All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.opensaml.saml.saml2.profile.impl.AddNameIDToSubjects Maven / Gradle / Ivy

There is a newer version: 4.0.1
Show newest version
/*
 * Licensed to the University Corporation for Advanced Internet Development, 
 * Inc. (UCAID) under one or more contributor license agreements.  See the 
 * NOTICE file distributed with this work for additional information regarding
 * copyright ownership. The UCAID licenses this file to You under the Apache 
 * License, Version 2.0 (the "License"); you may not use this file except in 
 * compliance with the License.  You may obtain a copy of the License at
 *
 *    http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package org.opensaml.saml.saml2.profile.impl;

import java.util.Collections;
import java.util.List;

import javax.annotation.Nonnull;
import javax.annotation.Nullable;

import org.opensaml.profile.action.AbstractProfileAction;
import org.opensaml.profile.action.ActionSupport;
import org.opensaml.profile.action.EventIds;
import org.opensaml.profile.context.ProfileRequestContext;
import org.opensaml.profile.context.navigate.InboundMessageContextLookup;

import net.shibboleth.utilities.java.support.annotation.constraint.NonnullAfterInit;
import net.shibboleth.utilities.java.support.annotation.constraint.NonnullElements;
import net.shibboleth.utilities.java.support.component.ComponentInitializationException;
import net.shibboleth.utilities.java.support.component.ComponentSupport;
import net.shibboleth.utilities.java.support.logic.Constraint;
import net.shibboleth.utilities.java.support.security.IdentifierGenerationStrategy;
import net.shibboleth.utilities.java.support.security.SecureRandomIdentifierGenerationStrategy;

import org.opensaml.core.xml.config.XMLObjectProviderRegistrySupport;
import org.opensaml.messaging.context.navigate.MessageLookup;
import org.opensaml.saml.common.SAMLException;
import org.opensaml.saml.common.SAMLObject;
import org.opensaml.saml.common.SAMLObjectBuilder;
import org.opensaml.saml.common.profile.SAMLEventIds;
import org.opensaml.saml.common.profile.logic.DefaultNameIDPolicyPredicate;
import org.opensaml.saml.common.profile.logic.MetadataNameIdentifierFormatStrategy;
import org.opensaml.saml.saml2.core.Assertion;
import org.opensaml.saml.saml2.core.AuthnRequest;
import org.opensaml.saml.saml2.core.Issuer;
import org.opensaml.saml.saml2.core.NameID;
import org.opensaml.saml.saml2.core.NameIDPolicy;
import org.opensaml.saml.saml2.core.RequestAbstractType;
import org.opensaml.saml.saml2.core.Response;
import org.opensaml.saml.saml2.core.Subject;
import org.opensaml.saml.saml2.profile.SAML2ActionSupport;
import org.opensaml.saml.saml2.profile.SAML2NameIDGenerator;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

import com.google.common.base.Function;
import com.google.common.base.Functions;
import com.google.common.base.Predicate;
import com.google.common.base.Strings;

/**
 * Action that builds a {@link NameID} and adds it to the {@link Subject} of all the assertions
 * found in a {@link Response}. The message to update is returned by a lookup strategy, by default
 * the message returned by {@link ProfileRequestContext#getOutboundMessageContext()}.
 * 
 * 

If no {@link Response} exists, then an {@link Assertion} directly in the outbound message context will * be used or created by the default lookup strategy.

* *

If no {@link Subject} exists in the assertions found, it will be cretaed.

* *

The source of the {@link NameID} is one of a set of candidate {@link SAML2NameIDGenerator} * plugins injected into the action. The plugin(s) to attempt to use are derived from the Format value, * which is established by a lookup strategy.

* *

In addition, the generation process is influenced by the requested {@link NameIDPolicy}, which * is evaluated using a pluggable predicate.

