Skip to content
Snippets Groups Projects
  1. Sep 05, 2023
  2. Sep 02, 2023
  3. Sep 01, 2023
  4. Aug 25, 2023
  5. Aug 11, 2023
  6. Aug 05, 2023
  7. Aug 02, 2023
  8. Jul 30, 2023
  9. Jul 26, 2023
  10. Jul 19, 2023
  11. Jul 06, 2023
  12. Jul 05, 2023
  13. Jun 15, 2023
  14. Jun 12, 2023
  15. Jun 11, 2023
    • Tim van Dijen's avatar
      Update metadata-extensions (#1807) · 51d7ee4e
      Tim van Dijen authored
      * Migrate metadata-extensions to new interface
      
      * Bump saml2-library
      
      * Migrate md:Organization to new interface
      
      * Bump saml2 library
      
      * Drop hint.cidr functionality; use mdui:DiscoHints/IPHint instead
      
      * Migrate md:KeyDescriptor to new interface
      
      * Bump saml2 library
      
      * Migrate ds-elements to new interface from xml-security lib
      
      * Migrate md:ContactPerson to new interface
      
      * Fix hosted SP metadata generation
      
      * Fix codesniffer issues
      
      * Bump saml2-lib
      
      * Migrate md:NameIDFormat to new interface
      
      * Migrate (indexed) endpoints to new interface
      
      * Fix for NameIDFormat
      
      * Fix minor bugs
      
      * Fix long lines
      
      * Fix array key initializatino
      
      * Only add isRequired attribute when it's true
      
      * Update composer-file
      
      * Remove unnecessary test; the saml2-lib ensures a specs-compliant representation of an AttributeConsumerService-element
      
      * Fix annotation
      51d7ee4e
  16. May 22, 2023
  17. May 12, 2023
    • Tim van Dijen's avatar
      Fix some issues reported by scrutinizer · 1a911ce9
      Tim van Dijen authored
      1a911ce9
    • Tim van Dijen's avatar
      Propagate Symfony responses throughout the code (#1760) · a6458f5b
      Tim van Dijen authored
      * Migrate HTTP::redirect
      
      * Migrate HTTP::redirectTrustedURL
      
      * Migrate HTTP::redirectUntrustedURL
      
      * Migrate HTTP::submitPOSTData
      
      * Temporarily revert to make phpunit work
      
      * Migrate logout handlers
      
      * Remove unnecessary assertion & simplify logics
      
      * Remove unnecessary assertion & add new one to check response type
      
      * Remove unnecessary assertion & rationalize code
      
      * Migrate IdPDisco
      
      * Migrate ProcessingChain
      
      * Fix return-type & drop unnecessary use-statement
      
      * Address review comments
      
      * Do not add caching headers at all
      
      * Fix type-confusions
      
      * Migrate saml2 bindings
      
      * Migrate completeAuth
      
      * Migrate handleLogout
      
      * Migrate some more
      
      * Migrate a whole lot more (messy)
      
      * Migrate logout
      
      * Migrate a whole lot more (also messy)
      
      * Many fixes
      
      * Raise coverage
      
      * Psalm: Ignore exteranl adfs-module
      
      * Replace use of _GET globals
      
      * Migrate bindings (send)
      
      * Migrate bindings (receive)
      
      * Fix psalm-dev
      
      * Fix assertion
      
      * s/subclassOf/isInstanceOf
      
      * Fix type-confusion in logout handlers
      
      * Update container
      
      * Bump saml2 + adfs
      
      * Rename namespace
      a6458f5b
  18. May 04, 2023
  19. May 01, 2023
  20. Apr 25, 2023
  21. Mar 31, 2023
  22. Mar 20, 2023
  23. Mar 09, 2023
  24. Mar 08, 2023
  25. Mar 06, 2023
    • Thijs Kinkhorst's avatar
      Correct host in generated URLS for IdPs with 'host' config in admin/federation (#1781) · 2a67e9ee
      Thijs Kinkhorst authored
      It gets quite fiddly to get this right. The actual metadata (hosted on
      the `host` itself) is alreafy correct because the URL generator uses the
      'current' entity metadata and current URL. The admin interface of course
      presents all entities in one page and hence cannot rely on the current
      URL. Therefore we need to override the url host for this specific
      display case.
      
      Closes: #1774
      2a67e9ee
  26. Mar 01, 2023
    • Thijs Kinkhorst's avatar
      Validate AuthState before processing it. · ce01a590
      Thijs Kinkhorst authored
      We accept AuthState via untrusted URL parameters. As a defense in
      depth measure, validate that it conforms to our expected format
      before we output it again in HTML, feed it to a database, use the
      URL or do any further processing with it.
      
      Closes: #1706
      ce01a590
  27. Feb 28, 2023
Loading