@@ -83,7 +83,7 @@ |
||
83 | 83 | */ |
84 | 84 | public function der2pem($derData) { |
85 | 85 | $pem = chunk_split(base64_encode($derData), 64, "\n"); |
86 | - $pem = "-----BEGIN CERTIFICATE-----\n" . $pem . "-----END CERTIFICATE-----\n"; |
|
86 | + $pem = "-----BEGIN CERTIFICATE-----\n".$pem."-----END CERTIFICATE-----\n"; |
|
87 | 87 | return $pem; |
88 | 88 | } |
89 | 89 |
@@ -165,8 +165,8 @@ |
||
165 | 165 | $key = array_search($eapType, EAP::EAPTYPES_CONVERSION); |
166 | 166 | if ($key !== FALSE) { |
167 | 167 | // add a type cast to int to make Scrutinizer realise that the key found is always an integer |
168 | - $this->intRep = (int)$key; // array index is always an integer |
|
169 | - $this->arrayRep = EAP::EAPTYPES_CONVERSION[(int)$key]; |
|
168 | + $this->intRep = (int) $key; // array index is always an integer |
|
169 | + $this->arrayRep = EAP::EAPTYPES_CONVERSION[(int) $key]; |
|
170 | 170 | return; |
171 | 171 | } |
172 | 172 | } |
@@ -30,7 +30,7 @@ discard block |
||
30 | 30 | */ |
31 | 31 | namespace core\common; |
32 | 32 | |
33 | -require_once dirname(dirname(__DIR__)) . "/config/_config.php"; |
|
33 | +require_once dirname(dirname(__DIR__))."/config/_config.php"; |
|
34 | 34 | |
35 | 35 | /** |
36 | 36 | * This class maintains state of the selected language and can set the language. |
@@ -72,9 +72,9 @@ discard block |
||
72 | 72 | $loggerInstance = new \core\common\Logging(); |
73 | 73 | $olddomain = textdomain(NULL); |
74 | 74 | $loggerInstance->debug(4, "set_locale($domain)\n"); |
75 | - $loggerInstance->debug(4, ROOT . "\n"); |
|
75 | + $loggerInstance->debug(4, ROOT."\n"); |
|
76 | 76 | textdomain($domain); |
77 | - bindtextdomain($domain, ROOT . "/translation/"); |
|
77 | + bindtextdomain($domain, ROOT."/translation/"); |
|
78 | 78 | return $olddomain; |
79 | 79 | } |
80 | 80 | |
@@ -96,7 +96,7 @@ discard block |
||
96 | 96 | $langConverted[] = $hardSetLang; |
97 | 97 | } |
98 | 98 | if (!empty($_REQUEST['lang'])) { |
99 | - $recoverLang = filter_input(INPUT_GET,'lang', FILTER_SANITIZE_STRING) ?? filter_input(INPUT_POST, 'lang', FILTER_SANITIZE_STRING); |
|
99 | + $recoverLang = filter_input(INPUT_GET, 'lang', FILTER_SANITIZE_STRING) ?? filter_input(INPUT_POST, 'lang', FILTER_SANITIZE_STRING); |
|
100 | 100 | $langConverted[] = $recoverLang; |
101 | 101 | } |
102 | 102 | CAT_session_start(); |
@@ -104,7 +104,7 @@ discard block |
||
104 | 104 | $langConverted[] = $_SESSION['language']; |
105 | 105 | } |
106 | 106 | if (!empty($_SERVER['HTTP_ACCEPT_LANGUAGE'])) { |
107 | - $langs = explode(",", filter_input(INPUT_SERVER,"HTTP_ACCEPT_LANGUAGE", FILTER_SANITIZE_STRING)); |
|
107 | + $langs = explode(",", filter_input(INPUT_SERVER, "HTTP_ACCEPT_LANGUAGE", FILTER_SANITIZE_STRING)); |
|
108 | 108 | foreach ($langs as $lang) { |
109 | 109 | $result = []; |
110 | 110 | preg_match("/(.*);+.*/", $lang, $result); |
@@ -124,7 +124,7 @@ discard block |
||
124 | 124 | |
125 | 125 | // check if this language is supported by the CAT config |
126 | 126 | foreach (CONFIG['LANGUAGES'] as $language => $value) { |
127 | - if (preg_match("/^" . $language . ".*/", $tryLang)) { |
|
127 | + if (preg_match("/^".$language.".*/", $tryLang)) { |
|
128 | 128 | $localeTmp = $value['locale']; |
129 | 129 | $langIndex = $language; // ??? |
130 | 130 | break; |
@@ -139,7 +139,7 @@ discard block |
||
139 | 139 | } |
140 | 140 | } |
141 | 141 | } |
142 | - putenv("LC_ALL=" . $theLocale); |
|
142 | + putenv("LC_ALL=".$theLocale); |
|
143 | 143 | $_SESSION['language'] = $langIndex; |
144 | 144 | $loggerInstance = new \core\common\Logging(); |
145 | 145 | $loggerInstance->debug(4, "selected lang:$langIndex:$theLocale\n"); |
@@ -63,7 +63,7 @@ discard block |
||
63 | 63 | $returnArray = []; |
64 | 64 | $returnArray['status'] = $status; |
