@@ -93,7 +93,7 @@ discard block |
||
93 | 93 | if ($cert['full_details']['type'] == 'server') { |
94 | 94 | $reason = _("%s - server certificate (<a href='%s'>more info</a>)"); |
95 | 95 | $fail = true; |
96 | - } elseif($cert['basicconstraints_set'] === 0) { |
|
96 | + } elseif ($cert['basicconstraints_set'] === 0) { |
|
97 | 97 | $reason = _("%s - missing required CA extensions (<a href='%s'>more info</a>)"); |
98 | 98 | $fail = true; |
99 | 99 | } |
@@ -122,7 +122,7 @@ discard block |
||
122 | 122 | $optionClass = \core\Options::instance(); |
123 | 123 | $optionProps = $optionClass->optionType($optiontype); |
124 | 124 | $allowedValues = explode(',', substr($optionProps["flags"], 7)); |
125 | - if (in_array($incomingBinary,$allowedValues)) { |
|
125 | + if (in_array($incomingBinary, $allowedValues)) { |
|
126 | 126 | return ['result'=>TRUE, 'details'=>'']; |
127 | 127 | } |
128 | 128 | return ['result'=>FALSE, 'details'=>'']; |
@@ -368,14 +368,14 @@ discard block |
||
368 | 368 | case \core\Options::TYPECODE_TEXT: |
369 | 369 | case \core\Options::TYPECODE_COORDINATES: |
370 | 370 | case \core\Options::TYPECODE_INTEGER: |
371 | - $varName = $listOfEntries["$objId-" . self::VALIDATOR_FUNCTIONS[$optioninfo['type']]['field']]; |
|
371 | + $varName = $listOfEntries["$objId-".self::VALIDATOR_FUNCTIONS[$optioninfo['type']]['field']]; |
|
372 | 372 | if (!empty($varName)) { |
373 | 373 | $content = call_user_func_array([$this->validator, self::VALIDATOR_FUNCTIONS[$optioninfo['type']]['function']], array_merge([$varName], self::VALIDATOR_FUNCTIONS[$optioninfo['type']]['extraarg'])); |
374 | 374 | break; |
375 | 375 | } |
376 | 376 | continue 2; |
377 | 377 | case \core\Options::TYPECODE_BOOLEAN: |
378 | - $varName = $listOfEntries["$objId-" . \core\Options::TYPECODE_BOOLEAN]; |
|
378 | + $varName = $listOfEntries["$objId-".\core\Options::TYPECODE_BOOLEAN]; |
|
379 | 379 | if (!empty($varName)) { |
380 | 380 | $contentValid = $this->validator->boolean($varName); |
381 | 381 | if ($contentValid) { |
@@ -388,7 +388,7 @@ discard block |
||
388 | 388 | } |
389 | 389 | continue 2; |
390 | 390 | case \core\Options::TYPECODE_STRING: |
391 | - $previsionalContent = $listOfEntries["$objId-" . \core\Options::TYPECODE_STRING]; |
|
391 | + $previsionalContent = $listOfEntries["$objId-".\core\Options::TYPECODE_STRING]; |
|
392 | 392 | if (!empty(trim($previsionalContent))) { |
393 | 393 | $content = $this->furtherStringChecks($objValue, $previsionalContent, $bad); |
394 | 394 | if ($content === FALSE) { |
@@ -399,7 +399,7 @@ discard block |
||
399 | 399 | continue 2; |
400 | 400 | |
401 | 401 | case \core\Options::TYPECODE_ENUM_OPENROAMING: |
402 | - $previsionalContent = $listOfEntries["$objId-" . \core\Options::TYPECODE_ENUM_OPENROAMING]; |
|
402 | + $previsionalContent = $listOfEntries["$objId-".\core\Options::TYPECODE_ENUM_OPENROAMING]; |
|
403 | 403 | if (!empty($previsionalContent)) { |
404 | 404 | $content = $this->furtherStringChecks($objValue, $previsionalContent, $bad); |
405 | 405 | if ($content === FALSE) { |
@@ -410,15 +410,15 @@ discard block |
||
410 | 410 | continue 2; |
411 | 411 | case \core\Options::TYPECODE_FILE: |
412 | 412 | // this is either actually an uploaded file, or a reference to a DB entry of a previously uploaded file |
413 | - $reference = $listOfEntries["$objId-" . \core\Options::TYPECODE_STRING]; |
|
413 | + $reference = $listOfEntries["$objId-".\core\Options::TYPECODE_STRING]; |
|
414 | 414 | if (!empty($reference)) { // was already in, by ROWID reference, extract |
415 | 415 | // ROWID means it's a multi-line string (simple strings are inline in the form; so allow whitespace) |
416 | 416 | $content = $this->validator->string(urldecode($reference), TRUE); |
417 | 417 | break; |
418 | 418 | } |
419 | - $fileName = $listOfEntries["$objId-" . \core\Options::TYPECODE_FILE] ?? ""; |
|
419 | + $fileName = $listOfEntries["$objId-".\core\Options::TYPECODE_FILE] ?? ""; |
|
420 | 420 | if ($fileName != "") { // let's do the download |
421 | - $rawContent = \core\common\OutsideComm::downloadFile("file:///" . $fileName); |
|
421 | + $rawContent = \core\common\OutsideComm::downloadFile("file:///".$fileName); |
|
422 | 422 | $sanity = $this->checkUploadSanity($objValue, $rawContent); |
423 | 423 | if ($rawContent === FALSE || !$sanity['result']) { |
424 | 424 | $bad[] = ['type'=>$objValue, 'details'=>$sanity['details']]; |
@@ -429,7 +429,7 @@ discard block |
||
429 | 429 | } |
430 | 430 | continue 2; |
431 | 431 | default: |
432 | - throw new Exception("Internal Error: Unknown option type " . $objValue . "!"); |
|
432 | + throw new Exception("Internal Error: Unknown option type ".$objValue."!"); |
|
433 | 433 | } |
434 | 434 | // lang can be NULL here, if it's not a multilang attribute, or a ROWID reference. Never mind that. |
435 | 435 | $retval[] = ["$objValue" => ["lang" => $languageFlag, "content" => $content]]; |
@@ -27,9 +27,9 @@ discard block |
||
27 | 27 | #private const EDUPKI_ENDPOINT_PUBLIC = "https://pki.edupki.org/edupki-ca/cgi-bin/pub/soap?wsdl=1"; |
28 | 28 | #private const EDUPKI_ENDPOINT_RA = "https://ra.edupki.org/edupki-ca/cgi-bin/ra/soap?wsdl=1"; |
29 | 29 | |
30 | - private const LOCATION_RA_CERT = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
31 | - private const LOCATION_RA_KEY = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
32 | - private const LOCATION_WEBROOT = ROOT . "/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
30 | + private const LOCATION_RA_CERT = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
31 | + private const LOCATION_RA_KEY = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
32 | + private const LOCATION_WEBROOT = ROOT."/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
33 | 33 | private const EDUPKI_RA_ID = 700; |
34 | 34 | private const EDUPKI_CERT_PROFILE_BOTH = "Radius Server SOAP"; |
35 | 35 | private const EDUPKI_CERT_PROFILE_IDP = "Radius Server SOAP"; |
@@ -49,13 +49,13 @@ discard block |
||
49 | 49 | parent::__construct(); |
50 | 50 | |
51 | 51 | if (stat(CertificationAuthorityEduPkiServer::LOCATION_RA_CERT) === FALSE) { |
52 | - throw new Exception("RA operator PEM file not found: " . CertificationAuthorityEduPkiServer::LOCATION_RA_CERT); |
|
52 | + throw new Exception("RA operator PEM file not found: ".CertificationAuthorityEduPkiServer::LOCATION_RA_CERT); |
|
53 | 53 | } |
54 | 54 | if (stat(CertificationAuthorityEduPkiServer::LOCATION_RA_KEY) === FALSE) { |
55 | - throw new Exception("RA operator private key file not found: " . CertificationAuthorityEduPkiServer::LOCATION_RA_KEY); |
|
55 | + throw new Exception("RA operator private key file not found: ".CertificationAuthorityEduPkiServer::LOCATION_RA_KEY); |
|
56 | 56 | } |
57 | 57 | if (stat(CertificationAuthorityEduPkiServer::LOCATION_WEBROOT) === FALSE) { |
