@@ -76,7 +76,7 @@ discard block |
||
| 76 | 76 | $delProfiles[] = $ssid; |
| 77 | 77 | } |
| 78 | 78 | if ($cipher == 'TKIP') { |
| 79 | - $delProfiles[] = $ssid . ' (TKIP)'; |
|
| 79 | + $delProfiles[] = $ssid.' (TKIP)'; |
|
| 80 | 80 | } |
| 81 | 81 | } |
| 82 | 82 | |
@@ -86,7 +86,7 @@ discard block |
||
| 86 | 86 | $iterator = 0; |
| 87 | 87 | foreach ($allSSID as $ssid => $cipher) { |
| 88 | 88 | if ($cipher == 'TKIP') { |
| 89 | - $windowsProfile[$iterator] = $this->writeWLANprofile($ssid . ' (TKIP)', $ssid, 'WPA', 'TKIP', $eapConfig, $iterator); |
|
| 89 | + $windowsProfile[$iterator] = $this->writeWLANprofile($ssid.' (TKIP)', $ssid, 'WPA', 'TKIP', $eapConfig, $iterator); |
|
| 90 | 90 | $iterator++; |
| 91 | 91 | } |
| 92 | 92 | $windowsProfile[$iterator] = $this->writeWLANprofile($ssid, $ssid, 'WPA2', 'AES', $eapConfig, $iterator); |
@@ -148,10 +148,10 @@ discard block |
||
| 148 | 148 | $profileFileCont = '<EAPConfig><EapHostConfig xmlns="http://www.microsoft.com/provisioning/EapHostConfig"> |
| 149 | 149 | <EapMethod> |
| 150 | 150 | <Type xmlns="http://www.microsoft.com/provisioning/EapCommon">' . |
| 151 | - $this->selectedEap["OUTER"] . '</Type> |
|
| 151 | + $this->selectedEap["OUTER"].'</Type> |
|
| 152 | 152 | <VendorId xmlns="http://www.microsoft.com/provisioning/EapCommon">0</VendorId> |
| 153 | 153 | <VendorType xmlns="http://www.microsoft.com/provisioning/EapCommon">0</VendorType> |
| 154 | -<AuthorId xmlns="http://www.microsoft.com/provisioning/EapCommon">' . $authorId . '</AuthorId> |
|
| 154 | +<AuthorId xmlns="http://www.microsoft.com/provisioning/EapCommon">' . $authorId.'</AuthorId> |
|
| 155 | 155 | </EapMethod> |
| 156 | 156 | '; |
| 157 | 157 | |
@@ -164,9 +164,9 @@ discard block |
||
| 164 | 164 | $profileFileCont .= ' |
| 165 | 165 | <Config xmlns="http://www.microsoft.com/provisioning/EapHostConfig"> |
| 166 | 166 | <EAPIdentityProviderList xmlns="urn:ietf:params:xml:ns:yang:ietf-eap-metadata"> |
| 167 | -<EAPIdentityProvider ID="' . $this->deviceUUID . '" namespace="urn:UUID"> |
|
| 167 | +<EAPIdentityProvider ID="' . $this->deviceUUID.'" namespace="urn:UUID"> |
|
| 168 | 168 | <ProviderInfo> |
| 169 | -<DisplayName>' . $this->translateString($attr['general:instname'][0]) . '</DisplayName> |
|
| 169 | +<DisplayName>' . $this->translateString($attr['general:instname'][0]).'</DisplayName> |
|
| 170 | 170 | </ProviderInfo> |
| 171 | 171 | <AuthenticationMethods> |
| 172 | 172 | <AuthenticationMethod> |
@@ -178,7 +178,7 @@ discard block |
||
| 178 | 178 | if ($outerUser == '') { |
| 179 | 179 | $profileFileCont .= '<AnonymousIdentity>@</AnonymousIdentity>'; |
| 180 | 180 | } else { |
| 181 | - $profileFileCont .= '<AnonymousIdentity>' . $outerUser . '@' . $realm . '</AnonymousIdentity>'; |
|