65 | 65 | $returnArray['data'] = $data; |
66 | - $returnArray['tou'] = "Please consult Terms of Use at: //" . $host . \core\CAT::getRootUrlPath() . "/tou.php"; |
|
66 | + $returnArray['tou'] = "Please consult Terms of Use at: //".$host.\core\CAT::getRootUrlPath()."/tou.php"; |
|
67 | 67 | if (!empty($otherData)) { |
68 | 68 | $returnArray['otherdata'] = $otherData; |
69 | 69 | } |
@@ -269,8 +269,8 @@ discard block |
||
269 | 269 | */ |
270 | 270 | public function sendLogo($identifier, $type, $width = 0, $height = 0) { |
271 | 271 | $logo = $this->getLogo($identifier, $type, $width, $height); |
272 | - $blob = $logo === NULL ? file_get_contents(ROOT . '/web/resources/images/empty.png') : $logo['blob']; |
|
273 | - header("Content-type: " . $logo['filetype']); |
|
272 | + $blob = $logo === NULL ? file_get_contents(ROOT.'/web/resources/images/empty.png') : $logo['blob']; |
|
273 | + header("Content-type: ".$logo['filetype']); |
|
274 | 274 | header("Cache-Control:max-age=36000, must-revalidate"); |
275 | 275 | header($logo['expires']); |
276 | 276 | echo $blob; |
@@ -397,7 +397,6 @@ |
||
397 | 397 | * |
398 | 398 | * @param string $format only "der" and "pem" are currently allowed |
399 | 399 | * @return array an array of arrays or empty array on error |
400 | - |
|
401 | 400 | */ |
402 | 401 | final protected function saveCertificateFiles($format) { |
403 | 402 | switch ($format) { |
@@ -82,7 +82,7 @@ discard block |
||
82 | 82 | */ |
83 | 83 | protected function setSupportedEapMethods($eapArray) { |
84 | 84 | $this->supportedEapMethods = $eapArray; |
85 | - $this->loggerInstance->debug(4, "This device (" . __CLASS__ . ") supports the following EAP methods: "); |
|
85 | + $this->loggerInstance->debug(4, "This device (".__CLASS__.") supports the following EAP methods: "); |
|
86 | 86 | $this->loggerInstance->debug(4, $this->supportedEapMethods); |
87 | 87 | } |
88 | 88 | |
@@ -126,7 +126,7 @@ discard block |
||
126 | 126 | throw new Exception("No EAP type available."); |
127 | 127 | } |
128 | 128 | $this->attributes = $this->getProfileAttributes($profile); |
129 | - $this->deviceUUID = common\Entity::uuid('', 'CAT' . $profile->institution . "-" . $profile->identifier . "-" . $this->device_id); |
|
129 | + $this->deviceUUID = common\Entity::uuid('', 'CAT'.$profile->institution."-".$profile->identifier."-".$this->device_id); |
|
130 | 130 | |
131 | 131 | |
132 | 132 | // if we are instantiating a Silverbullet profile AND have been given |
@@ -150,8 +150,8 @@ discard block |
||
150 | 150 | // create temporary directory, its full path will be saved in $this->FPATH; |
151 | 151 | $tempDir = $this->createTemporaryDirectory($purpose); |
152 | 152 | $this->FPATH = $tempDir['dir']; |
153 | - mkdir($tempDir['dir'] . '/tmp'); |
|
154 | - chdir($tempDir['dir'] . '/tmp'); |
|
153 | + mkdir($tempDir['dir'].'/tmp'); |
|
154 | + chdir($tempDir['dir'].'/tmp'); |
|
155 | 155 | $caList = []; |
156 | 156 | $x509 = new \core\common\X509(); |
157 | 157 | if (isset($this->attributes['eap:ca_file'])) { |
@@ -171,7 +171,7 @@ discard block |
||
171 | 171 | } |
172 | 172 | if (isset($this->attributes['general:logo_file'])) { |
173 | 173 | $this->loggerInstance->debug(5, "saving IDP logo\n"); |
174 | - $this->attributes['internal:logo_file'] = $this->saveLogoFile($this->attributes['general:logo_file'],'idp'); |
|
174 | + $this->attributes['internal:logo_file'] = $this->saveLogoFile($this->attributes['general:logo_file'], 'idp'); |
|
175 | 175 | } |
176 | 176 | if (isset($this->attributes['fed:logo_file'])) { |
177 | 177 | $this->loggerInstance->debug(5, "saving FED logo\n"); |
@@ -187,7 +187,7 @@ discard block |
||
187 | 187 | $this->support_url_substitute = sprintf(_("your local %s support page"), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']); |
