@@ -17,9 +17,9 @@ discard block |
||
17 | 17 | class CertificationAuthorityEduPki extends EntityWithDBProperties implements CertificationAuthorityInterface |
18 | 18 | { |
19 | 19 | |
20 | - private const LOCATION_RA_CERT = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
21 | - private const LOCATION_RA_KEY = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
22 | - private const LOCATION_WEBROOT = ROOT . "/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
20 | + private const LOCATION_RA_CERT = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
21 | + private const LOCATION_RA_KEY = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
22 | + private const LOCATION_WEBROOT = ROOT."/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
23 | 23 | private const EDUPKI_RA_ID = 700; |
24 | 24 | private const EDUPKI_CERT_PROFILE = "User SOAP"; |
25 | 25 | private const EDUPKI_RA_PKEY_PASSPHRASE = "..."; |
@@ -35,13 +35,13 @@ discard block |
||
35 | 35 | parent::__construct(); |
36 | 36 | |
37 | 37 | if (stat(CertificationAuthorityEduPki::LOCATION_RA_CERT) === FALSE) { |
38 | - throw new Exception("RA operator PEM file not found: " . CertificationAuthorityEduPki::LOCATION_RA_CERT); |
|
38 | + throw new Exception("RA operator PEM file not found: ".CertificationAuthorityEduPki::LOCATION_RA_CERT); |
|
39 | 39 | } |
40 | 40 | if (stat(CertificationAuthorityEduPki::LOCATION_RA_KEY) === FALSE) { |
41 | - throw new Exception("RA operator private key file not found: " . CertificationAuthorityEduPki::LOCATION_RA_KEY); |
|
41 | + throw new Exception("RA operator private key file not found: ".CertificationAuthorityEduPki::LOCATION_RA_KEY); |
|
42 | 42 | } |
43 | 43 | if (stat(CertificationAuthorityEduPki::LOCATION_WEBROOT) === FALSE) { |
44 | - throw new Exception("CA website root CA file not found: " . CertificationAuthorityEduPki::LOCATION_WEBROOT); |
|
44 | + throw new Exception("CA website root CA file not found: ".CertificationAuthorityEduPki::LOCATION_WEBROOT); |
|
45 | 45 | } |
46 | 46 | } |
47 | 47 | |
@@ -75,19 +75,19 @@ discard block |
||
75 | 75 | // initialise connection to eduPKI CA / eduroam RA and send the request to them |
76 | 76 | try { |
77 | 77 | $altArray = [# Array mit den Subject Alternative Names |
78 | - "email:" . $csr["USERNAME"] |
|
78 | + "email:".$csr["USERNAME"] |
|
79 | 79 | ]; |
80 | 80 | $soapPub = $this->initEduPKISoapSession("PUBLIC"); |
81 | 81 | $this->loggerInstance->debug(5, "FIRST ACTUAL SOAP REQUEST (Public, newRequest)!\n"); |
82 | - $this->loggerInstance->debug(5, "PARAM_1: " . CertificationAuthorityEduPki::EDUPKI_RA_ID . "\n"); |
|
83 | - $this->loggerInstance->debug(5, "PARAM_2: " . $csr["CSR_STRING"] . "\n"); |
|
82 | + $this->loggerInstance->debug(5, "PARAM_1: ".CertificationAuthorityEduPki::EDUPKI_RA_ID."\n"); |
|
83 | + $this->loggerInstance->debug(5, "PARAM_2: ".$csr["CSR_STRING"]."\n"); |
|
84 | 84 | $this->loggerInstance->debug(5, "PARAM_3: "); |
85 | 85 | $this->loggerInstance->debug(5, $altArray); |
86 | - $this->loggerInstance->debug(5, "PARAM_4: " . CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE . "\n"); |
|
87 | - $this->loggerInstance->debug(5, "PARAM_5: " . sha1("notused") . "\n"); |
|
88 | - $this->loggerInstance->debug(5, "PARAM_6: " . $csr["USERNAME"] . "\n"); |
|
89 | - $this->loggerInstance->debug(5, "PARAM_7: " . $csr["USERNAME"] . "\n"); |
|
90 | - $this->loggerInstance->debug(5, "PARAM_8: " . \config\ConfAssistant::SILVERBULLET['product_name'] . "\n"); |
|
86 | + $this->loggerInstance->debug(5, "PARAM_4: ".CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE."\n"); |
|
87 | + $this->loggerInstance->debug(5, "PARAM_5: ".sha1("notused")."\n"); |
|
88 | + $this->loggerInstance->debug(5, "PARAM_6: ".$csr["USERNAME"]."\n"); |
|
89 | + $this->loggerInstance->debug(5, "PARAM_7: ".$csr["USERNAME"]."\n"); |
|
90 | + $this->loggerInstance->debug(5, "PARAM_8: ".\config\ConfAssistant::SILVERBULLET['product_name']."\n"); |
|
91 | 91 | $this->loggerInstance->debug(5, "PARAM_9: false\n"); |
92 | 92 | $soapNewRequest = $soapPub->newRequest( |
93 | 93 | CertificationAuthorityEduPki::EDUPKI_RA_ID, # RA-ID |
@@ -109,11 +109,11 @@ discard block |
||
109 | 109 | } catch (Exception $e) { |
110 | 110 | // PHP 7.1 can do this much better |
111 | 111 | if (is_soap_fault($e)) { |
112 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: { |
|
112 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: { |
|
113 | 113 | $e->faultstring |
114 | 114 | }\n"); |
115 | 115 | } |
116 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
116 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
117 | 117 | } |
118 | 118 | try { |
119 | 119 | $soap = $this->initEduPKISoapSession("RA"); |
@@ -125,8 +125,8 @@ discard block |
||
125 | 125 | $soapReqnum, [ |
126 | 126 | "RaID" => CertificationAuthorityEduPki::EDUPKI_RA_ID, |
127 | 127 | "Role" => CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE, |
128 | - "Subject" => "DC=eduroam,DC=test,DC=test,C=" . $csr["FED"] . ",O=" . \config\ConfAssistant::CONSORTIUM['name'] . ",OU=" . $csr["FED"] . ",CN=" . $csr['USERNAME'] . ",emailAddress=" . $csr['USERNAME'], |
|
129 | - "SubjectAltNames" => ["email:" . $csr["USERNAME"]], |
|
128 | + "Subject" => "DC=eduroam,DC=test,DC=test,C=".$csr["FED"].",O=".\config\ConfAssistant::CONSORTIUM['name'].",OU=".$csr["FED"].",CN=".$csr['USERNAME'].",emailAddress=".$csr['USERNAME'], |
|
129 | + "SubjectAltNames" => ["email:".$csr["USERNAME"]], |
|
130 | 130 | "NotBefore" => (new \DateTime())->format('c'), |
131 | 131 | "NotAfter" => $expiry->format('c'), |
132 | 132 | ] |
@@ -145,7 +145,7 @@ discard block |
||
145 | 145 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
146 | 146 | // rather than just using the string. Grr. |
147 | 147 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
148 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapCleartext); |
|
148 | + file_put_contents($tempdir['dir']."/content.txt", $soapCleartext); |
|
149 | 149 | // retrieve our RA cert from filesystem |
150 | 150 | // the RA certificates are not needed right now because we |
151 | 151 | // have resorted to S/MIME signatures with openssl command-line |
@@ -157,7 +157,7 @@ discard block |
||
157 | 157 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
158 | 158 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
159 | 159 | $this->loggerInstance->debug(5, "Actual content to be signed is this:\n $soapCleartext\n"); |
160 | - $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
160 | + $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
161 | 161 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
162 | 162 | $output = []; |
163 | 163 | $return = 999; |
@@ -166,14 +166,14 @@ discard block |
||
166 | 166 | throw new Exception("Non-zero return value from openssl smime!"); |
167 | 167 | } |
168 | 168 | // and get the signature blob back from the filesystem |
169 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
169 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
170 | 170 | $this->loggerInstance->debug(5, "Request for server approveRequest has parameters:\n"); |
171 | - $this->loggerInstance->debug(5, $soapReqnum . "\n"); |
|
172 | - $this->loggerInstance->debug(5, $soapCleartext . "\n"); // PHP magically encodes this as base64 while sending! |
|
173 | - $this->loggerInstance->debug(5, $detachedSig . "\n"); |
|
171 | + $this->loggerInstance->debug(5, $soapReqnum."\n"); |
|
172 | + $this->loggerInstance->debug(5, $soapCleartext."\n"); // PHP magically encodes this as base64 while sending! |
|
173 | + $this->loggerInstance->debug(5, $detachedSig."\n"); |
|
174 | 174 | $soapIssueCert = $soap->approveRequest($soapReqnum, $soapCleartext, $detachedSig); |
175 | - $this->loggerInstance->debug(5, "approveRequest Request was: \n" . $soap->__getLastRequest()); |
|
176 | - $this->loggerInstance->debug(5, "approveRequest Response was: \n" . $soap->__getLastResponse()); |
|
175 | + $this->loggerInstance->debug(5, "approveRequest Request was: \n".$soap->__getLastRequest()); |
|
176 | + $this->loggerInstance->debug(5, "approveRequest Response was: \n".$soap->__getLastResponse()); |
|
177 | 177 | if ($soapIssueCert === FALSE) { |
178 | 178 | throw new Exception("The locally approved request was NOT processed by the CA."); |
179 | 179 | } |
@@ -210,9 +210,9 @@ discard block |
||
210 | 210 | throw new Exception("CAInfo has no root certificate for us!"); |
211 | 211 | } |
212 | 212 | } catch (SoapFault $e) { |
213 | - throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
213 | + throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
214 | 214 | } catch (Exception $e) { |
215 | - throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage()); |
|
215 | + throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage()); |
|
216 | 216 | } |
217 | 217 | return [ |
218 | 218 | "CERT" => openssl_x509_read($parsedCert['pem']), |
@@ -245,12 +245,12 @@ discard block |
||
245 | 245 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
246 | 246 | // rather than just using the string. Grr. |
247 | 247 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
248 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapRawRevRequest); |
|
248 | + file_put_contents($tempdir['dir']."/content.txt", $soapRawRevRequest); |
|
249 | 249 | // retrieve our RA cert from filesystem |
250 | 250 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
251 | 251 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
252 | 252 | $this->loggerInstance->debug(5, "Actual content to be signed is this:\n$soapRawRevRequest\n"); |
253 | - $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPki::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPki::LOCATION_RA_CERT; |
|
253 | + $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPki::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPki::LOCATION_RA_CERT; |
|
254 | 254 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
255 | 255 | $output = []; |
256 | 256 | $return = 999; |
@@ -259,7 +259,7 @@ discard block |
||
259 | 259 | throw new Exception("Non-zero return value from openssl smime!"); |
260 | 260 | } |
261 | 261 | // and get the signature blob back from the filesystem |
262 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
262 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
263 | 263 | $soapIssueRev = $soap->approveRevocationRequest($soapRevocationSerial, $soapRawRevRequest, $detachedSig); |
264 | 264 | if ($soapIssueRev === FALSE) { |
265 | 265 | throw new Exception("The locally approved revocation request was NOT processed by the CA."); |
@@ -267,9 +267,9 @@ discard block |
||
267 | 267 | } catch (Exception $e) { |
268 | 268 | // PHP 7.1 can do this much better |
269 | 269 | if (is_soap_fault($e)) { |
270 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: {$e->faultstring}\n"); |
|
270 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: {$e->faultstring}\n"); |
|
271 | 271 | } |
272 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
272 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
273 | 273 | } |
274 | 274 | } |
275 | 275 | |
@@ -369,9 +369,9 @@ discard block |
||
369 | 369 | */ |
370 | 370 | public function soapToXmlInteger($x) |
371 | 371 | { |
372 | - return '<' . $x[0] . '>' |
|
372 | + return '<'.$x[0].'>' |
|
373 | 373 | . htmlentities($x[1], ENT_NOQUOTES | ENT_XML1) |
374 | - . '</' . $x[0] . '>'; |
|
