@@ -115,12 +115,12 @@ discard block |
||
| 115 | 115 | $this->name = $this->languageInstance->getLocalisedValue($this->getAttributes('general:instname')); |
| 116 | 116 | $eligibility = $this->eligibility(); |
| 117 | 117 | if (in_array(IdP::ELIGIBILITY_IDP, $eligibility) && in_array(IdP::ELIGIBILITY_SP, $eligibility)) { |
| 118 | - $eligType = IdP::TYPE_IDPSP . ""; |
|
| 118 | + $eligType = IdP::TYPE_IDPSP.""; |
|
| 119 | 119 | $this->type = $eligType; |
| 120 | 120 | } elseif (in_array(IdP::ELIGIBILITY_IDP, $eligibility)) { |
| 121 | - $eligType = IdP::TYPE_IDP . ""; |
|
| 121 | + $eligType = IdP::TYPE_IDP.""; |
|
| 122 | 122 | } else { |
| 123 | - $eligType = IdP::TYPE_SP . ""; |
|
| 123 | + $eligType = IdP::TYPE_SP.""; |
|
| 124 | 124 | } |
| 125 | 125 | $this->type = $eligType; |
| 126 | 126 | $this->loggerInstance->debug(4, "--- END Constructing new IdP object ... ---\n"); |
@@ -134,7 +134,7 @@ discard block |
||
| 134 | 134 | */ |
| 135 | 135 | public function listProfiles(bool $activeOnly = FALSE) |
| 136 | 136 | { |
| 137 | - $query = "SELECT profile_id FROM profile WHERE inst_id = $this->identifier" . ($activeOnly ? " AND showtime = 1" : ""); |
|
| 137 | + $query = "SELECT profile_id FROM profile WHERE inst_id = $this->identifier".($activeOnly ? " AND showtime = 1" : ""); |
|
| 138 | 138 | $allProfiles = $this->databaseHandle->exec($query); |
| 139 | 139 | $returnarray = []; |
| 140 | 140 | // SELECT -> resource, not boolean |
@@ -144,7 +144,7 @@ discard block |
||
| 144 | 144 | $returnarray[] = $oneProfile; |
| 145 | 145 | } |
| 146 | 146 | |
| 147 | - $this->loggerInstance->debug(4, "listProfiles: " . /** @scrutinizer ignore-type */ print_r($returnarray, true)); |
|
| 147 | + $this->loggerInstance->debug(4, "listProfiles: "./** @scrutinizer ignore-type */ print_r($returnarray, true)); |
|
| 148 | 148 | return $returnarray; |
| 149 | 149 | } |
| 150 | 150 | |
@@ -156,7 +156,7 @@ discard block |
||
| 156 | 156 | */ |
| 157 | 157 | public function listDeployments(bool $activeOnly = FALSE) |
| 158 | 158 | { |
| 159 | - $query = "SELECT deployment_id FROM deployment WHERE inst_id = $this->identifier" . ($activeOnly ? " AND status = " . AbstractDeployment::ACTIVE : ""); |
|
| 159 | + $query = "SELECT deployment_id FROM deployment WHERE inst_id = $this->identifier".($activeOnly ? " AND status = ".AbstractDeployment::ACTIVE : ""); |
|
| 160 | 160 | $allDeployments = $this->databaseHandle->exec($query); |
| 161 | 161 | $returnarray = []; |
| 162 | 162 | // SELECT -> resource, not boolean |
@@ -164,7 +164,7 @@ discard block |
||
| 164 | 164 | $returnarray[] = new DeploymentManaged($this, $deploymentQuery->deployment_id); |
| 165 | 165 | } |
| 166 | 166 | |
| 167 | - $this->loggerInstance->debug(4, "listDeployments: " . /** @scrutinizer ignore-type */ print_r($returnarray, true)); |
|
| 167 | + $this->loggerInstance->debug(4, "listDeployments: "./** @scrutinizer ignore-type */ print_r($returnarray, true)); |
|
| 168 | 168 | return $returnarray; |
| 169 | 169 | } |
| 170 | 170 | |
@@ -197,7 +197,7 @@ discard block |
||
| 197 | 197 | $allProfiles = $this->databaseHandle->exec("SELECT MIN(openroaming) AS maxlevel FROM profile WHERE inst_id = $this->identifier"); |
| 198 | 198 | // SELECT yields a resource, not a boolean |
| 199 | 199 | while ($res = mysqli_fetch_object(/** @scrutinizer ignore-type */ $allProfiles)) { |
| 200 | - return (is_numeric($res->maxlevel) ? (int)$res->maxlevel : AbstractProfile::OVERALL_OPENROAMING_LEVEL_NO ); // insts without profiles should get a "NO" |
|
| 200 | + return (is_numeric($res->maxlevel) ? (int) $res->maxlevel : AbstractProfile::OVERALL_OPENROAMING_LEVEL_NO); // insts without profiles should get a "NO" |
|
| 201 | 201 | } |
| 202 | 202 | return AbstractProfile::OVERALL_OPENROAMING_LEVEL_NO; |
| 203 | 203 | } |
@@ -331,7 +331,7 @@ discard block |
||
| 331 | 331 | case AbstractProfile::PROFILETYPE_SILVERBULLET: |
| 332 | 332 | $theProfile = new ProfileSilverbullet($identifier, $this); |
| 333 | 333 | $theProfile->addSupportedEapMethod(new \core\common\EAP(\core\common\EAP::EAPTYPE_SILVERBULLET), 1); |
| 334 | - $theProfile->setRealm($this->identifier . "-" . $theProfile->identifier . "." . strtolower($this->federation) . strtolower(\config\ConfAssistant::SILVERBULLET['realm_suffix'])); |
|
| 334 | + $theProfile->setRealm($this->identifier."-".$theProfile->identifier.".".strtolower($this->federation).strtolower(\config\ConfAssistant::SILVERBULLET['realm_suffix'])); |
|
| 335 | 335 | return $theProfile; |
| 336 | 336 | default: |
| 337 | 337 | throw new Exception("This type of profile is unknown and can not be added."); |
@@ -474,7 +474,7 @@ discard block |
||
| 474 | 474 | public function getExternalDBId() |
| 475 | 475 | { |
| 476 | 476 | if (\config\ConfAssistant::CONSORTIUM['name'] == "eduroam" && isset(\config\ConfAssistant::CONSORTIUM['deployment-voodoo']) && \config\ConfAssistant::CONSORTIUM['deployment-voodoo'] == "Operations Team") { // SW: APPROVED |