| 181 | + $profileFileCont .= '<AnonymousIdentity>'.$outerUser.'@'.$realm.'</AnonymousIdentity>'; |
|
| 182 | 182 | } |
| 183 | 183 | } |
| 184 | 184 | $profileFileCont .= '</ClientSideCredential> |
@@ -196,7 +196,7 @@ discard block |
||
| 196 | 196 | $profileFileCont .= ' |
| 197 | 197 | </ServerSideCredential> |
| 198 | 198 | <InnerAuthenticationMethod> |
| 199 | -<NonEAPAuthMethod>' .$innerMethod. '</NonEAPAuthMethod> |
|
| 199 | +<NonEAPAuthMethod>' .$innerMethod.'</NonEAPAuthMethod> |
|
| 200 | 200 | </InnerAuthenticationMethod> |
| 201 | 201 | <VendorSpecific> |
| 202 | 202 | <SessionResumption>false</SessionResumption> |
@@ -221,11 +221,11 @@ discard block |
||
| 221 | 221 | </eapTls:CredentialsSource> |
| 222 | 222 | <eapTls:ServerValidation> |
| 223 | 223 | <eapTls:DisableUserPromptForServerValidation>true</eapTls:DisableUserPromptForServerValidation> |
| 224 | -<eapTls:ServerNames>' . $servers . '</eapTls:ServerNames>'; |
|
| 224 | +<eapTls:ServerNames>' . $servers.'</eapTls:ServerNames>'; |
|
| 225 | 225 | if ($caArray) { |
| 226 | 226 | foreach ($caArray as $certAuthority) { |
| 227 | 227 | if ($certAuthority['root']) { |
| 228 | - $profileFileCont .= "<eapTls:TrustedRootCA>" . $certAuthority['sha1'] . "</eapTls:TrustedRootCA>\n"; |
|
| 228 | + $profileFileCont .= "<eapTls:TrustedRootCA>".$certAuthority['sha1']."</eapTls:TrustedRootCA>\n"; |
|
| 229 | 229 | } |
| 230 | 230 | } |
| 231 | 231 | } |
@@ -257,11 +257,11 @@ discard block |
||
| 257 | 257 | <msPeap:EapType> |
| 258 | 258 | <msPeap:ServerValidation> |
| 259 | 259 | <msPeap:DisableUserPromptForServerValidation>true</msPeap:DisableUserPromptForServerValidation> |
| 260 | -<msPeap:ServerNames>' . $servers . '</msPeap:ServerNames>'; |
|
| 260 | +<msPeap:ServerNames>' . $servers.'</msPeap:ServerNames>'; |
|
| 261 | 261 | if ($caArray) { |
| 262 | 262 | foreach ($caArray as $certAuthority) { |
| 263 | 263 | if ($certAuthority['root']) { |
| 264 | - $vistaExt .= "<msPeap:TrustedRootCA>" . $certAuthority['sha1'] . "</msPeap:TrustedRootCA>\n"; |
|
| 264 | + $vistaExt .= "<msPeap:TrustedRootCA>".$certAuthority['sha1']."</msPeap:TrustedRootCA>\n"; |
|
| 265 | 265 | } |
| 266 | 266 | } |
| 267 | 267 | } |
@@ -274,7 +274,7 @@ discard block |
||
| 274 | 274 | <msChapV2:UseWinLogonCredentials>false</msChapV2:UseWinLogonCredentials> |
| 275 | 275 | </msChapV2:EapType> |
| 276 | 276 | </baseEap:Eap> |
| 277 | -<msPeap:EnableQuarantineChecks>' . $nea . '</msPeap:EnableQuarantineChecks> |
|
| 277 | +<msPeap:EnableQuarantineChecks>' . $nea.'</msPeap:EnableQuarantineChecks> |
|
| 278 | 278 | <msPeap:RequireCryptoBinding>false</msPeap:RequireCryptoBinding> |
| 279 | 279 | </msPeap:EapType> |
| 280 | 280 | </baseEap:Eap> |
@@ -286,11 +286,11 @@ discard block |
||
| 286 | 286 | <EapType xmlns="http://www.microsoft.com/provisioning/MsPeapConnectionPropertiesV1"> |