58 | - throw new Exception("CA website root CA file not found: " . CertificationAuthorityEduPkiServer::LOCATION_WEBROOT); |
|
58 | + throw new Exception("CA website root CA file not found: ".CertificationAuthorityEduPkiServer::LOCATION_WEBROOT); |
|
59 | 59 | } |
60 | 60 | } |
61 | 61 | |
@@ -122,22 +122,22 @@ discard block |
||
122 | 122 | throw new Exception("Unexpected policies requested."); |
123 | 123 | } |
124 | 124 | $altArray = [# Array mit den Subject Alternative Names |
125 | - "email:" . $csr["USERMAIL"] |
|
125 | + "email:".$csr["USERMAIL"] |
|
126 | 126 | ]; |
127 | 127 | foreach ($csr["ALTNAMES"] as $oneAltName) { |
128 | - $altArray[] = "DNS:" . $oneAltName; |
|
128 | + $altArray[] = "DNS:".$oneAltName; |
|
129 | 129 | } |
130 | 130 | $soapPub = $this->initEduPKISoapSession("PUBLIC"); |
131 | 131 | $this->loggerInstance->debug(5, "FIRST ACTUAL SOAP REQUEST (Public, newRequest)!\n"); |
132 | - $this->loggerInstance->debug(5, "PARAM_1: " . CertificationAuthorityEduPkiServer::EDUPKI_RA_ID . "\n"); |
|
133 | - $this->loggerInstance->debug(5, "PARAM_2: " . $csr["CSR_STRING"] . "\n"); |
|
132 | + $this->loggerInstance->debug(5, "PARAM_1: ".CertificationAuthorityEduPkiServer::EDUPKI_RA_ID."\n"); |
|
133 | + $this->loggerInstance->debug(5, "PARAM_2: ".$csr["CSR_STRING"]."\n"); |
|
134 | 134 | $this->loggerInstance->debug(5, "PARAM_3: "); |
135 | 135 | $this->loggerInstance->debug(5, $altArray); |
136 | - $this->loggerInstance->debug(5, "PARAM_4: " . $profile . "\n"); |
|
137 | - $this->loggerInstance->debug(5, "PARAM_5: " . sha1("notused") . "\n"); |
|
138 | - $this->loggerInstance->debug(5, "PARAM_6: " . $csr["USERNAME"] . "\n"); |
|
139 | - $this->loggerInstance->debug(5, "PARAM_7: " . $csr["USERMAIL"] . "\n"); |
|
140 | - $this->loggerInstance->debug(5, "PARAM_8: " . ProfileSilverbullet::PRODUCTNAME . "\n"); |
|
136 | + $this->loggerInstance->debug(5, "PARAM_4: ".$profile."\n"); |
|
137 | + $this->loggerInstance->debug(5, "PARAM_5: ".sha1("notused")."\n"); |
|
138 | + $this->loggerInstance->debug(5, "PARAM_6: ".$csr["USERNAME"]."\n"); |
|
139 | + $this->loggerInstance->debug(5, "PARAM_7: ".$csr["USERMAIL"]."\n"); |
|
140 | + $this->loggerInstance->debug(5, "PARAM_8: ".ProfileSilverbullet::PRODUCTNAME."\n"); |
|
141 | 141 | $this->loggerInstance->debug(5, "PARAM_9: false\n"); |
142 | 142 | $soapNewRequest = $soapPub->newRequest( |
143 | 143 | CertificationAuthorityEduPkiServer::EDUPKI_RA_ID, # RA-ID |
@@ -159,11 +159,11 @@ discard block |
||
159 | 159 | } catch (Exception $e) { |
160 | 160 | // PHP 7.1 can do this much better |
161 | 161 | if (is_soap_fault($e)) { |
162 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: { |
|
162 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: { |
|
163 | 163 | $e->faultstring |
164 | 164 | }\n"); |
165 | 165 | } |
166 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
166 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
167 | 167 | } |
168 | 168 | try { |
169 | 169 | $soap = $this->initEduPKISoapSession("RA"); |
@@ -195,7 +195,7 @@ discard block |
||
195 | 195 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
196 | 196 | // rather than just using the string. Grr. |
197 | 197 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
198 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapCleartext); |
|
198 | + file_put_contents($tempdir['dir']."/content.txt", $soapCleartext); |
|
199 | 199 | // retrieve our RA cert from filesystem |
200 | 200 | // the RA certificates are not needed right now because we |
201 | 201 | // have resorted to S/MIME signatures with openssl command-line |
@@ -207,7 +207,7 @@ discard block |
||
207 | 207 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
208 | 208 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
209 | 209 | $this->loggerInstance->debug(2, "Actual content to be signed is this:\n $soapCleartext\n"); |
210 | - $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPkiServer::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPkiServer::LOCATION_RA_CERT; |
|
210 | + $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPkiServer::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPkiServer::LOCATION_RA_CERT; |
|
211 | 211 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
212 | 212 | $output = []; |
213 | 213 | $return = 999; |
@@ -216,21 +216,21 @@ discard block |
||
216 | 216 | throw new Exception("Non-zero return value from openssl smime!"); |
217 | 217 | } |
218 | 218 | // and get the signature blob back from the filesystem |
219 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
219 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
220 | 220 | $this->loggerInstance->debug(5, "Request for server approveRequest has parameters:\n"); |
221 | - $this->loggerInstance->debug(5, $soapReqnum . "\n"); |
|
222 | - $this->loggerInstance->debug(5, $soapCleartext . "\n"); // PHP magically encodes this as base64 while sending! |
|
223 | - $this->loggerInstance->debug(5, $detachedSig . "\n"); |
|
221 | + $this->loggerInstance->debug(5, $soapReqnum."\n"); |
|
222 | + $this->loggerInstance->debug(5, $soapCleartext."\n"); // PHP magically encodes this as base64 while sending! |
|
223 | + $this->loggerInstance->debug(5, $detachedSig."\n"); |
|
224 | 224 | $soapIssueCert = $soap->approveRequest($soapReqnum, $soapCleartext, $detachedSig); |
225 | - $this->loggerInstance->debug(5, "approveRequest Request was: \n" . $soap->__getLastRequest()); |
|
226 | - $this->loggerInstance->debug(5, "approveRequest Response was: \n" . $soap->__getLastResponse()); |
|
225 | + $this->loggerInstance->debug(5, "approveRequest Request was: \n".$soap->__getLastRequest()); |
|
226 | + $this->loggerInstance->debug(5, "approveRequest Response was: \n".$soap->__getLastResponse()); |
|
227 | 227 | if ($soapIssueCert === FALSE) { |
228 | 228 | throw new Exception("The locally approved request was NOT processed by the CA."); |
229 | 229 | } |
230 | 230 | } catch (SoapFault $e) { |
231 | - throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
231 | + throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
232 | 232 | } catch (Exception $e) { |
233 | - throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage()); |
|
233 | + throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage()); |
|
234 | 234 | } |
235 | 235 | return $soapReqnum; |
236 | 236 | } |
@@ -282,9 +282,9 @@ discard block |
||
282 | 282 | throw new Exception("CAInfo has no root certificate for us!"); |
283 | 283 | } |
284 | 284 | } catch (SoapFault $e) { |
285 | - throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
285 | + throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
286 | 286 | } catch (Exception $e) { |
287 | - throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage()); |
|
287 | + throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage()); |
|
288 | 288 | } |
289 | 289 | return [ |
290 | 290 | "CERT" => openssl_x509_read($parsedCert['pem']), |