| 477 | - $idQuery = $this->databaseHandle->exec("SELECT external_db_id FROM institution WHERE inst_id = $this->identifier AND external_db_syncstate = " . self::EXTERNAL_DB_SYNCSTATE_SYNCED); |
|
| 477 | + $idQuery = $this->databaseHandle->exec("SELECT external_db_id FROM institution WHERE inst_id = $this->identifier AND external_db_syncstate = ".self::EXTERNAL_DB_SYNCSTATE_SYNCED); |
|
| 478 | 478 | // SELECT -> it's a resource, not a boolean |
| 479 | 479 | if (mysqli_num_rows(/** @scrutinizer ignore-type */ $idQuery) == 0) { |
| 480 | 480 | return FALSE; |
@@ -540,16 +540,16 @@ discard block |
||
| 540 | 540 | } |
| 541 | 541 | foreach ($baseline as $lang => $value) { |
| 542 | 542 | if (!key_exists($lang, $newvalues)) { |
| 543 | - $retval[IdP::INSTNAME_CHANGED] .= "#[Language " . strtoupper($lang) . "] DELETED"; |
|
| 543 | + $retval[IdP::INSTNAME_CHANGED] .= "#[Language ".strtoupper($lang)."] DELETED"; |
|
| 544 | 544 | } else { |
| 545 | 545 | if ($value != $newvalues[$lang]) { |
| 546 | - $retval[IdP::INSTNAME_CHANGED] .= "#[Language " . strtoupper($lang) . "] CHANGED from '" . $baseline[$lang] . "' to '" . $newvalues[$lang] . "'"; |
|
| 546 | + $retval[IdP::INSTNAME_CHANGED] .= "#[Language ".strtoupper($lang)."] CHANGED from '".$baseline[$lang]."' to '".$newvalues[$lang]."'"; |
|
| 547 | 547 | } |
| 548 | 548 | } |
| 549 | 549 | } |
| 550 | 550 | foreach ($newvalues as $lang => $value) { |
| 551 | 551 | if (!key_exists($lang, $baseline)) { |
| 552 | - $retval[IdP::INSTNAME_CHANGED] .= "#[Language " . strtoupper($lang) . "] ADDED as '" . $value . "'"; |
|
| 552 | + $retval[IdP::INSTNAME_CHANGED] .= "#[Language ".strtoupper($lang)."] ADDED as '".$value."'"; |
|
| 553 | 553 | } |
| 554 | 554 | } |
| 555 | 555 | return $retval; |
@@ -93,7 +93,7 @@ discard block |
||
| 93 | 93 | if ($cert['full_details']['type'] == 'server') { |
| 94 | 94 | $reason = _("%s - server certificate (<a href='%s'>more info</a>)"); |
| 95 | 95 | $fail = true; |
| 96 | - } elseif($cert['basicconstraints_set'] === 0) { |
|
| 96 | + } elseif ($cert['basicconstraints_set'] === 0) { |
|
| 97 | 97 | $reason = _("%s - missing required CA extensions (<a href='%s'>more info</a>)"); |
| 98 | 98 | $fail = true; |
| 99 | 99 | } |
@@ -122,7 +122,7 @@ discard block |
||
| 122 | 122 | $optionClass = \core\Options::instance(); |
| 123 | 123 | $optionProps = $optionClass->optionType($optiontype); |
| 124 | 124 | $allowedValues = explode(',', substr($optionProps["flags"], 7)); |
| 125 | - if (in_array($incomingBinary,$allowedValues)) { |
|
| 125 | + if (in_array($incomingBinary, $allowedValues)) { |
|
| 126 | 126 | return ['result'=>TRUE, 'details'=>'']; |
| 127 | 127 | } |
| 128 | 128 | return ['result'=>FALSE, 'details'=>'']; |
@@ -368,14 +368,14 @@ discard block |
||
| 368 | 368 | case \core\Options::TYPECODE_TEXT: |
| 369 | 369 | case \core\Options::TYPECODE_COORDINATES: |
| 370 | 370 | case \core\Options::TYPECODE_INTEGER: |
| 371 | - $varName = $listOfEntries["$objId-" . self::VALIDATOR_FUNCTIONS[$optioninfo['type']]['field']]; |
|
| 371 | + $varName = $listOfEntries["$objId-".self::VALIDATOR_FUNCTIONS[$optioninfo['type']]['field']]; |
|
| 372 | 372 | if (!empty($varName)) { |
| 373 | 373 | $content = call_user_func_array([$this->validator, self::VALIDATOR_FUNCTIONS[$optioninfo['type']]['function']], array_merge([$varName], self::VALIDATOR_FUNCTIONS[$optioninfo['type']]['extraarg'])); |
| 374 | 374 | break; |
| 375 | 375 | } |
| 376 | 376 | continue 2; |
| 377 | 377 | case \core\Options::TYPECODE_BOOLEAN: |
| 378 | - $varName = $listOfEntries["$objId-" . \core\Options::TYPECODE_BOOLEAN]; |
|
| 378 | + $varName = $listOfEntries["$objId-".\core\Options::TYPECODE_BOOLEAN]; |
|
| 379 | 379 | if (!empty($varName)) { |
| 380 | 380 | $contentValid = $this->validator->boolean($varName); |
| 381 | 381 | if ($contentValid) { |
@@ -388,7 +388,7 @@ discard block |
||
| 388 | 388 | } |
| 389 | 389 | continue 2; |
| 390 | 390 | case \core\Options::TYPECODE_STRING: |
| 391 | - $previsionalContent = $listOfEntries["$objId-" . \core\Options::TYPECODE_STRING]; |
|
| 391 | + $previsionalContent = $listOfEntries["$objId-".\core\Options::TYPECODE_STRING]; |
|
| 392 | 392 | if (!empty(trim($previsionalContent))) { |
| 393 | 393 | $content = $this->furtherStringChecks($objValue, $previsionalContent, $bad); |
| 394 | 394 | if ($content === FALSE) { |
@@ -399,7 +399,7 @@ discard block |
||
| 399 | 399 | continue 2; |
| 400 | 400 | |
| 401 | 401 | case \core\Options::TYPECODE_ENUM_OPENROAMING: |
| 402 | - $previsionalContent = $listOfEntries["$objId-" . \core\Options::TYPECODE_ENUM_OPENROAMING]; |
|
| 402 | + $previsionalContent = $listOfEntries["$objId-".\core\Options::TYPECODE_ENUM_OPENROAMING]; |
|
| 403 | 403 | if (!empty($previsionalContent)) { |
| 404 | 404 | $content = $this->furtherStringChecks($objValue, $previsionalContent, $bad); |
| 405 | 405 | if ($content === FALSE) { |
@@ -410,15 +410,15 @@ discard block |
||
| 410 | 410 | continue 2; |
