@@ -20,8 +20,8 @@ discard block |
||
20 | 20 | /* |
21 | 21 | * Class autoloader invocation, should be included prior to any other code at the entry points to the application |
22 | 22 | */ |
23 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
24 | -require_once dirname(dirname(dirname(__FILE__))) . "/core/phpqrcode.php"; |
|
23 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
24 | +require_once dirname(dirname(dirname(__FILE__)))."/core/phpqrcode.php"; |
|
25 | 25 | const QRCODE_PIXELS_PER_SYMBOL = 12; |
26 | 26 | |
27 | 27 | $auth = new \web\lib\admin\Authentication(); |
@@ -55,7 +55,7 @@ discard block |
||
55 | 55 | $fed = new \core\Federation($inst->federation); |
56 | 56 | $allowSb = $fed->getAttributes("fed:silverbullet"); |
57 | 57 | if (count($allowSb) == 0) { |
58 | - throw new Exception("We were told to create a new SB profile, but this " . CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_federation'] . " does not allow SB at all!"); |
|
58 | + throw new Exception("We were told to create a new SB profile, but this ".CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_federation']." does not allow SB at all!"); |
|
59 | 59 | } |
60 | 60 | // okay, new SB profiles are allowed. |
61 | 61 | // but is there a support:email attribute on inst level? |
@@ -66,7 +66,7 @@ discard block |
||
66 | 66 | // Create one. |
67 | 67 | $newProfile = $inst->newProfile(core\AbstractProfile::PROFILETYPE_SILVERBULLET); |
68 | 68 | // and modify the REQUEST_URI to add the new profile ID |
69 | - $_SERVER['REQUEST_URI'] = $_SERVER['REQUEST_URI'] . "&profile_id=" . $newProfile->identifier; |
|
69 | + $_SERVER['REQUEST_URI'] = $_SERVER['REQUEST_URI']."&profile_id=".$newProfile->identifier; |
|
70 | 70 | $_GET['profile_id'] = $newProfile->identifier; |
71 | 71 | $profile = $newProfile; |
72 | 72 | } else { |
@@ -91,7 +91,7 @@ discard block |
||
91 | 91 | if (isset($_POST['command'])) { |
92 | 92 | switch ($_POST['command']) { |
93 | 93 | case \web\lib\common\FormElements::BUTTON_CLOSE: |
94 | - header("Location: overview_idp.php?inst_id=" . $inst->identifier); |
|
94 | + header("Location: overview_idp.php?inst_id=".$inst->identifier); |
|
95 | 95 | break; |
96 | 96 | case \web\lib\common\FormElements::BUTTON_TERMSOFUSE: |
97 | 97 | if (isset($_POST['agreement']) && $_POST['agreement'] == 'true') { |
@@ -134,7 +134,7 @@ discard block |
||
134 | 134 | break; |
135 | 135 | } |
136 | 136 | $properName = $validator->User($elements[0]); |
137 | - $properDate = new DateTime($elements[1] . " 00:00:00"); |
|
137 | + $properDate = new DateTime($elements[1]." 00:00:00"); |
|
138 | 138 | $numberOfActivations = $elements[2] ?? 5; |
139 | 139 | $number = $validator->integer($numberOfActivations); |
140 | 140 | if ($number === FALSE) { // invalid input received, default to sane |
@@ -237,18 +237,18 @@ discard block |
||
237 | 237 | // warn and ask for confirmation unless already confirmed |
238 | 238 | if (!isset($_POST['insecureconfirm']) || $_POST['insecureconfirm'] != "CONFIRM") { |
239 | 239 | echo $deco->pageheader(_("Insecure mail domain!"), "ADMIN-IDP-USERS"); |
240 | - echo "<p>" . sprintf(_("The mail domain of the mail address <strong>%s</strong> is not secure: some or all of the mail servers are not accepting encrypted connections (no consistent support for STARTTLS)."), $properEmail) . "</p>"; |
|
241 | - echo "<p>" . _("The invitation would need to be sent in cleartext across the internet, and can possibly be read and abused by anyone in transit.") . "</p>"; |
|
242 | - echo "<p>" . _("Do you want the system to send this mail anyway?") . "</p>"; |
|
240 | + echo "<p>".sprintf(_("The mail domain of the mail address <strong>%s</strong> is not secure: some or all of the mail servers are not accepting encrypted connections (no consistent support for STARTTLS)."), $properEmail)."</p>"; |
|
241 | + echo "<p>"._("The invitation would need to be sent in cleartext across the internet, and can possibly be read and abused by anyone in transit.")."</p>"; |
|
242 | + echo "<p>"._("Do you want the system to send this mail anyway?")."</p>"; |
|
243 | 243 | echo $formtext; |
244 | - echo "<button type='submit' class='delete'>" . _("DO NOT SEND") . "</button>"; |
|
244 | + echo "<button type='submit' class='delete'>"._("DO NOT SEND")."</button>"; |
|
245 | 245 | echo "</form>"; |
246 | 246 | echo $formtext; |
247 | - echo "<input type='hidden' name='command' value='" . \web\lib\common\FormElements::BUTTON_SENDINVITATIONMAILBYCAT . "'</>"; |
|
247 | + echo "<input type='hidden' name='command' value='".\web\lib\common\FormElements::BUTTON_SENDINVITATIONMAILBYCAT."'</>"; |
|
248 | 248 | echo "<input type='hidden' name='address' value='$properEmail'</>"; |
249 | - echo "<input type='hidden' name='token' value='" . $invitationObject->invitationTokenString . "'</>"; |
|
249 | + echo "<input type='hidden' name='token' value='".$invitationObject->invitationTokenString."'</>"; |
|
250 | 250 | echo "<input type='hidden' name='insecureconfirm' value='CONFIRM'/>"; |
251 | - echo "<button type='submit'>" . _("Send anyway.") . "</button>"; |
|
251 | + echo "<button type='submit'>"._("Send anyway.")."</button>"; |
|
252 | 252 | echo "</form>"; |
253 | 253 | echo $deco->footer(); |
254 | 254 | exit; |
@@ -358,19 +358,19 @@ discard block |
||
358 | 358 | case "NOSTIPULATION": |
359 | 359 | break; |
360 | 360 | case "EMAIL-SENT": |
361 | - echo $boundaryPre . $uiElements->boxOkay(_("The e-mail was sent successfully."), _("E-mail OK."), FALSE) . $boundaryPost; |
|
361 | + echo $boundaryPre.$uiElements->boxOkay(_("The e-mail was sent successfully."), _("E-mail OK."), FALSE).$boundaryPost; |
|
362 | 362 | break; |
363 | 363 | case "EMAIL-NOTSENT": |
364 | - echo $boundaryPre . $uiElements->boxError(_("The e-mail was NOT sent."), _("E-mail not OK."), FALSE) . $boundaryPost; |
|
364 | + echo $boundaryPre.$uiElements->boxError(_("The e-mail was NOT sent."), _("E-mail not OK."), FALSE).$boundaryPost; |
|
365 | 365 | break; |
366 | 366 | case "SMS-SENT": |
367 | - echo $boundaryPre . $uiElements->boxOkay(_("The SMS was sent successfully."), _("SMS OK."), FALSE) . $boundaryPost; |
|
367 | + echo $boundaryPre.$uiElements->boxOkay(_("The SMS was sent successfully."), _("SMS OK."), FALSE).$boundaryPost; |
|
368 | 368 | break; |
369 | 369 | case "SMS-NOTSENT": |
370 | - echo $boundaryPre . $uiElements->boxOkay(_("The SMS was NOT sent."), _("SMS not OK."), FALSE) . $boundaryPost; |
|
370 | + echo $boundaryPre.$uiElements->boxOkay(_("The SMS was NOT sent."), _("SMS not OK."), FALSE).$boundaryPost; |
|
371 | 371 | break; |
372 | 372 | case "SMS-FRAGMENT": |
373 | - echo $boundaryPre . $uiElements->boxWarning(_("Only a fragment of the SMS was sent. You should re-send it."), _("SMS Fragment."), FALSE) . $boundaryPost; |
|
373 | + echo $boundaryPre.$uiElements->boxWarning(_("Only a fragment of the SMS was sent. You should re-send it."), _("SMS Fragment."), FALSE).$boundaryPost; |
|
374 | 374 | break; |
375 | 375 | } |
376 | 376 | ?> |
@@ -383,17 +383,17 @@ discard block |
||
383 | 383 | <?php |
384 | 384 | $bufferCurrentUsers = "<table class='sb-user-table' style='max-width:1920px;'> |
385 | 385 | <tr class='sb-title-row'> |
386 | - <td>" . _("User") . "</td> |
|
387 | - <td>" . _("Token/Certificate details") . "</td> |
|
388 | - <td>" . _("User/Token Expiry") . "</td> |
|
389 | - <td>" . _("Actions") . "</td> |
|
386 | + <td>" . _("User")."</td> |
|
387 | + <td>" . _("Token/Certificate details")."</td> |
|
388 | + <td>" . _("User/Token Expiry")."</td> |
|
389 | + <td>" . _("Actions")."</td> |
|
390 | 390 | </tr>"; |
391 | 391 | $bufferPreviousUsers = "<table class='sb-user-table' style='max-width:1920px;'> |
392 | 392 | <tr class='sb-title-row'> |
393 | - <td>" . _("User") . "</td> |
|
394 | - <td>" . _("Certificate details") . "</td> |
|
395 | - <td>" . _("User Expiry") . "</td> |
|
396 | - <td>" . _("Actions") . "</td> |
|
393 | + <td>" . _("User")."</td> |
|
394 | + <td>" . _("Certificate details")."</td> |
|
395 | + <td>" . _("User Expiry")."</td> |
|
396 | + <td>" . _("Actions")."</td> |
|
397 | 397 | </tr>"; |
398 | 398 | |
399 | 399 | natsort($allUsers); |
@@ -449,23 +449,23 @@ discard block |
||
449 | 449 | $display = empty(devices\Devices::listDevices()[$oneCert->device]['display']) ? $oneCert->device : devices\Devices::listDevices()[$oneCert->device]['display']; |
450 | 450 | |
451 | 451 | $bufferText = "<div class='sb-certificate-summary ca-summary' $style> |
452 | - <div class='sb-certificate-details'>" . _("Device:") . " " . $display . |
|
453 | - "<br>" . _("Serial Number:") . " " . dechex($oneCert->serial) . |
|
454 | - "<br>" . _("CN:") . " " . explode('@', $oneCert->username)[0] . "@…" . |
|
455 | - "<br>" . _("Expiry:") . " " . $oneCert->expiry . |
|
456 | - "<br>" . _("Issued:") . " " . $oneCert->issued . |
|
457 | - "</div>" . |
|
452 | + <div class='sb-certificate-details'>"._("Device:")." ".$display. |
|
453 | + "<br>"._("Serial Number:")." ".dechex($oneCert->serial). |
|
454 | + "<br>"._("CN:")." ".explode('@', $oneCert->username)[0]."@…". |
|
455 | + "<br>"._("Expiry:")." ".$oneCert->expiry. |
|
456 | + "<br>"._("Issued:")." ".$oneCert->issued. |
|
457 | + "</div>". |
|
458 | 458 | "<div style='text-align:right;padding-top: 5px; $buttonStyle'>"; |
459 | 459 | |
460 | 460 | if ($buttonText == "") { |
461 | 461 | $bufferText .= $formtext |
462 | - . "<input type='hidden' name='certSerial' value='" . $oneCert->serial . "'/>" |
|
463 | - . "<input type='hidden' name='certAlgo' value='" . $oneCert->ca_type . "'/>" |
|
462 | + . "<input type='hidden' name='certSerial' value='".$oneCert->serial."'/>" |
|
463 | + . "<input type='hidden' name='certAlgo' value='".$oneCert->ca_type."'/>" |
|
464 | 464 | . "<button type='submit' " |
465 | 465 | . "name='command' " |
466 | - . "value='" . \web\lib\common\FormElements::BUTTON_REVOKECREDENTIAL . "' " |
|
466 | + . "value='".\web\lib\common\FormElements::BUTTON_REVOKECREDENTIAL."' " |
|
467 | 467 | . "class='delete' " |
468 | - . "onclick='return confirm(\"" . sprintf(_("The device in question will stop functioning with %s. The revocation cannot be undone. Are you sure you want to do this?"), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']) . "\")'>" |
|
468 | + . "onclick='return confirm(\"".sprintf(_("The device in question will stop functioning with %s. The revocation cannot be undone. Are you sure you want to do this?"), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'])."\")'>" |
|
469 | 469 | . _("Revoke") |
470 | 470 | . "</button>" |
471 | 471 | . "</form>"; |
@@ -490,13 +490,13 @@ discard block |
||
490 | 490 | } |
491 | 491 | // wrap the revoked and expired certs in a div that is hidden by default |
492 | 492 | if ($textRevokedCerts !== "") { |
493 | - $textRevokedCerts = "<span style='text-decoration: underline;' id='$oneUserId-revoked-heading' onclick='document.getElementById(\"$oneUserId-revoked-certs\").style.display = \"block\"; document.getElementById(\"$oneUserId-revoked-heading\").style.display = \"none\";'>" . sprintf(ngettext("(show %d revoked certificate)", "(show %d revoked certificates)", $countRevoked), $countRevoked) . "</span><div id='$oneUserId-revoked-certs' style='display:none;'>" . $textRevokedCerts . "</div>"; |
|
493 | + $textRevokedCerts = "<span style='text-decoration: underline;' id='$oneUserId-revoked-heading' onclick='document.getElementById(\"$oneUserId-revoked-certs\").style.display = \"block\"; document.getElementById(\"$oneUserId-revoked-heading\").style.display = \"none\";'>".sprintf(ngettext("(show %d revoked certificate)", "(show %d revoked certificates)", $countRevoked), $countRevoked)."</span><div id='$oneUserId-revoked-certs' style='display:none;'>".$textRevokedCerts."</div>"; |
|
494 | 494 | } |
495 | 495 | if ($textExpiredCerts !== "") { |
496 | - $textExpiredCerts = "<span style='text-decoration: underline;' id='$oneUserId-expired-heading' onclick='document.getElementById(\"$oneUserId-expired-certs\").style.display = \"block\"; document.getElementById(\"$oneUserId-expired-heading\").style.display = \"none\";'>" . sprintf(ngettext("(show %d expired certificate)", "(show %d expired certificates)", $countExpired), $countExpired) . "</span><div id='$oneUserId-expired-certs' style='display:none;'>" . $textExpiredCerts . "</div>"; |
|
496 | + $textExpiredCerts = "<span style='text-decoration: underline;' id='$oneUserId-expired-heading' onclick='document.getElementById(\"$oneUserId-expired-certs\").style.display = \"block\"; document.getElementById(\"$oneUserId-expired-heading\").style.display = \"none\";'>".sprintf(ngettext("(show %d expired certificate)", "(show %d expired certificates)", $countExpired), $countExpired)."</span><div id='$oneUserId-expired-certs' style='display:none;'>".$textExpiredCerts."</div>"; |
|
497 | 497 | } |
498 | 498 | // and push out the HTML |
499 | - ${$outputBuffer} .= $textActiveCerts . "<br/>" . $textExpiredCerts . " " . $textRevokedCerts . "</td>"; |
|
499 | + ${$outputBuffer} .= $textActiveCerts."<br/>".$textExpiredCerts." ".$textRevokedCerts."</td>"; |
|
500 | 500 | $tokenHtmlBuffer = ""; |
501 | 501 | $hasOnePendingInvite = FALSE; |
502 | 502 | foreach ($tokensWithoutCerts as $invitationObject) { |
@@ -507,38 +507,38 @@ discard block |
||
507 | 507 | $tokenHtmlBuffer .= "<tr class='sb-certificate-row'><td></td>"; |
508 | 508 | $jsEncodedBody = str_replace('\n', '%0D%0A', str_replace('"', '', json_encode($invitationObject->invitationMailBody()))); |
509 | 509 | $tokenHtmlBuffer .= "<td>"; |
510 | - $tokenHtmlBuffer .= sprintf(_("The invitation token %s is ready for sending! Choose how to send it:"), "<input type='text' readonly='readonly' style='background-color:lightgrey;' size='60' value='" . $invitationObject->link() . "' name='token' class='identifiedtokenarea-" . $invitationObject->identifier . "'>(…)<br/>"); |
|
510 | + $tokenHtmlBuffer .= sprintf(_("The invitation token %s is ready for sending! Choose how to send it:"), "<input type='text' readonly='readonly' style='background-color:lightgrey;' size='60' value='".$invitationObject->link()."' name='token' class='identifiedtokenarea-".$invitationObject->identifier."'>(…)<br/>"); |