188 | 188 | |
189 | 189 | if ($this->signer && $this->options['sign']) { |
190 | - $this->sign = ROOT . '/signer/' . $this->signer; |
|
190 | + $this->sign = ROOT.'/signer/'.$this->signer; |
|
191 | 191 | } |
192 | 192 | $this->installerBasename = $this->getInstallerBasename(); |
193 | 193 | common\Entity::outOfThePotatoes(); |
@@ -243,10 +243,10 @@ discard block |
||
243 | 243 | * @return string|boolean the filename as found, with path, or FALSE if it does not exist |
244 | 244 | */ |
245 | 245 | private function findSourceFile($file) { |
246 | - if (is_file($this->module_path . '/Files/' . $this->device_id . '/' . $file)) { |
|
247 | - return $this->module_path . '/Files/' . $this->device_id . '/' . $file; |
|
248 | - } elseif (is_file($this->module_path . '/Files/' . $file)) { |
|
249 | - return $this->module_path . '/Files/' . $file; |
|
246 | + if (is_file($this->module_path.'/Files/'.$this->device_id.'/'.$file)) { |
|
247 | + return $this->module_path.'/Files/'.$this->device_id.'/'.$file; |
|
248 | + } elseif (is_file($this->module_path.'/Files/'.$file)) { |
|
249 | + return $this->module_path.'/Files/'.$file; |
|
250 | 250 | } else { |
251 | 251 | $this->loggerInstance->debug(2, "requested file $file does not exist\n"); |
252 | 252 | return FALSE; |
@@ -322,7 +322,7 @@ discard block |
||
322 | 322 | |
323 | 323 | $this->loggerInstance->debug(5, "translateFile($source_name, $output_name, $encoding)\n"); |
324 | 324 | ob_start(); |
325 | - $this->loggerInstance->debug(5, $this->module_path . '/Files/' . $this->device_id . '/' . $source_name . "\n"); |
|
325 | + $this->loggerInstance->debug(5, $this->module_path.'/Files/'.$this->device_id.'/'.$source_name."\n"); |
|
326 | 326 | $source = $this->findSourceFile($source_name); |
327 | 327 | |
328 | 328 | if ($source !== FALSE) { // if there is no file found, don't attempt to include an uninitialised variable |
@@ -330,7 +330,7 @@ discard block |
||
330 | 330 | } |
331 | 331 | $output = ob_get_clean(); |
332 | 332 | if ($encoding) { |
333 | - $outputClean = iconv('UTF-8', $encoding . '//TRANSLIT', $output); |
|
333 | + $outputClean = iconv('UTF-8', $encoding.'//TRANSLIT', $output); |
|
334 | 334 | if ($outputClean) { |
335 | 335 | $output = $outputClean; |
336 | 336 | } |
@@ -373,7 +373,7 @@ discard block |
||
373 | 373 | $encoding = 0; |
374 | 374 | } |
375 | 375 | if ($encoding) { |
376 | - $output_c = iconv('UTF-8', $encoding . '//TRANSLIT', $source_string); |
|
376 | + $output_c = iconv('UTF-8', $encoding.'//TRANSLIT', $source_string); |
|
377 | 377 | } else { |
378 | 378 | $output_c = $source_string; |
379 | 379 | } |
@@ -467,17 +467,17 @@ discard block |
||
467 | 467 | */ |
468 | 468 | private function getInstallerBasename() { |
469 | 469 | |
470 | - $baseName = $this->customTranslit(CONFIG_CONFASSISTANT['CONSORTIUM']['name']) . "-" . $this->getDeviceId(); |
|
470 | + $baseName = $this->customTranslit(CONFIG_CONFASSISTANT['CONSORTIUM']['name'])."-".$this->getDeviceId(); |
|
471 | 471 | if (isset($this->attributes['profile:customsuffix'][1])) { |
472 | 472 | // this string will end up as a filename on a filesystem, so always |
473 | 473 | // take a latin-based language variant if available |
474 | 474 | // and then scrub non-ASCII just in case |
475 | - return $baseName . $this->customTranslit($this->attributes['profile:customsuffix'][1]); |
|
475 | + return $baseName.$this->customTranslit($this->attributes['profile:customsuffix'][1]); |
|
476 | 476 | } |
477 | 477 | // Okay, no custom suffix. |
478 | 478 | // Use the configured inst name and apply shortening heuristics |
479 | 479 | $lang_pointer = CONFIG['LANGUAGES'][$this->languageInstance->getLang()]['latin_based'] == TRUE ? 0 : 1; |
480 | - $this->loggerInstance->debug(5, "getInstallerBasename1:" . $this->attributes['general:instname'][$lang_pointer] . "\n"); |