| 411 | 411 | case \core\Options::TYPECODE_FILE: |
| 412 | 412 | // this is either actually an uploaded file, or a reference to a DB entry of a previously uploaded file |
| 413 | - $reference = $listOfEntries["$objId-" . \core\Options::TYPECODE_STRING]; |
|
| 413 | + $reference = $listOfEntries["$objId-".\core\Options::TYPECODE_STRING]; |
|
| 414 | 414 | if (!empty($reference)) { // was already in, by ROWID reference, extract |
| 415 | 415 | // ROWID means it's a multi-line string (simple strings are inline in the form; so allow whitespace) |
| 416 | 416 | $content = $this->validator->string(urldecode($reference), TRUE); |
| 417 | 417 | break; |
| 418 | 418 | } |
| 419 | - $fileName = $listOfEntries["$objId-" . \core\Options::TYPECODE_FILE] ?? ""; |
|
| 419 | + $fileName = $listOfEntries["$objId-".\core\Options::TYPECODE_FILE] ?? ""; |
|
| 420 | 420 | if ($fileName != "") { // let's do the download |
| 421 | - $rawContent = \core\common\OutsideComm::downloadFile("file:///" . $fileName); |
|
| 421 | + $rawContent = \core\common\OutsideComm::downloadFile("file:///".$fileName); |
|
| 422 | 422 | $sanity = $this->checkUploadSanity($objValue, $rawContent); |
| 423 | 423 | if ($rawContent === FALSE || !$sanity['result']) { |
| 424 | 424 | $bad[] = ['type'=>$objValue, 'details'=>$sanity['details']]; |
@@ -429,7 +429,7 @@ discard block |
||
| 429 | 429 | } |
| 430 | 430 | continue 2; |
| 431 | 431 | default: |
| 432 | - throw new Exception("Internal Error: Unknown option type " . $objValue . "!"); |
|
| 432 | + throw new Exception("Internal Error: Unknown option type ".$objValue."!"); |
|
| 433 | 433 | } |
| 434 | 434 | // lang can be NULL here, if it's not a multilang attribute, or a ROWID reference. Never mind that. |
| 435 | 435 | $retval[] = ["$objValue" => ["lang" => $languageFlag, "content" => $content]]; |
@@ -27,9 +27,9 @@ discard block |
||
| 27 | 27 | #private const EDUPKI_ENDPOINT_PUBLIC = "https://pki.edupki.org/edupki-ca/cgi-bin/pub/soap?wsdl=1"; |
| 28 | 28 | #private const EDUPKI_ENDPOINT_RA = "https://ra.edupki.org/edupki-ca/cgi-bin/ra/soap?wsdl=1"; |
| 29 | 29 | |
| 30 | - private const LOCATION_RA_CERT = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
| 31 | - private const LOCATION_RA_KEY = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
| 32 | - private const LOCATION_WEBROOT = ROOT . "/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
| 30 | + private const LOCATION_RA_CERT = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
| 31 | + private const LOCATION_RA_KEY = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
| 32 | + private const LOCATION_WEBROOT = ROOT."/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
| 33 | 33 | private const EDUPKI_RA_ID = 700; |
| 34 | 34 | private const EDUPKI_CERT_PROFILE_BOTH = "Radius Server SOAP"; |
| 35 | 35 | private const EDUPKI_CERT_PROFILE_IDP = "Radius Server SOAP"; |
@@ -49,13 +49,13 @@ discard block |
||
| 49 | 49 | parent::__construct(); |
| 50 | 50 | |
| 51 | 51 | if (stat(CertificationAuthorityEduPkiServer::LOCATION_RA_CERT) === FALSE) { |
| 52 | - throw new Exception("RA operator PEM file not found: " . CertificationAuthorityEduPkiServer::LOCATION_RA_CERT); |
|
| 52 | + throw new Exception("RA operator PEM file not found: ".CertificationAuthorityEduPkiServer::LOCATION_RA_CERT); |
|
| 53 | 53 | } |
| 54 | 54 | if (stat(CertificationAuthorityEduPkiServer::LOCATION_RA_KEY) === FALSE) { |
| 55 | - throw new Exception("RA operator private key file not found: " . CertificationAuthorityEduPkiServer::LOCATION_RA_KEY); |
|
| 55 | + throw new Exception("RA operator private key file not found: ".CertificationAuthorityEduPkiServer::LOCATION_RA_KEY); |
|
| 56 | 56 | } |
| 57 | 57 | if (stat(CertificationAuthorityEduPkiServer::LOCATION_WEBROOT) === FALSE) { |
| 58 | - throw new Exception("CA website root CA file not found: " . CertificationAuthorityEduPkiServer::LOCATION_WEBROOT); |
|
| 58 | + throw new Exception("CA website root CA file not found: ".CertificationAuthorityEduPkiServer::LOCATION_WEBROOT); |
|
| 59 | 59 | } |
| 60 | 60 | } |
| 61 | 61 | |
@@ -122,22 +122,22 @@ discard block |
||
| 122 | 122 | throw new Exception("Unexpected policies requested."); |
| 123 | 123 | } |
| 124 | 124 | $altArray = [# Array mit den Subject Alternative Names |
| 125 | - "email:" . $csr["USERMAIL"] |
|
| 125 | + "email:".$csr["USERMAIL"] |
|
| 126 | 126 | ]; |
| 127 | 127 | foreach ($csr["ALTNAMES"] as $oneAltName) { |
| 128 | - $altArray[] = "DNS:" . $oneAltName; |
|
| 128 | + $altArray[] = "DNS:".$oneAltName; |
|
| 129 | 129 | } |
| 130 | 130 | $soapPub = $this->initEduPKISoapSession("PUBLIC"); |
| 131 | 131 | $this->loggerInstance->debug(5, "FIRST ACTUAL SOAP REQUEST (Public, newRequest)!\n"); |
| 132 | - $this->loggerInstance->debug(5, "PARAM_1: " . CertificationAuthorityEduPkiServer::EDUPKI_RA_ID . "\n"); |
|
| 133 | - $this->loggerInstance->debug(5, "PARAM_2: " . $csr["CSR_STRING"] . "\n"); |
|
| 132 | + $this->loggerInstance->debug(5, "PARAM_1: ".CertificationAuthorityEduPkiServer::EDUPKI_RA_ID."\n"); |