|
511 | 511 | $tokenHtmlBuffer .= "<table> |
512 | - <tr><td style='vertical-align:bottom;'>" . _("E-Mail:") . "</td><td> |
|
512 | + <tr><td style='vertical-align:bottom;'>" . _("E-Mail:")."</td><td> |
|
513 | 513 | $formtext |
514 | - <input type='hidden' value='" . $invitationObject->invitationTokenString . "' name='token'><br/> |
|
514 | + <input type='hidden' value='".$invitationObject->invitationTokenString."' name='token'><br/> |
|
515 | 515 | <input type='text' name='address' id='address-$invitationObject->identifier'/> |
516 | - <button type='button' onclick='window.location=\"mailto:\"+document.getElementById(\"address-$invitationObject->identifier\").value+\"?subject=" . $invitationObject->invitationMailSubject() . "&body=$jsEncodedBody\"; return false;'>" . _("Local mail client") . "</button> |
|
517 | - <button type='submit' name='command' onclick='document.getElementById(\"spin\").style.display =\"block\"' value='" . \web\lib\common\FormElements::BUTTON_SENDINVITATIONMAILBYCAT . "'>" . _("Send with CAT") . "</button> |
|
516 | + <button type='button' onclick='window.location=\"mailto:\"+document.getElementById(\"address-$invitationObject->identifier\").value+\"?subject=".$invitationObject->invitationMailSubject()."&body=$jsEncodedBody\"; return false;'>"._("Local mail client")."</button> |
|
517 | + <button type='submit' name='command' onclick='document.getElementById(\"spin\").style.display =\"block\"' value='" . \web\lib\common\FormElements::BUTTON_SENDINVITATIONMAILBYCAT."'>"._("Send with CAT")."</button> |
|
518 | 518 | </form> |
519 | 519 | </td></tr> |
520 | - <tr><td style='vertical-align:bottom;'>" . _("SMS:") . "</td><td> |
|
520 | + <tr><td style='vertical-align:bottom;'>" . _("SMS:")."</td><td> |
|
521 | 521 | $formtext |
522 | - <input type='hidden' value='" . $invitationObject->invitationTokenString . "' name='token'><br/> |
|
522 | + <input type='hidden' value='".$invitationObject->invitationTokenString."' name='token'><br/> |
|
523 | 523 | <input type='text' name='smsnumber' /> |
524 | - <button type='submit' name='command' value='" . \web\lib\common\FormElements::BUTTON_SENDINVITATIONSMS . "'>" . _("Send in SMS...") . "</button> |
|
524 | + <button type='submit' name='command' value='" . \web\lib\common\FormElements::BUTTON_SENDINVITATIONSMS."'>"._("Send in SMS...")."</button> |
|
525 | 525 | </form> |
526 | 526 | </td></tr> |
527 | - <tr><td style='vertical-align:bottom;'>" . _("Manual:") . "</td><td> |
|
528 | - <button type='button' class='clipboardButton' onclick='clipboardCopy(" . $invitationObject->identifier . ");'>" . _("Copy to Clipboard") . "</button> |
|
527 | + <tr><td style='vertical-align:bottom;'>" . _("Manual:")."</td><td> |
|
528 | + <button type='button' class='clipboardButton' onclick='clipboardCopy(" . $invitationObject->identifier.");'>"._("Copy to Clipboard")."</button> |
|
529 | 529 | <form style='display:inline-block;' method='post' action='inc/displayQRcode.inc.php' onsubmit='popupQRWindow(this); return false;' accept-charset='UTF-8'> |
530 | - <input type='hidden' value='" . $invitationObject->invitationTokenString . "' name='token'><br/> |
|
531 | - <button type='submit'>" . _("Display QR code") . "</button> |
|
530 | + <input type='hidden' value='" . $invitationObject->invitationTokenString."' name='token'><br/> |
|
531 | + <button type='submit'>" . _("Display QR code")."</button> |
|
532 | 532 | </form> |
533 | 533 | </td></tr> |
534 | 534 | |
535 | 535 | </table> |
536 | 536 | </td>"; |
537 | - $tokenHtmlBuffer .= "<td>" . _("Expiry Date:") . " " . $invitationObject->expiry . " UTC<br>" . _("Activations remaining:") . " " . sprintf(_("%d of %d"), $invitationObject->activationsRemaining, $invitationObject->activationsTotal) . "</td>"; |
|
537 | + $tokenHtmlBuffer .= "<td>"._("Expiry Date:")." ".$invitationObject->expiry." UTC<br>"._("Activations remaining:")." ".sprintf(_("%d of %d"), $invitationObject->activationsRemaining, $invitationObject->activationsTotal)."</td>"; |
|
538 | 538 | $tokenHtmlBuffer .= "<td>" |
539 | 539 | . $formtext |
540 | - . "<input type='hidden' name='invitationtoken' value='" . $invitationObject->invitationTokenString . "'/>" |
|
541 | - . "<button type='submit' name='command' value='" . \web\lib\common\FormElements::BUTTON_REVOKEINVITATION . "' class='delete'>" . _("Revoke") . "</button></form>" |
|
540 | + . "<input type='hidden' name='invitationtoken' value='".$invitationObject->invitationTokenString."'/>" |
|
541 | + . "<button type='submit' name='command' value='".\web\lib\common\FormElements::BUTTON_REVOKEINVITATION."' class='delete'>"._("Revoke")."</button></form>" |
|
542 | 542 | . "</td></tr>"; |
543 | 543 | break; |
544 | 544 | case core\SilverbulletInvitation::SB_TOKENSTATUS_EXPIRED: |
@@ -554,10 +554,10 @@ discard block |
||
554 | 554 | } |
555 | 555 | ${$outputBuffer} .= "<td>$formtext |
556 | 556 | <div class='sb-date-container' style='min-width: 200px;'> |
557 | - <span><input type='text' maxlength='19' class='sb-date-picker' name='userexpiry' value='" . $profile->getUserExpiryDate($oneUserId) . "'> (UTC)</span> |
|
557 | + <span><input type='text' maxlength='19' class='sb-date-picker' name='userexpiry' value='".$profile->getUserExpiryDate($oneUserId)."'> (UTC)</span> |
|
558 | 558 | </div> |
559 | 559 | <input type='hidden' name='userid' value='$oneUserId'/> |
560 | - <button type='submit' name='command' value='" . \web\lib\common\FormElements::BUTTON_CHANGEUSEREXPIRY . "'>" . _("Update") . "</button> |
|
560 | + <button type='submit' name='command' value='".\web\lib\common\FormElements::BUTTON_CHANGEUSEREXPIRY."'>"._("Update")."</button> |
|
561 | 561 | </form> |
562 | 562 | </td> |
563 | 563 | <td> |
@@ -565,33 +565,33 @@ discard block |
||
565 | 565 | |
566 | 566 | if ($hasOnePendingInvite || count($validCerts) > 0) { |
567 | 567 | $deletionText = sprintf(_("All of the currently active devices will stop functioning with %s. This cannot be undone. While the user can be re-activated later, they will then need to be re-provisioned with new invitation tokens. Are you sure you want to do this?"), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']); |
568 | - ${$outputBuffer} .= $formtext . " |
|
568 | + ${$outputBuffer} .= $formtext." |
|
569 | 569 | <input type='hidden' name='userid' value='$oneUserId'/> |
570 | 570 | <button type='submit' " |
571 | 571 | . "name='command' " |
572 | - . "value='" . \web\lib\common\FormElements::BUTTON_DEACTIVATEUSER . "' " |
|
572 | + . "value='".\web\lib\common\FormElements::BUTTON_DEACTIVATEUSER."' " |
|
573 | 573 | . "class='delete' " |
574 | - . ( count($validCerts) > 0 ? "onclick='return confirm(\"" . $deletionText . "\")' " : "" ) |
|
574 | + . (count($validCerts) > 0 ? "onclick='return confirm(\"".$deletionText."\")' " : "") |
|
575 | 575 | . ">" |
576 | 576 | . _("Deactivate User") |
577 | 577 | . "</button> |
578 | 578 | </form>"; |
579 | 579 | } |
580 | - ${$outputBuffer} .= "<form method='post' action='inc/userStats.inc.php?inst_id=" . $profile->institution . "&profile_id=" . $profile->identifier . "&user_id=$oneUserId' onsubmit='popupStatsWindow(this); return false;' accept-charset='UTF-8'> |
|
581 | - <button type='submit'>" . _("Show Authentication Records") . "</button> |
|
580 | + ${$outputBuffer} .= "<form method='post' action='inc/userStats.inc.php?inst_id=".$profile->institution."&profile_id=".$profile->identifier."&user_id=$oneUserId' onsubmit='popupStatsWindow(this); return false;' accept-charset='UTF-8'> |
|
581 | + <button type='submit'>"._("Show Authentication Records")."</button> |
|
582 | 582 | </form>"; |
583 | 583 | if (new DateTime() < new DateTime($expiryDate)) { // current user, allow sending new token |
584 | - ${$outputBuffer} .= $formtext . " |
|
584 | + ${$outputBuffer} .= $formtext." |
|
585 | 585 | <input type='hidden' name='userid' value='$oneUserId'/> |
586 | - <button type='submit' name='command' value='" . \web\lib\common\FormElements::BUTTON_NEWINVITATION . "'>" . _("New Invitation") . "</button> |
|
587 | - <label>" . _("Activations:") . " |
|
586 | + <button type='submit' name='command' value='".\web\lib\common\FormElements::BUTTON_NEWINVITATION."'>"._("New Invitation")."</button> |
|
587 | + <label>" . _("Activations:")." |
|
588 | 588 | <input type='text' name='invitationsquantity' value='5' maxlength='3' style='width: 30px;'/> |
589 | 589 | </label> |
590 | 590 | </form>"; |
591 | 591 | } elseif (count($profile->getUserAuthRecords($oneUserId)) == 0) { // previous user; if there are NO authentication records, allow full deletion - otherwise, need to keep user trace for abuse handling |
592 | - ${$outputBuffer} .= $formtext . " |
|
592 | + ${$outputBuffer} .= $formtext." |
|
593 | 593 | <input type='hidden' name='userid' value='$oneUserId'/> |
594 | - <button type='submit' class='delete' name='command' value='" . \web\lib\common\FormElements::BUTTON_DELETE . "'>" . _("Delete User") . "</button> |
|
594 | + <button type='submit' class='delete' name='command' value='".\web\lib\common\FormElements::BUTTON_DELETE."'>"._("Delete User")."</button> |
|
595 | 595 | </form>"; |
596 | 596 | } |
597 | 597 | ${$outputBuffer} .= "</div> |
@@ -623,13 +623,13 @@ discard block |
||
623 | 623 | . ' If all accounts shown as active above are indeed still valid, please check the box below and push "Save".' |
624 | 624 | . ' If any of the accounts are stale, please deactivate them by pushing the corresponding button before doing this.'), CONFIG_CONFASSISTANT['SILVERBULLET']['gracetime'] ?? core\ProfileSilverbullet::SB_ACKNOWLEDGEMENT_REQUIRED_DAYS); |
625 | 625 | |
626 | - echo $formtext . "<div style='padding-bottom: 20px;'>" |
|
626 | + echo $formtext."<div style='padding-bottom: 20px;'>" |
|
627 | 627 | . " |
628 | 628 | <p>$acknowledgeText</p> |
629 | 629 | <input type='checkbox' name='acknowledge' value='true'> |
630 | - <label>" . sprintf(_("I have verified that all configured users are still eligible for %s."), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']) . "</label> |
|
630 | + <label>".sprintf(_("I have verified that all configured users are still eligible for %s."), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'])."</label> |
|
631 | 631 | </div> |
632 | - <button type='submit' name='command' value='" . \web\lib\common\FormElements::BUTTON_ACKUSERELIGIBILITY . "'>" . _("Save") . "</button></form>"; |
|
632 | + <button type='submit' name='command' value='" . \web\lib\common\FormElements::BUTTON_ACKUSERELIGIBILITY."'>"._("Save")."</button></form>"; |
|
633 | 633 | } |
634 | 634 | ?> |
635 | 635 | </div> |
@@ -144,7 +144,7 @@ discard block |
||
144 | 144 | public function annotate($annotation) { |
145 | 145 | $encoded = json_encode($annotation); |
146 | 146 | $this->annotation = $encoded; |
147 | - $this->databaseHandle->exec("UPDATE silverbullet_certificate SET extrainfo = ? WHERE serial_number = ?", "si", $encoded, $this->serial ); |
|
147 | + $this->databaseHandle->exec("UPDATE silverbullet_certificate SET extrainfo = ? WHERE serial_number = ?", "si", $encoded, $this->serial); |
|
148 | 148 | } |
149 | 149 | /** |
150 | 150 | * we don't use caching in SB, so this function does nothing |
@@ -170,7 +170,7 @@ discard block |
||
170 | 170 | $invitationObject = new SilverbulletInvitation($token); |
171 | 171 | $profile = new ProfileSilverbullet($invitationObject->profile); |
172 | 172 | $inst = new IdP($profile->institution); |
173 | - $loggerInstance->debug(5, "tokenStatus: done, got " . $invitationObject->invitationTokenStatus . ", " . $invitationObject->profile . ", " . $invitationObject->userId . ", " . $invitationObject->expiry . ", " . $invitationObject->invitationTokenString . "\n"); |
|
173 | + $loggerInstance->debug(5, "tokenStatus: done, got ".$invitationObject->invitationTokenStatus.", ".$invitationObject->profile.", ".$invitationObject->userId.", ".$invitationObject->expiry.", ".$invitationObject->invitationTokenString."\n"); |
|
174 | 174 | if ($invitationObject->invitationTokenStatus != SilverbulletInvitation::SB_TOKENSTATUS_VALID && $invitationObject->invitationTokenStatus != SilverbulletInvitation::SB_TOKENSTATUS_PARTIALLY_REDEEMED) { |
175 | 175 | throw new Exception("Attempt to generate a SilverBullet installer with an invalid/redeemed/expired token. The user should never have gotten that far!"); |
176 | 176 | } |
@@ -183,12 +183,12 @@ discard block |
||
183 | 183 | throw new Exception("Despite a valid token, the corresponding user was not found in database or database query error!"); |
184 | 184 | } |
185 | 185 | $expiryObject = mysqli_fetch_object(/** @scrutinizer ignore-type */ $userrow); |
186 | - $loggerInstance->debug(5, "EXP: " . $expiryObject->expiry . "\n"); |
|
186 | + $loggerInstance->debug(5, "EXP: ".$expiryObject->expiry."\n"); |
|
187 | 187 | $expiryDateObject = date_create_from_format("Y-m-d H:i:s", $expiryObject->expiry); |
188 | 188 | if ($expiryDateObject === FALSE) { |
189 | 189 | throw new Exception("The expiry date we got from the DB is bogus!"); |
190 | 190 | } |
191 | - $loggerInstance->debug(5, $expiryDateObject->format("Y-m-d H:i:s") . "\n"); |
|
191 | + $loggerInstance->debug(5, $expiryDateObject->format("Y-m-d H:i:s")."\n"); |
|
192 | 192 | // date_create with no parameters can't fail, i.e. is never FALSE |
193 | 193 | $validity = date_diff(/** @scrutinizer ignore-type */ date_create(), $expiryDateObject); |
194 | 194 | $expiryDays = $validity->days + 1; |
@@ -237,7 +237,7 @@ discard block |
||
237 | 237 | $certString = ""; |
238 | 238 | openssl_x509_export($cert, $certString); |
239 | 239 | $parsedCert = $x509->processCertificate($certString); |
240 | - $loggerInstance->debug(5, "CERTINFO: " . print_r($parsedCert['full_details'], true)); |
|
240 | + $loggerInstance->debug(5, "CERTINFO: ".print_r($parsedCert['full_details'], true)); |
|
241 | 241 | $realExpiryDate = date_create_from_format("U", $parsedCert['full_details']['validTo_time_t'])->format("Y-m-d H:i:s"); |
