Remove samlIDPSSODescriptorSingleSignOnServiceSOAP from everywhere

environments/ppa-mbqj77/deployments/1
Xavier Guimard 9 years ago
parent abf8aba001
commit 1b88459c31
  1. 2
      lemonldap-ng-common/lib/Lemonldap/NG/Common/Conf/DefaultValues.pm
  2. 2
      lemonldap-ng-common/lib/Lemonldap/NG/Common/Conf/ReConstants.pm
  3. 4
      lemonldap-ng-common/lib/Lemonldap/NG/Common/Conf/SAML/Metadata.pm
  4. 5
      lemonldap-ng-manager/lib/Lemonldap/NG/Manager/Attributes.pm
  5. 6
      lemonldap-ng-manager/lib/Lemonldap/NG/Manager/Build/Attributes.pm
  6. 1
      lemonldap-ng-manager/lib/Lemonldap/NG/Manager/Build/Tree.pm
  7. 1
      lemonldap-ng-manager/site/static/languages/en.json
  8. 1
      lemonldap-ng-manager/site/static/languages/fr.json
  9. 2
      lemonldap-ng-manager/site/static/reverseTree.json
  10. 2
      lemonldap-ng-manager/site/static/struct.json
  11. 5
      lemonldap-ng-manager/t/jsonfiles/01-base-tree.json
  12. 6
      lemonldap-ng-manager/t/jsonfiles/02-base-tree-all-nodes-opened.json
  13. 6
      lemonldap-ng-manager/t/jsonfiles/12-modified.json
  14. 6
      lemonldap-ng-manager/t/jsonfiles/14-bad.json
  15. 6
      lemonldap-ng-portal/lib/Lemonldap/NG/Portal/Issuer/SAML.pm

@ -228,8 +228,6 @@ sub defaultValues {
'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST;#PORTAL#/saml/singleSignOn;',
'samlIDPSSODescriptorSingleSignOnServiceHTTPRedirect' =>
'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect;#PORTAL#/saml/singleSignOn;',
'samlIDPSSODescriptorSingleSignOnServiceSOAP' =>
'urn:oasis:names:tc:SAML:2.0:bindings:SOAP;#PORTAL#/saml/singleSignOnSOAP;',
'samlIDPSSODescriptorWantAuthnRequestsSigned' => 1,
'samlMetadataForceUTF8' => 1,
'samlNameIDFormatMapEmail' => 'mail',

@ -58,7 +58,7 @@ our $issuerParameters = {
issuerDBOpenIDConnect => [qw(issuerDBOpenIDConnectActivation issuerDBOpenIDConnectPath issuerDBOpenIDConnectRule)],
issuerDBSAML => [qw(issuerDBSAMLActivation issuerDBSAMLPath issuerDBSAMLRule)],
};
our $samlServiceParameters = [qw(samlEntityID samlServicePrivateKeySig samlServicePrivateKeySigPwd samlServicePublicKeySig samlServicePrivateKeyEnc samlServicePrivateKeyEncPwd samlServicePublicKeyEnc samlServiceUseCertificateInResponse samlNameIDFormatMapEmail samlNameIDFormatMapX509 samlNameIDFormatMapWindows samlNameIDFormatMapKerberos samlAuthnContextMapPassword samlAuthnContextMapPasswordProtectedTransport samlAuthnContextMapTLSClient samlAuthnContextMapKerberos samlOrganizationDisplayName samlOrganizationName samlOrganizationURL samlSPSSODescriptorAuthnRequestsSigned samlSPSSODescriptorWantAssertionsSigned samlSPSSODescriptorSingleLogoutServiceHTTPRedirect samlSPSSODescriptorSingleLogoutServiceHTTPPost samlSPSSODescriptorSingleLogoutServiceSOAP samlSPSSODescriptorAssertionConsumerServiceHTTPArtifact samlSPSSODescriptorAssertionConsumerServiceHTTPPost samlSPSSODescriptorArtifactResolutionServiceArtifact samlIDPSSODescriptorWantAuthnRequestsSigned samlIDPSSODescriptorSingleSignOnServiceHTTPRedirect samlIDPSSODescriptorSingleSignOnServiceHTTPPost samlIDPSSODescriptorSingleSignOnServiceHTTPArtifact samlIDPSSODescriptorSingleSignOnServiceSOAP samlIDPSSODescriptorSingleLogoutServiceHTTPRedirect samlIDPSSODescriptorSingleLogoutServiceHTTPPost samlIDPSSODescriptorSingleLogoutServiceSOAP samlIDPSSODescriptorArtifactResolutionServiceArtifact samlAttributeAuthorityDescriptorAttributeServiceSOAP samlIdPResolveCookie samlMetadataForceUTF8 samlStorage samlStorageOptions samlRelayStateTimeout samlUseQueryStringSpecific samlCommonDomainCookieActivation samlCommonDomainCookieDomain samlCommonDomainCookieReader samlCommonDomainCookieWriter)];
our $samlServiceParameters = [qw(samlEntityID samlServicePrivateKeySig samlServicePrivateKeySigPwd samlServicePublicKeySig samlServicePrivateKeyEnc samlServicePrivateKeyEncPwd samlServicePublicKeyEnc samlServiceUseCertificateInResponse samlNameIDFormatMapEmail samlNameIDFormatMapX509 samlNameIDFormatMapWindows samlNameIDFormatMapKerberos samlAuthnContextMapPassword samlAuthnContextMapPasswordProtectedTransport samlAuthnContextMapTLSClient samlAuthnContextMapKerberos samlOrganizationDisplayName samlOrganizationName samlOrganizationURL samlSPSSODescriptorAuthnRequestsSigned samlSPSSODescriptorWantAssertionsSigned samlSPSSODescriptorSingleLogoutServiceHTTPRedirect samlSPSSODescriptorSingleLogoutServiceHTTPPost samlSPSSODescriptorSingleLogoutServiceSOAP samlSPSSODescriptorAssertionConsumerServiceHTTPArtifact samlSPSSODescriptorAssertionConsumerServiceHTTPPost samlSPSSODescriptorArtifactResolutionServiceArtifact samlIDPSSODescriptorWantAuthnRequestsSigned samlIDPSSODescriptorSingleSignOnServiceHTTPRedirect samlIDPSSODescriptorSingleSignOnServiceHTTPPost samlIDPSSODescriptorSingleSignOnServiceHTTPArtifact samlIDPSSODescriptorSingleLogoutServiceHTTPRedirect samlIDPSSODescriptorSingleLogoutServiceHTTPPost samlIDPSSODescriptorSingleLogoutServiceSOAP samlIDPSSODescriptorArtifactResolutionServiceArtifact samlAttributeAuthorityDescriptorAttributeServiceSOAP samlIdPResolveCookie samlMetadataForceUTF8 samlStorage samlStorageOptions samlRelayStateTimeout samlUseQueryStringSpecific samlCommonDomainCookieActivation samlCommonDomainCookieDomain samlCommonDomainCookieReader samlCommonDomainCookieWriter)];
our $oidcServiceParameters = [qw(oidcServiceMetaDataIssuer oidcServiceMetaDataAuthorizeURI oidcServiceMetaDataTokenURI oidcServiceMetaDataUserInfoURI oidcServiceMetaDataJWKSURI oidcServiceMetaDataRegistrationURI oidcServiceMetaDataEndSessionURI oidcServiceMetaDataCheckSessionURI oidcServiceMetaDataAuthnContext oidcServicePrivateKeySig oidcServicePublicKeySig oidcServiceKeyIdSig oidcServiceAllowDynamicRegistration oidcServiceAllowAuthorizationCodeFlow oidcServiceAllowImplicitFlow oidcServiceAllowHybridFlow oidcStorage oidcStorageOptions)];
1;

