1
|
|
|
<?php |
2
|
|
|
|
3
|
|
|
namespace AerialShip\SamlSPBundle\DependencyInjection\Security\Factory; |
4
|
|
|
|
5
|
|
|
use Symfony\Bundle\SecurityBundle\DependencyInjection\Security\Factory\AbstractFactory; |
6
|
|
|
use Symfony\Component\Config\Definition\Builder\NodeDefinition; |
7
|
|
|
use Symfony\Component\DependencyInjection\ContainerBuilder; |
8
|
|
|
use Symfony\Component\DependencyInjection\DefinitionDecorator; |
9
|
|
|
use Symfony\Component\DependencyInjection\Reference; |
10
|
|
|
|
11
|
|
|
class SamlSpFactory extends AbstractFactory |
12
|
|
|
{ |
13
|
|
|
|
14
|
23 |
|
function __construct() |
|
|
|
|
15
|
|
|
{ |
16
|
23 |
|
$this->defaultSuccessHandlerOptions['login_path'] = '/saml/sp/login'; |
17
|
23 |
|
$this->defaultFailureHandlerOptions['login_path'] = '/saml/sp/login'; |
18
|
23 |
|
$this->defaultFailureHandlerOptions['failure_path'] = '/saml/sp/failure'; |
19
|
|
|
|
20
|
|
|
// these are available in listener->options[] |
21
|
23 |
|
$this->addOption('require_previous_session', false); // otherwise it will end up with throw new SessionUnavailableException('Your session has timed out, or you have disabled cookies.'); on each new session |
22
|
23 |
|
$this->addOption('login_path', '/saml/sp/login'); |
23
|
23 |
|
$this->addOption('check_path', '/saml/sp/acs'); |
24
|
23 |
|
$this->addOption('logout_path', '/saml/sp/logout'); |
25
|
23 |
|
$this->addOption('failure_path', '/saml/sp/failure'); |
26
|
23 |
|
$this->addOption('local_logout_path', '/logout'); |
27
|
23 |
|
$this->addOption('target_path_parameter', $this->defaultSuccessHandlerOptions['target_path_parameter']); |
28
|
23 |
|
} |
29
|
|
|
|
30
|
20 |
|
public function addConfiguration(NodeDefinition $node) |
31
|
|
|
{ |
32
|
20 |
|
parent::addConfiguration($node); |
33
|
20 |
|
$node->children() |
|
|
|
|
34
|
20 |
|
->scalarNode('relying_party')->defaultValue(null)->end() |
35
|
20 |
|
->scalarNode('login_path')->defaultValue('/saml/sp/login')->cannotBeEmpty()->end() |
36
|
20 |
|
->scalarNode('check_path')->defaultValue('/saml/sp/acs')->cannotBeEmpty()->end() |
37
|
20 |
|
->scalarNode('logout_path')->defaultValue('/saml/sp/logout')->cannotBeEmpty()->end() |
38
|
20 |
|
->scalarNode('failure_path')->defaultValue('/saml/sp/failure')->cannotBeEmpty()->end() |
39
|
20 |
|
->scalarNode('metadata_path')->defaultValue('/saml/sp/FederationMetadata.xml')->cannotBeEmpty()->end() |
40
|
20 |
|
->scalarNode('discovery_path')->defaultValue('/saml/sp/discovery')->cannotBeEmpty()->end() |
41
|
20 |
|
->scalarNode('local_logout_path')->defaultValue('/logout')->cannotBeEmpty()->end() |
42
|
20 |
|
->booleanNode('create_user_if_not_exists')->defaultFalse()->end() |
43
|
20 |
|
->arrayNode('services') |
44
|
20 |
|
->isRequired() |
45
|
20 |
|
->requiresAtLeastOneElement() |
46
|
20 |
|
->useAttributeAsKey('name') |
47
|
20 |
|
->prototype('array') |
48
|
20 |
|
->children() |
49
|
20 |
|
->arrayNode('idp')->isRequired() |
50
|
20 |
|
->children() |
51
|
20 |
|
->scalarNode('file')->end() |
52
|
20 |
|
->scalarNode('entity_id')->end() |
53
|
20 |
|
->scalarNode('id')->end() |
54
|
20 |
|
->end() |
55
|
20 |
|
->end() |
56
|
20 |
|
->arrayNode('sp')->addDefaultsIfNotSet() |
57
|
20 |
|
->children() |
58
|
20 |
|
->arrayNode('config')->addDefaultsIfNotSet() |
59
|
20 |
|
->children() |
60
|
20 |
|
->scalarNode('entity_id')->cannotBeEmpty()->isRequired()->end() |
61
|
20 |
|
->scalarNode('base_url')->defaultValue(null)->end() |
62
|
20 |
|
->booleanNode('want_assertions_signed')->cannotBeEmpty()->defaultFalse()->end() |
63
|
20 |
|
->end() |
64
|
20 |
|
->end() |
65
|
20 |
|
->arrayNode('signing')->addDefaultsIfNotSet() |
66
|
20 |
|
->children() |
67
|
20 |
|
->scalarNode('id')->cannotBeEmpty()->end() |
68
|
20 |
|
->scalarNode('cert_file')->end() |
69
|
20 |
|
->scalarNode('key_file')->end() |
70
|
20 |
|
->scalarNode('key_pass')->end() |
71
|
20 |
|
->end() |
72
|
20 |
|
->end() |
73
|
20 |
|
->arrayNode('meta')->addDefaultsIfNotSet() |
74
|
20 |
|
->children() |
75
|
20 |
|
->scalarNode('id')->end() |
76
|
20 |
|
->scalarNode('name_id_format') |
77
|
20 |
|
->cannotBeEmpty() |
78
|
20 |
|
->defaultValue('persistent') |
79
|
20 |
|
->end() |
80
|
20 |
|
->arrayNode('binding')->addDefaultsIfNotSet() |
81
|
20 |
|
->children() |
82
|
20 |
|
->enumNode('authn_request') |
83
|
20 |
|
->values(array('redirect', 'post')) |
84
|
20 |
|
->defaultValue('redirect') |
85
|
20 |
|
->cannotBeEmpty() |
86
|
20 |
|
->end() |
87
|
20 |
|
->enumNode('response') |
88
|
20 |
|
->values(array('redirect', 'post')) |
89
|
20 |
|
->defaultValue('post') |
90
|
20 |
|
->cannotBeEmpty() |
91
|
20 |
|
->end() |
92
|
20 |
|
->enumNode('logout_request') |
93
|
20 |
|
->values(array('redirect', 'post')) |
94
|
20 |
|
->defaultValue('redirect') |
95
|
20 |
|
->cannotBeEmpty() |
96
|
20 |
|
->end() |
97
|
20 |
|
->end() |
98
|
20 |
|
->end() |
99
|
20 |
|
->end() |
100
|
20 |
|
->end() |
101
|
20 |
|
->end() |
102
|
20 |
|
->end() |
103
|
20 |
|
->end() |
104
|
20 |
|
->end() |
105
|
20 |
|
->end() |
106
|
20 |
|
->end(); |
107
|
20 |
|
} |
108
|
|
|
|
109
|
|
|
|
110
|
13 |
|
protected function createListener($container, $id, $config, $userProvider) |
111
|
|
|
{ |
112
|
13 |
|
$this->addOption('login_path', $config['login_path']); |
113
|
13 |
|
$this->addOption('check_path', $config['check_path']); |
114
|
13 |
|
$this->addOption('logout_path', $config['logout_path']); |
115
|
13 |
|
$this->addOption('failure_path', $config['failure_path']); |
116
|
13 |
|
$this->addOption('metadata_path', $config['metadata_path']); |
117
|
13 |
|
$this->addOption('discovery_path', $config['discovery_path']); |
118
|
13 |
|
$this->addOption('local_logout_path', $config['local_logout_path']); |
119
|
|
|
|
120
|
13 |
|
$this->createServiceInfoCollection($container, $id, $config); |
121
|
13 |
|
$this->createStateStores($container, $id, $config); |
122
|
13 |
|
$this->createRelyingParties($container, $id, $config); |
123
|
|
|
|
124
|
13 |
|
$listenerId = parent::createListener($container, $id, $config, $userProvider); |
125
|
|
|
|
126
|
13 |
|
if ($config['relying_party']) { |
127
|
|
|
$container |
128
|
1 |
|
->getDefinition($listenerId) |
129
|
1 |
|
->addMethodCall('setRelyingParty', array(new Reference($config['relying_party']))) |
130
|
|
|
; |
131
|
1 |
|
} else { |
132
|
|
|
$container |
133
|
12 |
|
->getDefinition($listenerId) |
134
|
12 |
|
->addMethodCall('setRelyingParty', array(new Reference('aerial_ship_saml_sp.relying_party.composite.'.$id))) |
135
|
|
|
; |
136
|
|
|
} |
137
|
|
|
|
138
|
13 |
|
return $listenerId; |
139
|
|
|
} |
140
|
|
|
|
141
|
|
|
|
142
|
|
|
|
143
|
|
|
|
144
|
13 |
|
protected function createServiceInfoCollection(ContainerBuilder $container, $id, array $config) |
145
|
|
|
{ |
146
|
13 |
|
$collection = new DefinitionDecorator('aerial_ship_saml_sp.service_info_collection'); |
147
|
13 |
|
$container->setDefinition("aerial_ship_saml_sp.service_info_collection.{$id}", $collection); |
148
|
|
|
|
149
|
13 |
|
foreach ($config['services'] as $name => $asConfig) { |
150
|
13 |
|
$this->createSPSigningProvider($container, $id, $name, $asConfig['sp']['signing']); |
151
|
13 |
|
$this->createSPEntityDescriptorBuilder($container, $id, $name, $asConfig['sp']['config'], $config['check_path'], $config['logout_path']); |
152
|
13 |
|
$this->createIDPEntityDescriptorBuilder($container, $id, $name, $asConfig['idp']); |
153
|
13 |
|
$this->createSPMetaProvider($container, $id, $name, $asConfig['sp']['meta']); |
154
|
|
|
|
155
|
13 |
|
$provider = new DefinitionDecorator('aerial_ship_saml_sp.service_info'); |
156
|
|
|
|
157
|
13 |
|
$provider->replaceArgument(0, $id); |
158
|
13 |
|
$provider->replaceArgument(1, $name); |
159
|
13 |
|
$provider->replaceArgument(2, new Reference("aerial_ship_saml_sp.sp_entity_descriptor_builder.{$id}.{$name}")); |
160
|
13 |
|
$provider->replaceArgument(3, new Reference("aerial_ship_saml_sp.idp_entity_descriptor_provider.{$id}.{$name}")); |
161
|
13 |
|
$provider->replaceArgument(4, new Reference("aerial_ship_saml_sp.sp_meta_provider.{$id}.{$name}")); |
162
|
13 |
|
$provider->replaceArgument(5, new Reference("aerial_ship_saml_sp.sp_signing.{$id}.{$name}")); |
163
|
|
|
|
164
|
13 |
|
$container->setDefinition("aerial_ship_saml_sp.service_info.{$id}.{$name}", $provider); |
165
|
|
|
|
166
|
13 |
|
$collection->addMethodCall('add', array(new Reference("aerial_ship_saml_sp.service_info.{$id}.{$name}"))); |
167
|
13 |
|
} |
168
|
13 |
|
} |
169
|
|
|
|
170
|
13 |
|
protected function createSPSigningProvider(ContainerBuilder $container, $id, $name, array $config) |
171
|
|
|
{ |
172
|
13 |
|
$serviceID = "aerial_ship_saml_sp.sp_signing.{$id}.{$name}"; |
173
|
13 |
|
if (isset($config['id'])) { |
174
|
|
|
$container->setAlias($serviceID, $config['id']); |
175
|
13 |
|
} else if (isset($config['cert_file']) && |
176
|
|
|
isset($config['key_file']) |
177
|
13 |
|
) { |
178
|
|
|
$service = new DefinitionDecorator('aerial_ship_saml_sp.sp_signing.file'); |
179
|
|
|
$service->replaceArgument(1, $config['cert_file']); |
180
|
|
|
$service->replaceArgument(2, $config['key_file']); |
181
|
|
|
$service->replaceArgument(3, array_key_exists('key_pass', $config) ? $config['key_pass'] : null); |
182
|
|
|
$container->setDefinition($serviceID, $service); |
183
|
|
|
} else { |
184
|
13 |
|
$service = new DefinitionDecorator('aerial_ship_saml_sp.sp_signing.null'); |
185
|
13 |
|
$container->setDefinition($serviceID, $service); |
186
|
|
|
} |
187
|
13 |
|
} |
188
|
|
|
|
189
|
13 |
|
protected function createSPEntityDescriptorBuilder(ContainerBuilder $container, $id, $name, array $config, $checkPath, $logoutPath) |
190
|
|
|
{ |
191
|
13 |
|
$service = new DefinitionDecorator('aerial_ship_saml_sp.sp_entity_descriptor_builder'); |
192
|
13 |
|
$service->replaceArgument(0, $name); |
193
|
13 |
|
$service->replaceArgument(1, new Reference("aerial_ship_saml_sp.sp_signing.{$id}.{$name}")); |
194
|
13 |
|
$service->replaceArgument(2, $config); |
195
|
13 |
|
$service->replaceArgument(3, $checkPath); |
196
|
13 |
|
$service->replaceArgument(4, $logoutPath); |
197
|
13 |
|
$container->setDefinition("aerial_ship_saml_sp.sp_entity_descriptor_builder.{$id}.{$name}", $service); |
198
|
13 |
|
} |
199
|
|
|
|
200
|
13 |
|
protected function createIDPEntityDescriptorBuilder(ContainerBuilder $container, $id, $name, array $config) |
201
|
|
|
{ |
202
|
13 |
|
$serviceID = "aerial_ship_saml_sp.idp_entity_descriptor_provider.{$id}.{$name}"; |
203
|
13 |
|
if (isset($config['id'])) { |
204
|
1 |
|
$container->setAlias($serviceID, $config['id']); |
205
|
1 |
|
} else { |
206
|
13 |
|
$service = new DefinitionDecorator('aerial_ship_saml_sp.idp_entity_descriptor_provider'); |
207
|
13 |
|
$container->setDefinition($serviceID, $service); |
208
|
13 |
|
if (isset($config['file'])) { |
209
|
13 |
|
$service->addMethodCall('setFilename', array($config['file'])); |
210
|
13 |
|
if (isset($config['entity_id'])) { |
211
|
|
|
$service->addMethodCall('setEntityId', array($config['entity_id'])); |
212
|
|
|
} |
213
|
13 |
|
} |
214
|
|
|
} |
215
|
13 |
|
} |
216
|
|
|
|
217
|
13 |
|
protected function createSPMetaProvider(ContainerBuilder $container, $id, $name, array $config) |
218
|
|
|
{ |
219
|
13 |
|
$serviceID = "aerial_ship_saml_sp.sp_meta_provider.{$id}.{$name}"; |
220
|
13 |
|
if (isset($config['id'])) { |
221
|
1 |
|
$container->setAlias($serviceID, $config['id']); |
222
|
1 |
|
} else { |
223
|
13 |
|
$service = new DefinitionDecorator('aerial_ship_saml_sp.sp_meta_provider'); |
224
|
13 |
|
$service->replaceArgument(0, $config); |
225
|
13 |
|
$container->setDefinition("aerial_ship_saml_sp.sp_meta_provider.{$id}.{$name}", $service); |
226
|
|
|
} |
227
|
|
|
|
228
|
13 |
|
} |
229
|
|
|
|
230
|
|
|
|
231
|
13 |
|
protected function createStateStores(ContainerBuilder $container, $id, array $config) |
232
|
|
|
{ |
233
|
13 |
|
$this->createRequestStore($container, $id, $config); |
234
|
13 |
|
} |
235
|
|
|
|
236
|
13 |
|
protected function createRequestStore(ContainerBuilder $container, $id, array $config) |
|
|
|
|
237
|
|
|
{ |
238
|
13 |
|
$service = new DefinitionDecorator('aerial_ship_saml_sp.state.store.request'); |
239
|
13 |
|
$service->replaceArgument(1, $id); |
240
|
13 |
|
$container->setDefinition('aerial_ship_saml_sp.state.store.request.'.$id, $service); |
241
|
13 |
|
} |
242
|
|
|
|
243
|
13 |
|
protected function createRelyingParties(ContainerBuilder $container, $id, array $config) |
244
|
|
|
{ |
245
|
13 |
|
$this->createRelyingPartyDiscovery($container, $id, $config); |
246
|
13 |
|
$this->createRelyingPartyFederationMetadata($container, $id, $config); |
247
|
13 |
|
$this->createRelyingPartyAuthenticate($container, $id); |
248
|
13 |
|
$this->createRelyingPartyAssertionConsumer($container, $id); |
249
|
13 |
|
$this->createRelyingPartyLogout($container, $id); |
250
|
13 |
|
$this->createRelyingPartySSOSessionCheck($container, $id); |
251
|
13 |
|
$this->createRelyingPartyComposite($container, $id); |
252
|
13 |
|
} |
253
|
|
|
|
254
|
13 |
|
protected function createRelyingPartyDiscovery(ContainerBuilder $container, $id, array $config) |
|
|
|
|
255
|
|
|
{ |
256
|
13 |
|
$service = new DefinitionDecorator('aerial_ship_saml_sp.relying_party.discovery'); |
257
|
13 |
|