242 | 242 | |
243 | 243 | // store new cert info in DB |
@@ -295,26 +295,26 @@ discard block |
||
295 | 295 | $cat = new CAT(); |
296 | 296 | $tempdirArray = $cat->createTemporaryDirectory("test"); |
297 | 297 | $tempdir = $tempdirArray['dir']; |
298 | - $nowIndexTxt = (new \DateTime())->format("ymdHis") . "Z"; |
|
299 | - $expiryIndexTxt = $originalExpiry->format("ymdHis") . "Z"; |
|
298 | + $nowIndexTxt = (new \DateTime())->format("ymdHis")."Z"; |
|
299 | + $expiryIndexTxt = $originalExpiry->format("ymdHis")."Z"; |
|
300 | 300 | $serialHex = strtoupper(dechex($this->serial)); |
301 | 301 | if (strlen($serialHex) % 2 == 1) { |
302 | - $serialHex = "0" . $serialHex; |
|
302 | + $serialHex = "0".$serialHex; |
|
303 | 303 | } |
304 | 304 | |
305 | - $indexStatement = "$certstatus\t$expiryIndexTxt\t" . ($certstatus == "R" ? "$nowIndexTxt,unspecified" : "") . "\t$serialHex\tunknown\t/O=" . CONFIG_CONFASSISTANT['CONSORTIUM']['name'] . "/OU=$federation/CN=$this->username\n"; |
|
305 | + $indexStatement = "$certstatus\t$expiryIndexTxt\t".($certstatus == "R" ? "$nowIndexTxt,unspecified" : "")."\t$serialHex\tunknown\t/O=".CONFIG_CONFASSISTANT['CONSORTIUM']['name']."/OU=$federation/CN=$this->username\n"; |
|
306 | 306 | $logHandle->debug(4, "index.txt contents-to-be: $indexStatement"); |
307 | - if (!file_put_contents($tempdir . "/index.txt", $indexStatement)) { |
|
307 | + if (!file_put_contents($tempdir."/index.txt", $indexStatement)) { |
|
308 | 308 | $logHandle->debug(1, "Unable to write openssl index.txt file for revocation handling!"); |
309 | 309 | } |
310 | 310 | // index.txt.attr is dull but needs to exist |
311 | - file_put_contents($tempdir . "/index.txt.attr", "unique_subject = yes\n"); |
|
311 | + file_put_contents($tempdir."/index.txt.attr", "unique_subject = yes\n"); |
|
312 | 312 | // call "openssl ocsp" to manufacture our own OCSP statement |
313 | 313 | // adding "-rmd sha1" to the following command-line makes the |
314 | 314 | // choice of signature algorithm for the response explicit |
315 | 315 | // but it's only available from openssl-1.1.0 (which we do not |
316 | 316 | // want to require just for that one thing). |
317 | - $execCmd = CONFIG['PATHS']['openssl'] . " ocsp -issuer " . ROOT . "/config/SilverbulletClientCerts/real-".$this->ca_type.".pem -sha1 -ndays 10 -no_nonce -serial 0x$serialHex -CA " . ROOT . "/config/SilverbulletClientCerts/real-".$this->ca_type.".pem -rsigner " . ROOT . "/config/SilverbulletClientCerts/real-".$this->ca_type.".pem -rkey " . ROOT . "/config/SilverbulletClientCerts/real-".$this->ca_type.".key -index $tempdir/index.txt -no_cert_verify -respout $tempdir/$serialHex.response.der"; |
|
317 | + $execCmd = CONFIG['PATHS']['openssl']." ocsp -issuer ".ROOT."/config/SilverbulletClientCerts/real-".$this->ca_type.".pem -sha1 -ndays 10 -no_nonce -serial 0x$serialHex -CA ".ROOT."/config/SilverbulletClientCerts/real-".$this->ca_type.".pem -rsigner ".ROOT."/config/SilverbulletClientCerts/real-".$this->ca_type.".pem -rkey ".ROOT."/config/SilverbulletClientCerts/real-".$this->ca_type.".key -index $tempdir/index.txt -no_cert_verify -respout $tempdir/$serialHex.response.der"; |
|
318 | 318 | $logHandle->debug(2, "Calling openssl ocsp with following cmdline: $execCmd\n"); |
319 | 319 | $output = []; |
320 | 320 | $return = 999; |
@@ -322,11 +322,11 @@ discard block |
||
322 | 322 | if ($return !== 0) { |
323 | 323 | throw new Exception("Non-zero return value from openssl ocsp!"); |
324 | 324 | } |
325 | - $ocsp = file_get_contents($tempdir . "/$serialHex.response.der"); |
|
325 | + $ocsp = file_get_contents($tempdir."/$serialHex.response.der"); |
|
326 | 326 | // remove the temp dir! |
327 | - unlink($tempdir . "/$serialHex.response.der"); |
|
328 | - unlink($tempdir . "/index.txt.attr"); |
|
329 | - unlink($tempdir . "/index.txt"); |
|
327 | + unlink($tempdir."/$serialHex.response.der"); |
|
328 | + unlink($tempdir."/index.txt.attr"); |
|
329 | + unlink($tempdir."/index.txt"); |
|
330 | 330 | rmdir($tempdir); |
331 | 331 | break; |
332 | 332 | default: |
@@ -380,7 +380,7 @@ discard block |
||
380 | 380 | $username = ""; |
381 | 381 | while ($usernameIsUnique === FALSE) { |
382 | 382 | $usernameLocalPart = common\Entity::randomString(64 - 1 - strlen($realm), "0123456789abcdefghijklmnopqrstuvwxyz"); |
383 | - $username = $usernameLocalPart . "@" . $realm; |
|
383 | + $username = $usernameLocalPart."@".$realm; |
|
384 | 384 | $uniquenessQuery = $databaseHandle->exec("SELECT cn from silverbullet_certificate WHERE cn = ?", "s", $username); |
385 | 385 | // SELECT -> resource, not boolean |
386 | 386 | if (mysqli_num_rows(/** @scrutinizer ignore-type */ $uniquenessQuery) == 0) { |
@@ -432,10 +432,10 @@ discard block |
||
432 | 432 | $databaseHandle = DBConnection::handle("INST"); |
433 | 433 | switch (CONFIG_CONFASSISTANT['SILVERBULLET']['CA']['type']) { |
434 | 434 | case "embedded": |
435 | - $rootCaPem = file_get_contents(ROOT . "/config/SilverbulletClientCerts/rootca-$certtype.pem"); |
|
436 | - $issuingCaPem = file_get_contents(ROOT . "/config/SilverbulletClientCerts/real-$certtype.pem"); |
|
435 | + $rootCaPem = file_get_contents(ROOT."/config/SilverbulletClientCerts/rootca-$certtype.pem"); |
|
436 | + $issuingCaPem = file_get_contents(ROOT."/config/SilverbulletClientCerts/real-$certtype.pem"); |
|
437 | 437 | $issuingCa = openssl_x509_read($issuingCaPem); |
438 | - $issuingCaKey = openssl_pkey_get_private("file://" . ROOT . "/config/SilverbulletClientCerts/real-$certtype.key"); |
|
438 | + $issuingCaKey = openssl_pkey_get_private("file://".ROOT."/config/SilverbulletClientCerts/real-$certtype.key"); |
|
439 | 439 | $nonDupSerialFound = FALSE; |
440 | 440 | do { |
441 | 441 | $serial = random_int(1000000000, PHP_INT_MAX); |
@@ -457,7 +457,7 @@ discard block |
||
457 | 457 | throw new Exception("Unknown cert type!"); |
458 | 458 | } |
459 | 459 | return [ |
460 | - "CERT" => openssl_csr_sign($csr, $issuingCa, $issuingCaKey, $expiryDays, ['digest_alg' => $alg, 'config' => dirname(__DIR__) . "/config/SilverbulletClientCerts/openssl-$certtype.cnf"], $serial), |
|
460 | + "CERT" => openssl_csr_sign($csr, $issuingCa, $issuingCaKey, $expiryDays, ['digest_alg' => $alg, 'config' => dirname(__DIR__)."/config/SilverbulletClientCerts/openssl-$certtype.cnf"], $serial), |
|
461 | 461 | "SERIAL" => $serial, |
462 | 462 | "ISSUER" => $issuingCaPem, |
463 | 463 | "ROOT" => $rootCaPem, |
@@ -106,7 +106,7 @@ discard block |
||
106 | 106 | |
107 | 107 | $this->loggerInstance->debug(5, "translateFile($source_name, $output_name, $encoding)\n"); |
108 | 108 | ob_start(); |
109 | - $this->loggerInstance->debug(5, $this->module_path . '/Files/' . $this->device_id . '/' . $source_name . "\n"); |
|
109 | + $this->loggerInstance->debug(5, $this->module_path.'/Files/'.$this->device_id.'/'.$source_name."\n"); |
|
110 | 110 | $source = $this->findSourceFile($source_name); |
111 | 111 | |
112 | 112 | if ($source !== FALSE) { // if there is no file found, don't attempt to include an uninitialised variable |
@@ -114,7 +114,7 @@ discard block |
||
114 | 114 | } |
115 | 115 | $output = ob_get_clean(); |
116 | 116 | if ($encoding) { |
117 | - $outputClean = iconv('UTF-8', $encoding . '//TRANSLIT', $output); |
|
117 | + $outputClean = iconv('UTF-8', $encoding.'//TRANSLIT', $output); |
|
118 | 118 | if ($outputClean) { |
119 | 119 | $output = $outputClean; |
120 | 120 | } |
@@ -158,7 +158,7 @@ discard block |
||
158 | 158 | $encoding = 0; |
159 | 159 | } |
160 | 160 | if ($encoding) { |
161 | - $output_c = iconv('UTF-8', $encoding . '//TRANSLIT', $source_string); |
|
161 | + $output_c = iconv('UTF-8', $encoding.'//TRANSLIT', $source_string); |
|
162 | 162 | } else { |
163 | 163 | $output_c = $source_string; |
164 | 164 | } |
@@ -237,7 +237,7 @@ discard block |
||
237 | 237 | if (isset($this->LANGS[$this->languageInstance->getLang()])) { |
238 | 238 | $language = $this->LANGS[$this->languageInstance->getLang()]; |
239 | 239 | $this->lang = $language['nsis']; |
240 | - $this->codePage = 'cp' . $language['cp']; |
|
240 | + $this->codePage = 'cp'.$language['cp']; |
|
241 | 241 | } else { |
242 | 242 | $this->lang = 'English'; |
243 | 243 | $this->codePage = 'cp1252'; |
@@ -259,8 +259,8 @@ discard block |
||
259 | 259 | $out .= sprintf(_("%s installer will be in the form of an EXE file. It will configure %s on your device, by creating wireless network profiles.<p>When you click the download button, the installer will be saved by your browser. Copy it to the machine you want to configure and execute."), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'], CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']); |
260 | 260 | $out .= "<p>"; |
261 | 261 | if ($ssidCount > $configCount) { |
262 | - $out .= sprintf(ngettext("In addition to <strong>%s</strong> the installer will also configure access to:", "In addition to <strong>%s</strong> the installer will also configure access to the following networks:", $ssidCount - $configCount), implode(', ', $configList)) . " "; |
|
263 | - $out .= '<strong>' . join('</strong>, <strong>', array_diff(array_keys($ssids), $configList)) . '</strong>'; |
|
262 | + $out .= sprintf(ngettext("In addition to <strong>%s</strong> the installer will also configure access to:", "In addition to <strong>%s</strong> the installer will also configure access to the following networks:", $ssidCount - $configCount), implode(', ', $configList))." "; |
|
263 | + $out .= '<strong>'.join('</strong>, <strong>', array_diff(array_keys($ssids), $configList)).'</strong>'; |
|
264 | 264 | $out .= "<p>"; |
265 | 265 | } |
266 | 266 | // TODO - change this below |
@@ -276,8 +276,8 @@ discard block |
||
276 | 276 | $out .= _("When you are connecting to the network for the first time, Windows will pop up a login box, where you should enter your user name and password. This information will be saved so that you will reconnect to the network automatically each time you are in the range."); |
277 | 277 | if ($ssidCount > 1) { |
278 | 278 | $out .= "<p>"; |
279 | - $out .= _("You will be required to enter the same credentials for each of the configured networks:") . " "; |
|
280 | - $out .= '<strong>' . join('</strong>, <strong>', array_keys($ssids)) . '</strong>'; |
|
279 | + $out .= _("You will be required to enter the same credentials for each of the configured networks:")." "; |
|
280 | + $out .= '<strong>'.join('</strong>, <strong>', array_keys($ssids)).'</strong>'; |
|
281 | 281 | } |
282 | 282 | } |
283 | 283 | return $out; |
@@ -379,13 +379,13 @@ discard block |
||
379 | 379 | */ |
380 | 380 | protected function signInstaller() |
381 | 381 | { |
382 | - $fileName = $this->installerBasename . '.exe'; |
|
382 | + $fileName = $this->installerBasename.'.exe'; |
|
383 | 383 | if (!$this->sign) { |
384 | 384 | rename("installer.exe", $fileName); |
385 | 385 | return $fileName; |
386 | 386 | } |
387 | 387 | // are actually signing |
388 | - $outputFromSigning = system($this->sign . " installer.exe '$fileName' > /dev/null"); |
|
388 | + $outputFromSigning = system($this->sign." installer.exe '$fileName' > /dev/null"); |
|
389 | 389 | if ($outputFromSigning === FALSE) { |
390 | 390 | $this->loggerInstance->debug(2, "Signing the WindowsCommon installer $fileName FAILED!\n"); |
391 | 391 | } |
@@ -400,15 +400,15 @@ discard block |
||
400 | 400 | protected function compileNSIS() |
401 | 401 | { |
402 | 402 | if (CONFIG_CONFASSISTANT['NSIS_VERSION'] >= 3) { |
403 | - $makensis = CONFIG_CONFASSISTANT['PATHS']['makensis'] . " -INPUTCHARSET UTF8"; |
|
403 | + $makensis = CONFIG_CONFASSISTANT['PATHS']['makensis']." -INPUTCHARSET UTF8"; |
|
404 | 404 | } else { |
405 | 405 | $makensis = CONFIG_CONFASSISTANT['PATHS']['makensis']; |
406 | 406 | } |
407 | 407 | $lcAll = getenv("LC_ALL"); |
408 | 408 | putenv("LC_ALL=en_US.UTF-8"); |
409 | - $command = $makensis . ' -V4 cat.NSI > nsis.log 2>&1'; |
|
409 | + $command = $makensis.' -V4 cat.NSI > nsis.log 2>&1'; |
|
410 | 410 | system($command); |
411 | - putenv("LC_ALL=" . $lcAll); |
|
411 | + putenv("LC_ALL=".$lcAll); |
|
412 | 412 | $this->loggerInstance->debug(4, "compileNSIS:$command\n"); |
413 | 413 | } |
414 | 414 | |
@@ -425,10 +425,10 @@ discard block |
||
425 | 425 | 'email' => 'SUPPORT', |
426 | 426 | 'url' => 'URL', |
427 | 427 | ]; |
428 | - $s = "support_" . $type . "_substitute"; |
|
428 | + $s = "support_".$type."_substitute"; |
|
429 | 429 | $substitute = $this->translateString($this->$s, $this->codePage); |
430 | - $returnValue = !empty($attr['support:' . $type][0]) ? $attr['support:' . $type][0] : $substitute; |
|
431 | - return '!define ' . $supportString[$type] . ' "' . $returnValue . '"' . "\n"; |
|
430 | + $returnValue = !empty($attr['support:'.$type][0]) ? $attr['support:'.$type][0] : $substitute; |
|
431 | + return '!define '.$supportString[$type].' "'.$returnValue.'"'."\n"; |
|
432 | 432 | } |
433 | 433 | |
434 | 434 | /** |
@@ -439,20 +439,20 @@ discard block |
||
439 | 439 | */ |
440 | 440 | protected function writeNsisDefines($attr) |
441 | 441 | { |
442 | - $fcontents = "\n" . '!define NSIS_MAJOR_VERSION ' . CONFIG_CONFASSISTANT['NSIS_VERSION']; |
|
442 | + $fcontents = "\n".'!define NSIS_MAJOR_VERSION '.CONFIG_CONFASSISTANT['NSIS_VERSION']; |
|
443 | 443 | if ($attr['internal:profile_count'][0] > 1) { |
444 | - $fcontents .= "\n" . '!define USER_GROUP "' . $this->translateString(str_replace('"', '$\\"', $attr['profile:name'][0]), $this->codePage) . '" |
|
444 | + $fcontents .= "\n".'!define USER_GROUP "'.$this->translateString(str_replace('"', '$\\"', $attr['profile:name'][0]), $this->codePage).'" |
|
445 | 445 | '; |
446 | 446 | } |
447 | 447 | $fcontents .= ' |
448 | -Caption "' . $this->translateString(sprintf(WindowsCommon::sprint_nsi(_("%s installer for %s")), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'], $attr['general:instname'][0]), $this->codePage) . '" |
|
449 | -!define APPLICATION "' . $this->translateString(sprintf(WindowsCommon::sprint_nsi(_("%s installer for %s")), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'], $attr['general:instname'][0]), $this->codePage) . '" |
|
450 | -!define VERSION "' . \core\CAT::VERSION_MAJOR . '.' . \core\CAT::VERSION_MINOR . '" |
|
448 | +Caption "' . $this->translateString(sprintf(WindowsCommon::sprint_nsi(_("%s installer for %s")), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'], $attr['general:instname'][0]), $this->codePage).'" |
|
449 | +!define APPLICATION "' . $this->translateString(sprintf(WindowsCommon::sprint_nsi(_("%s installer for %s")), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'], $attr['general:instname'][0]), $this->codePage).'" |
|
450 | +!define VERSION "' . \core\CAT::VERSION_MAJOR.'.'.\core\CAT::VERSION_MINOR.'" |
|
451 | 451 | !define INSTALLER_NAME "installer.exe" |
452 | -!define LANG "' . $this->lang . '" |
|
453 | -!define LOCALE "' . preg_replace('/\..*$/', '', CONFIG['LANGUAGES'][$this->languageInstance->getLang()]['locale']) . '" |
|
452 | +!define LANG "' . $this->lang.'" |
|
453 | +!define LOCALE "' . preg_replace('/\..*$/', '', CONFIG['LANGUAGES'][$this->languageInstance->getLang()]['locale']).'" |
|
454 | 454 | ;-------------------------------- |
455 | -!define ORGANISATION "' . $this->translateString($attr['general:instname'][0], $this->codePage) . '" |
|
455 | +!define ORGANISATION "' . $this->translateString($attr['general:instname'][0], $this->codePage).'" |
|
456 | 456 | '; |
457 | 457 | $fcontents .= $this->getSupport($attr, 'email'); |
458 | 458 | $fcontents .= $this->getSupport($attr, 'url'); |
@@ -460,18 +460,18 @@ discard block |
||
460 | 460 | $fcontents .= '!define WIRED |
461 | 461 | '; |
462 | 462 | } |
463 | - $fcontents .= '!define PROVIDERID "urn:UUID:' . $this->deviceUUID . '" |
|
463 | + $fcontents .= '!define PROVIDERID "urn:UUID:'.$this->deviceUUID.'" |
|
464 | 464 | '; |
465 | 465 | if (!empty($attr['internal:realm'][0])) { |
466 | - $fcontents .= '!define REALM "' . $attr['internal:realm'][0] . '" |
|
466 | + $fcontents .= '!define REALM "'.$attr['internal:realm'][0].'" |
|
467 | 467 | '; |
468 | 468 | } |
469 | 469 | if (!empty($attr['internal:hint_userinput_suffix'][0]) && $attr['internal:hint_userinput_suffix'][0] == 1) { |
470 | - $fcontents .= '!define HINT_USER_INPUT "' . $attr['internal:hint_userinput_suffix'][0] . '" |
|
470 | + $fcontents .= '!define HINT_USER_INPUT "'.$attr['internal:hint_userinput_suffix'][0].'" |
|
471 | 471 | '; |
472 | 472 | } |
473 | 473 | if (!empty($attr['internal:verify_userinput_suffix'][0]) && $attr['internal:verify_userinput_suffix'][0] == 1) { |
474 | - $fcontents .= '!define VERIFY_USER_REALM_INPUT "' . $attr['internal:verify_userinput_suffix'][0] . '" |
|
474 | + $fcontents .= '!define VERIFY_USER_REALM_INPUT "'.$attr['internal:verify_userinput_suffix'][0].'" |
|
475 | 475 | '; |
476 | 476 | } |
477 | 477 | $fcontents .= $this->msInfoFile($attr); |
@@ -492,7 +492,7 @@ discard block |
||
492 | 492 | $out .= '!define EXTERNAL_INFO "'; |
493 | 493 | // $this->loggerInstance->debug(4,"Info file type ".$attr['support:info_file'][0]['mime']."\n"); |
494 | 494 | if ($attr['internal:info_file'][0]['mime'] == 'rtf') { |
495 | - $out = '!define LICENSE_FILE "' . $attr['internal:info_file'][0]['name']; |
|
495 | + $out = '!define LICENSE_FILE "'.$attr['internal:info_file'][0]['name']; |
|
496 | 496 | } elseif ($attr['internal:info_file'][0]['mime'] == 'txt') { |
497 | 497 | $infoFile = file_get_contents($attr['internal:info_file'][0]['name']); |
498 | 498 | if ($infoFile === FALSE) { |
@@ -501,14 +501,14 @@ discard block |
||
501 | 501 | if (CONFIG_CONFASSISTANT['NSIS_VERSION'] >= 3) { |
502 | 502 | $infoFileConverted = $infoFile; |
503 | 503 | } else { |
504 | - $infoFileConverted = iconv('UTF-8', $this->codePage . '//TRANSLIT', $infoFile); |
|
504 | + $infoFileConverted = iconv('UTF-8', $this->codePage.'//TRANSLIT', $infoFile); |
|
505 | 505 | } |
506 | 506 | if ($infoFileConverted !== FALSE && strlen($infoFileConverted) > 0) { |
507 | 507 | file_put_contents('info_f.txt', $infoFileConverted); |
508 | 508 | $out = '!define LICENSE_FILE " info_f.txt'; |
509 | 509 | } |
510 | 510 | } else { |
511 | - $out = '!define EXTERNAL_INFO "' . $attr['internal:info_file'][0]['name']; |
|
511 | + $out = '!define EXTERNAL_INFO "'.$attr['internal:info_file'][0]['name']; |
|
512 | 512 | } |
513 | 513 | |
514 | 514 | $out .= "\"\n"; |
@@ -19,7 +19,7 @@ discard block |
||
19 | 19 | * <base_url>/copyright.php after deploying the software |
20 | 20 | */ |
21 | 21 | |
22 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
22 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
23 | 23 | |
24 | 24 | $auth = new \web\lib\admin\Authentication(); |
25 | 25 | $deco = new \web\lib\admin\PageDecoration(); |
@@ -94,12 +94,12 @@ discard block |
||
94 | 94 | </table> |
95 | 95 | </div> |
96 | 96 | <?php |
97 | - echo "<form enctype='multipart/form-data' action='edit_idp_result.php?inst_id=$my_inst->identifier" . ($wizardStyle ? "&wizard=true" : "") . "' method='post' accept-charset='UTF-8'> |
|
98 | - <input type='hidden' name='MAX_FILE_SIZE' value='" . CONFIG['MAX_UPLOAD_SIZE'] . "'>"; |
|
97 | + echo "<form enctype='multipart/form-data' action='edit_idp_result.php?inst_id=$my_inst->identifier".($wizardStyle ? "&wizard=true" : "")."' method='post' accept-charset='UTF-8'> |
|
98 | + <input type='hidden' name='MAX_FILE_SIZE' value='" . CONFIG['MAX_UPLOAD_SIZE']."'>"; |
|
99 | 99 | |
100 | 100 | if ($wizardStyle) { |
101 | - echo "<p>" . |
|
102 | - sprintf(_("Hello, newcomer. The %s is new to us. This wizard will ask you several questions about it, so that we can generate beautiful profiles for you in the end. All of the information below is optional, but it is important to fill out as many fields as possible for the benefit of your end users."), $uiElements->nomenclatureInst) . "</p>"; |
|
101 | + echo "<p>". |
|
102 | + sprintf(_("Hello, newcomer. The %s is new to us. This wizard will ask you several questions about it, so that we can generate beautiful profiles for you in the end. All of the information below is optional, but it is important to fill out as many fields as possible for the benefit of your end users."), $uiElements->nomenclatureInst)."</p>"; |
|
103 | 103 | } |
104 | 104 | $optionDisplay = new web\lib\admin\OptionDisplay($idpoptions, "IdP"); |
105 | 105 | ?> |
@@ -107,11 +107,11 @@ discard block |
||
107 | 107 | <legend><strong><?php echo _("General Information"); ?></strong></legend> |
108 | 108 | <?php |
109 | 109 | if ($wizardStyle) { |
110 | - echo "<p>" . |
|
111 | - _("Some properties are valid across all deployment profiles. This is the place where you can describe those properties in a fine-grained way. The solicited information is used as follows:") . "</p> |
|
110 | + echo "<p>". |
|
111 | + _("Some properties are valid across all deployment profiles. This is the place where you can describe those properties in a fine-grained way. The solicited information is used as follows:")."</p> |
|
112 | 112 | <ul> |
113 | - <li>" . _("<strong>Logo</strong>: When you submit a logo, we will embed this logo into all installers where a custom logo is possible. We accept any image format, but for best results, we suggest SVG. If you don't upload a logo, we will use the generic logo instead (see top-right corner of this page).") . "</li> |
|
114 | - <li>" . sprintf(_("<strong>Name</strong>: The %s may have names in multiple languages. It is recommended to always populate at least the 'default/other' language, as it is used as a fallback if the system does not have a name in the exact language the user requests a download in."),$uiElements->nomenclatureInst) . "</li>"; |
|
113 | + <li>" . _("<strong>Logo</strong>: When you submit a logo, we will embed this logo into all installers where a custom logo is possible. We accept any image format, but for best results, we suggest SVG. If you don't upload a logo, we will use the generic logo instead (see top-right corner of this page).")."</li> |
|
114 | + <li>" . sprintf(_("<strong>Name</strong>: The %s may have names in multiple languages. It is recommended to always populate at least the 'default/other' language, as it is used as a fallback if the system does not have a name in the exact language the user requests a download in."), $uiElements->nomenclatureInst)."</li>"; |
|
115 | 115 | echo "</ul>"; |
116 | 116 | } |
117 | 117 | echo $optionDisplay->prefilledOptionTable("general"); |
@@ -125,30 +125,30 @@ discard block |
||
125 | 125 | <legend><strong><?php echo _("Media Properties"); ?></strong></legend> |
126 | 126 | <?php |
127 | 127 | if ($wizardStyle) { |
128 | - echo "<p>" . |
|
129 | - sprintf(_("In this section, you define on which media %s should be configured on user devices."), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']) . "</p> |
|
128 | + echo "<p>". |
|
129 | + sprintf(_("In this section, you define on which media %s should be configured on user devices."), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'])."</p> |
|
130 | 130 | <ul>"; |
131 | 131 | echo "<li>"; |
132 | - echo "<strong>" . ( count(CONFIG_CONFASSISTANT['CONSORTIUM']['ssid']) > 0 ? _("Additional SSIDs:") : _("SSIDs:")) . " </strong>"; |
|
132 | + echo "<strong>".(count(CONFIG_CONFASSISTANT['CONSORTIUM']['ssid']) > 0 ? _("Additional SSIDs:") : _("SSIDs:"))." </strong>"; |
|
133 | 133 | if (count(CONFIG_CONFASSISTANT['CONSORTIUM']['ssid']) > 0) { |
134 | 134 | $ssidlist = ""; |
135 | 135 | foreach (CONFIG_CONFASSISTANT['CONSORTIUM']['ssid'] as $ssid) { |
136 | - $ssidlist .= ", '<strong>" . $ssid . "</strong>'"; |
|
136 | + $ssidlist .= ", '<strong>".$ssid."</strong>'"; |
|
137 | 137 | } |
138 | 138 | $ssidlist = substr($ssidlist, 2); |
139 | 139 | echo sprintf(ngettext("We will always configure this SSID for WPA2/AES: %s.", "We will always configure these SSIDs for WPA2/AES: %s.", count(CONFIG_CONFASSISTANT['CONSORTIUM']['ssid'])), $ssidlist); |
140 | 140 | if (CONFIG_CONFASSISTANT['CONSORTIUM']['tkipsupport']) { |
141 | - echo " " . _("They will also be configured for WPA/TKIP if the device supports multiple encryption types."); |
|
141 | + echo " "._("They will also be configured for WPA/TKIP if the device supports multiple encryption types."); |
|
142 | 142 | } |
143 | - echo "<br/>" . sprintf(_("It is also possible to define custom additional SSIDs with the options '%s' and '%s' below."), $uiElements->displayName("media:SSID"), $uiElements->displayName("media:SSID_with_legacy")); |
|
143 | + echo "<br/>".sprintf(_("It is also possible to define custom additional SSIDs with the options '%s' and '%s' below."), $uiElements->displayName("media:SSID"), $uiElements->displayName("media:SSID_with_legacy")); |
|
144 | 144 | } else { |
145 | 145 | echo _("Please configure which SSIDs should be configured in the installers."); |
146 | 146 | } |
147 | - echo " " . _("By default, we will only configure the SSIDs with WPA2/AES encryption. By using the '(with WPA/TKIP)' option you can specify that we should include legacy support for WPA/TKIP where possible."); |
|
147 | + echo " "._("By default, we will only configure the SSIDs with WPA2/AES encryption. By using the '(with WPA/TKIP)' option you can specify that we should include legacy support for WPA/TKIP where possible."); |
|
148 | 148 | echo "</li>"; |
149 | 149 | |
150 | 150 | echo "<li>"; |
151 | - echo "<strong>" . ( count(CONFIG_CONFASSISTANT['CONSORTIUM']['ssid']) > 0 ? _("Additional Hotspot 2.0 / Passpoint Consortia:") : _("Hotspot 2.0 / Passpoint Consortia:")) . " </strong>"; |
|
151 | + echo "<strong>".(count(CONFIG_CONFASSISTANT['CONSORTIUM']['ssid']) > 0 ? _("Additional Hotspot 2.0 / Passpoint Consortia:") : _("Hotspot 2.0 / Passpoint Consortia:"))." </strong>"; |
|
152 | 152 | if (count(CONFIG_CONFASSISTANT['CONSORTIUM']['interworking-consortium-oi']) > 0) { |
153 | 153 | $consortiumlist = ""; |
154 | 154 | foreach (CONFIG_CONFASSISTANT['CONSORTIUM']['interworking-consortium-oi'] as $displayName => $oi) { |
@@ -157,15 +157,15 @@ discard block |
||
157 | 157 | $consortiumlistFinal = substr($consortiumlist, 2); |
158 | 158 | echo sprintf(ngettext("We will always configure this Consortium OI: %s.", "We will always configure these Consortium OIs: %s.", count(CONFIG_CONFASSISTANT['CONSORTIUM']['interworking-consortium-oi'])), $consortiumlistFinal); |
159 | 159 | |
160 | - echo "<br/>" . sprintf(_("It is also possible to define custom additional OIs with the option '%s' below."), $uiElements->displayName("media:consortium_OI")); |
|
160 | + echo "<br/>".sprintf(_("It is also possible to define custom additional OIs with the option '%s' below."), $uiElements->displayName("media:consortium_OI")); |
|
161 | 161 | } else { |
162 | 162 | echo _("Please configure which Consortium OIs should be configured in the installers."); |
163 | 163 | } |
164 | 164 | echo "</li>"; |
165 | - echo "<li><strong>" . _("Support for wired IEEE 802.1X:") . " </strong>" |
|
166 | - . _("If you want to configure your users' devices with IEEE 802.1X support for wired ethernet, please check the corresponding box. Note that this makes the installation process a bit more difficult on some platforms (Windows: needs administrator privileges; Apple: attempting to install a profile with wired support on a device without an active wired ethernet card will fail).") . |
|
165 | + echo "<li><strong>"._("Support for wired IEEE 802.1X:")." </strong>" |
|
166 | + . _("If you want to configure your users' devices with IEEE 802.1X support for wired ethernet, please check the corresponding box. Note that this makes the installation process a bit more difficult on some platforms (Windows: needs administrator privileges; Apple: attempting to install a profile with wired support on a device without an active wired ethernet card will fail)."). |
|
167 | 167 | "</li>"; |
168 | - echo "<li><strong>" . _("Removal of bootstrap/onboarding SSIDs:") . " </strong>" |
|
168 | + echo "<li><strong>"._("Removal of bootstrap/onboarding SSIDs:")." </strong>" |
|
169 | 169 | . _("If you use a captive portal to distribute configurations, you may want to unconfigure/disable that SSID after the bootstrap process. With this option, the SSID will either be removed, or be defined as 'Only connect manually'.") |
170 | 170 | . "</li>"; |
171 | 171 | echo "</ul>"; |
@@ -181,16 +181,16 @@ discard block |
||
181 | 181 | echo "<p>"._("This section can be used to upload specific Terms of Use for your users and to display details of how your users can reach your local helpdesk.")."</p>"; |
182 | 182 | |
183 | 183 | if (CONFIG['FUNCTIONALITY_LOCATIONS']['CONFASSISTANT_RADIUS'] == "LOCAL") { |
184 | - echo "<p>" . |
|
184 | + echo "<p>". |
|
185 | 185 | |
186 | - sprintf(_("Do you provide helpdesk services for your users? If so, it would be nice if you would tell us the pointers to this helpdesk."),$uiElements->nomenclatureInst) . "</p>" . |
|
187 | - "<p>" . |
|
188 | - _("If you enter a value here, it will be added to the installers for all your users, and will be displayed on the download page. If you operate separate helpdesks for different user groups (we call this 'profiles') specify per-profile helpdesk information later in this wizard. If you operate no help desk at all, just leave these fields empty.") . "</p>"; |
|
186 | + sprintf(_("Do you provide helpdesk services for your users? If so, it would be nice if you would tell us the pointers to this helpdesk."), $uiElements->nomenclatureInst)."</p>". |
|
187 | + "<p>". |
|
188 | + _("If you enter a value here, it will be added to the installers for all your users, and will be displayed on the download page. If you operate separate helpdesks for different user groups (we call this 'profiles') specify per-profile helpdesk information later in this wizard. If you operate no help desk at all, just leave these fields empty.")."</p>"; |
|
189 | 189 | if (CONFIG['FUNCTIONALITY_LOCATIONS']['CONFASSISTANT_SILVERBULLET'] == "LOCAL") { |
190 | - echo "<p>" . sprintf(_("For %s deployments, providing at least a local e-mail contact is required."), core\ProfileSilverbullet::PRODUCTNAME) ." " . _("This is the contact point for your end users' level 1 support.") . "</p>"; |
|
190 | + echo "<p>".sprintf(_("For %s deployments, providing at least a local e-mail contact is required."), core\ProfileSilverbullet::PRODUCTNAME)." "._("This is the contact point for your end users' level 1 support.")."</p>"; |
|
191 | 191 | } |
192 | 192 | } elseif (CONFIG['FUNCTIONALITY_LOCATIONS']['CONFASSISTANT_SILVERBULLET'] == "LOCAL") { |
193 | - echo "<p>". _("Providing at least a local support e-mail contact is required.")." "._("This is the contact point for your end users' level 1 support.")."</p>"; |
|
193 | + echo "<p>"._("Providing at least a local support e-mail contact is required.")." "._("This is the contact point for your end users' level 1 support.")."</p>"; |
|
194 | 194 | } |
195 | 195 | |
196 | 196 | } |
@@ -200,8 +200,8 @@ discard block |
||
200 | 200 | <button type='button' class='newoption' onclick='getXML("support")'><?php echo _("Add new option"); ?></button></fieldset> |
201 | 201 | <?php |
202 | 202 | if ($wizardStyle) { |
203 | - echo "<p>" . sprintf(_("When you are sure that everything is correct, please click on %sContinue ...%s"), "<button type='submit' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_CONTINUE . "'>", "</button>") . "</p></form>"; |
|
203 | + echo "<p>".sprintf(_("When you are sure that everything is correct, please click on %sContinue ...%s"), "<button type='submit' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_CONTINUE."'>", "</button>")."</p></form>"; |
|
204 | 204 | } else { |
205 | - echo "<div><button type='submit' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_SAVE . "'>" . _("Save data") . "</button> <button type='button' class='delete' name='abortbutton' value='abort' onclick='javascript:window.location = \"overview_idp.php?inst_id=$my_inst->identifier\"'>" . _("Discard changes") . "</button></div></form>"; |
|
205 | + echo "<div><button type='submit' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_SAVE."'>"._("Save data")."</button> <button type='button' class='delete' name='abortbutton' value='abort' onclick='javascript:window.location = \"overview_idp.php?inst_id=$my_inst->identifier\"'>"._("Discard changes")."</button></div></form>"; |
|
206 | 206 | } |
207 | 207 | echo $deco->footer(); |
@@ -701,7 +701,7 @@ |
||
701 | 701 | \core\common\Entity::$nomenclature_inst, |
702 | 702 | count($this->CAsAccountedFor)+1, |
703 | 703 | ($ca['root'] ? _("Root") : _("Intermediate"))) . |
704 | - "</string> |
|
704 | + "</string> |
|
705 | 705 | <key>PayloadIdentifier</key> |
706 | 706 | <string>" . self::$iPhonePayloadPrefix . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
707 | 707 | <key>PayloadOrganization</key> |
@@ -98,15 +98,15 @@ discard block |
||
98 | 98 | <key>PayloadDescription</key> |
99 | 99 | <string>$tagline</string> |
100 | 100 | <key>PayloadDisplayName</key> |
101 | - <string>" . CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'] . "</string> |
|
101 | + <string>".CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']."</string> |
|
102 | 102 | <key>PayloadIdentifier</key> |
103 | - <string>" . self::$iPhonePayloadPrefix . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang</string> |
|
103 | + <string>" . self::$iPhonePayloadPrefix.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang</string> |
|
104 | 104 | <key>PayloadOrganization</key> |
105 | - <string>" . htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['general:instname'][0]), ENT_XML1, 'UTF-8') . ( $this->attributes['internal:profile_count'][0] > 1 ? " (" . htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['profile:name'][0]), ENT_XML1, 'UTF-8') . ")" : "") . "</string> |
|
105 | + <string>".htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['general:instname'][0]), ENT_XML1, 'UTF-8').($this->attributes['internal:profile_count'][0] > 1 ? " (".htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['profile:name'][0]), ENT_XML1, 'UTF-8').")" : "")."</string> |
|
106 | 106 | <key>PayloadType</key> |
107 | 107 | <string>Configuration</string> |
108 | 108 | <key>PayloadUUID</key> |
109 | - <string>" . \core\common\Entity::uuid('', self::$iPhonePayloadPrefix . $this->massagedConsortium . $this->massagedCountry . $this->massagedInst . $this->massagedProfile) . "</string> |
|
109 | + <string>" . \core\common\Entity::uuid('', self::$iPhonePayloadPrefix.$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile)."</string> |
|
110 | 110 | <key>PayloadVersion</key> |
111 | 111 | <integer>1</integer>"; |
112 | 112 | \core\common\Entity::outOfThePotatoes(); |
@@ -138,16 +138,16 @@ discard block |
||
138 | 138 | { |
139 | 139 | \core\common\Entity::intoThePotatoes(); |
140 | 140 | if (isset($this->attributes['support:info_file'])) { |
141 | - return MobileconfigSuperclass::BUFFER_CONSENT_PRE . htmlspecialchars(iconv("UTF-8", "UTF-8//TRANSLIT", $this->attributes['support:info_file'][0]), ENT_XML1, 'UTF-8') . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
141 | + return MobileconfigSuperclass::BUFFER_CONSENT_PRE.htmlspecialchars(iconv("UTF-8", "UTF-8//TRANSLIT", $this->attributes['support:info_file'][0]), ENT_XML1, 'UTF-8').MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
142 | 142 | } |
143 | 143 | if ($this->attributes['internal:verify_userinput_suffix'][0] != 0) { |
144 | 144 | if (strlen($this->attributes['internal:realm'][0]) > 0) { |
145 | 145 | /// note space between variable and exclamation mark - makes sure users don't mistakenly think the exclamation mark is part of the required username! |
146 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . sprintf(_("Important Notice: your username must end with @%s !"), $this->attributes['internal:realm'][0]) . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
146 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE.sprintf(_("Important Notice: your username must end with @%s !"), $this->attributes['internal:realm'][0]).MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
147 | 147 | \core\common\Entity::outOfThePotatoes(); |
148 | 148 | return $retval; |
149 | 149 | } |
150 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . _("Important Notice: your username MUST be in the form of xxx@yyy where the yyy is a common suffix identifying your Identity Provider. Please find out what to use there and enter the username in the correct format.") . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
150 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE._("Important Notice: your username MUST be in the form of xxx@yyy where the yyy is a common suffix identifying your Identity Provider. Please find out what to use there and enter the username in the correct format.").MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
151 | 151 | \core\common\Entity::outOfThePotatoes(); |
152 | 152 | return $retval; |
153 | 153 | } |
@@ -171,7 +171,7 @@ discard block |
||
171 | 171 | // also escape htmlspecialchars |
172 | 172 | // not all names and profiles have a name, so be prepared |
173 | 173 | |
174 | - $this->loggerInstance->debug(5, "List of available attributes: " . var_export($this->attributes, TRUE)); |
|
174 | + $this->loggerInstance->debug(5, "List of available attributes: ".var_export($this->attributes, TRUE)); |
|
175 | 175 | |
176 | 176 | $this->instName = $this->attributes['general:instname'][0] ?? _("Unnamed Organisation"); |
177 | 177 | $this->profileName = $this->attributes['profile:name'][0] ?? _("Unnamed Profile"); |
@@ -213,7 +213,7 @@ discard block |
||
213 | 213 | |
214 | 214 | file_put_contents('installer_profile', $outputXml); |
215 | 215 | |
216 | - $fileName = $this->installerBasename . '.mobileconfig'; |
|
216 | + $fileName = $this->installerBasename.'.mobileconfig'; |
|
217 | 217 | |
218 | 218 | if (!$this->sign) { |
219 | 219 | rename("installer_profile", $fileName); |
@@ -221,7 +221,7 @@ discard block |
||
221 | 221 | return $fileName; |
222 | 222 | } |
223 | 223 | // still here? Then we are signing. |
224 | - $signing = system($this->sign . " installer_profile '$fileName' > /dev/null"); |
|
224 | + $signing = system($this->sign." installer_profile '$fileName' > /dev/null"); |
|
225 | 225 | if ($signing === FALSE) { |
226 | 226 | $this->loggerInstance->debug(2, "Signing the mobileconfig installer $fileName FAILED!\n"); |
227 | 227 | } |
@@ -240,19 +240,19 @@ discard block |
||
240 | 240 | \core\common\Entity::intoThePotatoes(); |
241 | 241 | $ssidCount = count($this->attributes['internal:SSID']); |
242 | 242 | $certCount = count($this->attributes['internal:CAs'][0]); |
243 | - $out = "<p>" . _("For best results, please use the built-in browser (Safari) to open the configuration file.") . "</p>"; |
|
243 | + $out = "<p>"._("For best results, please use the built-in browser (Safari) to open the configuration file.")."</p>"; |
|
244 | 244 | $out .= "<p>"; |
245 | 245 | $out .= _("The profile will install itself after you click (or tap) the button. You will be asked for confirmation/input at several points:"); |
246 | 246 | $out .= "<ul>"; |
247 | - $out .= "<li>" . _("to install the profile") . "</li>"; |
|
248 | - $out .= "<li>" . ngettext("to accept the server certificate authority", "to accept the server certificate authorities", $certCount); |
|
247 | + $out .= "<li>"._("to install the profile")."</li>"; |
|
248 | + $out .= "<li>".ngettext("to accept the server certificate authority", "to accept the server certificate authorities", $certCount); |
|
249 | 249 | if ($certCount > 1) { |
250 | - $out .= " " . sprintf(_("(%d times)"), $certCount); |
|
250 | + $out .= " ".sprintf(_("(%d times)"), $certCount); |
|
251 | 251 | } |
252 | 252 | $out .= "</li>"; |
253 | - $out .= "<li>" . _("to enter the username and password you have been given by your organisation"); |
|
253 | + $out .= "<li>"._("to enter the username and password you have been given by your organisation"); |
|
254 | 254 | if ($ssidCount > 1) { |
255 | - $out .= " " . sprintf(_("(%d times each, because %s is installed for %d SSIDs)"), $ssidCount, CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'], $ssidCount); |
|
255 | + $out .= " ".sprintf(_("(%d times each, because %s is installed for %d SSIDs)"), $ssidCount, CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'], $ssidCount); |
|
256 | 256 | } |
257 | 257 | $out .= "</li>"; |
258 | 258 | $out .= "</ul>"; |
@@ -305,7 +305,7 @@ discard block |
||
305 | 305 | $retval .= " <key>RoamingConsortiumOIs</key> |
306 | 306 | <array>"; |
307 | 307 | |
308 | - $retval .= "<string>" . strtoupper($consortiumOi) . "</string>"; |
|
308 | + $retval .= "<string>".strtoupper($consortiumOi)."</string>"; |
|
309 | 309 | |
310 | 310 | $retval .= "</array>"; |
311 | 311 | // this is an undocumented value found on the net. Does it do something useful? |
@@ -346,7 +346,7 @@ discard block |
||
346 | 346 | <dict> |
347 | 347 | <key>AcceptEAPTypes</key> |
348 | 348 | <array> |
349 | - <integer>" . $eapType['OUTER'] . "</integer> |
|
349 | + <integer>" . $eapType['OUTER']."</integer> |
|
350 | 350 | </array> |
351 | 351 | <key>EAPFASTProvisionPAC</key> |
352 | 352 | <true /> |
@@ -359,7 +359,7 @@ discard block |
||
359 | 359 | "; |
360 | 360 | if ($realm !== NULL) { |
361 | 361 | $retval .= "<key>OuterIdentity</key> |
362 | - <string>" . htmlspecialchars($realm, ENT_XML1, 'UTF-8') . "</string> |
|
362 | + <string>" . htmlspecialchars($realm, ENT_XML1, 'UTF-8')."</string> |
|
363 | 363 | "; |
364 | 364 | } |
365 | 365 | $retval .= "<key>PayloadCertificateAnchorUUID</key> |
@@ -383,11 +383,11 @@ discard block |
||
383 | 383 | $retval .= " |
384 | 384 | </array>"; |
385 | 385 | if ($eapType['INNER'] == \core\common\EAP::NE_SILVERBULLET) { |
386 | - $retval .= "<key>UserName</key><string>" . $this->clientCert["certObject"]->username . "</string>"; |
|
386 | + $retval .= "<key>UserName</key><string>".$this->clientCert["certObject"]->username."</string>"; |
|
387 | 387 | } |
388 | 388 | $retval .= " |
389 | 389 | <key>TTLSInnerAuthentication</key> |
