diff --git a/docs/simplesamlphp-authproc.md b/docs/simplesamlphp-authproc.md index 3b5408396591d39cd06adecee368ee4d610d9848..f65111cffe367e74c5cd3c102a4200d582301213 100644 --- a/docs/simplesamlphp-authproc.md +++ b/docs/simplesamlphp-authproc.md @@ -160,16 +160,16 @@ Writing your own Auth Proc Filter Look at the included *Auth Proc Filters* as examples. Copy the classes into your own module and start playing around. -Authentication processing filters are created by creating a class under `Auth/Process/` in a module. This class is expected to subclass `SimpleSAML_Auth_ProcessingFilter`. A filter must implement at least one function - the `process(&$request)`-function. This function can access the `$request`-array to add, delete and modify attributes, and can also do more advanced processing based on the SP/IdP metadata (which is also included in the `$request`-array). When this function returns, it is assumed that the filter has finished processing. +Authentication processing filters are created by creating a class under `Auth/Process/` in a module. This class is expected to subclass `\SimpleSAML\Auth\ProcessingFilter`. A filter must implement at least one function - the `process(&$request)`-function. This function can access the `$request`-array to add, delete and modify attributes, and can also do more advanced processing based on the SP/IdP metadata (which is also included in the `$request`-array). When this function returns, it is assumed that the filter has finished processing. -If a filter for some reason needs to redirect the user, for example to show a web page, it should save the current request. Upon completion it should retrieve the request, update it with the changes it is going to make, and call `SimpleSAML_Auth_ProcessingChain::resumeProcessing`. This function will continue processing the next configured filter. +If a filter for some reason needs to redirect the user, for example to show a web page, it should save the current request. Upon completion it should retrieve the request, update it with the changes it is going to make, and call `\SimpleSAML\Auth\ProcessingChain::resumeProcessing`. This function will continue processing the next configured filter. Requirements for authentication processing filters: - - Must be derived from the `SimpleSAML_Auth_ProcessingFilter`-class. + - Must be derived from the `\SimpleSAML\Auth\ProcessingFilter`-class. - If a constructor is implemented, it must first call the parent constructor, passing along all parameters, before accessing any of the parameters. In general, only the $config parameter should be accessed. - The `process(&$request)`-function must be implemented. If this function completes, it is assumed that processing is completed, and that the $request array has been updated. - - If the `process`-function does not return, it must at a later time call `SimpleSAML_Auth_ProcessingChain::resumeProcessing` with the new request state. The request state must be an update of the array passed to the `process`-function. + - If the `process`-function does not return, it must at a later time call `\SimpleSAML\Auth\ProcessingChain::resumeProcessing` with the new request state. The request state must be an update of the array passed to the `process`-function. - No pages may be shown to the user from the `process`-function. Instead, the request state should be saved, and the user should be redirected to a new page. This must be done to prevent unpredictable events if the user for example reloads the page. - No state information should be stored in the filter object. It must instead be stored in the request state array. Any changes to variables in the filter object may be lost. - The filter object must be serializable. It may be serialized between being constructed and the call to the `process`-function. This means that, for example, no database connections should be created in the constructor and later used in the `process`-function. diff --git a/docs/simplesamlphp-authsource.md b/docs/simplesamlphp-authsource.md index 514b96f3614fb83a39688f6069770c23f04853f5..09a8bb03384aa2b694e96a41f6a0ef62bc939f18 100644 --- a/docs/simplesamlphp-authsource.md +++ b/docs/simplesamlphp-authsource.md @@ -2,7 +2,7 @@ Creating authentication sources =============================== All authentication sources are located in the `lib/Auth/Source/` directory in a module, and the class name is `sspmod_<module>_Auth_Source_<name>`. -The authentication source must extend the `SimpleSAML_Auth_Source` class or one of its subclasses. +The authentication source must extend the `\SimpleSAML\Auth\Source` class or one of its subclasses. The "entry point" of an authentication source is the `authenticate()`-function. Once that function is called, the authentication module can do whatever it wishes to do. @@ -13,18 +13,18 @@ There are only two requirements: - Return control to SimpleSAMLphp after authenticating the user. If the module is able to authenticate the user without doing any redirects, it should just update the state-array and return. - If the module does a redirect, it must call `SimpleSAML_Auth_Source::completeAuth()` with the updated state array. + If the module does a redirect, it must call `\SimpleSAML\Auth\Source::completeAuth()` with the updated state array. Everything else is up to the module. If the module needs to redirect the user, for example because it needs to show the user a page asking for credentials, it needs to save the state array. -For that we have the `SimpleSAML_Auth_State` class. +For that we have the `\SimpleSAML\Auth\State` class. This is only a convenience class, and you are not required to use it (but its use is encouraged, since it handles some potential pitfalls). Saving state ------------ -The `SimpleSAML_Auth_State` class has two functions that you should use: +The `\SimpleSAML\Auth\State` class has two functions that you should use: `saveState($state, $stage)`, and `loadState($id, $stage)`. The `$stage` parameter must be an unique identifier for the current position in the authentication. It is used to prevent a malicious user from taking a state you save in one location, and give it to a different location. @@ -51,7 +51,7 @@ Generic rules & requirements ---------------------------- - - Must be derived from the `SimpleSAML_Auth_Source`-class. + Must be derived from the `\SimpleSAML\Auth\Source`-class. **Rationale**: - Deriving all authentication sources from a single base class allows us extend all authentication sources by extending the base class. @@ -62,7 +62,7 @@ Generic rules & requirements **Rationale**: - PHP doesn't automatically call any parent constructor, so it needs to be done manually. - - The `$info`-array is used to provide information to the `SimpleSAML_Auth_Source` base class, and therefore needs to be included. + - The `$info`-array is used to provide information to the `\SimpleSAML\Auth\Source` base class, and therefore needs to be included. - Including the `$config`-array makes it possible to add generic configuration options that are valid for all authentication sources. - @@ -74,7 +74,7 @@ Generic rules & requirements This can be used if the authentication doesn't require user input, for example if the authentication can be done based on the IP-address of the user. - - If the `authenticate`-function does not return, it must at a later time call `SimpleSAML_Auth_Source::completeAuth` with the new state array. + If the `authenticate`-function does not return, it must at a later time call `\SimpleSAML\Auth\Source::completeAuth` with the new state array. The state array must be an update of the array passed to the `authenticate`-function. **Rationale**: diff --git a/docs/simplesamlphp-errorhandling.md b/docs/simplesamlphp-errorhandling.md index 02195b0566e08658be9d03f77a3ebfd9afafb7fd..7fbc4f16b454772bd0fb9ad324e0a73002c283f9 100644 --- a/docs/simplesamlphp-errorhandling.md +++ b/docs/simplesamlphp-errorhandling.md @@ -14,7 +14,7 @@ This document describes the way errors and exceptions are handled in authenticat The basic goal is to be able to throw an exception during authentication, and then have that exception transported back to the SP in a way that the SP understands. This means that internal SimpleSAMLphp exceptions must be mapped to transport specific error codes for the various transports that are supported by SimpleSAMLphp. -E.g.: When a `SimpleSAML_Error_NoPassive` error is thrown by an authentication processing filter in a SAML 2.0 IdP, we want to map that exception to the `urn:oasis:names:tc:SAML:2.0:status:NoPassive` status code. +E.g.: When a `\SimpleSAML\Error\NoPassive` error is thrown by an authentication processing filter in a SAML 2.0 IdP, we want to map that exception to the `urn:oasis:names:tc:SAML:2.0:status:NoPassive` status code. That status code should then be returned to the SP. @@ -26,34 +26,34 @@ The simplest case is if you want to throw it during the `authenticate()`-method In those methods, you can just throw an exception: public function process(&$state) { - if ($state['something'] === FALSE) { - throw new SimpleSAML_Error_Exception('Something is wrong...'); + if ($state['something'] === false) { + throw new \SimpleSAML\Error\Exception('Something is wrong...'); } } Exceptions thrown at this stage will be caught and delivered to the appropriate error handler. -If you want to throw an exception outside of those methods, i.e. after you have done a redirect, you need to use the `SimpleSAML_Auth_State::throwException()` function: +If you want to throw an exception outside of those methods, i.e. after you have done a redirect, you need to use the `\SimpleSAML\Auth\State::throwException()` function: <?php $id = $_REQUEST['StateId']; - $state = SimpleSAML_Auth_State::loadState($id, 'somestage...'); - SimpleSAML_Auth_State::throwException($state, - new SimpleSAML_Error_Exception('Something is wrong...')); + $state = \SimpleSAML\Auth\State::loadState($id, 'somestage...'); + \SimpleSAML\Auth\State::throwException($state, + new \SimpleSAML\Error\Exception('Something is wrong...')); ?> -The `SimpleSAML_Auth_State::throwException` function will then transfer your exception to the appropriate error handler. +The `\SimpleSAML\Auth\State::throwException` function will then transfer your exception to the appropriate error handler. ### Note -Note that we use the `SimpleSAML_Error_Exception` class in both cases. +Note that we use the `\SimpleSAML\Error\Exception` class in both cases. This is because the delivery of the exception may require a redirect to a different web page. In those cases, the exception needs to be serialized. The normal `Exception` class in PHP isn't always serializable. -If you throw an exception that isn't a subclass of the `SimpleSAML_Error_Exception` class, your exception will be converted to an instance of `SimpleSAML_Error_UnserializableException`. -The `SimpleSAML_Auth_State::throwException` function does not accept any exceptions that does not subclass the `SimpleSAML_Error_Exception` class. +If you throw an exception that isn't a subclass of the `\SimpleSAML\Error\Exception` class, your exception will be converted to an instance of `\SimpleSAML\Error\UnserializableException`. +The `\SimpleSAML\Auth\State::throwException` function does not accept any exceptions that does not subclass the `\SimpleSAML\Error\Exception` class. Returning specific SAML 2 errors @@ -61,7 +61,7 @@ Returning specific SAML 2 errors By default, all thrown exceptions will be converted to a generic SAML 2 error. In some cases, you may want to convert the exception to a specific SAML 2 status code. -For example, the `SimpleSAML_Error_NoPassive` exception should be converted to a SAML 2 status code with the following properties: +For example, the `\SimpleSAML\Error\NoPassive` exception should be converted to a SAML 2 status code with the following properties: * The top-level status code should be `urn:oasis:names:tc:SAML:2.0:status:Responder`. * The second-level status code should be `urn:oasis:names:tc:SAML:2.0:status:NoPassive`. @@ -97,7 +97,7 @@ This is handled by the `toException()` method in `sspmod_saml_Error`. The assertion consumer script of the SAML 2 authentication source (`modules/saml2/sp/acs.php`) uses this method. The result is that generic exceptions are thrown from that authentication source. -For example, `NoPassive` errors will be converted back to instances of `SimpleSAML_Error_NoPassive`. +For example, `NoPassive` errors will be converted back to instances of `\SimpleSAML\Error\NoPassive`. Other protocols @@ -113,9 +113,9 @@ Technical details This section attempts to describe the internals of the error handling framework. -### `SimpleSAML_Error_Exception` +### `\SimpleSAML\Error\Exception` -The `SimpleSAML_Error_Exception` class extends the normal PHP `Exception` class. +The `\SimpleSAML\Error\Exception` class extends the normal PHP `Exception` class. It makes the exceptions serializable by overriding the `__sleep()` method. The `__sleep()` method returns all variables in the class which should be serialized when saving the class. @@ -136,7 +136,7 @@ This may be confusing since the new stack trace leads into the `unserialize()` f It is therefore recommended to use the getBacktrace() method. -### `SimpleSAML_Auth_State` +### `\SimpleSAML\Auth\State` There are two methods in this class that deals with exceptions: @@ -147,44 +147,44 @@ There are two methods in this class that deals with exceptions: #### `throwException` This method delivers the exception to the code that initialized the exception handling in the authentication state. -That would be `SimpleSAML_Auth_Default` for authtentication sources, and `www/saml2/idp/SSOService.php` for processing filters. +That would be `\SimpleSAML\Auth\DefaultAuth` for authtentication sources, and `www/saml2/idp/SSOService.php` for processing filters. To configure how and where the exception should be delivered, there are two fields in the state-array which can be set: -* `SimpleSAML_Auth_State::EXCEPTION_HANDLER_FUNC`, in which case the exception will be delivered by a function call to the function specified in that field. -* `SimpleSAML_Auth_State::EXCEPTION_HANDLER_URL`, in which case the exception will be delivered by a redirect to the URL specified in that field. +* `\SimpleSAML\Auth\State::EXCEPTION_HANDLER_FUNC`, in which case the exception will be delivered by a function call to the function specified in that field. +* `\SimpleSAML\Auth\State::EXCEPTION_HANDLER_URL`, in which case the exception will be delivered by a redirect to the URL specified in that field. If the exception is delivered by a function call, the function will be called with two parameters: The exception and the state array. -If the exception is delivered by a redirect, SimpleSAML_Auth_State will save the exception in a field in the state array, pass a parameter with the id of the state array to the URL. -The `SimpleSAML_Auth_State::EXCEPTION_PARAM` constant contains the name of that parameter, while the `SimpleSAML_Auth_State::EXCEPTION_DATA` constant holds the name of the field where the exception is saved. +If the exception is delivered by a redirect, \SimpleSAML\Auth\State will save the exception in a field in the state array, pass a parameter with the id of the state array to the URL. +The `\SimpleSAML\Auth\State::EXCEPTION_PARAM` constant contains the name of that parameter, while the `\SimpleSAML\Auth\State::EXCEPTION_DATA` constant holds the name of the field where the exception is saved. #### `loadException` -To retrieve the exception, the application should check for the state parameter in the request, and then retrieve the state array by calling `SimpleSAML_Auth_State::loadExceptionState()`. -The exception can be located in a field named `SimpleSAML_Auth_State::EXCEPTION_DATA`. +To retrieve the exception, the application should check for the state parameter in the request, and then retrieve the state array by calling `\SimpleSAML\Auth\State::loadExceptionState()`. +The exception can be located in a field named `\SimpleSAML\Auth\State::EXCEPTION_DATA`. The following code illustrates this behaviour: - if (array_key_exists(SimpleSAML_Auth_State::EXCEPTION_PARAM, $_REQUEST)) { - $state = SimpleSAML_Auth_State::loadExceptionState(); - $exception = $state[SimpleSAML_Auth_State::EXCEPTION_DATA]; + if (array_key_exists(\SimpleSAML\Auth\State::EXCEPTION_PARAM, $_REQUEST)) { + $state = \SimpleSAML\Auth\State::loadExceptionState(); + $exception = $state[\SimpleSAML\Auth\State::EXCEPTION_DATA]; /* Process exception. */ } -### `SimpleSAML_Auth_Default` +### `\SimpleSAML\Auth\DefaultAuth` This class accepts an `$errorURL` parameter to the `initLogin()` function. -This parameter is stored in the `SimpleSAML_Auth_State::EXCEPTION_HANDLER_URL` of the state array. +This parameter is stored in the `\SimpleSAML\Auth\State::EXCEPTION_HANDLER_URL` of the state array. Exceptions thrown by the authentication source will be delivered to that URL. It also wraps the call to the `authenticate()` function inside a try-catch block. Any exceptions thrown during that function call will be delivered to the URL specified in the `$errorURL` parameter. -This is done for consistency, since `SimpleSAML_Auth_Default` never transfers control back to the caller by returning. +This is done for consistency, since `\SimpleSAML\Auth\DefaultAuth` never transfers control back to the caller by returning. -### `SimpleSAML_Auth_ProcessingChain` +### `\SimpleSAML\Auth\ProcessingChain` This class requires the caller to add the error handler to the state array before calling the `processState()` function. Exceptions thrown by the processing filters will be delivered directly to the caller of `processState()` if possible. @@ -195,9 +195,9 @@ The result will be delivered directly if it is possible, but if not, it will be The code for handling this becomes something like: - if (array_key_exists(SimpleSAML_Auth_State::EXCEPTION_PARAM, $_REQUEST)) { - $state = SimpleSAML_Auth_State::loadExceptionState(); - $exception = $state[SimpleSAML_Auth_State::EXCEPTION_DATA]; + if (array_key_exists(\SimpleSAML\Auth\State::EXCEPTION_PARAM, $_REQUEST)) { + $state = \SimpleSAML\Auth\State::loadExceptionState(); + $exception = $state[\SimpleSAML\Auth\State::EXCEPTION_DATA]; /* Handle exception... */ [...] @@ -206,14 +206,14 @@ The code for handling this becomes something like: $procChain = [...]; $state = array( - 'ReturnURL' => SimpleSAML_Utilities::selfURLNoQuery(), - SimpleSAML_Auth_State::EXCEPTION_HANDLER_URL => SimpleSAML_Utilities::selfURLNoQuery(), + 'ReturnURL' => \SimpleSAML\Utilities::selfURLNoQuery(), + \SimpleSAML\Auth\State::EXCEPTION_HANDLER_URL => \SimpleSAML\Utilities::selfURLNoQuery(), [...], ) try { $procChain->processState($state); - } catch (SimpleSAML_Error_Exception $e) { + } catch (\SimpleSAML\Error\Exception $e) { /* Handle exception. */ [...]; } @@ -221,7 +221,7 @@ The code for handling this becomes something like: #### Note -An exception which isn't a subclass of `SimpleSAML_Error_Exception` will be converted to the `SimpleSAML_Error_UnserializedException` class. +An exception which isn't a subclass of `\SimpleSAML\Error\Exception` will be converted to the `\SimpleSAML\Error\UnserializedException` class. This happens regardless of whether the exception is delivered directly or through the error handler. This is done to be consistent in what the application receives - now it will always receive the same exception, regardless of whether it is delivered directly or through a redirect. @@ -229,12 +229,12 @@ This is done to be consistent in what the application receives - now it will alw Custom error show function -------------------------- -Optional custom error show function, called from SimpleSAML_Error_Error::show, is defined with 'errors.show_function' in config.php. +Optional custom error show function, called from \SimpleSAML\Error\Error::show, is defined with 'errors.show_function' in config.php. -Example code for this function, which implements the same functionality as SimpleSAML_Error_Error::show, looks something like: +Example code for this function, which implements the same functionality as \SimpleSAML\Error\Error::show, looks something like: public static function show(\SimpleSAML\Configuration $config, array $data) { - $t = new SimpleSAML_XHTML_Template($config, 'error.php', 'errors'); + $t = new \SimpleSAML\XHTML\Template($config, 'error.php', 'errors'); $t->data = array_merge($t->data, $data); $t->show(); exit; diff --git a/docs/simplesamlphp-sp-api.md b/docs/simplesamlphp-sp-api.md index 2de1b509a698b342312ea41386657980d6efc3f9..cc43e4bcd8d18f70c562e263f7f5a8cf5e4c11f3 100644 --- a/docs/simplesamlphp-sp-api.md +++ b/docs/simplesamlphp-sp-api.md @@ -157,7 +157,7 @@ Same as the previous, but check the result of the logout operation afterwards. And in logged_out.php: - $state = SimpleSAML_Auth_State::loadState((string)$_REQUEST['LogoutState'], 'MyLogoutState'); + $state = \SimpleSAML\Auth\State::loadState((string)$_REQUEST['LogoutState'], 'MyLogoutState'); $ls = $state['saml:sp:LogoutStatus']; /* Only works for SAML SP */ if ($ls['Code'] === 'urn:oasis:names:tc:SAML:2.0:status:Success' && !isset($ls['SubCode'])) { /* Successful logout. */ diff --git a/lib/SimpleSAML/Auth/Default.php b/lib/SimpleSAML/Auth/Default.php index e50959bfaf162a2dfe2045b7113883c84e4ab880..bd698a05c7833aeda4207aa8effc3188b03407d1 100644 --- a/lib/SimpleSAML/Auth/Default.php +++ b/lib/SimpleSAML/Auth/Default.php @@ -1,5 +1,7 @@ <?php +namespace SimpleSAML\Auth; + /** * Implements the default behaviour for authentication. * @@ -12,10 +14,10 @@ * @deprecated This class will be removed in SSP 2.0. */ -class SimpleSAML_Auth_Default +class DefaultAuth { /** - * @deprecated This method will be removed in SSP 2.0. Use SimpleSAML_Auth_Source::initLogin() instead. + * @deprecated This method will be removed in SSP 2.0. Use Source::initLogin() instead. */ public static function initLogin( $authId, @@ -31,21 +33,20 @@ class SimpleSAML_Auth_Default /** * @deprecated This method will be removed in SSP 2.0. Please use - * SimpleSAML_Auth_State::getPersistentAuthData() instead. + * State::getPersistentAuthData() instead. */ public static function extractPersistentAuthState(array &$state) { - - return SimpleSAML_Auth_State::getPersistentAuthData($state); + return State::getPersistentAuthData($state); } /** - * @deprecated This method will