com.sun.xml.ws.security.impl.policy.SamlToken Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of wsit-impl Show documentation
Show all versions of wsit-impl Show documentation
This module contains the Metro WSIT runtime code.
/*
* Copyright (c) 1997, 2018 Oracle and/or its affiliates. All rights reserved.
*
* This program and the accompanying materials are made available under the
* terms of the Eclipse Distribution License v. 1.0, which is available at
* http://www.eclipse.org/org/documents/edl-v10.php.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
/*
* SamlToken.java
*
* Created on February 28, 2006, 1:45 PM
*
* To change this template, choose Tools | Template Manager
* and open the template in the editor.
*/
package com.sun.xml.ws.security.impl.policy;
import com.sun.xml.ws.policy.AssertionSet;
import com.sun.xml.ws.policy.NestedPolicy;
import com.sun.xml.ws.policy.PolicyAssertion;
import com.sun.xml.ws.security.policy.SecurityAssertionValidator;
import com.sun.xml.ws.policy.sourcemodel.AssertionData;
import com.sun.xml.ws.security.policy.SecurityPolicyVersion;
import java.util.ArrayList;
import java.util.Collection;
import java.util.Collections;
import java.util.Iterator;
import java.util.List;
import java.util.UUID;
import java.util.logging.Level;
import javax.xml.namespace.QName;
import static com.sun.xml.ws.security.impl.policy.Constants.*;
/**
*
* @author Abhijit Das,[email protected]
*/
public class SamlToken extends PolicyAssertion implements com.sun.xml.ws.security.policy.SamlToken, SecurityAssertionValidator{
private String id;
private List tokenRefType;
private String tokenType;
private PolicyAssertion rdKey = null;
private boolean populated = false;
private AssertionFitness fitness = AssertionFitness.IS_VALID;
private SecurityPolicyVersion spVersion = SecurityPolicyVersion.SECURITYPOLICY200507;
private final QName itQname;
private String includeTokenType;
private Issuer issuer = null;
private IssuerName issuerName = null;
private Claims claims = null;
/** Creates a new instance of SamlToken */
public SamlToken(AssertionData name,Collection nestedAssertions, AssertionSet nestedAlternative) {
super(name,nestedAssertions,nestedAlternative);
id= PolicyUtil.randomUUID();
String nsUri = getName().getNamespaceURI();
spVersion = PolicyUtil.getSecurityPolicyVersion(nsUri);
itQname = new QName(spVersion.namespaceUri, Constants.IncludeToken);
includeTokenType = spVersion.includeTokenAlways;
}
public String getTokenType() {
populate();
return tokenType;
}
public Iterator getTokenRefernceType() {
if ( tokenRefType != null ) {
return tokenRefType.iterator();
} else {
return Collections.emptyList().iterator();
}
}
public boolean isRequireDerivedKeys() {
populate();
if (rdKey != null ) {
return true;
}
return false;
}
public String getIncludeToken() {
populate();
return includeTokenType;
}
public String getTokenId() {
return id;
}
public Issuer getIssuer() {
populate();
return issuer;
}
public IssuerName getIssuerName() {
populate();
return issuerName;
}
public Claims getClaims(){
populate();
return claims;
}
public AssertionFitness validate(boolean isServer) {
return populate(isServer);
}
private void populate(){
populate(false);
}
private synchronized AssertionFitness populate(boolean isServer) {
if(!populated){
NestedPolicy policy = this.getNestedPolicy();
if(this.getAttributeValue(itQname) != null){
includeTokenType = this.getAttributeValue(itQname);
}
if(policy == null){
if(logger.getLevel() == Level.FINE){
logger.log(Level.FINE,"NestedPolicy is null");
}
populated = true;
return fitness;
}
AssertionSet as = policy.getAssertionSet();
Iterator paItr = as.iterator();
while(paItr.hasNext()){
PolicyAssertion assertion = paItr.next();
if(PolicyUtil.isSamlTokenType(assertion, spVersion)){
tokenType = assertion.getName().getLocalPart().intern();
}else if(PolicyUtil.isRequireDerivedKeys(assertion, spVersion)){
rdKey = assertion;
}else if(PolicyUtil.isRequireKeyIR(assertion, spVersion)){
if(tokenRefType == null){
tokenRefType = new ArrayList();
}
tokenRefType.add(assertion.getName().getLocalPart().intern());
} else{
if(!assertion.isOptional()){
log_invalid_assertion(assertion, isServer,SamlToken);
fitness = AssertionFitness.HAS_UNKNOWN_ASSERTION;
}
}
}
if ( this.hasParameters() ) {
Iterator it = this.getParametersIterator();
while(it.hasNext()){
PolicyAssertion assertion = it.next();
if(PolicyUtil.isIssuer(assertion, spVersion)){
issuer = (Issuer)assertion;
} else if(PolicyUtil.isIssuerName(assertion, spVersion)){
issuerName = (IssuerName)assertion;
} else if(PolicyUtil.isClaimsElement(assertion) &&
SecurityPolicyVersion.SECURITYPOLICY12NS.namespaceUri.equals(spVersion.namespaceUri) ){
claims = (Claims)assertion;
}
}
}
if(issuer != null && issuerName != null){
log_invalid_assertion(issuerName, isServer,SecureConversationToken);
fitness = AssertionFitness.HAS_INVALID_VALUE;
}
populated = true;
}
return fitness;
}
public SecurityPolicyVersion getSecurityPolicyVersion() {
return spVersion;
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy