Fix bug with non-HTTP Shib sessions being valid for HTTP sessions
Previously, the `PreauthUserDetailsProvider` was only checking that a valid Shib session existed by looking for the regular or HTTP Shib session header. This check is now strengthened by validating the correct header exists for the correct instance.
parent
4106c401
No related branches found
No related tags found
Showing
- composer.json 1 addition, 1 deletioncomposer.json
- src/main/edu/wisc/doit/FederatedPreauthUserDetailsProvider.php 2 additions, 2 deletions...ain/edu/wisc/doit/FederatedPreauthUserDetailsProvider.php
- src/test/edu/wisc/doit/HTTPFederatedPreauthUserDetailsProviderTest.php 79 additions, 0 deletions...wisc/doit/HTTPFederatedPreauthUserDetailsProviderTest.php
- src/test/edu/wisc/doit/LocalUserDetailsProviderTest.php 1 addition, 1 deletionsrc/test/edu/wisc/doit/LocalUserDetailsProviderTest.php
- src/test/resources/localuser.json 1 addition, 2 deletionssrc/test/resources/localuser.json
- src/test/resources/testuser_http.json 16 additions, 0 deletionssrc/test/resources/testuser_http.json
... | @@ -4,7 +4,7 @@ | ... | @@ -4,7 +4,7 @@ |
"type": "library", | "type": "library", | ||
"homepage": "https://git.doit.wisc.edu/adi-ia/uw-php-security", | "homepage": "https://git.doit.wisc.edu/adi-ia/uw-php-security", | ||
"license": "Apache-2.0", | "license": "Apache-2.0", | ||
"version": "1.0.2", | "version": "1.0.3", | ||
"authors": [{ | "authors": [{ | ||
"name": "UW-Madison DoIT ADI Integrated Applications", | "name": "UW-Madison DoIT ADI Integrated Applications", | ||
"email": "adi-ia@lists.wisc.edu", | "email": "adi-ia@lists.wisc.edu", | ||
... | ... |
src/test/resources/testuser_http.json
0 → 100644
Please register or sign in to comment