374 | + . '</'.$x[0].'>'; |
|
375 | 375 | } |
376 | 376 | |
377 | 377 | /** |
@@ -390,9 +390,9 @@ discard block |
||
390 | 390 | // dump private key into directory |
391 | 391 | $outstring = ""; |
392 | 392 | openssl_pkey_export($privateKey, $outstring); |
393 | - file_put_contents($tempdir . "/pkey.pem", $outstring); |
|
393 | + file_put_contents($tempdir."/pkey.pem", $outstring); |
|
394 | 394 | // PHP can only do one DC in the Subject. But we need three. |
395 | - $execCmd = \config\Master::PATHS['openssl'] . " req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$fed/CN=$username/emailAddress=$username"; |
|
395 | + $execCmd = \config\Master::PATHS['openssl']." req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$fed/CN=$username/emailAddress=$username"; |
|
396 | 396 | $this->loggerInstance->debug(2, "Calling openssl req with following cmdline: $execCmd\n"); |
397 | 397 | $output = []; |
398 | 398 | $return = 999; |
@@ -132,20 +132,20 @@ discard block |
||
132 | 132 | if ($device == "TOTAL") { |
133 | 133 | continue; |
134 | 134 | } |
135 | - $retstring .= "<tr><td>$device</td><td>" . $numbers['ADMIN'] . "</td><td>" . $numbers['SILVERBULLET'] . "</td><td>" . $numbers['USER'] . "</td></tr>"; |
|
135 | + $retstring .= "<tr><td>$device</td><td>".$numbers['ADMIN']."</td><td>".$numbers['SILVERBULLET']."</td><td>".$numbers['USER']."</td></tr>"; |
|
136 | 136 | } |
137 | - $retstring .= "<tr><td><strong>TOTAL</strong></td><td><strong>" . $data['TOTAL']['ADMIN'] . "</strong></td><td><strong>" . $data['TOTAL']['SILVERBULLET'] . "</strong></td><td><strong>" . $data['TOTAL']['USER'] . "</strong></td></tr>"; |
|
137 | + $retstring .= "<tr><td><strong>TOTAL</strong></td><td><strong>".$data['TOTAL']['ADMIN']."</strong></td><td><strong>".$data['TOTAL']['SILVERBULLET']."</strong></td><td><strong>".$data['TOTAL']['USER']."</strong></td></tr>"; |
|
138 | 138 | break; |
139 | 139 | case "XML": |
140 | 140 | // the calls to date() operate on current date, so there is no chance for a FALSE to be returned. Silencing scrutinizer. |
141 | - $retstring .= "<federation id='$this->tld' ts='" . /** @scrutinizer ignore-type */ date("Y-m-d") . "T" . /** @scrutinizer ignore-type */ date("H:i:s") . "'>\n"; |
|
141 | + $retstring .= "<federation id='$this->tld' ts='"./** @scrutinizer ignore-type */ date("Y-m-d")."T"./** @scrutinizer ignore-type */ date("H:i:s")."'>\n"; |
|
142 | 142 | foreach ($data as $device => $numbers) { |
143 | 143 | if ($device == "TOTAL") { |
144 | 144 | continue; |
145 | 145 | } |
146 | - $retstring .= " <device name='" . $device . "'>\n <downloads group='admin'>" . $numbers['ADMIN'] . "</downloads>\n <downloads group='managed_idp'>" . $numbers['SILVERBULLET'] . "</downloads>\n <downloads group='user'>" . $numbers['USER'] . "</downloads>\n </device>"; |
|
146 | + $retstring .= " <device name='".$device."'>\n <downloads group='admin'>".$numbers['ADMIN']."</downloads>\n <downloads group='managed_idp'>".$numbers['SILVERBULLET']."</downloads>\n <downloads group='user'>".$numbers['USER']."</downloads>\n </device>"; |
|
147 | 147 | } |
148 | - $retstring .= "<total>\n <downloads group='admin'>" . $data['TOTAL']['ADMIN'] . "</downloads>\n <downloads group='managed_idp'>" . $data['TOTAL']['SILVERBULLET'] . "</downloads>\n <downloads group='user'>" . $data['TOTAL']['USER'] . "</downloads>\n</total>\n"; |
|
148 | + $retstring .= "<total>\n <downloads group='admin'>".$data['TOTAL']['ADMIN']."</downloads>\n <downloads group='managed_idp'>".$data['TOTAL']['SILVERBULLET']."</downloads>\n <downloads group='user'>".$data['TOTAL']['USER']."</downloads>\n</total>\n"; |
|
149 | 149 | $retstring .= "</federation>"; |
150 | 150 | break; |
151 | 151 | case "array": |
@@ -237,7 +237,7 @@ discard block |
||
237 | 237 | $identifier = $this->databaseHandle->lastID(); |
238 | 238 | |
239 | 239 | if ($identifier == 0 || !$this->loggerInstance->writeAudit($ownerId, "NEW", "Organisation $identifier")) { |
240 | - $text = "<p>Could not create a new " . common\Entity::$nomenclature_participant . "!</p>"; |
|
240 | + $text = "<p>Could not create a new ".common\Entity::$nomenclature_participant."!</p>"; |
|
241 | 241 | echo $text; |
242 | 242 | throw new Exception($text); |
243 | 243 | } |
@@ -379,7 +379,7 @@ discard block |
||
379 | 379 | return; // no update to fetch |
380 | 380 | } |
381 | 381 | $certDetails = openssl_x509_parse($entryInQuestion['CERT']); |
382 | - $expiry = "20" . $certDetails['validTo'][0] . $certDetails['validTo'][1] . "-" . $certDetails['validTo'][2] . $certDetails['validTo'][3] . "-" . $certDetails['validTo'][4] . $certDetails['validTo'][5]; |
|
382 | + $expiry = "20".$certDetails['validTo'][0].$certDetails['validTo'][1]."-".$certDetails['validTo'][2].$certDetails['validTo'][3]."-".$certDetails['validTo'][4].$certDetails['validTo'][5]; |
|
383 | 383 | openssl_x509_export($entryInQuestion['CERT'], $pem); |
384 | 384 | $updateQuery = "UPDATE federation_servercerts SET status = 'ISSUED', certificate = ?, expiry = ? WHERE ca_name = 'eduPKI' AND request_serial = ?"; |
385 | 385 | $this->databaseHandle->exec($updateQuery, "ssi", $pem, $expiry, $reqSerial); |
@@ -62,7 +62,7 @@ |
||
62 | 62 | they are from the same user group. You are not allowed to share them to an unlimited |
63 | 63 | audience (e.g. on a publicly accessible web server).</li> |
64 | 64 | <li>If You are an eduroam Identity Provider administrator, you are allowed to download and pass on the Installers to |
65 | -your own <?php echo \config\ConfAssistant::CONSORTIUM['nomenclature_idp'];?> end users, e.g. on the support web pages of your <?php echo \config\ConfAssistant::CONSORTIUM['nomenclature_idp'];?>, on Welcome Package CDs or USB sticks, etc.</li> |
|
65 | +your own <?php echo \config\ConfAssistant::CONSORTIUM['nomenclature_idp']; ?> end users, e.g. on the support web pages of your <?php echo \config\ConfAssistant::CONSORTIUM['nomenclature_idp']; ?>, on Welcome Package CDs or USB sticks, etc.</li> |
|
66 | 66 | <li>If You are a third-party not affiliated with eduroam, you are only allowed to download and pass on |
67 | 67 | the Metadata and/or the Installers after having received written permission by the eduroam Operations team.</li> |
68 | 68 | </ul> |
@@ -19,7 +19,7 @@ discard block |
||
19 | 19 | * <base_url>/copyright.php after deploying the software |
20 | 20 | */ |
21 | 21 | |
22 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
22 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
23 | 23 | |
24 | 24 | $auth = new \web\lib\admin\Authentication(); |
25 | 25 | $deco = new \web\lib\admin\PageDecoration(); |
@@ -43,7 +43,7 @@ discard block |
||
43 | 43 | } |
44 | 44 | $profileToBeDel = $validator->existingProfile($_GET['profile_id'], $my_inst->identifier); |
45 | 45 | $profileToBeDel->destroy(); |
46 | - $loggerInstance->writeAudit($_SESSION['user'], "DEL", "Profile " . $profileToBeDel->identifier); |
|
46 | + $loggerInstance->writeAudit($_SESSION['user'], "DEL", "Profile ".$profileToBeDel->identifier); |
|
47 | 47 | header("Location: overview_org.php?inst_id=$my_inst->identifier"); |
48 | 48 | exit; |
49 | 49 | case web\lib\common\FormElements::BUTTON_SAVE: |
@@ -52,7 +52,7 @@ discard block |
||
52 | 52 | echo $deco->pageheader(sprintf(_("%s: Edit Profile - Result"), \config\Master::APPEARANCE['productname']), "ADMIN-IDP"); |
53 | 53 | } else { |
54 | 54 | $profile = $my_inst->newProfile(core\AbstractProfile::PROFILETYPE_RADIUS); |
55 | - $loggerInstance->writeAudit($_SESSION['user'], "NEW", "IdP " . $my_inst->identifier . " - Profile created"); |
|
55 | + $loggerInstance->writeAudit($_SESSION['user'], "NEW", "IdP ".$my_inst->identifier." - Profile created"); |
|
56 | 56 | echo $deco->pageheader(sprintf(_("%s: Profile wizard (step 3 completed)"), \config\Master::APPEARANCE['productname']), "ADMIN-IDP"); |
57 | 57 | } |
58 | 58 | if (!$profile instanceof \core\ProfileRADIUS) { |
@@ -121,7 +121,7 @@ discard block |
||
121 | 121 | $uiElements = new web\lib\admin\UIElements(); |
122 | 122 | // set realm info, if submitted |
123 | 123 | if ($realm !== FALSE) { |
124 | - $profile->setRealm($anonLocal . "@" . $realm); |
|
124 | + $profile->setRealm($anonLocal."@".$realm); |
|
125 | 125 | echo $uiElements->boxOkay(sprintf(_("Realm: <strong>%s</strong>"), $realm)); |
126 | 126 | } else { |
127 | 127 | $profile->setRealm(""); |
@@ -147,7 +147,7 @@ discard block |
||
147 | 147 | echo $uiElements->boxError(_("Realm check username cannot be configured: realm is missing!")); |
148 | 148 | } else { |
149 | 149 | $profile->setRealmcheckUser(true, $checkuser_name); |
150 | - echo $uiElements->boxOkay(sprintf(_("Special username for realm check is <strong>%s</strong>, the value is <strong>%s</strong>"), _("ON"), $checkuser_name . "@" . $realm)); |
|
150 | + echo $uiElements->boxOkay(sprintf(_("Special username for realm check is <strong>%s</strong>, the value is <strong>%s</strong>"), _("ON"), $checkuser_name."@".$realm)); |
|
151 | 151 | } |
152 | 152 | } else { |
153 | 153 | $profile->setRealmCheckUser(false); |
@@ -159,12 +159,12 @@ discard block |
||
159 | 159 | $extratext = ""; |
160 | 160 | if (!empty($realm)) { |
161 | 161 | if ($hint !== FALSE) { |
162 | - $extratext = " " . sprintf(_("The realm portion MUST be exactly '...@%s'."), $realm); |
|
162 | + $extratext = " ".sprintf(_("The realm portion MUST be exactly '...@%s'."), $realm); |
|
163 | 163 | } else { |
164 | - $extratext = " " . sprintf(_("The realm portion MUST end with '%s' but sub-realms of it are allowed (i.e. 'user@%s' and 'user@<...>.%s' are both acceptable)."), $realm, $realm, $realm); |
|
164 | + $extratext = " ".sprintf(_("The realm portion MUST end with '%s' but sub-realms of it are allowed (i.e. 'user@%s' and 'user@<...>.%s' are both acceptable)."), $realm, $realm, $realm); |
|
165 | 165 | } |
166 | 166 | } |
167 | - echo $uiElements->boxOkay(_("Where possible, supplicants will verify that username inputs contain a syntactically correct realm.") . $extratext); |
|
167 | + echo $uiElements->boxOkay(_("Where possible, supplicants will verify that username inputs contain a syntactically correct realm.").$extratext); |
|
168 | 168 | } else { |
169 | 169 | $profile->setInputVerificationPreference(false, false); |
170 | 170 | } |
@@ -196,30 +196,30 @@ discard block |
||
196 | 196 | echo $uiElements->boxOkay(_("Redirection is <strong>OFF</strong>")); |
197 | 197 | } |
198 | 198 | |
199 | - $loggerInstance->writeAudit($_SESSION['user'], "MOD", "Profile " . $profile->identifier . " - attributes changed"); |
|
199 | + $loggerInstance->writeAudit($_SESSION['user'], "MOD", "Profile ".$profile->identifier." - attributes changed"); |
|
200 | 200 | // reload the profile to ingest new CA and server names if any; before checking EAP completeness |
201 | 201 | $reloadedProfileNr1 = \core\ProfileFactory::instantiate($profile->identifier); |
202 | 202 | foreach (\core\common\EAP::listKnownEAPTypes() as $a) { |
203 | 203 | if ($a->getIntegerRep() == \core\common\EAP::INTEGER_SILVERBULLET) { // do not allow adding silverbullet via the backdoor |
204 | 204 | continue; |
205 | 205 | } |
206 | - if (isset($_POST[$a->getPrintableRep()]) && isset($_POST[$a->getPrintableRep() . "-priority"]) && is_numeric($_POST[$a->getPrintableRep() . "-priority"])) { |
|
207 | - $priority = (int) $_POST[$a->getPrintableRep() . "-priority"]; |
|
