@@ -9,6 +9,6 @@ |
||
9 | 9 | * |
10 | 10 | */ |
11 | 11 | $root = dirname(dirname(__FILE__)); |
12 | - include($root."/config/config.php"); |
|
12 | + include($root . "/config/config.php"); |
|
13 | 13 | set_include_path(get_include_path() . PATH_SEPARATOR . "$root/core" . PATH_SEPARATOR . "$root"); |
14 | 14 | ?> |
@@ -163,7 +163,7 @@ discard block |
||
163 | 163 | * pass: password for the username |
164 | 164 | * @var array |
165 | 165 | */ |
166 | - public static $MAILSETTINGS = [ // we always use Submission |
|
166 | + public static $MAILSETTINGS = [// we always use Submission |
|
167 | 167 | 'host' => 'submission.capable.mta', |
168 | 168 | 'user'=> 'mailuser', |
169 | 169 | 'pass' => 'mailpass', |
@@ -174,21 +174,21 @@ discard block |
||
174 | 174 | * @var array |
175 | 175 | */ |
176 | 176 | public static $LANGUAGES = [ |
177 | - 'ca' => ['display' => 'Català', 'locale' => 'ca_ES.utf8'], |
|
178 | - 'de' => ['display' => 'Deutsch', 'locale' => 'de_DE.utf8'], |
|
177 | + 'ca' => ['display' => 'Català', 'locale' => 'ca_ES.utf8'], |
|
178 | + 'de' => ['display' => 'Deutsch', 'locale' => 'de_DE.utf8'], |
|
179 | 179 | 'en' => ['display' => 'English(GB)', 'locale' => 'en_GB.utf8'], |
180 | - 'es' => ['display' => 'Español', 'locale' => 'es_ES.utf8'], |
|
181 | - 'gl' => ['display' => 'Galego', 'locale' => 'gl_ES.utf8'], |
|
182 | - 'hr' => ['display' => 'Hrvatski', 'locale' => 'hr_HR.utf8'], |
|
183 | - 'it' => ['display' => 'Italiano', 'locale' => 'it_IT.utf8'], |
|
184 | - 'nb' => ['display' => 'Norsk', 'locale' => 'nb_NO.utf8'], |
|
185 | - 'pl' => ['display' => 'Polski', 'locale' => 'pl_PL.utf8'], |
|
180 | + 'es' => ['display' => 'Español', 'locale' => 'es_ES.utf8'], |
|
181 | + 'gl' => ['display' => 'Galego', 'locale' => 'gl_ES.utf8'], |
|
182 | + 'hr' => ['display' => 'Hrvatski', 'locale' => 'hr_HR.utf8'], |
|
183 | + 'it' => ['display' => 'Italiano', 'locale' => 'it_IT.utf8'], |
|
184 | + 'nb' => ['display' => 'Norsk', 'locale' => 'nb_NO.utf8'], |
|
185 | + 'pl' => ['display' => 'Polski', 'locale' => 'pl_PL.utf8'], |
|
186 | 186 | 'sl' => ['display' => 'Slovenščina', 'locale' => 'sl_SI.utf8'], |
187 | - 'sr' => ['display' => 'Srpski', 'locale' => 'sr_RS@latin'], |
|
188 | - 'fi' => ['display' => 'Suomi', 'locale' => 'fi_FI.utf8'], |
|
189 | - 'el' => ['display' => 'Ελληνικά', 'locale' => 'el_GR.utf8'], |
|
190 | - 'hu' => ['display' => 'Magyar', 'locale' => 'hu_HU.utf8'], |
|
191 | - 'pt' => ['display' => 'Português', 'locale' => 'pt_PT.utf8'], |
|
187 | + 'sr' => ['display' => 'Srpski', 'locale' => 'sr_RS@latin'], |
|
188 | + 'fi' => ['display' => 'Suomi', 'locale' => 'fi_FI.utf8'], |
|
189 | + 'el' => ['display' => 'Ελληνικά', 'locale' => 'el_GR.utf8'], |
|
190 | + 'hu' => ['display' => 'Magyar', 'locale' => 'hu_HU.utf8'], |
|
191 | + 'pt' => ['display' => 'Português', 'locale' => 'pt_PT.utf8'], |
|
192 | 192 | |
193 | 193 | // For the following languages, partial translations exist in Transifex, but |
194 | 194 | // they are not complete enough for display. Their Transifex content is not |
@@ -343,9 +343,9 @@ discard block |
||
343 | 343 | * NSIS version - with version 3 UTF installers will be created |
344 | 344 | * see also $PATHS['makensis'] |
345 | 345 | */ |
346 | - public static $NSIS_VERSION = 2 ; |
|
346 | + public static $NSIS_VERSION = 2; |
|
347 | 347 | |
348 | - public static $SUPERADMINS = [ |
|
348 | + public static $SUPERADMINS = [ |
|
349 | 349 | 'eptid:someuser', |
350 | 350 | 'http://sommeopenid.example/anotheruser', |
351 | 351 | 'I do not care about security!', |
@@ -137,10 +137,10 @@ discard block |
||
137 | 137 | <?php |
138 | 138 | if ($wizard_style) { |
139 | 139 | echo "<p>" . |
140 | - sprintf(_("In this section, you define on which media %s should be configured on user devices."),Config::$CONSORTIUM['name']) . "</p> |
|
140 | + sprintf(_("In this section, you define on which media %s should be configured on user devices."), Config::$CONSORTIUM['name']) . "</p> |
|
141 | 141 | <ul>"; |
142 | 142 | echo "<li>"; |
143 | - echo "<strong>" . ( count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional SSIDs:") : _("SSIDs:")) . " </strong>"; |
|
143 | + echo "<strong>" . (count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional SSIDs:") : _("SSIDs:")) . " </strong>"; |
|
144 | 144 | if (count(Config::$CONSORTIUM['ssid']) > 0) { |
145 | 145 | $ssidlist = ""; |
146 | 146 | foreach (Config::$CONSORTIUM['ssid'] as $ssid) |
@@ -157,7 +157,7 @@ discard block |
||
157 | 157 | echo "</li>"; |
158 | 158 | |
159 | 159 | echo "<li>"; |
160 | - echo "<strong>" . ( count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional Hotspot 2.0 / Passpoint Consortia:") : _("Hotspot 2.0 / Passpoint Consortia:")) . " </strong>"; |
|
160 | + echo "<strong>" . (count(Config::$CONSORTIUM['ssid']) > 0 ? _("Additional Hotspot 2.0 / Passpoint Consortia:") : _("Hotspot 2.0 / Passpoint Consortia:")) . " </strong>"; |
|
161 | 161 | if (count(Config::$CONSORTIUM['interworking-consortium-oi']) > 0) { |
162 | 162 | $consortiumlist = ""; |
163 | 163 | foreach (Config::$CONSORTIUM['interworking-consortium-oi'] as $oi) |
@@ -170,10 +170,10 @@ discard block |
||
170 | 170 | echo _("Please configure which Consortium OIs should be configured in the installers."); |
171 | 171 | } |
172 | 172 | echo "</li>"; |
173 | - echo "<li><strong>"._("Support for wired IEEE 802.1X:")." </strong>" |
|
174 | - . _("If you want to configure your users' devices with IEEE 802.1X support for wired ethernet, please check the corresponding box. Note that this makes the installation process a bit more difficult on some platforms (Windows: needs administrator privileges; Apple: attempting to install a profile with wired support on a device without an active wired ethernet card will fail)."). |