* * @event {@link EventIds#PROCEED_EVENT_ID} * @event {@link EventIds#INVALID_PROFILE_CTX} * @event {@link SAMLEventIds#INVALID_NAMEID_POLICY} */ public class AddNameIDToSubjects extends AbstractProfileAction { /** Class logger. */ @Nonnull private final Logger log = LoggerFactory.getLogger(AddNameIDToSubjects.class); /** Builder for Subject objects. */ @Nonnull private SAMLObjectBuilder subjectBuilder; /** Builder for NameID objects. */ @Nonnull private SAMLObjectBuilder nameIdBuilder; /** Flag controlling whether to overwrite an existing NameID. */ private boolean overwriteExisting; /** Strategy used to locate the {@link AuthnRequest} to operate on, if any. */ @Nonnull private Function requestLookupStrategy; /** Strategy used to locate the {@link Response} to operate on. */ @Nonnull private Function> assertionsLookupStrategy; /** Strategy used to locate the {@link IdentifierGenerationStrategy} to use. */ @Nonnull private Function idGeneratorLookupStrategy; /** Strategy used to obtain the response issuer value. */ @Nullable private Function issuerLookupStrategy; /** Predicate to validate {@link NameIDPolicy}. */ @Nonnull private Predicate nameIDPolicyPredicate; /** Strategy used to determine the formats to try. */ @Nonnull private Function> formatLookupStrategy; /** Generator to use. */ @NonnullAfterInit private SAML2NameIDGenerator generator; /** Formats to try. */ @Nonnull @NonnullElements private List formats; /** Format required by requested {@link NameIDPolicy}. */ @Nullable private String requiredFormat; /** Request to examine. */ @Nullable private AuthnRequest request; /** Response to modify. */ @Nullable private List assertions; /** The generator to use. */ @Nullable private IdentifierGenerationStrategy idGenerator; /** EntityID to populate into Issuer element. */ @Nullable private String issuerId; /** Constructor. * * @throws ComponentInitializationException if an error occurs initializing default predicate. */ public AddNameIDToSubjects() throws ComponentInitializationException { subjectBuilder = (SAMLObjectBuilder) XMLObjectProviderRegistrySupport.getBuilderFactory().getBuilderOrThrow( Subject.DEFAULT_ELEMENT_NAME); nameIdBuilder = (SAMLObjectBuilder) XMLObjectProviderRegistrySupport.getBuilderFactory().getBuilderOrThrow( NameID.DEFAULT_ELEMENT_NAME); overwriteExisting = true; requestLookupStrategy = Functions.compose(new MessageLookup<>(AuthnRequest.class), new InboundMessageContextLookup()); assertionsLookupStrategy = new AssertionStrategy(); // Default strategy is a 16-byte secure random source. idGeneratorLookupStrategy = new Function() { public IdentifierGenerationStrategy apply(ProfileRequestContext input) { return new SecureRandomIdentifierGenerationStrategy(); } }; // Default predicate pulls SPNameQualifier from NameIDPolicy and does a direct match // against issuer. Handles simple cases, overridden for complex ones. nameIDPolicyPredicate = new DefaultNameIDPolicyPredicate(); ((DefaultNameIDPolicyPredicate) nameIDPolicyPredicate).setRequesterIdLookupStrategy( new RequesterIdFromIssuerFunction()); ((DefaultNameIDPolicyPredicate) nameIDPolicyPredicate).setObjectLookupStrategy( new NameIDPolicyLookupFunction()); ((DefaultNameIDPolicyPredicate) nameIDPolicyPredicate).initialize(); formatLookupStrategy = new MetadataNameIdentifierFormatStrategy(); formats = Collections.emptyList(); } /** * Set whether to overwrite any existing {@link NameID} objects found. * * @param flag true iff the action should overwrite any existing objects */ public void setOverwriteExisting(final boolean flag) { ComponentSupport.ifInitializedThrowUnmodifiabledComponentException(this); overwriteExisting = flag; } /** * Set the strategy used to locate the {@link AuthnRequest} to examine, if any. * * @param strategy strategy used to locate the {@link AuthnRequest} */ public void setRequestLookupStrategy(@Nonnull final Function strategy) { ComponentSupport.ifInitializedThrowUnmodifiabledComponentException(this); requestLookupStrategy = Constraint.isNotNull(strategy, "AuthnRequest lookup strategy cannot be null"); } /** * Set the strategy used to locate the {@link Assertion}s to operate on. * * @param strategy lookup strategy */ public void setAssertionsLookupStrategy(@Nonnull final Function> strategy) { ComponentSupport.ifInitializedThrowUnmodifiabledComponentException(this); assertionsLookupStrategy = Constraint.isNotNull(strategy, "Assertions lookup strategy cannot be null"); } /** * Set the strategy used to locate the {@link IdentifierGenerationStrategy} to use. * * @param strategy lookup strategy */ public void setIdentifierGeneratorLookupStrategy( @Nonnull final Function strategy) { ComponentSupport.ifInitializedThrowUnmodifiabledComponentException(this); idGeneratorLookupStrategy = Constraint.isNotNull(strategy, "IdentifierGenerationStrategy lookup strategy cannot be null"); } /** * Set the strategy used to locate the issuer value to use. * * @param strategy lookup strategy */ public void setIssuerLookupStrategy(@Nullable final Function strategy) { ComponentSupport.ifInitializedThrowUnmodifiabledComponentException(this); issuerLookupStrategy = strategy; } /** * Set the predicate used to evaluate the {@link NameIDPolicy}. * * @param predicate predicate used to evaluate the {@link NameIDPolicy} */ public void setNameIDPolicyPredicate(@Nonnull final Predicate predicate) { ComponentSupport.ifInitializedThrowUnmodifiabledComponentException(this); nameIDPolicyPredicate = Constraint.isNotNull(predicate, "NameIDPolicy predicate cannot be null"); } /** * Set the strategy function to use to obtain the formats to try. * * @param strategy format lookup strategy */ public void setFormatLookupStrategy(@Nonnull