|
480 | + $this->loggerInstance->debug(5, "getInstallerBasename1:".$this->attributes['general:instname'][$lang_pointer]."\n"); |
|
481 | 481 | $inst = $this->customTranslit($this->attributes['general:instname'][$lang_pointer]); |
482 | 482 | $this->loggerInstance->debug(4, "getInstallerBasename2:$inst\n"); |
483 | 483 | $Inst_a = explode('_', $inst); |
@@ -492,10 +492,10 @@ discard block |
||
492 | 492 | if (!empty($this->attributes['profile:name']) && !empty($this->attributes['profile:name'][$lang_pointer])) { |
493 | 493 | $profTemp = $this->customTranslit($this->attributes['profile:name'][$lang_pointer]); |
494 | 494 | $prof = preg_replace('/_+$/', '', $profTemp); |
495 | - return $baseName . $inst . '-' . $prof; |
|
495 | + return $baseName.$inst.'-'.$prof; |
|
496 | 496 | } |
497 | 497 | } |
498 | - return $baseName . $inst; |
|
498 | + return $baseName.$inst; |
|
499 | 499 | } |
500 | 500 | |
501 | 501 | /** |
@@ -563,13 +563,13 @@ discard block |
||
563 | 563 | * @return array |
564 | 564 | */ |
565 | 565 | private function getConsortia() { |
566 | - if(!isset(CONFIG_CONFASSISTANT['CONSORTIUM']['interworking-consortium-oi'])) { |
|
566 | + if (!isset(CONFIG_CONFASSISTANT['CONSORTIUM']['interworking-consortium-oi'])) { |
|
567 | 567 | return ([]); |
568 | 568 | } |
569 | 569 | $consortia = CONFIG_CONFASSISTANT['CONSORTIUM']['interworking-consortium-oi']; |
570 | 570 | if (isset($this->attributes['media:consortium_OI'])) { |
571 | 571 | foreach ($this->attributes['media:consortium_OI'] as $new_oi) { |
572 | - if(!in_array($new_oi, $consortia)) { |
|
572 | + if (!in_array($new_oi, $consortia)) { |
|
573 | 573 | $consortia[] = $new_oi; |
574 | 574 | } |
575 | 575 | } |
@@ -595,7 +595,7 @@ discard block |
||
595 | 595 | * @return array list of filenames and the mime types |
596 | 596 | * @throws Exception |
597 | 597 | */ |
598 | - private function saveLogoFile($logos,$type) { |
|
598 | + private function saveLogoFile($logos, $type) { |
|
599 | 599 | $iterator = 0; |
600 | 600 | $returnarray = []; |
601 | 601 | foreach ($logos as $blob) { |
@@ -608,7 +608,7 @@ discard block |
||
608 | 608 | $ext = 'unsupported'; |
609 | 609 | } |
610 | 610 | $this->loggerInstance->debug(5, "saveLogoFile: $mime : $ext\n"); |
611 | - $fileName = 'logo-' . $type . $iterator . '.' . $ext; |
|
611 | + $fileName = 'logo-'.$type.$iterator.'.'.$ext; |
|
612 | 612 | $fileHandle = fopen($fileName, "w"); |
613 | 613 | if (!$fileHandle) { |
614 | 614 | $this->loggerInstance->debug(2, "saveLogoFile failed for: $fileName\n"); |
@@ -634,13 +634,13 @@ discard block |
||
634 | 634 | $mime = $finfo->buffer($blob); |
635 | 635 | $ext = isset($this->mime_extensions[$mime]) ? $this->mime_extensions[$mime] : 'usupported'; |
636 | 636 | $this->loggerInstance->debug(5, "saveInfoFile: $mime : $ext\n"); |
637 | - $fileHandle = fopen('local-info.' . $ext, "w"); |
|
637 | + $fileHandle = fopen('local-info.'.$ext, "w"); |
|
638 | 638 | if ($fileHandle === FALSE) { |
639 | 639 | throw new Exception("problem opening the file"); |
640 | 640 | } |
641 | 641 | fwrite($fileHandle, $blob); |
642 | 642 | fclose($fileHandle); |
643 | - return(['name' => 'local-info.' . $ext, 'mime' => $ext]); |
|
643 | + return(['name' => 'local-info.'.$ext, 'mime' => $ext]); |
|
644 | 644 | } |
645 | 645 | |
646 | 646 | /** |
@@ -691,9 +691,9 @@ discard block |
||
691 | 691 | protected function determineOuterIdString() { |
692 | 692 | $outerId = NULL; |
693 | 693 | if (isset($this->attributes['internal:use_anon_outer']) && $this->attributes['internal:use_anon_outer'][0] == "1" && isset($this->attributes['internal:realm'])) { |
694 | - $outerId = "@" . $this->attributes['internal:realm'][0]; |
|
694 | + $outerId = "@".$this->attributes['internal:realm'][0]; |
