diff options
author | Benjamin Dauvergne <bdauvergne@entrouvert.com> | 2010-02-22 13:30:33 +0000 |
---|---|---|
committer | Benjamin Dauvergne <bdauvergne@entrouvert.com> | 2010-02-22 13:30:33 +0000 |
commit | 1ee8f53663dc8eb96c2671412c27dddc96a7a831 (patch) | |
tree | 8fcc12682ad2016c86e1053cc71cee93097d4049 /tests | |
parent | 432b54a79dae62687c7eeee6d8cf2da90d38a7cb (diff) | |
download | lasso-1ee8f53663dc8eb96c2671412c27dddc96a7a831.tar.gz lasso-1ee8f53663dc8eb96c2671412c27dddc96a7a831.tar.xz lasso-1ee8f53663dc8eb96c2671412c27dddc96a7a831.zip |
ID-WSF 2.0: reorganize EPR minting, add a process_request method to disco service
* data_service.c:
remove dependency on discovery.h
* discovery.{c,h}:
- add a lasso_idwsf2_discovery_process_request_msg to extract request
data before validate request (SvcMDID, SvcMD or RequestService).
- store SvcMDID in a private field, add a setter for it.
- SvcMDID is now used for building response to MDAssociationQuery and
parsing request for MDQuery, MDDelete, MDAssociationAdd and
MDAssociationDelete.
* idwsf2_helper.{c,h}:
- change security mechanism argument of
lasso_wsa_endpoint_reference_add_security_token from a NULL
terminated string array to a GList.
* saml2_login.{c,h}:
- add a lasso_server_create_assertion_as_idwsf2_security_token for
minting assertion for ID-WSF 2.0 security, to be used in Discovery
bootstap EPR creation and EPR minting for Discovery service Query
responses.
- add a lasso_saml2_assertion_get_discovery_bootstrap_epr, and
rewirte lasso_login_idwsf2_get_discovery_bootstrap_epr to use it.
- make lasso_login_idwsf2_add_discovery_bootstrap_epr accept a list
of security mechanisms, not just one.
* tests/idwsf2_tests.c:
- adapt to new argument type of
lasso_login_idwsf2_add_discovery_bootstrap_epr.
Diffstat (limited to 'tests')
-rw-r--r-- | tests/idwsf2_tests.c | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/tests/idwsf2_tests.c b/tests/idwsf2_tests.c index 25360801..027c02bb 100644 --- a/tests/idwsf2_tests.c +++ b/tests/idwsf2_tests.c @@ -165,6 +165,8 @@ prepare_saml2_authn_request(LassoLogin *splogin, LassoLogin *idplogin) static void process_authn_request(LassoLogin *splogin, LassoLogin *idplogin) { + GList node = { .data = LASSO_SECURITY_MECH_BEARER, .next = NULL }; + check_good_rc(lasso_login_process_authn_request_msg(idplogin, strchr(splogin->parent.msg_url,'?')+1)); lasso_login_must_authenticate(idplogin); check_false(lasso_login_must_ask_for_consent(idplogin)); @@ -177,7 +179,7 @@ process_authn_request(LassoLogin *splogin, LassoLogin *idplogin) "FIXME: notOnOrAfter")); check_good_rc(lasso_login_idwsf2_add_discovery_bootstrap_epr(idplogin, "http://example.com/disco", "Discovery Service Description", - LASSO_SECURITY_MECH_BEARER)); + &node, -1, 0)); check_good_rc(lasso_login_build_artifact_msg(idplogin, LASSO_HTTP_METHOD_ARTIFACT_GET)); } |