[shibboleth-sp2] 02/18: First working build.
Ferenc Wágner
wferi-guest at moszumanska.debian.org
Tue Jan 26 21:29:30 UTC 2016
This is an automated email from the git hooks/post-receive script.
wferi-guest pushed a commit to annotated tag 1.2.1b
in repository shibboleth-sp2.
commit a0c0c5d2510b8af5fb559398c90c0e978748fc7c
Author: Scott Cantor <cantor.2 at osu.edu>
Date: Wed Dec 22 21:07:57 2004 +0000
First working build.
---
nsapi_shib/.gitignore | 6 +
nsapi_shib/nsapi_shib.cpp | 816 ++++++++++++++++++++++++++++++++++++++++++++++
nsapi_shib/nsapi_shib.dsp | 103 ++++++
nsapi_shib/nsapi_shib.rc | 109 +++++++
nsapi_shib/resource.h | 15 +
5 files changed, 1049 insertions(+)
diff --git a/nsapi_shib/.gitignore b/nsapi_shib/.gitignore
new file mode 100644
index 0000000..058c8a6
--- /dev/null
+++ b/nsapi_shib/.gitignore
@@ -0,0 +1,6 @@
+/*.plg
+/Release
+/Debug
+/*.dep
+/*.mak
+/*.aps
\ No newline at end of file
diff --git a/nsapi_shib/nsapi_shib.cpp b/nsapi_shib/nsapi_shib.cpp
new file mode 100644
index 0000000..7004218
--- /dev/null
+++ b/nsapi_shib/nsapi_shib.cpp
@@ -0,0 +1,816 @@
+/*
+ * The Shibboleth License, Version 1.
+ * Copyright (c) 2002
+ * University Corporation for Advanced Internet Development, Inc.
+ * All rights reserved
+ *
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions are met:
+ *
+ * Redistributions of source code must retain the above copyright notice, this
+ * list of conditions and the following disclaimer.
+ *
+ * Redistributions in binary form must reproduce the above copyright notice,
+ * this list of conditions and the following disclaimer in the documentation
+ * and/or other materials provided with the distribution, if any, must include
+ * the following acknowledgment: "This product includes software developed by
+ * the University Corporation for Advanced Internet Development
+ * <http://www.ucaid.edu>Internet2 Project. Alternately, this acknowledegement
+ * may appear in the software itself, if and wherever such third-party
+ * acknowledgments normally appear.
+ *
+ * Neither the name of Shibboleth nor the names of its contributors, nor
+ * Internet2, nor the University Corporation for Advanced Internet Development,
+ * Inc., nor UCAID may be used to endorse or promote products derived from this
+ * software without specific prior written permission. For written permission,
+ * please contact shibboleth at shibboleth.org
+ *
+ * Products derived from this software may not be called Shibboleth, Internet2,
+ * UCAID, or the University Corporation for Advanced Internet Development, nor
+ * may Shibboleth appear in their name, without prior written permission of the
+ * University Corporation for Advanced Internet Development.
+ *
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
+ * AND WITH ALL FAULTS. ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
+ * PARTICULAR PURPOSE, AND NON-INFRINGEMENT ARE DISCLAIMED AND THE ENTIRE RISK
+ * OF SATISFACTORY QUALITY, PERFORMANCE, ACCURACY, AND EFFORT IS WITH LICENSEE.
+ * IN NO EVENT SHALL THE COPYRIGHT OWNER, CONTRIBUTORS OR THE UNIVERSITY
+ * CORPORATION FOR ADVANCED INTERNET DEVELOPMENT, INC. BE LIABLE FOR ANY DIRECT,
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
+ * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
+ * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
+ * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+/* nsapi_shib.cpp - Shibboleth NSAPI filter
+
+ Scott Cantor
+ 12/13/04
+*/
+
+#include "config_win32.h"
+
+// SAML Runtime
+#include <saml/saml.h>
+#include <shib/shib.h>
+#include <shib/shib-threads.h>
+#include <shib-target/shib-target.h>
+
+#include <log4cpp/Category.hh>
+
+#include <ctime>
+#include <fstream>
+#include <sstream>
+#include <stdexcept>
+
+#define MCC_HTTPD
+#define NET_SSL
+
+extern "C"
+{
+#include <nsapi.h>
+}
+
+using namespace std;
+using namespace log4cpp;
+using namespace saml;
+using namespace shibboleth;
+using namespace shibtarget;
+
+// macros to output text to client
+#define NET_WRITE(str) \
+ if (IO_ERROR==net_write(sn->csd,str,strlen(str))) return REQ_EXIT
+
+#define NET_WRITE1(buf,fmstr,param) \
+ do { sprintf(buf,fmstr,param); NET_WRITE(buf); } while(0)
+
+#define NET_WRITE2(buf,fmstr,param1,param2) \
+ do { sprintf(buf,fmstr,param1,param2); NET_WRITE(buf); } while(0)
+
+#define NET_WRITE3(buf,fmstr,param1,param2,param3) \
+ do { sprintf(buf,fmstr,param1,param2,param3); NET_WRITE(buf); } while(0)
+
+#define NET_WRITE4(buf,fmstr,param1,param2,param3,param4) \
+ do { sprintf(buf,fmstr,param1,param2,param3,param4); NET_WRITE(buf); } while(0)
+
+namespace {
+ ShibTargetConfig* g_Config=NULL;
+ string g_ServerName;
+ string g_ServerScheme;
+}
+
+extern "C" NSAPI_PUBLIC void nsapi_shib_exit(void*)
+{
+ if (g_Config)
+ g_Config->shutdown();
+ g_Config = NULL;
+}
+
+extern "C" NSAPI_PUBLIC int nsapi_shib_init(pblock* pb, Session* sn, Request* rq)
+{
+ // Save off a default hostname for this virtual server.