be removed in SSP 2.0. Please use SimpleSAML_Auth_Source::loginCompleted() instead. + * @deprecated This method will be removed in SSP 2.0. Please use Source::loginCompleted() instead. */ public static function loginCompleted($state) { - SimpleSAML_Auth_Source::loginCompleted($state); + Source::loginCompleted($state); } @@ -62,10 +63,10 @@ class SimpleSAML_Auth_Default $state = $session->getAuthData($authority, 'LogoutState'); $session->doLogout($authority); - $state['SimpleSAML_Auth_Default.ReturnURL'] = $returnURL; + $state['\SimpleSAML\Auth\DefaultAuth.ReturnURL'] = $returnURL; $state['LogoutCompletedHandler'] = array(get_class(), 'logoutCompleted'); - $as = SimpleSAML_Auth_Source::getById($authority); + $as = Source::getById($authority); if ($as === null) { // The authority wasn't an authentication source... self::logoutCompleted($state); @@ -95,18 +96,18 @@ class SimpleSAML_Auth_Default public static function logoutCompleted($state) { assert(is_array($state)); - assert(array_key_exists('SimpleSAML_Auth_Default.ReturnURL', $state)); + assert(array_key_exists('\SimpleSAML\Auth\DefaultAuth.ReturnURL', $state)); - \SimpleSAML\Utils\HTTP::redirectTrustedURL($state['SimpleSAML_Auth_Default.ReturnURL']); + \SimpleSAML\Utils\HTTP::redirectTrustedURL($state['\SimpleSAML\Auth\DefaultAuth.ReturnURL']); } /** - * @deprecated This method will be removed in SSP 2.0. Please use SimpleSAML_Auth_Source::logoutCallback() instead. + * @deprecated This method will be removed in SSP 2.0. Please use Source::logoutCallback() instead. */ public static function logoutCallback($state) { - SimpleSAML_Auth_Source::logoutCallback($state); + Source::logoutCallback($state); } @@ -116,7 +117,7 @@ class SimpleSAML_Auth_Default */ public static function handleUnsolicitedAuth($authId, array $state, $redirectTo) { - sspmod_saml_Auth_Source_SP::handleUnsolicitedAuth($authId, $state, $redirectTo); + \sspmod_saml_Auth_Source_SP::handleUnsolicitedAuth($authId, $state, $redirectTo); } @@ -124,14 +125,14 @@ class SimpleSAML_Auth_Default * Return an authentication source by ID. * * @param string $id The id of the authentication source. - * @return SimpleSAML_Auth_Source The authentication source. - * @throws Exception If the $id does not correspond with an authentication source. + * @return Source The authentication source. + * @throws \Exception If the $id does not correspond with an authentication source. */ private static function getAuthSource($id) { - $as = SimpleSAML_Auth_Source::getById($id); + $as = Source::getById($id); if ($as === null) { - throw new Exception('Invalid authentication source: ' . $id); + throw new \Exception('Invalid authentication source: ' . $id); } return $as; } diff --git a/lib/SimpleSAML/Auth/LDAP.php b/lib/SimpleSAML/Auth/LDAP.php index 40affecb2f47af10f1b668e70e2097bcde0f654d..437ff7bf3e539db801c98b86bce5b58158a929d8 100644 --- a/lib/SimpleSAML/Auth/LDAP.php +++ b/lib/SimpleSAML/Auth/LDAP.php @@ -1,5 +1,10 @@ <?php +namespace SimpleSAML\Auth; + +use SimpleSAmL\Error; +use SimpleSAMl\Logger; + /** * Constants defining possible errors */ @@ -23,7 +28,8 @@ if (!defined('LDAP_OPT_DIAGNOSTIC_MESSAGE')) { * @author Anders Lund, UNINETT AS. <anders.lund@uninett.no> * @package SimpleSAMLphp */ -class SimpleSAML_Auth_LDAP + +class LDAP { /** * LDAP link identifier. @@ -57,7 +63,7 @@ class SimpleSAML_Auth_LDAP public function __construct($hostname, $enable_tls = true, $debug = false, $timeout = 0, $port = 389, $referrals = true) { // Debug - SimpleSAML\Logger::debug('Library - LDAP __construct(): Setup LDAP with '. + Logger::debug('Library - LDAP __construct(): Setup LDAP with '. 'host=\''.$hostname. '\', tls='.var_export($enable_tls, true). ', debug='.var_export($debug, true). @@ -71,7 +77,7 @@ class SimpleSAML_Auth_LDAP * OpenLDAP 2.x.x or Netscape Directory SDK x.x needed for this option. */ if ($debug && !ldap_set_option(null, LDAP_OPT_DEBUG_LEVEL, 7)) { - SimpleSAML\Logger::warning('Library - LDAP __construct(): Unable to set debug level (LDAP_OPT_DEBUG_LEVEL) to 7'); + Logger::warning('Library - LDAP __construct(): Unable to set debug level (LDAP_OPT_DEBUG_LEVEL) to 7'); } /* @@ -98,10 +104,10 @@ class SimpleSAML_Auth_LDAP $this->timeout = $timeout; if ($timeout > 0) { if (!@ldap_set_option($this->ldap, LDAP_OPT_NETWORK_TIMEOUT, $timeout)) { - SimpleSAML\Logger::warning('Library - LDAP __construct(): Unable to set timeouts (LDAP_OPT_NETWORK_TIMEOUT) to '.$timeout); + Logger::warning('Library - LDAP __construct(): Unable to set timeouts (LDAP_OPT_NETWORK_TIMEOUT) to '.$timeout); } if (!@ldap_set_option($this->ldap, LDAP_OPT_TIMELIMIT, $timeout)) { - SimpleSAML\Logger::warning('Library - LDAP __construct(): Unable to set timeouts (LDAP_OPT_TIMELIMIT) to '.$timeout); + Logger::warning('Library - LDAP __construct(): Unable to set timeouts (LDAP_OPT_TIMELIMIT) to '.$timeout); } } @@ -120,7 +126,7 @@ class SimpleSAML_Auth_LDAP * * @param string $description * The exception's description - * @return Exception + * @return \Exception */ private function makeException($description, $type = null) { @@ -128,7 +134,7 @@ class SimpleSAML_Auth_LDAP // Log LDAP code and description, if possible if (empty($this->ldap)) { - SimpleSAML\Logger::error($description); + Logger::error($description); } else { $errNo = @ldap_errno($this->ldap); } @@ -137,22 +143,22 @@ class SimpleSAML_Auth_LDAP if ($type) { if ($errNo !== 0) { // Only log real LDAP errors; not success - SimpleSAML\Logger::error($description.'; cause: \''.ldap_error($this->ldap).'\' (0x'.dechex($errNo).')'); + Logger::error($description.'; cause: \''.ldap_error($this->ldap).'\' (0x'.dechex($errNo).')'); } else { - SimpleSAML\Logger::error($description); + Logger::error($description); } switch ($type) { case ERR_INTERNAL:// 1 - ExInternal - return new \SimpleSAML\Error\Exception($description, $errNo); + return new Error\Exception($description, $errNo); case ERR_NO_USER:// 2 - ExUserNotFound - return new \SimpleSAML\Error\UserNotFound($description, $errNo); + return new Error\UserNotFound($description, $errNo); case ERR_WRONG_PW:// 3 - ExInvalidCredential - return new \SimpleSAML\Error\InvalidCredential($description, $errNo); + return new Error\InvalidCredential($description, $errNo); case ERR_AS_DATA_INCONSIST:// 4 - ExAsDataInconsist - return new \SimpleSAML\Error\AuthSource('ldap', $description); + return new Error\AuthSource('ldap', $description); case ERR_AS_INTERNAL:// 5 - ExAsInternal - return new \SimpleSAML\Error\AuthSource('ldap', $description); + return new Error\AuthSource('ldap', $description); } } else { if ($errNo !== 0) { @@ -163,17 +169,17 @@ class SimpleSAML_Auth_LDAP } switch ($errNo) { case 0x20://LDAP_NO_SUCH_OBJECT - SimpleSAML\Logger::warning($description); - return new \SimpleSAML\Error\UserNotFound($description, $errNo); + Logger::warning($description); + return new Error\UserNotFound($description, $errNo); case 0x31://LDAP_INVALID_CREDENTIALS - SimpleSAML\Logger::info($description); - return new \SimpleSAML\Error\InvalidCredential($description, $errNo); + Logger::info($description); + return new Error\InvalidCredential($description, $errNo); case -1://NO_SERVER_CONNECTION - SimpleSAML\Logger::error($description); - return new \SimpleSAML\Error\AuthSource('ldap', $description); + Logger::error($description); + return new Error\AuthSource('ldap', $description); default: - SimpleSAML\Logger::error($description); - return new \SimpleSAML\Error\AuthSource('ldap', $description); + Logger::error($description); + return new Error\AuthSource('ldap', $description); } } } @@ -194,16 +200,16 @@ class SimpleSAML_Auth_LDAP * @param string $scope * @return string * The DN of the resulting found element. - * @throws \SimpleSAML\Error\Exception if: + * @throws Error\Exception if: * - Attribute parameter is wrong type - * @throws \SimpleSAML\Error\AuthSource if: + * @throws Error\AuthSource if: * - Not able to connect to LDAP server * - False search result * - Count return false * - Searche found more than one result * - Failed to get first entry from result * - Failed to get DN for entry - * @throws \SimpleSAML\Error\UserNotFound if: + * @throws Error\UserNotFound if: * - Zero entries were found */ private function search($base, $attribute, $value, $searchFilter = null, $scope = "subtree") @@ -223,7 +229,7 @@ class SimpleSAML_Auth_LDAP } // Search using generated filter - SimpleSAML\Logger::debug('Library - LDAP search(): Searching base ('.$scope.') \''.$base.'\' for \''.$filter.'\''); + Logger::debug('Library - LDAP search(): Searching base ('.$scope.') \''.$base.'\' for \''.$filter.'\''); if ($scope === 'base') { $result = @ldap_read($this->ldap, $base, $filter, array(), 0, 0, $this->timeout, LDAP_DEREF_NEVER); } else if ($scope === 'onelevel') { @@ -282,17 +288,17 @@ class SimpleSAML_Auth_LDAP * The DN of the matching element, if found. If no element was found and * $allowZeroHits is set to FALSE, an exception will be thrown; otherwise * NULL will be returned. - * @throws \SimpleSAML\Error\AuthSource if: + * @throws Error\AuthSource if: * - LDAP search encounter some problems when searching cataloge * - Not able to connect to LDAP server - * @throws \SimpleSAML\Error\UserNotFound if: + * @throws Error\UserNotFound if: * - $allowZeroHits is FALSE and no result is found * */ public function searchfordn($base, $attribute, $value, $allowZeroHits = false, $searchFilter = null, $scope = 'subtree') { // Traverse all search bases, returning DN if found - $bases = SimpleSAML\Utils\Arrays::arrayize($base); + $bases = \SimpleSAML\Utils\Arrays::arrayize($base); foreach ($bases as $current) { try { // Single base search @@ -303,12 +309,12 @@ class SimpleSAML_Auth_LDAP return $result; } // If search failed, attempt the other base DNs - } catch (\SimpleSAML\Error\UserNotFound $e) { + } catch (Error\UserNotFound $e) { // Just continue searching } } // Decide what to do for zero entries - SimpleSAML\Logger::debug('Library - LDAP searchfordn(): No entries found'); + Logger::debug('Library - LDAP searchfordn(): No entries found'); if ($allowZeroHits) { // Zero hits allowed return null; @@ -324,7 +330,7 @@ class SimpleSAML_Auth_LDAP * This method was created specifically for the ldap:AttributeAddUsersGroups->searchActiveDirectory() * method, but could be used for other LDAP search needs. It will search LDAP and return all the entries. * - * @throws Exception + * @throws \Exception * @param string|array $bases * @param string|array $filters Array of 'attribute' => 'values' to be combined into the filter, or a raw filter string * @param string|array $attributes Array of attributes requested from LDAP @@ -442,7 +448,7 @@ class SimpleSAML_Auth_LDAP * Returns TRUE if successful, FALSE if * LDAP_INVALID_CREDENTIALS, LDAP_X_PROXY_AUTHZ_FAILURE, * LDAP_INAPPROPRIATE_AUTH, LDAP_INSUFFICIENT_ACCESS - * @throws \SimpleSAML\Error\Exception on other errors + * @throws Error\Exception on other errors */ public function bind($dn, $password, array $sasl_args = null) { @@ -473,7 +479,7 @@ class SimpleSAML_Auth_LDAP if ($error === true) { // Good $this->authz_id = $authz_id; - SimpleSAML\Logger::debug('Library - LDAP bind(): Bind successful with DN \''.$dn.'\''); + Logger::debug('Library - LDAP bind(): Bind successful with DN \''.$dn.'\''); return true; } @@ -520,7 +526,7 @@ class SimpleSAML_Auth_LDAP } // Log debug message - SimpleSAML\Logger::debug( + Logger::debug( 'ldap:LdapConnection->setOption : Set the LDAP option ['. $option.'] with the value ['.$value.']' ); @@ -554,7 +560,7 @@ class SimpleSAML_Auth_LDAP // TODO: Verify that this originally was the intended behaviour. Could $attributes be a string? $attributes = array(); } - SimpleSAML\Logger::debug('Library - LDAP getAttributes(): Getting '.$description.' from DN \''.$dn.'\''); + Logger::debug('Library - LDAP getAttributes(): Getting '.$description.' from DN \''.$dn.'\''); // Attempt to get attributes // TODO: Should aliases be dereferenced? @@ -585,7 +591,7 @@ class SimpleSAML_Auth_LDAP if (!empty($maxsize) && strlen($value) > $maxsize) { // Ignoring and warning - SimpleSAML\Logger::warning('Library - LDAP getAttributes(): Attribute \''. + Logger::warning('Library - LDAP getAttributes(): Attribute \''. $name.'\' exceeded maximum allowed size by '.(strlen($value) - $maxsize)); continue; } @@ -603,7 +609,7 @@ class SimpleSAML_Auth_LDAP } // We're done - SimpleSAML\Logger::debug('Library - LDAP getAttributes(): Found attributes \'('.join(',', array_keys($result)).')\''); + Logger::debug('Library - LDAP getAttributes(): Found attributes \'('.join(',', array_keys($result)).')\''); return $result; } @@ -638,7 +644,7 @@ class SimpleSAML_Auth_LDAP // escape characters with a special meaning, also in the password $password = addcslashes($password, ',+"\\<>;*'); if (!$this->bind($dn, $password)) { - SimpleSAML\Logger::info('Library - LDAP validate(): Failed to authenticate \''.$username.'\' using DN \''.$dn.'\''); + Logger::info('Library - LDAP validate(): Failed to authenticate \''.$username.'\' using DN \''.$dn.'\''); return false; } } diff --git a/lib/SimpleSAML/Auth/ProcessingChain.php b/lib/SimpleSAML/Auth/ProcessingChain.php index a206635177321c0b9f9aecaeedf03c2edbbdd67d..08ffb0ce9e5520ee96f1781a719f7aeede0b83c3 100644 --- a/lib/SimpleSAML/Auth/ProcessingChain.php +++ b/lib/SimpleSAML/Auth/ProcessingChain.php @@ -1,5 +1,7 @@ <?php +namespace SimpleSAML\Auth; + /** * Class for implementing authentication processing chains for IdPs. * @@ -10,18 +12,19 @@ * @author Olav Morken, UNINETT AS. * @package SimpleSAMLphp */ -class SimpleSAML_Auth_ProcessingChain + +class ProcessingChain { /** * The list of remaining filters which should be applied to the state. */ - const FILTERS_INDEX = 'SimpleSAML_Auth_ProcessingChain.filters'; + const FILTERS_INDEX = '\SimpleSAML\Auth\ProcessingChain.filters'; /** * The stage we use for completed requests. */ - const COMPLETED_STAGE = 'SimpleSAML_Auth_ProcessingChain.completed'; + const COMPLETED_STAGE = '\SimpleSAML\Auth\ProcessingChain.completed'; /** @@ -69,8 +72,7 @@ class SimpleSAML_Auth_ProcessingChain self::addFilters($this->filters, $spFilters); } - - SimpleSAML\Logger::debug('Filter config for ' . $idpMetadata['entityid'] . '->' . + \SimpleSAML\Logger::debug('Filter config for ' . $idpMetadata['entityid'] . '->' . $spMetadata['entityid'] . ': ' . str_replace("\n", '', var_export($this->filters, true))); } @@ -108,7 +110,7 @@ class SimpleSAML_Auth_ProcessingChain * Parse an array of authentication processing filters. * * @param array $filterSrc Array with filter configuration. - * @return array Array of SimpleSAML_Auth_ProcessingFilter objects. + * @return array Array of ProcessingFilter objects. */ private static function parseFilterList($filterSrc) { @@ -122,7 +124,7 @@ class SimpleSAML_Auth_ProcessingChain } if (!is_array($filter)) { - throw new Exception('Invalid authentication processing filter configuration: ' . + throw new \Exception('Invalid authentication processing filter configuration: ' . 'One of the filters wasn\'t a string or an array.'); } @@ -136,20 +138,20 @@ class SimpleSAML_Auth_ProcessingChain /** * Parse an authentication processing filter. * - * @param array $config Array with the authentication processing filter configuration. - * @param int $priority The priority of the current filter, (not included in the filter - * definition.) - * @return SimpleSAML_Auth_ProcessingFilter The parsed filter. + * @param array $config Array with the authentication processing filter configuration. + * @param int $priority The priority of the current filter, (not included in the filter + * definition.) + * @return ProcessingFilter The parsed filter. */ private static function parseFilter($config, $priority) { assert(is_array($config)); if (!array_key_exists('class', $config)) { - throw new Exception('Authentication processing filter without name given.'); + throw new \Exception('Authentication processing filter without name given.'); } - $className = SimpleSAML\Module::resolveClass($config['class'], 'Auth_Process', 'SimpleSAML_Auth_ProcessingFilter'); + $className = \SimpleSAML\Module::resolveClass($config['class'], 'Auth\Process', '\SimpleSAML\Auth\ProcessingFilter'); $config['%priority'] = $priority; unset($config['class']); return new $className($config, null); @@ -168,11 +170,11 @@ class SimpleSAML_Auth_ProcessingChain * If an exception is thrown during processing, it should be handled by the caller of * this function. If the user has redirected to a different page, the exception will be * returned through the exception handler defined on the state array. See - * SimpleSAML_Auth_State for more information. + * State for more information. * - * @see SimpleSAML_Auth_State - * @see SimpleSAML_Auth_State::EXCEPTION_HANDLER_URL - * @see SimpleSAML_Auth_State::EXCEPTION_HANDLER_FUNC + * @see State + * @see State::EXCEPTION_HANDLER_URL + * @see State::EXCEPTION_HANDLER_FUNC * * @param array &$state The state we are processing. */ @@ -198,7 +200,7 @@ class SimpleSAML_Auth_ProcessingChain } catch (\SimpleSAML\Error\Exception $e) { // No need to convert the exception throw $e; - } catch (Exception $e) { + } catch (\Exception $e) { /* * To be consistent with the exception we return after an redirect, * we convert this exception before returning it. @@ -230,10 +232,10 @@ class SimpleSAML_Auth_ProcessingChain try { $filter->process($state); } catch (\SimpleSAML\Error\Exception $e) { - SimpleSAML_Auth_State::throwException($state, $e); - } catch (Exception $e) { + State::throwException($state, $e); + } catch (\Exception $e) { $e = new \SimpleSAML\Error\UnserializableException($e); - SimpleSAML_Auth_State::throwException($state, $e); + State::throwException($state, $e); } } @@ -248,13 +250,13 @@ class SimpleSAML_Auth_ProcessingChain * Save state information, and redirect to the URL specified * in $state['ReturnURL']. */ - $id = SimpleSAML_Auth_State::saveState($state, self::COMPLETED_STAGE); + $id = State::saveState($state, self::COMPLETED_STAGE); \SimpleSAML\Utils\HTTP::redirectTrustedURL($state['ReturnURL'], array(self::AUTHPARAM => $id)); } else { /* Pass the state to the function defined in $state['ReturnCall']. */ // We are done with the state array in the session. Delete it. - SimpleSAML_Auth_State::deleteState($state); + State::deleteState($state); $func = $state['ReturnCall']; assert(is_callable($func)); @@ -307,14 +309,14 @@ class SimpleSAML_Auth_ProcessingChain * Retrieve a state which has finished processing. * * @param string $id The state identifier. - * @see SimpleSAML_Auth_State::parseStateID() + * @see State::parseStateID() * @return Array The state referenced by the $id parameter. */ public static function fetchProcessedState($id) { assert(is_string($id)); - return SimpleSAML_Auth_State::loadState($id, self::COMPLETED_STAGE); + return State::loadState($id, self::COMPLETED_STAGE); } @@ -328,10 +330,10 @@ class SimpleSAML_Auth_ProcessingChain if (isset($state['Destination']['userid.attribute'])) { $attributeName = $state['Destination']['userid.attribute']; - SimpleSAML\Logger::warning("The 'userid.attribute' option has been deprecated."); + \SimpleSAML\Logger::warning("The 'userid.attribute' option has been deprecated."); } elseif (isset($state['Source']['userid.attribute'])) { $attributeName = $state['Source']['userid.attribute']; - SimpleSAML\Logger::warning("The 'userid.attribute' option has been deprecated."); + \SimpleSAML\Logger::warning("The 'userid.attribute' option has been deprecated."); } else { // Default attribute $attributeName = 'eduPersonPrincipalName'; @@ -343,12 +345,12 @@ class SimpleSAML_Auth_ProcessingChain $uid = $state['Attributes'][$attributeName]; if (count($uid) === 0) { - SimpleSAML\Logger::warning('Empty user id attribute [' . $attributeName . '].'); + \SimpleSAML\Logger::warning('Empty user id attribute [' . $attributeName . '].'); return; } if (count($uid) > 1) { - SimpleSAML\Logger::warning('Multiple attribute values for user id attribute [' . $attributeName . '].'); + \SimpleSAML\Logger::warning('Multiple attribute values for user id attribute [' . $attributeName . '].'); return; } @@ -356,7 +358,7 @@ class SimpleSAML_Auth_ProcessingChain $uid = $uid[0]; if (empty($uid)) { - SimpleSAML\Logger::warning('Empty value in attribute '.$attributeName.". on user. Cannot set UserID."); + \SimpleSAML\Logger::warning('Empty value in attribute '.$attributeName.". on user. Cannot set UserID."); return; } $state['UserID'] = $uid; diff --git a/lib/SimpleSAML/Auth/ProcessingFilter.php b/lib/SimpleSAML/Auth/ProcessingFilter.php index e6126da1de01bd040d39c5a8feff6f813761b290..baeb5834b68dc81dd8c2f3e1f35cbde829a40663 100644 --- a/lib/SimpleSAML/Auth/ProcessingFilter.php +++ b/lib/SimpleSAML/Auth/ProcessingFilter.php @@ -1,5 +1,6 @@ <?php +namespace SimpleSAML\Auth; /** * Base class for authentication processing filters. @@ -18,9 +19,9 @@ * @author Olav Morken, UNINETT AS. * @package SimpleSAMLphp */ -abstract class SimpleSAML_Auth_ProcessingFilter -{ +abstract class ProcessingFilter +{ /** * Priority of this filter. * @@ -49,7 +50,7 @@ abstract class SimpleSAML_Auth_ProcessingFilter if (array_key_exists('%priority', $config)) { $this->priority = $config['%priority']; if (!is_int($this->priority)) { - throw new Exception('Invalid priority: ' . var_export($this->priority, true)); + throw new \Exception('Invalid priority: ' . var_export($this->priority, true)); } unset($config['%priority']); } diff --git a/lib/SimpleSAML/Auth/Simple.php b/lib/SimpleSAML/Auth/Simple.php index 314e48b6bbb3282fbbf2765f20547778c6dd4787..a7efadca9b8354496623aa5c858e2d14b39e9410 100644 --- a/lib/SimpleSAML/Auth/Simple.php +++ b/lib/SimpleSAML/Auth/Simple.php @@ -2,8 +2,6 @@ namespace SimpleSAML\Auth; -use \SimpleSAML_Auth_Source as Source; -use \SimpleSAML_Auth_State as State; use \SimpleSAML\Configuration; use \SimpleSAML\Error\AuthSource as AuthSourceError; use \SimpleSAML\Module; @@ -26,7 +24,7 @@ class Simple protected $authSource; /** - * @var \SimpleSAML\Configuration|null + * @var Configuration|null */ protected $app_config; @@ -47,9 +45,9 @@ class Simple /** * Retrieve the implementing authentication source. * - * @return \SimpleSAML_Auth_Source The authentication source. + * @return Source The authentication source. * - * @throws \SimpleSAML\Error\AuthSource If the requested auth source is unknown. + * @throws AuthSourceError If the requested auth source is unknown. */ public function getAuthSource() { @@ -92,7 +90,6 @@ class Simple */ public function requireAuth(array $params = array()) { - $session = Session::getSessionFromRequest(); if ($session->isValid($this->authSource)) { @@ -120,7 +117,6 @@ class Simple */ public function login(array $params = array()) { - if (array_key_exists('KeepPost', $params)) { $keepPost = (bool) $params['KeepPost']; } else { @@ -257,7 +253,6 @@ class Simple */ public function getAttributes() { - if (!