@@ -40,7 +40,7 @@ discard block |
||
40 | 40 | private function inputValidationError($customtext) |
41 | 41 | { |
42 | 42 | \core\common\Entity::intoThePotatoes(); |
43 | - $retval = "<p>" . _("Input validation error: ") . $customtext . "</p>"; |
|
43 | + $retval = "<p>"._("Input validation error: ").$customtext."</p>"; |
|
44 | 44 | \core\common\Entity::outOfThePotatoes(); |
45 | 45 | return $retval; |
46 | 46 | } |
@@ -135,18 +135,18 @@ discard block |
||
135 | 135 | } |
136 | 136 | if ($user->isFederationAdmin($temp->federation)) { |
137 | 137 | $this->loggerInstance->debug(4, "You are fed admin for this IdP\n"); |
138 | - return [$temp,'readonly']; |
|
138 | + return [$temp, 'readonly']; |
|
139 | 139 | } |
140 | 140 | if ($user->isSuperadmin()) { |
141 | 141 | $this->loggerInstance->debug(4, "You are the superadmin\n"); |
142 | - return [$temp,'readonly']; |
|
142 | + return [$temp, 'readonly']; |
|
143 | 143 | } |
144 | 144 | throw new Exception($this->inputValidationError("This IdP identifier is not accessible!")); |
145 | 145 | } |
146 | 146 | if ($claimedFedBinding !== NULL && strtoupper($temp->federation) != strtoupper($claimedFedBinding->tld)) { |
147 | 147 | throw new Exception($this->inputValidationError("This IdP does not belong to the claimed federation!")); |
148 | 148 | } |
149 | - return [$temp,'nouser']; |
|
149 | + return [$temp, 'nouser']; |
|
150 | 150 | } |
151 | 151 | |
152 | 152 | /** |
@@ -588,7 +588,7 @@ discard block |
||
588 | 588 | try { |
589 | 589 | $image->readImageBlob($binary); |
590 | 590 | } catch (\ImagickException $exception) { |
591 | - echo "Error" . $exception->getMessage(); |
|
591 | + echo "Error".$exception->getMessage(); |
|
592 | 592 | return FALSE; |
593 | 593 | } |
594 | 594 | // image survived the sanity check |
@@ -304,7 +304,7 @@ discard block |
||
304 | 304 | // for now (no OpenRoaming client certs available) only run server-side tests |
305 | 305 | foreach ($listOfIPs as $oneIP) { |
306 | 306 | $connectionResult = $connectionTests->cApathCheck($oneIP); |
307 | - if ($connectionResult != \core\diag\AbstractTest::RETVAL_OK || ( isset($connectionTests->TLS_CA_checks_result['cert_oddity']) && count($connectionTests->TLS_CA_checks_result['cert_oddity']) > 0)) { |
|
307 | + if ($connectionResult != \core\diag\AbstractTest::RETVAL_OK || (isset($connectionTests->TLS_CA_checks_result['cert_oddity']) && count($connectionTests->TLS_CA_checks_result['cert_oddity']) > 0)) { |
|
308 | 308 | $allHostsOkay = FALSE; |
309 | 309 | } else { |
310 | 310 | $oneHostOkay = TRUE; |
@@ -913,7 +913,7 @@ discard block |
||
913 | 913 | $profileStatus = self::CERT_STATUS_OK; |
914 | 914 | foreach ($rows as $row) { |
915 | 915 | $encodedCert = $row[0]; |
916 | - $tm = $x509->processCertificate(base64_decode($encodedCert))['full_details']['validTo_time_t']- time(); |
|
916 | + $tm = $x509->processCertificate(base64_decode($encodedCert))['full_details']['validTo_time_t'] - time(); |
|
917 | 917 | if ($tm < \config\ConfAssistant::CERT_WARNINGS['expiry_critical']) { |
918 | 918 | $certStatus = self::CERT_STATUS_ERROR; |
919 | 919 | } elseif ($tm < \config\ConfAssistant::CERT_WARNINGS['expiry_warning']) { |
@@ -8,7 +8,7 @@ discard block |
||
8 | 8 | * License: see the web/copyright.php file in the file structure |
9 | 9 | * ****************************************************************************** |
10 | 10 | */ |
11 | -require_once dirname(dirname(__FILE__)) . "/config/_config.php"; |
|
11 | +require_once dirname(dirname(__FILE__))."/config/_config.php"; |
|
12 | 12 | |
13 | 13 | /** |
14 | 14 | * The sctipt will be called from crontab |
@@ -28,7 +28,7 @@ discard block |
||
28 | 28 | } |
29 | 29 | |
30 | 30 | |
31 | -while ( $row = mysqli_fetch_object($allOpenRoamingProfiles)) { |
|
31 | +while ($row = mysqli_fetch_object($allOpenRoamingProfiles)) { |
|
32 | 32 | $profileId = $row->profile_id; |
33 | 33 | print "$profileId\n"; |
34 | 34 | $profile = \core\ProfileFactory::instantiate($profileId); |