206 | + if (isset($_POST[$a->getPrintableRep()]) && isset($_POST[$a->getPrintableRep()."-priority"]) && is_numeric($_POST[$a->getPrintableRep()."-priority"])) { |
|
207 | + $priority = (int) $_POST[$a->getPrintableRep()."-priority"]; |
|
208 | 208 | // add EAP type to profile as requested, but ... |
209 | 209 | $reloadedProfileNr1->addSupportedEapMethod($a, $priority); |
210 | - $loggerInstance->writeAudit($_SESSION['user'], "MOD", "Profile " . $reloadedProfileNr1->identifier . " - supported EAP types changed"); |
|
210 | + $loggerInstance->writeAudit($_SESSION['user'], "MOD", "Profile ".$reloadedProfileNr1->identifier." - supported EAP types changed"); |
|
211 | 211 | // see if we can enable the EAP type, or if info is missing |
212 | 212 | $eapcompleteness = $reloadedProfileNr1->isEapTypeDefinitionComplete($a); |
213 | 213 | if ($eapcompleteness === true) { |
214 | - echo $uiElements->boxOkay(_("Supported EAP Type: ") . "<strong>" . $a->getPrintableRep() . "</strong>"); |
|
214 | + echo $uiElements->boxOkay(_("Supported EAP Type: ")."<strong>".$a->getPrintableRep()."</strong>"); |
|
215 | 215 | } else { |
216 | 216 | $warntext = ""; |
217 | 217 | if (is_array($eapcompleteness)) { |
218 | 218 | foreach ($eapcompleteness as $item) { |
219 | - $warntext .= "<strong>" . $uiElements->displayName($item) . "</strong> "; |
|
219 | + $warntext .= "<strong>".$uiElements->displayName($item)."</strong> "; |
|
220 | 220 | } |
221 | 221 | } |
222 | - echo $uiElements->boxWarning(sprintf(_("Supported EAP Type: <strong>%s</strong> is missing required information %s !"), $a->getPrintableRep(), $warntext) . "<br/>" . _("The EAP type was added to the profile, but you need to complete the missing information before we can produce installers for you.")); |
|
222 | + echo $uiElements->boxWarning(sprintf(_("Supported EAP Type: <strong>%s</strong> is missing required information %s !"), $a->getPrintableRep(), $warntext)."<br/>"._("The EAP type was added to the profile, but you need to complete the missing information before we can produce installers for you.")); |
|
223 | 223 | } |
224 | 224 | } |
225 | 225 | } |
@@ -230,23 +230,23 @@ discard block |
||
230 | 230 | if (count($significantChanges) > 0) { |
231 | 231 | $myInstOriginal = new \core\IdP($profile->institution); |
232 | 232 | // send a notification/alert mail to someone we know is in charge |
233 | - $text = _("To whom it may concern,") . "\n\n"; |
|
233 | + $text = _("To whom it may concern,")."\n\n"; |
|
234 | 234 | /// were made to the *Identity Provider* *LU* / integer number of IdP / (previously known as) Name |
235 | - $text .= sprintf(_("significant changes were made to a RADIUS deployment profile of the %s %s / %s / '%s'."), $ui->nomenclatureIdP, strtoupper($myInstOriginal->federation), $myInstOriginal->identifier, $myInstOriginal->name) . "\n\n"; |
|
235 | + $text .= sprintf(_("significant changes were made to a RADIUS deployment profile of the %s %s / %s / '%s'."), $ui->nomenclatureIdP, strtoupper($myInstOriginal->federation), $myInstOriginal->identifier, $myInstOriginal->name)."\n\n"; |
|
236 | 236 | if (isset($significantChanges[\core\AbstractProfile::CA_CLASH_ADDED])) { |
237 | - $text .= _("WARNING! A new trusted root CA was added, and it has the exact same name as a previously existing root CA. This may (but does not necessarily) mean that this is an attempt to insert an unauthorised trust root by disguising as the genuine one. The details are below:") . "\n\n"; |
|
238 | - $text .= $significantChanges[\core\AbstractProfile::CA_CLASH_ADDED] . "\n\n"; |
|
237 | + $text .= _("WARNING! A new trusted root CA was added, and it has the exact same name as a previously existing root CA. This may (but does not necessarily) mean that this is an attempt to insert an unauthorised trust root by disguising as the genuine one. The details are below:")."\n\n"; |
|
238 | + $text .= $significantChanges[\core\AbstractProfile::CA_CLASH_ADDED]."\n\n"; |
|
239 | 239 | } |
240 | 240 | if (isset($significantChanges[\core\AbstractProfile::CA_ADDED])) { |
241 | - $text .= _("A new trusted root CA was added. The details are below:") . "\n\n"; |
|
242 | - $text .= $significantChanges[\core\AbstractProfile::CA_ADDED] . "\n\n"; |
|
241 | + $text .= _("A new trusted root CA was added. The details are below:")."\n\n"; |
|
242 | + $text .= $significantChanges[\core\AbstractProfile::CA_ADDED]."\n\n"; |
|
243 | 243 | } |
244 | 244 | if (isset($significantChanges[\core\AbstractProfile::SERVERNAME_ADDED])) { |
245 | - $text .= _("A new acceptable server name for the authentication server was added. The details are below:") . "\n\n"; |
|
246 | - $text .= $significantChanges[\core\AbstractProfile::SERVERNAME_ADDED] . "\n\n"; |
|
245 | + $text .= _("A new acceptable server name for the authentication server was added. The details are below:")."\n\n"; |
|
246 | + $text .= $significantChanges[\core\AbstractProfile::SERVERNAME_ADDED]."\n\n"; |
|
247 | 247 | } |
248 | - $text .= _("This mail is merely a cross-check because these changes can be security-relevant. If the change was expected, you do not need to take any action.") . "\n\n"; |
|
249 | - $text .= _("Greetings, ") . "\n\n" . \config\Master::APPEARANCE['productname_long']; |
|
248 | + $text .= _("This mail is merely a cross-check because these changes can be security-relevant. If the change was expected, you do not need to take any action.")."\n\n"; |
|
249 | + $text .= _("Greetings, ")."\n\n".\config\Master::APPEARANCE['productname_long']; |
|
250 | 250 | // (currently, send hard-wired to NRO - future: for linked insts, check eduroam DBv2 and send to registered admins directly) |
251 | 251 | $fed = new core\Federation($myInstOriginal->federation); |
252 | 252 | foreach ($fed->listFederationAdmins() as $id) { |
@@ -305,14 +305,14 @@ discard block |
||
305 | 305 | $oneHostOkay = FALSE; |
306 | 306 | $testCandidates = []; |
307 | 307 | foreach ($dnsChecks->NAPTR_hostname_records as $oneServer) { |
308 | - $testCandidates[$oneServer['hostname']][] = ($oneServer['family'] == "IPv4" ? $oneServer['IP'] : "[" . $oneServer['IP'] . "]") . ":" . $oneServer['port']; |
|
308 | + $testCandidates[$oneServer['hostname']][] = ($oneServer['family'] == "IPv4" ? $oneServer['IP'] : "[".$oneServer['IP']."]").":".$oneServer['port']; |
|
309 | 309 | } |
310 | 310 | foreach ($testCandidates as $oneHost => $listOfIPs) { |
311 | 311 | $connectionTests = new core\diag\RFC6614Tests(array_values($listOfIPs), $oneHost, "openroaming"); |
312 | 312 | // for now (no OpenRoaming client certs available) only run server-side tests |
313 | 313 | foreach ($listOfIPs as $oneIP) { |
314 | 314 | $connectionResult = $connectionTests->cApathCheck($oneIP); |
315 | - if ($connectionResult != core\diag\AbstractTest::RETVAL_OK || ( isset($connectionTests->TLS_CA_checks_result['cert_oddity']) && count($connectionTests->TLS_CA_checks_result['cert_oddity']) > 0)) { |
|
315 | + if ($connectionResult != core\diag\AbstractTest::RETVAL_OK || (isset($connectionTests->TLS_CA_checks_result['cert_oddity']) && count($connectionTests->TLS_CA_checks_result['cert_oddity']) > 0)) { |
|
316 | 316 | $allHostsOkay = FALSE; |
317 | 317 | } else { |
318 | 318 | $oneHostOkay = TRUE; |
@@ -349,7 +349,7 @@ discard block |
||
349 | 349 | <?php |
350 | 350 | if (count($reloadedProfileNr2->getEapMethodsinOrderOfPreference(1)) > 0) { |
351 | 351 | echo "<form method='post' action='overview_installers.php?inst_id=$my_inst->identifier&profile_id=$reloadedProfileNr2->identifier' accept-charset='UTF-8'> |
352 | - <button type='submit'>" . _("Continue to Installer Fine-Tuning and Download") . "</button> |
|
352 | + <button type='submit'>"._("Continue to Installer Fine-Tuning and Download")."</button> |
|
353 | 353 | </form>"; |
354 | 354 | } |
355 | 355 | echo $deco->footer(); |
@@ -98,98 +98,98 @@ |
||
98 | 98 | } |
99 | 99 | |
100 | 100 | switch ($operationMode) { |
101 | - case OPERATION_MODE_EDIT: |
|
102 | - $idp = $validator->existingIdP($_GET['inst_id']); |
|
103 | - // editing IdPs is done from within the popup. When we're done, send the |
|
104 | - // user back to the popup (append the result of the operation later) |
|
105 | - $redirectDestination = "manageAdmins.inc.php?inst_id=" . $idp->identifier . "&"; |
|
106 | - if (count($validAddresses) == 0) { |
|
107 | - header("Location: $redirectDestination" . "invitation=INVALIDSYNTAX"); |
|
108 | - exit(1); |
|
109 | - } |
|
110 | - // is the user primary admin of this IdP? |
|
111 | - $is_owner = $idp->isPrimaryOwner($_SESSION['user']); |
|
112 | - // check if he is (also) federation admin for the federation this IdP is in. His invitations have more blessing then. |
|
113 | - $fedadmin = $userObject->isFederationAdmin($idp->federation); |
|
114 | - // check if he is either one, if not, complain |
|
115 | - if (!$is_owner && !$fedadmin) { |
|
116 | - echo "<p>" . sprintf(_("Something's wrong... you are a %s admin, but not for the %s the requested %s belongs to!"), $uiElements->nomenclatureFed, $uiElements->nomenclatureFed, $uiElements->nomenclatureParticipant) . "</p>"; |
|
117 | - exit(1); |
|
118 | - } |
|
101 | + case OPERATION_MODE_EDIT: |
|
102 | + $idp = $validator->existingIdP($_GET['inst_id']); |
|
103 | + // editing IdPs is done from within the popup. When we're done, send the |
|
104 | + // user back to the popup (append the result of the operation later) |
|
105 | + $redirectDestination = "manageAdmins.inc.php?inst_id=" . $idp->identifier . "&"; |
|
106 | + if (count($validAddresses) == 0) { |
|
107 | + header("Location: $redirectDestination" . "invitation=INVALIDSYNTAX"); |
|
108 | + exit(1); |
|
109 | + } |
|
110 | + // is the user primary admin of this IdP? |
|
111 | + $is_owner = $idp->isPrimaryOwner($_SESSION['user']); |
|
112 | + // check if he is (also) federation admin for the federation this IdP is in. His invitations have more blessing then. |
|
113 | + $fedadmin = $userObject->isFederationAdmin($idp->federation); |
|
114 | + // check if he is either one, if not, complain |
|
115 | + if (!$is_owner && !$fedadmin) { |
|
116 | + echo "<p>" . sprintf(_("Something's wrong... you are a %s admin, but not for the %s the requested %s belongs to!"), $uiElements->nomenclatureFed, $uiElements->nomenclatureFed, $uiElements->nomenclatureParticipant) . "</p>"; |
|
117 | + exit(1); |
|
118 | + } |
|
119 | 119 | |
120 | - $prettyprintname = $idp->name; |
|
121 | - $newtokens = $mgmt->createTokens($fedadmin, $validAddresses, $idp); |
|
122 | - $loggerInstance->writeAudit($_SESSION['user'], "NEW", "IdP " . $idp->identifier . " - Token created for " . implode(",", $validAddresses)); |
|
123 | - $introtext = "CO-ADMIN"; |
|
124 | - $participant_type = $idp->type; |
|
125 | - break; |
|
126 | - case OPERATION_MODE_NEWUNLINKED: |
|
127 | - $redirectDestination = "../overview_federation.php?"; |
|
128 | - if (count($validAddresses) == 0) { |
|
129 | - header("Location: $redirectDestination"."invitation=INVALIDSYNTAX"); |
|
130 | - exit(1); |
|
131 | - } |
|
132 | - // run an input check and conversion of the raw inputs... just in case |
|
133 | - $newinstname = $validator->string($_POST['name']); |
|
134 | - $newcountry = $validator->string($_POST['country']); |
|
135 | - $participant_type = $validator->partType($_POST['participant_type']); |
|
136 | - $new_idp_authorized_fedadmin = $userObject->isFederationAdmin($newcountry); |
|
137 | - if ($new_idp_authorized_fedadmin !== TRUE) { |
|