+ char* name=pblock_findval("server-name",pb);
+ if (name)
+ g_ServerName=name;
+ else {
+ name=server_hostname;
+ if (name)
+ g_ServerName=name;
+ else {
+ name=util_hostname();
+ if (name) {
+ g_ServerName=name;
+ FREE(name);
+ }
+ else {
+ pblock_nvinsert("error","unable to determine web server hostname",pb);
+ return REQ_ABORTED;
+ }
+ }
+ }
+ name=pblock_findval("server-scheme",pb);
+ if (name)
+ g_ServerScheme=name;
+
+ log_error(LOG_INFORM,"nsapi_shib_init",sn,rq,"nsapi_shib loaded for host (%s)",g_ServerName.c_str());
+
+ try
+ {
+ LPCSTR schemadir=pblock_findval("shib-schemas",pb);
+ if (!schemadir)
+ schemadir=getenv("SHIBSCHEMAS");
+ if (!schemadir)
+ schemadir=SHIB_SCHEMAS;
+ LPCSTR config=pblock_findval("shib-config",pb);
+ if (!config)
+ config=getenv("SHIBCONFIG");
+ if (!config)
+ config=SHIB_CONFIG;
+ g_Config=&ShibTargetConfig::getConfig();
+ g_Config->setFeatures(
+ ShibTargetConfig::Listener |
+ ShibTargetConfig::Metadata |
+ ShibTargetConfig::AAP |
+ ShibTargetConfig::RequestMapper |
+ ShibTargetConfig::SHIREExtensions |
+ ShibTargetConfig::Logging
+ );
+ if (!g_Config->init(schemadir,config)) {
+ g_Config=NULL;
+ pblock_nvinsert("error","unable to initialize Shibboleth libraries",pb);
+ return REQ_ABORTED;
+ }
+
+ daemon_atrestart(nsapi_shib_exit,NULL);
+ }
+ catch (...)
+ {
+#ifdef _DEBUG
+ throw;
+#endif
+ g_Config=NULL;
+ pblock_nvinsert("error","caught exception, unable to initialize Shibboleth libraries",pb);
+ return REQ_ABORTED;
+ }
+ return REQ_PROCEED;
+}
+
+IRequestMapper::Settings map_request(pblock* pb, Session* sn, Request* rq, IRequestMapper* mapper, string& target)
+{
+ // Get everything but hostname...
+ LPCSTR uri=pblock_findval("uri",rq->reqpb);
+ LPCSTR qstr=pblock_findval("query",rq->reqpb);
+ int port=server_portnum;
+ LPCSTR scheme=security_active ? "https" : "http";
+ LPCSTR host=NULL;
+
+ string url;
+ if (uri)
+ url=uri;
+ if (qstr)
+ url=url + '?' + qstr;
+
+#ifdef vs_is_default_vs
+ // This is 6.0 or later, so we can distinguish requests to name-based vhosts.
+ if (!vs_is_default_vs)
+ // The beauty here is, a non-default vhost can *only* be accessed if the client
+ // specified the exact name in the Host header. So we can trust the Host header.
+ host=pblock_findval("host", rq->headers);
+ else
+#endif
+ // In other cases, we're going to rely on the initialization process...
+ host=g_ServerName.c_str();
+
+ target=(g_ServerScheme.empty() ? string(scheme) : g_ServerScheme) + "://" + host;
+
+ // If port is non-default, append it.
+ if ((!security_active && port!=80) || (security_active && port!=443)) {
+ char portbuf[10];
+ util_snprintf(portbuf,9,"%d",port);
+ target = target + ':' + portbuf;
+ }
+
+ target+=url;
+
+ return mapper->getSettingsFromParsedURL(scheme,host,port,url.c_str());
+}
+
+int WriteClientError(Session* sn, Request* rq, char* func, char* msg)
+{
+ log_error(LOG_FAILURE,func,sn,rq,msg);
+ protocol_status(sn,rq,PROTOCOL_SERVER_ERROR,msg);
+ return REQ_ABORTED;
+}
+
+int WriteClientError(Session* sn, Request* rq, const IApplication* app, const char* page, ShibMLP& mlp)
+{
+ const IPropertySet* props=app->getPropertySet("Errors");
+ if (props) {
+ pair<bool,const char*> p=props->getString(page);
+ if (p.first) {
+ ifstream infile(p.second);
+ if (!infile.fail()) {
+ const char* res = mlp.run(infile,props);
+ if (res) {
+ pblock_nvinsert("Content-Type","text/html",rq->srvhdrs);
+ pblock_nninsert("Content-Length",strlen(res),rq->srvhdrs);
+ pblock_nvinsert("Connection","close",rq->srvhdrs);
+ protocol_status(sn,rq,PROTOCOL_OK,NULL);
+ NET_WRITE(const_cast<char*>(res));
+ return REQ_EXIT;
+ }
+ }
+ }
+ }
+
+ log_error(LOG_FAILURE,"WriteClientError",sn,rq,"Unable to open error template, check settings.");
+ protocol_status(sn,rq,PROTOCOL_SERVER_ERROR,"Unable to open error template, check settings.");
+ return REQ_ABORTED;
+}
+
+int WriteRedirectPage(Session* sn, Request* rq, const IApplication* app, const char* file, ShibMLP& mlp)
+{
+ ifstream infile(file);
+ if (!infile.fail()) {
+ const char* res = mlp.run(infile,app->getPropertySet("Errors"));
+ if (res) {
+ pblock_nvinsert("Content-Type","text/html",rq->srvhdrs);
+ pblock_nninsert("Content-Length",strlen(res),rq->srvhdrs);
+ protocol_status(sn,rq,PROTOCOL_OK,NULL);
+ NET_WRITE(const_cast<char*>(res));
+ return REQ_EXIT;
+ }
+ }
+ log_error(LOG_FAILURE,"WriteRedirectPage",sn,rq,"Unable to open redirect template, check settings.");
+ protocol_status(sn,rq,PROTOCOL_SERVER_ERROR,"Unable to open redirect template, check settings.");
+ return REQ_ABORTED;
+}
+
+#undef FUNC
+#define FUNC "shibboleth"
+extern "C" NSAPI_PUBLIC int nsapi_shib(pblock* pb, Session* sn, Request* rq)
+{
+ try
+ {
+ ostringstream threadid;
+ threadid << "[" << getpid() << "] nsapi_shib" << '\0';
+ saml::NDC ndc(threadid.str().c_str());
+
+ // We lock the configuration system for the duration.