|
173 | + echo "<li><strong>" . _("Support for wired IEEE 802.1X:") . " </strong>" |
|
174 | + . _("If you want to configure your users' devices with IEEE 802.1X support for wired ethernet, please check the corresponding box. Note that this makes the installation process a bit more difficult on some platforms (Windows: needs administrator privileges; Apple: attempting to install a profile with wired support on a device without an active wired ethernet card will fail).") . |
|
175 | 175 | "</li>"; |
176 | - echo "<li><strong>"._("Removal of bootstrap/onboarding SSIDs:")." </strong>" |
|
176 | + echo "<li><strong>" . _("Removal of bootstrap/onboarding SSIDs:") . " </strong>" |
|
177 | 177 | . _("If you use a captive portal to distribute configurations, you may want to unconfigure/disable that SSID after the bootstrap process. With this option, the SSID will either be removed, or be defined as 'Only connect manually'.") |
178 | 178 | . "</li>"; |
179 | 179 | echo "</ul>"; |
@@ -138,7 +138,7 @@ discard block |
||
138 | 138 | echo "</table></div>"; |
139 | 139 | } |
140 | 140 | if (Config::$CONSORTIUM['name'] == 'eduroam') |
141 | - $helptext = "<h3>" . sprintf(_("Need help? Refer to the <a href='%s'>Federation Operator manual</a>"),"https://wiki.geant.org/x/KQB_AQ")."</h3>"; |
|
141 | + $helptext = "<h3>" . sprintf(_("Need help? Refer to the <a href='%s'>Federation Operator manual</a>"), "https://wiki.geant.org/x/KQB_AQ") . "</h3>"; |
|
142 | 142 | else |
143 | 143 | $helptext = ""; |
144 | 144 | echo $helptext; |
@@ -186,7 +186,7 @@ discard block |
||
186 | 186 | // deployment status; need to dive into profiles for this |
187 | 187 | // show happy eyeballs if at least one profile is configured/showtime |
188 | 188 | echo "<td>"; |
189 | - echo ($idp_instance->isOneProfileConfigured() ? "C" : "" ) . " " . ($idp_instance->isOneProfileShowtime() ? "V" : "" ); |
|
189 | + echo ($idp_instance->isOneProfileConfigured() ? "C" : "") . " " . ($idp_instance->isOneProfileShowtime() ? "V" : ""); |
|
190 | 190 | echo "</td>"; |
191 | 191 | // get the coarse status overview |
192 | 192 | $status = $idp_instance->getAllProfileStatusOverview(); |
@@ -18,7 +18,7 @@ discard block |
||
18 | 18 | $Cat = new CAT(); |
19 | 19 | $Cat->set_locale("web_admin"); |
20 | 20 | |
21 | -$additional_message = [ |
|
21 | +$additional_message = [ |
|
22 | 22 | L_OK => '', |
23 | 23 | L_REMARK => _("Some properties of the connection attempt were sub-optimal; the list is below."), |
24 | 24 | L_WARN => _("Some properties of the connection attempt were sub-optimal; the list is below."), |
@@ -28,20 +28,20 @@ discard block |
||
28 | 28 | |
29 | 29 | function disp_name($eap) { |
30 | 30 | $D = EAP::eapDisplayName($eap); |
31 | - return $D['OUTER'] . ( $D['INNER'] != '' ? '-' . $D['INNER'] : ''); |
|
31 | + return $D['OUTER'] . ($D['INNER'] != '' ? '-' . $D['INNER'] : ''); |
|
32 | 32 | } |
33 | 33 | |
34 | 34 | function printDN($dn) { |
35 | 35 | $out = ''; |
36 | 36 | foreach (array_reverse($dn) as $k => $v) { |
37 | - if(is_array ($v)) { |
|
37 | + if (is_array($v)) { |
|
38 | 38 | foreach ($v as $V) { |
39 | - if($out) |
|
39 | + if ($out) |
|
40 | 40 | $out .= ','; |
41 | 41 | $out .= "$k=$V"; |
42 | 42 | } |
43 | 43 | } else { |
44 | - if($out) |
|
44 | + if ($out) |
|
45 | 45 | $out .= ','; |
46 | 46 | $out .= "$k=$v"; |
47 | 47 | } |
@@ -50,32 +50,32 @@ discard block |
||
50 | 50 | } |
51 | 51 | |
52 | 52 | function printTm($tm) { |
53 | - return(gmdate(DateTime::COOKIE,$tm)); |
|
53 | + return(gmdate(DateTime::COOKIE, $tm)); |
|
54 | 54 | } |
55 | 55 | |
56 | 56 | |
57 | 57 | |
58 | -function process_result($testsuite,$host) { |
|
58 | +function process_result($testsuite, $host) { |
|
59 | 59 | $ret = []; |
60 | 60 | $server_info = []; |
61 | 61 | $udp_result = $testsuite->UDP_reachability_result[$host]; |
62 | - if(isset($udp_result['certdata']) && count($udp_result['certdata'])) { |
|
62 | + if (isset($udp_result['certdata']) && count($udp_result['certdata'])) { |
|
63 | 63 | foreach ($udp_result['certdata'] as $certdata) { |
64 | - if($certdata['type'] != 'server' && $certdata['type'] != 'totally_selfsigned' ) |
|
64 | + if ($certdata['type'] != 'server' && $certdata['type'] != 'totally_selfsigned') |
|
65 | 65 | continue; |
66 | - $server_cert = [ |
|
66 | + $server_cert = [ |
|
67 | 67 | 'subject' => printDN($certdata['subject']), |
68 | 68 | 'issuer' => printDN($certdata['issuer']), |
69 | 69 | 'validFrom' => printTm($certdata['validFrom_time_t']), |
70 | 70 | 'validTo' => printTm($certdata['validTo_time_t']), |
71 | - 'serialNumber' => $certdata['serialNumber'].sprintf(" (0x%X)",$certdata['serialNumber']), |
|
71 | + 'serialNumber' => $certdata['serialNumber'] . sprintf(" (0x%X)", $certdata['serialNumber']), |
|
72 | 72 | 'sha1' => $certdata['sha1'], |
73 | 73 | 'extensions' => $certdata['extensions'] |
74 | 74 | ]; |
75 | 75 | } |
76 | 76 | } |
77 | 77 | $ret['server_cert'] = $server_cert; |
78 | - if(isset($udp_result['incoming_server_names'][0]) ) { |
|
78 | + if (isset($udp_result['incoming_server_names'][0])) { |
|
79 | 79 | $ret['server'] = sprintf(_("Connected to %s."), $udp_result['incoming_server_names'][0]); |
80 | 80 | } |
81 | 81 | else |
@@ -119,7 +119,7 @@ discard block |
||
119 | 119 | exit; |
120 | 120 | */ |
121 | 121 | $hostindex = $_REQUEST['hostindex']; |
122 | -if(!is_numeric($hostindex)) |
|
122 | +if (!is_numeric($hostindex)) |
|
123 | 123 | exit; |
124 | 124 | |
125 | 125 | |
@@ -140,14 +140,14 @@ discard block |
||
140 | 140 | if ($_FILES['cert']['error'] == UPLOAD_ERR_OK) { |
141 | 141 | $clientcertdata = file_get_contents($_FILES['cert']['tmp_name']); |
142 | 142 | $privkey_pass = isset($_REQUEST['privkey_pass']) && $_REQUEST['privkey_pass'] ? $_REQUEST['privkey_pass'] : ""; //!! |
143 | - if(isset($_REQUEST['tls_username']) && $_REQUEST['tls_username']) { |
|
143 | + if (isset($_REQUEST['tls_username']) && $_REQUEST['tls_username']) { |
|
144 | 144 | $tls_username = valid_user($_REQUEST['tls_username']); |
145 | 145 | } else { |
146 | - if(openssl_pkcs12_read($clientcertdata,$certs,$privkey_pass)) { |
|
146 | + if (openssl_pkcs12_read($clientcertdata, $certs, $privkey_pass)) { |
|
147 | 147 | $mydetails = openssl_x509_parse($certs['cert']); |
148 | - if(isset($mydetails['subject']['CN']) && $mydetails['subject']['CN']) { |
|
149 | - $tls_username=$mydetails['subject']['CN']; |
|
150 | - debug(4,"PKCS12-CN=$tls_username\n"); |
|
148 | + if (isset($mydetails['subject']['CN']) && $mydetails['subject']['CN']) { |
|
149 | + $tls_username = $mydetails['subject']['CN']; |
|
150 | + debug(4, "PKCS12-CN=$tls_username\n"); |
|
151 | 151 | } else { |
152 | 152 | $testresult = RETVAL_INCOMPLETE_DATA; |
153 | 153 | $run_test = FALSE; |
@@ -161,14 +161,14 @@ discard block |
||
161 | 161 | $testresult = RETVAL_INCOMPLETE_DATA; |
162 | 162 | $run_test = FALSE; |
163 | 163 | } |
164 | - if($run_test) { |
|
165 | - debug(4,"TLS-USERNAME=$tls_username\n"); |
|
166 | - $testresult = $testsuite->UDP_login($hostindex, $eap, $tls_username, $privkey_pass,'', TRUE, TRUE, $clientcertdata); |
|
164 | + if ($run_test) { |
|
165 | + debug(4, "TLS-USERNAME=$tls_username\n"); |
|
166 | + $testresult = $testsuite->UDP_login($hostindex, $eap, $tls_username, $privkey_pass, '', TRUE, TRUE, $clientcertdata); |
|
167 | 167 | } |
168 | 168 | } else { |
169 | - $testresult = $testsuite->UDP_login($hostindex, $eap, $user_name, $user_password,$outer_user_name); |
|
169 | + $testresult = $testsuite->UDP_login($hostindex, $eap, $user_name, $user_password, $outer_user_name); |
|
170 | 170 | } |
171 | - $returnarray['result'][$i] = process_result($testsuite,$hostindex); |
|
171 | + $returnarray['result'][$i] = process_result($testsuite, $hostindex); |
|
172 | 172 | $returnarray['result'][$i]['eap'] = display_name($eap); |
173 | 173 | $returnarray['returncode'][$i] = $testresult; |
174 | 174 | |
@@ -176,7 +176,7 @@ discard block |
||
176 | 176 | switch ($testresult) { |
177 | 177 | case RETVAL_OK : |
178 | 178 | $level = $returnarray['result'][$i]['level']; |
179 | - switch($level) { |
|
179 | + switch ($level) { |
|
180 | 180 | case L_OK : |
181 | 181 | $message = _("<strong>Test successful.</strong>"); |
182 | 182 | break; |
@@ -228,21 +228,21 @@ discard block |
||
228 | 228 | $i = 0; |
229 | 229 | $returnarray['hostindex'] = $hostindex; |
230 | 230 | $testresult = $testsuite->UDP_reachability($hostindex); |
231 | - $returnarray['result'][$i] = process_result($testsuite,$hostindex); |
|
231 | + $returnarray['result'][$i] = process_result($testsuite, $hostindex); |
|
232 | 232 | $returnarray['result'][$i]['eap'] = 'ALL'; |
233 | 233 | $returnarray['returncode'][$i] = $testresult; |
234 | 234 | // a failed check may not have gotten any certificate, be prepared for that |
235 | 235 | switch ($testresult) { |
236 | 236 | case RETVAL_CONVERSATION_REJECT: |
237 | 237 | $level = $returnarray['result'][$i]['level']; |
238 | - if($level > L_OK) |
|
238 | + if ($level > L_OK) |
|
239 | 239 | $message = _("<strong>Test partially successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned.") . ' ' . $additional_message[$level]; |
240 | 240 | else |
241 | 241 | $message = _("<strong>Test successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned."); |
242 | 242 | break; |
243 | 243 | case RETVAL_IMMEDIATE_REJECT: |
244 | 244 | $message = _("<strong>Test FAILED</strong>: the request was rejected immediately, without EAP conversation. This is not necessarily an error: if the RADIUS server enforces that outer identities correspond to an existing username, then this result is expected (Note: you could configure a valid outer identity in your profile settings to get past this hurdle). In all other cases, the server appears misconfigured or it is unreachable."); |
245 | - $level= L_WARN; |
|
245 | + $level = L_WARN; |
|
246 | 246 | break; |
247 | 247 | case RETVAL_NO_RESPONSE: |
248 | 248 | $returnarray['result'][$i]['server'] = 0; |
@@ -255,10 +255,10 @@ discard block |
||
255 | 255 | break; |
256 | 256 | default: |
257 | 257 | $message = _("unhandled error"); |
258 | - $level= L_ERROR; |
|
258 | + $level = L_ERROR; |
|
259 | 259 | break; |
260 | 260 | } |
261 | -debug(4,"SERVER=".$returnarray['result'][$i]['server']."\n"); |
|
261 | +debug(4, "SERVER=" . $returnarray['result'][$i]['server'] . "\n"); |
|
262 | 262 | $returnarray['result'][$i]['level'] = $level; |
263 | 263 | $returnarray['result'][$i]['message'] = $message; |
264 | 264 | break; |
@@ -37,7 +37,7 @@ discard block |
||
37 | 37 | |
38 | 38 | function print_test_results($t) { |
39 | 39 | $out = ''; |
40 | - switch($t->test_result['global']) { |
|
40 | + switch ($t->test_result['global']) { |
|
41 | 41 | case L_OK: |
42 | 42 | $message = "Your configuration appears to be fine."; |
43 | 43 | break; |
@@ -51,10 +51,10 @@ discard block |
||
51 | 51 | $message = "Your configuration appears to be fine."; |
52 | 52 | break; |
53 | 53 | } |
54 | - $out .= UI_message($t->test_result['global'],"<br><strong>Test Summary</strong><br>".$message."<br>See below for details<br><hr>"); |