| 287 | 287 | <ServerValidation> |
| 288 | 288 | <DisableUserPromptForServerValidation>true</DisableUserPromptForServerValidation> |
| 289 | -<ServerNames>' . $servers . '</ServerNames>'; |
|
| 289 | +<ServerNames>' . $servers.'</ServerNames>'; |
|
| 290 | 290 | if ($caArray) { |
| 291 | 291 | foreach ($caArray as $certAuthority) { |
| 292 | 292 | if ($certAuthority['root']) { |
| 293 | - $w7Ext .= "<TrustedRootCA>" . $certAuthority['sha1'] . "</TrustedRootCA>\n"; |
|
| 293 | + $w7Ext .= "<TrustedRootCA>".$certAuthority['sha1']."</TrustedRootCA>\n"; |
|
| 294 | 294 | } |
| 295 | 295 | } |
| 296 | 296 | } |
@@ -303,14 +303,14 @@ discard block |
||
| 303 | 303 | <UseWinLogonCredentials>false</UseWinLogonCredentials> |
| 304 | 304 | </EapType> |
| 305 | 305 | </Eap> |
| 306 | -<EnableQuarantineChecks>' . $nea . '</EnableQuarantineChecks> |
|
| 306 | +<EnableQuarantineChecks>' . $nea.'</EnableQuarantineChecks> |
|
| 307 | 307 | <RequireCryptoBinding>false</RequireCryptoBinding> |
| 308 | 308 | '; |
| 309 | 309 | if ($useAnon) { |
| 310 | 310 | $w7Ext .= '<PeapExtensions> |
| 311 | 311 | <IdentityPrivacy xmlns="http://www.microsoft.com/provisioning/MsPeapConnectionPropertiesV2"> |
| 312 | 312 | <EnableIdentityPrivacy>true</EnableIdentityPrivacy> |
| 313 | -<AnonymousUserName>' . $outerUser . '</AnonymousUserName> |
|
| 313 | +<AnonymousUserName>' . $outerUser.'</AnonymousUserName> |
|
| 314 | 314 | </IdentityPrivacy> |
| 315 | 315 | </PeapExtensions> |
| 316 | 316 | '; |
@@ -328,8 +328,8 @@ discard block |
||
| 328 | 328 | $profileFileContEnd = '</EapHostConfig></EAPConfig> |
| 329 | 329 | '; |
| 330 | 330 | $returnArray = []; |
| 331 | - $returnArray['vista'] = $profileFileCont . $vistaExt . $profileFileContEnd; |
|
| 332 | - $returnArray['w7'] = $profileFileCont . $w7Ext . $profileFileContEnd; |
|
| 331 | + $returnArray['vista'] = $profileFileCont.$vistaExt.$profileFileContEnd; |
|
| 332 | + $returnArray['w7'] = $profileFileCont.$w7Ext.$profileFileContEnd; |
|
| 333 | 333 | return $returnArray; |
| 334 | 334 | } |
| 335 | 335 | |
@@ -348,10 +348,10 @@ discard block |
||
| 348 | 348 | private function writeWLANprofile($wlanProfileName, $ssid, $auth, $encryption, $eapConfig, $profileNumber) { |
| 349 | 349 | $profileFileCont = '<?xml version="1.0"?> |
| 350 | 350 | <WLANProfile xmlns="http://www.microsoft.com/networking/WLAN/profile/v1"> |
| 351 | -<name>' . $wlanProfileName . '</name> |
|
| 351 | +<name>' . $wlanProfileName.'</name> |
|
| 352 | 352 | <SSIDConfig> |
| 353 | 353 | <SSID> |
| 354 | -<name>' . $ssid . '</name> |
|
| 354 | +<name>' . $ssid.'</name> |
|
| 355 | 355 | </SSID> |
| 356 | 356 | <nonBroadcast>true</nonBroadcast> |
| 357 | 357 | </SSIDConfig> |
@@ -361,8 +361,8 @@ discard block |
||
| 361 | 361 | <MSM> |