|
| 133 | + $this->loggerInstance->debug(5, "PARAM_2: ".$csr["CSR_STRING"]."\n"); |
|
| 134 | 134 | $this->loggerInstance->debug(5, "PARAM_3: "); |
| 135 | 135 | $this->loggerInstance->debug(5, $altArray); |
| 136 | - $this->loggerInstance->debug(5, "PARAM_4: " . $profile . "\n"); |
|
| 137 | - $this->loggerInstance->debug(5, "PARAM_5: " . sha1("notused") . "\n"); |
|
| 138 | - $this->loggerInstance->debug(5, "PARAM_6: " . $csr["USERNAME"] . "\n"); |
|
| 139 | - $this->loggerInstance->debug(5, "PARAM_7: " . $csr["USERMAIL"] . "\n"); |
|
| 140 | - $this->loggerInstance->debug(5, "PARAM_8: " . ProfileSilverbullet::PRODUCTNAME . "\n"); |
|
| 136 | + $this->loggerInstance->debug(5, "PARAM_4: ".$profile."\n"); |
|
| 137 | + $this->loggerInstance->debug(5, "PARAM_5: ".sha1("notused")."\n"); |
|
| 138 | + $this->loggerInstance->debug(5, "PARAM_6: ".$csr["USERNAME"]."\n"); |
|
| 139 | + $this->loggerInstance->debug(5, "PARAM_7: ".$csr["USERMAIL"]."\n"); |
|
| 140 | + $this->loggerInstance->debug(5, "PARAM_8: ".ProfileSilverbullet::PRODUCTNAME."\n"); |
|
| 141 | 141 | $this->loggerInstance->debug(5, "PARAM_9: false\n"); |
| 142 | 142 | $soapNewRequest = $soapPub->newRequest( |
| 143 | 143 | CertificationAuthorityEduPkiServer::EDUPKI_RA_ID, # RA-ID |
@@ -159,11 +159,11 @@ discard block |
||
| 159 | 159 | } catch (Exception $e) { |
| 160 | 160 | // PHP 7.1 can do this much better |
| 161 | 161 | if (is_soap_fault($e)) { |
| 162 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: { |
|
| 162 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: { |
|
| 163 | 163 | $e->faultstring |
| 164 | 164 | }\n"); |
| 165 | 165 | } |
| 166 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
| 166 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
| 167 | 167 | } |
| 168 | 168 | try { |
| 169 | 169 | $soap = $this->initEduPKISoapSession("RA"); |
@@ -195,7 +195,7 @@ discard block |
||
| 195 | 195 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
| 196 | 196 | // rather than just using the string. Grr. |
| 197 | 197 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
| 198 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapCleartext); |
|
| 198 | + file_put_contents($tempdir['dir']."/content.txt", $soapCleartext); |
|
| 199 | 199 | // retrieve our RA cert from filesystem |
| 200 | 200 | // the RA certificates are not needed right now because we |
| 201 | 201 | // have resorted to S/MIME signatures with openssl command-line |
@@ -207,7 +207,7 @@ discard block |
||
| 207 | 207 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
| 208 | 208 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
| 209 | 209 | $this->loggerInstance->debug(2, "Actual content to be signed is this:\n $soapCleartext\n"); |
| 210 | - $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPkiServer::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPkiServer::LOCATION_RA_CERT; |
|
| 210 | + $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPkiServer::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPkiServer::LOCATION_RA_CERT; |
|
| 211 | 211 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
| 212 | 212 | $output = []; |
| 213 | 213 | $return = 999; |
@@ -216,21 +216,21 @@ discard block |
||
| 216 | 216 | throw new Exception("Non-zero return value from openssl smime!"); |
| 217 | 217 | } |
| 218 | 218 | // and get the signature blob back from the filesystem |
| 219 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
| 219 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
| 220 | 220 | $this->loggerInstance->debug(5, "Request for server approveRequest has parameters:\n"); |
| 221 | - $this->loggerInstance->debug(5, $soapReqnum . "\n"); |
|
| 222 | - $this->loggerInstance->debug(5, $soapCleartext . "\n"); // PHP magically encodes this as base64 while sending! |
|
| 223 | - $this->loggerInstance->debug(5, $detachedSig . "\n"); |
|
| 221 | + $this->loggerInstance->debug(5, $soapReqnum."\n"); |
|
| 222 | + $this->loggerInstance->debug(5, $soapCleartext."\n"); // PHP magically encodes this as base64 while sending! |
|
| 223 | + $this->loggerInstance->debug(5, $detachedSig."\n"); |
|
| 224 | 224 | $soapIssueCert = $soap->approveRequest($soapReqnum, $soapCleartext, $detachedSig); |
| 225 | - $this->loggerInstance->debug(5, "approveRequest Request was: \n" . $soap->__getLastRequest()); |
|
| 226 | - $this->loggerInstance->debug(5, "approveRequest Response was: \n" . $soap->__getLastResponse()); |
|
| 225 | + $this->loggerInstance->debug(5, "approveRequest Request was: \n".$soap->__getLastRequest()); |
|
| 226 | + $this->loggerInstance->debug(5, "approveRequest Response was: \n".$soap->__getLastResponse()); |
|
| 227 | 227 | if ($soapIssueCert === FALSE) { |
| 228 | 228 | throw new Exception("The locally approved request was NOT processed by the CA."); |
| 229 | 229 | } |
| 230 | 230 | } catch (SoapFault $e) { |
| 231 | - throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