|
55 | - foreach ($t->out as $test => $test_val) { |
|
56 | - foreach ($test_val as $o) { |
|
57 | - $out .= UI_message($o['level'],$o['message']); |
|
54 | + $out .= UI_message($t->test_result['global'], "<br><strong>Test Summary</strong><br>" . $message . "<br>See below for details<br><hr>"); |
|
55 | + foreach ($t->out as $test => $test_val) { |
|
56 | + foreach ($test_val as $o) { |
|
57 | + $out .= UI_message($o['level'], $o['message']); |
|
58 | 58 | } |
59 | 59 | } |
60 | 60 | return($out); |
@@ -62,7 +62,7 @@ discard block |
||
62 | 62 | |
63 | 63 | function return_test_results($t) { |
64 | 64 | $out = ''; |
65 | - switch($t->test_result['global']) { |
|
65 | + switch ($t->test_result['global']) { |
|
66 | 66 | case L_OK: |
67 | 67 | $message = "Your configuration appears to be fine."; |
68 | 68 | break; |
@@ -76,10 +76,10 @@ discard block |
||
76 | 76 | $message = "Your configuration appears to be fine."; |
77 | 77 | break; |
78 | 78 | } |
79 | - $out .= UI_message($t->test_result['global'],"<br><strong>Test Summary</strong><br>".$message."<br>See below for details<br><hr>"); |
|
80 | - foreach ($t->out as $test => $test_val) { |
|
81 | - foreach ($test_val as $o) { |
|
82 | - $out .= UI_message($o['level'],$o['message']); |
|
79 | + $out .= UI_message($t->test_result['global'], "<br><strong>Test Summary</strong><br>" . $message . "<br>See below for details<br><hr>"); |
|
80 | + foreach ($t->out as $test => $test_val) { |
|
81 | + foreach ($test_val as $o) { |
|
82 | + $out .= UI_message($o['level'], $o['message']); |
|
83 | 83 | } |
84 | 84 | } |
85 | 85 | return($out); |
@@ -100,7 +100,7 @@ discard block |
||
100 | 100 | } |
101 | 101 | $test = new SanityTest(); |
102 | 102 | $test->run_tests($Tests); |
103 | -$format = empty($_REQUEST['format']) ? 'include' : $_REQUEST['format']; |
|
103 | +$format = empty($_REQUEST['format']) ? 'include' : $_REQUEST['format']; |
|
104 | 104 | switch ($format) { |
105 | 105 | case 'include': |
106 | 106 | $o = print_test_results($test); |
@@ -85,7 +85,7 @@ discard block |
||
85 | 85 | <div class='infobox' style='text-align:center;'> |
86 | 86 | <h2><?php echo _("Institution Download Area QR Code"); ?></h2> |
87 | 87 | <?php |
88 | - $displayurl = ( isset($_SERVER['HTTPS']) && $_SERVER['HTTPS'] == "on" ? 'https://' : 'http://') . $_SERVER['SERVER_NAME'] . dirname(dirname($_SERVER['SCRIPT_NAME'])) . "?idp=" . $my_inst->identifier; |
|
88 | + $displayurl = (isset($_SERVER['HTTPS']) && $_SERVER['HTTPS'] == "on" ? 'https://' : 'http://') . $_SERVER['SERVER_NAME'] . dirname(dirname($_SERVER['SCRIPT_NAME'])) . "?idp=" . $my_inst->identifier; |
|
89 | 89 | $uri = "data:image/png;base64," . base64_encode(png_inject_consortium_logo(QRcode::png($displayurl, FALSE, QR_ECLEVEL_Q, 12))); |
90 | 90 | $size = getimagesize($uri); |
91 | 91 | echo "<img width='" . ($size[0] / 4) . "' height='" . ($size[1] / 4) . "' src='$uri' alt='QR-code'/>"; |
@@ -115,7 +115,7 @@ discard block |
||
115 | 115 | </td> |
116 | 116 | <td> |
117 | 117 | <form action='edit_idp_result.php?inst_id=<?php echo $my_inst->identifier; ?>' method='post' accept-charset='UTF-8'> |
118 | - <button class='delete' type='submit' name='submitbutton' value='<?php echo BUTTON_DELETE; ?>' onclick="return confirm('<?php echo ( Config::$CONSORTIUM['selfservice_registration'] === NULL ? _("After deleting the IdP, you can not recreate it yourself - you need a new invitation token from the federation administrator!") . " " : "" ) . sprintf(_("Do you really want to delete your IdP %s?"), $my_inst->name); ?>')"><?php echo _("Delete IdP"); ?></button> |
|
118 | + <button class='delete' type='submit' name='submitbutton' value='<?php echo BUTTON_DELETE; ?>' onclick="return confirm('<?php echo (Config::$CONSORTIUM['selfservice_registration'] === NULL ? _("After deleting the IdP, you can not recreate it yourself - you need a new invitation token from the federation administrator!") . " " : "") . sprintf(_("Do you really want to delete your IdP %s?"), $my_inst->name); ?>')"><?php echo _("Delete IdP"); ?></button> |
|
119 | 119 | </form> |
120 | 120 | |
121 | 121 | </td> |
@@ -230,7 +230,7 @@ discard block |
||
230 | 230 | $has_realm = $profile_list->getAttributes("internal:realm"); |
231 | 231 | $has_realm = $has_realm[0]['value']; |
232 | 232 | echo "<div class='profilemodulebuttons' style='float:right;'>"; |
233 | - if (count(Config::$RADIUSTESTS['UDP-hosts']) > 0 || ( count(Config::$RADIUSTESTS['TLS-clientcerts']) > 0 && Config::$RADIUSTESTS['TLS-discoverytag'] != "")) |
|
233 | + if (count(Config::$RADIUSTESTS['UDP-hosts']) > 0 || (count(Config::$RADIUSTESTS['TLS-clientcerts']) > 0 && Config::$RADIUSTESTS['TLS-discoverytag'] != "")) |
|
234 | 234 | echo "<form action='action_realmcheck.php?inst_id=$my_inst->identifier&profile_id=$profile_list->identifier' method='post' accept-charset='UTF-8'> |
235 | 235 | <button type='submit' name='profile_action' value='check' " . ($has_realm ? "" : "disabled='disabled' title='" . _("The realm can only be checked if you configure the realm!") . "'") . "> |
236 | 236 | " . _("Check realm reachability") . " |
@@ -264,7 +264,7 @@ discard block |
||
264 | 264 | if (isset($URL['device-specific:redirect'])) |
265 | 265 | $displayurl = $URL['device-specific:redirect'][0]; |
266 | 266 | else |
267 | - $displayurl = ( isset($_SERVER['HTTPS']) && $_SERVER['HTTPS'] == "on" ? 'https://' : 'http://' ) . $_SERVER['SERVER_NAME'] . dirname(dirname($_SERVER['SCRIPT_NAME'])) . "?idp=" . $my_inst->identifier . "&profile=" . $profile_list->identifier; |