| 362 | 362 | <security> |
| 363 | 363 | <authEncryption> |
| 364 | -<authentication>' . $auth . '</authentication> |
|
| 365 | -<encryption>' . $encryption . '</encryption> |
|
| 364 | +<authentication>' . $auth.'</authentication> |
|
| 365 | +<encryption>' . $encryption.'</encryption> |
|
| 366 | 366 | <useOneX>true</useOneX> |
| 367 | 367 | </authEncryption> |
| 368 | 368 | '; |
@@ -392,9 +392,9 @@ discard block |
||
| 392 | 392 | mkdir('vista'); |
| 393 | 393 | } |
| 394 | 394 | $vistaFileName = "vista/wlan_prof-$profileNumber.xml"; |
| 395 | - file_put_contents($vistaFileName, $profileFileCont . $eapConfig['vista'] . $closing); |
|
| 395 | + file_put_contents($vistaFileName, $profileFileCont.$eapConfig['vista'].$closing); |
|
| 396 | 396 | $sevenFileName = "w7/wlan_prof-$profileNumber.xml"; |
| 397 | - file_put_contents($sevenFileName, $profileFileCont . $eapConfig['w7'] . $closing); |
|
| 397 | + file_put_contents($sevenFileName, $profileFileCont.$eapConfig['w7'].$closing); |
|
| 398 | 398 | $this->loggerInstance->debug(2, "Installer has been written into directory $this->FPATH\n"); |
| 399 | 399 | $this->loggerInstance->debug(4, "WLAN_Profile:$wlanProfileName:$encryption\n"); |
| 400 | 400 | return("\"$wlanProfileName\" \"$encryption\""); |
@@ -431,8 +431,8 @@ discard block |
||
| 431 | 431 | mkdir('vista'); |
| 432 | 432 | } |
| 433 | 433 | |
| 434 | - file_put_contents("vista/lan_prof.xml", $profileFileCont . $eapConfig['vista'] . $closing); |
|
| 435 | - file_put_contents("w7/lan_prof.xml", $profileFileCont . $eapConfig['w7'] . $closing); |
|
| 434 | + file_put_contents("vista/lan_prof.xml", $profileFileCont.$eapConfig['vista'].$closing); |
|
| 435 | + file_put_contents("w7/lan_prof.xml", $profileFileCont.$eapConfig['w7'].$closing); |
|
| 436 | 436 | |
| 437 | 437 | } |
| 438 | 438 | |
@@ -446,7 +446,7 @@ discard block |
||
| 446 | 446 | private function writeMainNSH($eap, $attr) { |
| 447 | 447 | $this->loggerInstance->debug(4, "writeMainNSH"); |
| 448 | 448 | $this->loggerInstance->debug(4, $attr); |
| 449 | - $this->loggerInstance->debug(4, "MYLANG=" . $this->lang . "\n"); |
|
| 449 | + $this->loggerInstance->debug(4, "MYLANG=".$this->lang."\n"); |
|
| 450 | 450 | |
| 451 | 451 | $eapOptions = [ |
| 452 | 452 | \core\common\EAP::PEAP => ['str' => 'PEAP', 'exec' => 'user'], |
@@ -477,8 +477,8 @@ discard block |
||
| 477 | 477 | $this->loggerInstance->debug(4, "EAP_STR=$eapStr\n"); |
| 478 | 478 | $this->loggerInstance->debug(4, $eap); |
| 479 | 479 | |
| 480 | - $fcontents .= '!define ' . $eapStr; |
|
| 481 | - $fcontents .= "\n" . '!define EXECLEVEL "' . $execLevel . '"'; |
|
| 480 | + $fcontents .= '!define '.$eapStr; |
|
| 481 | + $fcontents .= "\n".'!define EXECLEVEL "'.$execLevel.'"'; |
|
| 482 | 482 | $fcontents .= $this->writeNsisDefines($attr); |
