com.sun.xml.wss.impl.ProcessingContextImpl Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of wsit-impl Show documentation
Show all versions of wsit-impl Show documentation
This module contains the Metro WSIT runtime code.
/*
* Copyright (c) 2010, 2020 Oracle and/or its affiliates. All rights reserved.
*
* This program and the accompanying materials are made available under the
* terms of the Eclipse Distribution License v. 1.0, which is available at
* http://www.eclipse.org/org/documents/edl-v10.php.
*
* SPDX-License-Identifier: BSD-3-Clause
*/
/*
* $Id: ProcessingContextImpl.java,v 1.2 2010-10-21 15:37:15 snajper Exp $
*/
package com.sun.xml.wss.impl;
import com.sun.xml.ws.security.IssuedTokenContext;
import com.sun.xml.ws.security.impl.kerberos.KerberosContext;
import java.util.Map;
import java.util.Hashtable;
import java.util.HashMap;
import java.util.List;
import java.util.ArrayList;
import jakarta.xml.soap.SOAPMessage;
import com.sun.xml.wss.ProcessingContext;
import com.sun.xml.wss.XWSSecurityException;
import com.sun.xml.wss.impl.policy.SecurityPolicy;
import com.sun.xml.wss.impl.policy.StaticPolicyContext;
import com.sun.xml.wss.impl.policy.mls.MessagePolicy;
import com.sun.xml.ws.security.secconv.WSSCVersion;
import com.sun.xml.ws.security.trust.WSTrustVersion;
import org.w3c.dom.Element;
public class ProcessingContextImpl extends ProcessingContext {
protected WSSAssertion wssAssertion = null;
protected Hashtable issuedTokenContextMap = null;
protected Hashtable scPolicyIDtoSctIdMap = null;
protected AlgorithmSuite bootAlgoSuite = null;
private WSSCVersion wsscVer;
private WSTrustVersion wsTrustVer;
private boolean addressingEnabled;
// Security runtime would populate received client creds into it
// when it is an incoming Trust or SC message
private static final String TRUST_CLIENT_CREDENTIALS = "TrustClientCredentialHolder";
private static final String ISSUED_SAML_TOKEN = "IssuedSAMLToken";
private static final String SAMLID_VS_KEY_CACHE = "SAMLID_VS_KEY_CACHE";
private static final String INCOMING_ASSERTION_ID="Incoming_Saml_Assertion_Id";
// KerberosContext information
//private Hashtable krbContextMap = null;
// Hack required for DecryptionProcessor
protected AlgorithmSuite algoSuite = null;
// for Issued Token
protected boolean policyHasIssuedToken = false;
protected IssuedTokenContext secureConversationContext = null;
protected IssuedTokenContext trustContext = null;
protected MessagePolicy inferredSecurityPolicy = new MessagePolicy();
protected List signConfirmIds = new ArrayList();
// private OperationResolver operationResolver = null;
private boolean isTrustMsg = false;
private boolean isSamlSignatureKey = false;
// Version of SecurityPolicy being used
private String securityPolicyVersion = null;
private String wscInstance = null;
private long timestampTimeout = 0;
private int iterationsForPDK;
private String action;
/**
*Default constructor
*/
public ProcessingContextImpl() {}
/**
*constructor
*/
public ProcessingContextImpl(Map invocationProps) {
properties = invocationProps;
}
/**
* Constructor
* @param context the static policy context for this request
* @param securityPolicy the SecurityPolicy to be applied for this request
* @param message the SOAPMessage
* @throws XWSSecurityException if there was an error in creating the ProcessingContext
*/
public ProcessingContextImpl(StaticPolicyContext context,
SecurityPolicy securityPolicy,
SOAPMessage message)
throws XWSSecurityException {
super(context, securityPolicy, message);
}
/**
* copy operator
* @param ctxx1 the ProcessingContext to which to copy
* @param ctxx2 the ProcessingContext from which to copy
* @throws XWSSecurityException if there was an error during the copy operation
*/
@Override