final Function> strategy) { ComponentSupport.ifInitializedThrowUnmodifiabledComponentException(this); formatLookupStrategy = Constraint.isNotNull(strategy, "Format lookup strategy cannot be null"); } /** * Set the generator to use. * * @param theGenerator the generator to use */ public void setNameIDGenerator(@Nullable final SAML2NameIDGenerator theGenerator) { ComponentSupport.ifInitializedThrowUnmodifiabledComponentException(this); generator = Constraint.isNotNull(theGenerator, "SAML2NameIDGenerator cannot be null"); } /** {@inheritDoc} */ @Override protected void doInitialize() throws ComponentInitializationException { super.doInitialize(); if (generator == null) { throw new ComponentInitializationException("SAML2NameIDGenerator cannot be null"); } } /** {@inheritDoc} */ @Override protected boolean doPreExecute(@Nonnull final ProfileRequestContext profileRequestContext) { if (!super.doPreExecute(profileRequestContext)) { return false; } log.debug("{} Attempting to add NameID to outgoing Assertion Subjects", getLogPrefix()); idGenerator = idGeneratorLookupStrategy.apply(profileRequestContext); if (idGenerator == null) { log.debug("{} No identifier generation strategy", getLogPrefix()); ActionSupport.buildEvent(profileRequestContext, EventIds.INVALID_PROFILE_CTX); return false; } if (issuerLookupStrategy != null) { issuerId = issuerLookupStrategy.apply(profileRequestContext); } assertions = assertionsLookupStrategy.apply(profileRequestContext); if (assertions == null || assertions.isEmpty()) { log.debug("{} No assertions returned, nothing to do", getLogPrefix()); return false; } if (!nameIDPolicyPredicate.apply(profileRequestContext)) { log.debug("{} NameIDPolicy was unacceptable", getLogPrefix()); ActionSupport.buildEvent(profileRequestContext, SAMLEventIds.INVALID_NAMEID_POLICY); return false; } request = requestLookupStrategy.apply(profileRequestContext); requiredFormat = getRequiredFormat(profileRequestContext); if (requiredFormat != null) { formats = Collections.singletonList(requiredFormat); log.debug("{} Request specified NameID format: {}", getLogPrefix(), requiredFormat); } else { formats = formatLookupStrategy.apply(profileRequestContext); if (formats == null || formats.isEmpty()) { log.debug("{} No candidate NameID formats, nothing to do", getLogPrefix()); return false; } else { log.debug("{} Candidate NameID formats: {}", getLogPrefix(), formats); } } return true; } /** {@inheritDoc} */ @Override protected void doExecute(@Nonnull final ProfileRequestContext profileRequestContext) { final NameID nameId = generateNameID(profileRequestContext); if (nameId == null) { if (requiredFormat != null) { log.warn("{} Request specified use of an unsupportable identifier format: {}", getLogPrefix(), requiredFormat); ActionSupport.buildEvent(profileRequestContext, SAMLEventIds.INVALID_NAMEID_POLICY); } else { log.debug("{} Unable to generate a NameID, leaving empty", getLogPrefix()); } return; } int count = 0; for (final Assertion assertion : assertions) { final Subject subject = getAssertionSubject(assertion); final NameID existing = subject.getNameID(); if (existing == null || overwriteExisting) { subject.setNameID(count > 0 ? cloneNameID(nameId) : nameId); } count ++; } if (count > 0) { log.debug("{} Added NameID to {} assertion subject(s)", getLogPrefix(), count); } } /** * Extract a format required by the inbound request, if present. * * @param profileRequestContext current profile request context * * @return a format dictated by the request, or null */ @Nullable private String getRequiredFormat(@Nonnull final ProfileRequestContext profileRequestContext) { if (request != null) { final NameIDPolicy policy = request.getNameIDPolicy(); if (policy != null) { final String format = policy.getFormat(); if (!Strings.isNullOrEmpty(format) && !NameID.UNSPECIFIED.equals(format) && !NameID.ENCRYPTED.equals(format)) { return format; } } } return null; } /** * Attempt to generate a {@link NameID} using each of the candidate Formats and plugins. * * @param profileRequestContext current profile request context * * @return a generated {@link NameID} or null */ @Nullable private NameID generateNameID(@Nonnull final ProfileRequestContext profileRequestContext) { // See if we can generate one. for (final String format : formats) { log.debug("{} Trying to generate NameID with Format {}", getLogPrefix(), format); try { final NameID nameId = generator.generate(profileRequestContext, format); if (nameId != null) { log.debug("{} Successfully generated NameID with Format {}", getLogPrefix(), format); return nameId; } } catch (final SAMLException e) { log.error("{} Error while generating NameID", getLogPrefix(), e); } } return null; } /** * Get the subject to which the name identifier will be added. * * @param assertion the assertion being modified * * @return the assertion to which the name identifier will be added */ @Nonnull private Subject getAssertionSubject(@Nonnull final Assertion assertion) { if (assertion.getSubject() != null) { return assertion.getSubject(); } final Subject subject = subjectBuilder.buildObject(); assertion.setSubject(subject); return subject; } /** * Create an efficient field-wise copy of a {@link NameID}. * * @param nameId the object to clone * * @return the copy */ @Nonnull private NameID cloneNameID(@Nonnull final NameID nameId) { final NameID clone = nameIdBuilder.buildObject(); clone.setFormat(nameId.getFormat()); clone.setNameQualifier(nameId.getNameQualifier()); clone.setSPNameQualifier(nameId.getSPNameQualifier()); clone.setSPProvidedID(nameId.getSPProvidedID()); clone.setValue(nameId.getValue()); return clone; } /** * Default strategy for obtaining assertions to modify. * *