+ IConfig* conf=g_Config->getINI();
+ Locker locker(conf);
+
+ // Map request to application and content settings.
+ string targeturl;
+ IRequestMapper* mapper=conf->getRequestMapper();
+ Locker locker2(mapper);
+ IRequestMapper::Settings settings=map_request(pb,sn,rq,mapper,targeturl);
+ pair<bool,const char*> application_id=settings.first->getString("applicationId");
+ const IApplication* application=conf->getApplication(application_id.second);
+ if (!application)
+ return WriteClientError(sn,rq,FUNC,"Unable to map request to application settings, check configuration.");
+
+ // Declare SHIRE object for this request.
+ SHIRE shire(application);
+
+ const char* shireURL=shire.getShireURL(targeturl.c_str());
+ if (!shireURL)
+ return WriteClientError(sn,rq,FUNC,"Unable to map request to proper shireURL setting, check configuration.");
+
+ // If the user is accessing the SHIRE acceptance point, pass it on.
+ if (targeturl.find(shireURL)!=string::npos)
+ return REQ_PROCEED;
+
+ // Now check the policy for this request.
+ pair<bool,bool> requireSession=settings.first->getBool("requireSession");
+ if (!requireSession.first || !requireSession.second) {
+ const char* param=pblock_findval("require-session",pb);
+ if (param && (!strcmp(param,"1") || !util_strcasecmp(param,"true")))
+ requireSession.second=true;
+ }
+ pair<const char*,const char*> shib_cookie=shire.getCookieNameProps();
+ pair<bool,bool> httpRedirects=application->getPropertySet("Sessions")->getBool("httpRedirects");
+ pair<bool,const char*> redirectPage=application->getPropertySet("Sessions")->getString("redirectPage");
+ if (httpRedirects.first && !httpRedirects.second && !redirectPage.first)
+ return WriteClientError(sn,rq,FUNC,"HTML-based redirection requires a redirectPage property.");
+
+ // Check for session cookie.
+ const char* session_id=NULL;
+ string cookie;
+ if (request_header("cookie",(char**)&session_id,sn,rq)==REQ_ABORTED)
+ return WriteClientError(sn,rq,FUNC,"error accessing cookie header");
+
+ Category::getInstance("nsapi_shib."FUNC).debug("cookie header is {%s}",session_id ? session_id : "NULL");
+ if (session_id && (session_id=strstr(session_id,shib_cookie.first))) {
+ session_id+=strlen(shib_cookie.first) + 1; /* Skip over the '=' */
+ char* cookieend=strchr(session_id,';');
+ if (cookieend) {
+ // Chop out just the value portion.
+ cookie.assign(session_id,cookieend-session_id-1);
+ session_id=cookie.c_str();
+ }
+ }
+
+ if (!session_id || !*session_id) {
+ // If no session required, bail now.
+ if (!requireSession.second)
+ return REQ_PROCEED;
+
+ // No acceptable cookie, and we require a session. Generate an AuthnRequest.
+ const char* areq = shire.getAuthnRequest(targeturl.c_str());
+ if (!httpRedirects.first || httpRedirects.second) {
+ pblock_nvinsert("Content-Type","text/html",rq->srvhdrs);
+ pblock_nvinsert("Content-Length","40",rq->srvhdrs);
+ pblock_nvinsert("Expires","01-Jan-1997 12:00:00 GMT",rq->srvhdrs);
+ pblock_nvinsert("Cache-Control","private,no-store,no-cache",rq->srvhdrs);
+ pblock_nvinsert("Location",areq,rq->srvhdrs);
+ protocol_status(sn,rq,PROTOCOL_REDIRECT,"302 Please wait");
+ protocol_start_response(sn,rq);
+ NET_WRITE("<HTML><BODY>Redirecting...</BODY></HTML>");
+ return REQ_EXIT;
+ }
+ else {
+ ShibMLP markupProcessor;
+ markupProcessor.insert("requestURL",areq);
+ return WriteRedirectPage(sn, rq, application, redirectPage.second, markupProcessor);
+ }
+ }
+
+ // Make sure this session is still valid.
+ RPCError* status = NULL;
+ ShibMLP markupProcessor;
+ markupProcessor.insert("requestURL", targeturl);
+
+ try {
+ status = shire.sessionIsValid(session_id, pblock_findval("ip",sn->client));
+ }
+ catch (ShibTargetException &e) {
+ markupProcessor.insert("errorType", "Session Processing Error");
+ markupProcessor.insert("errorText", e.what());
+ markupProcessor.insert("errorDesc", "An error occurred while processing your request.");
+ return WriteClientError(sn, rq, application, "shire", markupProcessor);
+ }
+#ifndef _DEBUG
+ catch (...) {
+ markupProcessor.insert("errorType", "Session Processing Error");
+ markupProcessor.insert("errorText", "Unexpected Exception");
+ markupProcessor.insert("errorDesc", "An error occurred while processing your request.");
+ return WriteClientError(sn, rq, application, "shire", markupProcessor);
+ }
+#endif
+
+ // Check the status
+ if (status->isError()) {
+ if (!requireSession.second)
+ return REQ_PROCEED;
+ else if (status->isRetryable()) {
+ // Oops, session is invalid. Generate AuthnRequest.