@ -129,7 +129,6 @@ sub serviceToXML {
samlIDPSSODescriptorSingleSignOnServiceHTTPRedirect
samlIDPSSODescriptorSingleSignOnServiceHTTPPost
samlIDPSSODescriptorSingleSignOnServiceHTTPArtifact
samlIDPSSODescriptorSingleSignOnServiceSOAP
samlIDPSSODescriptorSingleLogoutServiceHTTPRedirect
samlIDPSSODescriptorSingleLogoutServiceHTTPPost
samlIDPSSODescriptorSingleLogoutServiceSOAP
@ -254,9 +253,6 @@ __DATA__
<TMPL_IF NAME="samlIDPSSODescriptorSingleSignOnServiceHTTPArtifactResponseLocation">
ResponseLocation="<TMPL_VAR NAME="samlIDPSSODescriptorSingleSignOnServiceHTTPArtifactResponseLocation">"
</TMPL_IF>/>
<SingleSignOnService
Binding="<TMPL_VAR NAME="samlIDPSSODescriptorSingleSignOnServiceSOAPBinding">"
Location="<TMPL_VAR NAME="samlIDPSSODescriptorSingleSignOnServiceSOAPLocation">" />
</IDPSSODescriptor>
<SPSSODescriptor

@ -2380,11 +2380,6 @@ qr/(?:(?:https?):\/\/(?:(?:(?:(?:(?:(?:[a-zA-Z0-9][-a-zA-Z0-9]*)?[a-zA-Z0-9])[.]
'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect;#PORTAL#/saml/singleSignOn;',
'type' => 'samlService'
},
'samlIDPSSODescriptorSingleSignOnServiceSOAP' => {
'default' =>
'urn:oasis:names:tc:SAML:2.0:bindings:SOAP;#PORTAL#/saml/singleSignOnSOAP;',
'type' => 'samlService'
},
'samlIDPSSODescriptorWantAuthnRequestsSigned' => {
'default' => 1,
'type' => 'bool'

@ -1378,12 +1378,6 @@ sub attributes {
. '#PORTAL#/saml/singleSignOnArtifact;',
documentation => 'SAML IDP SSO HTTP Artifact',
},
samlIDPSSODescriptorSingleSignOnServiceSOAP => {
type => 'samlService',
default => 'urn:oasis:names:tc:SAML:2.0:bindings:SOAP;'
. '#PORTAL#/saml/singleSignOnSOAP;',
documentation => 'SAML IDP SSO SOAP',
},
samlIDPSSODescriptorSingleLogoutServiceHTTPRedirect => {
type => 'samlService',
default => 'urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect;'

@ -784,7 +784,6 @@ sub tree {
'samlIDPSSODescriptorSingleSignOnServiceHTTPRedirect',
'samlIDPSSODescriptorSingleSignOnServiceHTTPPost',
'samlIDPSSODescriptorSingleSignOnServiceHTTPArtifact',
'samlIDPSSODescriptorSingleSignOnServiceSOAP'
]
},
{

@ -759,7 +759,6 @@
"samlIDPSSODescriptorSingleSignOnServiceHTTPRedirect": "HTTP Redirect",
"samlIDPSSODescriptorSingleSignOnServiceHTTPPost": "HTTP POST",
"samlIDPSSODescriptorSingleSignOnServiceHTTPArtifact": "HTTP Artifact",
"samlIDPSSODescriptorSingleSignOnServiceSOAP": "SOAP",
"samlIDPSSODescriptorSingleLogoutService": "Single Logout",
"samlIDPSSODescriptorSingleLogoutServiceHTTPRedirect": "HTTP Redirect",
"samlIDPSSODescriptorSingleLogoutServiceHTTPPost": "HTTP POST",

@ -759,7 +759,6 @@
"samlIDPSSODescriptorSingleSignOnServiceHTTPRedirect": "Redirection HTTP",
"samlIDPSSODescriptorSingleSignOnServiceHTTPPost": "POST HTTP",
"samlIDPSSODescriptorSingleSignOnServiceHTTPArtifact": "HTTP Artifact",
"samlIDPSSODescriptorSingleSignOnServiceSOAP": "SOAP",
"samlIDPSSODescriptorSingleLogoutService": "Single Logout",
"samlIDPSSODescriptorSingleLogoutServiceHTTPRedirect": "Redirection HTTP",
"samlIDPSSODescriptorSingleLogoutServiceHTTPPost": "POST HTTP",

File diff suppressed because one or more lines are too long

File diff suppressed because one or more lines are too long

@ -1823,11 +1823,6 @@
"id": "samlIDPSSODescriptorSingleSignOnServiceHTTPArtifact",
"title": "samlIDPSSODescriptorSingleSignOnServiceHTTPArtifact",
"type": "samlService"
}, {
"default": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP;#PORTAL#/saml/singleSignOnSOAP;",
"id": "samlIDPSSODescriptorSingleSignOnServiceSOAP",
"title": "samlIDPSSODescriptorSingleSignOnServiceSOAP",
"type": "samlService"
}],
"id": "samlIDPSSODescriptorSingleSignOnService",
"title": "samlIDPSSODescriptorSingleSignOnService"

