Skip to content
Snippets Groups Projects
  1. Jul 22, 2016
  2. Jul 20, 2016
  3. Jul 19, 2016
    • Jaime Pérez's avatar
      Do not enforce reading the configuration from files. · 8eaf60b1
      Jaime Pérez authored
      The www/_include.php script, included by all scripts in www/, checks unconditionally for the existence of the config.php file. However, this prevents us from testing the scripts automatically. Instead of checking for the file, we just try to load the configuration, and live with it if it works. That way we can pre-load the configuration using SimpleSAML_Configuration::loadFromArray(), as we are doing in some tests.
      8eaf60b1
  4. Jul 15, 2016
    • Thijs Kinkhorst's avatar
    • Jaime Pérez's avatar
      bugfix: Restore the capability to get our self URL when invoked from a third-party script. · e8ee8c83
      Jaime Pérez authored
      Recent fixes for URL guessing and building addressed bugs in the code that were preventing the 'baseurlpath' from being used properly. However, they introduced a new issue, as the code was assuming the current URL would always point to a SimpleSAMLphp script. This is not always true, of course, as any script can invoke our API and end up trying to get its own URL (for example, when calling requireAuth()).
      
      In order to fix this, we monitor mismatches between SimpleSAMLphp's installation path and the absolute, real path to the current script. When there's a mismatch, it means we are running a third-party script outside SimpleSAMLphp, and therefore we should NOT enforce 'baseurlpath'. This introduces an additional issue, as applications behind a reverse proxy may cause trouble to guess the right URL (we will use the URL as seen by SimpleSAMLphp in the server, which is not necessarily the same as the user sees with a reverse proxy in between). For the moment, we'll leave the responsibility to sort that issue out to implementors. It might be a good idea to add a page to the wiki explaining how to do this.
      
      This resolves #418.
      e8ee8c83
    • Thijs Kinkhorst's avatar
      NL translation of warnings_outdated · e6fffdcb
      Thijs Kinkhorst authored
      e6fffdcb
  5. Jul 14, 2016
  6. Jul 13, 2016
  7. Jul 07, 2016
  8. Jul 06, 2016
    • Jaime Pérez Crespo's avatar
      Merge pull request #398 from ghalse/update-authwindowslive · 923ad7d5
      Jaime Pérez Crespo authored
      Update the authwindowslive:LiveID module to use OAuth 2.0 authorization
      923ad7d5
    • Guy Halse's avatar
      PSR-2 updates suggested by @jaimeperez · f7cdf2f0
      Guy Halse authored
      Improve the comment around error=user_denied
      f7cdf2f0
    • Guy Halse's avatar
      Update the authwindowslive:LiveID module to use OAuth 2.0 authorization · 059d7540
      Guy Halse authored
      rather than the discontinued OAuth WRAP. Attributes are now retrieved
      from the Microsoft Graph API rather than the Messenger API.
      059d7540
    • Jaime Pérez's avatar
      bugfix: Exception handler compatible with PHP 7. · b2bfd47d
      Jaime Pérez authored
      PHP 7 changed the way it handles internal errors. Now, Exception objects inherit from the Throwable interface, as well as the new Error objects. Internal functions throw Error objects now instead of raising an error, so the exception handler would need to handle them as well. Therefore, the exception handler is no longer guaranteed to receive an Exception object. We need now to discern whether the parameter is an exception (and continue our business as usual), or an Error (in case such thing exists, only PHP 7), and in this last case parse it and let the error handler do its stuff.
      
      This should resolve #330.
      b2bfd47d
    • Jaime Pérez's avatar
      bugfix: Make sure the PDO and Serialize metadata storage handlers return... · 1fa16596
      Jaime Pérez authored
      bugfix: Make sure the PDO and Serialize metadata storage handlers return metadata containing the 'entityid' key.
      
      While investigating issue #393, we noticed that these two handlers don't enforce the entity ID of each entity to be set in the 'entityid' key of the metadata array (the Flatfile and XML handlers to enforce this). Since this is the way we propagate the entity ID (code using metadata won't necessarily have access to the key of the metadata array containing the entity ID, or such a thing might not even exist), we need to make sure the entity ID is set inside the array. Otherwise, if the metadata for an entity does not contain it directly, the 'ExpectedIssuer' would be set to null, an error recorded, and authentication would fail as the entity ID of the IdP issuing an assertion would not match.
      1fa16596
  9. Jul 05, 2016
    • Jaime Pérez's avatar
      bugfix: Restore support for windows machines. · 93793d93
      Jaime Pérez authored
      Due to recent changes to fix the way we were building URLs (mixing what the 'baseurlpath' configuration option and the current URL, see #396), we introduced another bug by assuming file paths will always use slashes ('/'), which obviously is not true in Windows machines. This commit fixes SimpleSAML_Configuration::getBaseDir() and SimpleSAML\Utils\HTTP::getSelfURL() to take that into account.
      
      This closes #414.
      93793d93
  10. Jul 04, 2016
  11. Jul 03, 2016
  12. Jul 02, 2016
    • Jaime Pérez's avatar
      metadata: Add support for SHA2 digests when signing self metadata. · e86e40f4
      Jaime Pérez authored
      The hash algorithm to use to calculate signature digests for self metadata was not configurable. Add the 'metadata.sign.algorithm' configuration option to fix that.
      
      This resolves #411.
      e86e40f4
    • Jaime Pérez's avatar
      bugfix: Stop SimpleSAML_SessionHandler::newSessionId() from initializing the session. · 4056af12
      Jaime Pérez authored
      Historically, SimpleSAML_SessionHandler::newSessionId() has also created the session, sending the cookies to the browser. This is problematic both because given the name of the method one would not assume such behaviour, and also because even for transient sessions the handler would then try to set cookies. When we are using a transient session, it is likely to be because we cannot set cookies or because there was a temporary error when loading the session. If we try to set the cookies even for transient sessions, we could either get an error because cookies cannot be set, or overwrite the previous session cookies with transient ones, trashing a legitimate session in case a temporary error occurs.
      
      As a side effect, this can also cause behaviours like the one described in issue #413. There's no point in trying to set the cookies when it's not possible, so we shouldn't even try, and save us the errors.
      
      To fix this, we made SimpleSAML_SessionHandler::setCookie() abstract, forcing each extending class to implement it. The former implementation is moved to SimpleSAML_SessionHandlerCookie, and the SimpleSAML_SessionHandlerPHP gets a new method that starts the session, effectively sending the cookie. SimpleSAML_Session would then be responsible to call the setCookie() method of the session handler when creating a regular session, and skip it when creating a transient one. This introduces a bug, since SimpleSAML_Session was trying to set the auth token cookie calling the same setCookie() method in the session handler. We fixed that by using SimpleSAML\Utils\HTTP::setCookie() instead, in 8756835b.
      
      This resolves #413.
      4056af12
    • Jaime Pérez's avatar
      Remove superfluous code. · 5a1edb83
      Jaime Pérez authored
      If we just called isset() on SimpleSAML_Session::$instance, and it returned false as we continued execution, it makes no sense to get the "previous" instance since it will always be null. We can just check that $instance is not null later.
      5a1edb83
Loading