| 483 | 483 | file_put_contents('main.nsh', $fcontents); |
| 484 | 484 | } |
@@ -507,7 +507,7 @@ discard block |
||
| 507 | 507 | } |
| 508 | 508 | foreach ($caArray as $certAuthority) { |
| 509 | 509 | $store = $certAuthority['root'] ? "root" : "ca"; |
| 510 | - $contentCerts .= '!insertmacro install_ca_cert "' . $certAuthority['file'] . '" "' . $certAuthority['sha1'] . '" "' . $store . "\"\n"; |
|
| 510 | + $contentCerts .= '!insertmacro install_ca_cert "'.$certAuthority['file'].'" "'.$certAuthority['sha1'].'" "'.$store."\"\n"; |
|
| 511 | 511 | } |
| 512 | 512 | fwrite($fileHandleCerts, $contentCerts); |
| 513 | 513 | fclose($fileHandleCerts); |
@@ -45,7 +45,7 @@ |
||
| 45 | 45 | private function getCredentialSource() |
| 46 | 46 | { |
| 47 | 47 | $element = new \core\DeviceXMLmain(); |
| 48 | - $element->setChild('CertificateStore',''); |
|
| 48 | + $element->setChild('CertificateStore', ''); |
|
| 49 | 49 | return($element); |
| 50 | 50 | } |
| 51 | 51 | |
@@ -38,7 +38,7 @@ |
||
| 38 | 38 | { |
| 39 | 39 | $element = new \core\DeviceXMLmain(); |
| 40 | 40 | $element->setChild('ServerValidation', $this->getPeapServerValidation()); |
| 41 | - $element->setChild('FastReconnect','true'); |
|
| 41 | + $element->setChild('FastReconnect', 'true'); |
|
| 42 | 42 | $element->setChild('InnerEapOptional', 'false'); |
| 43 | 43 | $element->setChild('Eap', $this->getMsChapV2(), self::MS_BASEEAPCONN_NS); |
| 44 | 44 | $element->setChild('EnableQuarantineChecks', $this->nea); |
@@ -43,8 +43,8 @@ |
||
| 43 | 43 | { |
| 44 | 44 | $element = new \core\DeviceXMLmain(); |
| 45 | 45 | $element->setChild('Type', $this->eapConfig->type, self::MS_EAPCOMMON_NS); |
| 46 | - $element->setChild('VendorId',0, self::MS_EAPCOMMON_NS); |
|
| 47 | - $element->setChild('VendorType',0, self::MS_EAPCOMMON_NS); |
|
| 46 | + $element->setChild('VendorId', 0, self::MS_EAPCOMMON_NS); |
|
| 47 | + $element->setChild('VendorType', 0, self::MS_EAPCOMMON_NS); |
|
| 48 | 48 | $element->setChild('AuthorId', $this->eapConfig->authorId, self::MS_EAPCOMMON_NS); |
| 49 | 49 | return($element); |
| 50 | 50 | } |
@@ -73,7 +73,7 @@ |
||
| 73 | 73 | $dom = new \DOMDocument('1.0', 'utf-8'); |
| 74 | 74 | $root = $dom->createElement($rootname); |
| 75 | 75 | $dom->appendChild($root); |
| 76 | - $ns = $dom->createAttributeNS( null, 'xmlns' ); |
|
| 76 | + $ns = $dom->createAttributeNS(null, 'xmlns'); |
|
| 77 | 77 | $ns->value = "http://www.microsoft.com/networking/WLAN/profile/v1"; |
| 78 | 78 | $root->appendChild($ns); |
| 79 | 79 | \core\DeviceXMLmain::marshalObject($dom, $root, 'WLANprofile', $this->getWLANprofile(), '', true); |
@@ -211,7 +211,7 @@ discard block |
||
| 211 | 211 | $node->appendChild($childNode); |
| 212 | 212 | } |
| 213 | 213 | if (!empty($namespace)) { |
