/usr/include/shibsp/security/SecurityPolicy.h is in libshibsp-dev 2.6.0+dfsg1-4+deb9u1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 | /**
* Licensed to the University Corporation for Advanced Internet
* Development, Inc. (UCAID) under one or more contributor license
* agreements. See the NOTICE file distributed with this work for
* additional information regarding copyright ownership.
*
* UCAID licenses this file to you under the Apache License,
* Version 2.0 (the "License"); you may not use this file except
* in compliance with the License. You may obtain a copy of the
* License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,
* either express or implied. See the License for the specific
* language governing permissions and limitations under the License.
*/
/**
* @file shibsp/security/SecurityPolicy.h
*
* SP-specific SecurityPolicy subclass.
*/
#ifndef __shibsp_secpol_h__
#define __shibsp_secpol_h__
#include <shibsp/base.h>
#include <saml/saml2/profile/SAML2AssertionPolicy.h>
namespace shibsp {
class SHIBSP_API Application;
/**
* SP-specific SecurityPolicy subclass.
*/
class SHIBSP_API SecurityPolicy : public opensaml::saml2::SAML2AssertionPolicy
{
public:
/**
* Constructor for policy.
*
* @param application an Application instance
* @param role identifies the role (generally IdP or SP) of the policy peer
* @param validate true iff XML parsing should be done with validation
* @param policyId identifies policy rules to auto-attach, defaults to the application's set
*/
SecurityPolicy(const Application& application, const xmltooling::QName* role=nullptr, bool validate=true, const char* policyId=nullptr);
virtual ~SecurityPolicy();
opensaml::saml2md::MetadataProvider::Criteria& getMetadataProviderCriteria() const;
/**
* Returns the Application associated with the policy.
*
* @return the associated Application
*/
const Application& getApplication() const;
private:
const Application& m_application;
};
};
#endif /* __shibsp_secpol_h__ */
|