390 | - <string>" . ($eapType['INNER'] == \core\common\EAP::NONE ? "PAP" : "MSCHAPv2") . "</string> |
|
390 | + <string>" . ($eapType['INNER'] == \core\common\EAP::NONE ? "PAP" : "MSCHAPv2")."</string> |
|
391 | 391 | </dict>"; |
392 | 392 | return $retval; |
393 | 393 | } |
@@ -407,9 +407,9 @@ discard block |
||
407 | 407 | // characters are still reversed, invert on use! |
408 | 408 | $buffer .= "<string>Manual</string> |
409 | 409 | <key>ProxyServer</key> |
410 | - <string>" . strrev($serverAndPort[1]) . "</string> |
|
410 | + <string>" . strrev($serverAndPort[1])."</string> |
|
411 | 411 | <key>ProxyServerPort</key> |
412 | - <integer>" . strrev($serverAndPort[0]) . "</integer> |
|
412 | + <integer>" . strrev($serverAndPort[0])."</integer> |
|
413 | 413 | <key>ProxyPACFallbackAllowed</key> |
414 | 414 | <false/>"; |
415 | 415 | } else { |
@@ -438,7 +438,7 @@ discard block |
||
438 | 438 | throw new Exception("SSID must be a string!"); |
439 | 439 | } |
440 | 440 | $escapedSSID = htmlspecialchars($toBeConfigured, ENT_XML1, 'UTF-8'); |
441 | - $payloadIdentifier = "wifi." . $this->serial; |
|
441 | + $payloadIdentifier = "wifi.".$this->serial; |
|
442 | 442 | $payloadShortName = sprintf(_("SSID %s"), $escapedSSID); |
443 | 443 | $payloadName = sprintf(_("%s configuration for network name %s"), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'], $escapedSSID); |
444 | 444 | $encryptionTypeString = "WPA"; |
@@ -468,7 +468,7 @@ discard block |
||
468 | 468 | $payloadIdentifier = "hs20.$toBeConfigured"; |
469 | 469 | $knownOiName = array_search($toBeConfigured, CONFIG_CONFASSISTANT['CONSORTIUM']['interworking-consortium-oi']); |
470 | 470 | if ($knownOiName === FALSE) { // a custom RCOI as set by the IdP admin; do not use the term "eduroam" in that one! |
471 | - $knownOiName = $this->instName . " "._("Roaming Partner"); |
|
471 | + $knownOiName = $this->instName." "._("Roaming Partner"); |
|
472 | 472 | } |
473 | 473 | $payloadShortName = $knownOiName; |
474 | 474 | $payloadName = _("Passpoint roaming configuration ($knownOiName)"); |
@@ -490,11 +490,11 @@ discard block |
||
490 | 490 | <key>PayloadDisplayName</key> |
491 | 491 | <string>$payloadShortName</string> |
492 | 492 | <key>PayloadIdentifier</key> |
493 | - <string>" . self::$iPhonePayloadPrefix . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.$payloadIdentifier</string> |
|
493 | + <string>".self::$iPhonePayloadPrefix.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.$payloadIdentifier</string> |
|
494 | 494 | <key>PayloadOrganization</key> |
495 | - <string>" . $this->massagedConsortium . ".1x-config.org</string> |
|
495 | + <string>".$this->massagedConsortium.".1x-config.org</string> |
|
496 | 496 | <key>PayloadType</key> |
497 | - <string>com.apple." . ($blocktype == MobileconfigSuperclass::NETWORK_BLOCK_TYPE_WIRED ? "firstactiveethernet" : "wifi") . ".managed</string>"; |
|
497 | + <string>com.apple." . ($blocktype == MobileconfigSuperclass::NETWORK_BLOCK_TYPE_WIRED ? "firstactiveethernet" : "wifi").".managed</string>"; |
|
498 | 498 | $retval .= $this->proxySettings(); |
499 | 499 | $retval .= $setupModesString; |
500 | 500 | if ($eapType['INNER'] == \core\common\EAP::NE_SILVERBULLET) { |
@@ -506,7 +506,7 @@ discard block |
||
506 | 506 | } |
507 | 507 | $retval .= " |
508 | 508 | <key>PayloadUUID</key> |
509 | - <string>" . \core\common\Entity::uuid() . "</string> |
|
509 | + <string>" . \core\common\Entity::uuid()."</string> |
|
510 | 510 | <key>PayloadVersion</key> |
511 | 511 | <integer>1</integer> |
512 | 512 | $wifiNetworkIdentification</dict>"; |
@@ -536,15 +536,15 @@ discard block |
||
536 | 536 | <key>IsHotspot</key> |
537 | 537 | <false/> |
538 | 538 | <key>PayloadDescription</key> |
539 | - <string>" . sprintf(_("This SSID should not be used after bootstrapping %s"), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']) . "</string> |
|
539 | + <string>" . sprintf(_("This SSID should not be used after bootstrapping %s"), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'])."</string> |
|
540 | 540 | <key>PayloadDisplayName</key> |
541 | - <string>" . _("Disabled WiFi network") . "</string> |
|
541 | + <string>" . _("Disabled WiFi network")."</string> |
|
542 | 542 | <key>PayloadIdentifier</key> |
543 | - <string>" . self::$iPhonePayloadPrefix . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.wifi.disabled.$this->removeSerial</string> |
|
543 | + <string>" . self::$iPhonePayloadPrefix.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.wifi.disabled.$this->removeSerial</string> |
|
544 | 544 | <key>PayloadType</key> |
545 | 545 | <string>com.apple.wifi.managed</string> |
546 | 546 | <key>PayloadUUID</key> |
547 | - <string>" . \core\common\Entity::uuid() . "</string> |
|
547 | + <string>".\core\common\Entity::uuid()."</string> |
|
548 | 548 | <key>PayloadVersion</key> |
549 | 549 | <real>1</real>"; |
550 | 550 | $retval .= $this->proxySettings(); |
@@ -623,12 +623,12 @@ discard block |
||
623 | 623 | $mimeBlob = base64_encode($binaryBlob); |
624 | 624 | $mimeFormatted = chunk_split($mimeBlob, 52, "\r\n"); |
625 | 625 | $payloadUUID = \core\common\Entity::uuid('', $mimeBlob); |
626 | - $retArray = ["block" => "<dict>" . |
|
626 | + $retArray = ["block" => "<dict>". |
|
627 | 627 | // we don't include the import password. It's displayed on screen, and should be input by the user. |
628 | 628 | // <key>Password</key> |
629 | 629 | // <string>" . $this->clientCert['password'] . "</string> |
630 | 630 | "<key>PayloadCertificateFileName</key> |
631 | - <string>" . $this->massagedConsortium . ".pfx</string> |
|
631 | + <string>" . $this->massagedConsortium.".pfx</string> |
|
632 | 632 | <key>PayloadContent</key> |
633 | 633 | <data> |
634 | 634 | $mimeFormatted |
@@ -636,7 +636,7 @@ discard block |
||
636 | 636 | <key>PayloadDescription</key> |
637 | 637 | <string>MIME Base-64 encoded PKCS#12 Client Certificate</string> |
638 | 638 | <key>PayloadDisplayName</key> |
639 | - <string>" . _("eduroam user certificate") . "</string> |
|
639 | + <string>"._("eduroam user certificate")."</string> |
|
640 | 640 | <key>PayloadIdentifier</key> |
641 | 641 | <string>com.apple.security.pkcs12.$payloadUUID</string> |
642 | 642 | <key>PayloadType</key> |
@@ -646,7 +646,7 @@ discard block |
||
646 | 646 | <key>PayloadVersion</key> |
647 | 647 | <integer>1</integer> |
648 | 648 | </dict>", |
649 | - "UUID" => $payloadUUID,]; |
|
649 | + "UUID" => $payloadUUID, ]; |
|
650 | 650 | \core\common\Entity::outOfThePotatoes(); |
651 | 651 | return $retArray; |
652 | 652 | } |
@@ -665,7 +665,7 @@ discard block |
||
665 | 665 | } |
666 | 666 | $expiryTime = new \DateTime($this->clientCert['certObject']->expiry); |
667 | 667 | return "<key>RemovalDate</key> |
668 | - <date>" . $expiryTime->format("Y-m-d") . "T" . $expiryTime->format("H:i:s") . "Z</date>"; |
|
668 | + <date>" . $expiryTime->format("Y-m-d")."T".$expiryTime->format("H:i:s")."Z</date>"; |
|
669 | 669 | } |
670 | 670 | |
671 | 671 | private $CAsAccountedFor = []; |
@@ -689,27 +689,27 @@ discard block |
||
689 | 689 | $stream = " |
690 | 690 | <dict> |
691 | 691 | <key>PayloadCertificateFileName</key> |
692 | - <string>" . $ca['uuid'] . ".der</string> |
|
692 | + <string>" . $ca['uuid'].".der</string> |
|
693 | 693 | <key>PayloadContent</key> |
694 | 694 | <data> |
695 | -" . $trimmedPem . "</data> |
|
695 | +" . $trimmedPem."</data> |
|
696 | 696 | <key>PayloadDescription</key> |
697 | - <string>" . sprintf(_("The %s Certification Authority"), \core\common\Entity::$nomenclature_inst) . "</string> |
|
697 | + <string>" . sprintf(_("The %s Certification Authority"), \core\common\Entity::$nomenclature_inst)."</string> |
|
698 | 698 | <key>PayloadDisplayName</key> |
699 | 699 | <string>" . |
700 | 700 | /// example: "Identity Provider CA #1 (Root)" |
701 | - sprintf(_("%s CA #%d (%s)" ), |
|
701 | + sprintf(_("%s CA #%d (%s)"), |
|
702 | 702 | \core\common\Entity::$nomenclature_inst, |
703 | - count($this->CAsAccountedFor)+1, |
|
704 | - ($ca['root'] ? _("Root") : _("Intermediate"))) . |
|
703 | + count($this->CAsAccountedFor) + 1, |
|
704 | + ($ca['root'] ? _("Root") : _("Intermediate"))). |
|
705 | 705 | "</string> |
706 | 706 | <key>PayloadIdentifier</key> |
707 | - <string>" . self::$iPhonePayloadPrefix . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
|
707 | + <string>" . self::$iPhonePayloadPrefix.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
|
708 | 708 | <key>PayloadOrganization</key> |
709 | - <string>" . $this->massagedConsortium . ".1x-config.org</string> |
|
709 | + <string>".$this->massagedConsortium.".1x-config.org</string> |
|
710 | 710 | <key>PayloadType</key> |
711 | 711 | <string>com.apple.security.root</string> |
712 | - <key>PayloadUUID</key><string>" . $ca['uuid'] . "</string> |
|
712 | + <key>PayloadUUID</key><string>" . $ca['uuid']."</string> |
|
713 | 713 | <key>PayloadVersion</key> |
714 | 714 | <integer>1</integer> |
715 | 715 | </dict>"; |
@@ -49,9 +49,9 @@ discard block |
||
49 | 49 | use GeoIp2\Database\Reader; |
50 | 50 | use \Exception; |
51 | 51 | |
52 | -require_once dirname(dirname(__FILE__)) . "/config/_config.php"; |
|
53 | -require_once dirname(dirname(__FILE__)) . "/core/PHPMailer/src/PHPMailer.php"; |
|
54 | -require_once dirname(dirname(__FILE__)) . "/core/PHPMailer/src/SMTP.php"; |
|
52 | +require_once dirname(dirname(__FILE__))."/config/_config.php"; |
|
53 | +require_once dirname(dirname(__FILE__))."/core/PHPMailer/src/PHPMailer.php"; |
|
54 | +require_once dirname(dirname(__FILE__))."/core/PHPMailer/src/SMTP.php"; |
|
55 | 55 | |
56 | 56 | class SanityTests extends CAT |
57 | 57 | { |
@@ -93,7 +93,7 @@ discard block |
||
93 | 93 | $this->test_result = []; |
94 | 94 | $this->test_result['global'] = 0; |
95 | 95 | // parse the schema file to find out the number of expected rows... |
96 | - $schema = file(dirname(dirname(__FILE__)) . "/schema/schema.sql"); |
|
96 | + $schema = file(dirname(dirname(__FILE__))."/schema/schema.sql"); |
|
97 | 97 | $this->profile_option_ct = 0; |
98 | 98 | $passedTheWindmill = FALSE; |
99 | 99 | foreach ($schema as $schemaLine) { |
@@ -120,7 +120,7 @@ discard block |
||
120 | 120 | { |
121 | 121 | $this->out[$test] = []; |
122 | 122 | $this->name = $test; |
123 | - $m_name = $test . '_test'; |
|
123 | + $m_name = $test.'_test'; |
|
124 | 124 | $this->test_result[$test] = 0; |
125 | 125 | if (!method_exists($this, $m_name)) { |
126 | 126 | $this->testReturn(\core\common\Entity::L_ERROR, "Configuration error, no test configured for <strong>$test</strong>."); |
@@ -229,9 +229,9 @@ discard block |
||
229 | 229 | private function php_test() |
230 | 230 | { |
231 | 231 | if (version_compare(phpversion(), $this->php_needversion, '>=')) { |
232 | - $this->testReturn(\core\common\Entity::L_OK, "<strong>PHP</strong> is sufficiently recent. You are running " . phpversion() . "."); |
|
232 | + $this->testReturn(\core\common\Entity::L_OK, "<strong>PHP</strong> is sufficiently recent. You are running ".phpversion()."."); |
|
233 | 233 | } else { |
234 | - $this->testReturn(\core\common\Entity::L_ERROR, "<strong>PHP</strong> is too old. We need at least $this->php_needversion, but you only have " . phpversion() . "."); |
|
234 | + $this->testReturn(\core\common\Entity::L_ERROR, "<strong>PHP</strong> is too old. We need at least $this->php_needversion, but you only have ".phpversion()."."); |
|
235 | 235 | } |
236 | 236 | } |
237 | 237 | |
@@ -248,7 +248,7 @@ discard block |
||
248 | 248 | $this->testReturn(\core\common\Entity::L_OK, "<strong>cat_base_url</strong> set correctly"); |
249 | 249 | } else { |
250 | 250 | $rootFromScript = $m[1] === '' ? '/' : $m[1]; |
251 | - $this->testReturn(\core\common\Entity::L_ERROR, "<strong>cat_base_url</strong> is set to <strong>" . CONFIG['PATHS']['cat_base_url'] . "</strong> and should be <strong>$rootFromScript</strong>"); |
|
251 | + $this->testReturn(\core\common\Entity::L_ERROR, "<strong>cat_base_url</strong> is set to <strong>".CONFIG['PATHS']['cat_base_url']."</strong> and should be <strong>$rootFromScript</strong>"); |
|
252 | 252 | } |
253 | 253 | } |
254 | 254 | |
@@ -266,9 +266,9 @@ discard block |
||
266 | 266 | $SSPconfig = \SimpleSAML\Configuration::getInstance(); |
267 | 267 | $sspVersion = explode('.', $SSPconfig->getVersion()); |
268 | 268 | if ((int) $sspVersion[0] >= $this->ssp_needversion['major'] && (int) $sspVersion[1] >= $this->ssp_needversion['minor']) { |
269 | - $this->testReturn(\core\common\Entity::L_OK, "<strong>simpleSAMLphp</strong> is sufficently recent. You are running " . implode('.', $sspVersion)); |
|
269 | + $this->testReturn(\core\common\Entity::L_OK, "<strong>simpleSAMLphp</strong> is sufficently recent. You are running ".implode('.', $sspVersion)); |
|
270 | 270 | } else { |
271 | - $this->testReturn(\core\common\Entity::L_ERROR, "<strong>simpleSAMLphp</strong> is too old. We need at least " . implode('.', $this->ssp_needversion)); |
|
271 | + $this->testReturn(\core\common\Entity::L_ERROR, "<strong>simpleSAMLphp</strong> is too old. We need at least ".implode('.', $this->ssp_needversion)); |
|
272 | 272 | } |
273 | 273 | } |
274 | 274 | } |
@@ -329,8 +329,8 @@ discard block |
||
329 | 329 | */ |
330 | 330 | private function logdir_test() |
331 | 331 | { |
332 | - if (fopen(CONFIG['PATHS']['logdir'] . "/debug.log", "a") == FALSE) { |
|
333 | - $this->testReturn(\core\common\Entity::L_WARN, "Log files in <strong>" . CONFIG['PATHS']['logdir'] . "</strong> are not writable!"); |
|
332 | + if (fopen(CONFIG['PATHS']['logdir']."/debug.log", "a") == FALSE) { |
|
333 | + $this->testReturn(\core\common\Entity::L_WARN, "Log files in <strong>".CONFIG['PATHS']['logdir']."</strong> are not writable!"); |
|
334 | 334 | } else { |
335 | 335 | $this->testReturn(\core\common\Entity::L_OK, "Log directory is writable."); |
336 | 336 | } |
@@ -367,10 +367,10 @@ discard block |
||
367 | 367 | } else { |
368 | 368 | $classname = 'Imagick'; |
369 | 369 | } |
370 | - if (class_exists('\\' . $classname)) { |
|
370 | + if (class_exists('\\'.$classname)) { |
|