@@ -317,12 +317,12 @@ discard block |
||
317 | 317 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
318 | 318 | // rather than just using the string. Grr. |
319 | 319 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
320 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapRawRevRequest); |
|
320 | + file_put_contents($tempdir['dir']."/content.txt", $soapRawRevRequest); |
|
321 | 321 | // retrieve our RA cert from filesystem |
322 | 322 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
323 | 323 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
324 | 324 | $this->loggerInstance->debug(5, "Actual content to be signed is this:\n$soapRawRevRequest\n"); |
325 | - $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPkiServer::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPkiServer::LOCATION_RA_CERT; |
|
325 | + $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPkiServer::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPkiServer::LOCATION_RA_CERT; |
|
326 | 326 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
327 | 327 | $output = []; |
328 | 328 | $return = 999; |
@@ -331,7 +331,7 @@ discard block |
||
331 | 331 | throw new Exception("Non-zero return value from openssl smime!"); |
332 | 332 | } |
333 | 333 | // and get the signature blob back from the filesystem |
334 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
334 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
335 | 335 | $soapIssueRev = $soap->approveRevocationRequest($soapRevocationSerial, $soapRawRevRequest, $detachedSig); |
336 | 336 | if ($soapIssueRev === FALSE) { |
337 | 337 | throw new Exception("The locally approved revocation request was NOT processed by the CA."); |
@@ -339,9 +339,9 @@ discard block |
||
339 | 339 | } catch (Exception $e) { |
340 | 340 | // PHP 7.1 can do this much better |
341 | 341 | if (is_soap_fault($e)) { |
342 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: {$e->faultstring}\n"); |
|
342 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: {$e->faultstring}\n"); |
|
343 | 343 | } |
344 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
344 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
345 | 345 | } |
346 | 346 | } |
347 | 347 | |
@@ -441,9 +441,9 @@ discard block |
||
441 | 441 | */ |
442 | 442 | public function soapToXmlInteger($x) |
443 | 443 | { |
444 | - return '<' . $x[0] . '>' |
|
444 | + return '<'.$x[0].'>' |
|
445 | 445 | . htmlentities($x[1], ENT_NOQUOTES | ENT_XML1) |
446 | - . '</' . $x[0] . '>'; |
|
446 | + . '</'.$x[0].'>'; |
|
447 | 447 | } |
448 | 448 | |
449 | 449 | /** |
@@ -462,9 +462,9 @@ discard block |
||
462 | 462 | // dump private key into directory |
463 | 463 | $outstring = ""; |
464 | 464 | openssl_pkey_export($privateKey, $outstring); |
465 | - file_put_contents($tempdir . "/pkey.pem", $outstring); |
|
465 | + file_put_contents($tempdir."/pkey.pem", $outstring); |
|
466 | 466 | // PHP can only do one DC in the Subject. But we need three. |
467 | - $execCmd = \config\Master::PATHS['openssl'] . " req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$fed/CN=$username/emailAddress=$username"; |
|
467 | + $execCmd = \config\Master::PATHS['openssl']." req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$fed/CN=$username/emailAddress=$username"; |
|
468 | 468 | $this->loggerInstance->debug(2, "Calling openssl req with following cmdline: $execCmd\n"); |
469 | 469 | $output = []; |
470 | 470 | $return = 999; |
@@ -110,7 +110,7 @@ discard block |
||
110 | 110 | public function __construct() |
111 | 111 | { |
112 | 112 | $this->loggerInstance = new Logging(); |
113 | - $this->loggerInstance->debug(4, "--- BEGIN constructing class " . get_class($this) . " .\n"); |
|
113 | + $this->loggerInstance->debug(4, "--- BEGIN constructing class ".get_class($this)." .\n"); |
|
114 | 114 | $this->languageInstance = new Language(); |
115 | 115 | Entity::intoThePotatoes("core"); |
116 | 116 | // some config elements are displayable. We need some dummies to |
@@ -129,13 +129,13 @@ discard block |
||
129 | 129 | $dummy_organisation2a = _("organization"); |
130 | 130 | $dummy_organisation3 = _("entity"); |
131 | 131 | // and do something useless with the strings so that there's no "unused" complaint |
132 | - if (strlen($dummy_NRO . $dummy_idp1 . $dummy_idp2 . $dummy_idp3 . $dummy_hotspot1 . $dummy_hotspot2 . $dummy_hotspot3 . $dummy_organisation1 . $dummy_organisation2 . $dummy_organisation2a . $dummy_organisation3) < 0) { |
|
132 | + if (strlen($dummy_NRO.$dummy_idp1.$dummy_idp2.$dummy_idp3.$dummy_hotspot1.$dummy_hotspot2.$dummy_hotspot3.$dummy_organisation1.$dummy_organisation2.$dummy_organisation2a.$dummy_organisation3) < 0) { |
|
133 | 133 | throw new Exception("Strings are usually not shorter than 0 characters. We've encountered a string blackhole."); |
134 | 134 | } |
135 | - $xyzVariableFed = \config\ConfAssistant::CONSORTIUM['nomenclature_federation'] . ""; |
|
136 | - $xyzVariableIdP = \config\ConfAssistant::CONSORTIUM['nomenclature_idp'] . ""; |
|
137 | - $xyzVariableHotspot = \config\ConfAssistant::CONSORTIUM['nomenclature_hotspot'] . ""; |
|
138 | - $xyzVariableParticipant = \config\ConfAssistant::CONSORTIUM['nomenclature_participant'] . ""; |
|
135 | + $xyzVariableFed = \config\ConfAssistant::CONSORTIUM['nomenclature_federation'].""; |
|
136 | + $xyzVariableIdP = \config\ConfAssistant::CONSORTIUM['nomenclature_idp'].""; |
|
137 | + $xyzVariableHotspot = \config\ConfAssistant::CONSORTIUM['nomenclature_hotspot'].""; |
|
138 | + $xyzVariableParticipant = \config\ConfAssistant::CONSORTIUM['nomenclature_participant'].""; |
|
139 | 139 | Entity::$nomenclature_fed = _($xyzVariableFed); |
140 | 140 | Entity::$nomenclature_idp = _($xyzVariableIdP); |
141 | 141 | Entity::$nomenclature_hotspot = _($xyzVariableHotspot); |
@@ -151,7 +151,7 @@ discard block |
||
151 | 151 | */ |
152 | 152 | public function __destruct() |
153 | 153 | { |
154 | - (new Logging())->debug(5, "--- KILL Destructing class " . get_class($this) . " .\n"); |
|
154 | + (new Logging())->debug(5, "--- KILL Destructing class ".get_class($this)." .\n"); |
|
155 | 155 | } |
156 | 156 | |
157 | 157 | /** |
@@ -184,7 +184,7 @@ discard block |
||
184 | 184 | public static function createTemporaryDirectory($purpose = 'installer', $failIsFatal = 1) |
185 | 185 | { |
186 | 186 | $loggerInstance = new Logging(); |
187 | - $name = md5(time() . rand()); |
|
187 | + $name = md5(time().rand()); |
|
188 | 188 | $path = ROOT; |
189 | 189 | switch ($purpose) { |
190 | 190 | case 'silverbullet': |
@@ -202,7 +202,7 @@ discard block |
||
202 | 202 | default: |
203 | 203 | throw new Exception("unable to create temporary directory due to unknown purpose: $purpose\n"); |
204 | 204 | } |
205 | - $tmpDir = $path . '/' . $name; |
|
205 | + $tmpDir = $path.'/'.$name; |
|
206 | 206 | $loggerInstance->debug(4, "temp dir: $purpose : $tmpDir\n"); |