| 214 | - $ns = $domElement->createAttributeNS(null,'xmlns'); |
|
| 214 | + $ns = $domElement->createAttributeNS(null, 'xmlns'); |
|
| 215 | 215 | $ns->value = $namespace; |
| 216 | 216 | $childNode->appendChild($ns); |
| 217 | 217 | } |
@@ -238,7 +238,7 @@ discard block |
||
| 238 | 238 | $nextChild = $domElement->createElement($nameC, $cl); |
| 239 | 239 | $childNode->appendChild($nextChild); |
| 240 | 240 | if (!empty($namespaceC)) { |
| 241 | - $ns = $domElement->createAttributeNS(null,'xmlns'); |
|
| 241 | + $ns = $domElement->createAttributeNS(null, 'xmlns'); |
|
| 242 | 242 | $ns->value = $namespaceC; |
| 243 | 243 | $nextChild->appendChild($ns); |
| 244 | 244 | } |
@@ -260,7 +260,7 @@ discard block |
||
| 260 | 260 | $childNode->appendChild($nextChild); |
| 261 | 261 | } |
| 262 | 262 | if (!empty($namespaceC)) { |
| 263 | - $ns = $domElement->createAttributeNS(null,'xmlns'); |
|
| 263 | + $ns = $domElement->createAttributeNS(null, 'xmlns'); |
|
| 264 | 264 | $ns->value = $namespaceC; |
| 265 | 265 | $nextChild->appendChild($ns); |
| 266 | 266 | } |
@@ -90,7 +90,7 @@ discard block |
||
| 90 | 90 | ], |
| 91 | 91 | 'condition' => TRUE], |
| 92 | 92 | 'OpenRoaming® (%REALM%)' => [ |
| 93 | - 'ssid' => [], /* OpenRoaming has left SSIDs behind */ |
|
| 93 | + 'ssid' => [], /* OpenRoaming has left SSIDs behind */ |
|
| 94 | 94 | 'oi' => [ |
| 95 | 95 | '5A03BA0000', /* OpenRoaming/AllIdentities/SettlementFree/NoPersonalData/BaselineQoS */ |
| 96 | 96 | '5A03BA0800', /* OpenRoaming/EduIdentities/SettlementFree/NoPersonalData/BaselineQoS */ |
@@ -155,7 +155,7 @@ discard block |
||
| 155 | 155 | 'makensis' => 'makensis', |
| 156 | 156 | 'zip' => 'zip', |
| 157 | 157 | 'trust-store-mozilla' => '/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem', |
| 158 | - 'trust-store-custom' => __DIR__ . "/known-roots.pem", |
|
| 158 | + 'trust-store-custom' => __DIR__."/known-roots.pem", |
|
| 159 | 159 | ]; |
| 160 | 160 | |
| 161 | 161 | /** |
@@ -193,13 +193,13 @@ discard block |
||
| 193 | 193 | 'db' => 'radacct', |
| 194 | 194 | 'user' => 'someuser', |
| 195 | 195 | 'pass' => 'somepass', |
| 196 | - 'readonly' => TRUE,], |
|
| 196 | + 'readonly' => TRUE, ], |
|
| 197 | 197 | 'RADIUS_2' => [ |
| 198 | 198 | 'host' => 'auth-2.hosted.eduroam.org', |
| 199 | 199 | 'db' => 'radacct', |
| 200 | 200 | 'user' => 'someuser', |
| 201 | 201 | 'pass' => 'somepass', |
| 202 | - 'readonly' => TRUE,], |
|
| 202 | + 'readonly' => TRUE, ], |
|
| 203 | 203 | ]; |
| 204 | 204 | |
| 205 | 205 | /** |
@@ -51,7 +51,7 @@ discard block |
||
| 51 | 51 | $installerPath = $this->installerBasename.".sh"; |
| 52 | 52 | $this->copyFile("eduroam_linux_main.sh", $installerPath); |
| 53 | 53 | |
| 54 | - if ( !file_exists($installerPath) ) { |
|
| 54 | + if (!file_exists($installerPath)) { |