| 231 | + throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
| 232 | 232 | } catch (Exception $e) { |
| 233 | - throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage()); |
|
| 233 | + throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage()); |
|
| 234 | 234 | } |
| 235 | 235 | return $soapReqnum; |
| 236 | 236 | } |
@@ -282,9 +282,9 @@ discard block |
||
| 282 | 282 | throw new Exception("CAInfo has no root certificate for us!"); |
| 283 | 283 | } |
| 284 | 284 | } catch (SoapFault $e) { |
| 285 | - throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
| 285 | + throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
| 286 | 286 | } catch (Exception $e) { |
| 287 | - throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage()); |
|
| 287 | + throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage()); |
|
| 288 | 288 | } |
| 289 | 289 | return [ |
| 290 | 290 | "CERT" => openssl_x509_read($parsedCert['pem']), |
@@ -317,12 +317,12 @@ discard block |
||
| 317 | 317 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
| 318 | 318 | // rather than just using the string. Grr. |
| 319 | 319 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
| 320 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapRawRevRequest); |
|
| 320 | + file_put_contents($tempdir['dir']."/content.txt", $soapRawRevRequest); |
|
| 321 | 321 | // retrieve our RA cert from filesystem |
| 322 | 322 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
| 323 | 323 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
| 324 | 324 | $this->loggerInstance->debug(5, "Actual content to be signed is this:\n$soapRawRevRequest\n"); |
| 325 | - $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPkiServer::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPkiServer::LOCATION_RA_CERT; |
|
| 325 | + $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPkiServer::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPkiServer::LOCATION_RA_CERT; |
|
| 326 | 326 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
| 327 | 327 | $output = []; |
| 328 | 328 | $return = 999; |
@@ -331,7 +331,7 @@ discard block |
||
| 331 | 331 | throw new Exception("Non-zero return value from openssl smime!"); |
| 332 | 332 | } |
| 333 | 333 | // and get the signature blob back from the filesystem |
| 334 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
| 334 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
| 335 | 335 | $soapIssueRev = $soap->approveRevocationRequest($soapRevocationSerial, $soapRawRevRequest, $detachedSig); |
| 336 | 336 | if ($soapIssueRev === FALSE) { |
| 337 | 337 | throw new Exception("The locally approved revocation request was NOT processed by the CA."); |
@@ -339,9 +339,9 @@ discard block |
||
| 339 | 339 | } catch (Exception $e) { |
| 340 | 340 | // PHP 7.1 can do this much better |
| 341 | 341 | if (is_soap_fault($e)) { |
| 342 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: {$e->faultstring}\n"); |
|
| 342 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: {$e->faultstring}\n"); |
|
| 343 | 343 | } |
| 344 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
| 344 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
| 345 | 345 | } |
| 346 | 346 | } |
| 347 | 347 | |
@@ -441,9 +441,9 @@ discard block |
||
| 441 | 441 | */ |
| 442 | 442 | public function soapToXmlInteger($x) |
| 443 | 443 | { |
| 444 | - return '<' . $x[0] . '>' |
|
| 444 | + return '<'.$x[0].'>' |
|
| 445 | 445 | . htmlentities($x[1], ENT_NOQUOTES | ENT_XML1) |
| 446 | - . '</' . $x[0] . '>'; |
|
| 446 | + . '</'.$x[0].'>'; |
|
| 447 | 447 | } |
| 448 | 448 | |
| 449 | 449 | /** |
@@ -462,9 +462,9 @@ discard block |
||
| 462 | 462 | // dump private key into directory |
| 463 | 463 | $outstring = ""; |
| 464 | 464 | openssl_pkey_export($privateKey, $outstring); |
| 465 | - file_put_contents($tempdir . "/pkey.pem", $outstring); |
|
| 465 | + file_put_contents($tempdir."/pkey.pem", $outstring); |
|
| 466 | 466 | // PHP can only do one DC in the Subject. But we need three. |
| 467 | - $execCmd = \config\Master::PATHS['openssl'] . " req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$fed/CN=$username/emailAddress=$username"; |
|
| 467 | + $execCmd = \config\Master::PATHS['openssl']." req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$fed/CN=$username/emailAddress=$username"; |
|
| 468 | 468 | $this->loggerInstance->debug(2, "Calling openssl req with following cmdline: $execCmd\n"); |
| 469 | 469 | $output = []; |
| 470 | 470 | $return = 999; |
@@ -110,7 +110,7 @@ discard block |
||
| 110 | 110 | public function __construct() |
| 111 | 111 | { |
| 112 | 112 | $this->loggerInstance = new Logging(); |
| 113 | - $this->loggerInstance->debug(4, "--- BEGIN constructing class " . get_class($this) . " .\n"); |
|
| 113 | + $this->loggerInstance->debug(4, "--- BEGIN constructing class ".get_class($this)." .\n"); |
|
| 114 | 114 | $this->languageInstance = new Language(); |
| 115 | 115 | Entity::intoThePotatoes("core"); |