207 | 207 | if (!mkdir($tmpDir, 0700, true)) { |
208 | 208 | if ($failIsFatal) { |
@@ -223,7 +223,7 @@ discard block |
||
223 | 223 | */ |
224 | 224 | public static function rrmdir($dir) |
225 | 225 | { |
226 | - foreach (glob($dir . '/*') as $file) { |
|
226 | + foreach (glob($dir.'/*') as $file) { |
|
227 | 227 | if (is_dir($file)) { |
228 | 228 | Entity::rrmdir($file); |
229 | 229 | } else { |
@@ -249,12 +249,12 @@ discard block |
||
249 | 249 | } |
250 | 250 | // these substr() are guaranteed to yield actual string data, as the |
251 | 251 | // base string is an MD5 hash - has sufficient length |
252 | - $uuid = /** @scrutinizer ignore-type */ substr($chars, 0, 8) . '-'; |
|
253 | - $uuid .= /** @scrutinizer ignore-type */ substr($chars, 8, 4) . '-'; |
|
254 | - $uuid .= /** @scrutinizer ignore-type */ substr($chars, 12, 4) . '-'; |
|
255 | - $uuid .= /** @scrutinizer ignore-type */ substr($chars, 16, 4) . '-'; |
|
252 | + $uuid = /** @scrutinizer ignore-type */ substr($chars, 0, 8).'-'; |
|
253 | + $uuid .= /** @scrutinizer ignore-type */ substr($chars, 8, 4).'-'; |
|
254 | + $uuid .= /** @scrutinizer ignore-type */ substr($chars, 12, 4).'-'; |
|
255 | + $uuid .= /** @scrutinizer ignore-type */ substr($chars, 16, 4).'-'; |
|
256 | 256 | $uuid .= /** @scrutinizer ignore-type */ substr($chars, 20, 12); |
257 | - return $prefix . $uuid; |
|
257 | + return $prefix.$uuid; |
|
258 | 258 | } |
259 | 259 | |
260 | 260 | /** |
@@ -295,7 +295,7 @@ discard block |
||
295 | 295 | for ($i = count($trace); $i--; $i > 0) { |
296 | 296 | if (isset($trace[$i - 1]['class']) && preg_match('/Entity/', $trace[$i - 1]['class'])) { |
297 | 297 | if ($showTrace) { |
298 | - echo "FOUND caller: " . /** @scrutinizer ignore-type */ print_r($trace[$i], true) . " - class is " . $trace[$i]['class']; |
|
298 | + echo "FOUND caller: "./** @scrutinizer ignore-type */ print_r($trace[$i], true)." - class is ".$trace[$i]['class']; |
|
299 | 299 | } |
300 | 300 | $caller = $trace[$i]; |
301 | 301 | break; |
@@ -305,8 +305,8 @@ discard block |
||
305 | 305 | // otherwise, on the filename relative to ROOT |
306 | 306 | $myName = $caller['class'] ?? substr($caller['file'], strlen(ROOT)); |
307 | 307 | if ($showTrace === TRUE) { |
308 | - echo "<pre>" . /** @scrutinizer ignore-type */ print_r($trace, true) . "</pre>"; |
|
309 | - echo "CLASS = " . $myName . "<br/>"; |
|
308 | + echo "<pre>"./** @scrutinizer ignore-type */ print_r($trace, true)."</pre>"; |
|
309 | + echo "CLASS = ".$myName."<br/>"; |
|
310 | 310 | } |
311 | 311 | if (preg_match("/diag/", $myName) == 1) { |
312 | 312 | $ret = "diagnostics"; |
@@ -340,11 +340,11 @@ discard block |
||
340 | 340 | if ($catalogue === NULL) { |
341 | 341 | $theCatalogue = Entity::determineOwnCatalogue($trace); |
342 | 342 | textdomain($theCatalogue); |
343 | - bindtextdomain($theCatalogue, ROOT . "/translation/"); |
|
343 | + bindtextdomain($theCatalogue, ROOT."/translation/"); |
|
344 | 344 | bind_textdomain_codeset($theCatalogue, "UTF-8"); |
345 | 345 | } else { |
346 | 346 | textdomain($catalogue); |
347 | - bindtextdomain($catalogue, ROOT . "/translation/"); |
|
347 | + bindtextdomain($catalogue, ROOT."/translation/"); |
|
348 | 348 | bind_textdomain_codeset($catalogue, "UTF-8"); |
349 | 349 | } |
350 | 350 | } |
@@ -105,9 +105,9 @@ discard block |
||
105 | 105 | |
106 | 106 | $attributesLowLevel = array_merge($this->deviceLevelAttributes, $this->eapLevelAttributes); |
107 | 107 | |
108 | - $this->loggerInstance->debug(5, "Device-Level Attributes: " . /** @scrutinizer ignore-type */ print_r($this->deviceLevelAttributes, true)); |
|
109 | - $this->loggerInstance->debug(5, "EAP-Level Attributes: " . /** @scrutinizer ignore-type */ print_r($this->eapLevelAttributes, true)); |
|
110 | - $this->loggerInstance->debug(5, "All low-Level Attributes: " . /** @scrutinizer ignore-type */ print_r($attributesLowLevel, true)); |
|
108 | + $this->loggerInstance->debug(5, "Device-Level Attributes: "./** @scrutinizer ignore-type */ print_r($this->deviceLevelAttributes, true)); |
|
109 | + $this->loggerInstance->debug(5, "EAP-Level Attributes: "./** @scrutinizer ignore-type */ print_r($this->eapLevelAttributes, true)); |
|
110 | + $this->loggerInstance->debug(5, "All low-Level Attributes: "./** @scrutinizer ignore-type */ print_r($attributesLowLevel, true)); |
|
111 | 111 | |
112 | 112 | // now fetch and merge profile-level attributes if not already set on deeper level |
113 | 113 | |
@@ -137,7 +137,7 @@ discard block |
||
137 | 137 | } |
138 | 138 | } |
139 | 139 | |
140 | - $this->loggerInstance->debug(5, "Merged Attributes: " . /** @scrutinizer ignore-type */ print_r($attributesLowLevel, true)); |
|
140 | + $this->loggerInstance->debug(5, "Merged Attributes: "./** @scrutinizer ignore-type */ print_r($attributesLowLevel, true)); |
|
141 | 141 | |
142 | 142 | // now, fetch and merge IdP-wide attributes |
143 | 143 | |
@@ -152,7 +152,7 @@ discard block |
||
152 | 152 | // add the internal attribute to that effect |
153 | 153 | |
154 | 154 | if (isset($this->attributes['media:openroaming_always'])) { |
155 | - $this->attributes = array_merge($this->attributes, $this->addInternalAttributes([ "internal:openroaming" => TRUE ] )); |
|
155 | + $this->attributes = array_merge($this->attributes, $this->addInternalAttributes(["internal:openroaming" => TRUE])); |
|
156 | 156 | } |
157 | 157 | |
158 | 158 | $this->loggerInstance->debug(4, "--- END Constructing new Profile object ... ---\n"); |
@@ -200,7 +200,7 @@ discard block |
||
200 | 200 | "row_id" => $attributeQuery->row_id, |
201 | 201 | "flag" => $optinfo['flag'], |
202 | 202 | "device" => ($devicesOrEAPMethods == "DEVICES" ? $attributeQuery->deviceormethod : NULL), |
203 | - "eapmethod" => ($devicesOrEAPMethods == "DEVICES" ? 0 : (new \core\common\EAP($attributeQuery->deviceormethod))->getArrayRep() )]; |
|
203 | + "eapmethod" => ($devicesOrEAPMethods == "DEVICES" ? 0 : (new \core\common\EAP($attributeQuery->deviceormethod))->getArrayRep())]; |
|
204 | 204 | } |
205 | 205 | return $temparray; |
206 | 206 | } |
@@ -309,7 +309,7 @@ discard block |
||
309 | 309 | */ |
310 | 310 | public function setAnonymousIDSupport($shallwe) |
311 | 311 | { |
312 | - $this->databaseHandle->exec("UPDATE profile SET use_anon_outer = " . ($shallwe === true ? "1" : "0") . " WHERE profile_id = $this->identifier"); |
|
312 | + $this->databaseHandle->exec("UPDATE profile SET use_anon_outer = ".($shallwe === true ? "1" : "0")." WHERE profile_id = $this->identifier"); |
|
313 | 313 | } |
314 | 314 | |
315 | 315 | /** Toggle special username for realm checks |
@@ -319,7 +319,7 @@ discard block |
||
319 | 319 | * @return void |
320 | 320 | */ |
321 | 321 | public function setRealmCheckUser($shallwe, $localpart = NULL) { |
322 | - $this->databaseHandle->exec("UPDATE profile SET checkuser_outer = " . ($shallwe === true ? "1" : "0") . " WHERE profile_id = $this->identifier"); |
