from ipsilon.providers.common import ProviderBase, ProviderPageBase
from ipsilon.providers.common import FACILITY
from ipsilon.providers.saml2.auth import AuthenticateRequest
-from ipsilon.providers.saml2.admin import AdminPage
+from ipsilon.providers.saml2.admin import Saml2AdminPage
from ipsilon.providers.saml2.provider import IdentityProvider
from ipsilon.tools.certs import Certificate
from ipsilon.tools import saml2metadata as metadata
session = UserSession()
user = session.get_user()
- session.nuke_data('login', 'Return')
- self.stage = session.get_data('saml2', 'stage')
+ transdata = self.trans.retrieve()
+ self.stage = transdata['saml2_stage']
if user.is_anonymous:
self._debug("User is marked anonymous?!")
self._debug('Continue auth for %s' % user.name)
- dump = session.get_data('saml2', 'Request')
- if not dump:
+ if 'saml2_request' not in transdata:
self._debug("Couldn't find Request dump?!")
# TODO: Return to SP with auth failed error
raise cherrypy.HTTPError(400)
+ dump = transdata['saml2_request']
try:
login = self.cfg.idp.get_login_handler(dump)
def get_tree(self, site):
self.idp = self.init_idp()
self.page = SAML2(site, self)
- self.admin = AdminPage(site, self)
+ self.admin = Saml2AdminPage(site, self)
return self.page
def init_idp(self):
'idp certificate file': cert.cert,
'idp key file': cert.key,
'enabled': '1'}
- po.set_config(config)
- po.save_plugin_config(FACILITY)
+ po.save_plugin_config(FACILITY, config)
# Fixup permissions so only the ipsilon user can read these files
files.fix_user_dirs(path, opts['system_user'])