$service->replaceArgument(1, new Reference("aerial_ship_saml_sp.service_info_collection.{$id}")); |
258
|
13 |
|
$container->setDefinition("aerial_ship_saml_sp.relying_party.discovery.{$id}", $service); |
259
|
13 |
|
} |
260
|
|
|
|
261
|
13 |
|
protected function createRelyingPartyFederationMetadata(ContainerBuilder $container, $id, array $config) |
|
|
|
|
262
|
|
|
{ |
263
|
13 |
|
$service = new DefinitionDecorator('aerial_ship_saml_sp.relying_party.federation_metadata'); |
264
|
13 |
|
$service->replaceArgument(0, new Reference('aerial_ship_saml_sp.service_info_collection.'.$id)); |
265
|
13 |
|
$container->setDefinition('aerial_ship_saml_sp.relying_party.federation_metadata.'.$id, $service); |
266
|
13 |
|
} |
267
|
|
|
|
268
|
13 |
|
protected function createRelyingPartyAuthenticate(ContainerBuilder $container, $id) |
269
|
|
|
{ |
270
|
13 |
|
$service = new DefinitionDecorator('aerial_ship_saml_sp.relying_party.authenticate'); |
271
|
13 |
|
$service->replaceArgument(0, new Reference('aerial_ship_saml_sp.service_info_collection.'.$id)); |
272
|
13 |
|
$service->replaceArgument(1, new Reference('aerial_ship_saml_sp.state.store.request.'.$id)); |
273
|
13 |
|
$container->setDefinition('aerial_ship_saml_sp.relying_party.authenticate.'.$id, $service); |
274
|
13 |
|
} |
275
|
|
|
|
276
|
13 |
|
protected function createRelyingPartyAssertionConsumer(ContainerBuilder $container, $id) |
277
|
|
|
{ |
278
|
13 |
|
$service = new DefinitionDecorator('aerial_ship_saml_sp.relying_party.assertion_consumer'); |
279
|
13 |
|
$service->replaceArgument(1, new Reference('aerial_ship_saml_sp.service_info_collection.'.$id)); |
280
|
13 |
|
$service->replaceArgument(2, new Reference('aerial_ship_saml_sp.state.store.request.'.$id)); |
281
|
13 |
|
$container->setDefinition('aerial_ship_saml_sp.relying_party.assertion_consumer.'.$id, $service); |
282
|
13 |
|
} |
283
|
|
|
|
284
|
13 |
|
protected function createRelyingPartySSOSessionCheck(ContainerBuilder $container, $id) |
285
|
|
|
{ |
286
|
13 |
|
$service = new DefinitionDecorator('aerial_ship_saml_sp.relying_party.sso_session_check'); |
287
|
13 |
|
$service->replaceArgument(0, $id); |
288
|
13 |
|
$container->setDefinition('aerial_ship_saml_sp.relying_party.sso_session_check.'.$id, $service); |
289
|
13 |
|
} |
290
|
|
|
|
291
|
13 |
|
protected function createRelyingPartyLogout(ContainerBuilder $container, $id) |
292
|
|
|
{ |
293
|
13 |
|
$this->createRelyingPartyLogoutSendRequest($container, $id); |
294
|
13 |
|
$this->createRelyingPartyLogoutReceiveResponse($container, $id); |
295
|
13 |
|
$this->createRelyingPartyLogoutReceiveRequest($container, $id); |
296
|
|
|
|
297
|
13 |
|
$service = new DefinitionDecorator('aerial_ship_saml_sp.relying_party.logout'); |
298
|
13 |
|
$container->setDefinition('aerial_ship_saml_sp.relying_party.logout.'.$id, $service); |
299
|
|
|
|
300
|
13 |
|
$service->addMethodCall('append', array(new Reference('aerial_ship_saml_sp.relying_party.logout.receive_response.'.$id))); |
301
|
13 |
|
$service->addMethodCall('append', array(new Reference('aerial_ship_saml_sp.relying_party.logout.receive_request.'.$id))); |
302
|
|
|
// must come after receive response |
303
|
13 |
|
$service->addMethodCall('append', array(new Reference('aerial_ship_saml_sp.relying_party.logout.send_request.'.$id))); |
304
|
13 |
|