|
322 | + $this->databaseHandle->exec("UPDATE profile SET checkuser_outer = ".($shallwe === true ? "1" : "0")." WHERE profile_id = $this->identifier"); |
|
323 | 323 | if ($localpart !== NULL) { |
324 | 324 | $this->databaseHandle->exec("UPDATE profile SET checkuser_value = ? WHERE profile_id = $this->identifier", "s", $localpart); |
325 | 325 | } |
@@ -334,8 +334,8 @@ discard block |
||
334 | 334 | */ |
335 | 335 | public function setInputVerificationPreference($verify, $hint) |
336 | 336 | { |
337 | - $this->databaseHandle->exec("UPDATE profile SET verify_userinput_suffix = " . ($verify === true ? "1" : "0") . |
|
338 | - ", hint_userinput_suffix = " . ($hint === true ? "1" : "0") . |
|
337 | + $this->databaseHandle->exec("UPDATE profile SET verify_userinput_suffix = ".($verify === true ? "1" : "0"). |
|
338 | + ", hint_userinput_suffix = ".($hint === true ? "1" : "0"). |
|
339 | 339 | " WHERE profile_id = $this->identifier"); |
340 | 340 | } |
341 | 341 |
@@ -135,7 +135,7 @@ discard block |
||
135 | 135 | sprintf(_("%s: Do not terminate EAP"), \core\ProfileSilverbullet::PRODUCTNAME) => "fed:silverbullet-noterm", |
136 | 136 | sprintf(_("%s: max users per profile"), \core\ProfileSilverbullet::PRODUCTNAME) => "fed:silverbullet-maxusers", |
137 | 137 | sprintf(_("Mint %s with CA on creation"), $this->nomenclatureIdP) => "fed:minted_ca_file", |
138 | - sprintf(_("OpenRoaming: Allow %s Opt-In"),$this->nomenclatureParticipant) => "fed:openroaming", |
|
138 | + sprintf(_("OpenRoaming: Allow %s Opt-In"), $this->nomenclatureParticipant) => "fed:openroaming", |
|
139 | 139 | _("OpenRoaming: Custom NAPTR Target") => "fed:openroaming_customtarget", |
140 | 140 | $ssidText => "media:SSID", |
141 | 141 | $passpointOiText => "media:consortium_OI", |
@@ -147,7 +147,7 @@ discard block |
||
147 | 147 | $find = array_keys($displayNames, $input, TRUE); |
148 | 148 | |
149 | 149 | if (count($find) == 0) { // this is an error! throw an Exception |
150 | - throw new \Exception("The translation of an option name was requested, but the option is not known to the system: " . htmlentities($input)); |
|
150 | + throw new \Exception("The translation of an option name was requested, but the option is not known to the system: ".htmlentities($input)); |
|
151 | 151 | } |
152 | 152 | \core\common\Entity::outOfThePotatoes(); |
153 | 153 | // none of the strings have HTML in them, only translators can provide own text for it -> no threat, but complained about by the security review |
@@ -169,7 +169,7 @@ discard block |
||
169 | 169 | |
170 | 170 | foreach ($optionlist as $option) { |
171 | 171 | $type = $optioninfo->optionType($option['name']); |
172 | - if (preg_match('/^' . $class . '/', $option['name']) && $option['level'] == "$level") { |
|
172 | + if (preg_match('/^'.$class.'/', $option['name']) && $option['level'] == "$level") { |
|
173 | 173 | // all non-multilang attribs get this assignment ... |
174 | 174 | $language = ""; |
175 | 175 | $content = $option['value']; |
@@ -187,19 +187,19 @@ discard block |
||
187 | 187 | $locationMarkers[] = $coords; |
188 | 188 | break; |
189 | 189 | case "file": |
190 | - $retval .= "<tr><td>" . $this->displayName($option['name']) . "</td><td>$language</td><td>"; |
|
190 | + $retval .= "<tr><td>".$this->displayName($option['name'])."</td><td>$language</td><td>"; |
|
191 | 191 | switch ($option['name']) { |
192 | 192 | case "general:logo_file": |
193 | 193 | case "fed:logo_file": |
194 | - $retval .= $this->previewImageinHTML('ROWID-' . $option['level'] . '-' . $option['row_id']); |
|
194 | + $retval .= $this->previewImageinHTML('ROWID-'.$option['level'].'-'.$option['row_id']); |
|
195 | 195 | break; |
196 | 196 | case "eap:ca_file": |
197 | 197 | // fall-through intended: display both the same way |
198 | 198 | case "fed:minted_ca_file": |
199 | - $retval .= $this->previewCAinHTML('ROWID-' . $option['level'] . '-' . $option['row_id']); |
|
199 | + $retval .= $this->previewCAinHTML('ROWID-'.$option['level'].'-'.$option['row_id']); |
|
200 | 200 | break; |
201 | 201 | case "support:info_file": |
202 | - $retval .= $this->previewInfoFileinHTML('ROWID-' . $option['level'] . '-' . $option['row_id']); |
|
202 | + $retval .= $this->previewInfoFileinHTML('ROWID-'.$option['level'].'-'.$option['row_id']); |
|
203 | 203 | break; |
204 | 204 | default: |
205 | 205 | } |
@@ -209,10 +209,10 @@ discard block |
||
209 | 209 | // do not display the option at all; it gets auto-set by the ProfileSilverbullet constructor and doesn't have to be seen |
210 | 210 | break; |
211 | 211 | } |
212 | - $retval .= "<tr><td>" . $this->displayName($option['name']) . "</td><td>$language</td><td><strong>" . ($content == "on" ? _("on") : _("off") ) . "</strong></td></tr>"; |
|
212 | + $retval .= "<tr><td>".$this->displayName($option['name'])."</td><td>$language</td><td><strong>".($content == "on" ? _("on") : _("off"))."</strong></td></tr>"; |
|
213 | 213 | break; |
214 | 214 | default: |
215 | - $retval .= "<tr><td>" . $this->displayName($option['name']) . "</td><td>$language</td><td><strong>$content</strong></td></tr>"; |
|
215 | + $retval .= "<tr><td>".$this->displayName($option['name'])."</td><td>$language</td><td><strong>$content</strong></td></tr>"; |
|
216 | 216 | } |
217 | 217 | } |
218 | 218 | } |
@@ -221,11 +221,11 @@ discard block |
||
221 | 221 | $locationCount = 0; |
222 | 222 | foreach ($locationMarkers as $g) { |
223 | 223 | $locationCount++; |
224 | - $marker .= '<marker name="' . $locationCount . '" lat="' . $g['lat'] . '" lng="' . $g['lon'] . '" />'; |
|
224 | + $marker .= '<marker name="'.$locationCount.'" lat="'.$g['lat'].'" lng="'.$g['lon'].'" />'; |
|
225 | 225 | } |
226 | 226 | $marker .= '<\/markers>'; // some validator says this should be escaped |
227 | 227 | $jMarker = json_encode($locationMarkers); |
228 | - $retval .= '<tr><td><script>markers=\'' . $marker . '\'; jmarkers = \'' . $jMarker . '\';</script></td><td></td><td></td></tr>'; |
|
228 | + $retval .= '<tr><td><script>markers=\''.$marker.'\'; jmarkers = \''.$jMarker.'\';</script></td><td></td><td></td></tr>'; |
|
229 | 229 | } |
230 | 230 | \core\common\Entity::outOfThePotatoes(); |
231 | 231 | return $retval; |
@@ -241,11 +241,11 @@ discard block |
||
241 | 241 | \core\common\Entity::intoThePotatoes(); |
242 | 242 | $idpoptions = $myInst->getAttributes(); |
243 | 243 | $retval = "<div class='infobox'> |
244 | - <h2>" . sprintf(_("General %s details"), $this->nomenclatureParticipant) . "</h2> |
|
244 | + <h2>" . sprintf(_("General %s details"), $this->nomenclatureParticipant)."</h2> |
|
245 | 245 | <table> |
246 | 246 | <tr> |
247 | 247 | <td> |
248 | - " . _("Country:") . " |
|
248 | + " . _("Country:")." |
|
249 | 249 | </td> |
250 | 250 | <td> |
251 | 251 | </td> |
@@ -255,16 +255,16 @@ discard block |
||
255 | 255 | $retval .= $myFed->name; |