@ -2257,12 +2257,6 @@
"title": "samlIDPSSODescriptorSingleSignOnServiceHTTPArtifact",
"type": "samlService",
"data": ["urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact", "#PORTAL#/saml/singleSignOnArtifact", ""]
}, {
"default": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP;#PORTAL#/saml/singleSignOnSOAP;",
"id": "samlIDPSSODescriptorSingleSignOnServiceSOAP",
"title": "samlIDPSSODescriptorSingleSignOnServiceSOAP",
"type": "samlService",
"data": ["urn:oasis:names:tc:SAML:2.0:bindings:SOAP", "#PORTAL#/saml/singleSignOnSOAP", ""]
}]
}, {
"id": "samlIDPSSODescriptorSingleLogoutService",

@ -2344,12 +2344,6 @@
"title": "samlIDPSSODescriptorSingleSignOnServiceHTTPArtifact",
"type": "samlService",
"data": ["urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact", "#PORTAL#/saml/singleSignOnArtifact", ""]
}, {
"default": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP;#PORTAL#/saml/singleSignOnSOAP;",
"id": "samlIDPSSODescriptorSingleSignOnServiceSOAP",
"title": "samlIDPSSODescriptorSingleSignOnServiceSOAP",
"type": "samlService",
"data": ["urn:oasis:names:tc:SAML:2.0:bindings:SOAP", "#PORTAL#/saml/singleSignOnSOAP", ""]
}]
}, {
"id": "samlIDPSSODescriptorSingleLogoutService",

@ -2257,12 +2257,6 @@
"title": "samlIDPSSODescriptorSingleSignOnServiceHTTPArtifact",
"type": "samlService",
"data": ["urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Artifact", "#PORTAL#/saml/singleSignOnArtifact", ""]
}, {
"default": "urn:oasis:names:tc:SAML:2.0:bindings:SOAP;#PORTAL#/saml/singleSignOnSOAP;",
"id": "samlIDPSSODescriptorSingleSignOnServiceSOAP",
"title": "samlIDPSSODescriptorSingleSignOnServiceSOAP",
"type": "samlService",
"data": ["urn:oasis:names:tc:SAML:2.0:bindings:SOAP", "#PORTAL#/saml/singleSignOnSOAP", ""]
}]
}, {
"id": "samlIDPSSODescriptorSingleLogoutService",

@ -27,10 +27,6 @@ sub init {
my ($self) = @_;
# Prepare SSO URL catching
my $saml_sso_soap_url =
$self->getMetaDataURL( "samlIDPSSODescriptorSingleSignOnServiceSOAP", 1 );
my $saml_sso_soap_url_ret =
$self->getMetaDataURL( "samlIDPSSODescriptorSingleSignOnServiceSOAP", 2 );
my $saml_sso_get_url = $self->getMetaDataURL(
"samlIDPSSODescriptorSingleSignOnServiceHTTPRedirect", 1 );
my $saml_sso_get_url_ret = $self->getMetaDataURL(
@ -46,7 +42,7 @@ sub init {
my $saml_sso_art_url_ret = $self->getMetaDataURL(
"samlIDPSSODescriptorSingleSignOnServiceHTTPArtifact", 2 );
$self->ssoUrlRe(
qr/^($saml_sso_soap_url|$saml_sso_soap_url_ret|$saml_sso_get_url|$saml_sso_get_url_ret|$saml_sso_post_url|$saml_sso_post_url_ret|$saml_sso_art_url|$saml_sso_art_url_ret)(?:\?.*)?$/i
qr/^($saml_sso_get_url|$saml_sso_get_url_ret|$saml_sso_post_url|$saml_sso_post_url_ret|$saml_sso_art_url|$saml_sso_art_url_ret)(?:\?.*)?$/i
);
# Launch parents initialization subroutines, then launch IdP en SP lists

Loading…
Cancel
Save