+ delete status;
+ const char* areq = shire.getAuthnRequest(targeturl.c_str());
+ if (!httpRedirects.first || httpRedirects.second) {
+ pblock_nvinsert("Content-Type","text/html",rq->srvhdrs);
+ pblock_nvinsert("Content-Length","40",rq->srvhdrs);
+ pblock_nvinsert("Expires","01-Jan-1997 12:00:00 GMT",rq->srvhdrs);
+ pblock_nvinsert("Cache-Control","private,no-store,no-cache",rq->srvhdrs);
+ pblock_nvinsert("Location",areq,rq->srvhdrs);
+ protocol_status(sn,rq,PROTOCOL_REDIRECT,"302 Please wait");
+ protocol_start_response(sn,rq);
+ NET_WRITE("<HTML><BODY>Redirecting...</BODY></HTML>");
+ return REQ_EXIT;
+ }
+ else {
+ markupProcessor.insert("requestURL",areq);
+ return WriteRedirectPage(sn, rq, application, redirectPage.second, markupProcessor);
+ }
+ }
+ else {
+ // return the error page to the user
+ markupProcessor.insert(*status);
+ delete status;
+ return WriteClientError(sn, rq, application, "shire", markupProcessor);
+ }
+ }
+ delete status;
+
+ // Move to RM phase.
+ RM rm(application);
+ vector<SAMLAssertion*> assertions;
+ SAMLAuthenticationStatement* sso_statement=NULL;
+
+ try {
+ status = rm.getAssertions(session_id, pblock_findval("ip",sn->client), assertions, &sso_statement);
+ }
+ catch (ShibTargetException &e) {
+ markupProcessor.insert("errorType", "Attribute Processing Error");
+ markupProcessor.insert("errorText", e.what());
+ markupProcessor.insert("errorDesc", "An error occurred while processing your request.");
+ return WriteClientError(sn, rq, application, "rm", markupProcessor);
+ }
+ #ifndef _DEBUG
+ catch (...) {
+ markupProcessor.insert("errorType", "Attribute Processing Error");
+ markupProcessor.insert("errorText", "Unexpected Exception");
+ markupProcessor.insert("errorDesc", "An error occurred while processing your request.");
+ return WriteClientError(sn, rq, application, "rm", markupProcessor);
+ }
+ #endif
+
+ if (status->isError()) {
+ markupProcessor.insert(*status);
+ delete status;
+ return WriteClientError(sn, rq, application, "rm", markupProcessor);
+ }
+ delete status;
+
+ // Do we have an access control plugin?
+ if (settings.second) {
+ Locker acllock(settings.second);
+ if (!settings.second->authorized(*sso_statement,assertions)) {
+ for (int k = 0; k < assertions.size(); k++)
+ delete assertions[k];
+ delete sso_statement;
+ return WriteClientError(sn, rq, application, "access", markupProcessor);
+ }
+ }
+
+ // Get the AAP providers, which contain the attribute policy info.
+ Iterator<IAAP*> provs=application->getAAPProviders();
+
+ // Clear out the list of mapped attributes
+ while (provs.hasNext()) {
+ IAAP* aap=provs.next();
+ aap->lock();
+ try {
+ Iterator<const IAttributeRule*> rules=aap->getAttributeRules();
+ while (rules.hasNext()) {
+ const char* header=rules.next()->getHeader();
+ if (header)
+ param_free(pblock_remove(header,rq->headers));
+ }
+ }
+ catch(...) {
+ aap->unlock();
+ for (int k = 0; k < assertions.size(); k++)
+ delete assertions[k];
+ delete sso_statement;
+ markupProcessor.insert("errorType", "Attribute Processing Error");
+ markupProcessor.insert("errorText", "Unexpected Exception");
+ markupProcessor.insert("errorDesc", "An error occurred while processing your request.");
+ return WriteClientError(sn, rq, application, "rm", markupProcessor);
+ }
+ aap->unlock();
+ }
+ provs.reset();
+
+ // Maybe export the first assertion.
+ param_free(pblock_remove("remote-user",rq->headers));
+ param_free(pblock_remove("auth-user",rq->vars));
+ param_free(pblock_remove("Shib-Attributes",rq->headers));
+ pair<bool,bool> exp=settings.first->getBool("exportAssertion");
+ if (!exp.first || !exp.second) {
+ const char* param=pblock_findval("export-assertion",pb);
+ if (param && (!strcmp(param,"1") || !util_strcasecmp(param,"true")))
+ exp.second=true;
+ }
+ if (exp.second && assertions.size()) {
+ string assertion;
+ RM::serialize(*(assertions[0]), assertion);
+ string::size_type lfeed;
+ while ((lfeed=assertion.find('\n'))!=string::npos)
+ assertion.erase(lfeed,1);
+ pblock_nvinsert("Shib-Attributes",assertion.c_str(),rq->headers);
+ }
+
+ pblock_nvinsert("auth-type","shibboleth",rq->vars);
+ param_free(pblock_remove("Shib-Origin-Site",rq->headers));
+ param_free(pblock_remove("Shib-Authentication-Method",rq->headers));
+ param_free(pblock_remove("Shib-NameIdentifier-Format",rq->headers));
+
+ // Export the SAML AuthnMethod and the origin site name.
+ auto_ptr_char os(sso_statement->getSubject()->getNameIdentifier()->getNameQualifier());
+ auto_ptr_char am(sso_statement->getAuthMethod());
+ pblock_nvinsert("Shib-Origin-Site",os.get(),rq->headers);
+ pblock_nvinsert("Shib-Authentication-Method",am.get(),rq->headers);
+
+ // Export NameID?
+ AAP wrapper(provs,sso_statement->getSubject()->getNameIdentifier()->getFormat(),Constants::SHIB_ATTRIBUTE_NAMESPACE_URI);
+ if (!wrapper.fail() && wrapper->getHeader()) {
+ auto_ptr_char form(sso_statement->getSubject()->getNameIdentifier()->getFormat());
+ auto_ptr_char nameid(sso_statement->getSubject()->getNameIdentifier()->getName());
+ pblock_nvinsert("Shib-NameIdentifier-Format",form.get(),pb);
+ if (!strcmp(wrapper->getHeader(),"REMOTE_USER")) {
+ pblock_nvinsert("remote-user",nameid.get(),rq->headers);
+ pblock_nvinsert("auth-user",nameid.get(),rq->vars);
+ }
+ else {
+ pblock_nvinsert(wrapper->getHeader(),nameid.get(),rq->headers);
+ }
+ }
+
+ param_free(pblock_remove("Shib-Application-ID",rq->headers));
+ pblock_nvinsert("Shib-Application-ID",application_id.second,rq->headers);
+
+ // Export the attributes.