256 | 256 | $retval .= "</strong> |
257 | 257 | </td> |
258 | - </tr>" . $this->infoblock($idpoptions, "general", "IdP") . " |
|
258 | + </tr>" . $this->infoblock($idpoptions, "general", "IdP")." |
|
259 | 259 | </table> |
260 | 260 | </div>"; |
261 | 261 | |
262 | 262 | $blocks = [["support", _("Global Helpdesk Details")], ["media", _("Media Properties")]]; |
263 | 263 | foreach ($blocks as $block) { |
264 | 264 | $retval .= "<div class='infobox'> |
265 | - <h2>" . $block[1] . "</h2> |
|
265 | + <h2>" . $block[1]."</h2> |
|
266 | 266 | <table>" . |
267 | - $this->infoblock($idpoptions, $block[0], "IdP") . |
|
267 | + $this->infoblock($idpoptions, $block[0], "IdP"). |
|
268 | 268 | "</table> |
269 | 269 | </div>"; |
270 | 270 | } |
@@ -279,12 +279,12 @@ discard block |
||
279 | 279 | */ |
280 | 280 | private function displaySize(int $number) { |
281 | 281 | if ($number > 1024 * 1024) { |
282 | - return round($number / 1024 / 1024, 2) . " MiB"; |
|
282 | + return round($number / 1024 / 1024, 2)." MiB"; |
|
283 | 283 | } |
284 | 284 | if ($number > 1024) { |
285 | - return round($number / 1024, 2) . " KiB"; |
|
285 | + return round($number / 1024, 2)." KiB"; |
|
286 | 286 | } |
287 | - return $number . " B"; |
|
287 | + return $number." B"; |
|
288 | 288 | } |
289 | 289 | |
290 | 290 | /** |
@@ -339,7 +339,7 @@ discard block |
||
339 | 339 | $caExpiryTrashhold = \config\ConfAssistant::CERT_WARNINGS['expiry_warning']; |
340 | 340 | $rawResult = UIElements::getBlobFromDB($ref['table'], $ref['rowindex'], FALSE); |
341 | 341 | if (is_bool($rawResult)) { // we didn't actually get a CA! |
342 | - $retval = "<div class='ca-summary'>" . _("There was an error while retrieving the certificate from the database!") . "</div>"; |
|
342 | + $retval = "<div class='ca-summary'>"._("There was an error while retrieving the certificate from the database!")."</div>"; |
|
343 | 343 | \core\common\Entity::outOfThePotatoes(); |
344 | 344 | return $retval; |
345 | 345 | } |
@@ -355,8 +355,8 @@ discard block |
||
355 | 355 | |
356 | 356 | $details['name'] = preg_replace('/(.)\/(.)/', "$1<br/>$2", $details['name']); |
357 | 357 | $details['name'] = preg_replace('/\//', "", $details['name']); |
358 | - $certstatus = ( $details['root'] == 1 ? "R" : "I"); |
|
359 | - $certTooltip = ( $details['root'] == 1 ? _("Root CA") : _("Intermediate CA")); |
|
358 | + $certstatus = ($details['root'] == 1 ? "R" : "I"); |
|
359 | + $certTooltip = ($details['root'] == 1 ? _("Root CA") : _("Intermediate CA")); |
|
360 | 360 | $innerbgColor = "#0000ff"; |
361 | 361 | $leftBorderColor = "#00ff00"; |
362 | 362 | $message = ""; |
@@ -364,35 +364,35 @@ discard block |
||
364 | 364 | $leftBorderColor = "red"; |
365 | 365 | $message = _("This is a <strong>SERVER</strong> certificate!"); |
366 | 366 | if (\config\ConfAssistant::CERT_GUIDELINES !== '') { |
367 | - $message .= "<br/><a target='_blank' href='".\config\ConfAssistant::CERT_GUIDELINES."'>". _("more info")."</a>"; |
|
367 | + $message .= "<br/><a target='_blank' href='".\config\ConfAssistant::CERT_GUIDELINES."'>"._("more info")."</a>"; |
|
368 | 368 | } |
369 | 369 | $message .= "<br/>"; |
370 | - $retval = "<div class='ca-summary' style='border-left-color: $leftBorderColor'><div style='position:absolute; right: -15px; width:20px; height:20px; background-color:$innerbgColor; border-radius:10px; text-align: center;'><div style='padding-top:3px; font-weight:bold; color:#ffffff;'>S</div></div>" . $message . $details['name'] . "</div>"; |
|
370 | + $retval = "<div class='ca-summary' style='border-left-color: $leftBorderColor'><div style='position:absolute; right: -15px; width:20px; height:20px; background-color:$innerbgColor; border-radius:10px; text-align: center;'><div style='padding-top:3px; font-weight:bold; color:#ffffff;'>S</div></div>".$message.$details['name']."</div>"; |
|
371 | 371 | \core\common\Entity::outOfThePotatoes(); |
372 | 372 | return $retval; |
373 | 373 | } |
374 | 374 | $now = time(); |
375 | 375 | if ($now + \config\ConfAssistant::CERT_WARNINGS['expiry_critical'] > $details['full_details']['validTo_time_t']) { |
376 | 376 | $leftBorderColor = "red"; |
377 | - $message = _("Certificate expired!") . "<br>"; |
|
378 | - } elseif($now + \config\ConfAssistant::CERT_WARNINGS['expiry_warnings'] > $details['full_details']['validTo_time_t'] - $caExpiryTrashhold) { |
|
377 | + $message = _("Certificate expired!")."<br>"; |
|
378 | + } elseif ($now + \config\ConfAssistant::CERT_WARNINGS['expiry_warnings'] > $details['full_details']['validTo_time_t'] - $caExpiryTrashhold) { |
|
379 | 379 | if ($leftBorderColor == "#00ff00") { |
380 | 380 | $leftBorderColor = "yellow"; |
381 | 381 | } |
382 | - $message = _("Certificate close to expiry!") . "<br/>"; |
|
382 | + $message = _("Certificate close to expiry!")."<br/>"; |
|
383 | 383 | } |
384 | 384 | |
385 | 385 | if ($details['root'] == 1 && $details['basicconstraints_set'] == 0) { |
386 | 386 | if ($leftBorderColor == "#00ff00") { |
387 | 387 | $leftBorderColor = "yellow"; |
388 | 388 | } |
389 | - $message .= "<div style='max-width: 25em'><strong>" . _("Improper root certificate, required critical CA extension missing, will not reliably install!") . "</strong>"; |
|
389 | + $message .= "<div style='max-width: 25em'><strong>"._("Improper root certificate, required critical CA extension missing, will not reliably install!")."</strong>"; |
|
390 | 390 | if (\config\ConfAssistant::CERT_GUIDELINES !== '') { |
391 | - $message .= "<br/><a target='_blank' href='".\config\ConfAssistant::CERT_GUIDELINES."'>". _("more info")."</a>"; |
|
391 | + $message .= "<br/><a target='_blank' href='".\config\ConfAssistant::CERT_GUIDELINES."'>"._("more info")."</a>"; |
|
392 | 392 | } |
393 | 393 | $message .= "</div><br/>"; |
394 | 394 | } |
395 | - $retval = "<div class='ca-summary' style='border-left-color: $leftBorderColor'><div style='position:absolute; right: -15px; width:20px; height:20px; background-color:$innerbgColor; border-radius:10px; text-align: center;'><div title='$certTooltip' style='padding-top:3px; font-weight:bold; color:#ffffff;'>$certstatus</div></div>" . $message . $details['name'] . "<br>" . $this->displayName('eap:ca_vailduntil') . " " . gmdate('Y-m-d H:i:s', $details['full_details']['validTo_time_t']) . " UTC</div>"; |
|
395 | + $retval = "<div class='ca-summary' style='border-left-color: $leftBorderColor'><div style='position:absolute; right: -15px; width:20px; height:20px; background-color:$innerbgColor; border-radius:10px; text-align: center;'><div title='$certTooltip' style='padding-top:3px; font-weight:bold; color:#ffffff;'>$certstatus</div></div>".$message.$details['name']."<br>".$this->displayName('eap:ca_vailduntil')." ".gmdate('Y-m-d H:i:s', $details['full_details']['validTo_time_t'])." UTC</div>"; |
|
396 | 396 | \core\common\Entity::outOfThePotatoes(); |
397 | 397 | return $retval; |