public void copy(ProcessingContext ctxx1, ProcessingContext ctxx2)
throws XWSSecurityException {
if (ctxx2 instanceof ProcessingContextImpl) {
ProcessingContextImpl ctx1 = (ProcessingContextImpl)ctxx1;
ProcessingContextImpl ctx2 = (ProcessingContextImpl)ctxx2;
super.copy(ctx1, ctx2);
ctx1.setIssuedTokenContextMap(ctx2.getIssuedTokenContextMap());
//ctx1.setKerberosContextMap(ctx2.getKerberosContextMap());
ctx1.setAlgorithmSuite(ctx2.getAlgorithmSuite());
ctx1.setSecureConversationContext(ctx2.getSecureConversationContext());
ctx1.setWSSAssertion(ctx2.getWSSAssertion());
ctx1.inferredSecurityPolicy = ctx2.getInferredSecurityPolicy();
//ctx1.setOperationResolver(ctx2.getOperationResolver());
ctx1.isTrustMessage(ctx2.isTrustMessage());
ctx1.hasIssuedToken(ctx2.hasIssuedToken());
ctx1.setTimestampTimeout(ctx2.getTimestampTimeout());
ctx1.setWSCInstance(ctx2.getWSCInstance());
ctx1.setSCPolicyIDtoSctIdMap(ctx2.getSCPolicyIDtoSctIdMap());
ctx1.setAction(ctx2.getAction());
ctx1.setBootstrapAlgoSuite(ctx2.getBootstrapAlgoSuite());
ctx1.setWsscVer(ctx2.getWsscVer());
ctx1.setWsTrustVer(ctx2.getWsTrustVer());
ctx1.setAddressingEnabled(ctx2.isAddressingEnabled());
}else {
super.copy(ctxx1, ctxx2);
}
}
public void setIssuedTokenContextMap(Hashtable issuedTokenContextMap ) {
this.issuedTokenContextMap = issuedTokenContextMap;
}
public Hashtable getIssuedTokenContextMap() {
return issuedTokenContextMap;
}
/* (non-Javadoc)
* @return SecurableSoapMessage
*/
public SecurableSoapMessage getSecurableSoapMessage() {
return secureMessage;
}
public IssuedTokenContext getIssuedTokenContext(String policyID) {
if (issuedTokenContextMap == null) {
//throw new RuntimeException("Internal Error: IssuedTokenContext(s) not initialized in ProcessingContext");
return null;
}
return (IssuedTokenContext)issuedTokenContextMap.get(policyID);
}
@SuppressWarnings("unchecked")
public void setIssuedTokenContext(IssuedTokenContext issuedTokenContext, String policyID) {
if ( issuedTokenContextMap == null ) {
//TODO: This is temporary for testing
// Once integrated we must throw an RT exception from here
issuedTokenContextMap = new Hashtable();
}
issuedTokenContextMap.put(policyID, issuedTokenContext);
}
public KerberosContext getKerberosContext() {
KerberosContext krbContext = (KerberosContext)getExtraneousProperty(MessageConstants.KERBEROS_CONTEXT);
return krbContext;
}
public void setKerberosContext(KerberosContext kerberosContext) {
setExtraneousProperty(MessageConstants.KERBEROS_CONTEXT, kerberosContext);
}
@SuppressWarnings("unchecked")
public void setTrustCredentialHolder(IssuedTokenContext ctx) {
getExtraneousProperties().put(TRUST_CLIENT_CREDENTIALS, ctx);
}
public IssuedTokenContext getTrustCredentialHolder() {
return (IssuedTokenContext)getExtraneousProperties().get(TRUST_CLIENT_CREDENTIALS);
}
public Element getIssuedSAMLToken() {
return (Element)getExtraneousProperties().get(ISSUED_SAML_TOKEN);
}
@SuppressWarnings("unchecked")
public void setIssuedSAMLToken(Element elem) {
getExtraneousProperties().put(ISSUED_SAML_TOKEN, elem);
}
@SuppressWarnings("unchecked")
public void setIncomingAssertionId(String assid) {
getExtraneousProperties().put(INCOMING_ASSERTION_ID, assid);
}
public String getIncomingAssertionId() {
return (String)getExtraneousProperties().get(INCOMING_ASSERTION_ID);
}
public void setSecureConversationContext(IssuedTokenContext ctx) {
secureConversationContext = ctx;
}
public IssuedTokenContext getSecureConversationContext() {
return secureConversationContext;
}
public void setTrustContext(IssuedTokenContext ctx) {
trustContext = ctx;
}
public IssuedTokenContext getTrustContext() {
return trustContext;
}
//TODO:Having to add AlgorithmSuite here because we need
// it in the KeyResolver (Encryption)
