@@ -316,7 +316,7 @@ discard block |
||
| 316 | 316 | $serverCandidates[IdPlist::geoDistance($adminLocation, ['lat' => $iterator->location_lat, 'lon' => $iterator->location_lon])] = $iterator->server_id; |
| 317 | 317 | } |
| 318 | 318 | if ($clients > $maxSupportedClients * 0.9) { |
| 319 | - $this->loggerInstance->debug(1, "A RADIUS server for Managed SP (" . $iterator->server_id . ") is serving at more than 90% capacity!"); |
|
| 319 | + $this->loggerInstance->debug(1, "A RADIUS server for Managed SP (".$iterator->server_id.") is serving at more than 90% capacity!"); |
|
| 320 | 320 | } |
| 321 | 321 | } |
| 322 | 322 | if (count($serverCandidates) == 0 && $federation != "DEFAULT") { |
@@ -340,7 +340,7 @@ discard block |
||
| 340 | 340 | */ |
| 341 | 341 | private function createTLScredentials() |
| 342 | 342 | { |
| 343 | - $clientName = "SP_" . $this->identifier . '-' . $this->institution; |
|
| 343 | + $clientName = "SP_".$this->identifier.'-'.$this->institution; |
|
| 344 | 344 | $dn = array( |
| 345 | 345 | "organizationName" => "eduroam", |
| 346 | 346 | "organizationalUnitName" => "eduroam Managed SP", |
@@ -354,13 +354,13 @@ discard block |
||
| 354 | 354 | openssl_pkey_export($privkey, $this->radsec_priv); |
| 355 | 355 | // Generate a certificate signing request |
| 356 | 356 | $csr = openssl_csr_new($dn, $privkey, |
| 357 | - array('digest_alg' => 'sha256', 'config' => ROOT . "/config/ManagedSPCerts/openssl.cnf")); |
|
| 357 | + array('digest_alg' => 'sha256', 'config' => ROOT."/config/ManagedSPCerts/openssl.cnf")); |
|
| 358 | 358 | // get CA certificate and private key |
| 359 | - $caprivkey = array(file_get_contents(ROOT . "/config/ManagedSPCerts/eduroamSP-CA.key"), |
|
| 359 | + $caprivkey = array(file_get_contents(ROOT."/config/ManagedSPCerts/eduroamSP-CA.key"), |
|
| 360 | 360 | \config\Master::MANAGEDSP['capass']); |
| 361 | - $cacert = file_get_contents(ROOT . "/config/ManagedSPCerts/eduroamSP-CA.pem"); |
|
| 361 | + $cacert = file_get_contents(ROOT."/config/ManagedSPCerts/eduroamSP-CA.pem"); |
|
| 362 | 362 | $clientcert = openssl_csr_sign($csr, $cacert, $caprivkey, \config\Master::MANAGEDSP['daystoexpiry'], |
| 363 | - array('digest_alg'=>'sha256', 'config' => ROOT . "/config/ManagedSPCerts/openssl.cnf"), rand()); |
|
| 363 | + array('digest_alg'=>'sha256', 'config' => ROOT."/config/ManagedSPCerts/openssl.cnf"), rand()); |
|
| 364 | 364 | openssl_x509_export($clientcert, $this->radsec_cert); |
| 365 | 365 | } |
| 366 | 366 | /** |
@@ -385,7 +385,7 @@ discard block |
||
| 385 | 385 | $conditional1 = "AND activity_time > DATE_SUB(NOW(), INTERVAL $backlog SECOND)"; |
| 386 | 386 | $conditional2 = ""; |
| 387 | 387 | } |
| 388 | - $stats = $this->databaseHandle->exec("SELECT activity_time, realm, mac, cui, result, ap_id FROM activity WHERE operatorname = ? $conditional1 ORDER BY activity_time $conditional2", "s", $opName ); |
|
| 388 | + $stats = $this->databaseHandle->exec("SELECT activity_time, realm, mac, cui, result, ap_id FROM activity WHERE operatorname = ? $conditional1 ORDER BY activity_time $conditional2", "s", $opName); |
|
| 389 | 389 | return mysqli_fetch_all($stats, \MYSQLI_ASSOC); |
| 390 | 390 | } |
| 391 | 391 | |
@@ -516,7 +516,7 @@ discard block |
||
| 516 | 516 | { |
| 517 | 517 | $customAttrib = $this->getAttributes("managedsp:operatorname"); |
| 518 | 518 | if (count($customAttrib) == 0) { |