398 | 398 | } |
@@ -405,7 +405,7 @@ discard block |
||
405 | 405 | */ |
406 | 406 | public function previewImageinHTML($imageReference) { |
407 | 407 | \core\common\Entity::intoThePotatoes(); |
408 | - $retval = "<img style='max-width:150px' src='inc/filepreview.php?id=" . $imageReference . "' alt='" . _("Preview of logo file") . "'/>"; |
|
408 | + $retval = "<img style='max-width:150px' src='inc/filepreview.php?id=".$imageReference."' alt='"._("Preview of logo file")."'/>"; |
|
409 | 409 | \core\common\Entity::outOfThePotatoes(); |
410 | 410 | return $retval; |
411 | 411 | } |
@@ -422,13 +422,13 @@ discard block |
||
422 | 422 | $ref = $validator->databaseReference($fileReference); |
423 | 423 | $fileBlob = UIElements::getBlobFromDB($ref['table'], $ref['rowindex'], FALSE); |
424 | 424 | if (is_bool($fileBlob)) { // we didn't actually get a file! |
425 | - $retval = "<div class='ca-summary'>" . _("There was an error while retrieving the file from the database!") . "</div>"; |
|
425 | + $retval = "<div class='ca-summary'>"._("There was an error while retrieving the file from the database!")."</div>"; |
|
426 | 426 | \core\common\Entity::outOfThePotatoes(); |
427 | 427 | return $retval; |
428 | 428 | } |
429 | 429 | $decodedFileBlob = base64_decode($fileBlob); |
430 | 430 | $fileinfo = new \finfo(); |
431 | - $retval = "<div class='ca-summary'>" . _("File exists") . " (" . $fileinfo->buffer($decodedFileBlob, FILEINFO_MIME_TYPE) . ", " . $this->displaySize(strlen($decodedFileBlob)) . ")<br/><a href='inc/filepreview.php?id=$fileReference'>" . _("Preview") . "</a></div>"; |
|
431 | + $retval = "<div class='ca-summary'>"._("File exists")." (".$fileinfo->buffer($decodedFileBlob, FILEINFO_MIME_TYPE).", ".$this->displaySize(strlen($decodedFileBlob)).")<br/><a href='inc/filepreview.php?id=$fileReference'>"._("Preview")."</a></div>"; |
|
432 | 432 | \core\common\Entity::outOfThePotatoes(); |
433 | 433 | return $retval; |
434 | 434 | } |
@@ -459,7 +459,7 @@ discard block |
||
459 | 459 | $retval .= "<tr><td>"; |
460 | 460 | } |
461 | 461 | $finalCaption = ($caption !== NULL ? $caption : $uiMessages[$level]['text']); |
462 | - $retval .= "<img class='icon' src='" . $uiMessages[$level]['icon'] . "' alt='" . $finalCaption . "' title='" . $finalCaption . "'/>"; |
|
462 | + $retval .= "<img class='icon' src='".$uiMessages[$level]['icon']."' alt='".$finalCaption."' title='".$finalCaption."'/>"; |
|
463 | 463 | if (!$omittabletags) { |
464 | 464 | $retval .= "</td><td>"; |
465 | 465 | } |
@@ -577,8 +577,8 @@ discard block |
||
577 | 577 | return ""; |
578 | 578 | } |
579 | 579 | |
580 | - $loggerInstance->debug(4, "Consortium logo is at: " . ROOT . "/web/resources/images/consortium_logo_large.png"); |
|
581 | - $logogd = imagecreatefrompng(ROOT . "/web/resources/images/consortium_logo_large.png"); |
|
580 | + $loggerInstance->debug(4, "Consortium logo is at: ".ROOT."/web/resources/images/consortium_logo_large.png"); |
|
581 | + $logogd = imagecreatefrompng(ROOT."/web/resources/images/consortium_logo_large.png"); |
|
582 | 582 | if ($logogd === FALSE) { // consortium logo is bogus; don't do anything |
583 | 583 | return ""; |
584 | 584 | } |
@@ -604,7 +604,7 @@ discard block |
||
604 | 604 | imagecolorallocate($whiteimage, 255, 255, 255); |
605 | 605 | // also make sure the initial placement is a multitude of 12; otherwise "two half" symbols might be affected |
606 | 606 | $targetplacementx = (int) ($symbolsize * round(($sizeinput[0] / 2 - ($targetwidth - $symbolsize + 1) / 2) / $symbolsize)); |
607 | - $targetplacementy = (int) ($symbolsize * round(($sizeinput[1] / 2 - ($targetheight - $symbolsize + 1 ) / 2) / $symbolsize)); |
|
607 | + $targetplacementy = (int) ($symbolsize * round(($sizeinput[1] / 2 - ($targetheight - $symbolsize + 1) / 2) / $symbolsize)); |
|
608 | 608 | imagecopyresized($inputgd, $whiteimage, $targetplacementx - $symbolsize, $targetplacementy - $symbolsize, 0, 0, $targetwidth + 2 * $symbolsize, $targetheight + 2 * $symbolsize, $targetwidth + 2 * $symbolsize, $targetheight + 2 * $symbolsize); |
609 | 609 | imagecopyresized($inputgd, $logogd, $targetplacementx, $targetplacementy, 0, 0, $targetwidth, $targetheight, $sizelogo[0], $sizelogo[1]); |
610 | 610 | ob_start(); |
@@ -654,9 +654,9 @@ discard block |
||
654 | 654 | $message = "Your configuration appears to be fine."; |
655 | 655 | break; |
656 | 656 | default: |
657 | - throw new Exception("The result code level " . $test->test_result['global'] . " is not defined!"); |
|
657 | + throw new Exception("The result code level ".$test->test_result['global']." is not defined!"); |
|
658 | 658 | } |
659 | - $out .= $this->boxFlexible($test->test_result['global'], "<br><strong>Test Summary</strong><br>" . $message . "<br>See below for details<br><hr>"); |
|
659 | + $out .= $this->boxFlexible($test->test_result['global'], "<br><strong>Test Summary</strong><br>".$message."<br>See below for details<br><hr>"); |
|
660 | 660 | foreach ($test->out as $testValue) { |
661 | 661 | foreach ($testValue as $o) { |
662 | 662 | $out .= $this->boxFlexible($o['level'], $o['message']); |
@@ -454,7 +454,7 @@ discard block |
||
454 | 454 | $result = $this->databaseHandle->exec($query); |
455 | 455 | $rows = $result->fetch_all(); |
456 | 456 | foreach ($rows as $row) { |
457 | - $activeProfiles[] = $row[0]; |
|
457 | + $activeProfiles[] = $row[0]; |
|
458 | 458 | } |
459 | 459 | $query = "SELECT institution.inst_id AS inst_id, profile.profile_id AS profile_id, profile_option.option_value AS cert FROM profile_option JOIN profile ON profile_option.profile_id=profile.profile_id JOIN institution ON profile.inst_id=institution.inst_id WHERE profile_option.option_name='eap:ca_file' and institution.country='".$this->tld."'"; |
460 | 460 | $result = $this->databaseHandle->exec($query); |
@@ -531,7 +531,7 @@ discard block |
||
531 | 531 | 'country' => strtoupper($idp->federation), |
532 | 532 | 'instance' => $idp, |
533 | 533 | 'realms' => $idpQuery->realms] |
534 | - ; |
|
534 | + ; |
|
535 | 535 | $returnarray[$idp->identifier] = $idpInfo; |
536 | 536 | } |
537 | 537 | if ($activeOnly != 0) { // we're only doing this once. |
@@ -40,7 +40,7 @@ discard block |
||
40 | 40 | private function inputValidationError($customtext) |
41 | 41 | { |
42 | 42 | \core\common\Entity::intoThePotatoes(); |
43 | - $retval = "<p>" . _("Input validation error: ") . $customtext . "</p>"; |
|
43 | + $retval = "<p>"._("Input validation error: ").$customtext."</p>"; |
|
44 | 44 | \core\common\Entity::outOfThePotatoes(); |
45 | 45 | return $retval; |
46 | 46 | } |
@@ -135,18 +135,18 @@ discard block |
||
135 | 135 | } |
136 | 136 | if ($user->isFederationAdmin($temp->federation)) { |
137 | 137 | $this->loggerInstance->debug(4, "You are fed admin for this IdP\n"); |
138 | - return [$temp,'readonly']; |
|
138 | + return [$temp, 'readonly']; |
|
139 | 139 | } |