138 | - throw new Exception("Something's wrong... you want to create a new " . $uiElements->nomenclatureParticipant . ", but are not a " . $uiElements->nomenclatureFed . " admin for the " . $uiElements->nomenclatureFed . " it should be in!"); |
|
139 | - } |
|
140 | - $federation = $validator->existingFederation($newcountry); |
|
141 | - $prettyprintname = $newinstname; |
|
142 | - $introtext = "NEW-FED"; |
|
143 | - // send the user back to his federation overview page, append the result of the operation later |
|
144 | - // do the token creation magic |
|
145 | - $newtokens = $mgmt->createTokens(TRUE, $validAddresses, $newinstname, 0, $newcountry, $participant_type); |
|
146 | - $loggerInstance->writeAudit($_SESSION['user'], "NEW", "ORG FUTURE - Token created for $participant_type " . implode(",", $validAddresses)); |
|
147 | - break; |
|
148 | - case OPERATION_MODE_NEWFROMDB: |
|
149 | - $redirectDestination = "../overview_federation.php?"; |
|
150 | - if (count($validAddresses) == 0) { |
|
151 | - header("Location: $redirectDestination"."invitation=INVALIDSYNTAX"); |
|
152 | - exit(1); |
|
153 | - } |
|
154 | - // a real external DB entry was submitted and all the required parameters are there |
|
155 | - $newexternalid = $validator->string($_POST['externals']); |
|
156 | - $extinfo = $catInstance->getExternalDBEntityDetails($newexternalid); |
|
157 | - $new_idp_authorized_fedadmin = $userObject->isFederationAdmin($extinfo['country']); |
|
158 | - if ($new_idp_authorized_fedadmin !== TRUE) { |
|
159 | - throw new Exception("Something's wrong... you want to create a new " . $uiElements->nomenclatureParticipant . ", but are not a " . $uiElements->nomenclatureFed . " admin for the " . $uiElements->nomenclatureFed . " it should be in!"); |
|
160 | - } |
|
161 | - $federation = $validator->existingFederation($extinfo['country']); |
|
162 | - $newcountry = $extinfo['country']; |
|
163 | - // see if the inst name is defined in the currently set language; if not, pick its English name; if N/A, pick the last in the list |
|
164 | - $prettyprintname = ""; |
|
165 | - foreach ($extinfo['names'] as $lang => $name) { |
|
166 | - if ($lang == $languageInstance->getLang()) { |
|
167 | - $prettyprintname = $name; |
|
120 | + $prettyprintname = $idp->name; |
|
121 | + $newtokens = $mgmt->createTokens($fedadmin, $validAddresses, $idp); |
|
122 | + $loggerInstance->writeAudit($_SESSION['user'], "NEW", "IdP " . $idp->identifier . " - Token created for " . implode(",", $validAddresses)); |
|
123 | + $introtext = "CO-ADMIN"; |
|
124 | + $participant_type = $idp->type; |
|
125 | + break; |
|
126 | + case OPERATION_MODE_NEWUNLINKED: |
|
127 | + $redirectDestination = "../overview_federation.php?"; |
|
128 | + if (count($validAddresses) == 0) { |
|
129 | + header("Location: $redirectDestination"."invitation=INVALIDSYNTAX"); |
|
130 | + exit(1); |
|
168 | 131 | } |
169 | - } |
|
170 | - if ($prettyprintname == "" && isset($extinfo['names']['en'])) { |
|
171 | - $prettyprintname = $extinfo['names']['en']; |
|
172 | - } |
|
173 | - if ($prettyprintname == "") { |
|
174 | - foreach ($extinfo['names'] as $name) { |
|
175 | - $prettyprintname = $name; |
|
132 | + // run an input check and conversion of the raw inputs... just in case |
|
133 | + $newinstname = $validator->string($_POST['name']); |
|
134 | + $newcountry = $validator->string($_POST['country']); |
|
135 | + $participant_type = $validator->partType($_POST['participant_type']); |
|
136 | + $new_idp_authorized_fedadmin = $userObject->isFederationAdmin($newcountry); |
|
137 | + if ($new_idp_authorized_fedadmin !== TRUE) { |
|
138 | + throw new Exception("Something's wrong... you want to create a new " . $uiElements->nomenclatureParticipant . ", but are not a " . $uiElements->nomenclatureFed . " admin for the " . $uiElements->nomenclatureFed . " it should be in!"); |
|
176 | 139 | } |
177 | - } |
|
178 | - $participant_type = $extinfo['type']; |
|
179 | - // fill the rest of the text |
|
180 | - $introtext = "EXISTING-FED"; |
|
181 | - // do the token creation magic |
|
182 | - $newtokens = $mgmt->createTokens(TRUE, $validAddresses, $prettyprintname, $newexternalid); |
|
183 | - $loggerInstance->writeAudit($_SESSION['user'], "NEW", "IdP FUTURE - Token created for " . implode(",", $validAddresses)); |
|
184 | - break; |
|
185 | - default: // includes OPERATION_MODE_INVALID |
|
186 | - // second param is TRUE, so the variable *will* contain a string |
|
187 | - // i.e. ignore Scrutinizer type warning later |
|
188 | - $wrongcontent = print_r($_POST, TRUE); |
|
189 | - echo "<pre>Wrong parameters in POST: |
|
140 | + $federation = $validator->existingFederation($newcountry); |
|
141 | + $prettyprintname = $newinstname; |
|
142 | + $introtext = "NEW-FED"; |
|
143 | + // send the user back to his federation overview page, append the result of the operation later |
|
144 | + // do the token creation magic |
|
145 | + $newtokens = $mgmt->createTokens(TRUE, $validAddresses, $newinstname, 0, $newcountry, $participant_type); |
|
146 | + $loggerInstance->writeAudit($_SESSION['user'], "NEW", "ORG FUTURE - Token created for $participant_type " . implode(",", $validAddresses)); |
|
147 | + break; |
|
148 | + case OPERATION_MODE_NEWFROMDB: |
|
149 | + $redirectDestination = "../overview_federation.php?"; |
|
150 | + if (count($validAddresses) == 0) { |
|
151 | + header("Location: $redirectDestination"."invitation=INVALIDSYNTAX"); |
|
152 | + exit(1); |
|
153 | + } |
|
154 | + // a real external DB entry was submitted and all the required parameters are there |
|
155 | + $newexternalid = $validator->string($_POST['externals']); |
|
156 | + $extinfo = $catInstance->getExternalDBEntityDetails($newexternalid); |
|
157 | + $new_idp_authorized_fedadmin = $userObject->isFederationAdmin($extinfo['country']); |
|
158 | + if ($new_idp_authorized_fedadmin !== TRUE) { |
|
159 | + throw new Exception("Something's wrong... you want to create a new " . $uiElements->nomenclatureParticipant . ", but are not a " . $uiElements->nomenclatureFed . " admin for the " . $uiElements->nomenclatureFed . " it should be in!"); |
|
160 | + } |
|
161 | + $federation = $validator->existingFederation($extinfo['country']); |
|
162 | + $newcountry = $extinfo['country']; |
|
163 | + // see if the inst name is defined in the currently set language; if not, pick its English name; if N/A, pick the last in the list |
|
164 | + $prettyprintname = ""; |
|
165 | + foreach ($extinfo['names'] as $lang => $name) { |
|
166 | + if ($lang == $languageInstance->getLang()) { |
|
167 | + $prettyprintname = $name; |
|
168 | + } |
|
169 | + } |
|
170 | + if ($prettyprintname == "" && isset($extinfo['names']['en'])) { |
|
171 | + $prettyprintname = $extinfo['names']['en']; |
|
172 | + } |
|
173 | + if ($prettyprintname == "") { |
|
174 | + foreach ($extinfo['names'] as $name) { |
|
175 | + $prettyprintname = $name; |
|
176 | + } |
|
177 | + } |
|
178 | + $participant_type = $extinfo['type']; |
|
179 | + // fill the rest of the text |
|
180 | + $introtext = "EXISTING-FED"; |
|
181 | + // do the token creation magic |
|
182 | + $newtokens = $mgmt->createTokens(TRUE, $validAddresses, $prettyprintname, $newexternalid); |
|
183 | + $loggerInstance->writeAudit($_SESSION['user'], "NEW", "IdP FUTURE - Token created for " . implode(",", $validAddresses)); |
|
184 | + break; |
|
185 | + default: // includes OPERATION_MODE_INVALID |
|
186 | + // second param is TRUE, so the variable *will* contain a string |
|
187 | + // i.e. ignore Scrutinizer type warning later |
|
188 | + $wrongcontent = print_r($_POST, TRUE); |
|
189 | + echo "<pre>Wrong parameters in POST: |
|
190 | 190 | " . htmlspecialchars(/** @scrutinizer ignore-type */ $wrongcontent) . " |
191 | 191 | </pre>"; |
192 | - exit(1); |
|
192 | + exit(1); |
|
193 | 193 | } |
194 | 194 | |
195 | 195 | // send, and invalidate the token immediately if the mail could not be sent! |
@@ -20,7 +20,7 @@ discard block |
||
20 | 20 | * <base_url>/copyright.php after deploying the software |
21 | 21 | */ |
22 | 22 | |
23 | -require_once dirname(dirname(dirname(__DIR__))) . "/config/_config.php"; |
|
23 | +require_once dirname(dirname(dirname(__DIR__)))."/config/_config.php"; |
|
24 | 24 | |
25 | 25 | $auth = new \web\lib\admin\Authentication(); |
26 | 26 | $auth->authenticate(); |
@@ -102,9 +102,9 @@ discard block |
||
102 | 102 | $idp = $validator->existingIdP($_GET['inst_id']); |
103 | 103 | // editing IdPs is done from within the popup. When we're done, send the |
104 | 104 | // user back to the popup (append the result of the operation later) |
105 | - $redirectDestination = "manageAdmins.inc.php?inst_id=" . $idp->identifier . "&"; |
|
105 | + $redirectDestination = "manageAdmins.inc.php?inst_id=".$idp->identifier."&"; |
|
106 | 106 | if (count($validAddresses) == 0) { |
107 | - header("Location: $redirectDestination" . "invitation=INVALIDSYNTAX"); |
|
107 | + header("Location: $redirectDestination"."invitation=INVALIDSYNTAX"); |
|
108 | 108 | exit(1); |
109 | 109 | } |
110 | 110 | // is the user primary admin of this IdP? |
@@ -113,13 +113,13 @@ discard block |
||
113 | 113 | $fedadmin = $userObject->isFederationAdmin($idp->federation); |
114 | 114 | // check if he is either one, if not, complain |
115 | 115 | if (!$is_owner && !$fedadmin) { |
116 | - echo "<p>" . sprintf(_("Something's wrong... you are a %s admin, but not for the %s the requested %s belongs to!"), $uiElements->nomenclatureFed, $uiElements->nomenclatureFed, $uiElements->nomenclatureParticipant) . "</p>"; |
|
116 | + echo "<p>".sprintf(_("Something's wrong... you are a %s admin, but not for the %s the requested %s belongs to!"), $uiElements->nomenclatureFed, $uiElements->nomenclatureFed, $uiElements->nomenclatureParticipant)."</p>"; |
|
117 | 117 | exit(1); |
118 | 118 | } |
119 | 119 | |
120 | 120 | $prettyprintname = $idp->name; |
121 | 121 | $newtokens = $mgmt->createTokens($fedadmin, $validAddresses, $idp); |
122 | - $loggerInstance->writeAudit($_SESSION['user'], "NEW", "IdP " . $idp->identifier . " - Token created for " . implode(",", $validAddresses)); |
|
122 | + $loggerInstance->writeAudit($_SESSION['user'], "NEW", "IdP ".$idp->identifier." - Token created for ".implode(",", $validAddresses)); |
|
123 | 123 | $introtext = "CO-ADMIN"; |
124 | 124 | $participant_type = $idp->type; |
125 | 125 | break; |
@@ -135,7 +135,7 @@ discard block |
||
135 | 135 | $participant_type = $validator->partType($_POST['participant_type']); |
136 | 136 | $new_idp_authorized_fedadmin = $userObject->isFederationAdmin($newcountry); |
137 | 137 | if ($new_idp_authorized_fedadmin !== TRUE) { |
138 | - throw new Exception("Something's wrong... you want to create a new " . $uiElements->nomenclatureParticipant . ", but are not a " . $uiElements->nomenclatureFed . " admin for the " . $uiElements->nomenclatureFed . " it should be in!"); |
|
138 | + throw new Exception("Something's wrong... you want to create a new ".$uiElements->nomenclatureParticipant.", but are not a ".$uiElements->nomenclatureFed." admin for the ".$uiElements->nomenclatureFed." it should be in!"); |
|
139 | 139 | } |
140 | 140 | $federation = $validator->existingFederation($newcountry); |
141 | 141 | $prettyprintname = $newinstname; |
@@ -143,7 +143,7 @@ discard block |
||
143 | 143 | // send the user back to his federation overview page, append the result of the operation later |
144 | 144 | // do the token creation magic |
145 | 145 | $newtokens = $mgmt->createTokens(TRUE, $validAddresses, $newinstname, 0, $newcountry, $participant_type); |
146 | - $loggerInstance->writeAudit($_SESSION['user'], "NEW", "ORG FUTURE - Token created for $participant_type " . implode(",", $validAddresses)); |
|
146 | + $loggerInstance->writeAudit($_SESSION['user'], "NEW", "ORG FUTURE - Token created for $participant_type ".implode(",", $validAddresses)); |
|
147 | 147 | break; |
148 | 148 | case OPERATION_MODE_NEWFROMDB: |
149 | 149 | $redirectDestination = "../overview_federation.php?"; |
@@ -156,7 +156,7 @@ discard block |
||
156 | 156 | $extinfo = $catInstance->getExternalDBEntityDetails($newexternalid); |
157 | 157 | $new_idp_authorized_fedadmin = $userObject->isFederationAdmin($extinfo['country']); |
158 | 158 | if ($new_idp_authorized_fedadmin !== TRUE) { |
159 | - throw new Exception("Something's wrong... you want to create a new " . $uiElements->nomenclatureParticipant . ", but are not a " . $uiElements->nomenclatureFed . " admin for the " . $uiElements->nomenclatureFed . " it should be in!"); |
|
159 | + throw new Exception("Something's wrong... you want to create a new ".$uiElements->nomenclatureParticipant.", but are not a ".$uiElements->nomenclatureFed." admin for the ".$uiElements->nomenclatureFed." it should be in!"); |
|
160 | 160 | } |
161 | 161 | $federation = $validator->existingFederation($extinfo['country']); |
162 | 162 | $newcountry = $extinfo['country']; |
@@ -180,14 +180,14 @@ discard block |
||
180 | 180 | $introtext = "EXISTING-FED"; |
181 | 181 | // do the token creation magic |
182 | 182 | $newtokens = $mgmt->createTokens(TRUE, $validAddresses, $prettyprintname, $newexternalid); |
183 | - $loggerInstance->writeAudit($_SESSION['user'], "NEW", "IdP FUTURE - Token created for " . implode(",", $validAddresses)); |
|
183 | + $loggerInstance->writeAudit($_SESSION['user'], "NEW", "IdP FUTURE - Token created for ".implode(",", $validAddresses)); |
|
184 | 184 | break; |
185 | 185 | default: // includes OPERATION_MODE_INVALID |
186 | 186 | // second param is TRUE, so the variable *will* contain a string |
187 | 187 | // i.e. ignore Scrutinizer type warning later |
188 | 188 | $wrongcontent = print_r($_POST, TRUE); |
189 | 189 | echo "<pre>Wrong parameters in POST: |
190 | -" . htmlspecialchars(/** @scrutinizer ignore-type */ $wrongcontent) . " |
|
190 | +" . htmlspecialchars(/** @scrutinizer ignore-type */ $wrongcontent)." |
|
191 | 191 | </pre>"; |
192 | 192 | exit(1); |
193 | 193 | } |
@@ -212,14 +212,14 @@ discard block |
||
212 | 212 | } |
213 | 213 | |
214 | 214 | if (count($status) == 0) { |
215 | - header("Location: $redirectDestination" . "invitation=FAILURE"); |
|
215 | + header("Location: $redirectDestination"."invitation=FAILURE"); |
|
216 | 216 | exit; |
217 | 217 | } |
218 | 218 | $finalDestParams = "invitation=SUCCESS"; |
219 | 219 | if (count($status) < count($totalSegments)) { // only a subset of mails was sent, update status |
220 | 220 | $finalDestParams = "invitation=PARTIAL"; |
221 | 221 | } |
222 | -$finalDestParams .= "&successcount=" . count($status); |
|
222 | +$finalDestParams .= "&successcount=".count($status); |
|
223 | 223 | if ($allEncrypted === TRUE) { |
224 | 224 | $finalDestParams .= "&transportsecurity=ENCRYPTED"; |
225 | 225 | } elseif ($allClear === TRUE) { |
@@ -228,4 +228,4 @@ discard block |
||
228 | 228 | $finalDestParams .= "&transportsecurity=PARTIAL"; |
229 | 229 | } |
230 | 230 | |
231 | -header("Location: $redirectDestination" . $finalDestParams); |
|
231 | +header("Location: $redirectDestination".$finalDestParams); |
@@ -20,7 +20,7 @@ discard block |
||
20 | 20 | */ |
21 | 21 | ?> |
22 | 22 | <?php |
23 | -require_once dirname(dirname(dirname(dirname(__FILE__)))) . "/config/_config.php"; |
|
23 | +require_once dirname(dirname(dirname(dirname(__FILE__))))."/config/_config.php"; |
|
24 | 24 | |
25 | 25 | $auth = new \web\lib\admin\Authentication(); |
26 | 26 | $auth->authenticate(); |
@@ -35,7 +35,7 @@ discard block |
||
35 | 35 | |
36 | 36 | // if we have a pushed close button, submit attributes and send user back to the overview page |
37 | 37 | // if external DB sync is disabled globally, the user never gets to this page. If he came here *anyway* -> send him back immediately. |
38 | -if ((isset($_POST['submitbutton']) && $_POST['submitbutton'] == web\lib\common\FormElements::BUTTON_CLOSE ) || \config\Master::DB['enforce-external-sync'] == FALSE) { |
|
38 | +if ((isset($_POST['submitbutton']) && $_POST['submitbutton'] == web\lib\common\FormElements::BUTTON_CLOSE) || \config\Master::DB['enforce-external-sync'] == FALSE) { |
|
39 | 39 | header("Location: ../overview_federation.php"); |
40 | 40 | exit; |
41 | 41 | } |
@@ -92,9 +92,9 @@ discard block |
||
92 | 92 | $cat = new \core\CAT(); |
93 | 93 | switch ($my_inst->getExternalDBSyncState()) { |
94 | 94 | case \core\IdP::EXTERNAL_DB_SYNCSTATE_SYNCED: |
95 | - printf(_("This %s is linked to the %s database."), $uiElements->nomenclatureParticipant, \config\ConfAssistant::CONSORTIUM['display_name']) . "</p>"; |
|
96 | - echo "<p>" . sprintf(_("The following information about the IdP is stored in the %s DB and %s DB:"), \config\Master::APPEARANCE['productname'], \config\ConfAssistant::CONSORTIUM['display_name']) . "</p>"; |
|
97 | - echo "<table><tr><td>" . sprintf(_("Information in <strong>%s Database</strong>"), \config\Master::APPEARANCE['productname']) . "</td><td>" . sprintf(_("Information in <strong>%s Database</strong>"), \config\ConfAssistant::CONSORTIUM['display_name']) . "</td></tr>"; |
|
95 | + printf(_("This %s is linked to the %s database."), $uiElements->nomenclatureParticipant, \config\ConfAssistant::CONSORTIUM['display_name'])."</p>"; |
|
96 | + echo "<p>".sprintf(_("The following information about the IdP is stored in the %s DB and %s DB:"), \config\Master::APPEARANCE['productname'], \config\ConfAssistant::CONSORTIUM['display_name'])."</p>"; |
|
97 | + echo "<table><tr><td>".sprintf(_("Information in <strong>%s Database</strong>"), \config\Master::APPEARANCE['productname'])."</td><td>".sprintf(_("Information in <strong>%s Database</strong>"), \config\ConfAssistant::CONSORTIUM['display_name'])."</td></tr>"; |
|
98 | 98 | echo "<tr><td>"; |
99 | 99 | // left-hand side: CAT DB |
100 | 100 | echo "<table>"; |
@@ -106,7 +106,7 @@ discard block |
||
106 | 106 | } else { |
107 | 107 | $language = \config\Master::LANGUAGES[$name['lang']]['display'] ?? "(unsupported language)"; |
108 | 108 | } |
109 | - echo "<tr><td>" . sprintf(_("%s Name (%s)"), $uiElements->nomenclatureParticipant, $language) . "</td><td>" . $name['value'] . "</td></tr>"; |
|
109 | + echo "<tr><td>".sprintf(_("%s Name (%s)"), $uiElements->nomenclatureParticipant, $language)."</td><td>".$name['value']."</td></tr>"; |
|
110 | 110 | } |
111 | 111 | |
112 | 112 | $admins = $my_inst->listOwners(); |
@@ -117,7 +117,7 @@ discard block |
||
117 | 117 | if (count($username) == 0) { |
118 | 118 | $username[0]['value'] = _("Unnamed User"); |
119 | 119 | } |
120 | - echo "<tr><td>" . _("Administrator [invited as]") . "</td><td>" . $username[0]['value'] . " [" . $admin['MAIL'] . "]</td></tr>"; |
|
120 | + echo "<tr><td>"._("Administrator [invited as]")."</td><td>".$username[0]['value']." [".$admin['MAIL']."]</td></tr>"; |
|
121 | 121 | } |
122 | 122 | echo "</table>"; |
123 | 123 | // end of left-hand side |
@@ -125,38 +125,38 @@ discard block |
||
125 | 125 | // right-hand side: external DB |
126 | 126 | $externalid = $my_inst->getExternalDBId(); |
127 | 127 | if (is_bool($externalid)) { // we are in SYNCED state so this cannot happen |
128 | - throw new Exception("We are in SYNCSTATE_SYNCED but still there is no external DB Id available for the " . $uiElements->nomenclatureParticipant . "!"); |
|
128 | + throw new Exception("We are in SYNCSTATE_SYNCED but still there is no external DB Id available for the ".$uiElements->nomenclatureParticipant."!"); |
|
129 | 129 | } |
130 | 130 | |
131 | 131 | $extinfo = $cat->getExternalDBEntityDetails($externalid); |
132 | 132 | |
133 | 133 | echo "<table>"; |
134 | 134 | foreach ($extinfo['names'] as $lang => $name) { |
135 | - echo "<tr><td>" . sprintf(_("%s Name (%s)"), $uiElements->nomenclatureParticipant, $lang) . "</td><td>$name</td>"; |
|
135 | + echo "<tr><td>".sprintf(_("%s Name (%s)"), $uiElements->nomenclatureParticipant, $lang)."</td><td>$name</td>"; |
|
136 | 136 | } |
137 | 137 | foreach ($extinfo['admins'] as $number => $admin_details) { |
138 | - echo "<tr><td>" . _("Administrator email") . "</td><td>" . $admin_details['email'] . "</td></tr>"; |
|
138 | + echo "<tr><td>"._("Administrator email")."</td><td>".$admin_details['email']."</td></tr>"; |
|
139 | 139 | } |
140 | 140 | echo "</table>"; |
141 | 141 | // end of right-hand side |
142 | 142 | echo "</td></tr></table>"; |
143 | - echo "<p>" . _("If this mapping is not correct any more, you can remove the link:") . " "; |
|
143 | + echo "<p>"._("If this mapping is not correct any more, you can remove the link:")." "; |
|
144 | 144 | echo "<form name='form-unlink-inst' action='inc/manageDBLink.inc.php?inst_id=$my_inst->identifier' method='post' accept-charset='UTF-8'>"; |
145 | - echo "<button type='submit' class='delete' name='submitbutton' id='submit' value='" . web\lib\common\FormElements::BUTTON_DELETE . "'>" . _("Unlink") . "</button></form>"; |
|
145 | + echo "<button type='submit' class='delete' name='submitbutton' id='submit' value='".web\lib\common\FormElements::BUTTON_DELETE."'>"._("Unlink")."</button></form>"; |
|
146 | 146 | break; |
147 | 147 | case \core\IdP::EXTERNAL_DB_SYNCSTATE_NOT_SYNCED: |
148 | 148 | $temparray = []; |
149 | - printf(_("This %s is not yet linked to the %s database."), $uiElements->nomenclatureParticipant, \config\ConfAssistant::CONSORTIUM['display_name']) . " "; |
|
150 | - echo "<strong>" . _("This means that its profiles are not made available on the user download page.") . "</strong> "; |
|
149 | + printf(_("This %s is not yet linked to the %s database."), $uiElements->nomenclatureParticipant, \config\ConfAssistant::CONSORTIUM['display_name'])." "; |
|
150 | + echo "<strong>"._("This means that its profiles are not made available on the user download page.")."</strong> "; |
|
151 | 151 | printf(_("You can link it to the %s database below."), \config\ConfAssistant::CONSORTIUM['display_name']); |
152 | 152 | $candidates = $my_inst->getExternalDBSyncCandidates($my_inst->type); |
153 | 153 | echo "<br/><form name='form-link-inst' action='inc/manageDBLink.inc.php?inst_id=$my_inst->identifier' method='post' accept-charset='UTF-8'>"; |
154 | - printf(_("Please select an entity from the %s DB which corresponds to this CAT %s."), \config\ConfAssistant::CONSORTIUM['display_name'], $uiElements->nomenclatureParticipant) . " "; |
|
154 | + printf(_("Please select an entity from the %s DB which corresponds to this CAT %s."), \config\ConfAssistant::CONSORTIUM['display_name'], $uiElements->nomenclatureParticipant)." "; |
|
155 | 155 | if (count($candidates) > 0) { |
156 | 156 | printf(_("Particularly promising entries (names in CAT and %s DB are a 100%% match) are on top of the list."), \config\ConfAssistant::CONSORTIUM['display_name']); |
157 | 157 | } |
158 | 158 | echo "<table>"; |