$this->isAuthenticated()) { // Not authenticated return array(); @@ -296,7 +291,6 @@ class Simple */ public function getAuthDataArray() { - if (!$this->isAuthenticated()) { return null; } diff --git a/lib/SimpleSAML/Auth/Source.php b/lib/SimpleSAML/Auth/Source.php index 8e1be02431cc2f63b8a1c93af69f56bcd14f6254..eacec3ead2392fe8a5f1bea3336dad1c81fdb920 100644 --- a/lib/SimpleSAML/Auth/Source.php +++ b/lib/SimpleSAML/Auth/Source.php @@ -1,6 +1,6 @@ <?php -use SimpleSAML\Auth\SourceFactory; +namespace SimpleSAML\Auth; /** * This class defines a base class for authentication source. @@ -11,7 +11,7 @@ use SimpleSAML\Auth\SourceFactory; * @package SimpleSAMLphp */ -abstract class SimpleSAML_Auth_Source +abstract class Source { /** * The authentication source identifier. This identifier can be used to look up this object, for example when @@ -46,7 +46,7 @@ abstract class SimpleSAML_Auth_Source * * @param string $type The type of the authentication source. * - * @return SimpleSAML_Auth_Source[] Array of SimpleSAML_Auth_Source objects of the specified type. + * @return Source[] Array of \SimpleSAML\Auth\Source objects of the specified type. * @throws Exception If the authentication source is invalid. */ public static function getSourcesOfType($type) @@ -137,7 +137,7 @@ abstract class SimpleSAML_Auth_Source assert(is_array($state)); assert(array_key_exists('LoginCompletedHandler', $state)); - SimpleSAML_Auth_State::deleteState($state); + State::deleteState($state); $func = $state['LoginCompletedHandler']; assert(is_callable($func)); @@ -166,36 +166,36 @@ abstract class SimpleSAML_Auth_Source assert(is_string($errorURL) || $errorURL === null); $state = array_merge($params, array( - 'SimpleSAML_Auth_Default.id' => $this->authId, // TODO: remove in 2.0 - 'SimpleSAML_Auth_Source.id' => $this->authId, - 'SimpleSAML_Auth_Default.Return' => $return, // TODO: remove in 2.0 - 'SimpleSAML_Auth_Source.Return' => $return, - 'SimpleSAML_Auth_Default.ErrorURL' => $errorURL, // TODO: remove in 2.0 - 'SimpleSAML_Auth_Source.ErrorURL' => $errorURL, + '\SimpleSAML\Auth\DefaultAuth.id' => $this->authId, // TODO: remove in 2.0 + '\SimpleSAML\Auth\Source.id' => $this->authId, + '\SimpleSAML\Auth\DefaultAuth.Return' => $return, // TODO: remove in 2.0 + '\SimpleSAML\Auth\Source.Return' => $return, + '\SimpleSAML\Auth\DefaultAuth.ErrorURL' => $errorURL, // TODO: remove in 2.0 + '\SimpleSAML\Auth\Source.ErrorURL' => $errorURL, 'LoginCompletedHandler' => array(get_class(), 'loginCompleted'), 'LogoutCallback' => array(get_class(), 'logoutCallback'), 'LogoutCallbackState' => array( - 'SimpleSAML_Auth_Default.logoutSource' => $this->authId, // TODO: remove in 2.0 - 'SimpleSAML_Auth_Source.logoutSource' => $this->authId, + '\SimpleSAML\Auth\DefaultAuth.logoutSource' => $this->authId, // TODO: remove in 2.0 + '\SimpleSAML\Auth\Source.logoutSource' => $this->authId, ), )); if (is_string($return)) { - $state['SimpleSAML_Auth_Default.ReturnURL'] = $return; // TODO: remove in 2.0 - $state['SimpleSAML_Auth_Source.ReturnURL'] = $return; + $state['\SimpleSAML\Auth\DefaultAuth.ReturnURL'] = $return; // TODO: remove in 2.0 + $state['\SimpleSAML\Auth\Source.ReturnURL'] = $return; } if ($errorURL !== null) { - $state[SimpleSAML_Auth_State::EXCEPTION_HANDLER_URL] = $errorURL; + $state[State::EXCEPTION_HANDLER_URL] = $errorURL; } try { $this->authenticate($state); } catch (\SimpleSAML\Error\Exception $e) { - SimpleSAML_Auth_State::throwException($state, $e); - } catch (Exception $e) { + State::throwException($state, $e); + } catch (\Exception $e) { $e = new \SimpleSAML\Error\UnserializableException($e); - SimpleSAML_Auth_State::throwException($state, $e); + State::throwException($state, $e); } self::loginCompleted($state); } @@ -211,17 +211,17 @@ abstract class SimpleSAML_Auth_Source public static function loginCompleted($state) { assert(is_array($state)); - assert(array_key_exists('SimpleSAML_Auth_Source.Return', $state)); - assert(array_key_exists('SimpleSAML_Auth_Source.id', $state)); + assert(array_key_exists('\SimpleSAML\Auth\Source.Return', $state)); + assert(array_key_exists('\SimpleSAML\Auth\Source.id', $state)); assert(array_key_exists('Attributes', $state)); assert(!array_key_exists('LogoutState', $state) || is_array($state['LogoutState'])); - $return = $state['SimpleSAML_Auth_Source.Return']; + $return = $state['\SimpleSAML\Auth\Source.Return']; // save session state $session = \SimpleSAML\Session::getSessionFromRequest(); - $authId = $state['SimpleSAML_Auth_Source.id']; - $session->doLogin($authId, SimpleSAML_Auth_State::getPersistentAuthData($state)); + $authId = $state['\SimpleSAML\Auth\Source.id']; + $session->doLogin($authId, State::getPersistentAuthData($state)); if (is_string($return)) { // redirect... \SimpleSAML\Utils\HTTP::redirectTrustedURL($return); @@ -266,7 +266,7 @@ abstract class SimpleSAML_Auth_Source assert(is_array($state)); assert(array_key_exists('LogoutCompletedHandler', $state)); - SimpleSAML_Auth_State::deleteState($state); + State::deleteState($state); $func = $state['LogoutCompletedHandler']; assert(is_callable($func)); @@ -285,8 +285,8 @@ abstract class SimpleSAML_Auth_Source * @param string $authId The authentication source identifier. * @param array $config The configuration. * - * @return SimpleSAML_Auth_Source The parsed authentication source. - * @throws Exception If the authentication source is invalid. + * @return Source The parsed authentication source. + * @throws \Exception If the authentication source is invalid. */ private static function parseAuthSource($authId, $config) { @@ -303,14 +303,14 @@ abstract class SimpleSAML_Auth_Source try { // Check whether or not there's a factory responsible for instantiating our Auth Source instance - $factoryClass = SimpleSAML\Module::resolveClass($id, 'Auth_Source_Factory', 'SimpleSAML\Auth\SourceFactory'); + $factoryClass = \SimpleSAML\Module::resolveClass($id, 'Auth\Source\Factory', '\SimpleSAML\Auth\SourceFactory'); /** @var SourceFactory $factory */ $factory = new $factoryClass; $authSource = $factory->create($info, $config); - } catch (Exception $e) { + } catch (\Exception $e) { // If not, instantiate the Auth Source here - $className = SimpleSAML\Module::resolveClass($id, 'Auth_Source', 'SimpleSAML_Auth_Source'); + $className = \SimpleSAML\Module::resolveClass($id, 'Auth\Source', '\SimpleSAML\Auth\Source'); $authSource = new $className($info, $config); } @@ -332,7 +332,7 @@ abstract class SimpleSAML_Auth_Source * @param string $authId The authentication source identifier. * @param string|NULL $type The type of authentication source. If NULL, any type will be accepted. * - * @return SimpleSAML_Auth_Source|NULL The AuthSource object, or NULL if no authentication + * @return Source|NULL The AuthSource object, or NULL if no authentication * source with the given identifier is found. * @throws \SimpleSAML\Error\Exception If no such authentication source is found or it is invalid. */ @@ -378,13 +378,13 @@ abstract class SimpleSAML_Auth_Source public static function logoutCallback($state) { assert(is_array($state)); - assert(array_key_exists('SimpleSAML_Auth_Source.logoutSource', $state)); + assert(array_key_exists('\SimpleSAML\Auth\Source.logoutSource', $state)); - $source = $state['SimpleSAML_Auth_Source.logoutSource']; + $source = $state['\SimpleSAML\Auth\Source.logoutSource']; $session = \SimpleSAML\Session::getSessionFromRequest(); if (!$session->isValid($source)) { - SimpleSAML\Logger::warning( + \SimpleSAML\Logger::warning( 'Received logout from an invalid authentication source '. var_export($source, true) ); @@ -433,7 +433,7 @@ abstract class SimpleSAML_Auth_Source $session = \SimpleSAML\Session::getSessionFromRequest(); $session->setData( - 'SimpleSAML_Auth_Source.LogoutCallbacks', + '\SimpleSAML\Auth\Source.LogoutCallbacks', $id, $data, \SimpleSAML\Session::DATA_TIMEOUT_SESSION_END @@ -459,7 +459,7 @@ abstract class SimpleSAML_Auth_Source $session = \SimpleSAML\Session::getSessionFromRequest(); - $data = $session->getData('SimpleSAML_Auth_Source.LogoutCallbacks', $id); + $data = $session->getData('\SimpleSAML\Auth\Source.LogoutCallbacks', $id); if ($data === null) { // FIXME: fix for IdP-first flow (issue 397) -> reevaluate logout callback infrastructure $session->doLogout($this->authId); @@ -474,7 +474,7 @@ abstract class SimpleSAML_Auth_Source $callback = $data['callback']; $callbackState = $data['state']; - $session->deleteData('SimpleSAML_Auth_Source.LogoutCallbacks', $id); + $session->deleteData('\SimpleSAML\Auth\Source.LogoutCallbacks', $id); call_user_func($callback, $callbackState); } @@ -498,12 +498,12 @@ abstract class SimpleSAML_Auth_Source * @param array $source An array with the auth source configuration. * @param string $id The auth source identifier. * - * @throws Exception If the first element of $source is not an identifier for the auth source. + * @throws \Exception If the first element of $source is not an identifier for the auth source. */ protected static function validateSource($source, $id) { if (!array_key_exists(0, $source) || !is_string($source[0])) { - throw new Exception( + throw new \Exception( 'Invalid authentication source \''.$id. '\': First element must be a string which identifies the authentication source.' ); diff --git a/lib/SimpleSAML/Auth/SourceFactory.php b/lib/SimpleSAML/Auth/SourceFactory.php index 1cc6a6c9ae1f574399ec22fcc7582a60dd9a4a7e..9f5fdfafbeccf28ad2c37c1e18cb30844fea8055 100644 --- a/lib/SimpleSAML/Auth/SourceFactory.php +++ b/lib/SimpleSAML/Auth/SourceFactory.php @@ -2,14 +2,12 @@ namespace SimpleSAML\Auth; -use SimpleSAML_Auth_Source; - interface SourceFactory { /** * @param array $info * @param array $config - * @return SimpleSAML_Auth_Source + * @return Source */ public function create(array $info, array $config); } diff --git a/lib/SimpleSAML/Auth/State.php b/lib/SimpleSAML/Auth/State.php index f917698711b3edd3eed86b97949b4dcc01fab23a..44454b41ff6f379eea5f2eb782dbf6143b548f89 100644 --- a/lib/SimpleSAML/Auth/State.php +++ b/lib/SimpleSAML/Auth/State.php @@ -1,14 +1,16 @@ <?php +namespace SimpleSAML\Auth; + /** * This is a helper class for saving and loading state information. * * The state must be an associative array. This class will add additional keys to this - * array. These keys will always start with 'SimpleSAML_Auth_State.'. + * array. These keys will always start with '\SimpleSAML\Auth\State.'. * * It is also possible to add a restart URL to the state. If state information is lost, for * example because it timed out, or the user loaded a bookmarked page, the loadState function - * will redirect to this URL. To use this, set $state[SimpleSAML_Auth_State::RESTART] to this + * will redirect to this URL. To use this, set $state[\SimpleSAML\Auth\State::RESTART] to this * URL. * * Both the saveState and the loadState function takes in a $stage parameter. This parameter is @@ -27,61 +29,62 @@ * @author Olav Morken, UNINETT AS. * @package SimpleSAMLphp */ -class SimpleSAML_Auth_State + +class State { /** * The index in the state array which contains the identifier. */ - const ID = 'SimpleSAML_Auth_State.id'; + const ID = '\SimpleSAML\Auth\State.id'; /** * The index in the cloned state array which contains the identifier of the * original state. */ - const CLONE_ORIGINAL_ID = 'SimpleSAML_Auth_State.cloneOriginalId'; + const CLONE_ORIGINAL_ID = '\SimpleSAML\Auth\State.cloneOriginalId'; /** * The index in the state array which contains the current stage. */ - const STAGE = 'SimpleSAML_Auth_State.stage'; + const STAGE = '\SimpleSAML\Auth\State.stage'; /** * The index in the state array which contains the restart URL. */ - const RESTART = 'SimpleSAML_Auth_State.restartURL'; + const RESTART = '\SimpleSAML\Auth\State.restartURL'; /** * The index in the state array which contains the exception handler URL. */ - const EXCEPTION_HANDLER_URL = 'SimpleSAML_Auth_State.exceptionURL'; + const EXCEPTION_HANDLER_URL = '\SimpleSAML\Auth\State.exceptionURL'; /** * The index in the state array which contains the exception handler function. */ - const EXCEPTION_HANDLER_FUNC = 'SimpleSAML_Auth_State.exceptionFunc'; + const EXCEPTION_HANDLER_FUNC = '\SimpleSAML\Auth\State.exceptionFunc'; /** * The index in the state array which contains the exception data. */ - const EXCEPTION_DATA = 'SimpleSAML_Auth_State.exceptionData'; + const EXCEPTION_DATA = '\SimpleSAML\Auth\State.exceptionData'; /** * The stage of a state with an exception. */ - const EXCEPTION_STAGE = 'SimpleSAML_Auth_State.exceptionStage'; + const EXCEPTION_STAGE = '\SimpleSAML\Auth\State.exceptionStage'; /** * The URL parameter which contains the exception state id. */ - const EXCEPTION_PARAM = 'SimpleSAML_Auth_State_exceptionId'; + const EXCEPTION_PARAM = '\SimpleSAML\Auth\State.exceptionId'; /** @@ -145,7 +148,7 @@ class SimpleSAML_Auth_State assert(is_bool($rawId)); if (!array_key_exists(self::ID, $state)) { - $state[self::ID] = SimpleSAML\Utils\Random::generateID(); + $state[self::ID] = \SimpleSAML\Utils\Random::generateID(); } $id = $state[self::ID]; @@ -203,9 +206,9 @@ class SimpleSAML_Auth_State // Save state $serializedState = serialize($state); $session = \SimpleSAML\Session::getSessionFromRequest(); - $session->setData('SimpleSAML_Auth_State', $id, $serializedState, self::getStateTimeout()); + $session->setData('\SimpleSAML\Auth\State', $id, $serializedState, self::getStateTimeout()); - SimpleSAML\Logger::debug('Saved state: '.var_export($return, true)); + \SimpleSAML\Logger::debug('Saved state: '.var_export($return, true)); return $return; } @@ -228,9 +231,9 @@ class SimpleSAML_Auth_State $clonedState[self::CLONE_ORIGINAL_ID] = $state[self::ID]; unset($clonedState[self::ID]); - SimpleSAML\Logger::debug('Cloned state: '.var_export($state[self::ID], true)); + \SimpleSAML\Logger::debug('Cloned state: '.var_export($state[self::ID], true)); } else { - SimpleSAML\Logger::debug('Cloned state with undefined id.'); + \SimpleSAML\Logger::debug('Cloned state with undefined id.'); } return $clonedState; @@ -249,7 +252,7 @@ class SimpleSAML_Auth_State * @param bool $allowMissing Whether to allow the state to be missing. * * @throws \SimpleSAML\Error\NoState If we couldn't find the state and there's no URL defined to redirect to. - * @throws Exception If the stage of the state is invalid and there's no URL defined to redirect to. + * @throws \Exception If the stage of the state is invalid and there's no URL defined to redirect to. * * @return array|NULL State information, or null if the state is missing and $allowMissing is true. */ @@ -258,12 +261,12 @@ class SimpleSAML_Auth_State assert(is_string($id)); assert(is_string($stage)); assert(is_bool($allowMissing)); - SimpleSAML\Logger::debug('Loading state: '.var_export($id, true)); + \SimpleSAML\Logger::debug('Loading state: '.var_export($id, true)); $sid = self::parseStateID($id); $session = \SimpleSAML\Session::getSessionFromRequest(); - $state = $session->getData('SimpleSAML_Auth_State', $sid['id']); + $state = $session->getData('\SimpleSAML\Auth\State', $sid['id']); if ($state === null) { // Could not find saved data @@ -293,10 +296,10 @@ class SimpleSAML_Auth_State $msg = 'Wrong stage in state. Was \''.$state[self::STAGE]. '\', should be \''.$stage.'\'.'; - SimpleSAML\Logger::warning($msg); + \SimpleSAML\Logger::warning($msg); if ($sid['url'] === null) { - throw new Exception($msg); + throw new \Exception($msg); } \SimpleSAML\Utils\HTTP::redirectUntrustedURL($sid['url']); @@ -322,10 +325,10 @@ class SimpleSAML_Auth_State return; } - SimpleSAML\Logger::debug('Deleting state: '.var_export($state[self::ID], true)); + \SimpleSAML\Logger::debug('Deleting state: '.var_export($state[self::ID], true)); $session = \SimpleSAML\Session::getSessionFromRequest(); - $session->deleteData('SimpleSAML_Auth_State', $state[self::ID]); + $session->deleteData('\SimpleSAML\Auth\State', $state[self::ID]); } diff --git a/lib/SimpleSAML/Auth/TimeLimitedToken.php b/lib/SimpleSAML/Auth/TimeLimitedToken.php index 920dd2d1269d0ae452f5910fa358ba77e23c8ab7..eb6620d5ec039213f25ba8acee90b7a8b9350a48 100644 --- a/lib/SimpleSAML/Auth/TimeLimitedToken.php +++ b/lib/SimpleSAML/Auth/TimeLimitedToken.php @@ -5,9 +5,9 @@ namespace SimpleSAML\Auth; /** * A class that generates and verifies time-limited tokens. */ + class TimeLimitedToken { - /** * @var string */ diff --git a/lib/SimpleSAML/AuthMemCookie.php b/lib/SimpleSAML/AuthMemCookie.php index 958952041854c93cb5f33e343d05ab3c778bba3d..1c5fb7c967a09684789ee93fd52a59501f4fb564 100644 --- a/lib/SimpleSAML/AuthMemCookie.php +++ b/lib/SimpleSAML/AuthMemCookie.php @@ -110,15 +110,15 @@ class AuthMemCookie /** * This function creates and initializes a Memcache object from our configuration. * - * @return Memcache A Memcache object initialized from our configuration. - * @throws Exception If the servers configuration is invalid. + * @return \Memcache A Memcache object initialized from our configuration. + * @throws \Exception If the servers configuration is invalid. */ public function getMemcache() { $memcacheHost = $this->amcConfig->getString('memcache.host', '127.0.0.1'); $memcachePort = $this->amcConfig->getInteger('memcache.port', 11211); - $class = class_exists('Memcache') ? 'Memcache' : (class_exists('Memcached') ? 'Memcached' : false); + $class = class_exists('Memcache') ? '\Memcache' : (class_exists('Memcached') ? '\Memcached' : false); if (!$class) { throw new \Exception('Missing Memcached implementation. You must install either the Memcache or Memcached extension.'); } diff --git a/lib/SimpleSAML/Error/UnserializableException.php b/lib/SimpleSAML/Error/UnserializableException.php index 38cf79e944cf657d745b9d82e2fc3fa4a0b65288..515b46091f87cd151085b6ce2a8e60882cf92f2d 100644 --- a/lib/SimpleSAML/Error/UnserializableException.php +++ b/lib/SimpleSAML/Error/UnserializableException.php @@ -5,7 +5,7 @@ namespace SimpleSAML\Error; /** * Class for saving normal exceptions for serialization. * - * This class is used by the SimpleSAML_Auth_State class when it needs + * This class is used by the \SimpleSAML\Auth\State class when it needs * to serialize an exception which doesn't subclass the * \SimpleSAML\Error\Exception class. * diff --git a/lib/SimpleSAML/IdP.php b/lib/SimpleSAML/IdP.php index 6edfc85bbdccd247c7b6de97be6d5e86ab357a5c..8089ad0749e9e149bca9e6fabeaa03e98f49ae37 100644 --- a/lib/SimpleSAML/IdP.php +++ b/lib/SimpleSAML/IdP.php @@ -95,7 +95,7 @@ class SimpleSAML_IdP } $auth = $this->config->getString('auth'); - if (SimpleSAML_Auth_Source::getById($auth) !== null) { + if (\SimpleSAML\Auth\Source::getById($auth) !== null) { $this->authSource = new \SimpleSAML\Auth\Simple($auth); } else { throw new \SimpleSAML\Error\Exception('No such "'.$auth.'" auth source found.'); @@ -315,7 +315,7 @@ class SimpleSAML_IdP $idpMetadata = $idp->getConfig()->toArray(); - $pc = new SimpleSAML_Auth_ProcessingChain($idpMetadata, $spMetadata, 'idp'); + $pc = new \SimpleSAML\Auth\ProcessingChain($idpMetadata, $spMetadata, 'idp'); $state['ReturnCall'] = array('SimpleSAML_IdP', 'postAuthProc'); $state['Destination'] = $spMetadata; @@ -409,10 +409,10 @@ class SimpleSAML_IdP } $this->postAuth($state); } catch (\SimpleSAML\Error\Exception $e) { - SimpleSAML_Auth_State::throwException($state, $e); + \SimpleSAML\Auth\State::throwException($state, $e); } catch (Exception $e) { $e = new \SimpleSAML\Error\UnserializableException($e); - SimpleSAML_Auth_State::throwException($state, $e); + \SimpleSAML\Auth\State::throwException($state, $e); } } @@ -484,8 +484,8 @@ class SimpleSAML_IdP } // terminate the local session - $id = SimpleSAML_Auth_State::saveState($state, 'core:Logout:afterbridge'); - $returnTo = SimpleSAML\Module::getModuleURL('core/idp/resumelogout.php', array('id' => $id)); + $id = \SimpleSAML\Auth\State::saveState($state, 'core:Logout:afterbridge'); + $returnTo = \SimpleSAML\Module::getModuleURL('core/idp/resumelogout.php', array('id' => $id)); $this->authSource->logout($returnTo); diff --git a/lib/SimpleSAML/IdP/IFrameLogoutHandler.php b/lib/SimpleSAML/IdP/IFrameLogoutHandler.php index 2761214f831ca12cfeacde26676d614caf70328e..af9aebbdd2caa5e44bef065eaa1eab22cb562cf4 100644 --- a/lib/SimpleSAML/IdP/IFrameLogoutHandler.php +++ b/lib/SimpleSAML/IdP/IFrameLogoutHandler.php @@ -66,7 +66,7 @@ class IFrameLogoutHandler implements LogoutHandlerInterface } $params = array( - 'id' => \SimpleSAML_Auth_State::saveState($state, 'core:Logout-IFrame'), + 'id' => \SimpleSAML\Auth\State::saveState($state, 'core:Logout-IFrame'), ); if (isset($state['core:Logout-IFrame:InitType'])) { $params['type'] = $state['core:Logout-IFrame:InitType']; diff --git a/lib/SimpleSAML/IdP/TraditionalLogoutHandler.php b/lib/SimpleSAML/IdP/TraditionalLogoutHandler.php index f8f5cc8eaae748a415b1abaecd113ecaf2c9e827..eb8d0ec6af692f4238c0f7b6d841401715d4f83f 100644 --- a/lib/SimpleSAML/IdP/TraditionalLogoutHandler.php +++ b/lib/SimpleSAML/IdP/TraditionalLogoutHandler.php @@ -46,7 +46,7 @@ class TraditionalLogoutHandler implements LogoutHandlerInterface $this->idp->finishLogout($state); } - $relayState = \SimpleSAML_Auth_State::saveState($state, 'core:LogoutTraditional', true); + $relayState = \SimpleSAML\Auth\State::saveState($state, 'core:LogoutTraditional', true); $id = $association['id']; Logger::info('Logging out of '.var_export($id, true).'.'); @@ -103,7 +103,7 @@ class TraditionalLogoutHandler implements LogoutHandlerInterface throw new \SimpleSAML\Error\Exception('RelayState lost during logout.'); } - $state = \SimpleSAML_Auth_State::loadState($relayState, 'core:LogoutTraditional'); + $state = \SimpleSAML\Auth\State::loadState($relayState, 'core:LogoutTraditional'); if ($error === null) { Logger::info('Logged out of '.var_export($assocId, true).'