371 | 371 | $this->testReturn(\core\common\Entity::L_OK, "PHP extension <strong>$classname</strong> is installed."); |
372 | 372 | } else { |
373 | - $this->testReturn(\core\common\Entity::L_ERROR, "PHP extension <strong>$classname</strong> not found! Get it from your distribution or <a href='http://pecl.php.net/get/" . strtolower($classname) . "'>here</a>."); |
|
373 | + $this->testReturn(\core\common\Entity::L_ERROR, "PHP extension <strong>$classname</strong> not found! Get it from your distribution or <a href='http://pecl.php.net/get/".strtolower($classname)."'>here</a>."); |
|
374 | 374 | } |
375 | 375 | |
376 | 376 | if (function_exists('ImageCreate')) { |
@@ -468,15 +468,15 @@ discard block |
||
468 | 468 | } |
469 | 469 | $output = []; |
470 | 470 | $retval = -100; |
471 | - $t = exec($A['exec'] . ' version', $output, $retval); |
|
471 | + $t = exec($A['exec'].' version', $output, $retval); |
|
472 | 472 | if ($retval != 0 || count($output) != 1) { |
473 | 473 | $this->testReturn(\core\common\Entity::L_ERROR, "<strong>openssl</strong> was not found on your system despite being configured!"); |
474 | 474 | return; |
475 | 475 | } |
476 | 476 | if ($A['exec_is'] == "EXPLICIT") { |
477 | - $this->testReturn(\core\common\Entity::L_OK, "<strong>" . $output[0] . "</strong> was found and is configured explicitly in your config."); |
|
477 | + $this->testReturn(\core\common\Entity::L_OK, "<strong>".$output[0]."</strong> was found and is configured explicitly in your config."); |
|
478 | 478 | } else { |
479 | - $this->testReturn(\core\common\Entity::L_WARN, "<strong>" . $output[0] . "</strong> was found, but is not configured with an absolute path in your config."); |
|
479 | + $this->testReturn(\core\common\Entity::L_WARN, "<strong>".$output[0]."</strong> was found, but is not configured with an absolute path in your config."); |
|
480 | 480 | } |
481 | 481 | } |
482 | 482 | |
@@ -502,7 +502,7 @@ discard block |
||
502 | 502 | } |
503 | 503 | $output = []; |
504 | 504 | $retval = -100; |
505 | - $t = exec($A['exec'] . ' -VERSION', $output, $retval); |
|
505 | + $t = exec($A['exec'].' -VERSION', $output, $retval); |
|
506 | 506 | if ($retval != 0 || count($output) != 1) { |
507 | 507 | $this->testReturn(\core\common\Entity::L_ERROR, "<strong>makensis</strong> was not found on your system despite being configured!"); |
508 | 508 | return; |
@@ -513,7 +513,7 @@ discard block |
||
513 | 513 | $this->testReturn(\core\common\Entity::L_WARN, "<strong>makensis $t</strong> was found, but is not configured with an absolute path in your config."); |
514 | 514 | } |
515 | 515 | $outputArray = []; |
516 | - exec($A['exec'] . ' -HELP', $outputArray); |
|
516 | + exec($A['exec'].' -HELP', $outputArray); |
|
517 | 517 | $t1 = count(preg_grep('/INPUTCHARSET/', $outputArray)); |
518 | 518 | if ($t1 == 1 && CONFIG_CONFASSISTANT['NSIS_VERSION'] == 2) { |
519 | 519 | $this->testReturn(\core\common\Entity::L_ERROR, "Declared NSIS_VERSION does not seem to match the file pointed to by PATHS['makensis']!"); |
@@ -540,7 +540,7 @@ discard block |
||
540 | 540 | $NSIS_Module_status = []; |
541 | 541 | foreach ($this->NSIS_Modules as $module) { |
542 | 542 | unset($out); |
543 | - exec(CONFIG_CONFASSISTANT['PATHS']['makensis'] . " -V1 '-X!include $module' '-XOutFile $exe' '-XSection X' '-XSectionEnd'", $out, $retval); |
|
543 | + exec(CONFIG_CONFASSISTANT['PATHS']['makensis']." -V1 '-X!include $module' '-XOutFile $exe' '-XSection X' '-XSectionEnd'", $out, $retval); |
|
544 | 544 | if ($retval > 0) { |
545 | 545 | $NSIS_Module_status[$module] = 0; |
546 | 546 | } else { |
@@ -605,8 +605,8 @@ discard block |
||
605 | 605 | $locales = shell_exec("locale -a"); |
606 | 606 | $allthere = ""; |
607 | 607 | foreach (CONFIG['LANGUAGES'] as $onelanguage) { |
608 | - if (preg_match("/" . $onelanguage['locale'] . "/", $locales) == 0) { |
|
609 | - $allthere .= $onelanguage['locale'] . " "; |
|
608 | + if (preg_match("/".$onelanguage['locale']."/", $locales) == 0) { |
|
609 | + $allthere .= $onelanguage['locale']." "; |
|
610 | 610 | } |
611 | 611 | } |
612 | 612 | if ($allthere == "") { |
@@ -620,47 +620,47 @@ discard block |
||
620 | 620 | ["SETTING" => CONFIG['APPEARANCE']['from-mail'], |
621 | 621 | "DEFVALUE" => "[email protected]", |
622 | 622 | "COMPLAINTSTRING" => "APPEARANCE/from-mail ", |
623 | - "REQUIRED" => FALSE,], |
|
623 | + "REQUIRED" => FALSE, ], |
|
624 | 624 | ["SETTING" => CONFIG['APPEARANCE']['support-contact']['url'], |
625 | 625 | "DEFVALUE" => "[email protected]?body=Only%20English%20language%20please!", |
626 | 626 | "COMPLAINTSTRING" => "APPEARANCE/support-contact/url ", |
627 | - "REQUIRED" => FALSE,], |
|
627 | + "REQUIRED" => FALSE, ], |
|
628 | 628 | ["SETTING" => CONFIG['APPEARANCE']['support-contact']['display'], |
629 | 629 | "DEFVALUE" => "[email protected]", |
630 | 630 | "COMPLAINTSTRING" => "APPEARANCE/support-contact/display ", |
631 | - "REQUIRED" => FALSE,], |
|
631 | + "REQUIRED" => FALSE, ], |
|
632 | 632 | ["SETTING" => CONFIG['APPEARANCE']['support-contact']['developer-mail'], |
633 | 633 | "DEFVALUE" => "[email protected]", |
634 | 634 | "COMPLAINTSTRING" => "APPEARANCE/support-contact/mail ", |
635 | - "REQUIRED" => FALSE,], |
|
635 | + "REQUIRED" => FALSE, ], |
|
636 | 636 | ["SETTING" => CONFIG['APPEARANCE']['abuse-mail'], |
637 | 637 | "DEFVALUE" => "[email protected]", |
638 | 638 | "COMPLAINTSTRING" => "APPEARANCE/abuse-mail ", |
639 | - "REQUIRED" => FALSE,], |
|
639 | + "REQUIRED" => FALSE, ], |
|
640 | 640 | ["SETTING" => CONFIG['APPEARANCE']['MOTD'], |
641 | 641 | "DEFVALUE" => "Release Candidate. All bugs to be shot on sight!", |
642 | 642 | "COMPLAINTSTRING" => "APPEARANCE/MOTD ", |
643 | - "REQUIRED" => FALSE,], |
|
643 | + "REQUIRED" => FALSE, ], |
|
644 | 644 | ["SETTING" => CONFIG['APPEARANCE']['webcert_CRLDP'], |
645 | 645 | "DEFVALUE" => ['list', 'of', 'CRL', 'pointers'], |
646 | 646 | "COMPLAINTSTRING" => "APPEARANCE/webcert_CRLDP ", |
647 | - "REQUIRED" => TRUE,], |
|
647 | + "REQUIRED" => TRUE, ], |
|
648 | 648 | ["SETTING" => CONFIG['APPEARANCE']['webcert_OCSP'], |
649 | 649 | "DEFVALUE" => ['list', 'of', 'OCSP', 'pointers'], |
650 | 650 | "COMPLAINTSTRING" => "APPEARANCE/webcert_OCSP ", |
651 | - "REQUIRED" => TRUE,], |
|
651 | + "REQUIRED" => TRUE, ], |
|
652 | 652 | ["SETTING" => CONFIG['DB']['INST']['host'], |
653 | 653 | "DEFVALUE" => "db.host.example", |
654 | 654 | "COMPLAINTSTRING" => "DB/INST ", |
655 | - "REQUIRED" => TRUE,], |
|
655 | + "REQUIRED" => TRUE, ], |
|
656 | 656 | ["SETTING" => CONFIG['DB']['INST']['host'], |
657 | 657 | "DEFVALUE" => "db.host.example", |
658 | 658 | "COMPLAINTSTRING" => "DB/USER ", |
659 | - "REQUIRED" => TRUE,], |
|
659 | + "REQUIRED" => TRUE, ], |
|
660 | 660 | ["SETTING" => CONFIG['DB']['EXTERNAL']['host'], |
661 | 661 | "DEFVALUE" => "customerdb.otherhost.example", |
662 | 662 | "COMPLAINTSTRING" => "DB/EXTERNAL ", |
663 | - "REQUIRED" => FALSE,], |
|
663 | + "REQUIRED" => FALSE, ], |
|
664 | 664 | ]; |
665 | 665 | |
666 | 666 | /** |
@@ -688,11 +688,11 @@ discard block |
||
688 | 688 | if (isset(CONFIG_DIAGNOSTICS['RADIUSTESTS']['TLS-clientcerts'])) { |
689 | 689 | foreach (CONFIG_DIAGNOSTICS['RADIUSTESTS']['TLS-clientcerts'] as $cadata) { |
690 | 690 | foreach ($cadata['certificates'] as $cert_files) { |
691 | - if (file_get_contents(ROOT . "/config/cli-certs/" . $cert_files['public']) === FALSE) { |
|
692 | - $defaultvalues .= "CERTIFICATE/" . $cert_files['public'] . " "; |
|
691 | + if (file_get_contents(ROOT."/config/cli-certs/".$cert_files['public']) === FALSE) { |
|
692 | + $defaultvalues .= "CERTIFICATE/".$cert_files['public']." "; |
|
693 | 693 | } |
694 | - if (file_get_contents(ROOT . "/config/cli-certs/" . $cert_files['private']) === FALSE) { |
|
695 | - $defaultvalues .= "CERTIFICATE/" . $cert_files['private'] . " "; |
|
694 | + if (file_get_contents(ROOT."/config/cli-certs/".$cert_files['private']) === FALSE) { |
|
695 | + $defaultvalues .= "CERTIFICATE/".$cert_files['private']." "; |
|
696 | 696 | } |
697 | 697 | } |
698 | 698 | } |
@@ -785,14 +785,14 @@ discard block |
||
785 | 785 | if ($global_no_cache) { |
786 | 786 | foreach ($Devs as $dev => $D) { |
787 | 787 | if (empty($D['options']['no_cache']) || $D['options']['no_cache'] != 0) { |
788 | - $no_cache_dev .= $dev . " "; |
|
788 | + $no_cache_dev .= $dev." "; |
|
789 | 789 | $no_cache_dev_count++; |
790 | 790 | } |
791 | 791 | } |
792 | 792 | } else { |
793 | 793 | foreach ($Devs as $dev => $D) { |
794 | 794 | if (!empty($D['options']['no_cache']) && $D['options']['no_cache'] != 0) { |
795 | - $no_cache_dev .= $dev . " "; |
|
795 | + $no_cache_dev .= $dev." "; |
|
796 | 796 | $no_cache_dev_count++; |
797 | 797 | } |
798 | 798 | } |
@@ -831,13 +831,13 @@ discard block |
||
831 | 831 | $mail->isHTML(FALSE); |
832 | 832 | $mail->CharSet = 'UTF-8'; |
833 | 833 | $mail->From = CONFIG['APPEARANCE']['from-mail']; |
834 | - $mail->FromName = CONFIG['APPEARANCE']['productname'] . " Invitation System"; |
|
834 | + $mail->FromName = CONFIG['APPEARANCE']['productname']." Invitation System"; |
|
835 | 835 | $mail->addAddress(CONFIG['APPEARANCE']['abuse-mail']); |
836 | 836 | $mail->Subject = "testing CAT configuration mail"; |
837 | 837 | $mail->Body = "Testing CAT mailing\n"; |
838 | 838 | $sent = $mail->send(); |
839 | 839 | if ($sent) { |
840 | - $this->testReturn(\core\common\Entity::L_OK, "mailer settings appear to be working, check " . CONFIG['APPEARANCE']['abuse-mail'] . " mailbox if the message was receiced."); |
|
840 | + $this->testReturn(\core\common\Entity::L_OK, "mailer settings appear to be working, check ".CONFIG['APPEARANCE']['abuse-mail']." mailbox if the message was receiced."); |
|
841 | 841 | } else { |
842 | 842 | $this->testReturn(\core\common\Entity::L_ERROR, "mailer settings failed, check the Config::MAILSETTINGS"); |
843 | 843 | } |
@@ -94,7 +94,7 @@ discard block |
||
94 | 94 | */ |
95 | 95 | public function __construct() { |
96 | 96 | $this->loggerInstance = new Logging(); |
97 | - $this->loggerInstance->debug(3, "--- BEGIN constructing class " . get_class($this) . " .\n"); |
|
97 | + $this->loggerInstance->debug(3, "--- BEGIN constructing class ".get_class($this)." .\n"); |
|
98 | 98 | $this->languageInstance = new Language(); |
99 | 99 | Entity::intoThePotatoes("core"); |
100 | 100 | // some config elements are displayable. We need some dummies to |
@@ -106,7 +106,7 @@ discard block |
||
106 | 106 | $dummy_inst2 = _("organisation"); |
107 | 107 | $dummy_inst3 = _("Identity Provider"); |
108 | 108 | // and do something useless with the strings so that there's no "unused" complaint |
109 | - if (strlen($dummy_NRO . $dummy_inst1 . $dummy_inst2 . $dummy_inst3) < 0) { |
|
109 | + if (strlen($dummy_NRO.$dummy_inst1.$dummy_inst2.$dummy_inst3) < 0) { |
|
110 | 110 | throw new \Exception("Strings are usually not shorter than 0 characters. We've encountered a string blackhole."); |
111 | 111 | } |
112 | 112 | Entity::$nomenclature_fed = _(CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_federation']); |
@@ -121,7 +121,7 @@ discard block |
||
121 | 121 | * Logs the end of lifetime of the entity to the debug log on level 5. |
122 | 122 | */ |
123 | 123 | public function __destruct() { |
124 | - (new Logging())->debug(5, "--- KILL Destructing class " . get_class($this) . " .\n"); |
|
124 | + (new Logging())->debug(5, "--- KILL Destructing class ".get_class($this)." .\n"); |
|
125 | 125 | } |
126 | 126 | |
127 | 127 | /** |
@@ -151,7 +151,7 @@ discard block |
||
151 | 151 | */ |
152 | 152 | public function createTemporaryDirectory($purpose = 'installer', $failIsFatal = 1) { |
153 | 153 | $loggerInstance = new Logging(); |
154 | - $name = md5(time() . rand()); |
|
154 | + $name = md5(time().rand()); |
|
155 | 155 | $path = ROOT; |
156 | 156 | switch ($purpose) { |
157 | 157 | case 'silverbullet': |
@@ -169,7 +169,7 @@ discard block |
||
169 | 169 | default: |
170 | 170 | throw new Exception("unable to create temporary directory due to unknown purpose: $purpose\n"); |
171 | 171 | } |
172 | - $tmpDir = $path . '/' . $name; |
|
172 | + $tmpDir = $path.'/'.$name; |
|
173 | 173 | $loggerInstance->debug(4, "temp dir: $purpose : $tmpDir\n"); |
174 | 174 | if (!mkdir($tmpDir, 0700, true)) { |
175 | 175 | if ($failIsFatal) { |
@@ -189,7 +189,7 @@ discard block |
||
189 | 189 | * @return void |
190 | 190 | */ |
191 | 191 | public static function rrmdir($dir) { |
192 | - foreach (glob($dir . '/*') as $file) { |
|
192 | + foreach (glob($dir.'/*') as $file) { |
|
193 | 193 | if (is_dir($file)) { |
194 | 194 | Entity::rrmdir($file); |
195 | 195 | } else { |
@@ -214,12 +214,12 @@ discard block |
||
214 | 214 | } |
215 | 215 | // these substr() are guaranteed to yield actual string data, as the |
216 | 216 | // base string is an MD5 hash - has sufficient length |
217 | - $uuid = /** @scrutinizer ignore-type */ substr($chars, 0, 8) . '-'; |
|
218 | - $uuid .= /** @scrutinizer ignore-type */ substr($chars, 8, 4) . '-'; |
|
219 | - $uuid .= /** @scrutinizer ignore-type */ substr($chars, 12, 4) . '-'; |
|
220 | - $uuid .= /** @scrutinizer ignore-type */ substr($chars, 16, 4) . '-'; |
|
217 | + $uuid = /** @scrutinizer ignore-type */ substr($chars, 0, 8).'-'; |
|
218 | + $uuid .= /** @scrutinizer ignore-type */ substr($chars, 8, 4).'-'; |
|
219 | + $uuid .= /** @scrutinizer ignore-type */ substr($chars, 12, 4).'-'; |
|
220 | + $uuid .= /** @scrutinizer ignore-type */ substr($chars, 16, 4).'-'; |
|
221 | 221 | $uuid .= /** @scrutinizer ignore-type */ substr($chars, 20, 12); |
222 | - return $prefix . $uuid; |
|
222 | + return $prefix.$uuid; |
|
223 | 223 | } |
224 | 224 | |
225 | 225 | /** |
@@ -258,7 +258,7 @@ discard block |
||
258 | 258 | for ($i = count($trace); $i--; $i > 0) { |
259 | 259 | if (isset($trace[$i - 1]['class']) && preg_match('/Entity/', $trace[$i - 1]['class'])) { |
260 | 260 | if ($showTrace) { |
261 | - echo "FOUND caller: ".print_r($trace[$i],true). " - class is ".$trace[$i]['class']; |
|
261 | + echo "FOUND caller: ".print_r($trace[$i], true)." - class is ".$trace[$i]['class']; |
|