|
| 55 | 55 | throw new Exception('File not found.'); |
| 56 | 56 | } |
| 57 | 57 | |
@@ -68,7 +68,7 @@ discard block |
||
| 68 | 68 | fwrite($installer, 'printf -v INIT_CONFIRMATION "$INIT_CONFIRMATION_TMP" "$ORGANISATION"'."\n\n"); |
| 69 | 69 | fwrite($installer, 'main "$@"; exit'."\n"); |
| 70 | 70 | } catch (Exception $e) { |
| 71 | - echo 'Error message: ' .$e->getMessage(); |
|
| 71 | + echo 'Error message: '.$e->getMessage(); |
|
| 72 | 72 | } finally { |
| 73 | 73 | fclose($installer); |
| 74 | 74 | return($installerPath); |
@@ -204,11 +204,11 @@ discard block |
||
| 204 | 204 | $config['USER_REALM'] = $this->attributes['internal:realm'][0]; |
| 205 | 205 | } |
| 206 | 206 | |
| 207 | - if(!empty($this->attributes['internal:hint_userinput_suffix'][0]) && $this->attributes['internal:hint_userinput_suffix'][0] == 1) { |
|
| 207 | + if (!empty($this->attributes['internal:hint_userinput_suffix'][0]) && $this->attributes['internal:hint_userinput_suffix'][0] == 1) { |
|
| 208 | 208 | $configRaw['HINT_USER_INPUT'] = true; |
| 209 | 209 | } |
| 210 | 210 | |
| 211 | - if(!empty($this->attributes['internal:verify_userinput_suffix'][0]) && $this->attributes['internal:verify_userinput_suffix'][0] == 1) { |
|
| 211 | + if (!empty($this->attributes['internal:verify_userinput_suffix'][0]) && $this->attributes['internal:verify_userinput_suffix'][0] == 1) { |
|
| 212 | 212 | $configRaw['VERIFY_USER_REALM_INPUT'] = true; |
| 213 | 213 | } else { |
| 214 | 214 | $configRaw['VERIFY_USER_REALM_INPUT'] = false; |
@@ -219,7 +219,7 @@ discard block |
||
| 219 | 219 | } |
| 220 | 220 | |
| 221 | 221 | foreach ($configRaw as $name => $value) { |
| 222 | - fwrite($file, $name ."=". $value."\n"); |
|
| 222 | + fwrite($file, $name."=".$value."\n"); |
|
| 223 | 223 | } |
| 224 | 224 | |
| 225 | 225 | if ($tou === '') { |
@@ -283,7 +283,7 @@ discard block |
||
| 283 | 283 | } |
| 284 | 284 | $out .= "'DNS:$oneServer'"; |
| 285 | 285 | } |
| 286 | - return "(".$out. ")"; |
|
| 286 | + return "(".$out.")"; |
|
| 287 | 287 | } |
| 288 | 288 | |
| 289 | 289 | /** |
@@ -323,7 +323,7 @@ discard block |
||
| 323 | 323 | * |
| 324 | 324 | * @return string |
| 325 | 325 | */ |
| 326 | - private function mkCAfile(){ |
|
| 326 | + private function mkCAfile() { |
|
| 327 | 327 | $out = ''; |
| 328 | 328 | $cAlist = $this->attributes['internal:CAs'][0]; |
| 329 | 329 | foreach ($cAlist as $oneCa) { |
@@ -339,7 +339,7 @@ discard block |
||
| 339 | 339 | */ |
| 340 | 340 | private function mkIntro() { |
| 341 | 341 | \core\common\Entity::intoThePotatoes(); |
| 342 | - $out = _("This installer has been prepared for %s").'\n\n'._("More information and comments:").'\n\nE-Mail: %s\nWWW: %s\n\n' . |
|
| 342 | + $out = _("This installer has been prepared for %s").'\n\n'._("More information and comments:").'\n\nE-Mail: %s\nWWW: %s\n\n'. |