|
267 | + $displayurl = (isset($_SERVER['HTTPS']) && $_SERVER['HTTPS'] == "on" ? 'https://' : 'http://') . $_SERVER['SERVER_NAME'] . dirname(dirname($_SERVER['SCRIPT_NAME'])) . "?idp=" . $my_inst->identifier . "&profile=" . $profile_list->identifier; |
|
268 | 268 | echo "<a href='$displayurl' style='white-space: nowrap; text-align: center;'>"; |
269 | 269 | $uri = "data:image/png;base64," . base64_encode(png_inject_consortium_logo(QRcode::png($displayurl, FALSE, QR_ECLEVEL_Q, 12))); |
270 | 270 | $size = getimagesize($uri); |
@@ -20,7 +20,7 @@ discard block |
||
20 | 20 | |
21 | 21 | $cat = defaultPagePrelude(_("Sanity check for dynamic discovery of realms")); |
22 | 22 | $check_thorough = FALSE; |
23 | -$error_message =''; |
|
23 | +$error_message = ''; |
|
24 | 24 | $my_inst = valid_IdP($_REQUEST['inst_id'], $_SESSION['user']); |
25 | 25 | |
26 | 26 | if (isset($_GET['profile_id'])) |
@@ -38,17 +38,17 @@ discard block |
||
38 | 38 | $error_message = _("You asked for a realm check, but we don't know the realm for this profile!") . "</p>"; |
39 | 39 | } |
40 | 40 | } else { // someone else's realm... only shallow checks |
41 | - if(!empty($_REQUEST['realm'])) { |
|
42 | - if($check_realm = valid_Realm($_REQUEST['realm'])) { |
|
41 | + if (!empty($_REQUEST['realm'])) { |
|
42 | + if ($check_realm = valid_Realm($_REQUEST['realm'])) { |
|
43 | 43 | $_SESSION['check_realm'] = $check_realm; |
44 | 44 | } |
45 | 45 | } else { |
46 | - if(!empty($_SESSION['check_realm'])) |
|
46 | + if (!empty($_SESSION['check_realm'])) |
|
47 | 47 | $check_realm = $_SESSION['check_realm']; |
48 | 48 | else |
49 | 49 | $check_realm = FALSE; |
50 | 50 | } |
51 | - if($check_realm) |
|
51 | + if ($check_realm) |
|
52 | 52 | $testsuite = new RADIUSTests($check_realm); |
53 | 53 | else |
54 | 54 | $error_message = _("No valid realm name given, cannot execute any checks!"); |
@@ -226,7 +226,7 @@ discard block |
||
226 | 226 | } |
227 | 227 | } |
228 | 228 | cliinfo = cliinfo + '<li><table><tbody><tr><td class="icon_td"><img class="icon" src="' + icons[level] +'" style="width: 24px;"></td><td>' + state; |
229 | - cliinfo = cliinfo + ' <?php echo "(".sprintf(_("elapsed time: %sms."),"'+data.ca[key].certificate[c].time_millisec+' ").")"; ?>' + add + '</td></tr>'; |
|
229 | + cliinfo = cliinfo + ' <?php echo "(" . sprintf(_("elapsed time: %sms."), "'+data.ca[key].certificate[c].time_millisec+' ") . ")"; ?>' + add + '</td></tr>'; |
|
230 | 230 | cliinfo = cliinfo + '</tbody></table></ul></li>'; |
231 | 231 | if (data.ca[key].certificate[c].finalerror==1) { |
232 | 232 | cliinfo = cliinfo + '<li>' + restskipped + '</li>'; |
@@ -316,7 +316,7 @@ discard block |
||
316 | 316 | var v = data.result[0]; |
317 | 317 | $("#src"+data.hostindex+"_img").attr('src',icons[v.level]); |
318 | 318 | if(v.server != 0 ) { |
319 | - $("#src"+data.hostindex).html('<strong>'+v.server+'</strong><br/><?php printf(_("elapsed time: %sms."),"'+v.time_millisec+' ") ?><p>'+v.message+'</p>'); |
|
319 | + $("#src"+data.hostindex).html('<strong>'+v.server+'</strong><br/><?php printf(_("elapsed time: %sms."), "'+v.time_millisec+' ") ?><p>'+v.message+'</p>'); |
|
320 | 320 | var cert_data = "<tr class='server_cert'><td> </td><td colspan=2><div><dl class='server_cert_list'>"; |
321 | 321 | $.each(server_cert, function(l,s) { |
322 | 322 | cert_data = cert_data + "<dt>" + s + "</dt><dd>"+ v.server_cert[l] + "</dd>"; |
@@ -339,7 +339,7 @@ discard block |
||
339 | 339 | } |
340 | 340 | $("#src"+data.hostindex).append(cert_data); |
341 | 341 | } else { |
342 | - $("#src"+data.hostindex).html('<br/><?php printf(_("elapsed time: %sms."),"'+v.time_millisec+' ") ?><p>'+v.message+'</p>'); |
|
342 | + $("#src"+data.hostindex).html('<br/><?php printf(_("elapsed time: %sms."), "'+v.time_millisec+' ") ?><p>'+v.message+'</p>'); |
|
343 | 343 | } |
344 | 344 | global_level_udp = Math.max(global_level_udp,v.level); |
345 | 345 | $(".server_cert").show(); |
@@ -391,7 +391,7 @@ discard block |
||
391 | 391 | }); |
392 | 392 | } |
393 | 393 | o = o + cert_data+'</table>'; |
394 | - $("#eap_test"+data.hostindex).append('<strong><img style="position: relative; top: 2px;" src="'+icons[v.level]+'"><span style="position: relative; top: -5px; left: 1em">'+v.eap+' – <?php printf(_("elapsed time: %sms."),"'+v.time_millisec+' ") ?></span></strong><div class="more" style="padding-left: 40px"><div class="morecontent"><div style="display:none; background: #eee;">'+o+'</div><a href="" class="morelink">' + moretext + '</a></div></div>'); |
|
394 | + $("#eap_test"+data.hostindex).append('<strong><img style="position: relative; top: 2px;" src="'+icons[v.level]+'"><span style="position: relative; top: -5px; left: 1em">'+v.eap+' – <?php printf(_("elapsed time: %sms."), "'+v.time_millisec+' ") ?></span></strong><div class="more" style="padding-left: 40px"><div class="morecontent"><div style="display:none; background: #eee;">'+o+'</div><a href="" class="morelink">' + moretext + '</a></div></div>'); |
|
395 | 395 | }); |
396 | 396 | } |
397 | 397 | |
@@ -402,8 +402,8 @@ discard block |
||
402 | 402 | <?php |
403 | 403 | foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
404 | 404 | print " |
405 | -$(\"#live_src".$hostindex."_img\").attr('src',icon_loading); |
|
406 | -$(\"#live_src".$hostindex."_img\").show(); |
|
405 | +$(\"#live_src".$hostindex . "_img\").attr('src',icon_loading); |
|
406 | +$(\"#live_src".$hostindex . "_img\").show(); |
|
407 | 407 | $.ajax({ |
408 | 408 | url: 'radius_tests.php?src=0&hostindex=$hostindex&realm='+realm, |
409 | 409 | type: 'POST', |
@@ -434,15 +434,15 @@ discard block |