|
695 | 695 | if (isset($this->attributes['internal:anon_local_value'])) { |
696 | - $outerId = $this->attributes['internal:anon_local_value'][0] . $outerId; |
|
696 | + $outerId = $this->attributes['internal:anon_local_value'][0].$outerId; |
|
697 | 697 | } |
698 | 698 | } |
699 | 699 | return $outerId; |
@@ -89,7 +89,7 @@ discard block |
||
89 | 89 | |
90 | 90 | // realm is automatically calculated, then stored in DB |
91 | 91 | |
92 | - $this->realm = "opaquehash@$myInst->identifier-$this->identifier." . strtolower($myInst->federation) . CONFIG_CONFASSISTANT['SILVERBULLET']['realm_suffix']; |
|
92 | + $this->realm = "opaquehash@$myInst->identifier-$this->identifier.".strtolower($myInst->federation).CONFIG_CONFASSISTANT['SILVERBULLET']['realm_suffix']; |
|
93 | 93 | $localValueIfAny = ""; |
94 | 94 | |
95 | 95 | // but there's some common internal attributes populated directly |
@@ -106,10 +106,10 @@ discard block |
||
106 | 106 | |
107 | 107 | // and we need to populate eap:server_name and eap:ca_file with the NRO-specific EAP information |
108 | 108 | $silverbulletAttributes = [ |
109 | - "eap:server_name" => "auth." . strtolower($myFed->tld) . CONFIG_CONFASSISTANT['SILVERBULLET']['server_suffix'], |
|
109 | + "eap:server_name" => "auth.".strtolower($myFed->tld).CONFIG_CONFASSISTANT['SILVERBULLET']['server_suffix'], |
|
110 | 110 | ]; |
111 | 111 | $x509 = new \core\common\X509(); |
112 | - $caHandle = fopen(dirname(__FILE__) . "/../config/SilverbulletServerCerts/" . strtoupper($myFed->tld) . "/root.pem", "r"); |
|
112 | + $caHandle = fopen(dirname(__FILE__)."/../config/SilverbulletServerCerts/".strtoupper($myFed->tld)."/root.pem", "r"); |
|
113 | 113 | if ($caHandle !== FALSE) { |
114 | 114 | $cAFile = fread($caHandle, 16000000); |
115 | 115 | $silverbulletAttributes["eap:ca_file"] = $x509->der2pem(($x509->pem2der($cAFile))); |
@@ -129,26 +129,26 @@ discard block |
||
129 | 129 | $this->loggerInstance->debug(3, "--- END Constructing new Profile object ... ---\n"); |
130 | 130 | |
131 | 131 | $this->termsAndConditions = "<h2>Product Definition</h2> |
132 | - <p>" . \core\ProfileSilverbullet::PRODUCTNAME . " outsources the technical setup of " . CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'] . " " . CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution'] . " functions to the " . CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'] . " Operations Team. The system includes</p> |
|
132 | + <p>" . \core\ProfileSilverbullet::PRODUCTNAME." outsources the technical setup of ".CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']." ".CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution']." functions to the ".CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']." Operations Team. The system includes</p> |
|
133 | 133 | <ul> |
134 | 134 | <li>a web-based user management interface where user accounts and access credentials can be created and revoked (there is a limit to the number of active users)</li> |
135 | 135 | <li>a technical infrastructure ('CA') which issues and revokes credentials</li> |
136 | - <li>a technical infrastructure ('RADIUS') which verifies access credentials and subsequently grants access to " . CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'] . "</li> |
|
136 | + <li>a technical infrastructure ('RADIUS') which verifies access credentials and subsequently grants access to " . CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']."</li> |
|
137 | 137 | </ul> |
138 | 138 | <h2>User Account Liability</h2> |