public AlgorithmSuite getAlgorithmSuite() {
return algoSuite;
}
public void setAlgorithmSuite(AlgorithmSuite suite) {
algoSuite = suite;
}
public void setWSSAssertion(WSSAssertion wssAssertion){
this.wssAssertion = wssAssertion;
}
public WSSAssertion getWSSAssertion(){
return wssAssertion;
}
public MessagePolicy getInferredSecurityPolicy() {
return inferredSecurityPolicy;
}
@SuppressWarnings("unchecked")
public HashMap getSamlIdVSKeyCache() {
if (getExtraneousProperties().get(SAMLID_VS_KEY_CACHE) == null) {
getExtraneousProperties().put(SAMLID_VS_KEY_CACHE, new HashMap());
}
return (HashMap)getExtraneousProperties().get(SAMLID_VS_KEY_CACHE);
}
// public void setOperationResolver(OperationResolver operationResolver){
// this.operationResolver = operationResolver;
// }
//
// public OperationResolver getOperationResolver(){
// return operationResolver;
// }
public void isTrustMessage(boolean isTrust){
this.isTrustMsg = isTrust;
}
public boolean isTrustMessage(){
return isTrustMsg;
}
public void isSamlSignatureKey(boolean value){
this.isSamlSignatureKey = value;
}
public boolean isSamlSignatureKey(){
return this.isSamlSignatureKey;
}
public List getSignatureConfirmationIds(){
return signConfirmIds;
}
public boolean hasIssuedToken(){
return policyHasIssuedToken;
}
public void hasIssuedToken(boolean flag){
policyHasIssuedToken = flag;
}
public long getTimestampTimeout() {
return this.timestampTimeout;
}
public void setTimestampTimeout(long timeout) {
this.timestampTimeout = timeout;
}
public void setiterationsForPDK(int iterations) {
this.iterationsForPDK = iterations;
}
public int getiterationsForPDK(){
return this.iterationsForPDK;
}
public void setSecurityPolicyVersion(String secPolVersion){
this.securityPolicyVersion = secPolVersion;
}
public String getSecurityPolicyVersion(){
return this.securityPolicyVersion;
}
public void setWSCInstance(String value){
this.wscInstance = value;
}
public String getWSCInstance(){
return this.wscInstance;
}
public String getWSSCVersion(String nsUri) {
if(MessageConstants.SECURITYPOLICY_200507_NS.equals(nsUri)){
return MessageConstants.WSSC_NS;
} else if(MessageConstants.SECURITYPOLICY_12_NS.equals(nsUri)){
return MessageConstants.WSSC_13NS;
}
return null;
}
public void setSCPolicyIDtoSctIdMap(Hashtable scPolicyIDtoSctIdMap ) {
this.scPolicyIDtoSctIdMap = scPolicyIDtoSctIdMap;
}
public Hashtable getSCPolicyIDtoSctIdMap() {
return scPolicyIDtoSctIdMap;
}
public String getSCPolicyIDtoSctIdMap(String scPolicyID) {
if (scPolicyIDtoSctIdMap == null) {
return null;
}
return (String)scPolicyIDtoSctIdMap.get(scPolicyID);
}
public void setAction(String action){
this.action = action;
}
public String getAction(){
return this.action;
}
/**
* @return the bootAlgoSuite
*/
public AlgorithmSuite getBootstrapAlgoSuite() {
return bootAlgoSuite;
}
/**
* @param bootAlgoSuite the bootAlgoSuite to set
*/
public void setBootstrapAlgoSuite(AlgorithmSuite bootAlgoSuite) {
this.bootAlgoSuite = bootAlgoSuite;
}
/**
* @return the wsscVer
*/
public WSSCVersion getWsscVer() {
return wsscVer;
}
/**
* @param wsscVer the wsscVer to set
*/
public void setWsscVer(WSSCVersion wsscVer) {
this.wsscVer = wsscVer;
}
/**
* @return the wsTrustVer
*/
public WSTrustVersion getWsTrustVer() {
return wsTrustVer;
}
/**
* @return the addressingEnabled
*/
public boolean isAddressingEnabled() {
return addressingEnabled;
}
/**
* @param wsTrustVer the wsTrustVer to set
*/
public void setWsTrustVer(WSTrustVersion wsTrustVer) {
this.wsTrustVer = wsTrustVer;
}
/**
* @param addressingEnabled the addressingEnabled to set
*/
public void setAddressingEnabled(boolean addressingEnabled) {
this.addressingEnabled = addressingEnabled;
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy