Total Complexity | 112 |
Total Lines | 554 |
Duplicated Lines | 0 % |
Changes | 0 |
Complex classes like RADIUSTestsUI often do a lot of different things. To break such a class down, we need to identify a cohesive component within that class. A common approach to find such a component is to look for fields/methods that share the same prefixes, or suffixes.
Once you have determined the fields that belong together, you can apply the Extract Class refactoring. If the component makes sense as a sub-class, Extract Subclass is also a candidate, and is often faster.
While breaking up the class, it is a good idea to analyze how other classes use RADIUSTestsUI, and based on these observations, apply Extract Interface, too.
1 | <?php |
||
36 | class RADIUSTestsUI extends AbstractTest |
||
37 | { |
||
38 | |||
39 | /** |
||
40 | * This private variable contains the realm to be checked. Is filled in the |
||
41 | * class constructor. |
||
42 | * |
||
43 | * @var string |
||
44 | */ |
||
45 | public $realm = NULL; |
||
46 | public $outerUser = NULL; |
||
47 | |||
48 | /** |
||
49 | * result of the reachability tests |
||
50 | * |
||
51 | * @var array |
||
52 | */ |
||
53 | public $allReachabilityResults = []; |
||
54 | |||
55 | private $hostMap = []; |
||
56 | private $protocolsMap = []; |
||
57 | private $globalLevelStatic = \core\common\Entity::L_OK; |
||
58 | private $globalLevelDynamic = \core\common\Entity::L_OK; |
||
59 | private $rfc7585suite = NULL; |
||
60 | private $srv; |
||
61 | private $naptr; |
||
62 | private $naptrValid; |
||
63 | private $hosts; |
||
64 | private $testSuite; |
||
65 | private $areFailed = FALSE; |
||
66 | private $allCApathFailed = FALSE; |
||
67 | private $globalInfo = []; |
||
68 | private $stateIcons = []; |
||
69 | private $states; |
||
70 | private $certFields; |
||
71 | private $timestamp; |
||
72 | const RADIUS_TEST_OPERATION_MODE_SHALLOW = 1; |
||
73 | const RADIUS_TEST_OPERATION_MODE_THOROUGH = 2; |
||
74 | |||
75 | |||
76 | |||
77 | /** |
||
78 | * Constructor for the RADIUSTestsUI class. The single mandatory parameter is the |
||
79 | * token indicating tests that were carried out and saved as JSON files. |
||
80 | * |
||
81 | * @param string $token the token which points to a directory |
||
82 | * @throws Exception |
||
83 | */ |
||
84 | public function __construct($token) |
||
85 | { |
||
86 | parent::__construct(); |
||
87 | $this->globalInfo = [ |
||
88 | \core\common\Entity::L_OK => _("All tests passed."), |
||
89 | \core\common\Entity::L_WARN => _("There were some warnings."), |
||
90 | \core\common\Entity::L_ERROR => _("There were some errors."), |
||
91 | \core\common\Entity::L_REMARK => _("There were some remarks.") |
||
92 | ]; |
||
93 | $this->stateIcons = [ |
||
94 | \core\common\Entity::L_OK => '../resources/images/icons/Tabler/square-rounded-check-filled-green.svg', |
||
95 | \core\common\Entity::L_WARN => '../resources/images/icons/Tabler/alert-square-rounded-filled-yellow.svg', |
||
96 | \core\common\Entity::L_ERROR => '../resources/images/icons/Tabler/square-rounded-x-filled-red.svg', |
||
97 | \core\common\Entity::L_REMARK => '../resources/images/icons/Tabler/info-square-rounded-filled-blue.svg' |
||
98 | ]; |
||
99 | $this->states = [ |
||
100 | 'PASS' => _("PASS"), |
||
101 | 'FAIL' => _("FAIL") |
||
102 | ]; |
||
103 | $this->certFields = [ |
||
104 | 'subject' => _("Subject:"), |
||
105 | 'issuer' => _("Issuer:"), |
||
106 | 'validFrom' => _("Valid from:"), |
||
107 | 'validTo' => _("Valid to:"), |
||
108 | 'serialNumber' => _("Serial number:"), |
||
109 | 'sha1' => _("SHA1 fingerprint:"), |
||
110 | 'public_key_length' => _("Public key length:"), |
||
111 | 'title' => _("Server certificate"), |
||
112 | 'policies' => _("Policies:"), |
||
113 | 'crldistributionpoints' => _("crlDistributionPoint:"), |
||
114 | 'authorityinfoaccess' => _("authorityInfoAccess:"), |
||
115 | 'subjectaltname' => _("SubjectAltName:"), |
||
116 | ]; |
||
117 | $jsondir = dirname(dirname(dirname(__FILE__)))."/var/json_cache"; |
||
118 | if ($token && is_dir($jsondir.'/'.$token)) { |
||
119 | foreach (['realm', 'udp', 'clients', 'capath'] as $test_type) { |
||
120 | foreach (glob("$jsondir/$token/$test_type*") as $filename) { |
||
121 | $this->loggerInstance->debug(4, "\nIS_DIR $filename\n"); |
||
122 | if (!array_key_exists($test_type, $this->allReachabilityResults)) { |
||
123 | $this->allReachabilityResults[$test_type] = array(); |
||
124 | } |
||
125 | $this->allReachabilityResults[$test_type][] = json_decode(file_get_contents($filename)); |
||
126 | } |
||
127 | } |
||
128 | if ($this->allReachabilityResults['realm'][0]->realm) { |
||
129 | $this->realm = $this->allReachabilityResults['realm'][0]->realm; |
||
130 | $this->outerUser = $this->allReachabilityResults['realm'][0]->outeruser; |
||
131 | foreach ($this->allReachabilityResults['realm'][0]->totest as $totest) { |
||
132 | $this->hostMap[$totest->host] = $totest->bracketaddr; |
||
133 | if (property_exists($totest, 'protocols')) { |
||
134 | $this->protocolsMap[$totest->host] = $totest->protocols; |
||
135 | } |
||
136 | } |
||
137 | $this->rfc7585suite = unserialize(base64_decode($this->allReachabilityResults['realm'][0]->rfc7585suite)); |
||
138 | $this->srv = $this->allReachabilityResults['realm'][0]->srv; |
||
139 | $this->naptr = $this->allReachabilityResults['realm'][0]->naptr; |
||
140 | $this->naptrValid = $this->allReachabilityResults['realm'][0]->naptr_valid; |
||
141 | $this->hosts = $this->allReachabilityResults['realm'][0]->hosts; |
||
142 | $this->testSuite = unserialize(base64_decode($this->allReachabilityResults['realm'][0]->testsuite)); |
||
143 | } |
||
144 | $this->timestamp = $this->allReachabilityResults['realm'][0]->datetime; |
||
145 | } |
||
146 | } |
||
147 | |||
148 | public function getTimeStamp() |
||
149 | { |
||
150 | return $this->timestamp; |
||
151 | } |
||
152 | /** |
||
153 | * sets the global status for static tests |
||
154 | */ |
||
155 | public function setGlobalStaticResult() |
||
156 | { |
||
157 | foreach ($this->allReachabilityResults['udp'] as $udp) { |
||
158 | $this->globalLevelStatic = max($this->globalLevelStatic, $udp->result[0]->level); |
||
159 | } |
||
160 | } |
||
161 | |||
162 | public function setGlobalDynamicResult() |
||
163 | { |
||
164 | if (isset($this->allReachabilityResults['capath'])) { |
||
165 | foreach ($this->allReachabilityResults['capath'] as $capath) { |