159 | - echo "<tr><th>" . _("Link to this entity?") . "</th><th>" . sprintf(_("%s Name"), $uiElements->nomenclatureParticipant) . "</th><th>" . _("Administrators") . "</th></tr>"; |
|
159 | + echo "<tr><th>"._("Link to this entity?")."</th><th>".sprintf(_("%s Name"), $uiElements->nomenclatureParticipant)."</th><th>"._("Administrators")."</th></tr>"; |
|
160 | 160 | |
161 | 161 | foreach ($candidates as $candidate) { |
162 | 162 | $info = $cat->getExternalDBEntityDetails($candidate); |
@@ -166,7 +166,7 @@ discard block |
||
166 | 166 | } |
167 | 167 | echo "</td><td>"; |
168 | 168 | foreach ($info['admins'] as $number => $admin_details) { |
169 | - echo "[E-Mail] " . $admin_details['email'] . "<br/>"; |
|
169 | + echo "[E-Mail] ".$admin_details['email']."<br/>"; |
|
170 | 170 | } |
171 | 171 | echo "</td></tr>"; |
172 | 172 | $temparray[] = $candidate; |
@@ -178,7 +178,7 @@ discard block |
||
178 | 178 | $buffer = ""; |
179 | 179 | |
180 | 180 | foreach ($unmappedentities as $v) { |
181 | - $buffer .= "<option value='" . $v['ID'] . "'>[ID " . $v['ID'] . "] " . $v['name'] . "</option>"; |
|
181 | + $buffer .= "<option value='".$v['ID']."'>[ID ".$v['ID']."] ".$v['name']."</option>"; |
|
182 | 182 | } |
183 | 183 | |
184 | 184 | if ($buffer != "") { |
@@ -189,9 +189,9 @@ discard block |
||
189 | 189 | } |
190 | 190 | // issue a big red warning if there are no link candidates at all in the federation |
191 | 191 | if (empty($buffer) && empty($candidates)) { |
192 | - echo "<tr><td style='color:#ff0000' colspan='2'>" . sprintf(_('There is no single unmapped %s in the external database for this %s!'), $uiElements->nomenclatureParticipant, $uiElements->nomenclatureFed) . "</td></tr>"; |
|
192 | + echo "<tr><td style='color:#ff0000' colspan='2'>".sprintf(_('There is no single unmapped %s in the external database for this %s!'), $uiElements->nomenclatureParticipant, $uiElements->nomenclatureFed)."</td></tr>"; |
|
193 | 193 | } |
194 | - echo "</table><button type='submit' name='submitbutton' id='submit' value='" . web\lib\common\FormElements::BUTTON_SAVE . "' disabled >" . _("Create Link") . "</button></form>"; |
|
194 | + echo "</table><button type='submit' name='submitbutton' id='submit' value='".web\lib\common\FormElements::BUTTON_SAVE."' disabled >"._("Create Link")."</button></form>"; |
|
195 | 195 | break; |
196 | 196 | default: |
197 | 197 | } |
@@ -20,7 +20,7 @@ discard block |
||
20 | 20 | */ |
21 | 21 | ?> |
22 | 22 | <?php |
23 | -require_once dirname(dirname(dirname(dirname(__FILE__)))) . "/config/_config.php"; |
|
23 | +require_once dirname(dirname(dirname(dirname(__FILE__))))."/config/_config.php"; |
|
24 | 24 | |
25 | 25 | $auth = new \web\lib\admin\Authentication(); |
26 | 26 | $uiElements = new \web\lib\admin\UIElements(); |
@@ -57,30 +57,30 @@ discard block |
||
57 | 57 | <?php |
58 | 58 | echo sprintf(_("On this page, you can add a new %s to your %s. Please fill out the form below to send out an email invitation to the new %s administrator."), $uiElements->nomenclatureParticipant, $uiElements->nomenclatureFed, $uiElements->nomenclatureParticipant); |
59 | 59 | if (\config\Master::DB['enforce-external-sync']) { |
60 | - echo "<p>" . sprintf(_("You can either register a known %s (as defined in the %s database) or create a totally new %s."), $uiElements->nomenclatureParticipant, \config\ConfAssistant::CONSORTIUM['display_name'], $uiElements->nomenclatureParticipant) . "</p>"; |
|
61 | - echo "<p>" . sprintf(_("The latter one is typically for an %s which is yet in a testing phase and therefore doesn't appear in the %s database yet."), $uiElements->nomenclatureParticipant, \config\ConfAssistant::CONSORTIUM['display_name']) . "</p>"; |
|
60 | + echo "<p>".sprintf(_("You can either register a known %s (as defined in the %s database) or create a totally new %s."), $uiElements->nomenclatureParticipant, \config\ConfAssistant::CONSORTIUM['display_name'], $uiElements->nomenclatureParticipant)."</p>"; |
|
61 | + echo "<p>".sprintf(_("The latter one is typically for an %s which is yet in a testing phase and therefore doesn't appear in the %s database yet."), $uiElements->nomenclatureParticipant, \config\ConfAssistant::CONSORTIUM['display_name'])."</p>"; |
|
62 | 62 | } |
63 | 63 | ?> |
64 | 64 | <hr/> |
65 | 65 | <img alt='Loading ...' src='../resources/images/icons/loading51.gif' id='spin' style='position:absolute;left: 50%; top: 50%; transform: translate(-100px, -50px); display:none;'> |
66 | 66 | <form name='sendinvite' action='inc/sendinvite.inc.php' method='post' accept-charset='UTF-8'> |
67 | 67 | <table> |
68 | - <caption><?php echo _("Invitation Details");?></caption> |
|
68 | + <caption><?php echo _("Invitation Details"); ?></caption> |
|
69 | 69 | <tr> |
70 | - <th class="wai-invisible" scope="col"><?php echo _("From database or ad-hoc?");?></th> |
|
71 | - <th class="wai-invisible" scope="col"><?php echo _("Name");?></th> |
|
72 | - <th class="wai-invisible" scope="col"><?php echo _("Type");?></th> |
|
73 | - <th class="wai-invisible" scope="col"><?php echo _("Country");?></th> |
|
70 | + <th class="wai-invisible" scope="col"><?php echo _("From database or ad-hoc?"); ?></th> |
|
71 | + <th class="wai-invisible" scope="col"><?php echo _("Name"); ?></th> |
|
72 | + <th class="wai-invisible" scope="col"><?php echo _("Type"); ?></th> |
|
73 | + <th class="wai-invisible" scope="col"><?php echo _("Country"); ?></th> |
|
74 | 74 | </tr> |
75 | 75 | <?php |
76 | 76 | if (\config\Master::DB['enforce-external-sync']) { |
77 | 77 | echo "<tr><td> |
78 | - <input type='radio' name='creation' value='existing'>" . sprintf(_("Existing %s:"), $uiElements->nomenclatureParticipant) . "</input> |
|
78 | + <input type='radio' name='creation' value='existing'>" . sprintf(_("Existing %s:"), $uiElements->nomenclatureParticipant)."</input> |
|
79 | 79 | </td>"; |
80 | 80 | |
81 | 81 | echo "<td colspan='3'> |
82 | 82 | <select id='externals' name='externals' onchange='document.sendinvite.creation[0].checked=true; document.sendinvite.mailaddr.value=this.options[this.selectedIndex].id;'> |
83 | - <option value='FREETEXT'>" . sprintf(_("--- select %s here ---"),$uiElements->nomenclatureParticipant) . "</option>"; |
|
83 | + <option value='FREETEXT'>" . sprintf(_("--- select %s here ---"), $uiElements->nomenclatureParticipant)."</option>"; |
|
84 | 84 | |
85 | 85 | foreach ($feds as $fed_value) { |
86 | 86 | $thefed = new \core\Federation(strtoupper($fed_value['value'])); |
@@ -89,7 +89,7 @@ discard block |
||
89 | 89 | $entities = $thefed->listExternalEntities(TRUE, NULL); |
90 | 90 | |
91 | 91 | foreach ($entities as $v) { |
92 | - echo "<option id='" . $v['contactlist'] . "' value='" . $v['ID'] . "'>[" . $fed_value['value'] . "] " . $v['name'] . "</option>"; |
|
92 | + echo "<option id='".$v['contactlist']."' value='".$v['ID']."'>[".$fed_value['value']."] ".$v['name']."</option>"; |
|
93 | 93 | } |
94 | 94 | } |
95 | 95 | |
@@ -98,16 +98,16 @@ discard block |
||
98 | 98 | ?> |
99 | 99 | <tr> |
100 | 100 | <td> |
101 | - <input type='radio' name='creation' value='new'><?php echo sprintf(_("New %s"),$uiElements->nomenclatureParticipant); ?></input> |
|
101 | + <input type='radio' name='creation' value='new'><?php echo sprintf(_("New %s"), $uiElements->nomenclatureParticipant); ?></input> |
|
102 | 102 | </td> |
103 | 103 | <td> |
104 | 104 | <?php echo _("Name"); ?><input type='text' size='30' id='name' name='name' onchange='document.sendinvite.creation[1].checked = true'/> |
105 | 105 | </td> |
106 | 106 | <td> |
107 | 107 | <select name="participant_type"> |
108 | - <option value="IdPSP" selected><?php printf(_("%s and %s"),$uiElements->nomenclatureIdP, $uiElements->nomenclatureHotspot)?></option> |
|
109 | - <option value="IdP"><?php printf(_("%s"),$uiElements->nomenclatureIdP)?></option> |
|
110 | - <option value="SP"><?php printf(_("%s"),$uiElements->nomenclatureHotspot)?></option> |
|
108 | + <option value="IdPSP" selected><?php printf(_("%s and %s"), $uiElements->nomenclatureIdP, $uiElements->nomenclatureHotspot)?></option> |
|
109 | + <option value="IdP"><?php printf(_("%s"), $uiElements->nomenclatureIdP)?></option> |
|
110 | + <option value="SP"><?php printf(_("%s"), $uiElements->nomenclatureHotspot)?></option> |
|
111 | 111 | </select> |
112 | 112 | </td> |
113 | 113 | <td><?php echo $uiElements->nomenclatureFed; ?> |
@@ -20,7 +20,7 @@ discard block |
||
20 | 20 | */ |
21 | 21 | ?> |
22 | 22 | <?php |
23 | -require_once dirname(dirname(dirname(dirname(__FILE__)))) . "/config/_config.php"; |
|
23 | +require_once dirname(dirname(dirname(dirname(__FILE__))))."/config/_config.php"; |
|
24 | 24 | |
25 | 25 | $auth = new \web\lib\admin\Authentication(); |
26 | 26 | $languageInstance = new \core\common\Language(); |
@@ -82,7 +82,7 @@ discard block |
||
82 | 82 | $ownermgmt = new \core\UserManagement(); |
83 | 83 | $ownermgmt->addAdminToIdp($my_inst, $_SESSION['user']); |
84 | 84 | } else { |
85 | - echo "Fatal Error: you wanted to take control over an " . \config\ConfAssistant::CONSORTIUM['nomenclature_participant'] . ", but are not a " . \config\ConfAssistant::CONSORTIUM['nomenclature_federation'] . " operator!"; |
|
85 | + echo "Fatal Error: you wanted to take control over an ".\config\ConfAssistant::CONSORTIUM['nomenclature_participant'].", but are not a ".\config\ConfAssistant::CONSORTIUM['nomenclature_federation']." operator!"; |
|
86 | 86 | exit(1); |
87 | 87 | } |
88 | 88 | break; |
@@ -118,7 +118,7 @@ discard block |
||
118 | 118 | default: |
119 | 119 | throw new Exception("Error: unknown encryption status of invitation!?!"); |
120 | 120 | } |
121 | - echo $uiElements->boxRemark(ngettext("The invitation email was sent successfully.", "All invitation emails were sent successfully.", $counter) . " " . $cryptText, _("Sent successfully.")); |
|
121 | + echo $uiElements->boxRemark(ngettext("The invitation email was sent successfully.", "All invitation emails were sent successfully.", $counter)." ".$cryptText, _("Sent successfully.")); |
|
122 | 122 | break; |
123 | 123 | case "FAILURE": |
124 | 124 | echo $uiElements->boxError(_("No invitation email could be sent!"), _("Sending failure!")); |
@@ -138,7 +138,7 @@ discard block |
||
138 | 138 | default: |
139 | 139 | throw new Exception("Error: unknown encryption status of invitation!?!"); |
140 | 140 | } |
141 | - echo $uiElements->boxWarning(sprintf(_("Some invitation emails were sent successfully (%s in total), the others failed."), $counter) . " " . $cryptText, _("Partial success.")); |
|
141 | + echo $uiElements->boxWarning(sprintf(_("Some invitation emails were sent successfully (%s in total), the others failed."), $counter)." ".$cryptText, _("Partial success.")); |
|
142 | 142 | break; |
143 | 143 | case "INVALIDSYNTAX": |
144 | 144 | echo $uiElements->boxError(_("The invitation email address was malformed, no invitation was sent!"), _("The invitation email address was malformed, no invitation was sent!")); |
@@ -190,7 +190,7 @@ discard block |
||
190 | 190 | <?php echo $invite; ?> |
191 | 191 | </td> |
192 | 192 | <td> |
193 | - <form action='inc/manageAdmins.inc.php?inst_id=<?php echo $my_inst->identifier ?>' method='post' <?php echo ( $oneowner['ID'] != $_SESSION['user'] ? "onsubmit='popupRedirectWindow(this); return false;'" : "" ); ?> accept-charset='UTF-8'> |
|
193 | + <form action='inc/manageAdmins.inc.php?inst_id=<?php echo $my_inst->identifier ?>' method='post' <?php echo ($oneowner['ID'] != $_SESSION['user'] ? "onsubmit='popupRedirectWindow(this); return false;'" : ""); ?> accept-charset='UTF-8'> |
