blob: 812820f0c0774e0ae307f23f1d0461d0e4d7ae59 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <axis2_handler_desc.h>
#include <axutil_array_list.h>
#include <axutil_hash.h>
#include <axiom_soap_const.h>
#include <axiom_soap_envelope.h>
#include <axiom_soap_header.h>
#include <axiom_soap_header_block.h>
#include <axis2_op.h>
#include <axis2_msg_ctx.h>
#include <axis2_msg_info_headers.h>
#include <axutil_property.h>
#include <rampart_constants.h>
#include <rampart_username_token.h>
#include <rampart_handler_util.h>
#include <rampart_timestamp_token.h>
#include <rampart_util.h>
#include <rampart_sec_header_processor.h>
#include <rampart_sec_processed_result.h>
#include <rampart_context.h>
#include <rampart_engine.h>
axis2_status_t AXIS2_CALL
rampart_in_handler_invoke(
struct axis2_handler *handler,
const axutil_env_t *env,
struct axis2_msg_ctx *msg_ctx);
AXIS2_EXTERN axis2_handler_t *AXIS2_CALL
rampart_in_handler_create(
const axutil_env_t *env,
axutil_string_t *name)
{
axis2_handler_t *handler = axis2_handler_create(env);
if(!handler)
{
AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart]Cannot create in-handler.");
return NULL;
}
/*Set the function to invoke*/
axis2_handler_set_invoke(handler, env, rampart_in_handler_invoke);
return handler;
}
axis2_status_t AXIS2_CALL
rampart_in_handler_invoke(
struct axis2_handler *handler,
const axutil_env_t *env,
struct axis2_msg_ctx *msg_ctx)
{
axiom_soap_envelope_t *soap_envelope = NULL;
axiom_soap_header_t *soap_header = NULL;
axis2_status_t status = AXIS2_FAILURE;
axiom_node_t *sec_node = NULL;
rampart_context_t *rampart_context = NULL;
if(!msg_ctx)
{
AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart]message context is not valid");
return AXIS2_FAILURE;
}
/*
* since rampart in_handler is a global handler we should
* first check whether the rampart module is engaged.If not engaged we
* should not process the message but return success.
*/
if(!rampart_is_rampart_engaged(env, msg_ctx))
{
AXIS2_LOG_DEBUG(env->log, AXIS2_LOG_SI,
"[rampart]Rampart is not engaged. No security checks needed.");
return AXIS2_SUCCESS;
}
soap_envelope = axis2_msg_ctx_get_soap_envelope(msg_ctx, env);
if(!soap_envelope)
{
AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart]SOAP envelope cannot be found.");
return AXIS2_FAILURE;
}
soap_header = axiom_soap_envelope_get_header(soap_envelope, env);
if(!soap_header)
{
/*No SOAP header, so no point of proceeding. FAIL*/
AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart]SOAP header cannot be found.");
return AXIS2_FAILURE;
}
rampart_context = rampart_engine_build_configuration(env, msg_ctx, AXIS2_TRUE);
if(!rampart_context)
{
AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart]rampart_context creation failed.");
return AXIS2_FAILURE;
}
sec_node = rampart_get_security_header(env, msg_ctx, soap_header);
/*We do not check for the security header in Transport binding */
if(rampart_context_get_binding_type(rampart_context, env) != RP_PROPERTY_TRANSPORT_BINDING)
{
if(!sec_node)
{
AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart]Security header cannot be found.");
return AXIS2_FAILURE;
}
}
if(rampart_set_security_processed_results_property(env, msg_ctx) != AXIS2_SUCCESS)
{
AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI,
"[rampart]Unable to set the security processed results.");
return AXIS2_FAILURE;
}
if(rampart_shp_process_sec_header(env, msg_ctx, rampart_context, soap_envelope, sec_node)
!= AXIS2_SUCCESS)
{
AXIS2_LOG_ERROR(env->log, AXIS2_LOG_SI, "[rampart]Security Header processing failed.");
return AXIS2_FAILURE;
}
return AXIS2_SUCCESS;
}