||
166 | $this->globalLevelDynamic = max($this->globalLevelDynamic, $capath->level); |
||
167 | } |
||
168 | } |
||
169 | if (isset($this->allReachabilityResults['clients'])) { |
||
170 | foreach ($this->allReachabilityResults['clients'] as $clients) { |
||
171 | $srefused = FALSE; |
||
172 | $level = \core\common\Entity::L_OK; |
||
173 | $maxlevel = $level; |
||
174 | foreach ($clients->ca as $ca) { |
||
175 | foreach ($ca->certificate as $certificate) { |
||
176 | if ($certificate->returncode == \core\diag\RADIUSTests::RETVAL_CONNECTION_REFUSED) { |
||
177 | $srefused = $this->areFailed = TRUE; |
||
178 | } |
||
179 | } |
||
180 | if (!$srefused) { |
||
181 | foreach ($clients->ca as $cca) { |
||
182 | foreach ($cca->certificate as $certificate) { |
||
183 | $level = $certificate->returncode; |
||
184 | if ($level < 0) { |
||
185 | $level = \core\common\Entity::L_ERROR; |
||
186 | $this->areFailed = TRUE; |
||
187 | } |
||
188 | if ($certificate->expected != 'PASS') { |
||
189 | if ($certificate->connected == 1) { |
||
190 | $level = \core\common\Entity::L_WARN; |
||
191 | } else { |
||
192 | |||
193 | if ($certificate->status == 'EXPIRED' && property_exists($certificate, 'reason')) { |
||
194 | $level = \core\common\Entity::L_WARN; |
||
195 | } else { |
||
196 | $level = \core\common\Entity::L_OK; |
||
197 | } |
||
198 | } |
||
199 | } |
||
200 | if ($level > $maxlevel) { |
||
201 | $maxlevel = $level; |
||
202 | } |
||
203 | } |
||
204 | } |
||
205 | } |
||
206 | } |
||
207 | $this->globalLevelDynamic = max($this->globalLevelDynamic, $maxlevel); |
||
208 | } |
||
209 | } |
||
210 | } |
||
211 | |||
212 | public function isDynamic() |
||
213 | { |
||
214 | if ($this->naptr > 0) { |
||
215 | return TRUE; |
||
216 | } |
||
217 | return FALSE; |
||
218 | } |
||
219 | /** |
||
220 | * prints tabs-1 |
||
221 | * |
||
222 | * |
||
223 | */ |
||
224 | public function printOverview() |
||
225 | { |
||
226 | $out = []; |
||
227 | $out[] = "<fieldset class='option_container'> |
||
228 | <legend> |
||
229 | <strong>"._("Overview").'</strong> |
||
230 | </legend>'; |
||
231 | $out[] = "<strong>"._("DNS checks")."</strong><div>"; |
||
232 | if ($this->naptr != \core\diag\RADIUSTests::RETVAL_NOTCONFIGURED) { |
||
233 | $out[] = "<table>"; |
||
234 | $out[] = "<tr><td>"._("Checking NAPTR existence:")."</td><td>"; |
||
235 | switch ($this->naptr) { |
||
236 | case \core\diag\RFC7585Tests::RETVAL_NONAPTR: |
||
237 | $out[] = _("This realm has no NAPTR records."); |
||
238 | break; |
||
239 | case \core\diag\RFC7585Tests::RETVAL_ONLYUNRELATEDNAPTR: |
||
240 | $out[] = _("This realm has NAPTR records, but none are related to this roaming consortium."); |
||
241 | break; |
||
242 | default: // if none of the possible negative retvals, then we have matching NAPTRs |
||
243 | $out[] = sprintf(_("This realm has %d NAPTR records relating to this roaming consortium."), $this->naptr); |
||
244 | } |
||
245 | $out[] = "</td></tr>"; |
||
246 | |||
247 | if ($this->naptr > 0) { |
||
248 | $out[] = "<tr><td>"._("Checking NAPTR compliance (flag = S and regex = {empty}):")."</td><td>"; |
||
249 | switch ($this->naptrValid) { |
||
250 | case \core\diag\RADIUSTests::RETVAL_OK: |
||
251 | $out[] = "No issues found."; |
||
252 | break; |
||
253 | case \core\diag\RADIUSTests::RETVAL_INVALID: |
||
254 | $out[] = _("At least one NAPTR with invalid content found!"); |
||
255 | break; |
||
256 | } |
||
257 | $out[] = "</td></tr>"; |
||
258 | } |
||
259 | // SRV resolution |
||
260 | if ($this->naptr > 0 && $this->naptrValid == \core\diag\RADIUSTests::RETVAL_OK) { |
||
261 | $out[] = "<tr><td>"._("Checking SRVs:")."</td><td>"; |
||
262 | switch ($this->srv) { |
||
263 | case \core\diag\RADIUSTests::RETVAL_SKIPPED: |
||
264 | $out[] = _("This check was skipped."); |
||
265 | break; |
||
266 | case \core\diag\RADIUSTests::RETVAL_INVALID: |
||
267 | $out[] = _("At least one NAPTR with invalid content found!"); |
||
268 | break; |
||
269 | default: // print number of successfully retrieved SRV targets |
||
270 | $out[] = sprintf(_("%d host names discovered."), $this->srv); |
||
271 | } |
||
272 | $out[] = "</td></tr>"; |
||
273 | } |
||
274 | // IP addresses for the hosts |
||
275 | if ($this->naptr > 0 && $this->naptrValid == \core\diag\RADIUSTests::RETVAL_OK && $this->srv > 0) { |
||
276 | $out[] = "<tr><td>"._("Checking IP address resolution:")."</td><td>"; |
||
277 | switch ($this->srv) { |
||
278 | case \core\diag\RADIUSTests::RETVAL_SKIPPED: |
||
279 | $out[] = _("This check was skipped."); |
||
280 | break; |
||
281 | case \core\diag\RADIUSTests::RETVAL_INVALID: |
||
282 | $out[] = _("At least one hostname could not be resolved!"); |
||
283 | break; |
||
284 | default: // print number of successfully retrieved SRV targets |
||
285 | $out[] = sprintf(_("%d IP addresses resolved."), $this->hosts); |
||
286 | } |
||
287 | $out[] = "</td></tr>"; |
||
288 | } |
||
289 | |||
290 | $out[] = "</table><br/>"; |
||
291 | $out[] = sprintf(_("Realm is <strong>%s</strong> "), _(($this->naptr > 0 ? "DYNAMIC" : "STATIC"))); |
||
292 | if (count($this->testSuite->listerrors()) == 0) { |
||
293 | $out[] = _("with no DNS errors encountered. Congratulations!"); |
||
294 | } else { |
||
295 | $out[] = _("but there were DNS errors! Check them!")." "._("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below."); |
||
296 | $out[] = "<div class='notacceptable'><table>"; |
||
297 | foreach ($this->testSuite->listerrors() as $details) { |
||
298 | $out[] = "<tr><td>".$details['TYPE']."</td><td>".$details['TARGET']."</td></tr>"; |
||
299 | } |
||
300 | $out[] = "</table></div>"; |
||
301 | } |
||
302 | $out[] = '</div>'; |
||
303 | } else { |
||
304 | $out[] = "<tr><td>"._("Dynamic discovery test is not configured")."</td><td>"; |
||
305 | } |
||
306 | $out[] = "<hr><strong>"._("Static connectivity tests")."</strong> |
||
307 | <table><tr> |
||
308 | <td class='icon_td'>"; |
||
309 | $out[] = "<img src='".$this->stateIcons[$this->globalLevelStatic]."' id='main_static_ico' class='icon'></td><td id='main_static_result'>". |
||
310 | $this->globalInfo[$this->globalLevelStatic].' '. _("See the appropriate tab for details.").'</td> |
||
311 | </tr></table>'; |
||
312 | if ($this->naptr > 0) { |
||
313 | $out[] = "<hr><strong>"._("Dynamic connectivity tests")."</strong> |
||
314 | <table><tr> |
||