If the outbound context is empty, a null is returned. If the outbound * message is already an assertion, it's returned. If the outbound message is a response, * then its contents are returned. If the outbound message is anything else, null is returned.

*/ private class AssertionStrategy implements Function> { /** {@inheritDoc} */ @Override @Nullable public List apply(@Nullable final ProfileRequestContext input) { if (input != null && input.getOutboundMessageContext() != null) { final Object outboundMessage = input.getOutboundMessageContext().getMessage(); if (outboundMessage == null) { final Assertion ret = SAML2ActionSupport.buildAssertion(AddNameIDToSubjects.this, idGenerator, issuerId); input.getOutboundMessageContext().setMessage(ret); return Collections.singletonList(ret); } else if (outboundMessage instanceof Assertion) { return Collections.singletonList((Assertion) outboundMessage); } else if (outboundMessage instanceof Response) { return ((Response) outboundMessage).getAssertions(); } } return null; } } /** * Lookup function that returns the {@link NameIDPolicy} from an {@link AuthnRequest} message returned * from a lookup function, by default the inbound message. */ public static class NameIDPolicyLookupFunction implements Function { /** Strategy used to locate the {@link AuthnRequest} to operate on. */ @Nonnull private Function requestLookupStrategy; /** Constructor. */ public NameIDPolicyLookupFunction() { requestLookupStrategy = Functions.compose(new MessageLookup<>(AuthnRequest.class), new InboundMessageContextLookup()); } /** * Set the strategy used to locate the {@link AuthnRequest} to examine. * * @param strategy strategy used to locate the {@link AuthnRequest} */ public void setRequestLookupStrategy(@Nonnull final Function strategy) { requestLookupStrategy = Constraint.isNotNull(strategy, "AuthnRequest lookup strategy cannot be null"); } /** {@inheritDoc} */ @Override @Nullable public SAMLObject apply(@Nullable final ProfileRequestContext profileRequestContext) { final AuthnRequest request = requestLookupStrategy.apply(profileRequestContext); if (request != null) { return request.getNameIDPolicy(); } return null; } } /** * Lookup function that returns {@link org.opensaml.saml.saml2.core.RequestAbstractType#getIssuer()} * from a request message returned from a lookup function, by default the inbound message. */ public static class RequesterIdFromIssuerFunction implements Function { /** Strategy used to locate the {@link AuthnRequest} to operate on. */ @Nonnull private Function requestLookupStrategy; /** Constructor. */ public RequesterIdFromIssuerFunction() { requestLookupStrategy = Functions.compose(new MessageLookup<>(RequestAbstractType.class), new InboundMessageContextLookup()); } /** * Set the strategy used to locate the {@link RequestAbstractType} to examine. * * @param strategy strategy used to locate the {@link RequestAbstractType} */ public void setRequestLookupStrategy( @Nonnull final Function strategy) { requestLookupStrategy = Constraint.isNotNull(strategy, "Request lookup strategy cannot be null"); } /** {@inheritDoc} */ @Override @Nullable public String apply(@Nullable final ProfileRequestContext profileRequestContext) { final RequestAbstractType request = requestLookupStrategy.apply(profileRequestContext); if (request != null && request.getIssuer() != null) { final Issuer issuer = request.getIssuer(); if (issuer.getFormat() == null || NameID.ENTITY.equals(issuer.getFormat())) { return issuer.getValue(); } } return null; } } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy