Test Setup Failed
Branch release_2_1 (fc3642)
by Stefan
10:43
created
web/admin/action_enrollment.php 1 patch
Switch Indentation   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -49,14 +49,14 @@
 block discarded – undo
49 49
 }
50 50
 
51 51
 switch ($_GET['token']) {
52
-    case "SELF-REGISTER":
53
-        $token = "SELF-REGISTER";
54
-        $checkval = \core\UserManagement::TOKENSTATUS_OK_NEW;
55
-        $federation = \config\ConfAssistant::CONSORTIUM['selfservice_registration'];
56
-        break;
57
-    default:
58
-        $token = $validator->token(filter_input(INPUT_GET,'token',FILTER_SANITIZE_STRING));
59
-        $checkval = $usermgmt->checkTokenValidity($token);
52
+        case "SELF-REGISTER":
53
+            $token = "SELF-REGISTER";
54
+            $checkval = \core\UserManagement::TOKENSTATUS_OK_NEW;
55
+            $federation = \config\ConfAssistant::CONSORTIUM['selfservice_registration'];
56
+            break;
57
+        default:
58
+            $token = $validator->token(filter_input(INPUT_GET,'token',FILTER_SANITIZE_STRING));
59
+            $checkval = $usermgmt->checkTokenValidity($token);
60 60
 }
61 61
 
62 62
 if ($checkval < 0) {
Please login to merge, or discard this patch.
web/admin/inc/sendinvite.inc.php 1 patch
Switch Indentation   +87 added lines, -87 removed lines patch added patch discarded remove patch
@@ -98,98 +98,98 @@
 block discarded – undo
98 98
 }
99 99
 
100 100
 switch ($operationMode) {
101
-    case OPERATION_MODE_EDIT:
102
-        $idp = $validator->existingIdP($_GET['inst_id']);
103
-        // editing IdPs is done from within the popup. When we're done, send the 
104
-        // user back to the popup (append the result of the operation later)
105
-        $redirectDestination = "manageAdmins.inc.php?inst_id=" . $idp->identifier . "&";
106
-        if (count($validAddresses) == 0) {
107
-            header("Location: $redirectDestination" . "invitation=INVALIDSYNTAX");
108
-            exit(1);
109
-        }
110
-        // is the user primary admin of this IdP?
111
-        $is_owner = $idp->isPrimaryOwner($_SESSION['user']);
112
-        // check if he is (also) federation admin for the federation this IdP is in. His invitations have more blessing then.
113
-        $fedadmin = $userObject->isFederationAdmin($idp->federation);
114
-        // check if he is either one, if not, complain
115
-        if (!$is_owner && !$fedadmin) {
116
-            echo "<p>" . sprintf(_("Something's wrong... you are a %s admin, but not for the %s the requested %s belongs to!"), $uiElements->nomenclatureFed, $uiElements->nomenclatureFed, $uiElements->nomenclatureParticipant) . "</p>";
117
-            exit(1);
118
-        }
101
+        case OPERATION_MODE_EDIT:
102
+            $idp = $validator->existingIdP($_GET['inst_id']);
103
+            // editing IdPs is done from within the popup. When we're done, send the 
104
+            // user back to the popup (append the result of the operation later)
105
+            $redirectDestination = "manageAdmins.inc.php?inst_id=" . $idp->identifier . "&";
106
+            if (count($validAddresses) == 0) {
107
+                header("Location: $redirectDestination" . "invitation=INVALIDSYNTAX");
108
+                exit(1);
109
+            }
110
+            // is the user primary admin of this IdP?
111
+            $is_owner = $idp->isPrimaryOwner($_SESSION['user']);
112
+            // check if he is (also) federation admin for the federation this IdP is in. His invitations have more blessing then.
113
+            $fedadmin = $userObject->isFederationAdmin($idp->federation);
114
+            // check if he is either one, if not, complain
115
+            if (!$is_owner && !$fedadmin) {
116
+                echo "<p>" . sprintf(_("Something's wrong... you are a %s admin, but not for the %s the requested %s belongs to!"), $uiElements->nomenclatureFed, $uiElements->nomenclatureFed, $uiElements->nomenclatureParticipant) . "</p>";
117
+                exit(1);
118
+            }
119 119
 
120
-        $prettyprintname = $idp->name;
121
-        $newtokens = $mgmt->createTokens($fedadmin, $validAddresses, $idp);
122
-        $loggerInstance->writeAudit($_SESSION['user'], "NEW", "IdP " . $idp->identifier . " - Token created for " . implode(",", $validAddresses));
123
-        $introtext = "CO-ADMIN";
124
-        $participant_type = $idp->type;
125
-        break;
126
-    case OPERATION_MODE_NEWUNLINKED:
127
-        $redirectDestination = "../overview_federation.php?";
128
-        if (count($validAddresses) == 0) {
129
-            header("Location: $redirectDestination"."invitation=INVALIDSYNTAX");
130
-            exit(1);
131
-        }
132
-        // run an input check and conversion of the raw inputs... just in case
133
-        $newinstname = $validator->string($_POST['name']);
134
-        $newcountry = $validator->string($_POST['country']);
135
-        $participant_type = $validator->partType($_POST['participant_type']);
136
-        $new_idp_authorized_fedadmin = $userObject->isFederationAdmin($newcountry);
137
-        if ($new_idp_authorized_fedadmin !== TRUE) {
138
-            throw new Exception("Something's wrong... you want to create a new " . $uiElements->nomenclatureParticipant . ", but are not a " . $uiElements->nomenclatureFed . " admin for the " . $uiElements->nomenclatureFed . " it should be in!");
139
-        }
140
-        $federation = $validator->existingFederation($newcountry);
141
-        $prettyprintname = $newinstname;
142
-        $introtext = "NEW-FED";
143
-        // send the user back to his federation overview page, append the result of the operation later
144
-        // do the token creation magic
145
-        $newtokens = $mgmt->createTokens(TRUE, $validAddresses, $newinstname, 0, $newcountry, $participant_type);
146
-        $loggerInstance->writeAudit($_SESSION['user'], "NEW", "ORG FUTURE  - Token created for $participant_type " . implode(",", $validAddresses));
147
-        break;
148
-    case OPERATION_MODE_NEWFROMDB:
149
-        $redirectDestination = "../overview_federation.php?";
150
-        if (count($validAddresses) == 0) {
151
-            header("Location: $redirectDestination"."invitation=INVALIDSYNTAX");
152
-            exit(1);
153
-        }
154
-        // a real external DB entry was submitted and all the required parameters are there
155
-        $newexternalid = $validator->string($_POST['externals']);
156
-        $extinfo = $catInstance->getExternalDBEntityDetails($newexternalid);
157
-        $new_idp_authorized_fedadmin = $userObject->isFederationAdmin($extinfo['country']);
158
-        if ($new_idp_authorized_fedadmin !== TRUE) {
159
-            throw new Exception("Something's wrong... you want to create a new " . $uiElements->nomenclatureParticipant . ", but are not a " . $uiElements->nomenclatureFed . " admin for the " . $uiElements->nomenclatureFed . " it should be in!");
160
-        }
161
-        $federation = $validator->existingFederation($extinfo['country']);
162
-        $newcountry = $extinfo['country'];
163
-        // see if the inst name is defined in the currently set language; if not, pick its English name; if N/A, pick the last in the list
164
-        $prettyprintname = "";
165
-        foreach ($extinfo['names'] as $lang => $name) {
166
-            if ($lang == $languageInstance->getLang()) {
167
-                $prettyprintname = $name;
120
+            $prettyprintname = $idp->name;
121
+            $newtokens = $mgmt->createTokens($fedadmin, $validAddresses, $idp);
122
+            $loggerInstance->writeAudit($_SESSION['user'], "NEW", "IdP " . $idp->identifier . " - Token created for " . implode(",", $validAddresses));
123
+            $introtext = "CO-ADMIN";
124
+            $participant_type = $idp->type;
125
+            break;
126
+        case OPERATION_MODE_NEWUNLINKED:
127
+            $redirectDestination = "../overview_federation.php?";
128
+            if (count($validAddresses) == 0) {
129
+                header("Location: $redirectDestination"."invitation=INVALIDSYNTAX");
130
+                exit(1);
168 131
             }
169
-        }
170
-        if ($prettyprintname == "" && isset($extinfo['names']['en'])) {
171
-            $prettyprintname = $extinfo['names']['en'];
172
-        }
173
-        if ($prettyprintname == "") {
174
-            foreach ($extinfo['names'] as $name) {
175
-                $prettyprintname = $name;
132
+            // run an input check and conversion of the raw inputs... just in case
133
+            $newinstname = $validator->string($_POST['name']);
134
+            $newcountry = $validator->string($_POST['country']);
135
+            $participant_type = $validator->partType($_POST['participant_type']);
136
+            $new_idp_authorized_fedadmin = $userObject->isFederationAdmin($newcountry);
137
+            if ($new_idp_authorized_fedadmin !== TRUE) {
138
+                throw new Exception("Something's wrong... you want to create a new " . $uiElements->nomenclatureParticipant . ", but are not a " . $uiElements->nomenclatureFed . " admin for the " . $uiElements->nomenclatureFed . " it should be in!");
176 139
             }
177
-        }
178
-        $participant_type = $extinfo['type'];
179
-        // fill the rest of the text
180
-        $introtext = "EXISTING-FED";
181
-        // do the token creation magic
182
-        $newtokens = $mgmt->createTokens(TRUE, $validAddresses, $prettyprintname, $newexternalid);
183
-        $loggerInstance->writeAudit($_SESSION['user'], "NEW", "IdP FUTURE  - Token created for " . implode(",", $validAddresses));
184
-        break;
185
-    default: // includes OPERATION_MODE_INVALID
186
-        // second param is TRUE, so the variable *will* contain a string
187
-        // i.e. ignore Scrutinizer type warning later
188
-        $wrongcontent = print_r($_POST, TRUE);
189
-        echo "<pre>Wrong parameters in POST:
140
+            $federation = $validator->existingFederation($newcountry);
141
+            $prettyprintname = $newinstname;
142
+            $introtext = "NEW-FED";
143
+            // send the user back to his federation overview page, append the result of the operation later
144
+            // do the token creation magic
145
+            $newtokens = $mgmt->createTokens(TRUE, $validAddresses, $newinstname, 0, $newcountry, $participant_type);
146
+            $loggerInstance->writeAudit($_SESSION['user'], "NEW", "ORG FUTURE  - Token created for $participant_type " . implode(",", $validAddresses));
147
+            break;
148
+        case OPERATION_MODE_NEWFROMDB:
149
+            $redirectDestination = "../overview_federation.php?";
150
+            if (count($validAddresses) == 0) {
151
+                header("Location: $redirectDestination"."invitation=INVALIDSYNTAX");
152
+                exit(1);
153
+            }
154
+            // a real external DB entry was submitted and all the required parameters are there
155
+            $newexternalid = $validator->string($_POST['externals']);
156
+            $extinfo = $catInstance->getExternalDBEntityDetails($newexternalid);
157
+            $new_idp_authorized_fedadmin = $userObject->isFederationAdmin($extinfo['country']);
158
+            if ($new_idp_authorized_fedadmin !== TRUE) {
159
+                throw new Exception("Something's wrong... you want to create a new " . $uiElements->nomenclatureParticipant . ", but are not a " . $uiElements->nomenclatureFed . " admin for the " . $uiElements->nomenclatureFed . " it should be in!");
160
+            }
161
+            $federation = $validator->existingFederation($extinfo['country']);
162
+            $newcountry = $extinfo['country'];
163
+            // see if the inst name is defined in the currently set language; if not, pick its English name; if N/A, pick the last in the list
164
+            $prettyprintname = "";
165
+            foreach ($extinfo['names'] as $lang => $name) {
166
+                if ($lang == $languageInstance->getLang()) {
167
+                    $prettyprintname = $name;
168
+                }
169
+            }
170
+            if ($prettyprintname == "" && isset($extinfo['names']['en'])) {
171
+                $prettyprintname = $extinfo['names']['en'];
172
+            }
173
+            if ($prettyprintname == "") {
174
+                foreach ($extinfo['names'] as $name) {
175
+                    $prettyprintname = $name;
176
+                }
177
+            }
178
+            $participant_type = $extinfo['type'];
179
+            // fill the rest of the text
180
+            $introtext = "EXISTING-FED";
181
+            // do the token creation magic
182
+            $newtokens = $mgmt->createTokens(TRUE, $validAddresses, $prettyprintname, $newexternalid);
183
+            $loggerInstance->writeAudit($_SESSION['user'], "NEW", "IdP FUTURE  - Token created for " . implode(",", $validAddresses));
184
+            break;
185
+        default: // includes OPERATION_MODE_INVALID
186
+            // second param is TRUE, so the variable *will* contain a string
187
+            // i.e. ignore Scrutinizer type warning later
188
+            $wrongcontent = print_r($_POST, TRUE);
189
+            echo "<pre>Wrong parameters in POST:
190 190
 " . htmlspecialchars(/** @scrutinizer ignore-type */ $wrongcontent) . "
191 191
 </pre>";
192
-        exit(1);
192
+            exit(1);
193 193
 }
194 194
 
195 195
 // send, and invalidate the token immediately if the mail could not be sent!
Please login to merge, or discard this patch.
web/admin/API.php 1 patch
Switch Indentation   +375 added lines, -375 removed lines patch added patch discarded remove patch
@@ -84,221 +84,221 @@  discard block
 block discarded – undo
84 84
 }
85 85
 
86 86
 switch ($inputDecoded['ACTION']) {
87
-    case web\lib\admin\API::ACTION_NEWINST:
88
-        // create the inst, no admin, no attributes
89
-        $typeRaw = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_INSTTYPE);
90
-        if ($typeRaw === FALSE) {
91
-            throw new Exception("We did not receive a valid participant type!");
92
-        }
93
-        $type = $validator->partType($typeRaw);
94
-        $idp = new \core\IdP($fed->newIdP($type, "PENDING", "API"));
95
-        // now add all submitted attributes
96
-        $inputs = $adminApi->uglify($scrubbedParameters);
97
-        $optionParser->processSubmittedFields($idp, $inputs["POST"], $inputs["FILES"]);
98
-        $adminApi->returnSuccess([web\lib\admin\API::AUXATTRIB_CAT_INST_ID => $idp->identifier]);
99
-        break;
100
-    case web\lib\admin\API::ACTION_DELINST:
101
-        try {
102
-            $idp = $validator->existingIdP($adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_INST_ID), NULL, $fed);
103
-        } catch (Exception $e) {
104
-            $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "IdP identifier does not exist!");
105
-            exit(1);
106
-        }
107
-        $idp->destroy();
108
-        $adminApi->returnSuccess([]);
109
-        break;
110
-    case web\lib\admin\API::ACTION_ADMIN_LIST:
111
-        try {
112
-            $idp = $validator->existingIdP($adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_INST_ID), NULL, $fed);
113
-        } catch (Exception $e) {
114
-            $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "IdP identifier does not exist!");
115
-            exit(1);
116
-        }
117
-        $adminApi->returnSuccess($idp->listOwners());
118
-        break;
119
-    case web\lib\admin\API::ACTION_ADMIN_ADD:
120
-        // IdP in question
121
-        try {
122
-            $idp = $validator->existingIdP($adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_INST_ID), NULL, $fed);
123
-        } catch (Exception $e) {
124
-            $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "IdP identifier does not exist!");
125
-            exit(1);
126
-        }
127
-        // here is the token
128
-        $mgmt = new core\UserManagement();
129
-        // we know we have an admin ID but scrutinizer wants this checked more explicitly
130
-        $admin = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_ADMINID);
131
-        if ($admin === FALSE) {
132
-            throw new Exception("A required parameter is missing, and this wasn't caught earlier?!");
133
-        }
134
-        $newtokens = $mgmt->createTokens(true, [$admin], $idp);
135
-        $URL = "https://" . $_SERVER['SERVER_NAME'] . dirname($_SERVER['SCRIPT_NAME']) . "/action_enrollment.php?token=" . array_keys($newtokens)[0];
136
-        $success = ["TOKEN URL" => $URL, "TOKEN" => array_keys($newtokens)[0]];
137
-        // done with the essentials - display in response. But if we also have an email address, send it there
138
-        $email = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_TARGETMAIL);
139
-        if ($email !== FALSE) {
140
-            $sent = \core\common\OutsideComm::adminInvitationMail($email, "EXISTING-FED", array_keys($newtokens)[0], $idp->name, $fed, $idp->type);
141
-            $success["EMAIL SENT"] = $sent["SENT"];
142
-            if ($sent["SENT"] === TRUE) {
143
-                $success["EMAIL TRANSPORT SECURE"] = $sent["TRANSPORT"];
87
+        case web\lib\admin\API::ACTION_NEWINST:
88
+            // create the inst, no admin, no attributes
89
+            $typeRaw = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_INSTTYPE);
90
+            if ($typeRaw === FALSE) {
91
+                throw new Exception("We did not receive a valid participant type!");
144 92
             }
145
-        }
146
-        $adminApi->returnSuccess($success);
147
-        break;
148
-    case web\lib\admin\API::ACTION_ADMIN_DEL:
149
-        // IdP in question
150
-        try {
151
-            $idp = $validator->existingIdP($adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_INST_ID), NULL, $fed);
152
-        } catch (Exception $e) {
153
-            $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "IdP identifier does not exist!");
154
-            exit(1);
155
-        }
156
-        $currentAdmins = $idp->listOwners();
157
-        $toBeDeleted = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_ADMINID);
158
-        if ($toBeDeleted === FALSE) {
159
-            throw new Exception("A required parameter is missing, and this wasn't caught earlier?!");
160
-        }
161
-        $found = FALSE;
162
-        foreach ($currentAdmins as $oneAdmin) {
163
-            if ($oneAdmin['MAIL'] == $toBeDeleted) {
164
-                $found = TRUE;
165
-                $mgmt = new core\UserManagement();
166
-                $mgmt->removeAdminFromIdP($idp, $oneAdmin['ID']);
93
+            $type = $validator->partType($typeRaw);
94
+            $idp = new \core\IdP($fed->newIdP($type, "PENDING", "API"));
95
+            // now add all submitted attributes
96
+            $inputs = $adminApi->uglify($scrubbedParameters);
97
+            $optionParser->processSubmittedFields($idp, $inputs["POST"], $inputs["FILES"]);
98
+            $adminApi->returnSuccess([web\lib\admin\API::AUXATTRIB_CAT_INST_ID => $idp->identifier]);
99
+            break;
100
+        case web\lib\admin\API::ACTION_DELINST:
101
+            try {
102
+                $idp = $validator->existingIdP($adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_INST_ID), NULL, $fed);
103
+            } catch (Exception $e) {
104
+                $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "IdP identifier does not exist!");
105
+                exit(1);
167 106
             }
168
-        }
169
-        if ($found) {
107
+            $idp->destroy();
170 108
             $adminApi->returnSuccess([]);
171
-        }
172
-        $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "The admin with ID $toBeDeleted is not associated to IdP " . $idp->identifier);
173
-        break;
174
-    case web\lib\admin\API::ACTION_STATISTICS_FED:
175
-        $adminApi->returnSuccess($fed->downloadStats("array"));
176
-        break;
177
-    case \web\lib\admin\API::ACTION_FEDERATION_LISTIDP:
178
-        $retArray = [];
179
-        $idpIdentifier = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_INST_ID);
180
-        if ($idpIdentifier === FALSE) {
181
-            $allIdPs = $fed->listIdentityProviders(0);
182
-            foreach ($allIdPs as $instanceId => $oneIdP) {
183
-                $theIdP = $oneIdP["instance"];
184
-                $retArray[$instanceId] = $theIdP->getAttributes();
185
-            }
186
-        } else {
109
+            break;
110
+        case web\lib\admin\API::ACTION_ADMIN_LIST:
187 111
             try {
188
-                $thisIdP = $validator->existingIdP($idpIdentifier, NULL, $fed);
112
+                $idp = $validator->existingIdP($adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_INST_ID), NULL, $fed);
189 113
             } catch (Exception $e) {
190 114
                 $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "IdP identifier does not exist!");
191 115
                 exit(1);
192 116
             }
193
-            $retArray[$idpIdentifier] = $thisIdP->getAttributes();
194
-            foreach ($thisIdP->listProfiles() as $oneProfile) {
195
-                $retArray[$idpIdentifier]["PROFILES"][$oneProfile->identifier] = $oneProfile->getAttributes();
117
+            $adminApi->returnSuccess($idp->listOwners());
118
+            break;
119
+        case web\lib\admin\API::ACTION_ADMIN_ADD:
120
+            // IdP in question
121
+            try {
122
+                $idp = $validator->existingIdP($adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_INST_ID), NULL, $fed);
123
+            } catch (Exception $e) {
124
+                $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "IdP identifier does not exist!");
125
+                exit(1);
196 126
             }
197
-        }
198
-        foreach ($retArray as $instNumber => $oneInstData) {
199
-            foreach ($oneInstData as $attribNumber => $oneAttrib) {
200
-                if ($oneAttrib['name'] == "general:logo_file") {
201
-                    // JSON doesn't cope well with raw binary data, so b64 it
202
-                    $retArray[$instNumber][$attribNumber]['value'] = base64_encode($oneAttrib['value']);
127
+            // here is the token
128
+            $mgmt = new core\UserManagement();
129
+            // we know we have an admin ID but scrutinizer wants this checked more explicitly
130
+            $admin = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_ADMINID);
131
+            if ($admin === FALSE) {
132
+                throw new Exception("A required parameter is missing, and this wasn't caught earlier?!");
133
+            }
134
+            $newtokens = $mgmt->createTokens(true, [$admin], $idp);
135
+            $URL = "https://" . $_SERVER['SERVER_NAME'] . dirname($_SERVER['SCRIPT_NAME']) . "/action_enrollment.php?token=" . array_keys($newtokens)[0];
136
+            $success = ["TOKEN URL" => $URL, "TOKEN" => array_keys($newtokens)[0]];
137
+            // done with the essentials - display in response. But if we also have an email address, send it there
138
+            $email = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_TARGETMAIL);
139
+            if ($email !== FALSE) {
140
+                $sent = \core\common\OutsideComm::adminInvitationMail($email, "EXISTING-FED", array_keys($newtokens)[0], $idp->name, $fed, $idp->type);
141
+                $success["EMAIL SENT"] = $sent["SENT"];
142
+                if ($sent["SENT"] === TRUE) {
143
+                    $success["EMAIL TRANSPORT SECURE"] = $sent["TRANSPORT"];
203 144
                 }
204 145
             }
205
-        }
206
-        $adminApi->returnSuccess($retArray);
207
-        break;
208
-    case \web\lib\admin\API::ACTION_NEWPROF_RADIUS:
209
-    // fall-through intended: both get mostly identical treatment
210
-    case web\lib\admin\API::ACTION_NEWPROF_SB:
211
-        try {
212
-            $idp = $validator->existingIdP($adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_INST_ID), NULL, $fed);
213
-        } catch (Exception $e) {
214
-            $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "IdP identifier does not exist!");
215
-            exit(1);
216
-        }
217
-        if ($inputDecoded['ACTION'] == web\lib\admin\API::ACTION_NEWPROF_RADIUS) {
218
-            $type = "RADIUS";
219
-        } else {
220
-            $type = "SILVERBULLET";
221
-        }
222
-        $profile = $idp->newProfile($type);
223
-        if ($profile === NULL) {
224
-            $adminApi->returnError(\web\lib\admin\API::ERROR_INTERNAL_ERROR, "Unable to create a new Profile, for no apparent reason. Please contact support.");
225
-            exit(1);
226
-        }
227
-        $inputs = $adminApi->uglify($scrubbedParameters);
228
-        $optionParser->processSubmittedFields($profile, $inputs["POST"], $inputs["FILES"]);
229
-        if ($inputDecoded['ACTION'] == web\lib\admin\API::ACTION_NEWPROF_SB) {
230
-            // auto-accept ToU?
231
-            if ($adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_TOU) !== FALSE) {
232
-                $profile->addAttribute("hiddenprofile:tou_accepted", NULL, 1);
233
-            }
234
-            // we're done at this point
235
-            $adminApi->returnSuccess([\web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID => $profile->identifier]);
146
+            $adminApi->returnSuccess($success);
236 147
             break;
237
-        }
238
-        if (!$profile instanceof core\ProfileRADIUS) {
239
-            throw new Exception("Can't be. This is only here to convince Scrutinizer that we're really talking RADIUS.");
240
-        }
241
-        /* const AUXATTRIB_PROFILE_REALM = 'ATTRIB-PROFILE-REALM';
242
-          const AUXATTRIB_PROFILE_OUTERVALUE = 'ATTRIB-PROFILE-OUTERVALUE'; */
243
-        $realm = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_PROFILE_REALM);
244
-        $outer = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_PROFILE_OUTERVALUE);
245
-        if ($realm !== FALSE) {
246
-            if ($outer === FALSE) {
247
-                $outer = "";
248
-                $profile->setAnonymousIDSupport(FALSE);
148
+        case web\lib\admin\API::ACTION_ADMIN_DEL:
149
+            // IdP in question
150
+            try {
151
+                $idp = $validator->existingIdP($adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_INST_ID), NULL, $fed);
152
+            } catch (Exception $e) {
153
+                $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "IdP identifier does not exist!");
154
+                exit(1);
155
+            }
156
+            $currentAdmins = $idp->listOwners();
157
+            $toBeDeleted = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_ADMINID);
158
+            if ($toBeDeleted === FALSE) {
159
+                throw new Exception("A required parameter is missing, and this wasn't caught earlier?!");
160
+            }
161
+            $found = FALSE;
162
+            foreach ($currentAdmins as $oneAdmin) {
163
+                if ($oneAdmin['MAIL'] == $toBeDeleted) {
164
+                    $found = TRUE;
165
+                    $mgmt = new core\UserManagement();
166
+                    $mgmt->removeAdminFromIdP($idp, $oneAdmin['ID']);
167
+                }
168
+            }
169
+            if ($found) {
170
+                $adminApi->returnSuccess([]);
171
+            }
172
+            $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "The admin with ID $toBeDeleted is not associated to IdP " . $idp->identifier);
173
+            break;
174
+        case web\lib\admin\API::ACTION_STATISTICS_FED:
175
+            $adminApi->returnSuccess($fed->downloadStats("array"));
176
+            break;
177
+        case \web\lib\admin\API::ACTION_FEDERATION_LISTIDP:
178
+            $retArray = [];
179
+            $idpIdentifier = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_INST_ID);
180
+            if ($idpIdentifier === FALSE) {
181
+                $allIdPs = $fed->listIdentityProviders(0);
182
+                foreach ($allIdPs as $instanceId => $oneIdP) {
183
+                    $theIdP = $oneIdP["instance"];
184
+                    $retArray[$instanceId] = $theIdP->getAttributes();
185
+                }
249 186
             } else {
250
-                $outer = $outer . "@";
251
-                $profile->setAnonymousIDSupport(TRUE);
187
+                try {
188
+                    $thisIdP = $validator->existingIdP($idpIdentifier, NULL, $fed);
189
+                } catch (Exception $e) {
190
+                    $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "IdP identifier does not exist!");
191
+                    exit(1);
192
+                }
193
+                $retArray[$idpIdentifier] = $thisIdP->getAttributes();
194
+                foreach ($thisIdP->listProfiles() as $oneProfile) {
195
+                    $retArray[$idpIdentifier]["PROFILES"][$oneProfile->identifier] = $oneProfile->getAttributes();
196
+                }
252 197
             }
253
-            $profile->setRealm($outer . $realm);
254
-        }
255
-        /* const AUXATTRIB_PROFILE_TESTUSER = 'ATTRIB-PROFILE-TESTUSER'; */
256
-        $testuser = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_PROFILE_TESTUSER);
257
-        if ($testuser !== FALSE) {
258
-            $profile->setRealmCheckUser(TRUE, $testuser);
259
-        }
260
-        /* const AUXATTRIB_PROFILE_INPUT_HINT = 'ATTRIB-PROFILE-HINTREALM';
198
+            foreach ($retArray as $instNumber => $oneInstData) {
199
+                foreach ($oneInstData as $attribNumber => $oneAttrib) {
200
+                    if ($oneAttrib['name'] == "general:logo_file") {
201
+                        // JSON doesn't cope well with raw binary data, so b64 it
202
+                        $retArray[$instNumber][$attribNumber]['value'] = base64_encode($oneAttrib['value']);
203
+                    }
204
+                }
205
+            }
206
+            $adminApi->returnSuccess($retArray);
207
+            break;
208
+        case \web\lib\admin\API::ACTION_NEWPROF_RADIUS:
209
+        // fall-through intended: both get mostly identical treatment
210
+        case web\lib\admin\API::ACTION_NEWPROF_SB:
211
+            try {
212
+                $idp = $validator->existingIdP($adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_INST_ID), NULL, $fed);
213
+            } catch (Exception $e) {
214
+                $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "IdP identifier does not exist!");
215
+                exit(1);
216
+            }
217
+            if ($inputDecoded['ACTION'] == web\lib\admin\API::ACTION_NEWPROF_RADIUS) {
218
+                $type = "RADIUS";
219
+            } else {
220
+                $type = "SILVERBULLET";
221
+            }
222
+            $profile = $idp->newProfile($type);
223
+            if ($profile === NULL) {
224
+                $adminApi->returnError(\web\lib\admin\API::ERROR_INTERNAL_ERROR, "Unable to create a new Profile, for no apparent reason. Please contact support.");
225
+                exit(1);
226
+            }
227
+            $inputs = $adminApi->uglify($scrubbedParameters);
228
+            $optionParser->processSubmittedFields($profile, $inputs["POST"], $inputs["FILES"]);
229
+            if ($inputDecoded['ACTION'] == web\lib\admin\API::ACTION_NEWPROF_SB) {
230
+                // auto-accept ToU?
231
+                if ($adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_TOU) !== FALSE) {
232
+                    $profile->addAttribute("hiddenprofile:tou_accepted", NULL, 1);
233
+                }
234
+                // we're done at this point
235
+                $adminApi->returnSuccess([\web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID => $profile->identifier]);
236
+                break;
237
+            }
238
+            if (!$profile instanceof core\ProfileRADIUS) {
239
+                throw new Exception("Can't be. This is only here to convince Scrutinizer that we're really talking RADIUS.");
240
+            }
241
+            /* const AUXATTRIB_PROFILE_REALM = 'ATTRIB-PROFILE-REALM';
242
+          const AUXATTRIB_PROFILE_OUTERVALUE = 'ATTRIB-PROFILE-OUTERVALUE'; */
243
+            $realm = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_PROFILE_REALM);
244
+            $outer = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_PROFILE_OUTERVALUE);
245
+            if ($realm !== FALSE) {
246
+                if ($outer === FALSE) {
247
+                    $outer = "";
248
+                    $profile->setAnonymousIDSupport(FALSE);
249
+                } else {
250
+                    $outer = $outer . "@";
251
+                    $profile->setAnonymousIDSupport(TRUE);
252
+                }
253
+                $profile->setRealm($outer . $realm);
254
+            }
255
+            /* const AUXATTRIB_PROFILE_TESTUSER = 'ATTRIB-PROFILE-TESTUSER'; */
256
+            $testuser = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_PROFILE_TESTUSER);
257
+            if ($testuser !== FALSE) {
258
+                $profile->setRealmCheckUser(TRUE, $testuser);
259
+            }
260
+            /* const AUXATTRIB_PROFILE_INPUT_HINT = 'ATTRIB-PROFILE-HINTREALM';
261 261
           const AUXATTRIB_PROFILE_INPUT_VERIFY = 'ATTRIB-PROFILE-VERIFYREALM'; */
262
-        $hint = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_PROFILE_INPUT_HINT);
263
-        $enforce = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_PROFILE_INPUT_VERIFY);
264
-        if ($enforce !== FALSE) {
265
-            $profile->setInputVerificationPreference($enforce, $hint);
266
-        }
267
-        /* const AUXATTRIB_PROFILE_EAPTYPE */
268
-        $iterator = 1;
269
-        foreach ($scrubbedParameters as $oneParam) {
270
-            if ($oneParam['NAME'] == web\lib\admin\API::AUXATTRIB_PROFILE_EAPTYPE && is_int($oneParam["VALUE"])) {
271
-                $type = new \core\common\EAP($oneParam["VALUE"]);
272
-                $profile->addSupportedEapMethod($type, $iterator);
273
-                $iterator = $iterator + 1;
262
+            $hint = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_PROFILE_INPUT_HINT);
263
+            $enforce = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_PROFILE_INPUT_VERIFY);
264
+            if ($enforce !== FALSE) {
265
+                $profile->setInputVerificationPreference($enforce, $hint);
274 266
             }
275
-        }
276
-        // reinstantiate $profile freshly from DB - it was updated in the process
277
-        $profileFresh = new core\ProfileRADIUS($profile->identifier);
278
-        $profileFresh->prepShowtime();
279
-        $adminApi->returnSuccess([\web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID => $profileFresh->identifier]);
280
-        break;
281
-    case web\lib\admin\API::ACTION_ENDUSER_NEW:
282
-    // fall-through intentional, those two actions are doing nearly identical things
283
-    case web\lib\admin\API::ACTION_ENDUSER_CHANGEEXPIRY:
284
-        $prof_id = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID);
285
-        if ($prof_id === FALSE) {
286
-            exit(1);
287
-        }
288
-        $evaluation = $adminApi->commonSbProfileChecks($fed, $prof_id);
289
-        if ($evaluation === FALSE) {
290
-            exit(1);
291
-        }
292
-        list($idp, $profile) = $evaluation;
293
-        $user = $validator->string($adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_USERNAME));
294
-        $expiryRaw = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_EXPIRY);
295
-        if ($expiryRaw === FALSE) {
296
-            $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "The expiry date wasn't found in the request.");
267
+            /* const AUXATTRIB_PROFILE_EAPTYPE */
268
+            $iterator = 1;
269
+            foreach ($scrubbedParameters as $oneParam) {
270
+                if ($oneParam['NAME'] == web\lib\admin\API::AUXATTRIB_PROFILE_EAPTYPE && is_int($oneParam["VALUE"])) {
271
+                    $type = new \core\common\EAP($oneParam["VALUE"]);
272
+                    $profile->addSupportedEapMethod($type, $iterator);
273
+                    $iterator = $iterator + 1;
274
+                }
275
+            }
276
+            // reinstantiate $profile freshly from DB - it was updated in the process
277
+            $profileFresh = new core\ProfileRADIUS($profile->identifier);
278
+            $profileFresh->prepShowtime();
279
+            $adminApi->returnSuccess([\web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID => $profileFresh->identifier]);
297 280
             break;
298
-        }
299
-        $expiry = new DateTime($expiryRaw);
300
-        try {
301
-            switch ($inputDecoded['ACTION']) {
281
+        case web\lib\admin\API::ACTION_ENDUSER_NEW:
282
+        // fall-through intentional, those two actions are doing nearly identical things
283
+        case web\lib\admin\API::ACTION_ENDUSER_CHANGEEXPIRY:
284
+            $prof_id = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID);
285
+            if ($prof_id === FALSE) {
286
+                exit(1);
287
+            }
288
+            $evaluation = $adminApi->commonSbProfileChecks($fed, $prof_id);
289
+            if ($evaluation === FALSE) {
290
+                exit(1);
291
+            }
292
+            list($idp, $profile) = $evaluation;
293
+            $user = $validator->string($adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_USERNAME));
294
+            $expiryRaw = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_EXPIRY);
295
+            if ($expiryRaw === FALSE) {
296
+                $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "The expiry date wasn't found in the request.");
297
+                break;
298
+            }
299
+            $expiry = new DateTime($expiryRaw);
300
+            try {
301
+                switch ($inputDecoded['ACTION']) {
302 302
                 case web\lib\admin\API::ACTION_ENDUSER_NEW:
303 303
                     $retval = $profile->addUser($user, $expiry);
304 304
                     break;
@@ -311,7 +311,7 @@  discard block
 block discarded – undo
311 311
                         $retval = 1; // function doesn't have any failure vectors not raising an Exception and doesn't return a value
312 312
                     }
313 313
                     break;
314
-            }
314
+                }
315 315
         } catch (Exception $e) {
316 316
             $adminApi->returnError(web\lib\admin\API::ERROR_INTERNAL_ERROR, "The operation failed. Maybe a duplicate username, or malformed expiry date?");
317 317
             exit(1);
@@ -322,25 +322,25 @@  discard block
 block discarded – undo
322 322
         }
323 323
         $adminApi->returnSuccess([web\lib\admin\API::AUXATTRIB_SB_USERNAME => $user, \web\lib\admin\API::AUXATTRIB_SB_USERID => $retval]);
324 324
         break;
325
-    case \web\lib\admin\API::ACTION_ENDUSER_DEACTIVATE:
326
-    // fall-through intended: both actions are very similar
327
-    case \web\lib\admin\API::ACTION_TOKEN_NEW:
328
-        $profile_id = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID);
329
-        if ($profile_id === FALSE) {
330
-            exit(1);
331
-        }
332
-        $evaluation = $adminApi->commonSbProfileChecks($fed, $profile_id);
333
-        if ($evaluation === FALSE) {
334
-            exit(1);
335
-        }
336
-        list($idp, $profile) = $evaluation;
337
-        $userId = $validator->integer($adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_USERID));
338
-        if ($userId === FALSE) {
339
-            $adminApi->returnError(\web\lib\admin\API::ERROR_INVALID_PARAMETER, "User ID is not an integer.");
340
-            exit(1);
341
-        }
342
-        $additionalInfo = [];
343
-        switch ($inputDecoded['ACTION']) { // this is where the two differ
325
+        case \web\lib\admin\API::ACTION_ENDUSER_DEACTIVATE:
326
+        // fall-through intended: both actions are very similar
327
+        case \web\lib\admin\API::ACTION_TOKEN_NEW:
328
+            $profile_id = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID);
329
+            if ($profile_id === FALSE) {
330
+                exit(1);
331
+            }
332
+            $evaluation = $adminApi->commonSbProfileChecks($fed, $profile_id);
333
+            if ($evaluation === FALSE) {
334
+                exit(1);
335
+            }
336
+            list($idp, $profile) = $evaluation;
337
+            $userId = $validator->integer($adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_USERID));
338
+            if ($userId === FALSE) {
339
+                $adminApi->returnError(\web\lib\admin\API::ERROR_INVALID_PARAMETER, "User ID is not an integer.");
340
+                exit(1);
341
+            }
342
+            $additionalInfo = [];
343
+            switch ($inputDecoded['ACTION']) { // this is where the two differ
344 344
             case \web\lib\admin\API::ACTION_ENDUSER_DEACTIVATE:
345 345
                 $result = $profile->deactivateUser($userId);
346 346
                 break;
@@ -373,7 +373,7 @@  discard block
 block discarded – undo
373 373
                     }
374 374
                 }
375 375
                 break;
376
-        }
376
+            }
377 377
 
378 378
         if ($result !== TRUE) {
379 379
             $adminApi->returnError(\web\lib\admin\API::ERROR_INVALID_PARAMETER, "These parameters did not lead to an existing, active user.");
@@ -381,69 +381,69 @@  discard block
 block discarded – undo
381 381
         }
382 382
         $adminApi->returnSuccess($additionalInfo);
383 383
         break;
384
-    case \web\lib\admin\API::ACTION_ENDUSER_IDENTIFY:
385
-        $profile_id = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID);
386
-        if ($profile_id === FALSE) {
387
-            exit(1);
388
-        }
389
-        $evaluation = $adminApi->commonSbProfileChecks($fed, $profile_id);
390
-        if ($evaluation === FALSE) {
391
-            exit(1);
392
-        }
393
-        list($idp, $profile) = $evaluation;
394
-        $userId = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_USERID);
395
-        $userName = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_USERNAME);
396
-        $certSerial = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_CERTSERIAL);
397
-		$certCN = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_CERTCN);
398
-        if ($userId === FALSE && $userName === FALSE && $certSerial === FALSE && $certCN === FALSE) {
399
-            // we need at least one of those
400
-            $adminApi->returnError(\web\lib\admin\API::ERROR_MISSING_PARAMETER, "At least one of User ID, Username, certificate serial, or certificate CN is required.");
401
-            break;
402
-        }
403
-        if ($certSerial !== FALSE) { // we got a cert serial
404
-            $serial = explode(":", $certSerial);
405
-            $cert = new \core\SilverbulletCertificate($serial[1], $serial[0]);
384
+        case \web\lib\admin\API::ACTION_ENDUSER_IDENTIFY:
385
+            $profile_id = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID);
386
+            if ($profile_id === FALSE) {
387
+                exit(1);
406 388
             }
407
-        if ($certCN !== FALSE) { // we got a cert CN
408
-            $cert = new \core\SilverbulletCertificate($certCN);
409
-        }
410
-        if ($cert !== NULL) { // we found a cert; verify it and extract userId
411
-            if ($cert->status == \core\SilverbulletCertificate::CERTSTATUS_INVALID) {
412
-                return $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "Certificate not found.");
389
+            $evaluation = $adminApi->commonSbProfileChecks($fed, $profile_id);
390
+            if ($evaluation === FALSE) {
391
+                exit(1);
413 392
             }
414
-            if ($cert->profileId != $profile->identifier) {
415
-                return $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "Certificate does not belong to this profile.");
393
+            list($idp, $profile) = $evaluation;
394
+            $userId = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_USERID);
395
+            $userName = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_USERNAME);
396
+            $certSerial = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_CERTSERIAL);
397
+		    $certCN = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_CERTCN);
398
+            if ($userId === FALSE && $userName === FALSE && $certSerial === FALSE && $certCN === FALSE) {
399
+                // we need at least one of those
400
+                $adminApi->returnError(\web\lib\admin\API::ERROR_MISSING_PARAMETER, "At least one of User ID, Username, certificate serial, or certificate CN is required.");
401
+                break;
416 402
             }
417
-            $userId = $cert->userId;
418
-        }
419
-        if ($userId !== FALSE) {
420
-            $userList = $profile->getUserById($userId);
421
-        }
422
-        if ($userName !== FALSE) {
423
-            $userList = $profile->getUserByName($userName);
424
-        }
425
-        if (count($userList) === 1) {
426
-            foreach ($userList as $oneUserId => $oneUserName) {
427
-                return $adminApi->returnSuccess([web\lib\admin\API::AUXATTRIB_SB_USERNAME => $oneUserName, \web\lib\admin\API::AUXATTRIB_SB_USERID => $oneUserId]);
403
+            if ($certSerial !== FALSE) { // we got a cert serial
404
+                $serial = explode(":", $certSerial);
405
+                $cert = new \core\SilverbulletCertificate($serial[1], $serial[0]);
406
+                }
407
+            if ($certCN !== FALSE) { // we got a cert CN
408
+                $cert = new \core\SilverbulletCertificate($certCN);
428 409
             }
429
-        }
430
-        $adminApi->returnError(\web\lib\admin\API::ERROR_INVALID_PARAMETER, "No matching user found in this profile.");
431
-        break;
432
-    case \web\lib\admin\API::ACTION_ENDUSER_LIST:
433
-    // fall-through: those two are similar
434
-    case \web\lib\admin\API::ACTION_TOKEN_LIST:
435
-        $profile_id = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID);
436
-        if ($profile_id === FALSE) {
437
-            exit(1);
438
-        }
439
-        $evaluation = $adminApi->commonSbProfileChecks($fed, $profile_id);
440
-        if ($evaluation === FALSE) {
441
-            exit(1);
442
-        }
443
-        list($idp, $profile) = $evaluation;
444
-        $allUsers = $profile->listAllUsers();
445
-        // this is where they differ
446
-        switch ($inputDecoded['ACTION']) {
410
+            if ($cert !== NULL) { // we found a cert; verify it and extract userId
411
+                if ($cert->status == \core\SilverbulletCertificate::CERTSTATUS_INVALID) {
412
+                    return $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "Certificate not found.");
413
+                }
414
+                if ($cert->profileId != $profile->identifier) {
415
+                    return $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "Certificate does not belong to this profile.");
416
+                }
417
+                $userId = $cert->userId;
418
+            }
419
+            if ($userId !== FALSE) {
420
+                $userList = $profile->getUserById($userId);
421
+            }
422
+            if ($userName !== FALSE) {
423
+                $userList = $profile->getUserByName($userName);
424
+            }
425
+            if (count($userList) === 1) {
426
+                foreach ($userList as $oneUserId => $oneUserName) {
427
+                    return $adminApi->returnSuccess([web\lib\admin\API::AUXATTRIB_SB_USERNAME => $oneUserName, \web\lib\admin\API::AUXATTRIB_SB_USERID => $oneUserId]);
428
+                }
429
+            }
430
+            $adminApi->returnError(\web\lib\admin\API::ERROR_INVALID_PARAMETER, "No matching user found in this profile.");
431
+            break;
432
+        case \web\lib\admin\API::ACTION_ENDUSER_LIST:
433
+        // fall-through: those two are similar
434
+        case \web\lib\admin\API::ACTION_TOKEN_LIST:
435
+            $profile_id = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID);
436
+            if ($profile_id === FALSE) {
437
+                exit(1);
438
+            }
439
+            $evaluation = $adminApi->commonSbProfileChecks($fed, $profile_id);
440
+            if ($evaluation === FALSE) {
441
+                exit(1);
442
+            }
443
+            list($idp, $profile) = $evaluation;
444
+            $allUsers = $profile->listAllUsers();
445
+            // this is where they differ
446
+            switch ($inputDecoded['ACTION']) {
447 447
             case \web\lib\admin\API::ACTION_ENDUSER_LIST:
448 448
                 $adminApi->returnSuccess($allUsers);
449 449
                 break;
@@ -462,105 +462,105 @@  discard block
 block discarded – undo
462 462
                     $infoSet[$oneTokenObject->userId] = [\web\lib\admin\API::AUXATTRIB_TOKEN => $oneTokenObject->invitationTokenString, "STATUS" => $oneTokenObject->invitationTokenStatus];
463 463
                 }
464 464
                 $adminApi->returnSuccess($infoSet);
465
-        }
466
-        break;
467
-    case \web\lib\admin\API::ACTION_TOKEN_REVOKE:
468
-        $tokenRaw = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_TOKEN);
469
-        if ($tokenRaw === FALSE) {
470
-            exit(1);
471
-        }
472
-        $token = new core\SilverbulletInvitation($tokenRaw);
473
-        if ($token->invitationTokenStatus !== core\SilverbulletInvitation::SB_TOKENSTATUS_VALID && $token->invitationTokenStatus !== core\SilverbulletInvitation::SB_TOKENSTATUS_PARTIALLY_REDEEMED) {
474
-            $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "This is not a currently valid token.");
475
-            exit(1);
476
-        }
477
-        $token->revokeInvitation();
478
-        $adminApi->returnSuccess([]);
479
-        break;
480
-    case \web\lib\admin\API::ACTION_CERT_LIST:
481
-        $prof_id = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID);
482
-        $user_id = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_USERID);
483
-        if ($prof_id === FALSE || !is_int($user_id)) {
484
-            exit(1);
485
-        }
486
-        $evaluation = $adminApi->commonSbProfileChecks($fed, $prof_id);
487
-        if ($evaluation === FALSE) {
488
-            exit(1);
489
-        }
490
-        list($idp, $profile) = $evaluation;
491
-        $invitations = $profile->userStatus($user_id);
492
-        // now pull out cert information from the object
493
-        $certs = [];
494
-        foreach ($invitations as $oneInvitation) {
495
-            $certs = array_merge($certs, $oneInvitation->associatedCertificates);
496
-        }
497
-        // extract relevant subset of information from cert objects
498
-        $certDetails = [];
499
-        foreach ($certs as $cert) {
500
-            $certDetails[$cert->ca_type . ":" . $cert->serial] = ["ISSUED" => $cert->issued, "EXPIRY" => $cert->expiry, "STATUS" => $cert->status, "DEVICE" => $cert->device, "CN" => $cert->username, "ANNOTATION" => $cert->annotation];
501
-        }
502
-        $adminApi->returnSuccess($certDetails);
503
-        break;
504
-    case \web\lib\admin\API::ACTION_CERT_REVOKE:
505
-        $prof_id = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID);
506
-        if ($prof_id === FALSE) {
507
-            exit(1);
508
-        }
509
-        $evaluation = $adminApi->commonSbProfileChecks($fed, $prof_id);
510
-        if ($evaluation === FALSE) {
511
-            exit(1);
512
-        }
513
-        list($idp, $profile) = $evaluation;
514
-        // tear apart the serial
515
-        $serialRaw = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_CERTSERIAL);
516
-        if ($serialRaw === FALSE) {
517
-            exit(1);
518
-        }
519
-        $serial = explode(":", $serialRaw);
520
-        $cert = new \core\SilverbulletCertificate($serial[1], $serial[0]);
521
-        if ($cert->status == \core\SilverbulletCertificate::CERTSTATUS_INVALID) {
522
-            $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "Serial not found.");
523
-        }
524
-        if ($cert->profileId != $profile->identifier) {
525
-            $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "Serial does not belong to this profile.");
526
-        }
527
-        $cert->revokeCertificate();
528
-        $adminApi->returnSuccess([]);
465
+            }
529 466
         break;
530
-    case \web\lib\admin\API::ACTION_CERT_ANNOTATE:
531
-        $prof_id = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID);
532
-        if ($prof_id === FALSE) {
533
-            exit(1);
534
-        }
535
-        $evaluation = $adminApi->commonSbProfileChecks($fed, $prof_id);
536
-        if ($evaluation === FALSE) {
537
-            exit(1);
538
-        }
539
-        list($idp, $profile) = $evaluation;
540
-        // tear apart the serial
541
-        $serialRaw = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_CERTSERIAL);
542
-        if ($serialRaw === FALSE) {
543
-            exit(1);
544
-        }
545
-        $serial = explode(":", $serialRaw);
546
-        $cert = new \core\SilverbulletCertificate($serial[1], $serial[0]);
547
-        if ($cert->status == \core\SilverbulletCertificate::CERTSTATUS_INVALID) {
548
-            $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "Serial not found.");
549
-        }