| 116 | 116 | // some config elements are displayable. We need some dummies to |
@@ -129,13 +129,13 @@ discard block |
||
| 129 | 129 | $dummy_organisation2a = _("organization"); |
| 130 | 130 | $dummy_organisation3 = _("entity"); |
| 131 | 131 | // and do something useless with the strings so that there's no "unused" complaint |
| 132 | - if (strlen($dummy_NRO . $dummy_idp1 . $dummy_idp2 . $dummy_idp3 . $dummy_hotspot1 . $dummy_hotspot2 . $dummy_hotspot3 . $dummy_organisation1 . $dummy_organisation2 . $dummy_organisation2a . $dummy_organisation3) < 0) { |
|
| 132 | + if (strlen($dummy_NRO.$dummy_idp1.$dummy_idp2.$dummy_idp3.$dummy_hotspot1.$dummy_hotspot2.$dummy_hotspot3.$dummy_organisation1.$dummy_organisation2.$dummy_organisation2a.$dummy_organisation3) < 0) { |
|
| 133 | 133 | throw new Exception("Strings are usually not shorter than 0 characters. We've encountered a string blackhole."); |
| 134 | 134 | } |
| 135 | - $xyzVariableFed = \config\ConfAssistant::CONSORTIUM['nomenclature_federation'] . ""; |
|
| 136 | - $xyzVariableIdP = \config\ConfAssistant::CONSORTIUM['nomenclature_idp'] . ""; |
|
| 137 | - $xyzVariableHotspot = \config\ConfAssistant::CONSORTIUM['nomenclature_hotspot'] . ""; |
|
| 138 | - $xyzVariableParticipant = \config\ConfAssistant::CONSORTIUM['nomenclature_participant'] . ""; |
|
| 135 | + $xyzVariableFed = \config\ConfAssistant::CONSORTIUM['nomenclature_federation'].""; |
|
| 136 | + $xyzVariableIdP = \config\ConfAssistant::CONSORTIUM['nomenclature_idp'].""; |
|
| 137 | + $xyzVariableHotspot = \config\ConfAssistant::CONSORTIUM['nomenclature_hotspot'].""; |
|
| 138 | + $xyzVariableParticipant = \config\ConfAssistant::CONSORTIUM['nomenclature_participant'].""; |
|
| 139 | 139 | Entity::$nomenclature_fed = _($xyzVariableFed); |
| 140 | 140 | Entity::$nomenclature_idp = _($xyzVariableIdP); |
| 141 | 141 | Entity::$nomenclature_hotspot = _($xyzVariableHotspot); |
@@ -151,7 +151,7 @@ discard block |
||
| 151 | 151 | */ |
| 152 | 152 | public function __destruct() |
| 153 | 153 | { |
| 154 | - (new Logging())->debug(5, "--- KILL Destructing class " . get_class($this) . " .\n"); |
|
| 154 | + (new Logging())->debug(5, "--- KILL Destructing class ".get_class($this)." .\n"); |
|
| 155 | 155 | } |
| 156 | 156 | |
| 157 | 157 | /** |
@@ -184,7 +184,7 @@ discard block |
||
| 184 | 184 | public static function createTemporaryDirectory($purpose = 'installer', $failIsFatal = 1) |
| 185 | 185 | { |
| 186 | 186 | $loggerInstance = new Logging(); |
| 187 | - $name = md5(time() . rand()); |
|
| 187 | + $name = md5(time().rand()); |
|
| 188 | 188 | $path = ROOT; |
| 189 | 189 | switch ($purpose) { |
| 190 | 190 | case 'silverbullet': |
@@ -202,7 +202,7 @@ discard block |
||
| 202 | 202 | default: |
| 203 | 203 | throw new Exception("unable to create temporary directory due to unknown purpose: $purpose\n"); |
| 204 | 204 | } |
| 205 | - $tmpDir = $path . '/' . $name; |
|
| 205 | + $tmpDir = $path.'/'.$name; |
|
| 206 | 206 | $loggerInstance->debug(4, "temp dir: $purpose : $tmpDir\n"); |
| 207 | 207 | if (!mkdir($tmpDir, 0700, true)) { |
| 208 | 208 | if ($failIsFatal) { |
@@ -223,7 +223,7 @@ discard block |
||
| 223 | 223 | */ |
| 224 | 224 | public static function rrmdir($dir) |
| 225 | 225 | { |
| 226 | - foreach (glob($dir . '/*') as $file) { |
|
| 226 | + foreach (glob($dir.'/*') as $file) { |
|
| 227 | 227 | if (is_dir($file)) { |
| 228 | 228 | Entity::rrmdir($file); |
| 229 | 229 | } else { |
@@ -249,12 +249,12 @@ discard block |
||
| 249 | 249 | } |
| 250 | 250 | // these substr() are guaranteed to yield actual string data, as the |
| 251 | 251 | // base string is an MD5 hash - has sufficient length |
| 252 | - $uuid = /** @scrutinizer ignore-type */ substr($chars, 0, 8) . '-'; |
|
| 253 | - $uuid .= /** @scrutinizer ignore-type */ substr($chars, 8, 4) . '-'; |
|
| 254 | - $uuid .= /** @scrutinizer ignore-type */ substr($chars, 12, 4) . '-'; |
|
| 255 | - $uuid .= /** @scrutinizer ignore-type */ substr($chars, 16, 4) . '-'; |
|
| 252 | + $uuid = /** @scrutinizer ignore-type */ substr($chars, 0, 8).'-'; |
|
| 253 | + $uuid .= /** @scrutinizer ignore-type */ substr($chars, 8, 4).'-'; |
|
| 254 | + $uuid .= /** @scrutinizer ignore-type */ substr($chars, 12, 4).'-'; |
|
| 255 | + $uuid .= /** @scrutinizer ignore-type */ substr($chars, 16, 4).'-'; |
|
| 256 | 256 | $uuid .= /** @scrutinizer ignore-type */ substr($chars, 20, 12); |
| 257 | - return $prefix . $uuid; |
|
| 257 | + return $prefix.$uuid; |
|
| 258 | 258 | } |
| 259 | 259 | |
| 260 | 260 | /** |
@@ -295,7 +295,7 @@ discard block |
||
| 295 | 295 | for ($i = count($trace); $i--; $i > 0) { |
| 296 | 296 | if (isset($trace[$i - 1]['class']) && preg_match('/Entity/', $trace[$i - 1]['class'])) { |
| 297 | 297 | if ($showTrace) { |
| 298 | - echo "FOUND caller: " . /** @scrutinizer ignore-type */ print_r($trace[$i], true) . " - class is " . $trace[$i]['class']; |
|
| 298 | + echo "FOUND caller: "./** @scrutinizer ignore-type */ print_r($trace[$i], true)." - class is ".$trace[$i]['class']; |
