All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.sun.xml.ws.security.impl.policy.RequestSecurityTokenTemplate Maven / Gradle / Ivy

The newest version!
/*
 * Copyright (c) 1997, 2022 Oracle and/or its affiliates. All rights reserved.
 *
 * This program and the accompanying materials are made available under the
 * terms of the Eclipse Distribution License v. 1.0, which is available at
 * http://www.eclipse.org/org/documents/edl-v10.php.
 *
 * SPDX-License-Identifier: BSD-3-Clause
 */

package com.sun.xml.ws.security.impl.policy;

import com.sun.xml.ws.policy.AssertionSet;
import com.sun.xml.ws.policy.PolicyAssertion;
import com.sun.xml.ws.policy.sourcemodel.AssertionData;
import com.sun.xml.ws.security.policy.Lifetime;
import java.util.Collection;
import java.util.Iterator;

import com.sun.xml.ws.security.policy.SecurityAssertionValidator;
/**
 *
 * @author [email protected] [email protected]
 */
public class RequestSecurityTokenTemplate extends PolicyAssertion implements com.sun.xml.ws.security.policy.RequestSecurityTokenTemplate, SecurityAssertionValidator {

    private boolean populated = false;
    private AssertionFitness fitness = AssertionFitness.IS_VALID;
    String tokenType;
    String requestType;
    Lifetime lifeTime;
    String authenticationType;
    private String keyType;
    private int keySize;
    private String sigAlgo;
    private String encAlgo;
    private String canonAlgo;
    private boolean isProofEncRequired = false;
    private String computedKeyAlgo;
    private boolean isEncRequired = false;
    private String signWith;
    private String encryptWith;
    private String keyWrapAlgo;
    private String wstVer;
    private Claims claims = null;

    /**
     * Creates a new instance of RequestSecurityTokenTemplate
     */
    public RequestSecurityTokenTemplate() {
    }

    public RequestSecurityTokenTemplate(AssertionData name,Collection nestedAssertions, AssertionSet nestedAlternative) {
        super(name,nestedAssertions,nestedAlternative);
    }

    @Override
    public String getTokenType() {
        populate();
        return tokenType;
    }

    @Override
    public String getRequestType() {
        populate();
        return this.requestType;
    }

    @Override
    public Lifetime getLifetime() {
        populate();
        return lifeTime;
    }


    @Override
    public String getAuthenticationType() {
        populate();
        return authenticationType;
    }


    @Override
    public String getKeyType() {
        populate();
        return keyType;
    }

    @Override
    public int getKeySize() {
        populate();
        return keySize;
    }



    @Override
    public String getSignatureAlgorithm() {
        populate();
        return sigAlgo;
    }


    @Override
    public String getEncryptionAlgorithm() {
        populate();
        return encAlgo;
    }


    @Override
    public String getCanonicalizationAlgorithm() {
        populate();
        return canonAlgo;
    }


    @Override
    public boolean getProofEncryptionRequired() {
        populate();
        return isProofEncRequired;
    }



    @Override
    public String getComputedKeyAlgorithm() {
        populate();
        return computedKeyAlgo;
    }

    @Override
    public String getKeyWrapAlgorithm() {
        populate();
        return keyWrapAlgo;
    }

    @Override
    public boolean getEncryptionRequired() {
        populate();
        return isEncRequired;
    }



    @Override
    public String getSignWith() {
        populate();
        return signWith;
    }


    @Override
    public String getEncryptWith() {
        populate();
        return encryptWith;
    }

    @Override
    public Claims getClaims(){
        populate();
        return claims;
    }

    @Override
    public String getTrustVersion() {
        populate();
        return wstVer;
    }


    @Override
    public AssertionFitness validate(boolean isServer) {
        return populate(isServer);
    }
    private void populate(){
        populate(false);
    }

    private synchronized AssertionFitness populate(boolean isServer) {
        if(!populated){
            if ( this.hasParameters() ) {

                Iterator  it =this.getParametersIterator();
                while( it.hasNext() ) {
                    PolicyAssertion assertion = it.next();
                    if (this.wstVer == null){
                        this.wstVer = assertion.getName().getNamespaceURI();
                    }
                    //TODO: Support all RequestSecurityTokenTemplate elements
                    if ( PolicyUtil.isKeyType(assertion) ) {
                        this.keyType = assertion.getValue();
                    } else if ( PolicyUtil.isKeySize(assertion) ) {
                        this.keySize = Integer.parseInt(assertion.getValue());
                    }  else if ( PolicyUtil.isEncryption(assertion) ) {
                        this.isEncRequired = true;
                    } else if ( PolicyUtil.isProofEncryption(assertion) ) {
                        this.isProofEncRequired = true;
                    } else if ( PolicyUtil.isLifeTime(assertion) ) {
                        this.lifeTime = (Lifetime) assertion;
                    }else if(PolicyUtil.isSignWith(assertion)){
                        this.signWith = assertion.getValue();
                    }else if(PolicyUtil.isEncryptWith(assertion)){
                        this.encryptWith = assertion.getValue();
                    }else if(PolicyUtil.isTrustTokenType(assertion)){
                        this.tokenType = assertion.getValue();
                    }else if(PolicyUtil.isRequestType(assertion)){
                        this.requestType = assertion.getValue();
                    }else if(PolicyUtil.isAuthenticationType(assertion)){
                        this.authenticationType = assertion.getValue();
                    }else if(PolicyUtil.isSignatureAlgorithm(assertion)){
                        this.sigAlgo = assertion.getValue();
                    }else if(PolicyUtil.isEncryptionAlgorithm(assertion)){
                        this.encAlgo = assertion.getValue();
                    }else if(PolicyUtil.isCanonicalizationAlgorithm(assertion)){
                        this.canonAlgo = assertion.getValue();
                    }else if(PolicyUtil.isComputedKeyAlgorithm(assertion)){
                        this.computedKeyAlgo = assertion.getValue();
                    }else if(PolicyUtil.isKeyWrapAlgorithm(assertion)){
                        this.keyWrapAlgo = assertion.getValue();
                    }else if(PolicyUtil.isEncryption(assertion)){
                        isEncRequired = true;
                    }else if(PolicyUtil.isClaimsElement(assertion)) {
                        claims = (Claims)assertion;
                    }else if(PolicyUtil.isEntropyElement(assertion)){
                        // Valid assertion.
                    }else {
                        if(!assertion.isOptional()){
                            Constants.log_invalid_assertion(assertion, isServer, Constants.RequestSecurityTokenTemplate);
                            fitness = AssertionFitness.HAS_UNKNOWN_ASSERTION;
                        }
                    }

                }
            }
            populated = true;
        }
        return fitness;
    }
}




© 2015 - 2024 Weber Informatics LLC | Privacy Policy