| 519 | - return "1sp." . $this->identifier . "-" . $this->institution . \config\ConfAssistant::SILVERBULLET['realm_suffix']; |
|
| 519 | + return "1sp.".$this->identifier."-".$this->institution.\config\ConfAssistant::SILVERBULLET['realm_suffix']; |
|
| 520 | 520 | } |
| 521 | 521 | return $customAttrib[0]["value"]; |
| 522 | 522 | } |
@@ -531,14 +531,14 @@ discard block |
||
| 531 | 531 | private function sendToRADIUS(int $idx, $post) |
| 532 | 532 | { |
| 533 | 533 | $hostname = "radius_hostname_$idx"; |
| 534 | - $ch = curl_init("http://" . $this->$hostname . ':' . \config\Master::MANAGEDSP['radiusconfigport']); |
|
| 534 | + $ch = curl_init("http://".$this->$hostname.':'.\config\Master::MANAGEDSP['radiusconfigport']); |
|
| 535 | 535 | if ($ch === FALSE) { |
| 536 | 536 | $res = 'FAILURE'; |
| 537 | 537 | } else { |
| 538 | 538 | curl_setopt($ch, CURLOPT_USERAGENT, "CAT-ManagedSP"); |
| 539 | 539 | curl_setopt($ch, CURLOPT_POST, 1); |
| 540 | 540 | curl_setopt($ch, CURLOPT_POSTFIELDS, $post); |
| 541 | - $this->loggerInstance->debug(1, "Posting to http://" . $this->$hostname . ':' . \config\Master::MANAGEDSP['radiusconfigport'] . "/$post\n"); |
|
| 541 | + $this->loggerInstance->debug(1, "Posting to http://".$this->$hostname.':'.\config\Master::MANAGEDSP['radiusconfigport']."/$post\n"); |
|
| 542 | 542 | curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); |
| 543 | 543 | curl_setopt($ch, CURLOPT_HEADER, 0); |
| 544 | 544 | curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); |
@@ -577,19 +577,19 @@ discard block |
||
| 577 | 577 | } else { |
| 578 | 578 | $txt = $remove ? _('Profile deactivation failed') : _('Profile activation/modification failed'); |
| 579 | 579 | } |
| 580 | - $txt = $txt . ' '; |
|
| 580 | + $txt = $txt.' '; |
|
| 581 | 581 | if (array_count_values($response)[$status] == 2) { |
| 582 | - $txt = $txt . _('on both RADIUS servers: primary and backup') . '.'; |
|
| 582 | + $txt = $txt._('on both RADIUS servers: primary and backup').'.'; |
|
| 583 | 583 | } else { |
| 584 | 584 | if ($response['res[1]'] == $status) { |
| 585 | - $txt = $txt . _('on primary RADIUS server') . '.'; |
|
| 585 | + $txt = $txt._('on primary RADIUS server').'.'; |
|
| 586 | 586 | } else { |
| 587 | - $txt = $txt . _('on backup RADIUS server') . '.'; |
|
| 587 | + $txt = $txt._('on backup RADIUS server').'.'; |
|
| 588 | 588 | } |
| 589 | 589 | } |
| 590 | 590 | $mail = \core\common\OutsideComm::mailHandle(); |
| 591 | 591 | $email = $this->getAttributes("support:email")[0]['value']; |
| 592 | - $mail->FromName = \config\Master::APPEARANCE['productname'] . " Notification System"; |
|
| 592 | + $mail->FromName = \config\Master::APPEARANCE['productname']." Notification System"; |
|
| 593 | 593 | $mail->addAddress($email); |
| 594 | 594 | if ($status == 'OK') { |
| 595 | 595 | $mail->Subject = _('RADIUS profile update problem fixed'); |
@@ -623,7 +623,7 @@ discard block |
||
| 623 | 623 | return NULL; |
| 624 | 624 | } |
| 625 | 625 | $timeout = 10; |
| 626 | - curl_setopt($ch, CURLOPT_URL, 'http://' . $host); |
|
| 626 | + curl_setopt($ch, CURLOPT_URL, 'http://'.$host); |
|
| 627 | 627 | curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); |
| 628 | 628 | curl_setopt($ch, CURLOPT_TIMEOUT, $timeout); |
| 629 | 629 | curl_exec($ch); |
@@ -715,41 +715,41 @@ discard block |
||
| 715 | 715 | { |