$service->addMethodCall('append', array(new Reference('aerial_ship_saml_sp.relying_party.logout.fallback'))); |
305
|
13 |
|
} |
306
|
|
|
|
307
|
13 |
|
protected function createRelyingPartyLogoutSendRequest(ContainerBuilder $container, $id) |
308
|
|
|
{ |
309
|
13 |
|
$service = new DefinitionDecorator('aerial_ship_saml_sp.relying_party.logout.send_request'); |
310
|
13 |
|
$service->replaceArgument(1, new Reference('aerial_ship_saml_sp.service_info_collection.'.$id)); |
311
|
13 |
|
$service->replaceArgument(2, new Reference('aerial_ship_saml_sp.state.store.request.'.$id)); |
312
|
13 |
|
$container->setDefinition("aerial_ship_saml_sp.relying_party.logout.send_request.{$id}", $service); |
313
|
13 |
|
} |
314
|
|
|
|
315
|
13 |
|
protected function createRelyingPartyLogoutReceiveResponse(ContainerBuilder $container, $id) |
316
|
|
|
{ |
317
|
13 |
|
$service = new DefinitionDecorator('aerial_ship_saml_sp.relying_party.logout.receive_response'); |
318
|
13 |
|
$service->replaceArgument(1, new Reference('aerial_ship_saml_sp.state.store.request.'.$id)); |
319
|
13 |
|
$service->replaceArgument(2, new Reference('aerial_ship_saml_sp.service_info_collection.'.$id)); |
320
|
13 |
|
$container->setDefinition("aerial_ship_saml_sp.relying_party.logout.receive_response.{$id}", $service); |
321
|
13 |
|
} |
322
|
|
|
|
323
|
13 |
|
protected function createRelyingPartyLogoutReceiveRequest(ContainerBuilder $container, $id) |
324
|
|
|
{ |
325
|
13 |
|
$service = new DefinitionDecorator('aerial_ship_saml_sp.relying_party.logout.receive_request'); |
326
|
13 |
|
$service->replaceArgument(2, new Reference('aerial_ship_saml_sp.service_info_collection.'.$id)); |
327
|
13 |
|
$container->setDefinition("aerial_ship_saml_sp.relying_party.logout.receive_request.{$id}", $service); |
328
|
13 |
|
} |
329
|
|
|
|
330
|
13 |
|
protected function createRelyingPartyComposite(ContainerBuilder $container, $id) |
331
|
|
|
{ |
332
|
13 |
|
$service = new DefinitionDecorator('aerial_ship_saml_sp.relying_party.composite'); |
333
|
13 |
|
$service->addMethodCall('append', array(new Reference('aerial_ship_saml_sp.relying_party.discovery.'.$id))); |
334
|
13 |
|
$service->addMethodCall('append', array(new Reference('aerial_ship_saml_sp.relying_party.federation_metadata.'.$id))); |
335
|
13 |
|
$service->addMethodCall('append', array(new Reference('aerial_ship_saml_sp.relying_party.authenticate.'.$id))); |
336
|
13 |
|
$service->addMethodCall('append', array(new Reference('aerial_ship_saml_sp.relying_party.assertion_consumer.'.$id))); |
337
|
13 |
|
$service->addMethodCall('append', array(new Reference('aerial_ship_saml_sp.relying_party.logout.'.$id))); |
338
|
|
|
// sso session check must be the last one since it can handle every request |
339
|
13 |
|
$service->addMethodCall('append', array(new Reference('aerial_ship_saml_sp.relying_party.sso_session_check.'.$id))); |
340
|
13 |
|
$container->setDefinition('aerial_ship_saml_sp.relying_party.composite.'.$id, $service); |
341
|
13 |
|
} |
342
|
|
|
|
343
|
|
|
|
344
|
|
|
/** |
345
|
|
|
* Subclasses must return the id of a service which implements the |
346
|
|
|
* AuthenticationProviderInterface. |
347
|
|
|
* |
348
|
|
|
* @param ContainerBuilder $container |
349
|
|
|
* @param string $id The unique id of the firewall |
350
|
|
|
* @param array $config The options array for this listener |