139 | - <p>As an " . CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'] . " " . CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution'] . " administrator using this system, you are authorized to create user accounts according to your local " . CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution'] . " policy. You are fully responsible for the accounts you issue and are the data controller for all user information you deposit in this system; the system is a data processor.</p>"; |
|
139 | + <p>As an " . CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']." ".CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution']." administrator using this system, you are authorized to create user accounts according to your local ".CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution']." policy. You are fully responsible for the accounts you issue and are the data controller for all user information you deposit in this system; the system is a data processor.</p>"; |
|
140 | 140 | $this->termsAndConditions .= "<p>Your responsibilities include that you</p> |
141 | 141 | <ul> |
142 | - <li>only issue accounts to members of your " . CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution'] . ", as defined by your local policy.</li> |
|
142 | + <li>only issue accounts to members of your " . CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution'].", as defined by your local policy.</li> |
|
143 | 143 | <li>must make sure that all accounts that you issue can be linked by you to actual human end users</li> |
144 | - <li>have to immediately revoke accounts of users when they leave or otherwise stop being a member of your " . CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution'] . "</li> |
|
144 | + <li>have to immediately revoke accounts of users when they leave or otherwise stop being a member of your " . CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution']."</li> |
|
145 | 145 | <li>will act upon notifications about possible network abuse by your users and will appropriately sanction them</li> |
146 | 146 | </ul> |
147 | 147 | <p>"; |
148 | - $this->termsAndConditions .= "Failure to comply with these requirements may make your " . CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_federation'] . " act on your behalf, which you authorise, and will ultimately lead to the deletion of your " . CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution'] . " (and all the users you create inside) in this system."; |
|
148 | + $this->termsAndConditions .= "Failure to comply with these requirements may make your ".CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_federation']." act on your behalf, which you authorise, and will ultimately lead to the deletion of your ".CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_institution']." (and all the users you create inside) in this system."; |
|
149 | 149 | $this->termsAndConditions .= "</p> |
150 | 150 | <h2>Privacy</h2> |
151 | - <p>With " . \core\ProfileSilverbullet::PRODUCTNAME . ", we are necessarily storing personally identifiable information about the end users you create. While the actual human is only identifiable with your help, we consider all the user data as relevant in terms of privacy jurisdiction. Please note that</p> |
|
151 | + <p>With " . \core\ProfileSilverbullet::PRODUCTNAME.", we are necessarily storing personally identifiable information about the end users you create. While the actual human is only identifiable with your help, we consider all the user data as relevant in terms of privacy jurisdiction. Please note that</p> |
|
152 | 152 | <ul> |
153 | 153 | <li>You are the only one who needs to be able to make a link to the human behind the usernames you create. The usernames you create in the system have to be rich enough to allow you to make that identification step. Also consider situations when you are unavailable or leave the organisation and someone else needs to perform the matching to an individual.</li> |