550
-        if ($cert->profileId != $profile->identifier) {
551
-            $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "Serial does not belong to this profile.");
552
-        }
553
-        $annotationRaw = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_CERTANNOTATION);
554
-        if ($annotationRaw === FALSE) {
555
-            $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "Unable to extract annotation.");
467
+        case \web\lib\admin\API::ACTION_TOKEN_REVOKE:
468
+            $tokenRaw = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_TOKEN);
469
+            if ($tokenRaw === FALSE) {
470
+                exit(1);
471
+            }
472
+            $token = new core\SilverbulletInvitation($tokenRaw);
473
+            if ($token->invitationTokenStatus !== core\SilverbulletInvitation::SB_TOKENSTATUS_VALID && $token->invitationTokenStatus !== core\SilverbulletInvitation::SB_TOKENSTATUS_PARTIALLY_REDEEMED) {
474
+                $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "This is not a currently valid token.");
475
+                exit(1);
476
+            }
477
+            $token->revokeInvitation();
478
+            $adminApi->returnSuccess([]);
556 479
             break;
557
-        }
558
-        $annotation = json_decode($annotationRaw, TRUE);
559
-        $cert->annotate($annotation);
560
-        $adminApi->returnSuccess([]);
480
+        case \web\lib\admin\API::ACTION_CERT_LIST:
481
+            $prof_id = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID);
482
+            $user_id = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_USERID);
483
+            if ($prof_id === FALSE || !is_int($user_id)) {
484
+                exit(1);
485
+            }
486
+            $evaluation = $adminApi->commonSbProfileChecks($fed, $prof_id);
487
+            if ($evaluation === FALSE) {
488
+                exit(1);
489
+            }
490
+            list($idp, $profile) = $evaluation;
491
+            $invitations = $profile->userStatus($user_id);
492
+            // now pull out cert information from the object
493
+            $certs = [];
494
+            foreach ($invitations as $oneInvitation) {
495
+                $certs = array_merge($certs, $oneInvitation->associatedCertificates);
496
+            }
497
+            // extract relevant subset of information from cert objects
498
+            $certDetails = [];
499
+            foreach ($certs as $cert) {
500
+                $certDetails[$cert->ca_type . ":" . $cert->serial] = ["ISSUED" => $cert->issued, "EXPIRY" => $cert->expiry, "STATUS" => $cert->status, "DEVICE" => $cert->device, "CN" => $cert->username, "ANNOTATION" => $cert->annotation];
501
+            }
502
+            $adminApi->returnSuccess($certDetails);
503
+            break;
504
+        case \web\lib\admin\API::ACTION_CERT_REVOKE:
505
+            $prof_id = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID);
506
+            if ($prof_id === FALSE) {
507
+                exit(1);
508
+            }
509
+            $evaluation = $adminApi->commonSbProfileChecks($fed, $prof_id);
510
+            if ($evaluation === FALSE) {
511
+                exit(1);
512
+            }
513
+            list($idp, $profile) = $evaluation;
514
+            // tear apart the serial
515
+            $serialRaw = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_CERTSERIAL);
516
+            if ($serialRaw === FALSE) {
517
+                exit(1);
518
+            }
519
+            $serial = explode(":", $serialRaw);
520
+            $cert = new \core\SilverbulletCertificate($serial[1], $serial[0]);
521
+            if ($cert->status == \core\SilverbulletCertificate::CERTSTATUS_INVALID) {
522
+                $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "Serial not found.");
523
+            }
524
+            if ($cert->profileId != $profile->identifier) {
525
+                $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "Serial does not belong to this profile.");
526
+            }
527
+            $cert->revokeCertificate();
528
+            $adminApi->returnSuccess([]);
529
+            break;
530
+        case \web\lib\admin\API::ACTION_CERT_ANNOTATE:
531
+            $prof_id = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_CAT_PROFILE_ID);
532
+            if ($prof_id === FALSE) {
533
+                exit(1);
534
+            }
535
+            $evaluation = $adminApi->commonSbProfileChecks($fed, $prof_id);
536
+            if ($evaluation === FALSE) {
537
+                exit(1);
538
+            }
539
+            list($idp, $profile) = $evaluation;
540
+            // tear apart the serial
541
+            $serialRaw = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_CERTSERIAL);
542
+            if ($serialRaw === FALSE) {
543
+                exit(1);
544
+            }
545
+            $serial = explode(":", $serialRaw);
546
+            $cert = new \core\SilverbulletCertificate($serial[1], $serial[0]);
547
+            if ($cert->status == \core\SilverbulletCertificate::CERTSTATUS_INVALID) {
548
+                $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "Serial not found.");
549
+            }
550
+            if ($cert->profileId != $profile->identifier) {
551
+                $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "Serial does not belong to this profile.");
552
+            }
553
+            $annotationRaw = $adminApi->firstParameterInstance($scrubbedParameters, web\lib\admin\API::AUXATTRIB_SB_CERTANNOTATION);
554
+            if ($annotationRaw === FALSE) {
555
+                $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_PARAMETER, "Unable to extract annotation.");
556
+                break;
557
+            }
558
+            $annotation = json_decode($annotationRaw, TRUE);
559
+            $cert->annotate($annotation);
560
+            $adminApi->returnSuccess([]);
561 561
 
562
-        break;
562
+            break;
563 563
 
564
-    default:
565
-        $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_ACTION, "Not implemented yet.");
564
+        default:
565
+            $adminApi->returnError(web\lib\admin\API::ERROR_INVALID_ACTION, "Not implemented yet.");
566 566
 }
567 567
\ No newline at end of file
Please login to merge, or discard this patch.
web/admin/edit_hotspot.php 1 patch
Switch Indentation   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -156,12 +156,12 @@
 block discarded – undo
156 156
     }
157 157
     if (isset($_POST['command'])) {
158 158
         switch ($_POST['command']) {
159
-        case web\lib\common\FormElements::BUTTON_CLOSE:
160
-            header("Location: overview_org.php?inst_id=" . $my_inst->identifier);
161
-            exit(0);
162
-        default:
163
-            header("Location: overview_org.php?inst_id=" . $my_inst->identifier);
164
-            exit(0);
159
+            case web\lib\common\FormElements::BUTTON_CLOSE:
160
+                header("Location: overview_org.php?inst_id=" . $my_inst->identifier);
161
+                exit(0);
162
+            default:
163
+                header("Location: overview_org.php?inst_id=" . $my_inst->identifier);
164
+                exit(0);
165 165
         }
166 166
     }
167 167
     $vlan = $deployment->getAttributes("managedsp:vlan")[0]['value'] ?? NULL;
Please login to merge, or discard this patch.