.'); diff --git a/lib/SimpleSAML/Utilities.php b/lib/SimpleSAML/Utilities.php index e72ba17900866fe6ea0eb22f5c970e2f1dc2b6db..2189449ffc04bc11d182e14a45f4d96a69f999fc 100644 --- a/lib/SimpleSAML/Utilities.php +++ b/lib/SimpleSAML/Utilities.php @@ -111,11 +111,11 @@ class SimpleSAML_Utilities /** - * @deprecated This method will be removed in SSP 2.0. Please use SimpleSAML_Auth_State::parseStateID() instead. + * @deprecated This method will be removed in SSP 2.0. Please use \SimpleSAML\Auth\State::parseStateID() instead. */ public static function parseStateID($stateId) { - return SimpleSAML_Auth_State::parseStateID($stateId); + return \SimpleSAML\Auth\State::parseStateID($stateId); } diff --git a/lib/SimpleSAML/Utils/Auth.php b/lib/SimpleSAML/Utils/Auth.php index d938c3108799f28293e8841943e3748ffad78794..ad6c4df4b06a05fc40fbefbcffd95dd036c760fd 100644 --- a/lib/SimpleSAML/Utils/Auth.php +++ b/lib/SimpleSAML/Utils/Auth.php @@ -63,7 +63,7 @@ class Auth } // not authenticated as admin user, start authentication - if (\SimpleSAML_Auth_Source::getById('admin') !== null) { + if (\SimpleSAML\Auth\Source::getById('admin') !== null) { $as = new \SimpleSAML\Auth\Simple('admin'); $as->login(); } else { diff --git a/modules/authX509/lib/Auth/Process/ExpiryWarning.php b/modules/authX509/lib/Auth/Process/ExpiryWarning.php index 0a6fe5bf9bb48df307d7baa78ff918c83762f179..8e0972429b012a2e82ad5110e7517e4eb9e87ea4 100644 --- a/modules/authX509/lib/Auth/Process/ExpiryWarning.php +++ b/modules/authX509/lib/Auth/Process/ExpiryWarning.php @@ -14,7 +14,7 @@ * @author Joost van Dijk, SURFnet. <Joost.vanDijk@surfnet.nl> * @package SimpleSAMLphp */ -class sspmod_authX509_Auth_Process_ExpiryWarning extends SimpleSAML_Auth_ProcessingFilter +class sspmod_authX509_Auth_Process_ExpiryWarning extends \SimpleSAML\Auth\ProcessingFilter { private $warndaysbefore = 30; @@ -83,13 +83,13 @@ class sspmod_authX509_Auth_Process_ExpiryWarning extends SimpleSAML_Auth_Process return; } - SimpleSAML\Logger::warning('authX509: user certificate expires in ' . $daysleft . ' days'); + \SimpleSAML\Logger::warning('authX509: user certificate expires in ' . $daysleft . ' days'); $state['daysleft'] = $daysleft; $state['renewurl'] = $this->renewurl; /* Save state and redirect. */ - $id = SimpleSAML_Auth_State::saveState($state, 'warning:expire'); - $url = SimpleSAML\Module::getModuleURL('authX509/expirywarning.php'); + $id = \SimpleSAML\Auth\State::saveState($state, 'warning:expire'); + $url = \SimpleSAML\Module::getModuleURL('authX509/expirywarning.php'); \SimpleSAML\Utils\HTTP::redirectTrustedURL($url, array('StateId' => $id)); } diff --git a/modules/authX509/lib/Auth/Source/X509userCert.php b/modules/authX509/lib/Auth/Source/X509userCert.php index 49860c2c6ae62ae4220775750b74a414b0bbb235..2dc74bc77baccf6d0704fc82543211bd0d1d4ed2 100644 --- a/modules/authX509/lib/Auth/Source/X509userCert.php +++ b/modules/authX509/lib/Auth/Source/X509userCert.php @@ -7,7 +7,7 @@ * @package SimpleSAMLphp */ -class sspmod_authX509_Auth_Source_X509userCert extends SimpleSAML_Auth_Source +class sspmod_authX509_Auth_Source_X509userCert extends \SimpleSAML\Auth\Source { /** * x509 attributes to use from the certificate for searching the user in the LDAP directory. @@ -198,7 +198,7 @@ class sspmod_authX509_Auth_Source_X509userCert extends SimpleSAML_Auth_Source */ public function authSuccesful(&$state) { - SimpleSAML_Auth_Source::completeAuth($state); + \SimpleSAML\Auth\Source::completeAuth($state); assert(false); // should never be reached return; diff --git a/modules/authX509/www/expirywarning.php b/modules/authX509/www/expirywarning.php index d7861254ef45dee26d2f31696ed9386c7cc505c9..b5b445ca186e634a5654dfdd6bed6d39afabce7e 100644 --- a/modules/authX509/www/expirywarning.php +++ b/modules/authX509/www/expirywarning.php @@ -12,12 +12,12 @@ if (!array_key_exists('StateId', $_REQUEST)) { throw new \SimpleSAML\Error\BadRequest('Missing required StateId query parameter.'); } $id = $_REQUEST['StateId']; -$state = \SimpleSAML_Auth_State::loadState($id, 'warning:expire'); +$state = \SimpleSAML\Auth\State::loadState($id, 'warning:expire'); if (array_key_exists('proceed', $_REQUEST)) { // The user has pressed the proceed-button - \SimpleSAML_Auth_ProcessingChain::resumeProcessing($state); + \SimpleSAML\Auth\ProcessingChain::resumeProcessing($state); } $globalConfig = \SimpleSAML\Configuration::getInstance(); diff --git a/modules/authYubiKey/lib/Auth/Process/OTP2YubiPrefix.php b/modules/authYubiKey/lib/Auth/Process/OTP2YubiPrefix.php index 1c37c8c03fd2527705ed7500af698b65949daf51..a3d2ad4090f4ab6a17a88387219c76dafb2166db 100644 --- a/modules/authYubiKey/lib/Auth/Process/OTP2YubiPrefix.php +++ b/modules/authYubiKey/lib/Auth/Process/OTP2YubiPrefix.php @@ -42,7 +42,7 @@ * ); * */ -class sspmod_authYubiKey_Auth_Process_OTP2YubiPrefix extends SimpleSAML_Auth_ProcessingFilter { +class sspmod_authYubiKey_Auth_Process_OTP2YubiPrefix extends \SimpleSAML\Auth\ProcessingFilter { /** diff --git a/modules/authYubiKey/lib/Auth/Source/YubiKey.php b/modules/authYubiKey/lib/Auth/Source/YubiKey.php index 1bdd98dd499b0a55b4b3d9f0a799245ed14e6cb2..fdfddf30942ad445e059d7e1a2e4cbdc205a6553 100644 --- a/modules/authYubiKey/lib/Auth/Source/YubiKey.php +++ b/modules/authYubiKey/lib/Auth/Source/YubiKey.php @@ -40,7 +40,7 @@ * @package SimpleSAMLphp */ -class sspmod_authYubiKey_Auth_Source_YubiKey extends SimpleSAML_Auth_Source +class sspmod_authYubiKey_Auth_Source_YubiKey extends \SimpleSAML\Auth\Source { /** * The string used to identify our states. @@ -103,7 +103,7 @@ class sspmod_authYubiKey_Auth_Source_YubiKey extends SimpleSAML_Auth_Source // We are going to need the authId in order to retrieve this authentication source later $state[self::AUTHID] = $this->authId; - $id = \SimpleSAML_Auth_State::saveState($state, self::STAGEID); + $id = \SimpleSAML\Auth\State::saveState($state, self::STAGEID); $url = \SimpleSAML\Module::getModuleURL('authYubiKey/yubikeylogin.php'); \SimpleSAML\Utils\HTTP::redirectTrustedURL($url, array('AuthState' => $id)); } @@ -127,11 +127,11 @@ class sspmod_authYubiKey_Auth_Source_YubiKey extends SimpleSAML_Auth_Source assert(is_string($otp)); /* Retrieve the authentication state. */ - $state = \SimpleSAML_Auth_State::loadState($authStateId, self::STAGEID); + $state = \SimpleSAML\Auth\State::loadState($authStateId, self::STAGEID); /* Find authentication source. */ assert(array_key_exists(self::AUTHID, $state)); - $source = \SimpleSAML_Auth_Source::getById($state[self::AUTHID]); + $source = \SimpleSAML\Auth\Source::getById($state[self::AUTHID]); if ($source === null) { throw new Exception('Could not find authentication source with id '.$state[self::AUTHID]); } @@ -155,7 +155,7 @@ class sspmod_authYubiKey_Auth_Source_YubiKey extends SimpleSAML_Auth_Source } $state['Attributes'] = $attributes; - \SimpleSAML_Auth_Source::completeAuth($state); + \SimpleSAML\Auth\Source::completeAuth($state); } /** diff --git a/modules/authfacebook/lib/Auth/Source/Facebook.php b/modules/authfacebook/lib/Auth/Source/Facebook.php index 179b3b26942175a364c88168bea77de089927f06..aeaff9cb0977a2678540b58d0ea01fb756f38207 100644 --- a/modules/authfacebook/lib/Auth/Source/Facebook.php +++ b/modules/authfacebook/lib/Auth/Source/Facebook.php @@ -6,9 +6,9 @@ * @author Andreas Åkre Solberg, UNINETT AS. * @package SimpleSAMLphp */ -class sspmod_authfacebook_Auth_Source_Facebook extends SimpleSAML_Auth_Source { - +class sspmod_authfacebook_Auth_Source_Facebook extends \SimpleSAML\Auth\Source +{ /** * The string used to identify our states. */ @@ -86,14 +86,14 @@ class sspmod_authfacebook_Auth_Source_Facebook extends SimpleSAML_Auth_Source { // We are going to need the authId in order to retrieve this authentication source later $state[self::AUTHID] = $this->authId; - SimpleSAML_Auth_State::saveState($state, self::STAGE_INIT); + \SimpleSAML\Auth\State::saveState($state, self::STAGE_INIT); $facebook = new sspmod_authfacebook_Facebook(array('appId' => $this->api_key, 'secret' => $this->secret), $state); $facebook->destroySession(); - $linkback = SimpleSAML\Module::getModuleURL('authfacebook/linkback.php'); + $linkback = \SimpleSAML\Module::getModuleURL('authfacebook/linkback.php'); $url = $facebook->getLoginUrl(array('redirect_uri' => $linkback, 'scope' => $this->req_perms)); - SimpleSAML_Auth_State::saveState($state, self::STAGE_INIT); + \SimpleSAML\Auth\State::saveState($state, self::STAGE_INIT); \SimpleSAML\Utils\HTTP::redirectTrustedURL($url); } diff --git a/modules/authfacebook/lib/Facebook.php b/modules/authfacebook/lib/Facebook.php index 42153933c2fb2a23ca526067514a7ecbb1ceedf6..c64eb5b73fd986f9e0ec17c0a106b7a28cec4290 100644 --- a/modules/authfacebook/lib/Facebook.php +++ b/modules/authfacebook/lib/Facebook.php @@ -149,7 +149,7 @@ class sspmod_authfacebook_Facebook extends BaseFacebook protected function establishCSRFTokenState() { if ($this->state === null) { - $this->state = SimpleSAML_Auth_State::getStateId($this->ssp_state); + $this->state = \SimpleSAML\Auth\State::getStateId($this->ssp_state); $this->setPersistentData('state', $this->state); } } diff --git a/modules/authfacebook/www/linkback.php b/modules/authfacebook/www/linkback.php index bf1ee49e10e036d2fe953985f02d9b1496cc8c6e..b440bc46d93ef732e7011fee08c03d22c7369e98 100644 --- a/modules/authfacebook/www/linkback.php +++ b/modules/authfacebook/www/linkback.php @@ -6,34 +6,34 @@ // For backwards compatability look for AuthState first if (array_key_exists('AuthState', $_REQUEST) && !empty($_REQUEST['AuthState'])) { - $state = SimpleSAML_Auth_State::loadState($_REQUEST['AuthState'], sspmod_authfacebook_Auth_Source_Facebook::STAGE_INIT); + $state = \SimpleSAML\Auth\State::loadState($_REQUEST['AuthState'], sspmod_authfacebook_Auth_Source_Facebook::STAGE_INIT); } elseif (array_key_exists('state', $_REQUEST) && !empty($_REQUEST['state'])) { - $state = SimpleSAML_Auth_State::loadState($_REQUEST['state'], sspmod_authfacebook_Auth_Source_Facebook::STAGE_INIT); + $state = \SimpleSAML\Auth\State::loadState($_REQUEST['state'], sspmod_authfacebook_Auth_Source_Facebook::STAGE_INIT); } else { throw new \SimpleSAML\Error\BadRequest('Missing state parameter on facebook linkback endpoint.'); } // Find authentication source if (!array_key_exists(sspmod_authfacebook_Auth_Source_Facebook::AUTHID, $state)) { - throw new \SimpleSAML\Error\BadRequest('No data in state for ' . sspmod_authfacebook_Auth_Source_Facebook::AUTHID); + throw new \SimpleSAML\Error\BadRequest('No data in state for ' . sspmod_authfacebook_Auth_Source_Facebook::AUTHID); } $sourceId = $state[sspmod_authfacebook_Auth_Source_Facebook::AUTHID]; -$source = SimpleSAML_Auth_Source::getById($sourceId); -if ($source === NULL) { - throw new \SimpleSAML\Error\BadRequest('Could not find authentication source with id ' . var_export($sourceId, TRUE)); +$source = \SimpleSAML\Auth\Source::getById($sourceId); +if ($source === null) { + throw new \SimpleSAML\Error\BadRequest('Could not find authentication source with id ' . var_export($sourceId, TRUE)); } try { - if (isset($_REQUEST['error_reason']) && $_REQUEST['error_reason'] == 'user_denied') { - throw new \SimpleSAML\Error\UserAborted(); - } + if (isset($_REQUEST['error_reason']) && $_REQUEST['error_reason'] == 'user_denied') { + throw new \SimpleSAML\Error\UserAborted(); + } - $source->finalStep($state); + $source->finalStep($state); } catch (\SimpleSAML\Error\Exception $e) { - SimpleSAML_Auth_State::throwException($state, $e); -} catch (Exception $e) { - SimpleSAML_Auth_State::throwException($state, new \SimpleSAML\Error\AuthSource($sourceId, 'Error on facebook linkback endpoint.', $e)); + \SimpleSAML\Auth\State::throwException($state, $e); +} catch (\Exception $e) { + \SimpleSAML\Auth\State::throwException($state, new \SimpleSAML\Error\AuthSource($sourceId, 'Error on facebook linkback endpoint.', $e)); } -SimpleSAML_Auth_Source::completeAuth($state); +\SimpleSAML\Auth\Source::completeAuth($state); diff --git a/modules/authlinkedin/lib/Auth/Source/LinkedIn.php b/modules/authlinkedin/lib/Auth/Source/LinkedIn.php index ff961df0c66492fe1d03c0ed10ceedb7f350aa16..c6bebd095b429b0fd835e545d939094560ba99a8 100644 --- a/modules/authlinkedin/lib/Auth/Source/LinkedIn.php +++ b/modules/authlinkedin/lib/Auth/Source/LinkedIn.php @@ -8,7 +8,7 @@ require_once(dirname(dirname(dirname(dirname(dirname(__FILE__))))) . '/oauth/lib * @author Brook Schofield, TERENA. * @package SimpleSAMLphp */ -class sspmod_authlinkedin_Auth_Source_LinkedIn extends SimpleSAML_Auth_Source +class sspmod_authlinkedin_Auth_Source_LinkedIn extends \SimpleSAML\Auth\Source { /** @@ -72,7 +72,7 @@ class sspmod_authlinkedin_Auth_Source_LinkedIn extends SimpleSAML_Auth_Source // We are going to need the authId in order to retrieve this authentication source later $state[self::AUTHID] = $this->authId; - $stateID = SimpleSAML_Auth_State::getStateId($state); + $stateID = \SimpleSAML\Auth\State::getStateId($state); SimpleSAML\Logger::debug('authlinkedin auth state id = ' . $stateID); $consumer = new sspmod_oauth_Consumer($this->key, $this->secret); @@ -91,7 +91,7 @@ class sspmod_authlinkedin_Auth_Source_LinkedIn extends SimpleSAML_Auth_Source $state['authlinkedin:requestToken'] = $requestToken; // Update the state - SimpleSAML_Auth_State::saveState($state, self::STAGE_INIT); + \SimpleSAML\Auth\State::saveState($state, self::STAGE_INIT); // Authorize the request token $consumer->getAuthorizeRequest('https://www.linkedin.com/uas/oauth/authenticate', $requestToken); diff --git a/modules/authlinkedin/www/linkback.php b/modules/authlinkedin/www/linkback.php index ee6731f1e71330d96bae7d76f17af941596087d4..e4694e7553d505bbe9da7d9269b59f7696f9067e 100644 --- a/modules/authlinkedin/www/linkback.php +++ b/modules/authlinkedin/www/linkback.php @@ -5,27 +5,27 @@ */ if (!array_key_exists('stateid', $_REQUEST)) { - throw new Exception('Lost OAuth Client State'); + throw new \Exception('Lost OAuth Client State'); } -$state = SimpleSAML_Auth_State::loadState($_REQUEST['stateid'], sspmod_authlinkedin_Auth_Source_LinkedIn::STAGE_INIT); +$state = \SimpleSAML\Auth\State::loadState($_REQUEST['stateid'], sspmod_authlinkedin_Auth_Source_LinkedIn::STAGE_INIT); // http://developer.linkedin.com/docs/DOC-1008#2_Redirect_the_User_to_our_Authorization_Server if (array_key_exists('oauth_verifier', $_REQUEST)) { - $state['authlinkedin:oauth_verifier'] = $_REQUEST['oauth_verifier']; + $state['authlinkedin:oauth_verifier'] = $_REQUEST['oauth_verifier']; } else { - throw new Exception('OAuth verifier not returned.');; + throw new Exception('OAuth verifier not returned.');; } // Find authentication source assert(array_key_exists(sspmod_authlinkedin_Auth_Source_LinkedIn::AUTHID, $state)); $sourceId = $state[sspmod_authlinkedin_Auth_Source_LinkedIn::AUTHID]; -$source = SimpleSAML_Auth_Source::getById($sourceId); -if ($source === NULL) { - throw new Exception('Could not find authentication source with id ' . $sourceId); +$source = \SimpleSAML\Auth\Source::getById($sourceId); +if ($source === null) { + throw new \Exception('Could not find authentication source with id ' . $sourceId); } $source->finalStep($state); -SimpleSAML_Auth_Source::completeAuth($state); +\SimpleSAML\Auth\Source::completeAuth($state); diff --git a/modules/authorize/lib/Auth/Process/Authorize.php b/modules/authorize/lib/Auth/Process/Authorize.php index 68c5ad009f1f712359baf7878934847593e032af..15127f7762f6dd64b38a5d1b7a55491d1d29e6f9 100644 --- a/modules/authorize/lib/Auth/Process/Authorize.php +++ b/modules/authorize/lib/Auth/Process/Authorize.php @@ -7,7 +7,7 @@ * @author Ernesto Revilla, Yaco Sistemas SL., Ryan Panning * @package SimpleSAMLphp */ -class sspmod_authorize_Auth_Process_Authorize extends SimpleSAML_Auth_ProcessingFilter { +class sspmod_authorize_Auth_Process_Authorize extends \SimpleSAML\Auth\ProcessingFilter { /** * Flag to deny/unauthorize the user a attribute filter IS found @@ -124,9 +124,9 @@ class sspmod_authorize_Auth_Process_Authorize extends SimpleSAML_Auth_Processing */ protected function unauthorized(&$request) { // Save state and redirect to 403 page - $id = SimpleSAML_Auth_State::saveState($request, + $id = \SimpleSAML\Auth\State::saveState($request, 'authorize:Authorize'); - $url = SimpleSAML\Module::getModuleURL( + $url = \SimpleSAML\Module::getModuleURL( 'authorize/authorize_403.php'); \SimpleSAML\Utils\HTTP::redirectTrustedURL($url, array('StateId' => $id)); } diff --git a/modules/authorize/www/authorize_403.php b/modules/authorize/www/authorize_403.php index cf352e77e46c6cabdc58499490fc6d29167068fc..158fe11a9bffdf51348937aa09427d8a77238e00 100644 --- a/modules/authorize/www/authorize_403.php +++ b/modules/authorize/www/authorize_403.php @@ -8,7 +8,7 @@ if (!array_key_exists('StateId', $_REQUEST)) { throw new \SimpleSAML\Error\BadRequest('Missing required StateId query parameter.'); } -$state = \SimpleSAML_Auth_State::loadState($_REQUEST['StateId'], 'authorize:Authorize'); +$state = \SimpleSAML\Auth\State::loadState($_REQUEST['StateId'], 'authorize:Authorize'); $globalConfig = \SimpleSAML\Configuration::getInstance(); $t = new \SimpleSAML\XHTML\Template($globalConfig, 'authorize:authorize_403.php'); diff --git a/modules/authtwitter/lib/Auth/Source/Twitter.php b/modules/authtwitter/lib/Auth/Source/Twitter.php index 9278f0eff28808b24b044157ede6a56a50787a9f..d58a7c5307d6c50b4d8443857ef68d67de316e6d 100644 --- a/modules/authtwitter/lib/Auth/Source/Twitter.php +++ b/modules/authtwitter/lib/Auth/Source/Twitter.php @@ -8,7 +8,7 @@ require_once(dirname(dirname(dirname(dirname(dirname(__FILE__))))) . '/oauth/lib * @author Andreas Åkre Solberg, UNINETT AS. * @package SimpleSAMLphp */ -class sspmod_authtwitter_Auth_Source_Twitter extends SimpleSAML_Auth_Source +class sspmod_authtwitter_Auth_Source_Twitter extends \SimpleSAML\Auth\Source { /** * The string used to identify our states. @@ -75,7 +75,7 @@ class sspmod_authtwitter_Auth_Source_Twitter extends SimpleSAML_Auth_Source // We are going to need the authId in order to retrieve this authentication source later $state[self::AUTHID] = $this->authId; - $stateID = SimpleSAML_Auth_State::saveState($state, self::STAGE_INIT); + $stateID = \SimpleSAML\Auth\State::saveState($state, self::STAGE_INIT); $consumer = new sspmod_oauth_Consumer($this->key, $this->secret); // Get the request token @@ -85,7 +85,7 @@ class sspmod_authtwitter_Auth_Source_Twitter extends SimpleSAML_Auth_Source $requestToken->key . "] with the secret [" . $requestToken->secret . "]"); $state['authtwitter:authdata:requestToken'] = $requestToken; - SimpleSAML_Auth_State::saveState($state, self::STAGE_INIT); + \SimpleSAML\Auth\State::saveState($state, self::STAGE_INIT); // Authorize the request token $url = 'https://api.twitter.com/oauth/authenticate'; diff --git a/modules/authtwitter/www/linkback.php b/modules/authtwitter/www/linkback.php index a616e4a9d7e511c16db65ead6f171bc4d1900787..d24408ebe06dc7b7de88dc8b6d0797002c2f651c 100644 --- a/modules/authtwitter/www/linkback.php +++ b/modules/authtwitter/www/linkback.php @@ -5,31 +5,31 @@ */ if (!array_key_exists('AuthState', $_REQUEST) || empty($_REQUEST['AuthState'])) { - throw new \SimpleSAML\Error\BadRequest('Missing state parameter on twitter linkback endpoint.'); + throw new \SimpleSAML\Error\BadRequest('Missing state parameter on twitter linkback endpoint.'); } -$state = SimpleSAML_Auth_State::loadState($_REQUEST['AuthState'], sspmod_authtwitter_Auth_Source_Twitter::STAGE_INIT); +$state = \SimpleSAML\Auth\State::loadState($_REQUEST['AuthState'], sspmod_authtwitter_Auth_Source_Twitter::STAGE_INIT); // Find authentication source if (!array_key_exists(sspmod_authtwitter_Auth_Source_Twitter::AUTHID, $state)) { - throw new \SimpleSAML\Error\BadRequest('No data in state for ' . sspmod_authtwitter_Auth_Source_Twitter::AUTHID); + throw new \SimpleSAML\Error\BadRequest('No data in state for ' . sspmod_authtwitter_Auth_Source_Twitter::AUTHID); } $sourceId = $state[sspmod_authtwitter_Auth_Source_Twitter::AUTHID]; -$source = SimpleSAML_Auth_Source::getById($sourceId); -if ($source === NULL) { - throw new \SimpleSAML\Error\BadRequest('Could not find authentication source with id ' . var_export($sourceId, TRUE)); +$source = \SimpleSAML\Auth\Source::getById($sourceId); +if ($source === null) { + throw new \SimpleSAML\Error\BadRequest('Could not find authentication source with id ' . var_export($sourceId, TRUE)); } try { - if (array_key_exists('denied', $_REQUEST)) { - throw new \SimpleSAML\Error\UserAborted(); - } + if (array_key_exists('denied', $_REQUEST)) { + throw new \SimpleSAML\Error\UserAborted(); + } - $source->finalStep($state); + $source->finalStep($state); } catch (\SimpleSAML\Error\Exception $e) { - SimpleSAML_Auth_State::throwException($state, $e); -} catch (Exception $e) { - SimpleSAML_Auth_State::throwException($state, new \SimpleSAML\Error\AuthSource($sourceId, 'Error on authtwitter linkback endpoint.', $e)); + \SimpleSAML\Auth\State::throwException($state, $e); +} catch (\Exception $e) { + \SimpleSAML\Auth\State::throwException($state, new \SimpleSAML\Error\AuthSource($sourceId, 'Error on authtwitter linkback endpoint.', $e)); } -SimpleSAML_Auth_Source::completeAuth($state); +\SimpleSAML\Auth\Source::completeAuth($state); diff --git a/modules/authwindowslive/lib/Auth/Source/LiveID.php b/modules/authwindowslive/lib/Auth/Source/LiveID.php index 39fbfd1595f1762391885cd0b8adf0a80db6d4a4..1e3ef204550bfc3d4488461d6cfeb065de3c93f4 100644 --- a/modules/authwindowslive/lib/Auth/Source/LiveID.php +++ b/modules/authwindowslive/lib/Auth/Source/LiveID.php @@ -7,7 +7,7 @@ * @author Guy Halse, TENET. * @package SimpleSAMLphp */ -class sspmod_authwindowslive_Auth_Source_LiveID extends SimpleSAML_Auth_Source +class sspmod_authwindowslive_Auth_Source_LiveID extends \SimpleSAML\Auth\Source { /** @@ -66,7 +66,7 @@ class sspmod_authwindowslive_Auth_Source_LiveID extends SimpleSAML_Auth_Source // we are going to need the authId in order to retrieve this authentication source later $state[self::AUTHID] = $this->authId; - $stateID = SimpleSAML_Auth_State::saveState($state, self::STAGE_INIT); + $stateID = \SimpleSAML\Auth\State::saveState($state, self::STAGE_INIT); SimpleSAML\Logger::debug('authwindowslive auth state id = ' . $stateID); diff --git a/modules/authwindowslive/www/linkback.php b/modules/authwindowslive/www/linkback.php index a002e22e4d49cef4a6c781cac15a3e806565cc83..8b407d7ac13d1c4bad1fcfbd504d7c94940fe44c 100644 --- a/modules/authwindowslive/www/linkback.php +++ b/modules/authwindowslive/www/linkback.php @@ -5,9 +5,9 @@ */ if (!array_key_exists('state', $_REQUEST)) { - throw new Exception('Lost OAuth Client State'); + throw new \Exception('Lost OAuth Client State'); } -$state = SimpleSAML_Auth_State::loadState($_REQUEST['state'], sspmod_authwindowslive_Auth_Source_LiveID::STAGE_INIT); +$state = \SimpleSAML\Auth\State::loadState($_REQUEST['state'], sspmod_authwindowslive_Auth_Source_LiveID::STAGE_INIT); // http://msdn.microsoft.com/en-us/library/ff749771.aspx if (array_key_exists('code', $_REQUEST)) { @@ -25,22 +25,22 @@ if (array_key_exists('code', $_REQUEST)) { // redirect them to their original page so they can choose another auth mechanism if ($_REQUEST['error'] === 'user_denied') { $e = new \SimpleSAML\Error\UserAborted(); - SimpleSAML_Auth_State::throwException($state, $e); + \SimpleSAML\Auth\State::throwException($state, $e); } // error - throw new Exception('Authentication failed: ['.