+ Iterator<SAMLAssertion*> a_iter(assertions);
+ while (a_iter.hasNext()) {
+ SAMLAssertion* assert=a_iter.next();
+ Iterator<SAMLStatement*> statements=assert->getStatements();
+ while (statements.hasNext()) {
+ SAMLAttributeStatement* astate=dynamic_cast<SAMLAttributeStatement*>(statements.next());
+ if (!astate)
+ continue;
+ Iterator<SAMLAttribute*> attrs=astate->getAttributes();
+ while (attrs.hasNext()) {
+ SAMLAttribute* attr=attrs.next();
+
+ // Are we supposed to export it?
+ AAP wrapper(provs,attr->getName(),attr->getNamespace());
+ if (wrapper.fail() || !wrapper->getHeader())
+ continue;
+
+ Iterator<string> vals=attr->getSingleByteValues();
+ if (!strcmp(wrapper->getHeader(),"REMOTE_USER") && vals.hasNext()) {
+ char* principal=const_cast<char*>(vals.next().c_str());
+ pblock_nvinsert("remote-user",principal,rq->headers);
+ pblock_nvinsert("auth-user",principal,rq->vars);
+ }
+ else {
+ int it=0;
+ string header;
+ const char* h=pblock_findval(wrapper->getHeader(),rq->headers);
+ if (h) {
+ header=h;
+ param_free(pblock_remove(wrapper->getHeader(),rq->headers));
+ it++;
+ }
+ for (; vals.hasNext(); it++) {
+ string value = vals.next();
+ for (string::size_type pos = value.find_first_of(";", string::size_type(0));
+ pos != string::npos;
+ pos = value.find_first_of(";", pos)) {
+ value.insert(pos, "\\");
+ pos += 2;
+ }
+ if (it == 0)
+ header=value;
+ else
+ header=header + ';' + value;
+ }
+ pblock_nvinsert(wrapper->getHeader(),header.c_str(),rq->headers);
+ }
+ }
+ }
+ }
+
+ // clean up memory
+ for (int k = 0; k < assertions.size(); k++)
+ delete assertions[k];
+ delete sso_statement;
+
+ return REQ_PROCEED;
+ }
+ catch(bad_alloc) {
+ return WriteClientError(sn, rq, FUNC,"Out of Memory");
+ }
+#ifndef _DEBUG
+ catch(...) {
+ return WriteClientError(sn, rq, FUNC,"Server caught an unknown exception.");
+ }
+#endif
+
+ return WriteClientError(sn, rq, FUNC,"Server reached unreachable code, save my walrus!");
+}
+
+#undef FUNC
+#define FUNC "shib_handler"
+extern "C" NSAPI_PUBLIC int shib_handler(pblock* pb, Session* sn, Request* rq)
+{
+ string targeturl;
+ const IApplication* application=NULL;
+ try
+ {
+ ostringstream threadid;
+ threadid << "[" << getpid() << "] shib_handler" << '\0';
+ saml::NDC ndc(threadid.str().c_str());
+
+ // We lock the configuration system for the duration.
+ IConfig* conf=g_Config->getINI();
+ Locker locker(conf);
+
+ // Map request to application and content settings.
+ IRequestMapper* mapper=conf->getRequestMapper();
+ Locker locker2(mapper);
+ IRequestMapper::Settings settings=map_request(pb,sn,rq,mapper,targeturl);
+ pair<bool,const char*> application_id=settings.first->getString("applicationId");
+ application=conf->getApplication(application_id.second);
+ const IPropertySet* sessionProps=application ? application->getPropertySet("Sessions") : NULL;
+ if (!application || !sessionProps)
+ return WriteClientError(sn,rq,FUNC,"Unable to map request to application settings, check configuration.");
+
+ SHIRE shire(application);
+
+ const char* shireURL=shire.getShireURL(targeturl.c_str());
+ if (!shireURL)
+ return WriteClientError(sn,rq,FUNC,"Unable to map request to proper shireURL setting, check configuration.");
+
+ // Make sure we only process the SHIRE requests.
+ if (!strstr(targeturl.c_str(),shireURL))
+ return WriteClientError(sn,rq,FUNC,"NSAPI service function can only be invoked to process incoming sessions."
+ "Make sure the mapped file extension or URL doesn't match actual content.");
+
+ pair<const char*,const char*> shib_cookie=shire.getCookieNameProps();
+
+ // Make sure this is SSL, if it should be
+ pair<bool,bool> shireSSL=sessionProps->getBool("shireSSL");
+ if (!shireSSL.first || shireSSL.second) {
+ if (!security_active)
+ throw ShibTargetException(SHIBRPC_OK,"blocked non-SSL access to Shibboleth session processor");
+ }
+
+ pair<bool,bool> httpRedirects=sessionProps->getBool("httpRedirects");
+ pair<bool,const char*> redirectPage=sessionProps->getString("redirectPage");
+ if (httpRedirects.first && !httpRedirects.second && !redirectPage.first)
+ return WriteClientError(sn,rq,FUNC,"HTML-based redirection requires a redirectPage property.");
+
+ // If this is a GET, we manufacture an AuthnRequest.