| 716 | 716 | $remove = ($this->status == \core\AbstractDeployment::INACTIVE) ? 0 : 1; |
| 717 | 717 | $toPost = ($onlyone ? array($onlyone => '') : array(1 => '', 2 => '')); |
| 718 | - $toPostTemplate = 'instid=' . $this->institution . '&deploymentid=' . $this->identifier . |
|
| 719 | - '&secret=' . $this->secret . |
|
| 720 | - '&country=' . $this->getAttributes("internal:country")[0]['value'] . |
|
| 721 | - '&pskkey=' . $this->pskkey . '&'; |
|
| 718 | + $toPostTemplate = 'instid='.$this->institution.'&deploymentid='.$this->identifier. |
|
| 719 | + '&secret='.$this->secret. |
|
| 720 | + '&country='.$this->getAttributes("internal:country")[0]['value']. |
|
| 721 | + '&pskkey='.$this->pskkey.'&'; |
|
| 722 | 722 | if ($remove) { |
| 723 | - $toPostTemplate = $toPostTemplate . 'remove=1&'; |
|
| 723 | + $toPostTemplate = $toPostTemplate.'remove=1&'; |
|
| 724 | 724 | } else { |
| 725 | - $toPostTemplate = $toPostTemplate . 'operatorname=' . $this->getOperatorName() . '&'; |
|
| 725 | + $toPostTemplate = $toPostTemplate.'operatorname='.$this->getOperatorName().'&'; |
|
| 726 | 726 | if ($this->getAttributes("managedsp:vlan")[0]['value'] ?? NULL) { |
| 727 | 727 | $allRealms = $this->getAllRealms(); |
| 728 | 728 | if (!empty($allRealms)) { |
| 729 | - $toPostTemplate = $toPostTemplate . 'vlan=' . $this->getAttributes("managedsp:vlan")[0]['value'] . '&'; |
|
| 730 | - $toPostTemplate = $toPostTemplate . 'realmforvlan[]=' . implode('&realmforvlan[]=', $allRealms) . '&'; |
|
| 729 | + $toPostTemplate = $toPostTemplate.'vlan='.$this->getAttributes("managedsp:vlan")[0]['value'].'&'; |
|
| 730 | + $toPostTemplate = $toPostTemplate.'realmforvlan[]='.implode('&realmforvlan[]=', $allRealms).'&'; |
|
| 731 | 731 | } |
| 732 | 732 | } |
| 733 | 733 | } |
| 734 | 734 | foreach (array_keys($toPost) as $key) { |
| 735 | - $elem = 'port' . $key; |
|
| 736 | - $toPost[$key] = $toPostTemplate . 'port=' . $this->$elem; |
|
| 735 | + $elem = 'port'.$key; |
|
| 736 | + $toPost[$key] = $toPostTemplate.'port='.$this->$elem; |
|
| 737 | 737 | } |
| 738 | 738 | $response = array(); |
| 739 | 739 | foreach ($toPost as $key => $value) { |
| 740 | - $this->loggerInstance->debug(1, 'toPost ' . $toPost[$key] . "\n"); |
|
| 740 | + $this->loggerInstance->debug(1, 'toPost '.$toPost[$key]."\n"); |
|
| 741 | 741 | // temporarly one server $response['res[' . $key . ']'] = $this->sendToRADIUS($key, $toPost[$key]); |
| 742 | 742 | //if ($key == 2) { |
| 743 | 743 | // $response['res[2]'] = 'OK'; |
| 744 | 744 | //} else { |
| 745 | - $response['res[' . $key . ']'] = $this->sendToRADIUS($key, $toPost[$key]); |
|
| 745 | + $response['res['.$key.']'] = $this->sendToRADIUS($key, $toPost[$key]); |
|
| 746 | 746 | //} |
| 747 | 747 | } |
| 748 | 748 | if ($onlyone) { |
| 749 | - $response['res[' . ($onlyone == 1) ? 2 : 1 . ']'] = \core\AbstractDeployment::RADIUS_OK; |
|
| 749 | + $response['res['.($onlyone == 1) ? 2 : 1.']'] = \core\AbstractDeployment::RADIUS_OK; |
|
| 750 | 750 | } |
| 751 | 751 | foreach (array('OK', 'FAILURE') as $status) { |
| 752 | - if ( ( ($status == 'OK' && $notify) || ($status == 'FAILURE') ) && ( in_array($status, $response) ) ) { |
|
| 752 | + if ((($status == 'OK' && $notify) || ($status == 'FAILURE')) && (in_array($status, $response))) { |
|
| 753 | 753 | $this->sendMailtoAdmin($remove, $response, $status); |
| 754 | 754 | } |
| 755 | 755 | } |