$_REQUEST['error'].'] '.$_REQUEST['error_description']); + throw new \Exception('Authentication failed: ['.$_REQUEST['error'].'] '.$_REQUEST['error_description']); } // find authentication source assert(array_key_exists(sspmod_authwindowslive_Auth_Source_LiveID::AUTHID, $state)); $sourceId = $state[sspmod_authwindowslive_Auth_Source_LiveID::AUTHID]; -$source = SimpleSAML_Auth_Source::getById($sourceId); +$source = \SimpleSAML\Auth\Source::getById($sourceId); if ($source === null) { - throw new Exception('Could not find authentication source with id '.$sourceId); + throw new \Exception('Could not find authentication source with id '.$sourceId); } $source->finalStep($state); -SimpleSAML_Auth_Source::completeAuth($state); +\SimpleSAML\Auth\Source::completeAuth($state); diff --git a/modules/cas/lib/Auth/Source/CAS.php b/modules/cas/lib/Auth/Source/CAS.php index 78fc0740306b4dee70391415e86f8838c4a4822a..9195bd89a92578355d0f1a0a6bd17660eae10404 100644 --- a/modules/cas/lib/Auth/Source/CAS.php +++ b/modules/cas/lib/Auth/Source/CAS.php @@ -9,7 +9,7 @@ * @package SimpleSAMLphp */ -class sspmod_cas_Auth_Source_CAS extends SimpleSAML_Auth_Source +class sspmod_cas_Auth_Source_CAS extends \SimpleSAML\Auth\Source { /** * The string used to identify our states. @@ -182,15 +182,15 @@ class sspmod_cas_Auth_Source_CAS extends SimpleSAML_Auth_Source public function finalStep(&$state) { $ticket = $state['cas:ticket']; - $stateID = SimpleSAML_Auth_State::saveState($state, self::STAGE_INIT); - $service = SimpleSAML\Module::getModuleURL('cas/linkback.php', array('stateID' => $stateID)); + $stateID = \SimpleSAML\Auth\State::saveState($state, self::STAGE_INIT); + $service = \SimpleSAML\Module::getModuleURL('cas/linkback.php', array('stateID' => $stateID)); list($username, $casattributes) = $this->casValidation($ticket, $service); $ldapattributes = array(); $config = \SimpleSAML\Configuration::loadFromArray($this->_ldapConfig, 'Authentication source ' . var_export($this->authId, true)); if ($this->_ldapConfig['servers']) { - $ldap = new SimpleSAML_Auth_LDAP( + $ldap = new \SimpleSAML\Auth\LDAP( $config->getString('servers'), $config->getBoolean('enable_tls', false), $config->getBoolean('debug', false), @@ -203,7 +203,7 @@ class sspmod_cas_Auth_Source_CAS extends SimpleSAML_Auth_Source $attributes = array_merge_recursive($casattributes, $ldapattributes); $state['Attributes'] = $attributes; - SimpleSAML_Auth_Source::completeAuth($state); + \SimpleSAML\Auth\Source::completeAuth($state); } @@ -219,7 +219,7 @@ class sspmod_cas_Auth_Source_CAS extends SimpleSAML_Auth_Source // We are going to need the authId in order to retrieve this authentication source later $state[self::AUTHID] = $this->authId; - $stateID = SimpleSAML_Auth_State::saveState($state, self::STAGE_INIT); + $stateID = \SimpleSAML\Auth\State::saveState($state, self::STAGE_INIT); $serviceUrl = SimpleSAML\Module::getModuleURL('cas/linkback.php', array('stateID' => $stateID)); @@ -245,7 +245,7 @@ class sspmod_cas_Auth_Source_CAS extends SimpleSAML_Auth_Source assert(is_array($state)); $logoutUrl = $this->_casConfig['logout']; - SimpleSAML_Auth_State::deleteState($state); + \SimpleSAML\Auth\State::deleteState($state); // we want cas to log us out \SimpleSAML\Utils\HTTP::redirectTrustedURL($logoutUrl); } diff --git a/modules/cas/www/linkback.php b/modules/cas/www/linkback.php index db7dc5d50d2666be1995d9dc5f9ffb356f1a3520..3b1699d9e97f8be342dc23e51ed4613b33c79c73 100644 --- a/modules/cas/www/linkback.php +++ b/modules/cas/www/linkback.php @@ -7,7 +7,7 @@ if (!isset($_GET['stateID'])) { throw new \SimpleSAML\Error\BadRequest('Missing stateID parameter.'); } -$state = SimpleSAML_Auth_State::loadState($_GET['stateID'], sspmod_cas_Auth_Source_CAS::STAGE_INIT); +$state = \SimpleSAML\Auth\State::loadState($_GET['stateID'], sspmod_cas_Auth_Source_CAS::STAGE_INIT); if (!isset($_GET['ticket'])) { throw new \SimpleSAML\Error\BadRequest('Missing ticket parameter.'); @@ -18,7 +18,7 @@ $state['cas:ticket'] = (string)$_GET['ticket']; assert(array_key_exists(sspmod_cas_Auth_Source_CAS::AUTHID, $state)); $sourceId = $state[sspmod_cas_Auth_Source_CAS::AUTHID]; -$source = SimpleSAML_Auth_Source::getById($sourceId); +$source = \SimpleSAML\Auth\Source::getById($sourceId); if ($source === null) { throw new Exception('Could not find authentication source with id ' . $sourceId); } diff --git a/modules/cdc/lib/Auth/Process/CDC.php b/modules/cdc/lib/Auth/Process/CDC.php index 036267580704a618fe8b91eb271019af5f81ba1c..d3f1eb0e8221b59d2332bdd1151dc12035e613cc 100644 --- a/modules/cdc/lib/Auth/Process/CDC.php +++ b/modules/cdc/lib/Auth/Process/CDC.php @@ -5,7 +5,7 @@ * * @package SimpleSAMLphp */ -class sspmod_cdc_Auth_Process_CDC extends SimpleSAML_Auth_ProcessingFilter +class sspmod_cdc_Auth_Process_CDC extends \SimpleSAML\Auth\ProcessingFilter { /** * Our CDC domain. @@ -58,9 +58,9 @@ class sspmod_cdc_Auth_Process_CDC extends SimpleSAML_Auth_ProcessingFilter } // Save state and build request - $id = SimpleSAML_Auth_State::saveState($state, 'cdc:resume'); + $id = \SimpleSAML\Auth\State::saveState($state, 'cdc:resume'); - $returnTo = SimpleSAML\Module::getModuleURL('cdc/resume.php', array('domain' => $this->domain)); + $returnTo = \SimpleSAML\Module::getModuleURL('cdc/resume.php', array('domain' => $this->domain)); $params = array( 'id' => $id, diff --git a/modules/cdc/www/resume.php b/modules/cdc/www/resume.php index 76da69dd73e5cf62e478f9fd500dbc849acd1619..903e13fb4ce1ae4a14b17b3381fd4e701d1e282c 100644 --- a/modules/cdc/www/resume.php +++ b/modules/cdc/www/resume.php @@ -16,6 +16,6 @@ if ($response === null) { if (!isset($response['id'])) { throw new \SimpleSAML\Error\BadRequest('CDCResponse without id.'); } -$state = SimpleSAML_Auth_State::loadState($response['id'], 'cdc:resume'); +$state = \SimpleSAML\Auth\State::loadState($response['id'], 'cdc:resume'); -SimpleSAML_Auth_ProcessingChain::resumeProcessing($state); +\SimpleSAML\Auth\ProcessingChain::resumeProcessing($state); diff --git a/modules/consent/lib/Auth/Process/Consent.php b/modules/consent/lib/Auth/Process/Consent.php index 6cf65a241d17b39cd52feb8d990a8752385c8e34..9b0fdd11077fcb0f327472b5e49808f308fada73 100644 --- a/modules/consent/lib/Auth/Process/Consent.php +++ b/modules/consent/lib/Auth/Process/Consent.php @@ -9,7 +9,7 @@ * * @package SimpleSAMLphp */ -class sspmod_consent_Auth_Process_Consent extends SimpleSAML_Auth_ProcessingFilter +class sspmod_consent_Auth_Process_Consent extends \SimpleSAML\Auth\ProcessingFilter { /** * Button to receive focus @@ -335,7 +335,7 @@ class sspmod_consent_Auth_Process_Consent extends SimpleSAML_Auth_ProcessingFilt } // Save state and redirect - $id = SimpleSAML_Auth_State::saveState($state, 'consent:request'); + $id = \SimpleSAML\Auth\State::saveState($state, 'consent:request'); $url = SimpleSAML\Module::getModuleURL('consent/getconsent.php'); \SimpleSAML\Utils\HTTP::redirectTrustedURL($url, array('StateId' => $id)); } diff --git a/modules/consent/www/getconsent.php b/modules/consent/www/getconsent.php index 4c863a3b78ad2d4838b0781b734a04b7dfd53698..9265b071b813bf5eca420170fd44dc207ae60d0c 100644 --- a/modules/consent/www/getconsent.php +++ b/modules/consent/www/getconsent.php @@ -30,7 +30,7 @@ if (!array_key_exists('StateId', $_REQUEST)) { } $id = $_REQUEST['StateId']; -$state = SimpleSAML_Auth_State::loadState($id, 'consent:request'); +$state = \SimpleSAML\Auth\State::loadState($id, 'consent:request'); if (array_key_exists('core:SP', $state)) { $spentityid = $state['core:SP']; @@ -78,7 +78,7 @@ if (array_key_exists('yes', $_REQUEST)) { } } - \SimpleSAML_Auth_ProcessingChain::resumeProcessing($state); + \SimpleSAML\Auth\ProcessingChain::resumeProcessing($state); } // Prepare attributes for presentation diff --git a/modules/consent/www/logout.php b/modules/consent/www/logout.php index 84eca697cb2b194be83cf313876c044a79ceb860..50d5519266dbbc784e62037d2cb3289911f966ed 100644 --- a/modules/consent/www/logout.php +++ b/modules/consent/www/logout.php @@ -8,7 +8,7 @@ if (!array_key_exists('StateId', $_GET)) { throw new \SimpleSAML\Error\BadRequest('Missing required StateId query parameter.'); } -$state = \SimpleSAML_Auth_State::loadState($_GET['StateId'], 'consent:request'); +$state = \SimpleSAML\Auth\State::loadState($_GET['StateId'], 'consent:request'); $state['Responder'] = array('sspmod_consent_Logout', 'postLogout'); diff --git a/modules/consent/www/noconsent.php b/modules/consent/www/noconsent.php index 225f8b2155719a84188211437792af15ddae9a3e..dcf09d60ea2bcde65bac63159fe6ce61f9d21d0f 100644 --- a/modules/consent/www/noconsent.php +++ b/modules/consent/www/noconsent.php @@ -13,7 +13,7 @@ if (!array_key_exists('StateId', $_REQUEST)) { } $id = $_REQUEST['StateId']; -$state = \SimpleSAML_Auth_State::loadState($id, 'consent:request'); +$state = \SimpleSAML\Auth\State::loadState($id, 'consent:request'); $resumeFrom = \SimpleSAML\Module::getModuleURL( 'consent/getconsent.php', diff --git a/modules/consentAdmin/www/consentAdmin.php b/modules/consentAdmin/www/consentAdmin.php index d9a200151339fd575fefb6327f3949ee9c5f3c1b..4ff6031be1a9fd4301e39b69d75f50a50ea94195 100644 --- a/modules/consentAdmin/www/consentAdmin.php +++ b/modules/consentAdmin/www/consentAdmin.php @@ -29,7 +29,7 @@ function driveProcessingChain( /* * Create a new processing chain */ - $pc = new SimpleSAML_Auth_ProcessingChain($idp_metadata, $sp_metadata, 'idp'); + $pc = new \SimpleSAML\Auth\ProcessingChain($idp_metadata, $sp_metadata, 'idp'); /* * Construct the state. diff --git a/modules/core/lib/Auth/Process/AttributeAdd.php b/modules/core/lib/Auth/Process/AttributeAdd.php index 63aa03fb2becf34654b18b7f95b7a307c912c7b9..1eaaf331ad786b82f8f794145b96833ca34dadd9 100644 --- a/modules/core/lib/Auth/Process/AttributeAdd.php +++ b/modules/core/lib/Auth/Process/AttributeAdd.php @@ -8,7 +8,7 @@ * @author Olav Morken, UNINETT AS. * @package SimpleSAMLphp */ -class sspmod_core_Auth_Process_AttributeAdd extends SimpleSAML_Auth_ProcessingFilter { +class sspmod_core_Auth_Process_AttributeAdd extends \SimpleSAML\Auth\ProcessingFilter { /** * Flag which indicates wheter this filter should append new values or replace old values. diff --git a/modules/core/lib/Auth/Process/AttributeAlter.php b/modules/core/lib/Auth/Process/AttributeAlter.php index d6daf9623000fe50ff677d5440706a1ed3a180d4..1f6743405976bd85ac11cccc99a6f777f23dfd8f 100644 --- a/modules/core/lib/Auth/Process/AttributeAlter.php +++ b/modules/core/lib/Auth/Process/AttributeAlter.php @@ -9,7 +9,7 @@ * @package SimpleSAMLphp */ -class sspmod_core_Auth_Process_AttributeAlter extends SimpleSAML_Auth_ProcessingFilter +class sspmod_core_Auth_Process_AttributeAlter extends \SimpleSAML\Auth\ProcessingFilter { /** * Should the pattern found be replaced? diff --git a/modules/core/lib/Auth/Process/AttributeCopy.php b/modules/core/lib/Auth/Process/AttributeCopy.php index e2412a45c8d0ff36e41bf9cfc2e51a89d12ec48c..0f2e7b2feecbd8f8f5428766e72bb10fb163ddfa 100644 --- a/modules/core/lib/Auth/Process/AttributeCopy.php +++ b/modules/core/lib/Auth/Process/AttributeCopy.php @@ -15,8 +15,9 @@ * ), * */ -class sspmod_core_Auth_Process_AttributeCopy extends SimpleSAML_Auth_ProcessingFilter { +class sspmod_core_Auth_Process_AttributeCopy extends \SimpleSAML\Auth\ProcessingFilter +{ /** * Assosiative array with the mappings of attribute names. */ diff --git a/modules/core/lib/Auth/Process/AttributeLimit.php b/modules/core/lib/Auth/Process/AttributeLimit.php index 865b3835330fedd11492d7a11bedce6222825b19..cffe4f8c0376bbe1d9e96f334848c2cd75b0aa17 100644 --- a/modules/core/lib/Auth/Process/AttributeLimit.php +++ b/modules/core/lib/Auth/Process/AttributeLimit.php @@ -6,8 +6,9 @@ * @author Olav Morken, UNINETT AS. * @package SimpleSAMLphp */ -class sspmod_core_Auth_Process_AttributeLimit extends SimpleSAML_Auth_ProcessingFilter { +class sspmod_core_Auth_Process_AttributeLimit extends \SimpleSAML\Auth\ProcessingFilter +{ /** * List of attributes which this filter will allow through. */ diff --git a/modules/core/lib/Auth/Process/AttributeMap.php b/modules/core/lib/Auth/Process/AttributeMap.php index ccd7addf1dbbaf8eb2d50c6f51468d728a8f9e26..29135c2ee984e554ae77a70fabf95f72b0488db9 100644 --- a/modules/core/lib/Auth/Process/AttributeMap.php +++ b/modules/core/lib/Auth/Process/AttributeMap.php @@ -1,15 +1,14 @@ <?php - /** * Attribute filter for renaming attributes. * * @author Olav Morken, UNINETT AS. * @package SimpleSAMLphp */ -class sspmod_core_Auth_Process_AttributeMap extends SimpleSAML_Auth_ProcessingFilter -{ +class sspmod_core_Auth_Process_AttributeMap extends \SimpleSAML\Auth\ProcessingFilter +{ /** * Associative array with the mappings of attribute names. */ diff --git a/modules/core/lib/Auth/Process/AttributeRealm.php b/modules/core/lib/Auth/Process/AttributeRealm.php index 86c8be1b2f10e25b04873213d573f681e504a0d5..bf2a8cfad1baff7b4a334e89ea6e99d3db0753f2 100644 --- a/modules/core/lib/Auth/Process/AttributeRealm.php +++ b/modules/core/lib/Auth/Process/AttributeRealm.php @@ -8,8 +8,9 @@ * @package SimpleSAMLphp * @deprecated Use ScopeFromAttribute instead. */ -class sspmod_core_Auth_Process_AttributeRealm extends SimpleSAML_Auth_ProcessingFilter { +class sspmod_core_Auth_Process_AttributeRealm extends \SimpleSAML\Auth\ProcessingFilter +{ private $attributename = 'realm'; /** diff --git a/modules/core/lib/Auth/Process/AttributeValueMap.php b/modules/core/lib/Auth/Process/AttributeValueMap.php index a83fb582aa34bdc3aaf2f9be37082917e79991d5..293bc9b13fbbf232206e8350b5197ff5472debd9 100644 --- a/modules/core/lib/Auth/Process/AttributeValueMap.php +++ b/modules/core/lib/Auth/Process/AttributeValueMap.php @@ -8,9 +8,9 @@ namespace SimpleSAML\Module\core\Auth\Process; * @author Martin van Es, m7 * @package SimpleSAMLphp */ -class AttributeValueMap extends \SimpleSAML_Auth_ProcessingFilter -{ +class AttributeValueMap extends \SimpleSAML\Auth\ProcessingFilter +{ /** * The name of the attribute we should assign values to (ie: the target attribute). */ diff --git a/modules/core/lib/Auth/Process/Cardinality.php b/modules/core/lib/Auth/Process/Cardinality.php index 59fdc392b2b9fe587818eff400f883794fec709b..2960e86fecdcaf3c85e29e8efb33ac94e707fd37 100644 --- a/modules/core/lib/Auth/Process/Cardinality.php +++ b/modules/core/lib/Auth/Process/Cardinality.php @@ -8,7 +8,8 @@ use SimpleSAML\Utils\HTTPAdapter; * @author Guy Halse, http://orcid.org/0000-0002-9388-8592 * @package SimpleSAMLphp */ -class sspmod_core_Auth_Process_Cardinality extends SimpleSAML_Auth_ProcessingFilter + +class sspmod_core_Auth_Process_Cardinality extends \SimpleSAML\Auth\ProcessingFilter { /** @var array Associative array with the mappings of attribute names. */ private $cardinality = array(); @@ -163,8 +164,8 @@ class sspmod_core_Auth_Process_Cardinality extends SimpleSAML_Auth_ProcessingFil /* abort if we found a problematic attribute */ if (array_key_exists('core:cardinality:errorAttributes', $request)) { - $id = SimpleSAML_Auth_State::saveState($request, 'core:cardinality'); - $url = SimpleSAML\Module::getModuleURL('core/cardinality_error.php'); + $id = \SimpleSAML\Auth\State::saveState($request, 'core:cardinality'); + $url = \SimpleSAML\Module::getModuleURL('core/cardinality_error.php'); $this->http->redirectTrustedURL($url, array('StateId' => $id)); return; } diff --git a/modules/core/lib/Auth/Process/CardinalitySingle.php b/modules/core/lib/Auth/Process/CardinalitySingle.php index 173d95c5c48e32c2e9909b07131ccd80692dbcbb..dc8672b6828f960bf6288c0731b9e3685345ded0 100644 --- a/modules/core/lib/Auth/Process/CardinalitySingle.php +++ b/modules/core/lib/Auth/Process/CardinalitySingle.php @@ -11,7 +11,8 @@ use SimpleSAML\Utils\HttpAdapter; * @author Guy Halse, http://orcid.org/0000-0002-9388-8592 * @package SimpleSAMLphp */ -class sspmod_core_Auth_Process_CardinalitySingle extends SimpleSAML_Auth_ProcessingFilter + +class sspmod_core_Auth_Process_CardinalitySingle extends \SimpleSAML\Auth\ProcessingFilter { /** @var array Attributes that should be single-valued or we generate an error */ private $singleValued = array(); @@ -108,7 +109,7 @@ class sspmod_core_Auth_Process_CardinalitySingle extends SimpleSAML_Auth_Process /* abort if we found a problematic attribute */ if (array_key_exists('core:cardinality:errorAttributes', $request)) { - $id = SimpleSAML_Auth_State::saveState($request, 'core:cardinality'); + $id = \SimpleSAML\Auth\State::saveState($request, 'core:cardinality'); $url = SimpleSAML\Module::getModuleURL('core/cardinality_error.php'); $this->http->redirectTrustedURL($url, array('StateId' => $id)); return; diff --git a/modules/core/lib/Auth/Process/ExtendIdPSession.php b/modules/core/lib/Auth/Process/ExtendIdPSession.php index 43780fe9915a306d982ba78b48f0c7ac9e1b3d56..6526115dcbc566ad4a7efdce0d1fb059f390c3a6 100644 --- a/modules/core/lib/Auth/Process/ExtendIdPSession.php +++ b/modules/core/lib/Auth/Process/ExtendIdPSession.php @@ -3,8 +3,9 @@ /** * Extend IdP session and cookies. */ -class sspmod_core_Auth_Process_ExtendIdPSession extends SimpleSAML_Auth_ProcessingFilter { +class sspmod_core_Auth_Process_ExtendIdPSession extends \SimpleSAML\Auth\ProcessingFilter +{ public function process(&$state) { assert(is_array($state)); diff --git a/modules/core/lib/Auth/Process/GenerateGroups.php b/modules/core/lib/Auth/Process/GenerateGroups.php index 17b896e5f28e17f2221f4a9791833cd383d21e3c..d4ff3c3387b3dea26046bf24908b07f9605c9610 100644 --- a/modules/core/lib/Auth/Process/GenerateGroups.php +++ b/modules/core/lib/Auth/Process/GenerateGroups.php @@ -6,9 +6,9 @@ * @author Olav Morken, UNINETT AS. * @package SimpleSAMLphp */ -class sspmod_core_Auth_Process_GenerateGroups extends SimpleSAML_Auth_ProcessingFilter { - +class sspmod_core_Auth_Process_GenerateGroups extends \SimpleSAML\Auth\ProcessingFilter +{ /** * The attributes we should generate groups from. */ diff --git a/modules/core/lib/Auth/Process/LanguageAdaptor.php b/modules/core/lib/Auth/Process/LanguageAdaptor.php index 4a1b381405255b2f441089e95f5595db24243326..c02228dd7e8c73fbc9b5820bfff72c892f1aaee5 100644 --- a/modules/core/lib/Auth/Process/LanguageAdaptor.php +++ b/modules/core/lib/Auth/Process/LanguageAdaptor.php @@ -6,8 +6,9 @@ * @author Andreas Åkre Solberg, UNINETT AS. * @package SimpleSAMLphp */ -class sspmod_core_Auth_Process_LanguageAdaptor extends SimpleSAML_Auth_ProcessingFilter { +class sspmod_core_Auth_Process_LanguageAdaptor extends \SimpleSAML\Auth\ProcessingFilter +{ private $langattr = 'preferredLanguage'; diff --git a/modules/core/lib/Auth/Process/PHP.php b/modules/core/lib/Auth/Process/PHP.php index 2fb3d535263a64c5331704c60f63afc3cdeb5390..97cca71a0a1fcdca10006fd71709e65135b2311e 100644 --- a/modules/core/lib/Auth/Process/PHP.php +++ b/modules/core/lib/Auth/Process/PHP.php @@ -6,7 +6,7 @@ * @package SimpleSAMLphp */ -class sspmod_core_Auth_Process_PHP extends SimpleSAML_Auth_ProcessingFilter +class sspmod_core_Auth_Process_PHP extends \SimpleSAML\Auth\ProcessingFilter { /** * The PHP code that should be run. diff --git a/modules/core/lib/Auth/Process/ScopeAttribute.php b/modules/core/lib/Auth/Process/ScopeAttribute.php index 251ef0917a1688e8fd7259ac61b3e0fc5528bc1e..7684b18d663b89a94ad1594b1185c81193916ac2 100644 --- a/modules/core/lib/Auth/Process/ScopeAttribute.php +++ b/modules/core/lib/Auth/Process/ScopeAttribute.php @@ -5,7 +5,8 @@ * * @package SimpleSAMLphp */ -class sspmod_core_Auth_Process_ScopeAttribute extends SimpleSAML_Auth_ProcessingFilter + +class sspmod_core_Auth_Process_ScopeAttribute extends \SimpleSAML\Auth\ProcessingFilter { /** * The attribute we extract the scope from. diff --git a/modules/core/lib/Auth/Process/ScopeFromAttribute.php b/modules/core/lib/Auth/Process/ScopeFromAttribute.php index 098856f998f56004504f16d762ae1ac73467de7e..735c30e1c951815b5fa68f03fb7588fd2726b12a 100644 --- a/modules/core/lib/Auth/Process/ScopeFromAttribute.php +++ b/modules/core/lib/Auth/Process/ScopeFromAttribute.php @@ -16,7 +16,9 @@ * to add a virtual 'scope' attribute from the eduPersonPrincipalName * attribute. */ -class sspmod_core_Auth_Process_ScopeFromAttribute extends SimpleSAML_Auth_ProcessingFilter { + +class sspmod_core_Auth_Process_ScopeFromAttribute extends \SimpleSAML\Auth\ProcessingFilter +{ /** * The attribute where the scope is taken from * diff --git a/modules/core/lib/Auth/Process/StatisticsWithAttribute.php b/modules/core/lib/Auth/Process/StatisticsWithAttribute.php index 800558cbd51b32f28bc307304c81d5326cecc23c..d75b474fcba59b39b32c9ba95fdd22ce9cc9c2da 100644 --- a/modules/core/lib/Auth/Process/StatisticsWithAttribute.php +++ b/modules/core/lib/Auth/Process/StatisticsWithAttribute.php @@ -6,7 +6,8 @@ * @author Andreas Åkre Solberg, UNINETT AS. * @package SimpleSAMLphp */ -class sspmod_core_Auth_Process_StatisticsWithAttribute extends SimpleSAML_Auth_ProcessingFilter + +class sspmod_core_Auth_Process_StatisticsWithAttribute extends \SimpleSAML\Auth\ProcessingFilter { /** * The attribute to log diff --git a/modules/core/lib/Auth/Process/TargetedID.php b/modules/core/lib/Auth/Process/TargetedID.php index 3b70f02aa4ad20a7468862fa6c3ff89be8ec236a..69888dc841976e97beba7a5fec68849b14af876f 100644 --- a/modules/core/lib/Auth/Process/TargetedID.php +++ b/modules/core/lib/Auth/Process/TargetedID.php @@ -28,9 +28,9 @@ * @author Olav Morken, UNINETT AS. * @package SimpleSAMLphp */ -class sspmod_core_Auth_Process_TargetedID extends SimpleSAML_Auth_ProcessingFilter { - +class sspmod_core_Auth_Process_TargetedID extends \SimpleSAML\Auth\ProcessingFilter +{ /** * The attribute we should generate the targeted id from, or NULL if we should use the * UserID. diff --git a/modules/core/lib/Auth/Process/WarnShortSSOInterval.php