+ if (!util_strcasecmp(pblock_findval("method",rq->reqpb),"GET")) {
+ const char* areq=pblock_findval("query",rq->reqpb) ? shire.getLazyAuthnRequest(pblock_findval("query",rq->reqpb)) : NULL;
+ if (!areq)
+ throw ShibTargetException(SHIBRPC_OK, "malformed arguments to request a new session");
+ if (!httpRedirects.first || httpRedirects.second) {
+ pblock_nvinsert("Content-Type","text/html",rq->srvhdrs);
+ pblock_nvinsert("Content-Length","40",rq->srvhdrs);
+ pblock_nvinsert("Expires","01-Jan-1997 12:00:00 GMT",rq->srvhdrs);
+ pblock_nvinsert("Cache-Control","private,no-store,no-cache",rq->srvhdrs);
+ pblock_nvinsert("Location",areq,rq->srvhdrs);
+ protocol_status(sn,rq,PROTOCOL_REDIRECT,"302 Please wait");
+ protocol_start_response(sn,rq);
+ NET_WRITE("<HTML><BODY>Redirecting...</BODY></HTML>");
+ return REQ_EXIT;
+ }
+ else {
+ ShibMLP markupProcessor;
+ markupProcessor.insert("requestURL",areq);
+ return WriteRedirectPage(sn, rq, application, redirectPage.second, markupProcessor);
+ }
+ }
+ else if (util_strcasecmp(pblock_findval("method",rq->reqpb),"POST"))
+ throw ShibTargetException(SHIBRPC_OK,"blocked non-POST to Shibboleth session processor");
+
+ // Make sure this POST is an appropriate content type
+ char* content_type=NULL;
+ if (request_header("content-type",&content_type,sn,rq)!=REQ_PROCEED ||
+ !content_type || util_strcasecmp(content_type,"application/x-www-form-urlencoded"))
+ throw ShibTargetException(SHIBRPC_OK,"blocked bad content-type to Shibboleth session processor");
+
+ // Read the data.
+ pair<const char*,const char*> elements=pair<const char*,const char*>(NULL,NULL);
+ char* content_length=NULL;
+ if (request_header("content-length",&content_length,sn,rq)!=REQ_PROCEED ||
+ atoi(content_length) > 1024*1024) // 1MB?
+ throw ShibTargetException(SHIBRPC_OK,"blocked too-large a post to Shibboleth session processor");
+ else {
+ char ch=IO_EOF+1;
+ int cl=atoi(content_length);
+ string cgistr;
+ while (cl && ch!=IO_EOF) {
+ ch=netbuf_getc(sn->inbuf);
+
+ // Check for error.
+ if(ch==IO_ERROR)
+ break;
+ cgistr+=ch;
+ cl--;
+ }
+ if (cl)
+ throw ShibTargetException(SHIBRPC_OK,"error reading POST data from browser");
+ elements=shire.getFormSubmission(cgistr.c_str(),cgistr.length());
+ }
+
+ // Make sure the SAML Response parameter exists
+ if (!elements.first || !*elements.first)
+ throw ShibTargetException(SHIBRPC_OK, "Shibboleth POST failed to find SAMLResponse form element");
+
+ // Make sure the target parameter exists
+ if (!elements.second || !*elements.second)
+ throw ShibTargetException(SHIBRPC_OK, "Shibboleth POST failed to find TARGET form element");
+
+ // Process the post.
+ string cookie;
+ RPCError* status=NULL;
+ ShibMLP markupProcessor;
+ markupProcessor.insert("requestURL", targeturl.c_str());
+ try {
+ status = shire.sessionCreate(elements.first,pblock_findval("ip",sn->client),cookie);
+ }
+ catch (ShibTargetException &e) {
+ markupProcessor.insert("errorType", "Session Creation Service Error");
+ markupProcessor.insert("errorText", e.what());
+ markupProcessor.insert("errorDesc", "An error occurred while processing your request.");
+ return WriteClientError(sn, rq, application, "shire", markupProcessor);
+ }
+#ifndef _DEBUG
+ catch (...) {
+ markupProcessor.insert("errorType", "Session Creation Service Error");
+ markupProcessor.insert("errorText", "Unexpected Exception");
+ markupProcessor.insert("errorDesc", "An error occurred while processing your request.");
+ return WriteClientError(sn, rq, application, "shire", markupProcessor);
+ }
+#endif
+
+ if (status->isError()) {
+ if (status->isRetryable()) {
+ delete status;
+ const char* loc=shire.getAuthnRequest(elements.second);
+ if (!httpRedirects.first || httpRedirects.second) {
+ pblock_nvinsert("Content-Type","text/html",rq->srvhdrs);
+ pblock_nvinsert("Content-Length","40",rq->srvhdrs);
+ pblock_nvinsert("Expires","01-Jan-1997 12:00:00 GMT",rq->srvhdrs);
+ pblock_nvinsert("Cache-Control","private,no-store,no-cache",rq->srvhdrs);
+ pblock_nvinsert("Location",loc,rq->srvhdrs);
+ protocol_status(sn,rq,PROTOCOL_REDIRECT,"302 Please wait");
+ protocol_start_response(sn,rq);
+ NET_WRITE("<HTML><BODY>Redirecting...</BODY></HTML>");
+ return REQ_EXIT;
+ }
+ else {
+ markupProcessor.insert("requestURL",loc);
+ return WriteRedirectPage(sn, rq, application, redirectPage.second, markupProcessor);
+ }
+ }
+
+ // Return this error to the user.
+ markupProcessor.insert(*status);
+ delete status;
+ return WriteClientError(sn,rq,application,"shire",markupProcessor);
+ }
+ delete status;
+
+ // We've got a good session, set the cookie and redirect to target.