154 | 154 | <li>The identifiers we create in the credentials are not linked to the usernames you add to the system; they are randomly generated pseudonyms.</li> |
@@ -129,7 +129,7 @@ discard block |
||
129 | 129 | */ |
130 | 130 | protected function saveDownloadDetails($idpIdentifier, $profileId, $deviceId, $area, $lang, $eapType) { |
131 | 131 | if (CONFIG['PATHS']['logdir']) { |
132 | - $file = fopen(CONFIG['PATHS']['logdir'] . "/download_details.log", "a"); |
|
132 | + $file = fopen(CONFIG['PATHS']['logdir']."/download_details.log", "a"); |
|
133 | 133 | if ($file === FALSE) { |
134 | 134 | throw new Exception("Unable to open file for append: $file"); |
135 | 135 | } |
@@ -155,7 +155,7 @@ discard block |
||
155 | 155 | $eaptype = new common\EAP($eapQuery->eap_method_id); |
156 | 156 | $eapTypeArray[] = $eaptype; |
157 | 157 | } |
158 | - $this->loggerInstance->debug(4, "This profile supports the following EAP types:\n" . print_r($eapTypeArray, true)); |
|
158 | + $this->loggerInstance->debug(4, "This profile supports the following EAP types:\n".print_r($eapTypeArray, true)); |
|
159 | 159 | return $eapTypeArray; |
160 | 160 | } |
161 | 161 | |
@@ -210,7 +210,7 @@ discard block |
||
210 | 210 | foreach ($new as $attrib) { |
211 | 211 | $ignore = ""; |
212 | 212 | foreach ($existing as $approvedAttrib) { |
213 | - if (($attrib["name"] == $approvedAttrib["name"] && $approvedAttrib["level"] != $newlevel) && ($approvedAttrib["name"] != "device-specific:redirect") ){ |
|
213 | + if (($attrib["name"] == $approvedAttrib["name"] && $approvedAttrib["level"] != $newlevel) && ($approvedAttrib["name"] != "device-specific:redirect")) { |
|
214 | 214 | $ignore = "YES"; |
215 | 215 | } |
216 | 216 | } |
@@ -253,16 +253,16 @@ discard block |
||
253 | 253 | if (count($this->getAttributes("internal:checkuser_outer")) > 0) { |
254 | 254 | // we are supposed to use a specific outer username for checks, |
255 | 255 | // which is different from the outer username we put into installers |
256 | - return $this->getAttributes("internal:checkuser_value")[0]['value'] . "@" . $realm; |
|
256 | + return $this->getAttributes("internal:checkuser_value")[0]['value']."@".$realm; |
|
257 | 257 | } |
258 | 258 | if (count($this->getAttributes("internal:use_anon_outer")) > 0) { |
259 | 259 | // no special check username, but there is an anon outer ID for |
260 | 260 | // installers - so let's use that one |
261 | - return $this->getAttributes("internal:anon_local_value")[0]['value'] . "@" . $realm; |
|
261 | + return $this->getAttributes("internal:anon_local_value")[0]['value']."@".$realm; |
|
262 | 262 | } |
263 | 263 | // okay, no guidance on outer IDs at all - but we need *something* to |
264 | 264 | // test with for the RealmChecks. So: |
265 | - return "@" . $realm; |
|
265 | + return "@".$realm; |
|
266 | 266 | } |
267 | 267 | |
268 | 268 | /** |
@@ -342,7 +342,7 @@ discard block |
||
342 | 342 | * @param boolean $shallwe TRUE to enable outer identities (needs valid $realm), FALSE to disable |
343 | 343 | * @return void |
344 | 344 | */ |
345 | - abstract public function setAnonymousIDSupport($shallwe) ; |
|
345 | + abstract public function setAnonymousIDSupport($shallwe); |
|
346 | 346 | |
347 | 347 | /** |
348 | 348 | * Log a new download for our stats |
@@ -696,7 +696,7 @@ discard block |
||
696 | 696 | */ |
697 | 697 | public function prepShowtime() { |
698 | 698 | $properConfig = $this->readyForShowtime(); |
699 | - $this->databaseHandle->exec("UPDATE profile SET sufficient_config = " . ($properConfig ? "TRUE" : "FALSE") . " WHERE profile_id = " . $this->identifier); |
|
699 | + $this->databaseHandle->exec("UPDATE profile SET sufficient_config = ".($properConfig ? "TRUE" : "FALSE")." WHERE profile_id = ".$this->identifier); |
|
700 | 700 | |
701 | 701 | $attribs = $this->getCollapsedAttributes(); |