|
194 | 194 | <input type='hidden' name='admin_id' value='<?php echo $oneowner['ID']; ?>'></input> |
195 | 195 | <button type='submit' name='submitbutton' class='delete' value='<?php echo web\lib\common\FormElements::BUTTON_DELETE; ?>'><?php echo _("Delete Administrator") ?></button> |
196 | 196 | </form> |
@@ -207,10 +207,10 @@ discard block |
||
207 | 207 | $loggerInstance = new \core\common\Logging(); |
208 | 208 | $loggerInstance->debug(4, "Displaying pending invitations for $my_inst->identifier.\n"); |
209 | 209 | if (count($pending_invites) > 0) { |
210 | - echo "<strong>" . _("Pending invitations for this IdP") . "</strong>"; |
|
210 | + echo "<strong>"._("Pending invitations for this IdP")."</strong>"; |
|
211 | 211 | echo "<table>"; |
212 | 212 | foreach ($pending_invites as $invitee) { |
213 | - echo "<tr><td>" . $invitee['mail'] . "</td><td>" . sprintf(_("(expires %s)"), $invitee['expiry']) . "</td></tr>"; |
|
213 | + echo "<tr><td>".$invitee['mail']."</td><td>".sprintf(_("(expires %s)"), $invitee['expiry'])."</td></tr>"; |
|
214 | 214 | } |
215 | 215 | echo "</table>"; |
216 | 216 | } |
@@ -232,7 +232,7 @@ discard block |
||
232 | 232 | |
233 | 233 | if (!$is_admin_himself) { |
234 | 234 | echo "<form action='inc/manageAdmins.inc.php?inst_id=$my_inst->identifier' method='post' onsubmit='popupRedirectWindow(this); return false;' accept-charset='UTF-8'> |
235 | - <button type='submit' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_TAKECONTROL . "'>" . sprintf(_("Take control of this %s"), $uiElements->nomenclatureParticipant) . "</button> |
|
235 | + <button type='submit' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_TAKECONTROL."'>".sprintf(_("Take control of this %s"), $uiElements->nomenclatureParticipant)."</button> |
|
236 | 236 | </form>"; |
237 | 237 | } |
238 | 238 | } |
@@ -522,7 +522,7 @@ discard block |
||
522 | 522 | if ( |
523 | 523 | get_class($this) == "devices\apple_mobileconfig\DeviceMobileconfigIos12plus" || |
524 | 524 | get_class($this) == "devices\apple_mobileconfig\DeviceMobileconfigOsX" |
525 | - ) { |
|
525 | + ) { |
|
526 | 526 | return "WPA2"; |
527 | 527 | } else { |
528 | 528 | return "WPA"; |
@@ -809,7 +809,7 @@ discard block |
||
809 | 809 | \core\common\Entity::$nomenclature_idp, |
810 | 810 | count($this->CAsAccountedFor)+1, |
811 | 811 | ($ca['root'] ? _("Root") : _("Intermediate"))) . |
812 | - "</string> |
|
812 | + "</string> |
|
813 | 813 | <key>PayloadIdentifier</key> |
814 | 814 | <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
815 | 815 | <key>PayloadOrganization</key> |
@@ -145,7 +145,7 @@ discard block |
||
145 | 145 | \core\common\Entity::intoThePotatoes(); |
146 | 146 | // that's what all variants support. Sub-classes can change it. |
147 | 147 | $this->setSupportedEapMethods([\core\common\EAP::EAPTYPE_PEAP_MSCHAP2, \core\common\EAP::EAPTYPE_TTLS_PAP, \core\common\EAP::EAPTYPE_TTLS_MSCHAP2, \core\common\EAP::EAPTYPE_SILVERBULLET]); |
148 | - foreach(\core\common\EAP::listKnownEAPTypes() as $eapType) { |
|
148 | + foreach (\core\common\EAP::listKnownEAPTypes() as $eapType) { |
|
149 | 149 | if ($eapType->isPasswordRequired() || $eapType->isPasswordOptional()) { |
150 | 150 | $this->specialities['internal:verify_userinput_suffix'][serialize($eapType->getArrayRep())] = _("It is not possible to actively verify the user input for suffix match; but if there is no 'Terms of Use' configured, the installer will display a corresponding hint to the user instead."); |
151 | 151 | $this->specialities['media:consortium_OI'][serialize($eapType->getArrayRep())] = _("Passpoint networks are not provisioned due to severe UI limitations during install time."); |
@@ -184,15 +184,15 @@ discard block |
||
184 | 184 | <key>PayloadDescription</key> |
185 | 185 | <string>$tagline</string> |
186 | 186 | <key>PayloadDisplayName</key> |
187 | - <string>" . \config\ConfAssistant::CONSORTIUM['display_name'] . "</string> |
|
187 | + <string>".\config\ConfAssistant::CONSORTIUM['display_name']."</string> |
|
188 | 188 | <key>PayloadIdentifier</key> |
189 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang</string> |
|
189 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang</string> |
|
190 | 190 | <key>PayloadOrganization</key> |
191 | - <string>" . htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['general:instname'][0]), ENT_XML1, 'UTF-8') . ( $this->attributes['internal:profile_count'][0] > 1 ? " (" . htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['profile:name'][0]), ENT_XML1, 'UTF-8') . ")" : "") . "</string> |
|
191 | + <string>".htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['general:instname'][0]), ENT_XML1, 'UTF-8').($this->attributes['internal:profile_count'][0] > 1 ? " (".htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['profile:name'][0]), ENT_XML1, 'UTF-8').")" : "")."</string> |
|
192 | 192 | <key>PayloadType</key> |
193 | 193 | <string>Configuration</string> |
194 | 194 | <key>PayloadUUID</key> |
195 | - <string>" . \core\common\Entity::uuid('', self::IPHONE_PAYLOAD_PREFIX . $this->massagedConsortium . $this->massagedCountry . $this->massagedInst . $this->massagedProfile) . "</string> |
|
195 | + <string>" . \core\common\Entity::uuid('', self::IPHONE_PAYLOAD_PREFIX.$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile)."</string> |
|
196 | 196 | <key>PayloadVersion</key> |
197 | 197 | <integer>1</integer>"; |
198 | 198 | \core\common\Entity::outOfThePotatoes(); |
@@ -224,21 +224,21 @@ discard block |
||
224 | 224 | { |
225 | 225 | \core\common\Entity::intoThePotatoes(); |
226 | 226 | if (isset($this->attributes['support:info_file'])) { |
227 | - return MobileconfigSuperclass::BUFFER_CONSENT_PRE . htmlspecialchars(iconv("UTF-8", "UTF-8//TRANSLIT", $this->attributes['support:info_file'][0]), ENT_XML1, 'UTF-8') . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
227 | + return MobileconfigSuperclass::BUFFER_CONSENT_PRE.htmlspecialchars(iconv("UTF-8", "UTF-8//TRANSLIT", $this->attributes['support:info_file'][0]), ENT_XML1, 'UTF-8').MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
228 | 228 | } |
229 | 229 | if ($this->attributes['internal:verify_userinput_suffix'][0] != 0) { |
230 | 230 | if ($this->attributes['internal:hint_userinput_suffix'][0] != 0) { |
231 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . sprintf(_("Important Notice: your username MUST end exactly with '...@%s' !"), $this->attributes['internal:realm'][0]) . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
231 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE.sprintf(_("Important Notice: your username MUST end exactly with '...@%s' !"), $this->attributes['internal:realm'][0]).MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
232 | 232 | \core\common\Entity::outOfThePotatoes(); |
233 | 233 | return $retval; |
234 | 234 | } else { |
235 | 235 | if (strlen($this->attributes['internal:realm'][0]) > 0) { |
236 | 236 | /// note space between variable and exclamation mark - makes sure users don't mistakenly think the exclamation mark is part of the required username! |
237 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . sprintf(_("Important Notice: your username MUST contain an '@' and end with ...%s !"), $this->attributes['internal:realm'][0]) . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
237 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE.sprintf(_("Important Notice: your username MUST contain an '@' and end with ...%s !"), $this->attributes['internal:realm'][0]).MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
238 | 238 | \core\common\Entity::outOfThePotatoes(); |
239 | 239 | return $retval; |
240 | 240 | } |
241 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . _("Important Notice: your username MUST be in the form of xxx@yyy where the yyy is a common suffix identifying your Identity Provider. Please find out what to use there and enter the username in the correct format.") . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
241 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE._("Important Notice: your username MUST be in the form of xxx@yyy where the yyy is a common suffix identifying your Identity Provider. Please find out what to use there and enter the username in the correct format.").MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
242 | 242 | \core\common\Entity::outOfThePotatoes(); |
243 | 243 | return $retval; |
244 | 244 | } |
@@ -262,7 +262,7 @@ discard block |
||
262 | 262 | // also escape htmlspecialchars |
263 | 263 | // not all names and profiles have a name, so be prepared |
264 | 264 | |
265 | - $this->loggerInstance->debug(5, "List of available attributes: " . var_export($this->attributes, TRUE)); |
|
265 | + $this->loggerInstance->debug(5, "List of available attributes: ".var_export($this->attributes, TRUE)); |
|
266 | 266 | |
267 | 267 | $this->instName = $this->attributes['general:instname'][0] ?? _("Unnamed Organisation"); |
268 | 268 | $this->profileName = $this->attributes['profile:name'][0] ?? _("Unnamed Profile"); |
@@ -304,7 +304,7 @@ discard block |
||
304 | 304 | |
305 | 305 | file_put_contents('installer_profile', $outputXml); |
306 | 306 | |
307 | - $fileName = $this->installerBasename . '.mobileconfig'; |
|
307 | + $fileName = $this->installerBasename.'.mobileconfig'; |
|
308 | 308 | |
309 | 309 | if (!$this->sign) { |
310 | 310 | rename("installer_profile", $fileName); |
@@ -313,7 +313,7 @@ discard block |
||
313 | 313 | } |
314 | 314 | // still here? Then we are signing. |
315 | 315 | $retval = 0; |
316 | - $signing = system($this->sign . " installer_profile '$fileName' > /dev/null", $retval); |
|
316 | + $signing = system($this->sign." installer_profile '$fileName' > /dev/null", $retval); |
|
317 | 317 | if ($retval !== 0 || $signing === FALSE) { |
318 | 318 | $this->loggerInstance->debug(2, "Signing the mobileconfig installer $fileName FAILED!\n"); |
319 | 319 | // we are passing a name that will be then used as a path - this will not exist, hence an error will |
@@ -340,19 +340,19 @@ discard block |
||
340 | 340 | $oiCount = $oiCount + count($netDetail['oi']); |
341 | 341 | } |
342 | 342 | $certCount = count($this->attributes['internal:CAs'][0]); |
343 | - $out = "<p>" . _("For best results, please use the built-in browser (Safari) to open the configuration file.") . "</p>"; |
|
343 | + $out = "<p>"._("For best results, please use the built-in browser (Safari) to open the configuration file.")."</p>"; |
|
344 | 344 | $out .= "<p>"; |
345 | 345 | $out .= _("The profile will install itself after you click (or tap) the button. You will be asked for confirmation/input at several points:"); |
346 | 346 | $out .= "<ul>"; |
347 | - $out .= "<li>" . _("to install the profile") . "</li>"; |
|
348 | - $out .= "<li>" . ngettext("to accept the server certificate authority", "to accept the server certificate authorities", $certCount); |
|
347 | + $out .= "<li>"._("to install the profile")."</li>"; |
|
348 | + $out .= "<li>".ngettext("to accept the server certificate authority", "to accept the server certificate authorities", $certCount); |
|
349 | 349 | if ($certCount > 1) { |
350 | - $out .= " " . sprintf(_("(%d times)"), $certCount); |
|
350 | + $out .= " ".sprintf(_("(%d times)"), $certCount); |
|
351 | 351 | } |
352 | 352 | $out .= "</li>"; |