+ cookie = string(shib_cookie.first) + '=' + cookie + shib_cookie.second;
+ pblock_nvinsert("Set-Cookie",cookie.c_str(),rq->srvhdrs);
+ if (!httpRedirects.first || httpRedirects.second) {
+ pblock_nvinsert("Content-Type","text/html",rq->srvhdrs);
+ pblock_nvinsert("Content-Length","40",rq->srvhdrs);
+ pblock_nvinsert("Expires","01-Jan-1997 12:00:00 GMT",rq->srvhdrs);
+ pblock_nvinsert("Cache-Control","private,no-store,no-cache",rq->srvhdrs);
+ pblock_nvinsert("Location",elements.second,rq->srvhdrs);
+ protocol_status(sn,rq,PROTOCOL_REDIRECT,"302 Please wait");
+ protocol_start_response(sn,rq);
+ NET_WRITE("<HTML><BODY>Redirecting...</BODY></HTML>");
+ return REQ_EXIT;
+ }
+ else {
+ markupProcessor.insert("requestURL",elements.second);
+ return WriteRedirectPage(sn, rq, application, redirectPage.second, markupProcessor);
+ }
+ }
+ catch (ShibTargetException &e) {
+ if (application) {
+ ShibMLP markupProcessor;
+ markupProcessor.insert("requestURL", targeturl.c_str());
+ markupProcessor.insert("errorType", "Session Creation Service Error");
+ markupProcessor.insert("errorText", e.what());
+ markupProcessor.insert("errorDesc", "An error occurred while processing your request.");
+ return WriteClientError(sn,rq,application,"shire",markupProcessor);
+ }
+ }
+#ifndef _DEBUG
+ catch (...) {
+ if (application) {
+ ShibMLP markupProcessor;
+ markupProcessor.insert("requestURL", targeturl.c_str());
+ markupProcessor.insert("errorType", "Session Creation Service Error");
+ markupProcessor.insert("errorText", "Unexpected Exception");
+ markupProcessor.insert("errorDesc", "An error occurred while processing your request.");
+ return WriteClientError(sn,rq,application,"shire",markupProcessor);
+ }
+ }
+#endif
+ return REQ_EXIT;
+}
diff --git a/nsapi_shib/nsapi_shib.dsp b/nsapi_shib/nsapi_shib.dsp
new file mode 100644
index 0000000..8ce54cc
--- /dev/null
+++ b/nsapi_shib/nsapi_shib.dsp
@@ -0,0 +1,103 @@
+# Microsoft Developer Studio Project File - Name="nsapi_shib" - Package Owner=<4>
+# Microsoft Developer Studio Generated Build File, Format Version 6.00
+# ** DO NOT EDIT **
+
+# TARGTYPE "Win32 (x86) Dynamic-Link Library" 0x0102
+
+CFG=nsapi_shib - Win32 Debug
+!MESSAGE This is not a valid makefile. To build this project using NMAKE,
+!MESSAGE use the Export Makefile command and run
+!MESSAGE
+!MESSAGE NMAKE /f "nsapi_shib.mak".
+!MESSAGE
+!MESSAGE You can specify a configuration when running NMAKE
+!MESSAGE by defining the macro CFG on the command line. For example:
+!MESSAGE
+!MESSAGE NMAKE /f "nsapi_shib.mak" CFG="nsapi_shib - Win32 Debug"
+!MESSAGE
+!MESSAGE Possible choices for configuration are:
+!MESSAGE
+!MESSAGE "nsapi_shib - Win32 Release" (based on "Win32 (x86) Dynamic-Link Library")
+!MESSAGE "nsapi_shib - Win32 Debug" (based on "Win32 (x86) Dynamic-Link Library")
+!MESSAGE
+
+# Begin Project
+# PROP AllowPerConfigDependencies 0
+# PROP Scc_ProjName ""
+# PROP Scc_LocalPath ""
+CPP=cl.exe
+MTL=midl.exe
+RSC=rc.exe
+
+!IF "$(CFG)" == "nsapi_shib - Win32 Release"
+
+# PROP BASE Use_MFC 0
+# PROP BASE Use_Debug_Libraries 0
+# PROP BASE Output_Dir "Release"
+# PROP BASE Intermediate_Dir "Release"
+# PROP BASE Target_Dir ""
+# PROP Use_MFC 0
+# PROP Use_Debug_Libraries 0
+# PROP Output_Dir "Release"
+# PROP Intermediate_Dir "Release"
+# PROP Ignore_Export_Lib 0
+# PROP Target_Dir ""
+# ADD BASE CPP /nologo /MT /W3 /GX /O2 /D "WIN32" /D "NDEBUG" /D "_WINDOWS" /D "_MBCS" /D "_USRDLL" /D "NSAPI_SHIB_EXPORTS" /YX /FD /c
+# ADD CPP /nologo /MD /W3 /GR /GX /O2 /I ".." /I "..\..\..\opensaml\c" /I "..\oncrpc" /I "." /D "NDEBUG" /D "_WINDOWS" /D "WIN32" /D "_MBCS" /D "XP_WIN32" /YX /FD /c
+# ADD BASE MTL /nologo /D "NDEBUG" /mktyplib203 /win32
+# ADD MTL /nologo /D "NDEBUG" /mktyplib203 /win32
+# ADD BASE RSC /l 0x409 /d "NDEBUG"
+# ADD RSC /l 0x409 /d "NDEBUG"
+BSC32=bscmake.exe
+# ADD BASE BSC32 /nologo
+# ADD BSC32 /nologo
+LINK32=link.exe
+# ADD BASE LINK32 kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib /nologo /dll /machine:I386
+# ADD LINK32 log4cpp.lib xerces-c_2.lib xsec_1.lib saml_4.lib ns-httpd30.lib /nologo /dll /machine:I386 /libpath:"..\..\..\opensaml\c\saml\Release" /libpath:"\\KRAMER\iPlanet\plugins\lib"
+
+!ELSEIF "$(CFG)" == "nsapi_shib - Win32 Debug"
+
+# PROP BASE Use_MFC 0
+# PROP BASE Use_Debug_Libraries 1
+# PROP BASE Output_Dir "Debug"
+# PROP BASE Intermediate_Dir "Debug"
+# PROP BASE Target_Dir ""
+# PROP Use_MFC 0
+# PROP Use_Debug_Libraries 1
+# PROP Output_Dir "Debug"
+# PROP Intermediate_Dir "Debug"
+# PROP Ignore_Export_Lib 0
+# PROP Target_Dir ""
+# ADD BASE CPP /nologo /MTd /W3 /Gm /GX /ZI /Od /D "WIN32" /D "_DEBUG" /D "_WINDOWS" /D "_MBCS" /D "_USRDLL" /D "NSAPI_SHIB_EXPORTS" /YX /FD /GZ /c
+# ADD CPP /nologo /MDd /W3 /Gm /GR /GX /ZI /Od /I ".." /I "..\..\..\opensaml\c" /I "..\oncrpc" /I "." /D "_DEBUG" /D "_AFXDLL" /D "_WINDOWS" /D "WIN32" /D "_MBCS" /D "XP_WIN32" /FR /YX /FD /GZ /c
+# ADD BASE MTL /nologo /D "_DEBUG" /mktyplib203 /win32
+# ADD MTL /nologo /D "_DEBUG" /mktyplib203 /win32
+# ADD BASE RSC /l 0x409 /d "_DEBUG"
+# ADD RSC /l 0x409 /d "_DEBUG"
+BSC32=bscmake.exe
+# ADD BASE BSC32 /nologo
+# ADD BSC32 /nologo
+LINK32=link.exe
+# ADD BASE LINK32 kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib /nologo /dll /debug /machine:I386 /pdbtype:sept
+# ADD LINK32 log4cppD.lib xerces-c_2D.lib xsec_1D.lib saml_4D.lib ns-httpd30.lib /nologo /dll /debug /machine:I386 /pdbtype:sept /libpath:"..\..\..\opensaml\c\saml\Debug" /libpath:"\\KRAMER\iPlanet\plugins\lib"
+
+!ENDIF
+
+# Begin Target
+
+# Name "nsapi_shib - Win32 Release"
+# Name "nsapi_shib - Win32 Debug"
+# Begin Source File
+
+SOURCE=.\nsapi_shib.cpp
+# End Source File
+# Begin Source File
+
+SOURCE=.\nsapi_shib.rc
+# End Source File
+# Begin Source File
+
+SOURCE=.\resource.h
+# End Source File
+# End Target
+# End Project
diff --git a/nsapi_shib/nsapi_shib.rc b/nsapi_shib/nsapi_shib.rc
new file mode 100644
index 0000000..0a41683
--- /dev/null
+++ b/nsapi_shib/nsapi_shib.rc
@@ -0,0 +1,109 @@
+//Microsoft Developer Studio generated resource script.