b/modules/core/lib/Auth/Process/WarnShortSSOInterval.php index d8ae6fa0a6e9bda49d7d493aaa00997216296b72..74c7b5dd08a8f88c55dd135b3f9083a57da87351 100644 --- a/modules/core/lib/Auth/Process/WarnShortSSOInterval.php +++ b/modules/core/lib/Auth/Process/WarnShortSSOInterval.php @@ -5,8 +5,9 @@ * * @package SimpleSAMLphp */ -class sspmod_core_Auth_Process_WarnShortSSOInterval extends SimpleSAML_Auth_ProcessingFilter { +class sspmod_core_Auth_Process_WarnShortSSOInterval extends \SimpleSAML\Auth\ProcessingFilter +{ /** * Process a authentication response. * @@ -44,8 +45,8 @@ class sspmod_core_Auth_Process_WarnShortSSOInterval extends SimpleSAML_Auth_Proc var_export($entityId, TRUE)); // Save state and redirect - $id = SimpleSAML_Auth_State::saveState($state, 'core:short_sso_interval'); - $url = SimpleSAML\Module::getModuleURL('core/short_sso_interval.php'); + $id = \SimpleSAML\Auth\State::saveState($state, 'core:short_sso_interval'); + $url = \SimpleSAML\Module::getModuleURL('core/short_sso_interval.php'); \SimpleSAML\Utils\HTTP::redirectTrustedURL($url, array('StateId' => $id)); } diff --git a/modules/core/lib/Auth/UserPassBase.php b/modules/core/lib/Auth/UserPassBase.php index 47ce27467a170c3d0f41175b3cab31f792c2cbed..ec63c8ffa4ce3d17bafffa84fe3d49b95eebf206 100644 --- a/modules/core/lib/Auth/UserPassBase.php +++ b/modules/core/lib/Auth/UserPassBase.php @@ -10,7 +10,7 @@ * @package SimpleSAMLphp */ -abstract class sspmod_core_Auth_UserPassBase extends SimpleSAML_Auth_Source +abstract class sspmod_core_Auth_UserPassBase extends \SimpleSAML\Auth\Source { /** * The string used to identify our states. @@ -203,7 +203,7 @@ abstract class sspmod_core_Auth_UserPassBase extends SimpleSAML_Auth_Source } /* Save the $state-array, so that we can restore it after a redirect. */ - $id = SimpleSAML_Auth_State::saveState($state, self::STAGEID); + $id = \SimpleSAML\Auth\State::saveState($state, self::STAGEID); /* * Redirect to the login form. We include the identifier of the saved @@ -251,11 +251,11 @@ abstract class sspmod_core_Auth_UserPassBase extends SimpleSAML_Auth_Source assert(is_string($password)); /* Here we retrieve the state array we saved in the authenticate-function. */ - $state = SimpleSAML_Auth_State::loadState($authStateId, self::STAGEID); + $state = \SimpleSAML\Auth\State::loadState($authStateId, self::STAGEID); /* Retrieve the authentication source we are executing. */ assert(array_key_exists(self::AUTHID, $state)); - $source = SimpleSAML_Auth_Source::getById($state[self::AUTHID]); + $source = \SimpleSAML\Auth\Source::getById($state[self::AUTHID]); if ($source === NULL) { throw new Exception('Could not find authentication source with id ' . $state[self::AUTHID]); } @@ -280,7 +280,7 @@ abstract class sspmod_core_Auth_UserPassBase extends SimpleSAML_Auth_Source $state['Attributes'] = $attributes; /* Return control to SimpleSAMLphp after successful authentication. */ - SimpleSAML_Auth_Source::completeAuth($state); + \SimpleSAML\Auth\Source::completeAuth($state); } } diff --git a/modules/core/lib/Auth/UserPassOrgBase.php b/modules/core/lib/Auth/UserPassOrgBase.php index 487cef1d7bda4970bb97fed21569800cb779faa3..e3207ee3754bd1f4e4d20ce51e77b7e35aed9ec7 100644 --- a/modules/core/lib/Auth/UserPassOrgBase.php +++ b/modules/core/lib/Auth/UserPassOrgBase.php @@ -12,7 +12,7 @@ * @package SimpleSAMLphp */ -abstract class sspmod_core_Auth_UserPassOrgBase extends SimpleSAML_Auth_Source +abstract class sspmod_core_Auth_UserPassOrgBase extends \SimpleSAML\Auth\Source { /** * The string used to identify our states. @@ -152,7 +152,7 @@ abstract class sspmod_core_Auth_UserPassOrgBase extends SimpleSAML_Auth_Source // We are going to need the authId in order to retrieve this authentication source later $state[self::AUTHID] = $this->authId; - $id = SimpleSAML_Auth_State::saveState($state, self::STAGEID); + $id = \SimpleSAML\Auth\State::saveState($state, self::STAGEID); $url = SimpleSAML\Module::getModuleURL('core/loginuserpassorg.php'); $params = array('AuthState' => $id); @@ -209,11 +209,11 @@ abstract class sspmod_core_Auth_UserPassOrgBase extends SimpleSAML_Auth_Source assert(is_string($organization)); /* Retrieve the authentication state. */ - $state = SimpleSAML_Auth_State::loadState($authStateId, self::STAGEID); + $state = \SimpleSAML\Auth\State::loadState($authStateId, self::STAGEID); /* Find authentication source. */ assert(array_key_exists(self::AUTHID, $state)); - $source = SimpleSAML_Auth_Source::getById($state[self::AUTHID]); + $source = \SimpleSAML\Auth\Source::getById($state[self::AUTHID]); if ($source === NULL) { throw new Exception('Could not find authentication source with id ' . $state[self::AUTHID]); } @@ -240,7 +240,7 @@ abstract class sspmod_core_Auth_UserPassOrgBase extends SimpleSAML_Auth_Source $state['PersistentAuthData'][] = self::ORGID; $state['Attributes'] = $attributes; - SimpleSAML_Auth_Source::completeAuth($state); + \SimpleSAML\Auth\Source::completeAuth($state); } @@ -257,11 +257,11 @@ abstract class sspmod_core_Auth_UserPassOrgBase extends SimpleSAML_Auth_Source assert(is_string($authStateId)); /* Retrieve the authentication state. */ - $state = SimpleSAML_Auth_State::loadState($authStateId, self::STAGEID); + $state = \SimpleSAML\Auth\State::loadState($authStateId, self::STAGEID); /* Find authentication source. */ assert(array_key_exists(self::AUTHID, $state)); - $source = SimpleSAML_Auth_Source::getById($state[self::AUTHID]); + $source = \SimpleSAML\Auth\Source::getById($state[self::AUTHID]); if ($source === NULL) { throw new Exception('Could not find authentication source with id ' . $state[self::AUTHID]); } diff --git a/modules/core/www/authenticate.php b/modules/core/www/authenticate.php index 47a922044c200d25426a8d1f9b03e8ed185850bb..df978a8f1eea7955153cfd41a4c067c92debc3f3 100644 --- a/modules/core/www/authenticate.php +++ b/modules/core/www/authenticate.php @@ -5,7 +5,7 @@ $config = \SimpleSAML\Configuration::getInstance(); if (!array_key_exists('as', $_REQUEST)) { $t = new \SimpleSAML\XHTML\Template($config, 'core:authsource_list.tpl.php'); - $t->data['sources'] = \SimpleSAML_Auth_Source::getSources(); + $t->data['sources'] = \SimpleSAML\Auth\Source::getSources(); $t->show(); exit(); } @@ -17,12 +17,12 @@ if (array_key_exists('logout', $_REQUEST)) { $as->logout($config->getBasePath().'logout.php'); } -if (array_key_exists(\SimpleSAML_Auth_State::EXCEPTION_PARAM, $_REQUEST)) { +if (array_key_exists(\SimpleSAML\Auth\State::EXCEPTION_PARAM, $_REQUEST)) { // This is just a simple example of an error - $state = \SimpleSAML_Auth_State::loadExceptionState(); - assert(array_key_exists(\SimpleSAML_Auth_State::EXCEPTION_DATA, $state)); - $e = $state[\SimpleSAML_Auth_State::EXCEPTION_DATA]; + $state = \SimpleSAML\Auth\State::loadExceptionState(); + assert(array_key_exists(\SimpleSAML\Auth\State::EXCEPTION_DATA, $state)); + $e = $state[\SimpleSAML\Auth\State::EXCEPTION_DATA]; throw $e; } diff --git a/modules/core/www/cardinality_error.php b/modules/core/www/cardinality_error.php index 9236c9452cda419f3f530c28be879ddad1168f49..c73a4fee6da9746252c3a3b6b749c60ad6cef971 100644 --- a/modules/core/www/cardinality_error.php +++ b/modules/core/www/cardinality_error.php @@ -10,7 +10,7 @@ if (!array_key_exists('StateId', $_REQUEST)) { throw new \SimpleSAML\Error\BadRequest('Missing required StateId query parameter.'); } $id = $_REQUEST['StateId']; -$state = \SimpleSAML_Auth_State::loadState($id, 'core:cardinality'); +$state = \SimpleSAML\Auth\State::loadState($id, 'core:cardinality'); $session = \SimpleSAML\Session::getSessionFromRequest(); \SimpleSAML\Logger::stats('core:cardinality:error '.$state['Destination']['entityid'].' '.$state['saml:sp:IdP']. diff --git a/modules/core/www/idp/logout-iframe-done.php b/modules/core/www/idp/logout-iframe-done.php index cefeb701a1e1178b08375bc4f6747295a9a10a42..b99870ca3bcae140b0797782578517cb4ff0cbf4 100644 --- a/modules/core/www/idp/logout-iframe-done.php +++ b/modules/core/www/idp/logout-iframe-done.php @@ -3,7 +3,7 @@ if (!isset($_REQUEST['id'])) { throw new \SimpleSAML\Error\BadRequest('Missing required parameter: id'); } -$state = SimpleSAML_Auth_State::loadState($_REQUEST['id'], 'core:Logout-IFrame'); +$state = \SimpleSAML\Auth\State::loadState($_REQUEST['id'], 'core:Logout-IFrame'); $idp = SimpleSAML_IdP::getByState($state); $associations = $idp->getAssociations(); diff --git a/modules/core/www/idp/logout-iframe.php b/modules/core/www/idp/logout-iframe.php index 332b86d63b34dcba514b7cf8ba9916ac75878c7e..4916c1199f2f36de9f1a6e62c101b331fb669e1b 100644 --- a/modules/core/www/idp/logout-iframe.php +++ b/modules/core/www/idp/logout-iframe.php @@ -18,7 +18,7 @@ if ($type !== 'embed') { \SimpleSAML_Stats::log('core:idp:logout-iframe:page', array('type' => $type)); } -$state = \SimpleSAML_Auth_State::loadState($_REQUEST['id'], 'core:Logout-IFrame'); +$state = \SimpleSAML\Auth\State::loadState($_REQUEST['id'], 'core:Logout-IFrame'); $idp = \SimpleSAML_IdP::getByState($state); $mdh = \SimpleSAML\Metadata\MetaDataStorageHandler::getMetadataHandler(); @@ -112,7 +112,7 @@ foreach ($state['core:Logout-IFrame:Associations'] as $association) { } } -$id = \SimpleSAML_Auth_State::saveState($state, 'core:Logout-IFrame'); +$id = \SimpleSAML\Auth\State::saveState($state, 'core:Logout-IFrame'); $globalConfig = \SimpleSAML\Configuration::getInstance(); $template_id = 'core:logout-iframe.php'; diff --git a/modules/core/www/idp/resumelogout.php b/modules/core/www/idp/resumelogout.php index 6a142ad57ab72d9e8719c789637796798de8a0f8..497e369b8e56acf26e686654490db6c414406d98 100644 --- a/modules/core/www/idp/resumelogout.php +++ b/modules/core/www/idp/resumelogout.php @@ -3,7 +3,7 @@ if (!isset($_REQUEST['id'])) { throw new \SimpleSAML\Error\BadRequest('Missing id-parameter.'); } -$state = SimpleSAML_Auth_State::loadState($_REQUEST['id'], 'core:Logout:afterbridge'); +$state = \SimpleSAML\Auth\State::loadState($_REQUEST['id'], 'core:Logout:afterbridge'); $idp = SimpleSAML_IdP::getByState($state); $assocId = $state['core:TerminatedAssocId']; diff --git a/modules/core/www/loginuserpass.php b/modules/core/www/loginuserpass.php index 169ef792e3bcd8436c4fd1d4851fede4d9ac633b..51cd91b6316cb022f987106f18169cfc66f3f349 100644 --- a/modules/core/www/loginuserpass.php +++ b/modules/core/www/loginuserpass.php @@ -14,9 +14,9 @@ if (!array_key_exists('AuthState', $_REQUEST)) { throw new \SimpleSAML\Error\BadRequest('Missing AuthState parameter.'); } $authStateId = $_REQUEST['AuthState']; -$state = SimpleSAML_Auth_State::loadState($authStateId, sspmod_core_Auth_UserPassBase::STAGEID); +$state = \SimpleSAML\Auth\State::loadState($authStateId, sspmod_core_Auth_UserPassBase::STAGEID); -$source = SimpleSAML_Auth_Source::getById($state[sspmod_core_Auth_UserPassBase::AUTHID]); +$source = \SimpleSAML\Auth\Source::getById($state[sspmod_core_Auth_UserPassBase::AUTHID]); if ($source === NULL) { throw new Exception('Could not find authentication source with id ' . $state[sspmod_core_Auth_UserPassBase::AUTHID]); } @@ -59,7 +59,7 @@ if (!empty($_REQUEST['username']) || !empty($password)) { if ($source->isRememberMeEnabled()) { if (array_key_exists('remember_me', $_REQUEST) && $_REQUEST['remember_me'] === 'Yes') { $state['RememberMe'] = TRUE; - $authStateId = SimpleSAML_Auth_State::saveState($state, sspmod_core_Auth_UserPassBase::STAGEID); + $authStateId = \SimpleSAML\Auth\State::saveState($state, sspmod_core_Auth_UserPassBase::STAGEID); } } diff --git a/modules/core/www/loginuserpassorg.php b/modules/core/www/loginuserpassorg.php index 172e61611cdb78adb67ebbf52ff4d0739686d8a9..037ce592c1393bc373b210c0d753c0724ad69bc9 100644 --- a/modules/core/www/loginuserpassorg.php +++ b/modules/core/www/loginuserpassorg.php @@ -14,9 +14,9 @@ if (!array_key_exists('AuthState', $_REQUEST)) { throw new \SimpleSAML\Error\BadRequest('Missing AuthState parameter.'); } $authStateId = $_REQUEST['AuthState']; -$state = \SimpleSAML_Auth_State::loadState($authStateId, sspmod_core_Auth_UserPassOrgBase::STAGEID); +$state = \SimpleSAML\Auth\State::loadState($authStateId, sspmod_core_Auth_UserPassOrgBase::STAGEID); -$source = \SimpleSAML_Auth_Source::getById($state[sspmod_core_Auth_UserPassOrgBase::AUTHID]); +$source = \SimpleSAML\Auth\Source::getById($state[sspmod_core_Auth_UserPassOrgBase::AUTHID]); if ($source === NULL) { throw new Exception('Could not find authentication source with id ' . $state[sspmod_core_Auth_UserPassOrgBase::AUTHID]); } diff --git a/modules/core/www/short_sso_interval.php b/modules/core/www/short_sso_interval.php index 7c44447e8e95b56acf29f5ee714901ae1c5a4c86..7618d9c970dc059a43188e3148168eb8f3505d14 100644 --- a/modules/core/www/short_sso_interval.php +++ b/modules/core/www/short_sso_interval.php @@ -1,4 +1,5 @@ <?php + /** * Show a warning to an user about the SP requesting SSO a short time after * doing it previously. @@ -10,12 +11,12 @@ if (!array_key_exists('StateId', $_REQUEST)) { throw new \SimpleSAML\Error\BadRequest('Missing required StateId query parameter.'); } $id = $_REQUEST['StateId']; -$state = \SimpleSAML_Auth_State::loadState($id, 'core:short_sso_interval'); +$state = \SimpleSAML\Auth\State::loadState($id, 'core:short_sso_interval'); $session = \SimpleSAML\Session::getSessionFromRequest(); if (array_key_exists('continue', $_REQUEST)) { // The user has pressed the continue/retry-button - \SimpleSAML_Auth_ProcessingChain::resumeProcessing($state); + \SimpleSAML\Auth\ProcessingChain::resumeProcessing($state); } $globalConfig = \SimpleSAML\Configuration::getInstance(); diff --git a/modules/exampleauth/lib/Auth/Process/RedirectTest.php b/modules/exampleauth/lib/Auth/Process/RedirectTest.php index 7e3e93ee03fae8c09354a4af286c8b4ac52ccc7a..fb81a8971471087d7fc8800631e66d899e9acdf7 100644 --- a/modules/exampleauth/lib/Auth/Process/RedirectTest.php +++ b/modules/exampleauth/lib/Auth/Process/RedirectTest.php @@ -4,9 +4,9 @@ * A simple processing filter for testing that redirection works as it should. * */ -class sspmod_exampleauth_Auth_Process_RedirectTest extends SimpleSAML_Auth_ProcessingFilter { - +class sspmod_exampleauth_Auth_Process_RedirectTest extends \SimpleSAML\Auth\ProcessingFilter +{ /** * Initialize processing of the redirect test. * @@ -20,9 +20,8 @@ class sspmod_exampleauth_Auth_Process_RedirectTest extends SimpleSAML_Auth_Proce $state['Attributes']['RedirectTest1'] = array('OK'); // Save state and redirect - $id = SimpleSAML_Auth_State::saveState($state, 'exampleauth:redirectfilter-test'); - $url = SimpleSAML\Module::getModuleURL('exampleauth/redirecttest.php'); + $id = \SimpleSAML\Auth\State::saveState($state, 'exampleauth:redirectfilter-test'); + $url = \SimpleSAML\Module::getModuleURL('exampleauth/redirecttest.php'); \SimpleSAML\Utils\HTTP::redirectTrustedURL($url, array('StateId' => $id)); } - } diff --git a/modules/exampleauth/lib/Auth/Source/External.php b/modules/exampleauth/lib/Auth/Source/External.php index f4bec9cc3eb00b75c0d76cfc0bf4e3e5a0596643..2ab694298f3c1039c7fcfebd99d404499988772a 100644 --- a/modules/exampleauth/lib/Auth/Source/External.php +++ b/modules/exampleauth/lib/Auth/Source/External.php @@ -20,7 +20,13 @@ * * @package SimpleSAMLphp */ -class sspmod_exampleauth_Auth_Source_External extends SimpleSAML_Auth_Source { + +class sspmod_exampleauth_Auth_Source_External extends \SimpleSAML\Auth\Source +{ + /** + * The key of the AuthId field in the state. + */ + const AUTHID = 'sspmod_exampleauth_Auth_Source_External.AuthId'; /** * Constructor for this authentication source. @@ -113,7 +119,7 @@ class sspmod_exampleauth_Auth_Source_External extends SimpleSAML_Auth_Source { * First we add the identifier of this authentication source * to the state array, so that we know where to resume. */ - $state['exampleauth:AuthID'] = $this->authId; + $state['exampleauth:AuthID'] = self::AUTHID; /* @@ -129,14 +135,14 @@ class sspmod_exampleauth_Auth_Source_External extends SimpleSAML_Auth_Source { * and restores it in another location, and thus bypasses steps in * the authentication process. */ - $stateId = SimpleSAML_Auth_State::saveState($state, 'exampleauth:External'); + $stateId = \SimpleSAML\Auth\State::saveState($state, 'exampleauth:External'); /* * Now we generate a URL the user should return to after authentication. * We assume that whatever authentication page we send the user to has an * option to return the user to a specific page afterwards. */ - $returnTo = SimpleSAML\Module::getModuleURL('exampleauth/resume.php', array( + $returnTo = \SimpleSAML\Module::getModuleURL('exampleauth/resume.php', array( 'State' => $stateId, )); @@ -188,13 +194,13 @@ class sspmod_exampleauth_Auth_Source_External extends SimpleSAML_Auth_Source { * Once again, note the second parameter to the loadState function. This must * match the string we used in the saveState-call above. */ - $state = SimpleSAML_Auth_State::loadState($_REQUEST['State'], 'exampleauth:External'); + $state = \SimpleSAML\Auth\State::loadState($_REQUEST['State'], 'exampleauth:External'); /* * Now we have the $state-array, and can use it to locate the authentication * source. */ - $source = SimpleSAML_Auth_Source::getById($state['exampleauth:AuthID']); + $source = \SimpleSAML\Auth\Source::getById($state['exampleauth:AuthID']); if ($source === NULL) { /* * The only way this should fail is if we remove or rename the authentication source @@ -235,7 +241,7 @@ class sspmod_exampleauth_Auth_Source_External extends SimpleSAML_Auth_Source { */ $state['Attributes'] = $attributes; - SimpleSAML_Auth_Source::completeAuth($state); + \SimpleSAML\Auth\Source::completeAuth($state); /* * The completeAuth-function never returns, so we never get this far. diff --git a/modules/exampleauth/lib/Auth/Source/Static.php b/modules/exampleauth/lib/Auth/Source/Static.php index 8c5eba05715bceea091c129b8ec79e56f8d722dd..33d63eb1a14d14723675591acfa649d33223b6c0 100644 --- a/modules/exampleauth/lib/Auth/Source/Static.php +++ b/modules/exampleauth/lib/Auth/Source/Static.php @@ -9,9 +9,9 @@ * @author Olav Morken, UNINETT AS. * @package SimpleSAMLphp */ -class sspmod_exampleauth_Auth_Source_Static extends SimpleSAML_Auth_Source { - +class sspmod_exampleauth_Auth_Source_Static extends \SimpleSAML\Auth\Source +{ /** * The attributes we return. */ diff --git a/modules/exampleauth/lib/Auth/Source/UserPass.php b/modules/exampleauth/lib/Auth/Source/UserPass.php index 96d2abe2c39d84a1577552f66a2b6734a4cc34ad..8be6d76d7732791fdadc0dcc8f96d78733f45f32 100644 --- a/modules/exampleauth/lib/Auth/Source/UserPass.php +++ b/modules/exampleauth/lib/Auth/Source/UserPass.php @@ -9,9 +9,9 @@ * @author Olav Morken, UNINETT AS. * @package SimpleSAMLphp */ -class sspmod_exampleauth_Auth_Source_UserPass extends sspmod_core_Auth_UserPassBase { - +class sspmod_exampleauth_Auth_Source_UserPass extends sspmod_core_Auth_UserPassBase +{ /** * Our users, stored in an associative array. The key of the array is "<username>:<password>", * while the value of each element is a new array with the attributes for each user. diff --git a/modules/exampleauth/www/authpage.php b/modules/exampleauth/www/authpage.php index 73fcb131ecd9df5ce0bd4b82a41ad5502e0e95a1..5f176ec4ff8d6283271651907a51b32a1b40efbe 100644 --- a/modules/exampleauth/www/authpage.php +++ b/modules/exampleauth/www/authpage.php @@ -29,7 +29,7 @@ $returnTo = \SimpleSAML\Utils\HTTP::checkURLAllowed($_REQUEST['ReturnTo']); if (!preg_match('@State=(.*)@', $returnTo, $matches)) { die('Invalid ReturnTo URL for this example.'); } -SimpleSAML_Auth_State::loadState(urldecode($matches[1]), 'exampleauth:External'); +\SimpleSAML\Auth\State::loadState(urldecode($matches[1]), 'exampleauth:External'); /* * The loadState-function will not return if the second parameter does not diff --git a/modules/exampleauth/www/redirecttest.php b/modules/exampleauth/www/redirecttest.php index d56fa26a690aaf18433088128576663ccb26791b..103d262af775f8ff590b6e10233185e51402fc45 100644 --- a/modules/exampleauth/www/redirecttest.php +++ b/modules/exampleauth/www/redirecttest.php @@ -10,8 +10,8 @@ if (!array_key_exists('StateId', $_REQUEST)) { throw new \SimpleSAML\Error\BadRequest('Missing required StateId query parameter.'); } -$state = SimpleSAML_Auth_State::loadState($_REQUEST['StateId'], 'exampleauth:redirectfilter-test'); +$state = \SimpleSAML\Auth\State::loadState($_REQUEST['StateId'], 'exampleauth:redirectfilter-test'); $state['Attributes']['RedirectTest2'] = array('OK'); -SimpleSAML_Auth_ProcessingChain::resumeProcessing($state); +\SimpleSAML\Auth\ProcessingChain::resumeProcessing($state); diff --git a/modules/exampleauth/www/resume.php b/modules/exampleauth/www/resume.php index 08d66dd3f490d198e5467665d21204d8c6afd64b..e7ff5f8a60be08446dbbdd92794935f2b5e729ea 100644 --- a/modules/exampleauth/www/resume.php +++ b/modules/exampleauth/www/resume.php @@ -8,4 +8,5 @@ * * @package SimpleSAMLphp */ + sspmod_exampleauth_Auth_Source_External::resume(); diff --git a/modules/expirycheck/lib/Auth/Process/ExpiryDate.php b/modules/expirycheck/lib/Auth/Process/ExpiryDate.php index c315169fa97f29ec7079be03d925f06723de3332..858047bbca53793cf57a698501d47eb0769e6dfd 100644 --- a/modules/expirycheck/lib/Auth/Process/ExpiryDate.php +++ b/modules/expirycheck/lib/Auth/Process/ExpiryDate.php @@ -20,7 +20,7 @@ * @package SimpleSAMLphp */ -class sspmod_expirycheck_Auth_Process_ExpiryDate extends SimpleSAML_Auth_ProcessingFilter { +class sspmod_expirycheck_Auth_Process_ExpiryDate extends \SimpleSAML\Auth\ProcessingFilter { private $warndaysbefore = 0; private $netid_attr = NULL; @@ -132,7 +132,7 @@ class sspmod_expirycheck_Auth_Process_ExpiryDate extends SimpleSAML_Auth_Process // Save state and redirect $state['expireOnDate'] = date($this->date_format, $expireOnDate); $state['netId'] = $netId; - $id = SimpleSAML_Auth_State::saveState($state, 'expirywarning:about2expire'); + $id = \SimpleSAML\Auth\State::saveState($state, 'expirywarning:about2expire'); $url = SimpleSAML\Module::getModuleURL('expirycheck/about2expire.php'); \SimpleSAML\Utils\HTTP::redirectTrustedURL($url, array('StateId' => $id)); } @@ -144,7 +144,7 @@ class sspmod_expirycheck_Auth_Process_ExpiryDate extends SimpleSAML_Auth_Process /* Save state and redirect. */ $state['expireOnDate'] = date($this->date_format, $expireOnDate); $state['netId'] = $netId; - $id = SimpleSAML_Auth_State::saveState($state, 'expirywarning:expired'); + $id = \SimpleSAML\Auth\State::saveState($state, 'expirywarning:expired'); $url = SimpleSAML\Module::getModuleURL('expirycheck/expired.php'); \SimpleSAML\Utils\HTTP::redirectTrustedURL($url, array('StateId' => $id)); diff --git a/modules/expirycheck/www/about2expire.php b/modules/expirycheck/www/about2expire.php index 99c134614d6f0e029901be9d79ed0d9684887e60..56e2fdc13f19c62969999a2c1ab9972e1a4f222b 100644 --- a/modules/expirycheck/www/about2expire.php +++ b/modules/expirycheck/www/about2expire.php @@ -12,11 +12,11 @@ if (!array_key_exists('StateId', $_REQUEST)) { throw new \SimpleSAML\Error\BadRequest('Missing required StateId query parameter.'); } $id = $_REQUEST['StateId']; -$state = \SimpleSAML_Auth_State::loadState($id, 'expirywarning:about2expire'); +$state = \SimpleSAML\Auth\State::loadState($id, 'expirywarning:about2expire'); if (array_key_exists('yes', $_REQUEST)) { // The user has pressed the yes-button - \SimpleSAML_Auth_ProcessingChain::resumeProcessing($state); + \SimpleSAML\Auth\ProcessingChain::resumeProcessing($state); } $globalConfig = \SimpleSAML\Configuration::getInstance(); diff --git a/modules/expirycheck/www/expired.php b/modules/expirycheck/www/expired.php index 27470b7f08bc787a3ff48285c1a42282c70f3829..2d3d3b3e8d2d1f63dd164b11349183cccf999dbc 100644 --- a/modules/expirycheck/www/expired.php +++ b/modules/expirycheck/www/expired.php @@ -11,7 +11,7 @@ if (!array_key_exists('StateId', $_REQUEST)) { throw new \SimpleSAML\Error\BadRequest('Missing required StateId query parameter.'); } -$state = \SimpleSAML_Auth_State::loadState($_REQUEST['StateId'], 'expirywarning:expired'); +$state = \SimpleSAML\Auth\State::loadState($_REQUEST['StateId'], 'expirywarning:expired'); $globalConfig = \SimpleSAML\Configuration::getInstance(); diff --git a/modules/ldap/lib/Auth/Process/AttributeAddFromLDAP.php b/modules/ldap/lib/Auth/Process/AttributeAddFromLDAP.php index e788d268906f944afddb984aa30d039c405d754a..eeb39071af78aeca332c8a4036a9efb1d0f54bb9 100644 --- a/modules/ldap/lib/Auth/Process/AttributeAddFromLDAP.php +++ b/modules/ldap/lib/Auth/Process/AttributeAddFromLDAP.php @@ -150,7 +150,7 @@ class sspmod_ldap_Auth_Process_AttributeAddFromLDAP extends sspmod_ldap_Auth_Pro $arrSearch[] = '%'.