||
434 | 434 | <?php |
435 | 435 | foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
436 | 436 | if ($check_thorough) |
437 | - $extraarg = "profile_id: ".$my_profile->identifier.", "; |
|
437 | + $extraarg = "profile_id: " . $my_profile->identifier . ", "; |
|
438 | 438 | else |
439 | 439 | $extraarg = ""; |
440 | 440 | |
441 | 441 | print " |
442 | -$(\"#src".$hostindex."_img\").attr('src',icon_loading); |
|
442 | +$(\"#src".$hostindex . "_img\").attr('src',icon_loading); |
|
443 | 443 | $(\"#src$hostindex\").html(''); |
444 | 444 | running_ajax_stat++; |
445 | -$.get('radius_tests.php',{test_type: 'udp', $extraarg realm: realm, src: $hostindex, lang: '".CAT::get_lang()."', hostindex: '$hostindex' }, udp, 'json'); |
|
445 | +$.get('radius_tests.php',{test_type: 'udp', $extraarg realm: realm, src: $hostindex, lang: '" . CAT::get_lang() . "', hostindex: '$hostindex' }, udp, 'json'); |
|
446 | 446 | |
447 | 447 | "; |
448 | 448 | } |
@@ -461,8 +461,8 @@ discard block |
||
461 | 461 | </script> |
462 | 462 | <?php |
463 | 463 | productheader("ADMIN", CAT::get_lang()); |
464 | - print "<h1>".sprintf(_("Realm testing for: %s"),$check_realm)."</h1>\n"; |
|
465 | - if($error_message) { |
|
464 | + print "<h1>" . sprintf(_("Realm testing for: %s"), $check_realm) . "</h1>\n"; |
|
465 | + if ($error_message) { |
|
466 | 466 | print "<p>$error_message</p>"; |
467 | 467 | } else { |
468 | 468 | ?> |
@@ -481,7 +481,7 @@ discard block |
||
481 | 481 | </legend> |
482 | 482 | <?php |
483 | 483 | // NAPTR existence check |
484 | - echo "<strong>"._("DNS chekcs")."</strong><div>"; |
|
484 | + echo "<strong>" . _("DNS chekcs") . "</strong><div>"; |
|
485 | 485 | $naptr = $testsuite->NAPTR(); |
486 | 486 | if ($naptr != RETVAL_NOTCONFIGURED) { |
487 | 487 | echo "<table>"; |
@@ -551,10 +551,10 @@ discard block |
||
551 | 551 | |
552 | 552 | echo "</table><table>"; |
553 | 553 | if (count($testsuite->listerrors()) == 0) { |
554 | - echo UI_message(L_OK,sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("with no DNS errors encountered. Congratulations!")); |
|
554 | + echo UI_message(L_OK, sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("with no DNS errors encountered. Congratulations!")); |
|
555 | 555 | echo "</table>"; |
556 | 556 | } else { |
557 | - echo UI_message(L_ERROR,sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("but there were DNS errors! Check them!") . " " . _("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below.")); |
|
557 | + echo UI_message(L_ERROR, sprintf(_("Realm is <strong>%s</strong> "), _(($naptr > 0 ? "DYNAMIC" : "STATIC"))) . _("but there were DNS errors! Check them!") . " " . _("You should re-run the tests after fixing the errors; more errors might be uncovered at that point. The exact error causes are listed below.")); |
|
558 | 558 | echo "</table><div class='notacceptable'><table>"; |
559 | 559 | foreach ($testsuite->listerrors() as $details) |
560 | 560 | echo "<tr><td>" . $details['TYPE'] . "</td><td>" . $details['TARGET'] . "</td></tr>"; |
@@ -581,9 +581,9 @@ discard block |
||
581 | 581 | continue;*/ |
582 | 582 | print " |
583 | 583 | running_ajax_dyn++; |
584 | - $.ajax({url:'radius_tests.php', data:{test_type: 'capath', realm: realm, src: '$host', lang: '".CAT::get_lang()."', hostindex: '$hostindex' }, error: eee, success: capath, dataType: 'json'}); |
|
584 | + $.ajax({url:'radius_tests.php', data:{test_type: 'capath', realm: realm, src: '$host', lang: '" . CAT::get_lang() . "', hostindex: '$hostindex' }, error: eee, success: capath, dataType: 'json'}); |
|
585 | 585 | running_ajax_dyn++; |
586 | - $.ajax({url:'radius_tests.php', data:{test_type: 'clients', realm: realm, src: '$host', lang: '".CAT::get_lang()."', hostindex: '$hostindex' }, error: eee, success: clients, dataType: 'json'}); |
|
586 | + $.ajax({url:'radius_tests.php', data:{test_type: 'clients', realm: realm, src: '$host', lang: '" . CAT::get_lang() . "', hostindex: '$hostindex' }, error: eee, success: clients, dataType: 'json'}); |
|
587 | 587 | "; |
588 | 588 | } |
589 | 589 | echo "} |
@@ -592,12 +592,12 @@ discard block |
||
592 | 592 | } else { |
593 | 593 | echo "<tr><td>" . _("Dynamic discovery test is not configured") . "</td><td>"; |
594 | 594 | } |
595 | - echo "<strong>"._("Static connectivity tests")."</strong> |
|
595 | + echo "<strong>" . _("Static connectivity tests") . "</strong> |
|
596 | 596 | <table><tr> |
597 | 597 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_static_ico' class='icon'></td><td id='main_static_result' style='display:none'> </td> |
598 | 598 | </tr></table>"; |
599 | - if($naptr > 0) { |
|
600 | - echo "<hr><strong>"._("Dynamic connectivity tests")."</strong> |
|
599 | + if ($naptr > 0) { |
|
600 | + echo "<hr><strong>" . _("Dynamic connectivity tests") . "</strong> |
|
601 | 601 | <table><tr> |
602 | 602 | <td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='main_dynamic_ico' class='icon'></td><td id='main_dynamic_result' style='display:none'> </td> |
603 | 603 | </tr></table>"; |
@@ -611,19 +611,19 @@ discard block |
||
611 | 611 | <button id="run_s_tests" onclick="run_udp()"><?php echo _("Repeat static connectivity tests") ?></button> |
612 | 612 | <p> |
613 | 613 | <fieldset class="option_container" id="static_tests"> |
614 | - <legend><strong> <?php echo _("STATIC connectivity tests");?> </strong> </legend> |
|
614 | + <legend><strong> <?php echo _("STATIC connectivity tests"); ?> </strong> </legend> |
|
615 | 615 | <?php |