|
| 299 | 299 | } |
| 300 | 300 | $caller = $trace[$i]; |
| 301 | 301 | break; |
@@ -305,8 +305,8 @@ discard block |
||
| 305 | 305 | // otherwise, on the filename relative to ROOT |
| 306 | 306 | $myName = $caller['class'] ?? substr($caller['file'], strlen(ROOT)); |
| 307 | 307 | if ($showTrace === TRUE) { |
| 308 | - echo "<pre>" . /** @scrutinizer ignore-type */ print_r($trace, true) . "</pre>"; |
|
| 309 | - echo "CLASS = " . $myName . "<br/>"; |
|
| 308 | + echo "<pre>"./** @scrutinizer ignore-type */ print_r($trace, true)."</pre>"; |
|
| 309 | + echo "CLASS = ".$myName."<br/>"; |
|
| 310 | 310 | } |
| 311 | 311 | if (preg_match("/diag/", $myName) == 1) { |
| 312 | 312 | $ret = "diagnostics"; |
@@ -340,11 +340,11 @@ discard block |
||
| 340 | 340 | if ($catalogue === NULL) { |
| 341 | 341 | $theCatalogue = Entity::determineOwnCatalogue($trace); |
| 342 | 342 | textdomain($theCatalogue); |
| 343 | - bindtextdomain($theCatalogue, ROOT . "/translation/"); |
|
| 343 | + bindtextdomain($theCatalogue, ROOT."/translation/"); |
|
| 344 | 344 | bind_textdomain_codeset($theCatalogue, "UTF-8"); |
| 345 | 345 | } else { |
| 346 | 346 | textdomain($catalogue); |
| 347 | - bindtextdomain($catalogue, ROOT . "/translation/"); |
|
| 347 | + bindtextdomain($catalogue, ROOT."/translation/"); |
|
| 348 | 348 | bind_textdomain_codeset($catalogue, "UTF-8"); |
| 349 | 349 | } |
| 350 | 350 | } |
@@ -105,9 +105,9 @@ discard block |
||
| 105 | 105 | |
| 106 | 106 | $attributesLowLevel = array_merge($this->deviceLevelAttributes, $this->eapLevelAttributes); |
| 107 | 107 | |
| 108 | - $this->loggerInstance->debug(5, "Device-Level Attributes: " . /** @scrutinizer ignore-type */ print_r($this->deviceLevelAttributes, true)); |
|
| 109 | - $this->loggerInstance->debug(5, "EAP-Level Attributes: " . /** @scrutinizer ignore-type */ print_r($this->eapLevelAttributes, true)); |
|
| 110 | - $this->loggerInstance->debug(5, "All low-Level Attributes: " . /** @scrutinizer ignore-type */ print_r($attributesLowLevel, true)); |
|
| 108 | + $this->loggerInstance->debug(5, "Device-Level Attributes: "./** @scrutinizer ignore-type */ print_r($this->deviceLevelAttributes, true)); |
|
| 109 | + $this->loggerInstance->debug(5, "EAP-Level Attributes: "./** @scrutinizer ignore-type */ print_r($this->eapLevelAttributes, true)); |
|
| 110 | + $this->loggerInstance->debug(5, "All low-Level Attributes: "./** @scrutinizer ignore-type */ print_r($attributesLowLevel, true)); |
|
| 111 | 111 | |
| 112 | 112 | // now fetch and merge profile-level attributes if not already set on deeper level |
| 113 | 113 | |
@@ -137,7 +137,7 @@ discard block |
||
| 137 | 137 | } |
| 138 | 138 | } |
| 139 | 139 | |
| 140 | - $this->loggerInstance->debug(5, "Merged Attributes: " . /** @scrutinizer ignore-type */ print_r($attributesLowLevel, true)); |
|
| 140 | + $this->loggerInstance->debug(5, "Merged Attributes: "./** @scrutinizer ignore-type */ print_r($attributesLowLevel, true)); |
|
| 141 | 141 | |
| 142 | 142 | // now, fetch and merge IdP-wide attributes |
| 143 | 143 | |
@@ -152,7 +152,7 @@ discard block |
||
| 152 | 152 | // add the internal attribute to that effect |
| 153 | 153 | |
| 154 | 154 | if (isset($this->attributes['media:openroaming_always'])) { |
| 155 | - $this->attributes = array_merge($this->attributes, $this->addInternalAttributes([ "internal:openroaming" => TRUE ] )); |
|
| 155 | + $this->attributes = array_merge($this->attributes, $this->addInternalAttributes(["internal:openroaming" => TRUE])); |
|
| 156 | 156 | } |
| 157 | 157 | |
| 158 | 158 | $this->loggerInstance->debug(4, "--- END Constructing new Profile object ... ---\n"); |
@@ -200,7 +200,7 @@ discard block |
||
| 200 | 200 | "row_id" => $attributeQuery->row_id, |
| 201 | 201 | "flag" => $optinfo['flag'], |
| 202 | 202 | "device" => ($devicesOrEAPMethods == "DEVICES" ? $attributeQuery->deviceormethod : NULL), |
| 203 | - "eapmethod" => ($devicesOrEAPMethods == "DEVICES" ? 0 : (new \core\common\EAP($attributeQuery->deviceormethod))->getArrayRep() )]; |
|
| 203 | + "eapmethod" => ($devicesOrEAPMethods == "DEVICES" ? 0 : (new \core\common\EAP($attributeQuery->deviceormethod))->getArrayRep())]; |
|
| 204 | 204 | } |
| 205 | 205 | return $temparray; |
| 206 | 206 | } |
@@ -309,7 +309,7 @@ discard block |
||
| 309 | 309 | */ |
| 310 | 310 | public function setAnonymousIDSupport($shallwe) |
| 311 | 311 | { |
| 312 | - $this->databaseHandle->exec("UPDATE profile SET use_anon_outer = " . ($shallwe === true ? "1" : "0") . " WHERE profile_id = $this->identifier"); |
|
| 312 | + $this->databaseHandle->exec("UPDATE profile SET use_anon_outer = ".($shallwe === true ? "1" : "0")." WHERE profile_id = $this->identifier"); |
|
| 313 | 313 | } |
| 314 | 314 | |
| 315 | 315 | /** Toggle special username for realm checks |
@@ -319,7 +319,7 @@ discard block |
||
| 319 | 319 | * @return void |
| 320 | 320 | */ |
| 321 | 321 | public function setRealmCheckUser($shallwe, $localpart = NULL) { |