140 | 140 | if ($user->isSuperadmin()) { |
141 | 141 | $this->loggerInstance->debug(4, "You are the superadmin\n"); |
142 | - return [$temp,'readonly']; |
|
142 | + return [$temp, 'readonly']; |
|
143 | 143 | } |
144 | 144 | throw new Exception($this->inputValidationError("This IdP identifier is not accessible!")); |
145 | 145 | } |
146 | 146 | if ($claimedFedBinding !== NULL && strtoupper($temp->federation) != strtoupper($claimedFedBinding->tld)) { |
147 | 147 | throw new Exception($this->inputValidationError("This IdP does not belong to the claimed federation!")); |
148 | 148 | } |
149 | - return [$temp,'nouser']; |
|
149 | + return [$temp, 'nouser']; |
|
150 | 150 | } |
151 | 151 | |
152 | 152 | /** |
@@ -588,7 +588,7 @@ discard block |
||
588 | 588 | try { |
589 | 589 | $image->readImageBlob($binary); |
590 | 590 | } catch (\ImagickException $exception) { |
591 | - echo "Error" . $exception->getMessage(); |
|
591 | + echo "Error".$exception->getMessage(); |
|
592 | 592 | return FALSE; |
593 | 593 | } |
594 | 594 | // image survived the sanity check |
@@ -304,7 +304,7 @@ discard block |
||
304 | 304 | // for now (no OpenRoaming client certs available) only run server-side tests |
305 | 305 | foreach ($listOfIPs as $oneIP) { |
306 | 306 | $connectionResult = $connectionTests->cApathCheck($oneIP); |
307 | - if ($connectionResult != \core\diag\AbstractTest::RETVAL_OK || ( isset($connectionTests->TLS_CA_checks_result['cert_oddity']) && count($connectionTests->TLS_CA_checks_result['cert_oddity']) > 0)) { |
|
307 | + if ($connectionResult != \core\diag\AbstractTest::RETVAL_OK || (isset($connectionTests->TLS_CA_checks_result['cert_oddity']) && count($connectionTests->TLS_CA_checks_result['cert_oddity']) > 0)) { |
|
308 | 308 | $allHostsOkay = FALSE; |
309 | 309 | } else { |
310 | 310 | $oneHostOkay = TRUE; |
@@ -913,7 +913,7 @@ discard block |
||
913 | 913 | $profileStatus = self::CERT_STATUS_OK; |
914 | 914 | foreach ($rows as $row) { |
915 | 915 | $encodedCert = $row[0]; |
916 | - $tm = $x509->processCertificate(base64_decode($encodedCert))['full_details']['validTo_time_t']- time(); |
|
916 | + $tm = $x509->processCertificate(base64_decode($encodedCert))['full_details']['validTo_time_t'] - time(); |
|
917 | 917 | if ($tm < \config\ConfAssistant::CERT_WARNINGS['expiry_critical']) { |
918 | 918 | $certStatus = self::CERT_STATUS_ERROR; |
919 | 919 | } elseif ($tm < \config\ConfAssistant::CERT_WARNINGS['expiry_warning']) { |
@@ -350,17 +350,17 @@ discard block |
||
350 | 350 | } |
351 | 351 | echo "<td style='vertical-align:top;' class='inst_td'> |
352 | 352 | <input type='hidden' name='inst' value='" |
353 | - . $index."'>" |
|
354 | - . "<span style='display:none' class='inst_name'>".$my_idp."</span>" |
|
355 | - . "<span>". $idp_instance->name."</span>" |
|
356 | - . " (<a href='overview_org.php?inst_id=" |
|
357 | - . $idp_instance->identifier."'>" |
|
358 | - . (in_array($index, $userIdps) ? _("manage") : _("view")) |
|
359 | - . "</a>)" |
|
360 | - . (empty($listOfSilverbulletRealms) ? "" : "<ul><li>" ) |
|
361 | - . implode("</li><li>", $listOfSilverbulletRealms) |
|
362 | - . (empty($listOfSilverbulletRealms) ? "" : "</li><ul>" ) |
|
363 | - . "</td>"; |
|
353 | + . $index."'>" |
|
354 | + . "<span style='display:none' class='inst_name'>".$my_idp."</span>" |
|
355 | + . "<span>". $idp_instance->name."</span>" |
|
356 | + . " (<a href='overview_org.php?inst_id=" |
|
357 | + . $idp_instance->identifier."'>" |
|
358 | + . (in_array($index, $userIdps) ? _("manage") : _("view")) |
|
359 | + . "</a>)" |
|
360 | + . (empty($listOfSilverbulletRealms) ? "" : "<ul><li>" ) |
|
361 | + . implode("</li><li>", $listOfSilverbulletRealms) |
|
362 | + . (empty($listOfSilverbulletRealms) ? "" : "</li><ul>" ) |
|
363 | + . "</td>"; |
|
364 | 364 | // deployment status; need to dive into profiles for this |
365 | 365 | // show happy eyeballs if at least one profile is configured/showtime |
366 | 366 | echo "<td>"; |
@@ -454,8 +454,8 @@ discard block |
||
454 | 454 | echo "<form method='post' action='overview_federation.php' accept-charset='UTF-8'> |
455 | 455 | <input type='hidden' name='invitation_id' value='".$oneinvite['token']."'/> |
456 | 456 | <button class='delete' type='submit' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_DELETE."'>"._("Revoke Invitation")."</button> " |
457 | - . sprintf(_("(expires %s)"), $oneinvite['expiry']) |
|
458 | - . "</form>"; |
|
457 | + . sprintf(_("(expires %s)"), $oneinvite['expiry']) |
|
458 | + . "</form>"; |
|
459 | 459 | } |
460 | 460 | echo " </td>"; |
461 | 461 | echo " </tr>"; |
@@ -299,8 +299,8 @@ discard block |
||
299 | 299 | $thefed = new \core\Federation($fedId); |
300 | 300 | /// nomenclature for 'federation', federation name, nomenclature for 'inst' |
301 | 301 | echo "<tr><td colspan='9'><strong>".sprintf(_("The following %s are in your %s %s:"), $uiElements->nomenclatureParticipant, $uiElements->nomenclatureFed, '<span style="color:green">'.$thefed->name.'</span>')."</strong></td></tr>"; |
302 | - echo "<tr><td colspan='4'><strong>". _("Quick search:")." </strong><input style='background:#eeeeee;' type='text' id='qsearch_".$fedId."'></td>"; |
|
303 | - echo "<td colspan='6' style='border-bottom-style: dotted;border-bottom-width: 1px;'><input type='checkbox' name='unlinked' id='unlinked_ck_".$fedId."'> ". _("Only not linked"). "</td>"; |
|
302 | + echo "<tr><td colspan='4'><strong>"._("Quick search:")." </strong><input style='background:#eeeeee;' type='text' id='qsearch_".$fedId."'></td>"; |
|
303 | + echo "<td colspan='6' style='border-bottom-style: dotted;border-bottom-width: 1px;'><input type='checkbox' name='unlinked' id='unlinked_ck_".$fedId."'> "._("Only not linked")."</td>"; |
|
304 | 304 | echo "</tr>"; |
305 | 305 | // extract only pending invitations for *this* fed |
306 | 306 | $display_pendings = FALSE; |
@@ -352,14 +352,14 @@ discard block |
||
352 | 352 | <input type='hidden' name='inst' value='" |
353 | 353 | . $index."'>" |
354 | 354 | . "<span style='display:none' class='inst_name'>".$my_idp."</span>" |
355 | - . "<span>". $idp_instance->name."</span>" |
|
355 | + . "<span>".$idp_instance->name."</span>" |
|
356 | 356 | . " (<a href='overview_org.php?inst_id=" |
357 | 357 | . $idp_instance->identifier."'>" |
358 | 358 | . (in_array($index, $userIdps) ? _("manage") : _("view")) |
359 | 359 | . "</a>)" |
360 | - . (empty($listOfSilverbulletRealms) ? "" : "<ul><li>" ) |
|
360 | + . (empty($listOfSilverbulletRealms) ? "" : "<ul><li>") |
|
361 | 361 | . implode("</li><li>", $listOfSilverbulletRealms) |
362 | - . (empty($listOfSilverbulletRealms) ? "" : "</li><ul>" ) |
|
362 | + . (empty($listOfSilverbulletRealms) ? "" : "</li><ul>") |
|
363 | 363 | . "</td>"; |
364 | 364 | // deployment status; need to dive into profiles for this |
365 | 365 | // show happy eyeballs if at least one profile is configured/showtime |