262 | 262 | } |
263 | 263 | $caller = $trace[$i]; |
264 | 264 | break; |
@@ -269,7 +269,7 @@ discard block |
||
269 | 269 | $myName = $caller['class'] ?? substr($caller['file'], strlen(ROOT)); |
270 | 270 | if ($showTrace === TRUE) { |
271 | 271 | echo "<pre>".print_r($trace, true)."</pre>"; |
272 | - echo "CLASS = " . $myName ."<br/>"; |
|
272 | + echo "CLASS = ".$myName."<br/>"; |
|
273 | 273 | } |
274 | 274 | if (preg_match("/diag/", $myName) == 1) { |
275 | 275 | $ret = "diagnostics"; |
@@ -302,10 +302,10 @@ discard block |
||
302 | 302 | if ($catalogue === NULL) { |
303 | 303 | $theCatalogue = Entity::determineOwnCatalogue($trace); |
304 | 304 | textdomain($theCatalogue); |
305 | - bindtextdomain($theCatalogue, ROOT . "/translation/"); |
|
305 | + bindtextdomain($theCatalogue, ROOT."/translation/"); |
|
306 | 306 | } else { |
307 | 307 | textdomain($catalogue); |
308 | - bindtextdomain($catalogue, ROOT . "/translation/"); |
|
308 | + bindtextdomain($catalogue, ROOT."/translation/"); |
|
309 | 309 | } |
310 | 310 | } |
311 | 311 |
@@ -17,9 +17,9 @@ discard block |
||
17 | 17 | class CertificationAuthorityEduPkiServer extends EntityWithDBProperties implements CertificationAuthorityInterface |
18 | 18 | { |
19 | 19 | |
20 | - private const LOCATION_RA_CERT = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
21 | - private const LOCATION_RA_KEY = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
22 | - private const LOCATION_WEBROOT = ROOT . "/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
20 | + private const LOCATION_RA_CERT = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
21 | + private const LOCATION_RA_KEY = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
22 | + private const LOCATION_WEBROOT = ROOT."/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
23 | 23 | private const EDUPKI_RA_ID = 700; |
24 | 24 | private const EDUPKI_CERT_PROFILE = "Radius Server SOAP"; |
25 | 25 | private const EDUPKI_RA_PKEY_PASSPHRASE = "..."; |
@@ -35,13 +35,13 @@ discard block |
||
35 | 35 | parent::__construct(); |
36 | 36 | |
37 | 37 | if (stat(CertificationAuthorityEduPkiServer::LOCATION_RA_CERT) === FALSE) { |
38 | - throw new Exception("RA operator PEM file not found: " . CertificationAuthorityEduPkiServer::LOCATION_RA_CERT); |
|
38 | + throw new Exception("RA operator PEM file not found: ".CertificationAuthorityEduPkiServer::LOCATION_RA_CERT); |
|
39 | 39 | } |
40 | 40 | if (stat(CertificationAuthorityEduPkiServer::LOCATION_RA_KEY) === FALSE) { |
41 | - throw new Exception("RA operator private key file not found: " . CertificationAuthorityEduPkiServer::LOCATION_RA_KEY); |
|
41 | + throw new Exception("RA operator private key file not found: ".CertificationAuthorityEduPkiServer::LOCATION_RA_KEY); |
|
42 | 42 | } |
43 | 43 | if (stat(CertificationAuthorityEduPkiServer::LOCATION_WEBROOT) === FALSE) { |
44 | - throw new Exception("CA website root CA file not found: " . CertificationAuthorityEduPkiServer::LOCATION_WEBROOT); |
|
44 | + throw new Exception("CA website root CA file not found: ".CertificationAuthorityEduPkiServer::LOCATION_WEBROOT); |
|
45 | 45 | } |
46 | 46 | } |
47 | 47 | |
@@ -91,19 +91,19 @@ discard block |
||
91 | 91 | // initialise connection to eduPKI CA / eduroam RA and send the request to them |
92 | 92 | try { |
93 | 93 | $altArray = [# Array mit den Subject Alternative Names |
94 | - "email:" . $csr["USERMAIL"] |
|
94 | + "email:".$csr["USERMAIL"] |
|
95 | 95 | ]; |
96 | 96 | $soapPub = $this->initEduPKISoapSession("PUBLIC"); |
97 | 97 | $this->loggerInstance->debug(5, "FIRST ACTUAL SOAP REQUEST (Public, newRequest)!\n"); |
98 | - $this->loggerInstance->debug(5, "PARAM_1: " . CertificationAuthorityEduPkiServer::EDUPKI_RA_ID . "\n"); |
|
99 | - $this->loggerInstance->debug(5, "PARAM_2: " . $csr["CSR"] . "\n"); |
|
98 | + $this->loggerInstance->debug(5, "PARAM_1: ".CertificationAuthorityEduPkiServer::EDUPKI_RA_ID."\n"); |
|
99 | + $this->loggerInstance->debug(5, "PARAM_2: ".$csr["CSR"]."\n"); |
|
100 | 100 | $this->loggerInstance->debug(5, "PARAM_3: "); |
101 | 101 | $this->loggerInstance->debug(5, $altArray); |
102 | - $this->loggerInstance->debug(5, "PARAM_4: " . CertificationAuthorityEduPkiServer::EDUPKI_CERT_PROFILE . "\n"); |
|
103 | - $this->loggerInstance->debug(5, "PARAM_5: " . sha1("notused") . "\n"); |
|
104 | - $this->loggerInstance->debug(5, "PARAM_6: " . $csr["USERNAME"] . "\n"); |
|
105 | - $this->loggerInstance->debug(5, "PARAM_7: " . $csr["USERMAIL"] . "\n"); |
|
106 | - $this->loggerInstance->debug(5, "PARAM_8: " . ProfileSilverbullet::PRODUCTNAME . "\n"); |
|
102 | + $this->loggerInstance->debug(5, "PARAM_4: ".CertificationAuthorityEduPkiServer::EDUPKI_CERT_PROFILE."\n"); |
|
103 | + $this->loggerInstance->debug(5, "PARAM_5: ".sha1("notused")."\n"); |
|
104 | + $this->loggerInstance->debug(5, "PARAM_6: ".$csr["USERNAME"]."\n"); |
|
105 | + $this->loggerInstance->debug(5, "PARAM_7: ".$csr["USERMAIL"]."\n"); |
|
106 | + $this->loggerInstance->debug(5, "PARAM_8: ".ProfileSilverbullet::PRODUCTNAME."\n"); |
|
107 | 107 | $this->loggerInstance->debug(5, "PARAM_9: false\n"); |
108 | 108 | $soapNewRequest = $soapPub->newRequest( |
109 | 109 | CertificationAuthorityEduPkiServer::EDUPKI_RA_ID, # RA-ID |
@@ -125,11 +125,11 @@ discard block |
||
125 | 125 | } catch (Exception $e) { |
126 | 126 | // PHP 7.1 can do this much better |
127 | 127 | if (is_soap_fault($e)) { |
128 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: { |
|
128 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: { |
|
129 | 129 | $e->faultstring |
130 | 130 | }\n"); |
131 | 131 | } |
132 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
132 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
133 | 133 | } |
134 | 134 | try { |
135 | 135 | $soap = $this->initEduPKISoapSession("RA"); |
@@ -163,7 +163,7 @@ discard block |
||
163 | 163 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
164 | 164 | // rather than just using the string. Grr. |
165 | 165 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
166 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapCleartext); |
|
166 | + file_put_contents($tempdir['dir']."/content.txt", $soapCleartext); |
|
167 | 167 | // retrieve our RA cert from filesystem |
168 | 168 | // the RA certificates are not needed right now because we |
169 | 169 | // have resorted to S/MIME signatures with openssl command-line |
@@ -175,7 +175,7 @@ discard block |
||
175 | 175 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
176 | 176 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
177 | 177 | $this->loggerInstance->debug(5, "Actual content to be signed is this:\n $soapCleartext\n"); |
178 | - $execCmd = CONFIG['PATHS']['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
178 | + $execCmd = CONFIG['PATHS']['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
179 | 179 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
180 | 180 | $output = []; |
181 | 181 | $return = 999; |
@@ -184,21 +184,21 @@ discard block |
||
184 | 184 | throw new Exception("Non-zero return value from openssl smime!"); |
185 | 185 | } |
186 | 186 | // and get the signature blob back from the filesystem |
187 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
187 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
188 | 188 | $this->loggerInstance->debug(5, "Request for server approveRequest has parameters:\n"); |
189 | - $this->loggerInstance->debug(5, $soapReqnum . "\n"); |
|
190 | - $this->loggerInstance->debug(5, $soapCleartext . "\n"); // PHP magically encodes this as base64 while sending! |
|
191 | - $this->loggerInstance->debug(5, $detachedSig . "\n"); |
|
189 | + $this->loggerInstance->debug(5, $soapReqnum."\n"); |
|
190 | + $this->loggerInstance->debug(5, $soapCleartext."\n"); // PHP magically encodes this as base64 while sending! |
|
191 | + $this->loggerInstance->debug(5, $detachedSig."\n"); |
|
192 | 192 | $soapIssueCert = $soap->approveRequest($soapReqnum, $soapCleartext, $detachedSig); |
193 | - $this->loggerInstance->debug(5, "approveRequest Request was: \n" . $soap->__getLastRequest()); |
|
194 | - $this->loggerInstance->debug(5, "approveRequest Response was: \n" . $soap->__getLastResponse()); |
|
193 | + $this->loggerInstance->debug(5, "approveRequest Request was: \n".$soap->__getLastRequest()); |
|
194 | + $this->loggerInstance->debug(5, "approveRequest Response was: \n".$soap->__getLastResponse()); |
|
195 | 195 | if ($soapIssueCert === FALSE) { |
196 | 196 | throw new Exception("The locally approved request was NOT processed by the CA."); |
197 | 197 | } |
198 | 198 | } catch (SoapFault $e) { |
199 | - throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
199 | + throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
200 | 200 | } catch (Exception $e) { |
201 | - throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage()); |
|
201 | + throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage()); |
|
202 | 202 | } |
203 | 203 | return $soapReqnum; |
204 | 204 | } |
@@ -248,9 +248,9 @@ discard block |
||
248 | 248 | throw new Exception("CAInfo has no root certificate for us!"); |
249 | 249 | } |
250 | 250 | } catch (SoapFault $e) { |
251 | - throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
251 | + throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
252 | 252 | } catch (Exception $e) { |
253 | - throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage()); |
|
253 | + throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage()); |
|
254 | 254 | } |
255 | 255 | return [ |
256 | 256 | "CERT" => openssl_x509_read($parsedCert['pem']), |
@@ -283,12 +283,12 @@ discard block |
||
283 | 283 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
284 | 284 | // rather than just using the string. Grr. |
285 | 285 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
286 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapRawRevRequest); |
|
286 | + file_put_contents($tempdir['dir']."/content.txt", $soapRawRevRequest); |
|
287 | 287 | // retrieve our RA cert from filesystem |
288 | 288 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
289 | 289 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
290 | 290 | $this->loggerInstance->debug(5, "Actual content to be signed is this:\n$soapRawRevRequest\n"); |
291 | - $execCmd = CONFIG['PATHS']['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPkiServer::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPkiServer::LOCATION_RA_CERT; |
|
291 | + $execCmd = CONFIG['PATHS']['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPkiServer::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPkiServer::LOCATION_RA_CERT; |
|
292 | 292 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
293 | 293 | $output = []; |
294 | 294 | $return = 999; |
@@ -297,7 +297,7 @@ discard block |
||
297 | 297 | throw new Exception("Non-zero return value from openssl smime!"); |
298 | 298 | } |
299 | 299 | // and get the signature blob back from the filesystem |
300 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
300 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
301 | 301 | $soapIssueRev = $soap->approveRevocationRequest($soapRevocationSerial, $soapRawRevRequest, $detachedSig); |
302 | 302 | if ($soapIssueRev === FALSE) { |
303 | 303 | throw new Exception("The locally approved revocation request was NOT processed by the CA."); |
@@ -305,9 +305,9 @@ discard block |
||
305 | 305 | } catch (Exception $e) { |
306 | 306 | // PHP 7.1 can do this much better |
307 | 307 | if (is_soap_fault($e)) { |
308 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: {$e->faultstring}\n"); |
|
308 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: {$e->faultstring}\n"); |
|
309 | 309 | } |
310 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
310 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
311 | 311 | } |
312 | 312 | } |
313 | 313 | |
@@ -407,9 +407,9 @@ discard block |
||
407 | 407 | */ |
408 | 408 | public function soapToXmlInteger($x) |
409 | 409 | { |
410 | - return '<' . $x[0] . '>' |
|
410 | + return '<'.$x[0].'>' |
|
411 | 411 | . htmlentities($x[1], ENT_NOQUOTES | ENT_XML1) |
412 | - . '</' . $x[0] . '>'; |
|
412 | + . '</'.$x[0].'>'; |
|
413 | 413 | } |
414 | 414 | |
415 | 415 | /** |
@@ -428,9 +428,9 @@ discard block |
||
428 | 428 | // dump private key into directory |
429 | 429 | $outstring = ""; |
430 | 430 | openssl_pkey_export($privateKey, $outstring); |
431 | - file_put_contents($tempdir . "/pkey.pem", $outstring); |
|
431 | + file_put_contents($tempdir."/pkey.pem", $outstring); |
|
432 | 432 | // PHP can only do one DC in the Subject. But we need three. |
433 | - $execCmd = CONFIG['PATHS']['openssl'] . " req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$fed/CN=$username/emailAddress=$username"; |
|
433 | + $execCmd = CONFIG['PATHS']['openssl']." req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$fed/CN=$username/emailAddress=$username"; |
|
434 | 434 | $this->loggerInstance->debug(2, "Calling openssl req with following cmdline: $execCmd\n"); |
435 | 435 | $output = []; |
436 | 436 | $return = 999; |
@@ -26,7 +26,7 @@ discard block |
||
26 | 26 | */ |
27 | 27 | ?> |
28 | 28 | <?php |
29 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
29 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
30 | 30 | |
31 | 31 | $auth = new \web\lib\admin\Authentication(); |
32 | 32 | $deco = new \web\lib\admin\PageDecoration(); |
@@ -81,7 +81,7 @@ discard block |
||
81 | 81 | foreach ($theFed->listTlsCertificates() as $oneCert) { // fetch list a second time, in case we got a cert |
82 | 82 | $status = $oneCert['STATUS']; |
83 | 83 | if ($status == "ISSUED") { |
84 | - $status = "<span onclick='alert(\"".str_replace("\n","\\n",$oneCert['CERT'])."\");'>$status</span>"; |
|
84 | + $status = "<span onclick='alert(\"".str_replace("\n", "\\n", $oneCert['CERT'])."\");'>$status</span>"; |
|
85 | 85 | } |
86 | 86 | echo "<tr><td>".$oneCert['REQSERIAL']."</td><td>".$oneCert['DN']."</td><td>".$status."</td><td>".$oneCert['EXPIRY']."</td></tr>"; |
87 | 87 | } |