| 322 | - $this->databaseHandle->exec("UPDATE profile SET checkuser_outer = " . ($shallwe === true ? "1" : "0") . " WHERE profile_id = $this->identifier"); |
|
| 322 | + $this->databaseHandle->exec("UPDATE profile SET checkuser_outer = ".($shallwe === true ? "1" : "0")." WHERE profile_id = $this->identifier"); |
|
| 323 | 323 | if ($localpart !== NULL) { |
| 324 | 324 | $this->databaseHandle->exec("UPDATE profile SET checkuser_value = ? WHERE profile_id = $this->identifier", "s", $localpart); |
| 325 | 325 | } |
@@ -334,8 +334,8 @@ discard block |
||
| 334 | 334 | */ |
| 335 | 335 | public function setInputVerificationPreference($verify, $hint) |
| 336 | 336 | { |
| 337 | - $this->databaseHandle->exec("UPDATE profile SET verify_userinput_suffix = " . ($verify === true ? "1" : "0") . |
|
| 338 | - ", hint_userinput_suffix = " . ($hint === true ? "1" : "0") . |
|
| 337 | + $this->databaseHandle->exec("UPDATE profile SET verify_userinput_suffix = ".($verify === true ? "1" : "0"). |
|
| 338 | + ", hint_userinput_suffix = ".($hint === true ? "1" : "0"). |
|
| 339 | 339 | " WHERE profile_id = $this->identifier"); |
| 340 | 340 | } |
| 341 | 341 | |
@@ -454,7 +454,7 @@ discard block |
||
| 454 | 454 | $result = $this->databaseHandle->exec($query); |
| 455 | 455 | $rows = $result->fetch_all(); |
| 456 | 456 | foreach ($rows as $row) { |
| 457 | - $activeProfiles[] = $row[0]; |
|
| 457 | + $activeProfiles[] = $row[0]; |
|
| 458 | 458 | } |
| 459 | 459 | $query = "SELECT institution.inst_id AS inst_id, profile.profile_id AS profile_id, profile_option.option_value AS cert FROM profile_option JOIN profile ON profile_option.profile_id=profile.profile_id JOIN institution ON profile.inst_id=institution.inst_id WHERE profile_option.option_name='eap:ca_file' and institution.country='".$this->tld."'"; |
| 460 | 460 | $result = $this->databaseHandle->exec($query); |
@@ -531,7 +531,7 @@ discard block |
||
| 531 | 531 | 'country' => strtoupper($idp->federation), |
| 532 | 532 | 'instance' => $idp, |
| 533 | 533 | 'realms' => $idpQuery->realms] |
| 534 | - ; |
|
| 534 | + ; |
|
| 535 | 535 | $returnarray[$idp->identifier] = $idpInfo; |
| 536 | 536 | } |
| 537 | 537 | if ($activeOnly != 0) { // we're only doing this once. |
@@ -304,7 +304,7 @@ discard block |
||
| 304 | 304 | // for now (no OpenRoaming client certs available) only run server-side tests |
| 305 | 305 | foreach ($listOfIPs as $oneIP) { |
| 306 | 306 | $connectionResult = $connectionTests->cApathCheck($oneIP); |
| 307 | - if ($connectionResult != \core\diag\AbstractTest::RETVAL_OK || ( isset($connectionTests->TLS_CA_checks_result['cert_oddity']) && count($connectionTests->TLS_CA_checks_result['cert_oddity']) > 0)) { |
|
| 307 | + if ($connectionResult != \core\diag\AbstractTest::RETVAL_OK || (isset($connectionTests->TLS_CA_checks_result['cert_oddity']) && count($connectionTests->TLS_CA_checks_result['cert_oddity']) > 0)) { |
|
| 308 | 308 | $allHostsOkay = FALSE; |
| 309 | 309 | } else { |
| 310 | 310 | $oneHostOkay = TRUE; |
@@ -913,7 +913,7 @@ discard block |
||
| 913 | 913 | $profileStatus = self::CERT_STATUS_OK; |
| 914 | 914 | foreach ($rows as $row) { |
| 915 | 915 | $encodedCert = $row[0]; |
| 916 | - $tm = $x509->processCertificate(base64_decode($encodedCert))['full_details']['validTo_time_t']- time(); |
|
| 916 | + $tm = $x509->processCertificate(base64_decode($encodedCert))['full_details']['validTo_time_t'] - time(); |
|
| 917 | 917 | if ($tm < \config\ConfAssistant::CERT_WARNINGS['expiry_critical']) { |
| 918 | 918 | $certStatus = self::CERT_STATUS_ERROR; |
| 919 | 919 | } elseif ($tm < \config\ConfAssistant::CERT_WARNINGS['expiry_warning']) { |
@@ -374,7 +374,7 @@ |
||
| 374 | 374 | throw new Exception("Unknown test requested: default case reached!"); |
| 375 | 375 | } |
| 376 | 376 | $returnarray['datetime'] = date("Y-m-d H:i:s"); |
| 377 | -if ($token!= '' && is_dir($jsonDir.'/'.$token)) { |
|
| 377 | +if ($token != '' && is_dir($jsonDir.'/'.$token)) { |
|
| 378 | 378 | @mkdir($jsonDir.'/'.$token, 0777, true); |
| 379 | 379 | } |
| 380 | 380 | $json_data = json_encode($returnarray); |
@@ -132,7 +132,7 @@ discard block |
||
| 132 | 132 | $expectedName = $addr['hostname']; |
| 133 | 133 | $protocols = []; |
| 134 | 134 | if (isset($addr['protocols'])) { |
| 135 | - foreach($addr['protocols'] as $protocol) { |
|
| 135 | + foreach ($addr['protocols'] as $protocol) { |
|
| 136 | 136 | if ($protocol['enabled']) { |
| 137 | 137 | $protocols[] = $protocol['type']; |
| 138 | 138 | } |
@@ -213,7 +213,7 @@ discard block |
||
| 213 | 213 | $json_data = json_encode($returnArray); |
| 214 | 214 | |
| 215 | 215 | if ($token) { |
| 216 | - $loggerInstance->debug(4, 'JSON data written to ' .$jsonDir.'/'.$token); |
|
| 216 | + $loggerInstance->debug(4, 'JSON data written to '.$jsonDir.'/'.$token); |
|
| 217 | 217 | file_put_contents($jsonDir.'/'.$token.'/realm', $json_data); |
| 218 | 218 | } |
| 219 | 219 | echo($json_data); |