$attr.'%'; if (strlen($val[0]) > 0) { - $arrReplace[] = SimpleSAML_Auth_LDAP::escape_filter_value($val[0]); + $arrReplace[] = \SimpleSAML\Auth\LDAP::escape_filter_value($val[0]); } else { $arrReplace[] = ''; } diff --git a/modules/ldap/lib/Auth/Process/BaseFilter.php b/modules/ldap/lib/Auth/Process/BaseFilter.php index c0834ea0ac9b2e894182ecc3057f357d7999c937..c4fb9120e3d8499b90a915bfe5528731c6983267 100644 --- a/modules/ldap/lib/Auth/Process/BaseFilter.php +++ b/modules/ldap/lib/Auth/Process/BaseFilter.php @@ -13,7 +13,7 @@ * @package SimpleSAMLphp */ -abstract class sspmod_ldap_Auth_Process_BaseFilter extends SimpleSAML_Auth_ProcessingFilter +abstract class sspmod_ldap_Auth_Process_BaseFilter extends \SimpleSAML\Auth\ProcessingFilter { /** * List of attribute "alias's" linked to the real attribute @@ -48,7 +48,7 @@ abstract class sspmod_ldap_Auth_Process_BaseFilter extends SimpleSAML_Auth_Proce * Instance, object of the ldap connection. Stored here to * be access later during processing. * - * @var sspmod_ldap_LdapConnection + * @var \SimpleSAML\Auth\Ldap */ private $ldap; @@ -254,7 +254,7 @@ abstract class sspmod_ldap_Auth_Process_BaseFilter extends SimpleSAML_Auth_Proce * rather than setting in the constructor to avoid unnecessarily * connecting to LDAP when it might not be needed. * - * @return sspmod_ldap_LdapConnection + * @return \SimpleSAML\Auth\Ldap */ protected function getLdap() { @@ -287,7 +287,7 @@ abstract class sspmod_ldap_Auth_Process_BaseFilter extends SimpleSAML_Auth_Proce ); // Connect to the LDAP server to be queried during processing - $this->ldap = new SimpleSAML_Auth_LDAP($hostname, $enable_tls, $debug, $timeout, $port, $referrals); + $this->ldap = new \SimpleSAML\Auth\LDAP($hostname, $enable_tls, $debug, $timeout, $port, $referrals); $this->ldap->bind($username, $password); // All done diff --git a/modules/ldap/lib/ConfigHelper.php b/modules/ldap/lib/ConfigHelper.php index 2d199a868beacb6bb10e021ff549884dbca155f7..e1f0fb64bc6adac38b4016821d79d6c493285820 100644 --- a/modules/ldap/lib/ConfigHelper.php +++ b/modules/ldap/lib/ConfigHelper.php @@ -189,7 +189,7 @@ class sspmod_ldap_ConfigHelper throw new \SimpleSAML\Error\Error('WRONGUSERPASS'); } - $ldap = new SimpleSAML_Auth_LDAP($this->hostname, $this->enableTLS, $this->debug, $this->timeout, $this->port, $this->referrals); + $ldap = new \SimpleSAML\Auth\LDAP($this->hostname, $this->enableTLS, $this->debug, $this->timeout, $this->port, $this->referrals); if (!$this->searchEnable) { $ldapusername = addcslashes($username, ',+"\\<>;*'); @@ -255,7 +255,7 @@ class sspmod_ldap_ConfigHelper */ public function searchfordn($attribute, $value, $allowZeroHits) { - $ldap = new SimpleSAML_Auth_LDAP($this->hostname, + $ldap = new \SimpleSAML\Auth\LDAP($this->hostname, $this->enableTLS, $this->debug, $this->timeout, @@ -282,7 +282,7 @@ class sspmod_ldap_ConfigHelper $attributes = $this->attributes; } - $ldap = new SimpleSAML_Auth_LDAP($this->hostname, + $ldap = new \SimpleSAML\Auth\LDAP($this->hostname, $this->enableTLS, $this->debug, $this->timeout, diff --git a/modules/multiauth/lib/Auth/Source/MultiAuth.php b/modules/multiauth/lib/Auth/Source/MultiAuth.php index f026f8c5ec90a1569c93671d4a073bfb18d4d103..1a46678d3910284acc6916623cc8cd9d16944ddf 100644 --- a/modules/multiauth/lib/Auth/Source/MultiAuth.php +++ b/modules/multiauth/lib/Auth/Source/MultiAuth.php @@ -8,7 +8,7 @@ * @package SimpleSAMLphp */ -class sspmod_multiauth_Auth_Source_MultiAuth extends SimpleSAML_Auth_Source +class sspmod_multiauth_Auth_Source_MultiAuth extends \SimpleSAML\Auth\Source { /** * The key of the AuthId field in the state. @@ -108,7 +108,7 @@ class sspmod_multiauth_Auth_Source_MultiAuth extends SimpleSAML_Auth_Source $state[self::SOURCESID] = $this->sources; /* Save the $state array, so that we can restore if after a redirect */ - $id = SimpleSAML_Auth_State::saveState($state, self::STAGEID); + $id = \SimpleSAML\Auth\State::saveState($state, self::STAGEID); /* Redirect to the select source page. We include the identifier of the saved state array as a parameter to the login form */ @@ -142,7 +142,7 @@ class sspmod_multiauth_Auth_Source_MultiAuth extends SimpleSAML_Auth_Source assert(is_string($authId)); assert(is_array($state)); - $as = SimpleSAML_Auth_Source::getById($authId); + $as = \SimpleSAML\Auth\Source::getById($authId); $valid_sources = array_map( function($src) { return $src['source']; @@ -160,12 +160,12 @@ class sspmod_multiauth_Auth_Source_MultiAuth extends SimpleSAML_Auth_Source try { $as->authenticate($state); } catch (\SimpleSAML\Error\Exception $e) { - SimpleSAML_Auth_State::throwException($state, $e); - } catch (Exception $e) { + \SimpleSAML\Auth\State::throwException($state, $e); + } catch (\Exception $e) { $e = new \SimpleSAML\Error\UnserializableException($e); - SimpleSAML_Auth_State::throwException($state, $e); + \SimpleSAML\Auth\State::throwException($state, $e); } - SimpleSAML_Auth_Source::completeAuth($state); + \SimpleSAML\Auth\Source::completeAuth($state); } /** @@ -183,9 +183,9 @@ class sspmod_multiauth_Auth_Source_MultiAuth extends SimpleSAML_Auth_Source $session = \SimpleSAML\Session::getSessionFromRequest(); $authId = $session->getData(self::SESSION_SOURCE, $this->authId); - $source = SimpleSAML_Auth_Source::getById($authId); + $source = \SimpleSAML\Auth\Source::getById($authId); if ($source === NULL) { - throw new Exception('Invalid authentication source during logout: ' . $source); + throw new \Exception('Invalid authentication source during logout: ' . $source); } /* Then, do the logout on it */ $source->logout($state); diff --git a/modules/multiauth/www/selectsource.php b/modules/multiauth/www/selectsource.php index 00ccff26bf937cf9c88ef38522145248e40ede64..d04e556eae1b2de2806249345377313dbdb55f8f 100644 --- a/modules/multiauth/www/selectsource.php +++ b/modules/multiauth/www/selectsource.php @@ -15,11 +15,11 @@ if (!array_key_exists('AuthState', $_REQUEST)) { throw new \SimpleSAML\Error\BadRequest('Missing AuthState parameter.'); } $authStateId = $_REQUEST['AuthState']; -$state = \SimpleSAML_Auth_State::loadState($authStateId, sspmod_multiauth_Auth_Source_MultiAuth::STAGEID); +$state = \SimpleSAML\Auth\State::loadState($authStateId, sspmod_multiauth_Auth_Source_MultiAuth::STAGEID); -if (array_key_exists("SimpleSAML_Auth_Source.id", $state)) { - $authId = $state["SimpleSAML_Auth_Source.id"]; - $as = \SimpleSAML_Auth_Source::getById($authId); +if (array_key_exists("\SimpleSAML\Auth\Source.id", $state)) { + $authId = $state["\SimpleSAML\Auth\Source.id"]; + $as = \SimpleSAML\Auth\Source::getById($authId); } else { $as = NULL; } diff --git a/modules/negotiate/docs/negotiate.md b/modules/negotiate/docs/negotiate.md index a57044de9bb5f059a1c0767b5751c5c29f95c7b4..968d56eaf1567019cecf3ac6f0a051345e8c274a 100644 --- a/modules/negotiate/docs/negotiate.md +++ b/modules/negotiate/docs/negotiate.md @@ -196,23 +196,23 @@ One can add this bit of code to the template in the fallback AuthN module: // This should be placed in your www script -$nego_session = FALSE; -$nego_perm = FALSE; -$nego_retry = NULL; +$nego_session = false; +$nego_perm = false; +$nego_retry = null; if (array_key_exists('negotiate:authId', $state)) { - $nego = SimpleSAML_Auth_Source::getById($state['negotiate:authId']); + $nego = \SimpleSAML\Auth\Source::getById($state['negotiate:authId']); $mask = $nego->checkMask(); $disabled = $nego->spDisabledInMetadata($spMetadata); $session_disabled = $session->getData('negotiate:disable', 'session'); if ($mask and !$disabled) { if(array_key_exists('NEGOTIATE_AUTOLOGIN_DISABLE_PERMANENT', $_COOKIE) && $_COOKIE['NEGOTIATE_AUTOLOGIN_DISABLE_PERMANENT'] == 'True') { - $nego_perm = TRUE; + $nego_perm = true; } elseif ($session_disabled) { - $retryState = SimpleSAML_Auth_State::cloneState($state); - unset($retryState[SimpleSAML_Auth_State::ID]); - $nego_retry = SimpleSAML_Auth_State::saveState($retryState, 'sspmod_negotiate_Auth_Source_Negotiate.StageId'); - $nego_session = TRUE; + $retryState = \SimpleSAML\Auth\State::cloneState($state); + unset($retryState[\SimpleSAML\Auth\State::ID]); + $nego_retry = \SimpleSAML\Auth\State::saveState($retryState, 'sspmod_negotiate_Auth_Source_Negotiate.StageId'); + $nego_session = true; } } } diff --git a/modules/negotiate/lib/Auth/Source/Negotiate.php b/modules/negotiate/lib/Auth/Source/Negotiate.php index 37cdfc6146c45f195923975c43693b700d6537f7..d144e28555dcaaa43fd508744d9816f606f86b45 100644 --- a/modules/negotiate/lib/Auth/Source/Negotiate.php +++ b/modules/negotiate/lib/Auth/Source/Negotiate.php @@ -7,7 +7,7 @@ * @package SimpleSAMLphp */ -class sspmod_negotiate_Auth_Source_Negotiate extends SimpleSAML_Auth_Source +class sspmod_negotiate_Auth_Source_Negotiate extends \SimpleSAML\Auth\Source { // Constants used in the module const STAGEID = 'sspmod_negotiate_Auth_Source_Negotiate.StageId'; @@ -118,7 +118,7 @@ class sspmod_negotiate_Auth_Source_Negotiate extends SimpleSAML_Auth_Source SimpleSAML\Logger::debug('Negotiate - authenticate(): looking for Negotiate'); if (!empty($_SERVER['HTTP_AUTHORIZATION'])) { SimpleSAML\Logger::debug('Negotiate - authenticate(): Negotiate found'); - $this->ldap = new SimpleSAML_Auth_LDAP( + $this->ldap = new \SimpleSAML\Auth\LDAP( $this->hostname, $this->enableTLS, $this->debugLDAP, @@ -157,7 +157,7 @@ class sspmod_negotiate_Auth_Source_Negotiate extends SimpleSAML_Auth_Source 'negotiate:backend' => null, ); SimpleSAML\Logger::info('Negotiate - authenticate(): '.$user.' authorized.'); - SimpleSAML_Auth_Source::completeAuth($state); + \SimpleSAML\Auth\Source::completeAuth($state); // Never reached. assert(false); } @@ -170,7 +170,7 @@ class sspmod_negotiate_Auth_Source_Negotiate extends SimpleSAML_Auth_Source SimpleSAML\Logger::debug('Negotiate - authenticate(): Sending Negotiate.'); // Save the $state array, so that we can restore if after a redirect SimpleSAML\Logger::debug('Negotiate - fallback: '.$state['LogoutState']['negotiate:backend']); - $id = SimpleSAML_Auth_State::saveState($state, self::STAGEID); + $id = \SimpleSAML\Auth\State::saveState($state, self::STAGEID); $params = array('AuthState' => $id); $this->sendNegotiate($params); @@ -271,15 +271,15 @@ EOF; if ($authId === null) { throw new \SimpleSAML\Error\Error(array(500, "Unable to determine auth source.")); } - $source = \SimpleSAML_Auth_Source::getById($authId); + $source = \SimpleSAML\Auth\Source::getById($authId); try { $source->authenticate($state); } catch (\SimpleSAML\Error\Exception $e) { - \SimpleSAML_Auth_State::throwException($state, $e); + \SimpleSAML\Auth\State::throwException($state, $e); } catch (\Exception $e) { $e = new \SimpleSAML\Error\UnserializableException($e); - SimpleSAML_Auth_State::throwException($state, $e); + \SimpleSAML\Auth\State::throwException($state, $e); } // fallBack never returns after loginCompleted() SimpleSAML\Logger::debug('Negotiate: backend returned'); @@ -357,7 +357,7 @@ EOF; $session->setData('negotiate:disable', 'session', true, 24 * 60 * 60); parent::logout($state); } else { - $source = SimpleSAML_Auth_Source::getById($authId); + $source = \SimpleSAML\Auth\Source::getById($authId); $source->logout($state); } } diff --git a/modules/negotiate/www/backend.php b/modules/negotiate/www/backend.php index 5fa2619a4f160044026be82006777f31198a2373..7c97aa4b91341d2ca5843660a43e83dc095b220c 100644 --- a/modules/negotiate/www/backend.php +++ b/modules/negotiate/www/backend.php @@ -8,8 +8,8 @@ * @package SimpleSAMLphp */ -$state = SimpleSAML_Auth_State::loadState($_REQUEST['AuthState'], sspmod_negotiate_Auth_Source_Negotiate::STAGEID); -SimpleSAML\Logger::debug('backend - fallback: '.$state['LogoutState']['negotiate:backend']); +$state = \SimpleSAML\Auth\State::loadState($_REQUEST['AuthState'], sspmod_negotiate_Auth_Source_Negotiate::STAGEID); +\SimpleSAML\Logger::debug('backend - fallback: '.$state['LogoutState']['negotiate:backend']); sspmod_negotiate_Auth_Source_Negotiate::fallBack($state); diff --git a/modules/negotiate/www/retry.php b/modules/negotiate/www/retry.php index ee792df4df2f4ce2dcb8877ca7d7560b6630c50b..046963c591a9f2edf9ffd773bc36b2b794ef4f7f 100644 --- a/modules/negotiate/www/retry.php +++ b/modules/negotiate/www/retry.php @@ -8,14 +8,14 @@ * */ -$state = \SimpleSAML_Auth_State::loadState($_REQUEST['AuthState'], sspmod_negotiate_Auth_Source_Negotiate::STAGEID); +$state = \SimpleSAML\Auth\State::loadState($_REQUEST['AuthState'], sspmod_negotiate_Auth_Source_Negotiate::STAGEID); $metadata = \SimpleSAML\Metadata\MetaDataStorageHandler::getMetadataHandler(); $idpid = $metadata->getMetaDataCurrentEntityID('saml20-idp-hosted', 'metaindex'); $idpmeta = $metadata->getMetaData($idpid, 'saml20-idp-hosted'); if (isset($idpmeta['auth'])) { - $source = \SimpleSAML_Auth_Source::getById($idpmeta['auth']); + $source = \SimpleSAML\Auth\Source::getById($idpmeta['auth']); if ($source === null) { throw new \SimpleSAML\Error\BadRequest('Invalid AuthId "' . $idpmeta['auth'] . '" - not found.'); } diff --git a/modules/oauth/www/registry.edit.php b/modules/oauth/www/registry.edit.php index 1e750d2edb1859e0e6dc33efb238159c9972a31a..3331667cb182e273ae947ae53ed0090f82b2d57b 100644 --- a/modules/oauth/www/registry.edit.php +++ b/modules/oauth/www/registry.edit.php @@ -17,7 +17,7 @@ if ($session->isValid($authsource)) { throw new Exception('User ID is missing'); $userid = $attributes[$useridattr][0]; } else { - $as = \SimpleSAML_Auth_Source::getById($authsource); + $as = \SimpleSAML\Auth\Source::getById($authsource); $as->initLogin(\SimpleSAML\Utils\HTTP::getSelfURL()); } diff --git a/modules/oauth/www/registry.php b/modules/oauth/www/registry.php index c13ce18a4f604c81a9fac0cb1f9d10dbbb9e5a53..54ff396e1c2f172d4ba51794b3fe7343a8610bd8 100644 --- a/modules/oauth/www/registry.php +++ b/modules/oauth/www/registry.php @@ -17,7 +17,7 @@ if ($session->isValid($authsource)) { throw new Exception('User ID is missing'); $userid = $attributes[$useridattr][0]; } else { - $as = \SimpleSAML_Auth_Source::getById($authsource); + $as = \SimpleSAML\Auth\Source::getById($authsource); $as->initLogin(\SimpleSAML\Utils\HTTP::getSelfURL()); } diff --git a/modules/preprodwarning/lib/Auth/Process/Warning.php b/modules/preprodwarning/lib/Auth/Process/Warning.php index 9ece3fa4bd5532eff56e96a36dfb66c6c5ede471..ffeb13320cc644d70e84e5839ac6f7a1ddd060a1 100644 --- a/modules/preprodwarning/lib/Auth/Process/Warning.php +++ b/modules/preprodwarning/lib/Auth/Process/Warning.php @@ -5,10 +5,9 @@ * * @package SimpleSAMLphp */ -class sspmod_preprodwarning_Auth_Process_Warning extends SimpleSAML_Auth_ProcessingFilter { - - +class sspmod_preprodwarning_Auth_Process_Warning extends \SimpleSAML\Auth\ProcessingFilter +{ /** * Process a authentication response. * @@ -26,11 +25,8 @@ class sspmod_preprodwarning_Auth_Process_Warning extends SimpleSAML_Auth_Process } // Save state and redirect. - $id = SimpleSAML_Auth_State::saveState($state, 'warning:request'); - $url = SimpleSAML\Module::getModuleURL('preprodwarning/showwarning.php'); + $id = \SimpleSAML\Auth\State::saveState($state, 'warning:request'); + $url = \SimpleSAML\Module::getModuleURL('preprodwarning/showwarning.php'); \SimpleSAML\Utils\HTTP::redirectTrustedURL($url, array('StateId' => $id)); } - - - } diff --git a/modules/preprodwarning/www/showwarning.php b/modules/preprodwarning/www/showwarning.php index 47235c1d8f55ec7af7f460649699915b5256364a..41eff20555e739aceb016ba574a55162637410fa 100644 --- a/modules/preprodwarning/www/showwarning.php +++ b/modules/preprodwarning/www/showwarning.php @@ -13,11 +13,11 @@ if (!array_key_exists('StateId', $_REQUEST)) { throw new \SimpleSAML\Error\BadRequest('Missing required StateId query parameter.'); } $id = $_REQUEST['StateId']; -$state = \SimpleSAML_Auth_State::loadState($id, 'warning:request'); +$state = \SimpleSAML\Auth\State::loadState($id, 'warning:request'); if (array_key_exists('yes', $_REQUEST)) { // The user has pressed the yes-button - \SimpleSAML_Auth_ProcessingChain::resumeProcessing($state); + \SimpleSAML\Auth\ProcessingChain::resumeProcessing($state); } $globalConfig = \SimpleSAML\Configuration::getInstance(); diff --git a/modules/saml/hooks/hook_metadata_hosted.php b/modules/saml/hooks/hook_metadata_hosted.php index f94d19ff7b37c19012f4a56c3e91fc74d2193ae0..d27f5246d619e48f054b9b53b44229f747946f5d 100644 --- a/modules/saml/hooks/hook_metadata_hosted.php +++ b/modules/saml/hooks/hook_metadata_hosted.php @@ -10,7 +10,7 @@ function saml_hook_metadata_hosted(&$metadataHosted) { assert(is_array($metadataHosted)); - $sources = SimpleSAML_Auth_Source::getSourcesOfType('saml:SP'); + $sources = \SimpleSAML\Auth\Source::getSourcesOfType('saml:SP'); foreach ($sources as $source) { $metadata = $source->getMetadata(); diff --git a/modules/saml/lib/Auth/Process/AuthnContextClassRef.php b/modules/saml/lib/Auth/Process/AuthnContextClassRef.php index 371004b6ab279e781267af5d53ac6e0ecaf12432..afb701cb47ab117d7c17466a97ff7c691d702234 100644 --- a/modules/saml/lib/Auth/Process/AuthnContextClassRef.php +++ b/modules/saml/lib/Auth/Process/AuthnContextClassRef.php @@ -6,7 +6,7 @@ * * @package SimpleSAMLphp */ -class sspmod_saml_Auth_Process_AuthnContextClassRef extends SimpleSAML_Auth_ProcessingFilter +class sspmod_saml_Auth_Process_AuthnContextClassRef extends \SimpleSAML\Auth\ProcessingFilter { /** * The URI we should set as the AuthnContextClassRef in the login response. diff --git a/modules/saml/lib/Auth/Process/ExpectedAuthnContextClassRef.php b/modules/saml/lib/Auth/Process/ExpectedAuthnContextClassRef.php index be3ae00aa5f3ae40efd324f1181bfc63d113bdd7..1569c6d3d784610471468386e1e84c25f99b6865 100644 --- a/modules/saml/lib/Auth/Process/ExpectedAuthnContextClassRef.php +++ b/modules/saml/lib/Auth/Process/ExpectedAuthnContextClassRef.php @@ -16,7 +16,7 @@ * @package SimpleSAMLphp */ -class sspmod_saml_Auth_Process_ExpectedAuthnContextClassRef extends SimpleSAML_Auth_ProcessingFilter +class sspmod_saml_Auth_Process_ExpectedAuthnContextClassRef extends \SimpleSAML\Auth\ProcessingFilter { /** @@ -89,13 +89,13 @@ class sspmod_saml_Auth_Process_ExpectedAuthnContextClassRef extends SimpleSAML_A */ protected function unauthorized(&$request) { - SimpleSAML\Logger::error( + \SimpleSAML\Logger::error( 'ExpectedAuthnContextClassRef: Invalid authentication context: '.