+//
+#include "resource.h"
+
+#define APSTUDIO_READONLY_SYMBOLS
+/////////////////////////////////////////////////////////////////////////////
+//
+// Generated from the TEXTINCLUDE 2 resource.
+//
+#include "afxres.h"
+
+/////////////////////////////////////////////////////////////////////////////
+#undef APSTUDIO_READONLY_SYMBOLS
+
+/////////////////////////////////////////////////////////////////////////////
+// English (U.S.) resources
+
+#if !defined(AFX_RESOURCE_DLL) || defined(AFX_TARG_ENU)
+#ifdef _WIN32
+LANGUAGE LANG_ENGLISH, SUBLANG_ENGLISH_US
+#pragma code_page(1252)
+#endif //_WIN32
+
+#ifndef _MAC
+/////////////////////////////////////////////////////////////////////////////
+//
+// Version
+//
+
+VS_VERSION_INFO VERSIONINFO
+ FILEVERSION 1,2,1,0
+ PRODUCTVERSION 1,2,1,0
+ FILEFLAGSMASK 0x3fL
+#ifdef _DEBUG
+ FILEFLAGS 0x1L
+#else
+ FILEFLAGS 0x0L
+#endif
+ FILEOS 0x40004L
+ FILETYPE 0x2L
+ FILESUBTYPE 0x0L
+BEGIN
+ BLOCK "StringFileInfo"
+ BEGIN
+ BLOCK "040904b0"
+ BEGIN
+ VALUE "Comments", "\0"
+ VALUE "CompanyName", "UCAID\0"
+ VALUE "FileDescription", "Shibboleth NSAPI Extension\0"
+ VALUE "FileVersion", "1, 2, 1, 0\0"
+ VALUE "InternalName", "nsapi_shib\0"
+ VALUE "LegalCopyright", "Copyright � 2004 UCAID\0"
+ VALUE "LegalTrademarks", "\0"
+ VALUE "OriginalFilename", "nsapi_shib.dll\0"
+ VALUE "PrivateBuild", "\0"
+ VALUE "ProductName", "Shibboleth\0"
+ VALUE "ProductVersion", "1, 2, 1, 0\0"
+ VALUE "SpecialBuild", "\0"
+ END
+ END
+ BLOCK "VarFileInfo"
+ BEGIN
+ VALUE "Translation", 0x409, 1200
+ END
+END
+
+#endif // !_MAC
+
+
+#ifdef APSTUDIO_INVOKED
+/////////////////////////////////////////////////////////////////////////////
+//
+// TEXTINCLUDE
+//
+
+1 TEXTINCLUDE DISCARDABLE
+BEGIN
+ "resource.h\0"
+END
+
+2 TEXTINCLUDE DISCARDABLE
+BEGIN
+ "#include ""afxres.h""\r\n"
+ "\0"
+END
+
+3 TEXTINCLUDE DISCARDABLE
+BEGIN
+ "\r\n"
+ "\0"
+END
+
+#endif // APSTUDIO_INVOKED
+
+#endif // English (U.S.) resources
+/////////////////////////////////////////////////////////////////////////////
+
+
+
+#ifndef APSTUDIO_INVOKED
+/////////////////////////////////////////////////////////////////////////////
+//
+// Generated from the TEXTINCLUDE 3 resource.
+//
+
+
+/////////////////////////////////////////////////////////////////////////////
+#endif // not APSTUDIO_INVOKED
+
diff --git a/nsapi_shib/resource.h b/nsapi_shib/resource.h
new file mode 100644
index 0000000..70749e6
--- /dev/null
+++ b/nsapi_shib/resource.h
@@ -0,0 +1,15 @@
+//{{NO_DEPENDENCIES}}
+// Microsoft Developer Studio generated include file.
+// Used by nsapi_shib.rc
+//
+
+// Next default values for new objects
+//
+#ifdef APSTUDIO_INVOKED
+#ifndef APSTUDIO_READONLY_SYMBOLS
+#define _APS_NEXT_RESOURCE_VALUE 101
+#define _APS_NEXT_COMMAND_VALUE 40001
+#define _APS_NEXT_CONTROL_VALUE 1000
+#define _APS_NEXT_SYMED_VALUE 101
+#endif
+#endif
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-shibboleth/shibboleth-sp2.git
More information about the Pkg-shibboleth-devel
mailing list