From 56a8949141a3aa2d783763aaaaccaa0ccf6164c2 Mon Sep 17 00:00:00 2001 From: Tim van Dijen <tvdijen@gmail.com> Date: Mon, 14 Mar 2022 22:24:35 +0100 Subject: [PATCH] Psalter: Remove obsolete annotations --- lib/SimpleSAML/Auth/State.php | 1 - lib/SimpleSAML/IdP/TraditionalLogoutHandler.php | 1 - lib/SimpleSAML/Utils/Attributes.php | 2 -- modules/core/lib/Auth/UserPassBase.php | 1 - modules/core/lib/Auth/UserPassOrgBase.php | 2 -- modules/core/lib/Controller/Exception.php | 3 --- modules/core/www/idp/logout-iframe-done.php | 1 - modules/core/www/idp/logout-iframe.php | 1 - modules/core/www/idp/resumelogout.php | 1 - modules/core/www/loginuserpass.php | 1 - modules/core/www/loginuserpassorg.php | 1 - modules/exampleauth/lib/Auth/Source/External.php | 1 - modules/exampleauth/lib/Controller/ExampleAuth.php | 1 - modules/multiauth/lib/Controller/DiscoController.php | 1 - modules/saml/www/proxy/invalid_session.php | 2 -- modules/saml/www/sp/discoresp.php | 1 - 16 files changed, 21 deletions(-) diff --git a/lib/SimpleSAML/Auth/State.php b/lib/SimpleSAML/Auth/State.php index 032d00473..b43f48f1b 100644 --- a/lib/SimpleSAML/Auth/State.php +++ b/lib/SimpleSAML/Auth/State.php @@ -389,7 +389,6 @@ class State $id = $_REQUEST[self::EXCEPTION_PARAM]; } - /** @var array $state */ $state = self::loadState($id, self::EXCEPTION_STAGE); Assert::keyExists($state, self::EXCEPTION_DATA); diff --git a/lib/SimpleSAML/IdP/TraditionalLogoutHandler.php b/lib/SimpleSAML/IdP/TraditionalLogoutHandler.php index e5b02908c..fd1829e31 100644 --- a/lib/SimpleSAML/IdP/TraditionalLogoutHandler.php +++ b/lib/SimpleSAML/IdP/TraditionalLogoutHandler.php @@ -107,7 +107,6 @@ class TraditionalLogoutHandler implements LogoutHandlerInterface throw new Error\Exception('RelayState lost during logout.'); } - /** @psalm-var array $state */ $state = Auth\State::loadState($relayState, 'core:LogoutTraditional'); if ($error === null) { diff --git a/lib/SimpleSAML/Utils/Attributes.php b/lib/SimpleSAML/Utils/Attributes.php index af6edfb86..791e4da44 100644 --- a/lib/SimpleSAML/Utils/Attributes.php +++ b/lib/SimpleSAML/Utils/Attributes.php @@ -72,7 +72,6 @@ class Attributes $newAttrs = []; foreach ($attributes as $name => $values) { if (!is_string($name)) { - /** @var string $name */ $name = print_r($name, true); throw new InvalidArgumentException(sprintf('Invalid attribute name: "%s".', $name)); } @@ -82,7 +81,6 @@ class Attributes foreach ($values as $value) { if (!is_string($value)) { - /** @var string $value */ $value = print_r($value, true); throw new InvalidArgumentException( sprintf('Invalid attribute value for attribute %s: "%s".', $name, $value) diff --git a/modules/core/lib/Auth/UserPassBase.php b/modules/core/lib/Auth/UserPassBase.php index 11f18f1d4..c8630b4bf 100644 --- a/modules/core/lib/Auth/UserPassBase.php +++ b/modules/core/lib/Auth/UserPassBase.php @@ -284,7 +284,6 @@ abstract class UserPassBase extends Auth\Source public static function handleLogin(string $authStateId, string $username, string $password): void { // Here we retrieve the state array we saved in the authenticate-function. - /** @var array $state */ $state = Auth\State::loadState($authStateId, self::STAGEID); // Retrieve the authentication source we are executing. diff --git a/modules/core/lib/Auth/UserPassOrgBase.php b/modules/core/lib/Auth/UserPassOrgBase.php index aaed8a59a..a85839859 100644 --- a/modules/core/lib/Auth/UserPassOrgBase.php +++ b/modules/core/lib/Auth/UserPassOrgBase.php @@ -270,7 +270,6 @@ abstract class UserPassOrgBase