$this->AuthnContextClassRef. '. Accepted values are: '.var_export($this->accepted, true) ); - $id = SimpleSAML_Auth_State::saveState($request, 'saml:ExpectedAuthnContextClassRef:unauthorized'); - $url = SimpleSAML\Module::getModuleURL( + $id = \SimpleSAML\Auth\State::saveState($request, 'saml:ExpectedAuthnContextClassRef:unauthorized'); + $url = \SimpleSAML\Module::getModuleURL( 'saml/sp/wrong_authncontextclassref.php' ); \SimpleSAML\Utils\HTTP::redirectTrustedURL($url, array('StateId' => $id)); diff --git a/modules/saml/lib/Auth/Process/FilterScopes.php b/modules/saml/lib/Auth/Process/FilterScopes.php index 15aa9fbb2255ab6b3b658f44f7f6f83bc626bb85..7b972e62571b08f20e118e892dcafb5ccbca50fd 100644 --- a/modules/saml/lib/Auth/Process/FilterScopes.php +++ b/modules/saml/lib/Auth/Process/FilterScopes.php @@ -11,7 +11,7 @@ use SimpleSAML\Logger; * @author Jaime Pérez Crespo, UNINETT AS <jaime.perez@uninett.no> * @package SimpleSAMLphp */ -class FilterScopes extends \SimpleSAML_Auth_ProcessingFilter +class FilterScopes extends \SimpleSAML\Auth\ProcessingFilter { /** * Stores any pre-configured scoped attributes which come from the filter configuration. diff --git a/modules/saml/lib/Auth/Process/NameIDAttribute.php b/modules/saml/lib/Auth/Process/NameIDAttribute.php index 865456dcdbe069b0a93437cbe76821f61048aa46..f141bd792444106ce02a7bff455c2bfcdbe5923c 100644 --- a/modules/saml/lib/Auth/Process/NameIDAttribute.php +++ b/modules/saml/lib/Auth/Process/NameIDAttribute.php @@ -6,7 +6,7 @@ * * @package SimpleSAMLphp */ -class sspmod_saml_Auth_Process_NameIDAttribute extends SimpleSAML_Auth_ProcessingFilter +class sspmod_saml_Auth_Process_NameIDAttribute extends \SimpleSAML\Auth\ProcessingFilter { /** * The attribute we should save the NameID in. diff --git a/modules/saml/lib/Auth/Process/PersistentNameID2TargetedID.php b/modules/saml/lib/Auth/Process/PersistentNameID2TargetedID.php index abc0590aecf0a3512032ac5ab343413f19bc0e6d..84a717fdcf5bf5910baf6a1e968de967da238beb 100644 --- a/modules/saml/lib/Auth/Process/PersistentNameID2TargetedID.php +++ b/modules/saml/lib/Auth/Process/PersistentNameID2TargetedID.php @@ -6,7 +6,7 @@ * @package SimpleSAMLphp */ -class sspmod_saml_Auth_Process_PersistentNameID2TargetedID extends SimpleSAML_Auth_ProcessingFilter +class sspmod_saml_Auth_Process_PersistentNameID2TargetedID extends \SimpleSAML\Auth\ProcessingFilter { /** * The attribute we should save the NameID in. diff --git a/modules/saml/lib/Auth/Source/SP.php b/modules/saml/lib/Auth/Source/SP.php index b1a59d31d074b23aa9b2ba8ee5fe2bcf016cfe05..7aa29e2e30772d4d3f823d4ec28284ff72e9e79e 100644 --- a/modules/saml/lib/Auth/Source/SP.php +++ b/modules/saml/lib/Auth/Source/SP.php @@ -1,6 +1,9 @@ <?php -class sspmod_saml_Auth_Source_SP extends SimpleSAML_Auth_Source +use SimpleSAML\Auth\Source; +use SimpleSAML\Auth\State; + +class sspmod_saml_Auth_Source_SP extends Source { /** * The entity ID of this SP. @@ -147,7 +150,7 @@ class sspmod_saml_Auth_Source_SP extends SimpleSAML_Auth_Source $ar = new \SimpleSAML\XML\Shib13\AuthnRequest(); $ar->setIssuer($this->entityId); - $id = SimpleSAML_Auth_State::saveState($state, 'saml:sp:sso'); + $id = State::saveState($state, 'saml:sp:sso'); $ar->setRelayState($id); $useArtifact = $idpMetadata->getBoolean('saml1.useartifact', null); @@ -177,7 +180,7 @@ class sspmod_saml_Auth_Source_SP extends SimpleSAML_Auth_Source private function startSSO2(\SimpleSAML\Configuration $idpMetadata, array $state) { if (isset($state['saml:ProxyCount']) && $state['saml:ProxyCount'] < 0) { - SimpleSAML_Auth_State::throwException( + State::throwException( $state, new \SimpleSAML\Module\saml\Error\ProxyCountExceeded(\SAML2\Constants::STATUS_RESPONDER) ); @@ -187,8 +190,8 @@ class sspmod_saml_Auth_Source_SP extends SimpleSAML_Auth_Source $ar->setAssertionConsumerServiceURL(SimpleSAML\Module::getModuleURL('saml/sp/saml2-acs.php/' . $this->authId)); - if (isset($state['SimpleSAML_Auth_Source.ReturnURL'])) { - $ar->setRelayState($state['SimpleSAML_Auth_Source.ReturnURL']); + if (isset($state['\SimpleSAML\Auth\Source.ReturnURL'])) { + $ar->setRelayState($state['\SimpleSAML\Auth\Source.ReturnURL']); } if (isset($state['saml:AuthnContextClassRef'])) { @@ -270,7 +273,7 @@ class sspmod_saml_Auth_Source_SP extends SimpleSAML_Auth_Source // save IdP entity ID as part of the state $state['ExpectedIssuer'] = $idpMetadata->getString('entityid'); - $id = SimpleSAML_Auth_State::saveState($state, 'saml:sp:sso', true); + $id = State::saveState($state, 'saml:sp:sso', true); $ar->setId($id); SimpleSAML\Logger::debug('Sending SAML 2 AuthnRequest to ' . @@ -344,7 +347,7 @@ class sspmod_saml_Auth_Source_SP extends SimpleSAML_Auth_Source */ private function startDisco(array $state) { - $id = SimpleSAML_Auth_State::saveState($state, 'saml:sp:sso'); + $id = State::saveState($state, 'saml:sp:sso'); $discoURL = $this->discoURL; if ($discoURL === null) { @@ -535,7 +538,7 @@ class sspmod_saml_Auth_Source_SP extends SimpleSAML_Auth_Source } // save the state WITHOUT a restart URL, so that we don't try an IdP-initiated login if something goes wrong - $id = SimpleSAML_Auth_State::saveState($state, 'saml:proxy:invalid_idp', true); + $id = State::saveState($state, 'saml:proxy:invalid_idp', true); $url = SimpleSAML\Module::getModuleURL('saml/proxy/invalid_session.php'); SimpleSAML\Utils\HTTP::redirectTrustedURL($url, array('AuthState' => $id)); assert(false); @@ -574,7 +577,7 @@ class sspmod_saml_Auth_Source_SP extends SimpleSAML_Auth_Source // Update session state $session = \SimpleSAML\Session::getSessionFromRequest(); $authId = $state['saml:sp:AuthId']; - $session->doLogin($authId, SimpleSAML_Auth_State::getPersistentAuthData($state)); + $session->doLogin($authId, State::getPersistentAuthData($state)); // resume the login process call_user_func($state['ReturnCallback'], $state); @@ -599,7 +602,7 @@ class sspmod_saml_Auth_Source_SP extends SimpleSAML_Auth_Source $state['Responder'] = $state['saml:proxy:reauthLogout:PrevResponder']; } - $sp = SimpleSAML_Auth_Source::getById($state['saml:sp:AuthId'], 'sspmod_saml_Auth_Source_SP'); + $sp = Source::getById($state['saml:sp:AuthId'], 'sspmod_saml_Auth_Source_SP'); /** @var sspmod_saml_Auth_Source_SP $authSource */ SimpleSAML\Logger::debug('Proxy: logging in again.'); $sp->authenticate($state); @@ -618,7 +621,7 @@ class sspmod_saml_Auth_Source_SP extends SimpleSAML_Auth_Source assert(array_key_exists('saml:logout:NameID', $state)); assert(array_key_exists('saml:logout:SessionIndex', $state)); - $id = SimpleSAML_Auth_State::saveState($state, 'saml:slosent'); + $id = State::saveState($state, 'saml:slosent'); $idp = $state['saml:logout:IdP']; $nameId = $state['saml:logout:NameID']; @@ -717,7 +720,7 @@ class sspmod_saml_Auth_Source_SP extends SimpleSAML_Auth_Source $authProcState['saml:sp:SessionIndex'] = $state['saml:sp:SessionIndex']; } - $pc = new SimpleSAML_Auth_ProcessingChain($idpMetadataArray, $spMetadataArray, 'sp'); + $pc = new \SimpleSAML\Auth\ProcessingChain($idpMetadataArray, $spMetadataArray, 'sp'); $pc->processState($authProcState); self::onProcessingCompleted($authProcState); @@ -756,7 +759,7 @@ class sspmod_saml_Auth_Source_SP extends SimpleSAML_Auth_Source assert(is_string($redirectTo)); $session = \SimpleSAML\Session::getSessionFromRequest(); - $session->doLogin($authId, SimpleSAML_Auth_State::getPersistentAuthData($state)); + $session->doLogin($authId, State::getPersistentAuthData($state)); \SimpleSAML\Utils\HTTP::redirectUntrustedURL($redirectTo); } @@ -776,7 +779,7 @@ class sspmod_saml_Auth_Source_SP extends SimpleSAML_Auth_Source $state = $authProcState['saml:sp:State']; $sourceId = $state['saml:sp:AuthId']; - $source = SimpleSAML_Auth_Source::getById($sourceId); + $source = Source::getById($sourceId); if ($source === null) { throw new Exception('Could not find authentication source with id ' . $sourceId); } @@ -795,6 +798,6 @@ class sspmod_saml_Auth_Source_SP extends SimpleSAML_Auth_Source self::handleUnsolicitedAuth($sourceId, $state, $redirectTo); } - SimpleSAML_Auth_Source::completeAuth($state); + Source::completeAuth($state); } } diff --git a/modules/saml/lib/BaseNameIDGenerator.php b/modules/saml/lib/BaseNameIDGenerator.php index cea1c219688933cf1115bca0641a7f95dfe876f7..d4981fcc382fb6d8d8335701598f1e4c58b2abcf 100644 --- a/modules/saml/lib/BaseNameIDGenerator.php +++ b/modules/saml/lib/BaseNameIDGenerator.php @@ -5,7 +5,7 @@ * * @package SimpleSAMLphp */ -abstract class sspmod_saml_BaseNameIDGenerator extends SimpleSAML_Auth_ProcessingFilter +abstract class sspmod_saml_BaseNameIDGenerator extends \SimpleSAML\Auth\ProcessingFilter { /** * What NameQualifier should be used. diff --git a/modules/saml/lib/IdP/SAML1.php b/modules/saml/lib/IdP/SAML1.php index 2f5d81b29a459cd5b62c038014ef5ef928a0f6cf..9a11c4de602aaf0de4365f2b50bf5a1912e7c9ac 100644 --- a/modules/saml/lib/IdP/SAML1.php +++ b/modules/saml/lib/IdP/SAML1.php @@ -124,7 +124,7 @@ class sspmod_saml_IdP_SAML1 $state = array( 'Responder' => array('sspmod_saml_IdP_SAML1', 'sendResponse'), 'SPMetadata' => $spMetadata->toArray(), - SimpleSAML_Auth_State::RESTART => $sessionLostURL, + \SimpleSAML\Auth\State::RESTART => $sessionLostURL, 'saml:shire' => $shire, 'saml:target' => $target, 'saml:AuthnRequestReceivedAt' => microtime(true), diff --git a/modules/saml/lib/IdP/SAML2.php b/modules/saml/lib/IdP/SAML2.php index 6e708477388e90d09029071d2fa8b07238ac9007..ef3a53427fb5bc3ed71f6b067ef5d7be9fe49b37 100644 --- a/modules/saml/lib/IdP/SAML2.php +++ b/modules/saml/lib/IdP/SAML2.php @@ -412,8 +412,8 @@ class sspmod_saml_IdP_SAML2 $state = array( 'Responder' => array('sspmod_saml_IdP_SAML2', 'sendResponse'), - SimpleSAML_Auth_State::EXCEPTION_HANDLER_FUNC => array('sspmod_saml_IdP_SAML2', 'handleAuthError'), - SimpleSAML_Auth_State::RESTART => $sessionLostURL, + \SimpleSAML\Auth\State::EXCEPTION_HANDLER_FUNC => array('sspmod_saml_IdP_SAML2', 'handleAuthError'), + \SimpleSAML\Auth\State::RESTART => $sessionLostURL, 'SPMetadata' => $spMetadata->toArray(), 'saml:RelayState' => $relayState, diff --git a/modules/saml/www/proxy/invalid_session.php b/modules/saml/www/proxy/invalid_session.php index 4ce213bdf54f1603b6804233f36793a5e3c7bada..934373a5a6b31189ad2fee93892f350be2190039 100644 --- a/modules/saml/www/proxy/invalid_session.php +++ b/modules/saml/www/proxy/invalid_session.php @@ -16,10 +16,10 @@ if (!array_key_exists('AuthState', $_REQUEST)) { try { // try to get the state - $state = \SimpleSAML_Auth_State::loadState($_REQUEST['AuthState'], 'saml:proxy:invalid_idp'); + $state = \SimpleSAML\Auth\State::loadState($_REQUEST['AuthState'], 'saml:proxy:invalid_idp'); } catch (\Exception $e) { // the user probably hit the back button after starting the logout, try to recover the state with another stage - $state = \SimpleSAML_Auth_State::loadState($_REQUEST['AuthState'], 'core:Logout:afterbridge'); + $state = \SimpleSAML\Auth\State::loadState($_REQUEST['AuthState'], 'core:Logout:afterbridge'); // success! Try to continue with reauthentication, since we no longer have a valid session here $idp = \SimpleSAML_IdP::getById($state['core:IdP']); @@ -28,7 +28,7 @@ try { if (isset($_POST['cancel'])) { // the user does not want to logout, cancel login - \SimpleSAML_Auth_State::throwException( + \SimpleSAML\Auth\State::throwException( $state, new \SimpleSAML\Module\saml\Error\NoAvailableIDP( \SAML2\Constants::STATUS_RESPONDER, @@ -39,7 +39,7 @@ if (isset($_POST['cancel'])) { if (isset($_POST['continue'])) { // log the user out before being able to login again - $as = \SimpleSAML_Auth_Source::getById($state['saml:sp:AuthId'], 'sspmod_saml_Auth_Source_SP'); + $as = \SimpleSAML\Auth\Source::getById($state['saml:sp:AuthId'], 'sspmod_saml_Auth_Source_SP'); /** @var \sspmod_saml_Auth_Source_SP $as */ $as->reauthLogout($state); } diff --git a/modules/saml/www/sp/discoresp.php b/modules/saml/www/sp/discoresp.php index 3c83ff167c3b4e05b5296dcb4ab36fa90e27ad58..7c7bb68a533c66a09c677227b763de30e3805701 100644 --- a/modules/saml/www/sp/discoresp.php +++ b/modules/saml/www/sp/discoresp.php @@ -11,13 +11,13 @@ if (!array_key_exists('AuthID', $_REQUEST)) { if (!array_key_exists('idpentityid', $_REQUEST)) { throw new \SimpleSAML\Error\BadRequest('Missing idpentityid to discovery service response handler'); } -$state = SimpleSAML_Auth_State::loadState($_REQUEST['AuthID'], 'saml:sp:sso'); +$state = \SimpleSAML\Auth\State::loadState($_REQUEST['AuthID'], 'saml:sp:sso'); // Find authentication source assert(array_key_exists('saml:sp:AuthId', $state)); $sourceId = $state['saml:sp:AuthId']; -$source = SimpleSAML_Auth_Source::getById($sourceId); +$source = \SimpleSAML\Auth\Source::getById($sourceId); if ($source === null) { throw new Exception('Could not find authentication source with id ' . $sourceId); } diff --git a/modules/saml/www/sp/metadata.php b/modules/saml/www/sp/metadata.php index 10766a65d3dd2ddef7c662e0d0a331fc3664ec5a..eb78a0dfce3009861dfc5544ae93f74c6ea30f58 100644 --- a/modules/saml/www/sp/metadata.php +++ b/modules/saml/www/sp/metadata.php @@ -9,7 +9,7 @@ if ($config->getBoolean('admin.protectmetadata', false)) { \SimpleSAML\Utils\Auth::requireAdmin(); } $sourceId = substr($_SERVER['PATH_INFO'], 1); -$source = \SimpleSAML_Auth_Source::getById($sourceId); +$source = \SimpleSAML\Auth\Source::getById($sourceId); if ($source === null) { throw new \SimpleSAML\Error\AuthSource($sourceId, 'Could not find authentication source.'); } diff --git a/modules/saml/www/sp/saml1-acs.php b/modules/saml/www/sp/saml1-acs.php index 9d88974415317cf638dd65507ac906339926957c..7d7dbc0c57cd7a1e65035fae68a7989789581e38 100644 --- a/modules/saml/www/sp/saml1-acs.php +++ b/modules/saml/www/sp/saml1-acs.php @@ -21,7 +21,7 @@ if ($end === false) { } $sourceId = substr($sourceId, 1, $end - 1); -$source = SimpleSAML_Auth_Source::getById($sourceId, 'sspmod_saml_Auth_Source_SP'); +$source = \SimpleSAML\Auth\Source::getById($sourceId, 'sspmod_saml_Auth_Source_SP'); SimpleSAML\Logger::debug('Received SAML1 response'); @@ -35,7 +35,7 @@ if (preg_match('@^https?://@i', $target)) { 'saml:sp:RelayState' => \SimpleSAML\Utils\HTTP::checkURLAllowed($target), ); } else { - $state = SimpleSAML_Auth_State::loadState($_REQUEST['TARGET'], 'saml:sp:sso'); + $state = \SimpleSAML\Auth\State::loadState($_REQUEST['TARGET'], 'saml:sp:sso'); // Check that the authentication source is correct. assert(array_key_exists('saml:sp:AuthId', $state)); diff --git a/modules/saml/www/sp/saml2-acs.php b/modules/saml/www/sp/saml2-acs.php index 4c8a328a1b7e240f23563a471878faa6bcd2faea..2bb3b9fe33b11a2d72e324ab318966af55496f79 100644 --- a/modules/saml/www/sp/saml2-acs.php +++ b/modules/saml/www/sp/saml2-acs.php @@ -9,7 +9,7 @@ if (!array_key_exists('PATH_INFO', $_SERVER)) { } $sourceId = substr($_SERVER['PATH_INFO'], 1); -$source = SimpleSAML_Auth_Source::getById($sourceId, 'sspmod_saml_Auth_Source_SP'); +$source = \SimpleSAML\Auth\Source::getById($sourceId, 'sspmod_saml_Auth_Source_SP'); $spMetadata = $source->getMetadata(); try { @@ -77,7 +77,7 @@ $stateId = $response->getInResponseTo(); if (!empty($stateId)) { // this should be a response to a request we sent earlier try { - $state = SimpleSAML_Auth_State::loadState($stateId, 'saml:sp:sso'); + $state = \SimpleSAML\Auth\State::loadState($stateId, 'saml:sp:sso'); } catch (Exception $e) { // something went wrong, SimpleSAML\Logger::warning('Could not load state specified by InResponseTo: '.$e->getMessage(). @@ -130,7 +130,7 @@ try { } catch (sspmod_saml_Error $e) { // the status of the response wasn't "success" $e = $e->toException(); - SimpleSAML_Auth_State::throwException($state, $e); + \SimpleSAML\Auth\State::throwException($state, $e); } @@ -148,7 +148,7 @@ foreach ($assertions as $assertion) { $aID = $assertion->getId(); if ($store->get('saml.AssertionReceived', $aID) !== null) { $e = new \SimpleSAML\Error\Exception('Received duplicate assertion.'); - SimpleSAML_Auth_State::throwException($state, $e); + \SimpleSAML\Auth\State::throwException($state, $e); } $notOnOrAfter = $assertion->getNotOnOrAfter(); @@ -185,7 +185,7 @@ foreach ($assertions as $assertion) { if (!$foundAuthnStatement) { $e = new \SimpleSAML\Error\Exception('No AuthnStatement found in assertion(s).'); - SimpleSAML_Auth_State::throwException($state, $e); + \SimpleSAML\Auth\State::throwException($state, $e); } if ($expire !== null) { @@ -247,8 +247,8 @@ $state['saml:sp:prevAuth'] = array( 'id' => $response->getId(), 'issuer' => $idp, ); -if (isset($state['SimpleSAML_Auth_Source.ReturnURL'])) { - $state['saml:sp:prevAuth']['redirect'] = $state['SimpleSAML_Auth_Source.ReturnURL']; +if (isset($state['\SimpleSAML\Auth\Source.ReturnURL'])) { + $state['saml:sp:prevAuth']['redirect'] = $state['\SimpleSAML\Auth\Source.ReturnURL']; } elseif (isset($state['saml:sp:RelayState'])) { $state['saml:sp:prevAuth']['redirect'] = $state['saml:sp:RelayState']; } diff --git a/modules/saml/www/sp/saml2-logout.php b/modules/saml/www/sp/saml2-logout.php index f6e2f0e9d21dfda20be05ed7ac375bae4bb58d9d..5b1da5e55cd7c780764c4da66124f9c13a35aa3e 100644 --- a/modules/saml/www/sp/saml2-logout.php +++ b/modules/saml/www/sp/saml2-logout.php @@ -12,7 +12,7 @@ if (!array_key_exists('PATH_INFO', $_SERVER)) { $sourceId = substr($_SERVER['PATH_INFO'], 1); -$source = SimpleSAML_Auth_Source::getById($sourceId); +$source = \SimpleSAML\Auth\Source::getById($sourceId); if ($source === null) { throw new \Exception('Could not find authentication source with id ' . $sourceId); } @@ -61,17 +61,17 @@ if ($message instanceof \SAML2\LogoutResponse) { } if (!$message->isSuccess()) { - SimpleSAML\Logger::warning('Unsuccessful logout. Status was: ' . sspmod_saml_Message::getResponseError($message)); + \SimpleSAML\Logger::warning('Unsuccessful logout. Status was: ' . sspmod_saml_Message::getResponseError($message)); } - $state = SimpleSAML_Auth_State::loadState($relayState, 'saml:slosent'); + $state = \SimpleSAML\Auth\State::loadState($relayState, 'saml:slosent'); $state['saml:sp:LogoutStatus'] = $message->getStatus(); - SimpleSAML_Auth_Source::completeLogout($state); + \SimpleSAML\Auth\Source::completeLogout($state); } elseif ($message instanceof \SAML2\LogoutRequest) { - SimpleSAML\Logger::debug('module/saml2/sp/logout: Request from ' . $idpEntityId); - SimpleSAML\Logger::stats('saml20-idp-SLO idpinit ' . $spEntityId . ' ' . $idpEntityId); + \SimpleSAML\Logger::debug('module/saml2/sp/logout: Request from ' . $idpEntityId); + \SimpleSAML\Logger::stats('saml20-idp-SLO idpinit ' . $spEntityId . ' ' . $idpEntityId); if ($message->isNameIdEncrypted()) { try { @@ -86,11 +86,11 @@ if ($message instanceof \SAML2\LogoutResponse) { foreach ($keys as $i => $key) { try { $message->decryptNameId($key, $blacklist); - SimpleSAML\Logger::debug('Decryption with key #' . $i . ' succeeded.'); + \SimpleSAML\Logger::debug('Decryption with key #' . $i . ' succeeded.'); $lastException = null; break; } catch (\Exception $e) { - SimpleSAML\Logger::debug('Decryption with key #' . $i . ' failed with exception: ' . $e->getMessage()); + \SimpleSAML\Logger::debug('Decryption with key #' . $i . ' failed with exception: ' . $e->getMessage()); $lastException = $e; } } @@ -115,7 +115,7 @@ if ($message instanceof \SAML2\LogoutResponse) { $lr->setInResponseTo($message->getId()); if ($numLoggedOut < count($sessionIndexes)) { - SimpleSAML\Logger::warning('Logged out of ' . $numLoggedOut . ' of ' . count($sessionIndexes) . ' sessions.'); + \SimpleSAML\Logger::warning('Logged out of ' . $numLoggedOut . ' of ' . count($sessionIndexes) . ' sessions.'); } $dst = $idpMetadata->getEndpointPrioritizedByBinding('SingleLogoutService', array( diff --git a/modules/smartattributes/lib/Auth/Process/SmartID.php b/modules/smartattributes/lib/Auth/Process/SmartID.php index 4d3f0a30d9f2081fd924dc89a2c8fb4eb450a317..cf0b7036c3ed9fe67a67fa8221c9458354556067 100644 --- a/modules/smartattributes/lib/Auth/Process/SmartID.php +++ b/modules/smartattributes/lib/Auth/Process/SmartID.php @@ -1,6 +1,6 @@ <?php -class sspmod_smartattributes_Auth_Process_SmartID extends SimpleSAML_Auth_ProcessingFilter +class sspmod_smartattributes_Auth_Process_SmartID extends \SimpleSAML\Auth\ProcessingFilter { /** * Which attributes to use as identifiers? diff --git a/modules/smartattributes/lib/Auth/Process/SmartName.php b/modules/smartattributes/lib/Auth/Process/SmartName.php index 23e71fd851d5bb09a3e78bc3433540af40b051c4..b41e6aabca24f0484ccef4bd4d1eace24c43382a 100644 --- a/modules/smartattributes/lib/Auth/Process/SmartName.php +++ b/modules/smartattributes/lib/Auth/Process/SmartName.php @@ -6,7 +6,8 @@ * @author Andreas Åkre Solberg, UNINETT AS. * @package SimpleSAMLphp */ -class sspmod_smartattributes_Auth_Process_SmartName extends SimpleSAML_Auth_ProcessingFilter + +class sspmod_smartattributes_Auth_Process_SmartName extends \SimpleSAML\Auth\ProcessingFilter { /** * Attributes which should be added/appended. diff --git a/tests/lib/SimpleSAML/Auth/SourceTest.php b/tests/lib/SimpleSAML/Auth/SourceTest.php index 0cbf1e849027d7bf63493d449160591915dad832..e51781d72d6392c98eff242d00a2a2c630b0e7b4 100644 --- a/tests/lib/SimpleSAML/Auth/SourceTest.php +++ b/tests/lib/SimpleSAML/Auth/SourceTest.php @@ -6,13 +6,14 @@ use SimpleSAML\Auth\SourceFactory; use SimpleSAML\Test\Utils\ClearStateTestCase; /** - * Tests for SimpleSAML_Auth_Source + * Tests for \SimpleSAML\Auth\Source */ + class SourceTest extends ClearStateTestCase { public function testParseAuthSource() { - $class = new \ReflectionClass('SimpleSAML_Auth_Source'); + $class = new \ReflectionClass('\SimpleSAML\Auth\Source'); $method = $class->getMethod('parseAuthSource'); $method->setAccessible(true); @@ -26,7 +27,7 @@ class SourceTest extends ClearStateTestCase } } -class TestAuthSource extends \SimpleSAML_Auth_Source +class TestAuthSource extends \SimpleSAML\Auth\Source { public function authenticate(&$state) { diff --git a/tests/lib/SimpleSAML/Auth/StateTest.php b/tests/lib/SimpleSAML/Auth/StateTest.php index 0edb0b20ec8b2a94549f2e4a09aba1776b0d79fd..b9bc2b5c4bb62ee399d0319546e13deb0a11e7a2 100644 --- a/tests/lib/SimpleSAML/Auth/StateTest.php +++ b/tests/lib/SimpleSAML/Auth/StateTest.php @@ -3,12 +3,10 @@ use PHPUnit\Framework\TestCase; /** - * Tests for SimpleSAML_Auth_State + * Tests for \SimpleSAML\Auth\State */ class Auth_StateTest extends TestCase { - - /** * Test the getPersistentAuthData() function. */ @@ -29,7 +27,7 @@ class Auth_StateTest extends TestCase $expected = $mandatory; $this->assertEquals( $expected, - SimpleSAML_Auth_State::getPersistentAuthData($state), + \SimpleSAML\Auth\State::getPersistentAuthData($state), 'Mandatory state attributes did not survive as expected'.print_r($expected, true) ); @@ -39,7 +37,7 @@ class Auth_StateTest extends TestCase $expected = $state; $this->assertEquals( $expected, - SimpleSAML_Auth_State::getPersistentAuthData($state), + \SimpleSAML\Auth\State::getPersistentAuthData($state), 'Some error occurred with missing mandatory parameters' ); @@ -52,7 +50,7 @@ class Auth_StateTest extends TestCase $expected = $mandatory; $this->assertEquals( $expected, - SimpleSAML_Auth_State::getPersistentAuthData($state), + \SimpleSAML\Auth\State::getPersistentAuthData($state), 'Additional parameters survived' ); @@ -64,7 +62,7 @@ class Auth_StateTest extends TestCase unset($expected['PersistentAuthData']); $this->assertEquals( $expected, - SimpleSAML_Auth_State::getPersistentAuthData($state), + \SimpleSAML\Auth\State::getPersistentAuthData($state), 'Some error occurred with additional, persistent parameters' ); @@ -75,7 +73,7 @@ class Auth_StateTest extends TestCase unset($expected['PersistentAuthData']); $this->assertEquals( $expected, - SimpleSAML_Auth_State::getPersistentAuthData($state), + \SimpleSAML\Auth\State::getPersistentAuthData($state), 'Some error occurred with additional, persistent parameters, and no mandatory ones' ); } diff --git a/tests/lib/SimpleSAML/ModuleTest.php b/tests/lib/SimpleSAML/ModuleTest.php index bf5efbc7ec7992e1f9266cf554e227ec58ff94ce..8cb330896613f2ac69410072e5155007b871d6d2 100644 --- a/tests/lib/SimpleSAML/ModuleTest.php +++ b/tests/lib/SimpleSAML/ModuleTest.php @@ -112,8 +112,8 @@ class ModuleTest extends TestCase // test for valid subclasses $this->assertEquals('sspmod_core_Auth_Process_PHP', Module::resolveClass( 'core:PHP', - 'Auth_Process', - 'SimpleSAML_Auth_ProcessingFilter' + 'Auth\Process', + '\SimpleSAML\Auth\ProcessingFilter' )); } }