315 | <td class='icon_td'><img src='".$this->stateIcons[$this->globalLevelDynamic]."' id='main_dynamic_ico' class='icon'></td><td id='main_dynamic_result'>". |
||
316 | $this->globalInfo[$this->globalLevelDynamic].' '._("See the appropriate tab for details.").'</td></tr></table>'; |
||
317 | } |
||
318 | $out[] = '</fieldset>'; |
||
319 | return join('', $out); |
||
320 | } |
||
321 | |||
322 | public function printStatic() |
||
376 | } |
||
377 | |||
378 | private function collectCAPath() |
||
379 | { |
||
380 | $capathtest = []; |
||
381 | $capathtest[] = '<p><strong>'._("Checking server handshake...")."</strong><p>"; |
||
382 | $allfailed = TRUE; |
||
383 | foreach ($this->allReachabilityResults['capath'] as $capath) { |
||
384 | $hostindex = $capath->hostindex; |
||
385 | if ($capath->level == \core\common\Entity::L_OK && $capath->result == \core\diag\RADIUSTests::RETVAL_INVALID) { |
||
386 | $capath->level = \core\common\Entity::L_ERROR; |
||
387 | } |
||
388 | $level = $capath->level; |
||
389 | if ($level == \core\common\Entity::L_OK) { |
||
390 | $allfailed = FALSE; |
||
391 | } |
||
392 | $capathtest[] = '<p><strong>'.$this->hostMap[$capath->IP].'</strong> ('.$capath->name.') '; |
||
393 | $prots = []; |
||
394 | if (isset($this->protocolsMap[$capath->IP]) && $this->protocolsMap[$capath->IP] != '') { |
||
395 | $prots = explode(';', $this->protocolsMap[$capath->IP]); |
||
396 | if (!empty($prots)) { |
||
397 | $capathtest[] = ' ' . _("supported TLS protocols: "); |
||
398 | $capathtest[] = implode(', ', $prots); |
||
399 | if (!in_array("TLS1.3", $prots)) { |
||
400 | $capathtest[] = ' ' . '<font color="red">' . _("not supported: ") . 'TLS1.3</font>'; |
||
401 | } |
||
402 | } |
||
403 | } |
||
404 | $capathtest[] = '<ul style="list-style-type: none;" class="caresult"><li>'; |
||
405 | $capathtest[] = "<table id='caresults$hostindex' style='width:100%'> |
||
406 | <tr> |
||
407 | <td class='icon_td'><img src='"; |
||
408 | $capathtest[] = $this->stateIcons[$level]."' id='srcca".$hostindex."_img'></td> |
||
409 | <td id='srcca$hostindex'>"; |
||
410 | $more = ''; |
||
411 | if ($capath->certdata && $capath->certdata->subject != '') { |
||
412 | $more .= '<div class="more">'; |
||
413 | $certdesc = '<br>'.$this->certFields['title'].'<ul>'; |
||
414 | if ($capath->certdata->subject) { |
||
415 | $certdesc .= '<li>'.$this->certFields['subject'].' '.$capath->certdata->subject; |
||
416 | } |
||
417 | if ($capath->certdata->issuer) { |
||
418 | $certdesc .= '<li>'.$this->certFields['issuer'].' '.$capath->certdata->issuer; |
||
419 | } |
||
420 | if ($capath->certdata->validTo) { |
||
421 | $certdesc .= '<li>'.$this->certFields['validTo'].' '. |
||
422 | date_create_from_format('ymdGis', |
||
423 | substr($capath->certdata->validTo, 0, -1))->format('Y-m-d H:i:s'). ' UTC'; |
||
424 | } |
||
425 | if ($capath->certdata->extensions) { |
||
426 | if ($capath->certdata->extensions->subjectaltname) { |
||
427 | $certdesc .= '<li>'.$this->certFields['subjectaltname'].' '.$capath->certdata->extensions->subjectaltname; |
||
428 | } |
||
429 | } |
||
430 | if ($capath->certdata->extensions->policies) { |
||
431 | $certdesc .= '<li>'.$this->certFields['policies'].' '.$capath->certdata->extensions->policies; |
||
432 | } |
||
433 | if ($capath->certdata->extensions->crldistributionpoints) { |
||
434 | $certdesc .= '<li>'.$this->certFields['crldistributionpoints'].' '.$capath->certdata->extensions->crldistributionpoints; |
||
435 | } |
||
436 | if ($capath->certdata->extensions->authorityinfoaccess) { |
||
437 | $certdesc .= '<li>'.$this->certFields['authorityinfoaccess'].' '.$capath->certdata->extensions->authorityinfoaccess; |
||
438 | } |
||
439 | |||
440 | $certdesc .= '</ul>'; |
||
441 | $more .= '<span class="morecontent"><span>'.$certdesc.$protocoldesc. |
||
442 | '</span> <a href="" class="morelink">'._("more").'»</a></span></td></tr>'; |
||
443 | } else { |
||
444 | $certdesc = '<br>'; |
||
445 | } |
||
446 | $capathtest[] = '<div>'.($capath->message!='' ? $capath->message : _('Test failed')).'</div>'.$more; |
||
447 | $capathtest[] = '</td> |
||
448 | </tr> |
||
449 | </table>'; |
||
450 | $capathtest[] = '</li></ul>'; |
||
451 | } |
||
452 | $this->allCApathFailed = $allfailed; |
||
453 | return $capathtest; |
||
454 | } |
||
455 | |||
456 | private function collectClients() |
||
457 | { |
||
458 | $clientstest = []; |
||
459 | foreach ($this->allReachabilityResults['clients'] as $clients) { |
||
460 | if ($clients->result == RADIUSTests::RETVAL_SKIPPED) { |
||
461 | continue; |
||
462 | } |
||
463 | $hostindex = $clients->hostindex; |
||
464 | $clientstest[] = '<p><strong>'.$this->hostMap[$clients->IP].'</strong></p>'; |
||
465 | $clientstest[] = "<span id='clientresults$hostindex'>"; |
||
466 | $clientstest[] = '<p></p>'; |
||
467 | if ($this->globalLevelDynamic != \core\common\Entity::L_ERROR) { |
||
468 | if (property_exists($clients, 'ca')) { |
||
469 | $clientstest[] = '<ol>'; |
||
470 | foreach ($clients->ca as $ca) { |
||
471 | $srefused = 0; |
||
472 | $cliinfo = ''; |
||
473 | $cliinfo .= '<li>'._('Client certificate').' <b>'.$ca->clientcertinfo->from. |
||
474 | '</b>'.', '.$ca->clientcertinfo->message . |
||
475 | '<br> (CA: '.$ca->clientcertinfo->issuer.')<ul>'; |
||
476 | foreach ($ca->certificate as $certificate) { |
||
477 | if ($certificate->returncode == \core\diag\RADIUSTests::RETVAL_CONNECTION_REFUSED) { |
||
478 | $srefused = 1; |
||
479 | } |
||
480 | } |
||
481 | if ($srefused == 0) { |
||
482 | foreach ($ca->certificate as $certificate) { |
||
483 | $cliinfo .= '<li><i>'.$certificate->message. |
||
484 | ', '._("expected result: ").$this->states[$certificate->expected].'</i>'; |
||
485 | $cliinfo .= '<ul style="list-style-type: none;">'; |
||
486 | if (property_exists($certificate, 'finalerror') && $certificate->finalerror == 2) { |
||
487 | $cliinfo .= '<li>'._('this test was skipped - no appropriate client certificate').'</li></ul>'; |
||
488 | continue; |
||
489 | } |
||
490 | $level = $certificate->returncode; |
||
491 | if ($level < 0) { |
||
492 | $level = \core\common\Entity::L_ERROR; |
||
493 | } |
||
494 | $add = ''; |
||
495 | if ($certificate->expected == 'PASS') { |
||
496 | if ($certificate->connected == 1) { |
||
497 | $state = _("Server accepted this client certificate"); |
||
498 | } else { |
||
499 | if (property_exists($certificate, 'reason') && $certificate->reason == \core\diag\RADIUSTests::CERTPROB_UNKNOWN_CA) { |