extends Auth\Source string $organization ): void { /* Retrieve the authentication state. */ - /** @var array $state */ $state = Auth\State::loadState($authStateId, self::STAGEID); /* Find authentication source. */ @@ -330,7 +329,6 @@ abstract class UserPassOrgBase extends Auth\Source public static function listOrganizations(string $authStateId): ?array { /* Retrieve the authentication state. */ - /** @var array $state */ $state = Auth\State::loadState($authStateId, self::STAGEID); /* Find authentication source. */ diff --git a/modules/core/lib/Controller/Exception.php b/modules/core/lib/Controller/Exception.php index b5a758c39..18067fb6c 100644 --- a/modules/core/lib/Controller/Exception.php +++ b/modules/core/lib/Controller/Exception.php @@ -65,9 +65,7 @@ class Exception throw new Error\BadRequest('Missing required StateId query parameter.'); } - /** @var array $state */ $state = Auth\State::loadState($stateId, 'core:cardinality'); - Logger::stats( 'core:cardinality:error ' . $state['Destination']['entityid'] . ' ' . $state['saml:sp:IdP'] . ' ' . implode(',', array_keys($state['core:cardinality:errorAttributes'])) @@ -126,7 +124,6 @@ class Exception throw new Error\BadRequest('Missing required StateId query parameter.'); } - /** @var array $state */ $state = Auth\State::loadState($stateId, 'core:short_sso_interval'); $continue = $request->query->get('continue', false); diff --git a/modules/core/www/idp/logout-iframe-done.php b/modules/core/www/idp/logout-iframe-done.php index ca1618dfc..2e5c759b0 100644 --- a/modules/core/www/idp/logout-iframe-done.php +++ b/modules/core/www/idp/logout-iframe-done.php @@ -4,7 +4,6 @@ if (!isset($_REQUEST['id'])) { throw new \SimpleSAML\Error\BadRequest('Missing required parameter: id'); } -/** @psalm-var array $state */ $state = \SimpleSAML\Auth\State::loadState($_REQUEST['id'], 'core:Logout-IFrame'); $idp = \SimpleSAML\IdP::getByState($state); diff --git a/modules/core/www/idp/logout-iframe.php b/modules/core/www/idp/logout-iframe.php index 759e6fdf8..34c5ae32e 100644 --- a/modules/core/www/idp/logout-iframe.php +++ b/modules/core/www/idp/logout-iframe.php @@ -18,7 +18,6 @@ if ($type !== 'embed') { \SimpleSAML\Stats::log('core:idp:logout-iframe:page', ['type' => $type]); } -/** @psalm-var array $state */ $state = \SimpleSAML\Auth\State::loadState($_REQUEST['id'], 'core:Logout-IFrame'); $idp = \SimpleSAML\IdP::getByState($state); $mdh = \SimpleSAML\Metadata\MetaDataStorageHandler::getMetadataHandler(); diff --git a/modules/core/www/idp/resumelogout.php b/modules/core/www/idp/resumelogout.php index 5f90c0bca..656885f44 100644 --- a/modules/core/www/idp/resumelogout.php +++ b/modules/core/www/idp/resumelogout.php @@ -4,7 +4,6 @@ if (!isset($_REQUEST['id'])) { throw new \SimpleSAML\Error\BadRequest('Missing id-parameter.'); } -/** @psalm-var array $state */ $state = \SimpleSAML\Auth\State::loadState($_REQUEST['id'], 'core:Logout:afterbridge'); $idp = \SimpleSAML\IdP::getByState($state); diff --git a/modules/core/www/loginuserpass.php b/modules/core/www/loginuserpass.php index b770b889b..45b6207c4 100644 --- a/modules/core/www/loginuserpass.php +++ b/modules/core/www/loginuserpass.php @@ -13,7 +13,6 @@ if (!array_key_exists('AuthState', $_REQUEST)) { throw new \SimpleSAML\Error\BadRequest('Missing AuthState parameter.'); } $authStateId = $_REQUEST['AuthState']; -/** @var array $state */ $state = \SimpleSAML\Auth\State::loadState($authStateId, \SimpleSAML\Module\core\Auth\UserPassBase::STAGEID); /** @var \SimpleSAML\Module\core\Auth\UserPassBase|null $source */ diff --git a/modules/core/www/loginuserpassorg.php b/modules/core/www/loginuserpassorg.php index 44f5d39c9..00bc014f1 100644 --- a/modules/core/www/loginuserpassorg.php +++ b/modules/core/www/loginuserpassorg.php @@ -14,7 +14,6 @@ if (!array_key_exists('AuthState', $_REQUEST)) { } $authStateId = $_REQUEST['AuthState']; -/** @var array $state */ $state = \SimpleSAML\Auth\State::loadState($authStateId, \SimpleSAML\Module\core\Auth\UserPassOrgBase::STAGEID); /** @var \SimpleSAML\Module\core\Auth\UserPassOrgBase $source */ diff --git a/modules/exampleauth/lib/Auth/Source/External.php b/modules/exampleauth/lib/Auth/Source/External.php index 6e7d5166f..39b7063ce 100644 --- a/modules/exampleauth/lib/Auth/Source/External.php +++ b/modules/exampleauth/lib/Auth/Source/External.php @@ -203,7 +203,6 @@ class External extends Auth\Source * Once again, note the second parameter to the loadState function. This must * match the string we used in the saveState-call above. */ - /** @var array $state */ $state = Auth\State::loadState($request->query->get('State'), 'exampleauth:External'); /* diff --git a/modules/exampleauth/lib/Controller/ExampleAuth.php b/modules/exampleauth/lib/Controller/ExampleAuth.php index aed747526..961fbfe68 100644 --- a/modules/exampleauth/lib/Controller/ExampleAuth.php +++ b/modules/exampleauth/lib/Controller/ExampleAuth.php @@ -185,7 +185,6 @@ class ExampleAuth throw new Error\BadRequest('Missing required StateId query parameter.'); } - /** @var array $state */ $state = $this->authState::loadState($stateId, 'exampleauth:redirectfilter-test'); $state['Attributes']['RedirectTest2'] = ['OK']; diff --git a/modules/multiauth/lib/Controller/DiscoController.php b/modules/multiauth/lib/Controller/DiscoController.php index 6f0694ae0..09f577e9f 100644 --- a/modules/multiauth/lib/Controller/DiscoController.php +++ b/modules/multiauth/lib/Controller/DiscoController.php @@ -103,7 +103,6 @@ class DiscoController throw new Error\BadRequest('Missing AuthState parameter.'); } - /** @var array $state */ $state = $this->authState::loadState($authStateId, MultiAuth::STAGEID); $as = null; diff --git a/modules/saml/www/proxy/invalid_session.php b/modules/saml/www/proxy/invalid_session.php index 5a95f2a78..5181da60e 100644 --- a/modules/saml/www/proxy/invalid_session.php +++ b/modules/saml/www/proxy/invalid_session.php @@ -15,11 +15,9 @@ if (!array_key_exists('AuthState', $_REQUEST)) { try { // try to get the state - /** @var array $state State can never be null without a third argument */ $state = \SimpleSAML\Auth\State::loadState($_REQUEST['AuthState'], 'saml:proxy:invalid_idp'); } catch (\Exception $e) { // the user probably hit the back button after starting the logout, try to recover the state with another stage - /** @var array $state State can never be null without a third argument */ $state = \SimpleSAML\Auth\State::loadState($_REQUEST['AuthState'], 'core:Logout:afterbridge'); // success! Try to continue with reauthentication, since we no longer have a valid session here diff --git a/modules/saml/www/sp/discoresp.php b/modules/saml/www/sp/discoresp.php index 28d855a7c..5944cfae5 100644 --- a/modules/saml/www/sp/discoresp.php +++ b/modules/saml/www/sp/discoresp.php @@ -16,7 +16,6 @@ if (!array_key_exists('idpentityid', $_REQUEST)) { throw new Error\BadRequest('Missing idpentityid to discovery service response handler'); } -/** @var array $state */ $state = Auth\State::loadState($_REQUEST['AuthID'], 'saml:sp:sso'); // Find authentication source -- GitLab