR_INVALID_MSG);
|
|
}
|
|
|
|
lasso_assign_string(profile->remote_providerID,
|
|
LASSO_SAMLP2_STATUS_RESPONSE(profile->response)->Issuer->content);
|
|
|
|
/* get the provider */
|
|
remote_provider = g_hash_table_lookup(profile->server->providers,
|
|
profile->remote_providerID);
|
|
if (LASSO_IS_PROVIDER(remote_provider) == FALSE) {
|
|
return critical_error(LASSO_SERVER_ERROR_PROVIDER_NOT_FOUND);
|
|
}
|
|
|
|
/* verify signature */
|
|
rc = lasso_provider_verify_signature(remote_provider, response_msg, "ID", format);
|
|
|
|
response = LASSO_SAMLP2_STATUS_RESPONSE(profile->response);
|
|
|
|
if (response->Status == NULL || response->Status->StatusCode == NULL
|
|
|| response->Status->StatusCode->Value == NULL) {
|
|
rc = LASSO_PROFILE_ERROR_MISSING_STATUS_CODE;
|
|
} else {
|
|
status_code_value = response->Status->StatusCode->Value;
|
|
}
|
|
|
|
if (status_code_value && strcmp(status_code_value, LASSO_SAML2_STATUS_CODE_SUCCESS) != 0) {
|
|
/* If at SP, if the request method was a SOAP type, then
|
|
* rebuild the request message with HTTP method */
|
|
/* XXX is this still what to do for SAML 2.0? */
|
|
|
|
if (strcmp(status_code_value, LASSO_SAML2_STATUS_CODE_RESPONDER) == 0) {
|
|
/* Responder -> look inside */
|
|
if (response->Status->StatusCode->StatusCode) {
|
|
status_code_value = response->Status->StatusCode->StatusCode->Value;
|
|
}
|
|
if (status_code_value == NULL) {
|
|
rc = LASSO_PROFILE_ERROR_MISSING_STATUS_CODE;
|
|
}
|
|
}
|
|
if (strcmp(status_code_value, LASSO_SAML2_STATUS_CODE_REQUEST_DENIED) == 0) {
|
|
/* assertion no longer on IdP so removing it locally
|
|
* too */
|
|
lasso_session_remove_assertion(
|
|
profile->session, profile->remote_providerID);
|
|
rc = LASSO_LOGOUT_ERROR_REQUEST_DENIED;
|
|
}
|
|
if (strcmp(status_code_value, LASSO_SAML2_STATUS_CODE_UNKNOWN_PRINCIPAL) == 0) {
|
|
rc = LASSO_LOGOUT_ERROR_UNKNOWN_PRINCIPAL;
|
|
}
|
|
message(G_LOG_LEVEL_CRITICAL, "Status code is not success: %s", status_code_value);
|
|
rc = LASSO_PROFILE_ERROR_STATUS_NOT_SUCCESS;
|
|
}
|
|
|
|
/* LogoutResponse status code value is ok */
|
|
/* XXX: handle RelayState if necessary */
|
|
|
|
/* if SOAP method or, if IDP provider type and HTTP Redirect,
|
|
* then remove assertion */
|
|
if (response_method == LASSO_HTTP_METHOD_SOAP ||
|
|
(remote_provider->role == LASSO_PROVIDER_ROLE_SP &&
|
|
response_method == LASSO_HTTP_METHOD_REDIRECT) ) {
|
|
lasso_session_remove_assertion(profile->session, profile->remote_providerID);
|
|
}
|
|
|
|
/* If at IDP and if there is no more assertion, IDP has logged out
|
|
* every SPs, return the initial response to initial SP. Caution: We
|
|
* can't use the test (remote_provider->role == LASSO_PROVIDER_ROLE_SP)
|
|
* to know whether the server is acting as an IDP or a SP, because it
|
|
* can be a proxy. So we have to use the role of the initial remote
|
|
* provider instead.
|
|
*/
|
|
if (logout->initial_remote_providerID &&
|
|
lasso_session_count_assertions(profile->session) == 0) {
|
|
remote_provider = g_hash_table_lookup(profile->server->providers,
|
|
logout->initial_remote_providerID);
|
|
if (remote_provider->role == LASSO_PROVIDER_ROLE_SP) {
|
|
lasso_transfer_string(profile->remote_providerID,
|
|
logout->initial_remote_providerID);
|
|
lasso_transfer_gobject(profile->request, logout->initial_request);
|
|
lasso_transfer_gobject(profile->response, logout->initial_response);
|
|
}
|
|
}
|
|
|
|
/* if at SP */
|
|
if (remote_provider->role == LASSO_PROVIDER_ROLE_IDP &&
|
|
response_method == LASSO_HTTP_METHOD_REDIRECT) {
|
|
lasso_session_remove_assertion(profile->session, profile->remote_providerID);
|
|
}
|
|
|
|
return rc;
|
|
|
|
}
|