||
500 | $add = '<br>'._('You should update your list of accredited CAs'). |
||
501 | ' <a href=\"'.\config\Diagnostics::RADIUSTESTS['accreditedCAsURL'].'\">'. |
||
502 | _('Get it from here.').'</a>'; |
||
503 | } |
||
504 | $state = _('Server did not accept this client certificate - reason').': '. |
||
505 | $certificate->resultcomment; |
||
506 | } |
||
507 | } else { |
||
508 | if ($certificate->connected == 1) { |
||
509 | $level = \core\common\Entity::L_WARN; |
||
510 | $state = _('Server accepted this client certificate, but should not have'); |
||
511 | } else { |
||
512 | $level = \core\common\Entity::L_OK; |
||
513 | $state = _('Server did not accept this client certificate').': '.$certificate->resultcomment; |
||
514 | } |
||
515 | } |
||
516 | $cliinfo .= '<li><table><tbody><tr><td class="icon_td"><img class="icon" src="'.$this->stateIcons[$level].'" style="width: 24px;"></td><td>'.$state; |
||
517 | $cliinfo .= ' ('.sprintf(_('elapsed time: %sms.'), $certificate->time_millisec).' ) '.$add.'</td></tr>'; |
||
518 | $cliinfo .= '</tbody></table></ul></li>'; |
||
519 | if (property_exists($certificate, 'finalerror')) { |
||
520 | if ($certificate->finalerror == 1) { |
||
521 | $cliinfo .= '<li>'._('Rest of tests for this CA skipped').'</li>'; |
||
522 | } |
||
523 | } |
||
524 | } |
||
525 | $cliinfo .= '</ul>'; |
||
526 | } |
||
527 | |||
528 | if ($srefused > 0) { |
||
529 | $cliinfo = _('Connection refused'); |
||
530 | $clientstest[] = "<table><tr><td class='icon_td' id='srcclient".$hostindex."_img'><img src='".$this->stateIcons[\core\common\Entity::L_ERROR]."'></td>". |
||
531 | "<td id='srcclient$hostindex'><p>$cliinfo</p></td></tr></table>"; |
||
532 | } else { |
||
533 | $clientstest[] = "<p>$cliinfo</p>"; |
||
534 | } |
||
535 | } |
||
536 | |||
537 | } else { |
||
538 | $cliinfo = _('Test failed'); |
||
539 | $clientstest[] = "<table><tr><td class='icon_td' id='srcclient".$hostindex."_img'><img src='". |
||
540 | $this->stateIcons[\core\common\Entity::L_WARN]."'></td>" . |
||
541 | "<td id='srcclient$hostindex'>$cliinfo</td></tr></table>"; |
||
542 | } |
||
543 | } else { |
||
544 | $clientstest[] = '<ul style="list-style-type: none;" class="clientsresult"><li>'; |
||
545 | $clientstest[] = "<table id='clientsresults$hostindex' style='width:100%'> |
||
546 | <tr> |
||
547 | <td class='icon_td'><img src='"; |
||
548 | $clientstest[] = $this->stateIcons[\core\common\Entity::L_ERROR]."' id='srcclients".$hostindex."_img'></td> |
||
549 | <td id='srcclient$hostindex'>"; |
||
550 | $clientstest[] = _("These tests were skipped because of previous errors.").'</td></tr></table></ul>'; |
||
551 | } |
||
552 | $clientstest[] = '</ol><p></p>'; |
||
553 | } |
||
554 | return $clientstest; |
||
555 | } |
||
556 | |||
557 | public function printDynamic() |
||
590 | } |
||
591 | |||
592 | } |
||
593 |
The issue could also be caused by a filter entry in the build configuration. If the path has been excluded in your configuration, e.g.
excluded_paths: ["lib/*"]
, you can move it to the dependency path list as follows:For further information see https://scrutinizer-ci.com/docs/tools/php/php-scrutinizer/#list-dependency-paths