353 | - $out .= "<li>" . _("to enter the username and password you have been given by your organisation"); |
|
353 | + $out .= "<li>"._("to enter the username and password you have been given by your organisation"); |
|
354 | 354 | if ($ssidCount > 1) { |
355 | - $out .= " " . sprintf(_("(%d times each, because %d SSIDs and %d Passpoint networks are installed)"), $ssidCount+$oiCount, $ssidCount, $oiCount); |
|
355 | + $out .= " ".sprintf(_("(%d times each, because %d SSIDs and %d Passpoint networks are installed)"), $ssidCount + $oiCount, $ssidCount, $oiCount); |
|
356 | 356 | } |
357 | 357 | $out .= "</li>"; |
358 | 358 | $out .= "</ul>"; |
@@ -392,7 +392,7 @@ discard block |
||
392 | 392 | <key>ServiceProviderRoamingEnabled</key> |
393 | 393 | <true/> |
394 | 394 | <key>DisplayedOperatorName</key> |
395 | - <string>" . $oiName . "</string>"; |
|
395 | + <string>" . $oiName."</string>"; |
|
396 | 396 | // if we don't know the realm, omit the entire DomainName key |
397 | 397 | if (isset($this->attributes['internal:realm'])) { |
398 | 398 | $retval .= "<key>DomainName</key> |
@@ -405,7 +405,7 @@ discard block |
||
405 | 405 | <array>"; |
406 | 406 | |
407 | 407 | foreach ($consortiumOi as $oneCons) { |
408 | - $retval .= "<string>" . strtoupper($oneCons) . "</string>"; |
|
408 | + $retval .= "<string>".strtoupper($oneCons)."</string>"; |
|
409 | 409 | } |
410 | 410 | |
411 | 411 | $retval .= "</array>"; |
@@ -443,7 +443,7 @@ discard block |
||
443 | 443 | <dict> |
444 | 444 | <key>AcceptEAPTypes</key> |
445 | 445 | <array> |
446 | - <integer>" . $eapType['OUTER'] . "</integer> |
|
446 | + <integer>" . $eapType['OUTER']."</integer> |
|
447 | 447 | </array> |
448 | 448 | <key>EAPFASTProvisionPAC</key> |
449 | 449 | <true /> |
@@ -456,7 +456,7 @@ discard block |
||
456 | 456 | "; |
457 | 457 | if ($realm !== NULL) { |
458 | 458 | $retval .= "<key>OuterIdentity</key> |
459 | - <string>" . htmlspecialchars($realm, ENT_XML1, 'UTF-8') . "</string> |
|
459 | + <string>" . htmlspecialchars($realm, ENT_XML1, 'UTF-8')."</string> |
|
460 | 460 | "; |
461 | 461 | } |
462 | 462 | $retval .= "<key>PayloadCertificateAnchorUUID</key> |
@@ -480,11 +480,11 @@ discard block |
||
480 | 480 | $retval .= " |
481 | 481 | </array>"; |
482 | 482 | if ($eapType['INNER'] == \core\common\EAP::NE_SILVERBULLET) { |
483 | - $retval .= "<key>UserName</key><string>" . $this->clientCert["certObject"]->username . "</string>"; |
|
483 | + $retval .= "<key>UserName</key><string>".$this->clientCert["certObject"]->username."</string>"; |
|
484 | 484 | } |
485 | 485 | $retval .= " |
486 | 486 | <key>TTLSInnerAuthentication</key> |
487 | - <string>" . ($eapType['INNER'] == \core\common\EAP::NE_PAP ? "PAP" : "MSCHAPv2") . "</string> |
|
487 | + <string>" . ($eapType['INNER'] == \core\common\EAP::NE_PAP ? "PAP" : "MSCHAPv2")."</string> |
|
488 | 488 | </dict>"; |
489 | 489 | return $retval; |
490 | 490 | } |
@@ -504,9 +504,9 @@ discard block |
||
504 | 504 | // characters are still reversed, invert on use! |
505 | 505 | $buffer .= "<string>Manual</string> |
506 | 506 | <key>ProxyServer</key> |
507 | - <string>" . strrev($serverAndPort[1]) . "</string> |
|
507 | + <string>" . strrev($serverAndPort[1])."</string> |
|
508 | 508 | <key>ProxyServerPort</key> |
509 | - <integer>" . strrev($serverAndPort[0]) . "</integer> |
|
509 | + <integer>" . strrev($serverAndPort[0])."</integer> |
|
510 | 510 | <key>ProxyPACFallbackAllowed</key> |
511 | 511 | <false/>"; |
512 | 512 | } else { |
@@ -556,7 +556,7 @@ discard block |
||
556 | 556 | throw new Exception("SSID must be a string!"); |
557 | 557 | } |
558 | 558 | $escapedSSID = htmlspecialchars($toBeConfigured, ENT_XML1, 'UTF-8'); |
559 | - $payloadIdentifier = "wifi." . $this->serial; |
|
559 | + $payloadIdentifier = "wifi.".$this->serial; |
|
560 | 560 | $payloadShortName = sprintf(_("%s - SSID %s"), $prettyName, $escapedSSID); |
561 | 561 | $payloadName = sprintf(_("%s configuration for network name %s"), $prettyName, $escapedSSID); |
562 | 562 | $encryptionTypeString = $this->encryptionString(); |
@@ -586,9 +586,9 @@ discard block |
||
586 | 586 | if (count($toBeConfigured) == 0) { |
587 | 587 | return ""; |
588 | 588 | } |
589 | - $payloadIdentifier = "hs20.".implode('-',$toBeConfigured); |
|
589 | + $payloadIdentifier = "hs20.".implode('-', $toBeConfigured); |
|
590 | 590 | $payloadShortName = sprintf(_("%s - RCOI"), $prettyName); |
591 | - $payloadName = sprintf(_("%s configuration (Passpoint RCOI)"),$prettyName); |
|
591 | + $payloadName = sprintf(_("%s configuration (Passpoint RCOI)"), $prettyName); |
|
592 | 592 | $encryptionTypeString = $this->encryptionString(); |
593 | 593 | $setupModesString = ""; |
594 | 594 | $wifiNetworkIdentification = $this->passPointBlock($toBeConfigured, $prettyName); |
@@ -607,11 +607,11 @@ discard block |
||
607 | 607 | <key>PayloadDisplayName</key> |
608 | 608 | <string>$payloadShortName</string> |
609 | 609 | <key>PayloadIdentifier</key> |
610 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.$payloadIdentifier</string> |
|
610 | + <string>".self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.$payloadIdentifier</string> |
|
611 | 611 | <key>PayloadOrganization</key> |
612 | - <string>" . $this->massagedConsortium . ".1x-config.org</string> |
|
612 | + <string>".$this->massagedConsortium.".1x-config.org</string> |
|
613 | 613 | <key>PayloadType</key> |
614 | - <string>com.apple." . ($blocktype == MobileconfigSuperclass::NETWORK_BLOCK_TYPE_WIRED ? "firstactiveethernet" : "wifi") . ".managed</string>"; |
|
614 | + <string>com.apple." . ($blocktype == MobileconfigSuperclass::NETWORK_BLOCK_TYPE_WIRED ? "firstactiveethernet" : "wifi").".managed</string>"; |
|
615 | 615 | $retval .= $this->proxySettings(); |
616 | 616 | $retval .= $setupModesString; |
617 | 617 | if ($eapType['INNER'] == \core\common\EAP::NE_SILVERBULLET) { |
@@ -623,7 +623,7 @@ discard block |
||
623 | 623 | } |
624 | 624 | $retval .= " |
625 | 625 | <key>PayloadUUID</key> |
626 | - <string>" . \core\common\Entity::uuid() . "</string> |
|
626 | + <string>" . \core\common\Entity::uuid()."</string> |
|
627 | 627 | <key>PayloadVersion</key> |
628 | 628 | <integer>1</integer> |
629 | 629 | $wifiNetworkIdentification</dict>"; |
@@ -653,15 +653,15 @@ discard block |
||
653 | 653 | <key>IsHotspot</key> |
654 | 654 | <false/> |
655 | 655 | <key>PayloadDescription</key> |
656 | - <string>" . sprintf(_("This SSID should not be used after bootstrapping %s"), \config\ConfAssistant::CONSORTIUM['display_name']) . "</string> |
|
656 | + <string>" . sprintf(_("This SSID should not be used after bootstrapping %s"), \config\ConfAssistant::CONSORTIUM['display_name'])."</string> |
|
657 | 657 | <key>PayloadDisplayName</key> |
658 | - <string>" . _("Disabled WiFi network") . "</string> |
|
658 | + <string>" . _("Disabled WiFi network")."</string> |
|
659 | 659 | <key>PayloadIdentifier</key> |
660 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.wifi.disabled.$this->removeSerial</string> |
|
660 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.wifi.disabled.$this->removeSerial</string> |
|
661 | 661 | <key>PayloadType</key> |
662 | 662 | <string>com.apple.wifi.managed</string> |
663 | 663 | <key>PayloadUUID</key> |
664 | - <string>" . \core\common\Entity::uuid() . "</string> |
|
664 | + <string>".\core\common\Entity::uuid()."</string> |
|
665 | 665 | <key>PayloadVersion</key> |
666 | 666 | <real>1</real>"; |
667 | 667 | $retval .= $this->proxySettings(); |
@@ -741,12 +741,12 @@ discard block |
||
741 | 741 | $mimeBlob = base64_encode($binaryBlob); |
742 | 742 | $mimeFormatted = chunk_split($mimeBlob, 52, "\r\n"); |
743 | 743 | $payloadUUID = \core\common\Entity::uuid('', $mimeBlob); |
744 | - $retArray = ["block" => "<dict>" . |
|
744 | + $retArray = ["block" => "<dict>". |
|
745 | 745 | // we don't include the import password. It's displayed on screen, and should be input by the user. |
746 | 746 | // <key>Password</key> |
747 | 747 | // <string>" . $this->clientCert['password'] . "</string> |
748 | 748 | "<key>PayloadCertificateFileName</key> |
749 | - <string>" . $this->massagedConsortium . ".pfx</string> |
|
749 | + <string>" . $this->massagedConsortium.".pfx</string> |
|
750 | 750 | <key>PayloadContent</key> |
751 | 751 | <data> |
752 | 752 | $mimeFormatted |
@@ -754,7 +754,7 @@ discard block |
||
754 | 754 | <key>PayloadDescription</key> |
755 | 755 | <string>MIME Base-64 encoded PKCS#12 Client Certificate</string> |
756 | 756 | <key>PayloadDisplayName</key> |
757 | - <string>" . _("User certificate") . "</string> |
|
757 | + <string>"._("User certificate")."</string> |
|
758 | 758 | <key>PayloadIdentifier</key> |
759 | 759 | <string>com.apple.security.pkcs12.$payloadUUID</string> |
760 | 760 | <key>PayloadType</key> |
@@ -764,7 +764,7 @@ discard block |
||
764 | 764 | <key>PayloadVersion</key> |
765 | 765 | <integer>1</integer> |
766 | 766 | </dict>", |
767 | - "UUID" => $payloadUUID,]; |
|
767 | + "UUID" => $payloadUUID, ]; |
|
768 | 768 | \core\common\Entity::outOfThePotatoes(); |
769 | 769 | return $retArray; |
770 | 770 | } |
@@ -782,7 +782,7 @@ discard block |
||
782 | 782 | } |
783 | 783 | $expiryTime = new \DateTime($this->clientCert['certObject']->expiry); |
784 | 784 | return "<key>RemovalDate</key> |
785 | - <date>" . $expiryTime->format("Y-m-d") . "T" . $expiryTime->format("H:i:s") . "Z</date>"; |
|
785 | + <date>" . $expiryTime->format("Y-m-d")."T".$expiryTime->format("H:i:s")."Z</date>"; |
|
786 | 786 | } |
787 | 787 | |
788 | 788 | /** |
@@ -804,27 +804,27 @@ discard block |
||
804 | 804 | $stream = " |
805 | 805 | <dict> |
806 | 806 | <key>PayloadCertificateFileName</key> |
807 | - <string>" . $ca['uuid'] . ".der</string> |
|
807 | + <string>" . $ca['uuid'].".der</string> |
|
808 | 808 | <key>PayloadContent</key> |
809 | 809 | <data> |
810 | -" . $trimmedPem . "</data> |
|
810 | +" . $trimmedPem."</data> |
|
811 | 811 | <key>PayloadDescription</key> |
812 | - <string>" . sprintf(_("The %s Certification Authority"), \core\common\Entity::$nomenclature_idp) . "</string> |
|
812 | + <string>" . sprintf(_("The %s Certification Authority"), \core\common\Entity::$nomenclature_idp)."</string> |
|
813 | 813 | <key>PayloadDisplayName</key> |
814 | 814 | <string>" . |
815 | 815 | /// example: "Identity Provider CA #1 (Root)" |
816 | - sprintf(_("%s CA #%d (%s)" ), |
|
816 | + sprintf(_("%s CA #%d (%s)"), |
|
817 | 817 | \core\common\Entity::$nomenclature_idp, |
818 | - count($this->CAsAccountedFor)+1, |
|
819 | - ($ca['root'] ? _("Root") : _("Intermediate"))) . |
|
818 | + count($this->CAsAccountedFor) + 1, |
|
819 | + ($ca['root'] ? _("Root") : _("Intermediate"))). |
|
820 | 820 | "</string> |
821 | 821 | <key>PayloadIdentifier</key> |
822 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
|
822 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
|
823 | 823 | <key>PayloadOrganization</key> |
824 | - <string>" . $this->massagedConsortium . ".1x-config.org</string> |
|
824 | + <string>".$this->massagedConsortium.".1x-config.org</string> |
|
825 | 825 | <key>PayloadType</key> |
826 | 826 | <string>com.apple.security.root</string> |
827 | - <key>PayloadUUID</key><string>" . $ca['uuid'] . "</string> |
|
827 | + <key>PayloadUUID</key><string>" . $ca['uuid']."</string> |
|
828 | 828 | <key>PayloadVersion</key> |
829 | 829 | <integer>1</integer> |
830 | 830 | </dict>"; |