616 | 616 | echo sprintf(_("This check sends a request for the realm through various entry points of the %s infrastructure. The request will contain the 'Operator-Name' attribute, and will be larger than 1500 Bytes to catch two common configuration problems.<br/>Since we don't have actual credentials for the realm, we can't authenticate successfully - so the expected outcome is to get an Access-Reject after having gone through an EAP conversation."), Config::$CONSORTIUM['name']); |
617 | 617 | print "<p>"; |
618 | 618 | |
619 | 619 | foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
620 | 620 | print "<hr>"; |
621 | -printf(_("Testing from: %s"), "<strong>".Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>"); |
|
621 | +printf(_("Testing from: %s"), "<strong>" . Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name'] . "</strong>"); |
|
622 | 622 | print "<table id='results$hostindex' style='width:100%' class='udp_results'> |
623 | 623 | <tr> |
624 | -<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='src".$hostindex."_img'></td> |
|
624 | +<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='src" . $hostindex . "_img'></td> |
|
625 | 625 | <td id='src$hostindex' colspan=2> |
626 | -"._("testing...")." |
|
626 | +" . _("testing...") . " |
|
627 | 627 | </td> |
628 | 628 | </tr>" . |
629 | 629 | //server_cert('udp-'.$hostindex) . |
@@ -647,8 +647,8 @@ discard block |
||
647 | 647 | <legend><strong>" . _("DYNAMIC connectivity tests") . "</strong></legend>"; |
648 | 648 | |
649 | 649 | $resultstoprint = []; |
650 | - if (count($testsuite->NAPTR_hostname_records)>0) { |
|
651 | - $resultstoprint[] = '<table style="align:right; display: none;" id="dynamic_result_fail">' . UI_message(L_ERROR,_("Some errors were found during the tests, see below")) . '</table><table style="align:right; display: none;" id="dynamic_result_pass">' . UI_message(L_OK,_("All tests passed, congratulations!")) . '</table>'; |
|
650 | + if (count($testsuite->NAPTR_hostname_records) > 0) { |
|
651 | + $resultstoprint[] = '<table style="align:right; display: none;" id="dynamic_result_fail">' . UI_message(L_ERROR, _("Some errors were found during the tests, see below")) . '</table><table style="align:right; display: none;" id="dynamic_result_pass">' . UI_message(L_OK, _("All tests passed, congratulations!")) . '</table>'; |
|
652 | 652 | $resultstoprint[] = '<div style="align:right;"><a href="" class="moreall">' . _('Show detailed information for all tests') . '</a></div>' . '<p><strong>' . _("Checking server handshake...") . "</strong><p>"; |
653 | 653 | foreach ($testsuite->NAPTR_hostname_records as $hostindex => $addr) { |
654 | 654 | /* if ($addr['family'] == "IPv6") { |
@@ -660,9 +660,9 @@ discard block |
||
660 | 660 | $resultstoprint[] = '<ul style="list-style-type: none;" class="caresult"><li>'; |
661 | 661 | $resultstoprint[] = "<table id='caresults$hostindex' style='width:100%'> |
662 | 662 | <tr> |
663 | -<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcca".$hostindex."_img'></td> |
|
663 | +<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcca" . $hostindex . "_img'></td> |
|
664 | 664 | <td id='srcca$hostindex'> |
665 | -"._("testing...")." |
|
665 | +" . _("testing...") . " |
|
666 | 666 | </td> |
667 | 667 | </tr> |
668 | 668 | </table>"; |
@@ -678,18 +678,18 @@ discard block |
||
678 | 678 | $clientstest[] = '<p><strong>' . $addr['IP'] . ' TCP/' . $addr['port'] . '</strong></p><ol>'; |
679 | 679 | $clientstest[] = "<span id='clientresults$hostindex$clinx'><table style='width:100%'> |
680 | 680 | <tr> |
681 | -<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcclient".$hostindex."_img'></td> |
|
681 | +<td class='icon_td'><img src='../resources/images/icons/loading51.gif' id='srcclient" . $hostindex . "_img'></td> |
|
682 | 682 | <td id='srcclient$hostindex'> |
683 | -"._("testing...")." |
|
683 | +" . _("testing...") . " |
|
684 | 684 | </td> |
685 | 685 | </tr> |
686 | 686 | </table></span>"; |
687 | 687 | $clientstest[] = '</ol>'; |
688 | 688 | } |
689 | 689 | echo '<div style="align:right;">'; |
690 | - echo join('',$resultstoprint); |
|
691 | - echo '<span id="clientstest" style="display: none;"><p><hr><b>' . _('Checking if certificates from CAs are accepted...') . '</b><p>' . _('A few client certificates will be tested to check if servers are resistant to some certificate problems.') . '<p>'; |
|
692 | - print join('',$clientstest); |
|
690 | + echo join('', $resultstoprint); |
|
691 | + echo '<span id="clientstest" style="display: none;"><p><hr><b>' . _('Checking if certificates from CAs are accepted...') . '</b><p>' . _('A few client certificates will be tested to check if servers are resistant to some certificate problems.') . '<p>'; |
|
692 | + print join('', $clientstest); |
|
693 | 693 | echo '</span>'; |
694 | 694 | echo '</div>'; |
695 | 695 | } |
@@ -711,8 +711,8 @@ discard block |
||
711 | 711 | <p>" . _("Note: the tool purposefully does not offer you to save these credentials, and they will never be saved in any way on the server side. Please use only <strong>temporary test accounts</strong> here; permanently valid test accounts in the wild are considered harmful!") . "</p></div> |
712 | 712 | <form enctype='multipart/form-data' id='live_form' accept-charset='UTF-8'> |
713 | 713 | <input type='hidden' name='test_type' value='udp_login'> |
714 | - <input type='hidden' name='lang' value='".CAT::get_lang()."'> |
|
715 | - <input type='hidden' name='profile_id' value='".$my_profile->identifier."'> |
|
714 | + <input type='hidden' name='lang' value='".CAT::get_lang() . "'> |
|
715 | + <input type='hidden' name='profile_id' value='".$my_profile->identifier . "'> |
|