351
|
|
|
* @param string $userProviderId The id of the user provider |
352
|
|
|
* |
353
|
|
|
* @return string never null, the id of the authentication provider |
354
|
|
|
*/ |
355
|
13 |
|
protected function createAuthProvider(ContainerBuilder $container, $id, $config, $userProviderId) |
356
|
|
|
{ |
357
|
13 |
|
$providerId = 'security.authentication.provider.aerial_ship_saml_sp.'.$id; |
358
|
|
|
$provider = $container |
359
|
13 |
|
->setDefinition($providerId, new DefinitionDecorator('security.authentication.provider.aerial_ship_saml_sp')) |
360
|
13 |
|
->replaceArgument(0, $id); |
361
|
|
|
|
362
|
13 |
|
if (isset($config['provider'])) { |
363
|
1 |
|
$adapter = new DefinitionDecorator('aerial_ship_saml_sp.user_provider_adapter'); |
364
|
1 |
|
$adapter->replaceArgument(0, new Reference($userProviderId)); |
365
|
1 |
|
$adapterID = 'aerial_ship_saml_sp.user_provider_adapter.'.$id; |
366
|
1 |
|
$container->setDefinition($adapterID, $adapter); |
367
|
|
|
|
368
|
|
|
$provider |
369
|
1 |
|
->replaceArgument(1, new Reference($adapterID)) |
370
|
1 |
|
->replaceArgument(2, new Reference('security.user_checker')) |
371
|
|
|
; |
372
|
1 |
|
} |
373
|
13 |
|
if (!isset($config['create_user_if_not_exists'])) { |
374
|
|
|
$config['create_user_if_not_exists'] = false; |
375
|
|
|
} |
376
|
13 |
|
$provider->replaceArgument(3, $config['create_user_if_not_exists']); |
377
|
|
|
|
378
|
13 |
|
return $providerId; |
379
|
|
|
} |
380
|
|
|
|
381
|
|
|
|
382
|
|
|
/** |
383
|
|
|
* Subclasses must return the id of the listener template. |
384
|
|
|
* |
385
|
|
|
* Listener definitions should inherit from the AbstractAuthenticationListener |
386
|
|
|
* like this: |
387
|
|
|
* |
388
|
|
|
* <service id="my.listener.id" |
389
|
|
|
* class="My\Concrete\Classname" |
390
|
|
|
* parent="security.authentication.listener.abstract" |
391
|
|
|
* abstract="true" /> |
392
|
|
|
* |
393
|
|
|
* In the above case, this method would return "my.listener.id". |
394
|
|
|
* |
395
|
|
|
* @return string |
396
|
|
|
*/ |
397
|
13 |
|
protected function getListenerId() |
398
|
|
|
{ |
399
|
13 |
|
return 'security.authentication.listener.aerial_ship_saml_sp'; |
400
|
|
|
} |
401
|
|
|
|
402
|
1 |
|
public function getPosition() |
403
|
|
|
{ |
404
|
1 |
|
return 'form'; |
405
|
|
|
} |
406
|
|
|
|
407
|
14 |
|
public function getKey() |
408
|
|
|
{ |
409
|
14 |
|
return 'aerial_ship_saml_sp'; |
410
|
|
|
} |
411
|
|
|
|
412
|
|
|
|
413
|
|
|
/** |
414
|
|
|
* {@inheritDoc} |
415
|
|
|
*/ |
416
|
13 |
|
protected function createEntryPoint($container, $id, $config, $defaultEntryPoint) |
417
|
|
|
{ |
418
|
13 |
|
$entryPointId = 'security.authentication.form_entry_point.'.$id; |
419
|
|
|
|
420
|
|
|
$container |
421
|
13 |
|
->setDefinition($entryPointId, new DefinitionDecorator('security.authentication.form_entry_point')) |
422
|
13 |
|
->addArgument(new Reference('security.http_utils')) |
423
|
13 |
|
->addArgument($config['login_path']) |
424
|
13 |
|
->addArgument($config['use_forward']) |
425
|
|
|
; |
426
|
|
|
|
427
|
13 |
|
return $entryPointId; |
428
|
|
|
} |
429
|
|
|
} |
430
|
|
|
|
Adding explicit visibility (
private
,protected
, orpublic
) is generally recommend to communicate to other developers how, and from where this method is intended to be used.