|
| 343 | 343 | _("Installer created with software from the GEANT project."); |
| 344 | 344 | \core\common\Entity::outOfThePotatoes(); |
| 345 | 345 | return $out; |
@@ -60,7 +60,7 @@ discard block |
||
| 60 | 60 | public function writeInstaller() { |
| 61 | 61 | $installerPath = $this->installerBasename.".py"; |
| 62 | 62 | $this->copyFile("main.py", $installerPath); |
| 63 | - $installer = fopen($installerPath,"a"); |
|
| 63 | + $installer = fopen($installerPath, "a"); |
|
| 64 | 64 | if ($installer === FALSE) { |
| 65 | 65 | throw new Exception("Unable to open installer file for writing!"); |
| 66 | 66 | } |
@@ -202,11 +202,11 @@ discard block |
||
| 202 | 202 | $config['user_realm'] = $this->attributes['internal:realm'][0]; |
| 203 | 203 | } |
| 204 | 204 | |
| 205 | - if(!empty($this->attributes['internal:hint_userinput_suffix'][0]) && $this->attributes['internal:hint_userinput_suffix'][0] == 1) { |
|
| 205 | + if (!empty($this->attributes['internal:hint_userinput_suffix'][0]) && $this->attributes['internal:hint_userinput_suffix'][0] == 1) { |
|
| 206 | 206 | $configRaw['hint_user_input'] = "True"; |
| 207 | 207 | } |
| 208 | 208 | |
| 209 | - if(!empty($this->attributes['internal:verify_userinput_suffix'][0]) && $this->attributes['internal:verify_userinput_suffix'][0] == 1) { |
|
| 209 | + if (!empty($this->attributes['internal:verify_userinput_suffix'][0]) && $this->attributes['internal:verify_userinput_suffix'][0] == 1) { |
|
| 210 | 210 | $configRaw['verify_user_realm_input'] = "True"; |
| 211 | 211 | } |
| 212 | 212 | |
@@ -279,7 +279,7 @@ discard block |
||
| 279 | 279 | } |
| 280 | 280 | $out .= "'DNS:$oneServer'"; |
| 281 | 281 | } |
| 282 | - return "[".$out. "]"; |
|
| 282 | + return "[".$out."]"; |
|
| 283 | 283 | } |
| 284 | 284 | |
| 285 | 285 | /** |
@@ -319,7 +319,7 @@ discard block |
||
| 319 | 319 | * |
| 320 | 320 | * @return string |
| 321 | 321 | */ |
| 322 | - private function mkCAfile(){ |
|
| 322 | + private function mkCAfile() { |
|
| 323 | 323 | $out = ''; |
| 324 | 324 | $cAlist = $this->attributes['internal:CAs'][0]; |
| 325 | 325 | foreach ($cAlist as $oneCa) { |
@@ -335,7 +335,7 @@ discard block |
||
| 335 | 335 | */ |
| 336 | 336 | private function mkIntro() { |
| 337 | 337 | \core\common\Entity::intoThePotatoes(); |
| 338 | - $out = _("This installer has been prepared for {0}").'\n\n'._("More information and comments:").'\n\nEMAIL: {1}\nWWW: {2}\n\n' . |
|
| 338 | + $out = _("This installer has been prepared for {0}").'\n\n'._("More information and comments:").'\n\nEMAIL: {1}\nWWW: {2}\n\n'. |
|
| 339 | 339 | _("Installer created with software from the GEANT project."); |
| 340 | 340 | \core\common\Entity::outOfThePotatoes(); |
| 341 | 341 | return $out; |