702 | 702 | // if not enough info to go live, set FALSE |
@@ -126,20 +126,20 @@ discard block |
||
126 | 126 | if ($device == "TOTAL") { |
127 | 127 | continue; |
128 | 128 | } |
129 | - $retstring .= "<tr><td>$device</td><td>" . $numbers['ADMIN'] . "</td><td>" . $numbers['SILVERBULLET'] . "</td><td>" . $numbers['USER'] . "</td></tr>"; |
|
129 | + $retstring .= "<tr><td>$device</td><td>".$numbers['ADMIN']."</td><td>".$numbers['SILVERBULLET']."</td><td>".$numbers['USER']."</td></tr>"; |
|
130 | 130 | } |
131 | - $retstring .= "<tr><td><strong>TOTAL</strong></td><td><strong>" . $data['TOTAL']['ADMIN'] . "</strong></td><td><strong>" . $data['TOTAL']['SILVERBULLET'] . "</strong></td><td><strong>" . $data['TOTAL']['USER'] . "</strong></td></tr>"; |
|
131 | + $retstring .= "<tr><td><strong>TOTAL</strong></td><td><strong>".$data['TOTAL']['ADMIN']."</strong></td><td><strong>".$data['TOTAL']['SILVERBULLET']."</strong></td><td><strong>".$data['TOTAL']['USER']."</strong></td></tr>"; |
|
132 | 132 | break; |
133 | 133 | case "XML": |
134 | 134 | // the calls to date() operate on current date, so there is no chance for a FALSE to be returned. Silencing scrutinizer. |
135 | - $retstring .= "<federation id='$this->tld' ts='" . /** @scrutinizer ignore-type */ date("Y-m-d") . "T" . /** @scrutinizer ignore-type */ date("H:i:s") . "'>\n"; |
|
135 | + $retstring .= "<federation id='$this->tld' ts='"./** @scrutinizer ignore-type */ date("Y-m-d")."T"./** @scrutinizer ignore-type */ date("H:i:s")."'>\n"; |
|
136 | 136 | foreach ($data as $device => $numbers) { |
137 | 137 | if ($device == "TOTAL") { |
138 | 138 | continue; |
139 | 139 | } |
140 | - $retstring .= " <device name='" . $device . "'>\n <downloads group='admin'>" . $numbers['ADMIN'] . "</downloads>\n <downloads group='managed_idp'>" . $numbers['SILVERBULLET'] . "</downloads>\n <downloads group='user'>" . $numbers['USER'] . "</downloads>\n </device>"; |
|
140 | + $retstring .= " <device name='".$device."'>\n <downloads group='admin'>".$numbers['ADMIN']."</downloads>\n <downloads group='managed_idp'>".$numbers['SILVERBULLET']."</downloads>\n <downloads group='user'>".$numbers['USER']."</downloads>\n </device>"; |
|
141 | 141 | } |
142 | - $retstring .= "<total>\n <downloads group='admin'>" . $data['TOTAL']['ADMIN'] . "</downloads>\n <downloads group='managed_idp'>" . $data['TOTAL']['SILVERBULLET'] . "</downloads>\n <downloads group='user'>" . $data['TOTAL']['USER'] . "</downloads>\n</total>\n"; |
|
142 | + $retstring .= "<total>\n <downloads group='admin'>".$data['TOTAL']['ADMIN']."</downloads>\n <downloads group='managed_idp'>".$data['TOTAL']['SILVERBULLET']."</downloads>\n <downloads group='user'>".$data['TOTAL']['USER']."</downloads>\n</total>\n"; |
|
143 | 143 | $retstring .= "</federation>"; |
144 | 144 | break; |
145 | 145 | case "array": |
@@ -221,7 +221,7 @@ discard block |
||
221 | 221 | $identifier = $this->databaseHandle->lastID(); |
222 | 222 | |
223 | 223 | if ($identifier == 0 || !$this->loggerInstance->writeAudit($ownerId, "NEW", "IdP $identifier")) { |
224 | - $text = "<p>Could not create a new " . CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_inst'] . "!</p>"; |
|
224 | + $text = "<p>Could not create a new ".CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_inst']."!</p>"; |
|
225 | 225 | echo $text; |
226 | 226 | throw new Exception($text); |
227 | 227 | } |
@@ -37,7 +37,7 @@ |
||
37 | 37 | foreach ($idps as $idp) { |
38 | 38 | $idpTitle[$idp['entityID']] = $idp['title']; |
39 | 39 | $d = self::getIdpDistance($idp, $here); |
40 | - $resultSet[$idp['entityID']] = $d . " " . $idp['title']; |
|
40 | + $resultSet[$idp['entityID']] = $d." ".$idp['title']; |
|
41 | 41 | } |
42 | 42 | asort($resultSet); |
43 | 43 | $outarray = []; |