716 | 716 | <table id='live_tests'>"; |
717 | 717 | // if any password based EAP methods are available enable this section |
718 | 718 | if (in_array(EAP::$PEAP_MSCHAP2, $prof_compl) || |
@@ -737,8 +737,8 @@ discard block |
||
737 | 737 | echo "<div id='live_login_results' style='display:none'>"; |
738 | 738 | foreach (Config::$RADIUSTESTS['UDP-hosts'] as $hostindex => $host) { |
739 | 739 | print "<hr>"; |
740 | - printf(_("Testing from: %s"), "<strong>".Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name']."</strong>"); |
|
741 | - print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src".$hostindex."_img' style='width:24px; position: absolute; left: 20px; bottom: 0px; '></span>"; |
|
740 | + printf(_("Testing from: %s"), "<strong>" . Config::$RADIUSTESTS['UDP-hosts'][$hostindex]['display_name'] . "</strong>"); |
|
741 | + print "<span style='position:relative'><img src='../resources/images/icons/loading51.gif' id='live_src" . $hostindex . "_img' style='width:24px; position: absolute; left: 20px; bottom: 0px; '></span>"; |
|
742 | 742 | print "<div id='eap_test$hostindex' class='eap_test_results'></div>"; |
743 | 743 | } |
744 | 744 | echo "</div>"; |
@@ -18,7 +18,7 @@ discard block |
||
18 | 18 | require_once("../resources/inc/header.php"); |
19 | 19 | require_once("../resources/inc/footer.php"); |
20 | 20 | |
21 | -function profilechecks(IdP $idpinfo,Profile $profile) { |
|
21 | +function profilechecks(IdP $idpinfo, Profile $profile) { |
|
22 | 22 | |
23 | 23 | $tabletext = "<tr><td>" . $idpinfo->name . "</td><td>" . $profile->name . "</td>"; |
24 | 24 | |
@@ -30,12 +30,12 @@ discard block |
||
30 | 30 | // update database with the findings |
31 | 31 | |
32 | 32 | DBConnection::exec("INST", "UPDATE profile SET " |
33 | - . "status_dns = ".RETVAL_SKIPPED.", " |
|
34 | - . "status_cert = ".RETVAL_SKIPPED.", " |
|
35 | - . "status_reachability = ". RETVAL_SKIPPED.", " |
|
36 | - . "status_TLS = ".RETVAL_SKIPPED.", " |
|
33 | + . "status_dns = " . RETVAL_SKIPPED . ", " |
|
34 | + . "status_cert = " . RETVAL_SKIPPED . ", " |
|
35 | + . "status_reachability = " . RETVAL_SKIPPED . ", " |
|
36 | + . "status_TLS = " . RETVAL_SKIPPED . ", " |
|
37 | 37 | . "last_status_check = NOW() " |
38 | - . "WHERE profile_id = ".$profile->identifier); |
|
38 | + . "WHERE profile_id = " . $profile->identifier); |
|
39 | 39 | |
40 | 40 | return $tabletext; |
41 | 41 | } |
@@ -82,9 +82,9 @@ discard block |
||
82 | 82 | } |
83 | 83 | |
84 | 84 | if ($NAPTR_issues) { |
85 | - $tabletext .= UI_error(0,0,true); |
|
85 | + $tabletext .= UI_error(0, 0, true); |
|
86 | 86 | } else { |
87 | - $tabletext .= UI_okay(0,0,true); |
|
87 | + $tabletext .= UI_okay(0, 0, true); |
|
88 | 88 | } |
89 | 89 | |
90 | 90 | $UDP_errors = false; |
@@ -106,13 +106,13 @@ discard block |
||
106 | 106 | } |
107 | 107 | |
108 | 108 | $tabletext .= "</td><td>"; |
109 | - $tabletext .= UI_message($cert_biggest_oddity,0,0,true); |
|
109 | + $tabletext .= UI_message($cert_biggest_oddity, 0, 0, true); |
|
110 | 110 | |
111 | 111 | $tabletext .= "</td><td>"; |
112 | 112 | if (!$UDP_errors) { |
113 | - $tabletext .= UI_okay(0,0,true); |
|
113 | + $tabletext .= UI_okay(0, 0, true); |
|
114 | 114 | } else { |
115 | - $tabletext .= UI_error(0,0,true); |
|
115 | + $tabletext .= UI_error(0, 0, true); |
|
116 | 116 | } |
117 | 117 | |
118 | 118 | $tabletext .= "</td><td>"; |
@@ -127,19 +127,19 @@ discard block |
||
127 | 127 | } |
128 | 128 | } |
129 | 129 | if (!$dynamic_errors) { |
130 | - $tabletext .= UI_okay(0,0,true); |
|
130 | + $tabletext .= UI_okay(0, 0, true); |
|
131 | 131 | } else { |
132 | - $tabletext .= UI_error(0,0,true); |
|
132 | + $tabletext .= UI_error(0, 0, true); |
|
133 | 133 | } |
134 | 134 | $tabletext .= "</td></tr>"; |
135 | 135 | |
136 | 136 | DBConnection::exec("INST", "UPDATE profile SET " |
137 | - . "status_dns = ".($NAPTR_issues ? RETVAL_INVALID : RETVAL_OK) . ", " |
|
138 | - . "status_cert = ".($cert_biggest_oddity) . ", " |
|
139 | - . "status_reachability = ".($UDP_errors ? RETVAL_INVALID : RETVAL_OK) . ", " |
|
140 | - . "status_TLS = ".($dynamic_errors ? RETVAL_INVALID : RETVAL_OK) . ", " |
|
137 | + . "status_dns = " . ($NAPTR_issues ? RETVAL_INVALID : RETVAL_OK) . ", " |
|
138 | + . "status_cert = " . ($cert_biggest_oddity) . ", " |
|
139 | + . "status_reachability = " . ($UDP_errors ? RETVAL_INVALID : RETVAL_OK) . ", " |
|
140 | + . "status_TLS = " . ($dynamic_errors ? RETVAL_INVALID : RETVAL_OK) . ", " |
|
141 | 141 | . "last_status_check = NOW() " |
142 | - . "WHERE profile_id = ".$profile->identifier); |
|
142 | + . "WHERE profile_id = " . $profile->identifier); |
|
143 | 143 | |
144 | 144 | return $tabletext; |
145 | 145 | } |
@@ -177,7 +177,7 @@ discard block |
||
177 | 177 | echo "<h2>" . _("Profiles marked as visible (V)") . "</h2>" . "<table>"; |
178 | 178 | echo rowdescription(); |
179 | 179 | foreach ($profiles_showtime as $oneprofile) |
180 | - echo profilechecks($oneprofile['idp'],$oneprofile['profile']); |
|
180 | + echo profilechecks($oneprofile['idp'], $oneprofile['profile']); |
|
181 | 181 | echo "</table>"; |
182 | 182 | } |
183 | 183 | |
@@ -185,7 +185,7 @@ discard block |
||
185 | 185 | echo "<h2>" . _("Profiles with sufficient configuration, not marked as visible (C)") . "</h2>" . "<table>"; |
186 | 186 | echo rowdescription(); |
187 | 187 | foreach ($profiles_confready as $oneprofile) |
188 | - echo profilechecks($oneprofile['idp'],$oneprofile['profile']); |
|
188 | + echo profilechecks($oneprofile['idp'], $oneprofile['profile']); |
|
189 | 189 | echo "</table>"; |
190 | 190 | } |
191 | 191 | ?> |