All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.opensaml.saml.saml2.profile.impl.AbstractDecryptAction Maven / Gradle / Ivy

/*
 * Licensed to the University Corporation for Advanced Internet Development,
 * Inc. (UCAID) under one or more contributor license agreements.  See the
 * NOTICE file distributed with this work for additional information regarding
 * copyright ownership. The UCAID licenses this file to You under the Apache
 * License, Version 2.0 (the "License"); you may not use this file except in
 * compliance with the License.  You may obtain a copy of the License at
 *
 *    http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package org.opensaml.saml.saml2.profile.impl;

import javax.annotation.Nonnull;
import javax.annotation.Nullable;

import net.shibboleth.utilities.java.support.collection.Pair;
import net.shibboleth.utilities.java.support.component.ComponentSupport;
import net.shibboleth.utilities.java.support.logic.Constraint;

import org.opensaml.messaging.context.navigate.ChildContextLookup;
import org.opensaml.messaging.context.navigate.MessageLookup;
import org.opensaml.profile.action.AbstractProfileAction;
import org.opensaml.profile.action.ActionSupport;
import org.opensaml.profile.action.EventIds;
import org.opensaml.profile.context.ProfileRequestContext;
import org.opensaml.profile.context.navigate.InboundMessageContextLookup;
import org.opensaml.saml.common.SAMLObject;
import org.opensaml.saml.saml2.core.EncryptedElementType;
import org.opensaml.saml.saml2.encryption.Decrypter;
import org.opensaml.xmlsec.DecryptionParameters;
import org.opensaml.xmlsec.context.SecurityParametersContext;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

import com.google.common.base.Function;
import com.google.common.base.Functions;
import com.google.common.base.Predicate;
import com.google.common.base.Predicates;

/**
 * Abstract base class for actions that perform SAML decryption.
 * 
 * 

The actual message to handle is obtained via strategy function, by default the inbound message.

* *

The {@link SecurityParametersContext} governing the decryption process is located by a lookup * strategy, by default a child of the inbound message context.

* * @event {@link EventIds#PROCEED_EVENT_ID} * @event {@link EventIds#INVALID_MSG_CTX} */ public abstract class AbstractDecryptAction extends AbstractProfileAction { /** Class logger. */ @Nonnull private final Logger log = LoggerFactory.getLogger(AbstractDecryptAction.class); /** Are decryption failures a fatal condition? */ private boolean errorFatal; /** Strategy used to locate the {@link SecurityParametersContext}. */ @Nonnull private Function securityParamsLookupStrategy; /** Strategy used to locate the SAML message to operate on. */ @Nonnull private Function messageLookupStrategy; /** Predicate determining whether to attempt decryption. */ @Nonnull private Predicate> decryptionPredicate; /** The decryption object. */ @Nullable private Decrypter decrypter; /** Message to operate on. */ @Nullable private SAMLObject message; /** Constructor. */ public AbstractDecryptAction() { errorFatal = true; securityParamsLookupStrategy = Functions.compose(new ChildContextLookup<>(SecurityParametersContext.class), new InboundMessageContextLookup()); messageLookupStrategy = Functions.compose(new MessageLookup<>(Object.class), new InboundMessageContextLookup()); decryptionPredicate = Predicates.alwaysTrue(); } /** * Get whether decryption failure should be treated as an error or ignored. * * @return whether decryption failure should be treated as an error or ignored */ public boolean isErrorFatal() { return errorFatal; } /** * Set whether decryption failure should be treated as an error or ignored. * * @param flag true iff decryption failure should be fatal */ public void setErrorFatal(final boolean flag) { ComponentSupport.ifInitializedThrowUnmodifiabledComponentException(this); errorFatal = flag; } /** * Set the strategy used to locate the {@link SecurityParametersContext} associated with a given * {@link ProfileRequestContext}. * * @param strategy strategy used to locate the {@link SecurityParametersContext} associated with a given * {@link ProfileRequestContext} */ public void setSecurityParametersContextLookupStrategy( @Nonnull final Function strategy) { ComponentSupport.ifInitializedThrowUnmodifiabledComponentException(this); securityParamsLookupStrategy = Constraint.isNotNull(strategy, "SecurityParametersContext lookup strategy cannot be null"); } /** * Set the strategy used to locate the {@link SAMLObject} to operate on. * * @param strategy strategy used to locate the {@link SAMLObject} to operate on */ public void setMessageLookupStrategy(@Nonnull final Function strategy) { ComponentSupport.ifInitializedThrowUnmodifiabledComponentException(this); messageLookupStrategy = Constraint.isNotNull(strategy, "Message lookup strategy cannot be null"); } /** * Get the predicate used to determine whether to attempt decryption. * * @return the predicate */ @Nonnull public Predicate> getDecryptionPredicate() { return decryptionPredicate; } /** * Set the predicate used to determine whether to attempt decryption. * * @param predicate predicate to use */ public void setDecryptionPredicate( @Nonnull final Predicate> predicate) { ComponentSupport.ifInitializedThrowUnmodifiabledComponentException(this); decryptionPredicate = Constraint.isNotNull(predicate, "Decryption predicate cannot be null"); } /** * Get the decrypter. * * @return the decrypter */ @Nullable public Decrypter getDecrypter() { return decrypter; } /** * Get the object to act on. * * @return the object to act on */ @Nullable public SAMLObject getSAMLObject() { return message; } /** {@inheritDoc} */ @Override protected boolean doPreExecute(@Nonnull final ProfileRequestContext profileRequestContext) { final Object theMessage = messageLookupStrategy.apply(profileRequestContext); if (theMessage == null) { log.debug("{} No message was returned by lookup strategy", getLogPrefix()); ActionSupport.buildEvent(profileRequestContext, EventIds.INVALID_MSG_CTX); return false; } else if (!(theMessage instanceof SAMLObject)) { log.debug("{} Message was not a SAML construct, nothing to do", getLogPrefix()); return false; } message = (SAMLObject) theMessage; final SecurityParametersContext paramsCtx = securityParamsLookupStrategy.apply(profileRequestContext); if (paramsCtx == null || paramsCtx.getDecryptionParameters() == null) { log.debug("{} No security parameter context or decryption parameters", getLogPrefix()); } else { final DecryptionParameters params = paramsCtx.getDecryptionParameters(); decrypter = new Decrypter(params.getDataKeyInfoCredentialResolver(), params.getKEKKeyInfoCredentialResolver(), params.getEncryptedKeyResolver()); } return super.doPreExecute(profileRequestContext); } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy