@@ -129,7 +129,7 @@ discard block |
||
| 129 | 129 | $this->test_result = []; |
| 130 | 130 | $this->test_result['global'] = 0; |
| 131 | 131 | // parse the schema file to find out the number of expected rows... |
| 132 | - $schema = file(dirname(dirname(__FILE__)) . "/schema/schema.sql"); |
|
| 132 | + $schema = file(dirname(dirname(__FILE__))."/schema/schema.sql"); |
|
| 133 | 133 | $this->profileOptionCount = 0; |
| 134 | 134 | $passedTheWindmill = FALSE; |
| 135 | 135 | foreach ($schema as $schemaLine) { |
@@ -156,7 +156,7 @@ discard block |
||
| 156 | 156 | { |
| 157 | 157 | $this->out[$test] = []; |
| 158 | 158 | $this->name = $test; |
| 159 | - $m_name = 'test' . $test; |
|
| 159 | + $m_name = 'test'.$test; |
|
| 160 | 160 | $this->test_result[$test] = 0; |
| 161 | 161 | if (!method_exists($this, $m_name)) { |
| 162 | 162 | $this->storeTestResult(\core\common\Entity::L_ERROR, "Configuration error, no test configured for <strong>$test</strong>."); |
@@ -269,9 +269,9 @@ discard block |
||
| 269 | 269 | private function testPhp() |
| 270 | 270 | { |
| 271 | 271 | if (version_compare(phpversion(), $this->needversionPHP, '>=')) { |
| 272 | - $this->storeTestResult(\core\common\Entity::L_OK, "<strong>PHP</strong> is sufficiently recent. You are running " . phpversion() . "."); |
|
| 272 | + $this->storeTestResult(\core\common\Entity::L_OK, "<strong>PHP</strong> is sufficiently recent. You are running ".phpversion()."."); |
|
| 273 | 273 | } else { |
| 274 | - $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>PHP</strong> is too old. We need at least $this->needversionPHP, but you only have " . phpversion() . "."); |
|
| 274 | + $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>PHP</strong> is too old. We need at least $this->needversionPHP, but you only have ".phpversion()."."); |
|
| 275 | 275 | } |
| 276 | 276 | } |
| 277 | 277 | |
@@ -284,12 +284,12 @@ discard block |
||
| 284 | 284 | */ |
| 285 | 285 | private function runConstantsTest($config) |
| 286 | 286 | { |
| 287 | - $templateConfig = file_get_contents(ROOT . "/config/$config-template.php"); |
|
| 288 | - $newTemplateConfig = preg_replace("/class *$config/", "class $config" . "_template", $templateConfig); |
|
| 289 | - file_put_contents(ROOT . "/var/tmp/$config-template.php", $newTemplateConfig); |
|
| 290 | - include(ROOT . "/var/tmp/$config-template.php"); |
|
| 291 | - unlink(ROOT . "/var/tmp/$config-template.php"); |
|
| 292 | - $rft = new \ReflectionClass("\config\\$config" . "_template"); |
|
| 287 | + $templateConfig = file_get_contents(ROOT."/config/$config-template.php"); |
|
| 288 | + $newTemplateConfig = preg_replace("/class *$config/", "class $config"."_template", $templateConfig); |
|
| 289 | + file_put_contents(ROOT."/var/tmp/$config-template.php", $newTemplateConfig); |
|
| 290 | + include(ROOT."/var/tmp/$config-template.php"); |
|
| 291 | + unlink(ROOT."/var/tmp/$config-template.php"); |
|
| 292 | + $rft = new \ReflectionClass("\config\\$config"."_template"); |
|
| 293 | 293 | $templateConstants = $rft->getConstants(); |
| 294 | 294 | $failResults = []; |
| 295 | 295 | foreach ($templateConstants as $constant => $value) { |
@@ -306,7 +306,7 @@ discard block |
||
| 306 | 306 | * Check if all required constants are set |
| 307 | 307 | */ |
| 308 | 308 | private function testConfigConstants() { |
| 309 | - set_error_handler(function ($severity, $message, $file, $line) { |
|
| 309 | + set_error_handler(function($severity, $message, $file, $line) { |
|
| 310 | 310 | throw new \ErrorException($message, $severity, $severity, $file, $line); |
| 311 | 311 | }); |
| 312 | 312 | |
@@ -317,7 +317,7 @@ discard block |
||
| 317 | 317 | $failCount = $failCount + count($failResults); |
| 318 | 318 | if (count($failResults) > 0) { |
| 319 | 319 | $this->storeTestResult(\core\common\Entity::L_ERROR, |
| 320 | - "<strong>The following constants are not set:</strong>" . implode(', ', $failResults)); |
|
| 320 | + "<strong>The following constants are not set:</strong>".implode(', ', $failResults)); |
|
| 321 | 321 | } |
| 322 | 322 | } |
| 323 | 323 | |
@@ -341,7 +341,7 @@ discard block |
||
| 341 | 341 | $this->storeTestResult(\core\common\Entity::L_OK, "<strong>cat_base_url</strong> set correctly"); |
| 342 | 342 | } else { |
| 343 | 343 | $rootFromScript = $m[1] === '' ? '/' : $m[1]; |
| 344 | - $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>cat_base_url</strong> is set to <strong>" . \config\Master::PATHS['cat_base_url'] . "</strong> and should be <strong>$rootFromScript</strong>"); |
|
| 344 | + $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>cat_base_url</strong> is set to <strong>".\config\Master::PATHS['cat_base_url']."</strong> and should be <strong>$rootFromScript</strong>"); |
|
| 345 | 345 | } |
| 346 | 346 | } |
| 347 | 347 | |
@@ -362,7 +362,7 @@ discard block |
||
| 362 | 362 | if (count($probeReturns) == 0) { |
| 363 | 363 | $this->storeTestResult(common\Entity::L_OK, "All configured RADIUS/UDP probes are reachable."); |
| 364 | 364 | } else { |
| 365 | - $this->storeTestResult(common\Entity::L_ERROR, "The following RADIUS probes are NOT reachable: " . implode(', ', $probeReturns)); |
|
| 365 | + $this->storeTestResult(common\Entity::L_ERROR, "The following RADIUS probes are NOT reachable: ".implode(', ', $probeReturns)); |
|
| 366 | 366 | } |
| 367 | 367 | } |
| 368 | 368 | |
@@ -380,9 +380,9 @@ discard block |
||
| 380 | 380 | $SSPconfig = \SimpleSAML\Configuration::getInstance(); |
| 381 | 381 | $sspVersion = explode('.', $SSPconfig->getVersion()); |
| 382 | 382 | if ((int) $sspVersion[0] >= $this->needversionSSP['major'] && (int) $sspVersion[1] >= $this->needversionSSP['minor']) { |
| 383 | - $this->storeTestResult(\core\common\Entity::L_OK, "<strong>simpleSAMLphp</strong> is sufficently recent. You are running " . implode('.', $sspVersion)); |
|
| 383 | + $this->storeTestResult(\core\common\Entity::L_OK, "<strong>simpleSAMLphp</strong> is sufficently recent. You are running ".implode('.', $sspVersion)); |
|
| 384 | 384 | } else { |
| 385 | - $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>simpleSAMLphp</strong> is too old. We need at least " . implode('.', $this->needversionSSP)); |
|
| 385 | + $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>simpleSAMLphp</strong> is too old. We need at least ".implode('.', $this->needversionSSP)); |
|
| 386 | 386 | } |
| 387 | 387 | } |
| 388 | 388 | } |
@@ -409,7 +409,7 @@ discard block |
||
| 409 | 409 | $A = $this->getExecPath('zip'); |
| 410 | 410 | if ($A['exec'] != "") { |
| 411 | 411 | $fullOutput = []; |
| 412 | - $t = exec($A['exec'] . ' --version', $fullOutput); |
|
| 412 | + $t = exec($A['exec'].' --version', $fullOutput); |
|
| 413 | 413 | if ($A['exec_is'] == "EXPLICIT") { |
| 414 | 414 | $this->storeTestResult(\core\common\Entity::L_OK, "<strong>".$fullOutput[1]."</strong> was found and is configured explicitly in your config."); |
| 415 | 415 | } else { |
@@ -447,8 +447,8 @@ discard block |
||
| 447 | 447 | */ |
| 448 | 448 | private function testLogdir() |
| 449 | 449 | { |
| 450 | - if (fopen(\config\Master::PATHS['logdir'] . "/debug.log", "a") == FALSE) { |
|
| 451 | - $this->storeTestResult(\core\common\Entity::L_WARN, "Log files in <strong>" . \config\Master::PATHS['logdir'] . "</strong> are not writable!"); |
|
| 450 | + if (fopen(\config\Master::PATHS['logdir']."/debug.log", "a") == FALSE) { |
|
| 451 | + $this->storeTestResult(\core\common\Entity::L_WARN, "Log files in <strong>".\config\Master::PATHS['logdir']."</strong> are not writable!"); |
|
| 452 | 452 | } else { |
| 453 | 453 | $this->storeTestResult(\core\common\Entity::L_OK, "Log directory is writable."); |
| 454 | 454 | } |
@@ -576,7 +576,7 @@ discard block |
||
| 576 | 576 | { |
| 577 | 577 | $A = $this->getExecPath('openssl'); |
| 578 | 578 | if ($A['exec'] != "") { |
| 579 | - $t = exec($A['exec'] . ' version'); |
|
| 579 | + $t = exec($A['exec'].' version'); |
|
| 580 | 580 | if ($A['exec_is'] == "EXPLICIT") { |
| 581 | 581 | $this->storeTestResult(\core\common\Entity::L_OK, "<strong>$t</strong> was found and is configured explicitly in your config."); |
| 582 | 582 | } else { |
@@ -604,14 +604,14 @@ discard block |
||
| 604 | 604 | } |
| 605 | 605 | $A = $this->getExecPath('makensis'); |
| 606 | 606 | if ($A['exec'] != "") { |
| 607 | - $t = exec($A['exec'] . ' -VERSION'); |
|
| 607 | + $t = exec($A['exec'].' -VERSION'); |
|
| 608 | 608 | if ($A['exec_is'] == "EXPLICIT") { |
| 609 | 609 | $this->storeTestResult(\core\common\Entity::L_OK, "<strong>makensis $t</strong> was found and is configured explicitly in your config."); |
| 610 | 610 | } else { |
| 611 | 611 | $this->storeTestResult(\core\common\Entity::L_WARN, "<strong>makensis $t</strong> was found, but is not configured with an absolute path in your config."); |
| 612 | 612 | } |
| 613 | 613 | $outputArray = []; |
| 614 | - exec($A['exec'] . ' -HELP', $outputArray); |
|
| 614 | + exec($A['exec'].' -HELP', $outputArray); |
|
| 615 | 615 | $t1 = count(preg_grep('/INPUTCHARSET/', $outputArray)); |
| 616 | 616 | if ($t1 == 1 && \config\ConfAssistant::NSIS_VERSION == 2) { |
| 617 | 617 | $this->storeTestResult(\core\common\Entity::L_ERROR, "Declared NSIS_VERSION does not seem to match the file pointed to by PATHS['makensis']!"); |
@@ -641,7 +641,7 @@ discard block |
||
| 641 | 641 | $NSIS_Module_status = []; |
| 642 | 642 | foreach ($this->NSISModules as $module) { |
| 643 | 643 | unset($out); |
| 644 | - exec(\config\ConfAssistant::PATHS['makensis'] . " -V1 '-X!include $module' '-XOutFile $exe' '-XSection X' '-XSectionEnd'", $out, $retval); |
|
| 644 | + exec(\config\ConfAssistant::PATHS['makensis']." -V1 '-X!include $module' '-XOutFile $exe' '-XSection X' '-XSectionEnd'", $out, $retval); |
|
| 645 | 645 | if ($retval > 0) { |
| 646 | 646 | $NSIS_Module_status[$module] = 0; |
| 647 | 647 | } else { |
@@ -708,8 +708,8 @@ discard block |
||
| 708 | 708 | $locales = shell_exec("locale -a"); |
| 709 | 709 | $allthere = ""; |
| 710 | 710 | foreach (\config\Master::LANGUAGES as $onelanguage) { |
| 711 | - if (preg_match("/" . $onelanguage['locale'] . "/", $locales) == 0) { |
|
| 712 | - $allthere .= $onelanguage['locale'] . " "; |
|
| 711 | + if (preg_match("/".$onelanguage['locale']."/", $locales) == 0) { |
|
| 712 | + $allthere .= $onelanguage['locale']." "; |
|
| 713 | 713 | } |
| 714 | 714 | } |
| 715 | 715 | if ($allthere == "") { |
@@ -723,47 +723,47 @@ discard block |
||
| 723 | 723 | ["SETTING" => \config\Master::APPEARANCE['from-mail'], |
| 724 | 724 | "DEFVALUE" => "[email protected]", |
| 725 | 725 | "COMPLAINTSTRING" => "APPEARANCE/from-mail ", |
| 726 | - "REQUIRED" => FALSE,], |
|
| 726 | + "REQUIRED" => FALSE, ], |
|
| 727 | 727 | ["SETTING" => \config\Master::APPEARANCE['support-contact']['url'], |
| 728 | 728 | "DEFVALUE" => "[email protected]?body=Only%20English%20language%20please!", |
| 729 | 729 | "COMPLAINTSTRING" => "APPEARANCE/support-contact/url ", |
| 730 | - "REQUIRED" => FALSE,], |
|
| 730 | + "REQUIRED" => FALSE, ], |
|
| 731 | 731 | ["SETTING" => \config\Master::APPEARANCE['support-contact']['display'], |
| 732 | 732 | "DEFVALUE" => "[email protected]", |
| 733 | 733 | "COMPLAINTSTRING" => "APPEARANCE/support-contact/display ", |
| 734 | - "REQUIRED" => FALSE,], |
|
| 734 | + "REQUIRED" => FALSE, ], |
|
| 735 | 735 | ["SETTING" => \config\Master::APPEARANCE['support-contact']['developer-mail'], |
| 736 | 736 | "DEFVALUE" => "[email protected]", |
| 737 | 737 | "COMPLAINTSTRING" => "APPEARANCE/support-contact/mail ", |
| 738 | - "REQUIRED" => FALSE,], |
|
| 738 | + "REQUIRED" => FALSE, ], |
|
| 739 | 739 | ["SETTING" => \config\Master::APPEARANCE['abuse-mail'], |
| 740 | 740 | "DEFVALUE" => "[email protected]", |
| 741 | 741 | "COMPLAINTSTRING" => "APPEARANCE/abuse-mail ", |
| 742 | - "REQUIRED" => FALSE,], |
|
| 742 | + "REQUIRED" => FALSE, ], |
|
| 743 | 743 | ["SETTING" => \config\Master::APPEARANCE['MOTD'], |
| 744 | 744 | "DEFVALUE" => "Release Candidate. All bugs to be shot on sight!", |
| 745 | 745 | "COMPLAINTSTRING" => "APPEARANCE/MOTD ", |
| 746 | - "REQUIRED" => FALSE,], |
|
| 746 | + "REQUIRED" => FALSE, ], |
|
| 747 | 747 | ["SETTING" => \config\Master::APPEARANCE['webcert_CRLDP'], |
| 748 | 748 | "DEFVALUE" => ['list', 'of', 'CRL', 'pointers'], |
| 749 | 749 | "COMPLAINTSTRING" => "APPEARANCE/webcert_CRLDP ", |
| 750 | - "REQUIRED" => TRUE,], |
|
| 750 | + "REQUIRED" => TRUE, ], |
|
| 751 | 751 | ["SETTING" => \config\Master::APPEARANCE['webcert_OCSP'], |
| 752 | 752 | "DEFVALUE" => ['list', 'of', 'OCSP', 'pointers'], |
| 753 | 753 | "COMPLAINTSTRING" => "APPEARANCE/webcert_OCSP ", |
| 754 | - "REQUIRED" => TRUE,], |
|
| 754 | + "REQUIRED" => TRUE, ], |
|
| 755 | 755 | ["SETTING" => \config\Master::DB['INST']['host'], |
| 756 | 756 | "DEFVALUE" => "db.host.example", |
| 757 | 757 | "COMPLAINTSTRING" => "DB/INST ", |
| 758 | - "REQUIRED" => TRUE,], |
|
| 758 | + "REQUIRED" => TRUE, ], |
|
| 759 | 759 | ["SETTING" => \config\Master::DB['INST']['host'], |
| 760 | 760 | "DEFVALUE" => "db.host.example", |
| 761 | 761 | "COMPLAINTSTRING" => "DB/USER ", |
| 762 | - "REQUIRED" => TRUE,], |
|
| 762 | + "REQUIRED" => TRUE, ], |
|
| 763 | 763 | ["SETTING" => \config\Master::DB['EXTERNAL']['host'], |
| 764 | 764 | "DEFVALUE" => "customerdb.otherhost.example", |
| 765 | 765 | "COMPLAINTSTRING" => "DB/EXTERNAL ", |
| 766 | - "REQUIRED" => FALSE,], |
|
| 766 | + "REQUIRED" => FALSE, ], |
|
| 767 | 767 | ]; |
| 768 | 768 | |
| 769 | 769 | /** |
@@ -792,11 +792,11 @@ discard block |
||
| 792 | 792 | if (isset(\config\Diagnostics::RADIUSTESTS['TLS-clientcerts'])) { |
| 793 | 793 | foreach (\config\Diagnostics::RADIUSTESTS['TLS-clientcerts'] as $cadata) { |
| 794 | 794 | foreach ($cadata['certificates'] as $cert_files) { |
| 795 | - if (file_get_contents(ROOT . "/config/cli-certs/" . $cert_files['public']) === FALSE) { |
|
| 796 | - $defaultvalues .= "CERTIFICATE/" . $cert_files['public'] . " "; |
|
| 795 | + if (file_get_contents(ROOT."/config/cli-certs/".$cert_files['public']) === FALSE) { |
|
| 796 | + $defaultvalues .= "CERTIFICATE/".$cert_files['public']." "; |
|
| 797 | 797 | } |
| 798 | - if (file_get_contents(ROOT . "/config/cli-certs/" . $cert_files['private']) === FALSE) { |
|
| 799 | - $defaultvalues .= "CERTIFICATE/" . $cert_files['private'] . " "; |
|
| 798 | + if (file_get_contents(ROOT."/config/cli-certs/".$cert_files['private']) === FALSE) { |
|
| 799 | + $defaultvalues .= "CERTIFICATE/".$cert_files['private']." "; |
|
| 800 | 800 | } |
| 801 | 801 | } |
| 802 | 802 | } |
@@ -889,14 +889,14 @@ discard block |
||
| 889 | 889 | if ($global_no_cache) { |
| 890 | 890 | foreach ($Devs as $dev => $D) { |
| 891 | 891 | if (empty($D['options']['no_cache']) || $D['options']['no_cache'] != 0) { |
| 892 | - $no_cache_dev .= $dev . " "; |
|
| 892 | + $no_cache_dev .= $dev." "; |
|
| 893 | 893 | $no_cache_dev_count++; |
| 894 | 894 | } |
| 895 | 895 | } |
| 896 | 896 | } else { |
| 897 | 897 | foreach ($Devs as $dev => $D) { |
| 898 | 898 | if (!empty($D['options']['no_cache']) && $D['options']['no_cache'] != 0) { |
| 899 | - $no_cache_dev .= $dev . " "; |
|
| 899 | + $no_cache_dev .= $dev." "; |
|
| 900 | 900 | $no_cache_dev_count++; |
| 901 | 901 | } |
| 902 | 902 | } |
@@ -935,13 +935,13 @@ discard block |
||
| 935 | 935 | $mail->isHTML(FALSE); |
| 936 | 936 | $mail->CharSet = 'UTF-8'; |
| 937 | 937 | $mail->From = \config\Master::APPEARANCE['from-mail']; |
| 938 | - $mail->FromName = \config\Master::APPEARANCE['productname'] . " Invitation System"; |
|
| 938 | + $mail->FromName = \config\Master::APPEARANCE['productname']." Invitation System"; |
|
| 939 | 939 | $mail->addAddress(\config\Master::APPEARANCE['abuse-mail']); |
| 940 | 940 | $mail->Subject = "testing CAT configuration mail"; |
| 941 | 941 | $mail->Body = "Testing CAT mailing\n"; |
| 942 | 942 | $sent = $mail->send(); |
| 943 | 943 | if ($sent) { |
| 944 | - $this->storeTestResult(\core\common\Entity::L_OK, "mailer settings appear to be working, check " . \config\Master::APPEARANCE['abuse-mail'] . " mailbox if the message was receiced."); |
|
| 944 | + $this->storeTestResult(\core\common\Entity::L_OK, "mailer settings appear to be working, check ".\config\Master::APPEARANCE['abuse-mail']." mailbox if the message was receiced."); |
|
| 945 | 945 | } else { |
| 946 | 946 | $this->storeTestResult(\core\common\Entity::L_ERROR, "mailer settings failed, check the Config::MAILSETTINGS"); |
| 947 | 947 | } |
@@ -211,7 +211,7 @@ discard block |
||
| 211 | 211 | $node->appendChild($childNode); |
| 212 | 212 | } |
| 213 | 213 | if (!empty($namespace)) { |
| 214 | - $ns = $domElement->createAttributeNS(null,'xmlns'); |
|
| 214 | + $ns = $domElement->createAttributeNS(null, 'xmlns'); |
|
| 215 | 215 | $ns->value = $namespace; |
| 216 | 216 | $childNode->appendChild($ns); |
| 217 | 217 | } |
@@ -238,7 +238,7 @@ discard block |
||
| 238 | 238 | $nextChild = $domElement->createElement($nameC, $cl); |
| 239 | 239 | $childNode->appendChild($nextChild); |
| 240 | 240 | if (!empty($namespaceC)) { |
| 241 | - $ns = $domElement->createAttributeNS(null,'xmlns'); |
|
| 241 | + $ns = $domElement->createAttributeNS(null, 'xmlns'); |
|
| 242 | 242 | $ns->value = $namespaceC; |
| 243 | 243 | $nextChild->appendChild($ns); |
| 244 | 244 | } |
@@ -260,7 +260,7 @@ discard block |
||
| 260 | 260 | $childNode->appendChild($nextChild); |
| 261 | 261 | } |
| 262 | 262 | if (!empty($namespaceC)) { |
| 263 | - $ns = $domElement->createAttributeNS(null,'xmlns'); |
|
| 263 | + $ns = $domElement->createAttributeNS(null, 'xmlns'); |
|
| 264 | 264 | $ns->value = $namespaceC; |
| 265 | 265 | $nextChild->appendChild($ns); |
| 266 | 266 | } |
@@ -90,7 +90,7 @@ discard block |
||
| 90 | 90 | ], |
| 91 | 91 | 'condition' => TRUE], |
| 92 | 92 | 'OpenRoaming® (%REALM%)' => [ |
| 93 | - 'ssid' => [], /* OpenRoaming has left SSIDs behind */ |
|
| 93 | + 'ssid' => [], /* OpenRoaming has left SSIDs behind */ |
|
| 94 | 94 | 'oi' => [ |
| 95 | 95 | '5A03BA0000', /* OpenRoaming/AllIdentities/SettlementFree/NoPersonalData/BaselineQoS */ |
| 96 | 96 | '5A03BA0800', /* OpenRoaming/EduIdentities/SettlementFree/NoPersonalData/BaselineQoS */ |
@@ -155,7 +155,7 @@ discard block |
||
| 155 | 155 | 'makensis' => 'makensis', |
| 156 | 156 | 'zip' => 'zip', |
| 157 | 157 | 'trust-store-mozilla' => '/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem', |
| 158 | - 'trust-store-custom' => __DIR__ . "/known-roots.pem", |
|
| 158 | + 'trust-store-custom' => __DIR__."/known-roots.pem", |
|
| 159 | 159 | ]; |
| 160 | 160 | |
| 161 | 161 | /** |
@@ -193,13 +193,13 @@ discard block |
||
| 193 | 193 | 'db' => 'radacct', |
| 194 | 194 | 'user' => 'someuser', |
| 195 | 195 | 'pass' => 'somepass', |
| 196 | - 'readonly' => TRUE,], |
|
| 196 | + 'readonly' => TRUE, ], |
|
| 197 | 197 | 'RADIUS_2' => [ |
| 198 | 198 | 'host' => 'auth-2.hosted.eduroam.org', |
| 199 | 199 | 'db' => 'radacct', |
| 200 | 200 | 'user' => 'someuser', |
| 201 | 201 | 'pass' => 'somepass', |
| 202 | - 'readonly' => TRUE,], |
|
| 202 | + 'readonly' => TRUE, ], |
|
| 203 | 203 | ]; |
| 204 | 204 | |
| 205 | 205 | /** |
@@ -51,7 +51,7 @@ discard block |
||
| 51 | 51 | $installerPath = $this->installerBasename.".sh"; |
| 52 | 52 | $this->copyFile("eduroam_linux_main.sh", $installerPath); |
| 53 | 53 | |
| 54 | - if ( !file_exists($installerPath) ) { |
|
| 54 | + if (!file_exists($installerPath)) { |
|
| 55 | 55 | throw new Exception('File not found.'); |
| 56 | 56 | } |
| 57 | 57 | |
@@ -68,7 +68,7 @@ discard block |
||
| 68 | 68 | fwrite($installer, 'printf -v INIT_CONFIRMATION "$INIT_CONFIRMATION_TMP" "$ORGANISATION"'."\n\n"); |
| 69 | 69 | fwrite($installer, 'main "$@"; exit'."\n"); |
| 70 | 70 | } catch (Exception $e) { |
| 71 | - echo 'Error message: ' .$e->getMessage(); |
|
| 71 | + echo 'Error message: '.$e->getMessage(); |
|
| 72 | 72 | } finally { |
| 73 | 73 | fclose($installer); |
| 74 | 74 | return($installerPath); |
@@ -204,11 +204,11 @@ discard block |
||
| 204 | 204 | $config['USER_REALM'] = $this->attributes['internal:realm'][0]; |
| 205 | 205 | } |
| 206 | 206 | |
| 207 | - if(!empty($this->attributes['internal:hint_userinput_suffix'][0]) && $this->attributes['internal:hint_userinput_suffix'][0] == 1) { |
|
| 207 | + if (!empty($this->attributes['internal:hint_userinput_suffix'][0]) && $this->attributes['internal:hint_userinput_suffix'][0] == 1) { |
|
| 208 | 208 | $configRaw['HINT_USER_INPUT'] = true; |
| 209 | 209 | } |
| 210 | 210 | |
| 211 | - if(!empty($this->attributes['internal:verify_userinput_suffix'][0]) && $this->attributes['internal:verify_userinput_suffix'][0] == 1) { |
|
| 211 | + if (!empty($this->attributes['internal:verify_userinput_suffix'][0]) && $this->attributes['internal:verify_userinput_suffix'][0] == 1) { |
|
| 212 | 212 | $configRaw['VERIFY_USER_REALM_INPUT'] = true; |
| 213 | 213 | } else { |
| 214 | 214 | $configRaw['VERIFY_USER_REALM_INPUT'] = false; |
@@ -219,7 +219,7 @@ discard block |
||
| 219 | 219 | } |
| 220 | 220 | |
| 221 | 221 | foreach ($configRaw as $name => $value) { |
| 222 | - fwrite($file, $name ."=". $value."\n"); |
|
| 222 | + fwrite($file, $name."=".$value."\n"); |
|
| 223 | 223 | } |
| 224 | 224 | |
| 225 | 225 | if ($tou === '') { |
@@ -283,7 +283,7 @@ discard block |
||
| 283 | 283 | } |
| 284 | 284 | $out .= "'DNS:$oneServer'"; |
| 285 | 285 | } |
| 286 | - return "(".$out. ")"; |
|
| 286 | + return "(".$out.")"; |
|
| 287 | 287 | } |
| 288 | 288 | |
| 289 | 289 | /** |
@@ -323,7 +323,7 @@ discard block |
||
| 323 | 323 | * |
| 324 | 324 | * @return string |
| 325 | 325 | */ |
| 326 | - private function mkCAfile(){ |
|
| 326 | + private function mkCAfile() { |
|
| 327 | 327 | $out = ''; |
| 328 | 328 | $cAlist = $this->attributes['internal:CAs'][0]; |
| 329 | 329 | foreach ($cAlist as $oneCa) { |
@@ -339,7 +339,7 @@ discard block |
||
| 339 | 339 | */ |
| 340 | 340 | private function mkIntro() { |
| 341 | 341 | \core\common\Entity::intoThePotatoes(); |
| 342 | - $out = _("This installer has been prepared for %s").'\n\n'._("More information and comments:").'\n\nE-Mail: %s\nWWW: %s\n\n' . |
|
| 342 | + $out = _("This installer has been prepared for %s").'\n\n'._("More information and comments:").'\n\nE-Mail: %s\nWWW: %s\n\n'. |
|
| 343 | 343 | _("Installer created with software from the GEANT project."); |
| 344 | 344 | \core\common\Entity::outOfThePotatoes(); |
| 345 | 345 | return $out; |
@@ -60,7 +60,7 @@ discard block |
||
| 60 | 60 | public function writeInstaller() { |
| 61 | 61 | $installerPath = $this->installerBasename.".py"; |
| 62 | 62 | $this->copyFile("main.py", $installerPath); |
| 63 | - $installer = fopen($installerPath,"a"); |
|
| 63 | + $installer = fopen($installerPath, "a"); |
|
| 64 | 64 | if ($installer === FALSE) { |
| 65 | 65 | throw new Exception("Unable to open installer file for writing!"); |
| 66 | 66 | } |
@@ -202,11 +202,11 @@ discard block |
||
| 202 | 202 | $config['user_realm'] = $this->attributes['internal:realm'][0]; |
| 203 | 203 | } |
| 204 | 204 | |
| 205 | - if(!empty($this->attributes['internal:hint_userinput_suffix'][0]) && $this->attributes['internal:hint_userinput_suffix'][0] == 1) { |
|
| 205 | + if (!empty($this->attributes['internal:hint_userinput_suffix'][0]) && $this->attributes['internal:hint_userinput_suffix'][0] == 1) { |
|
| 206 | 206 | $configRaw['hint_user_input'] = "True"; |
| 207 | 207 | } |
| 208 | 208 | |
| 209 | - if(!empty($this->attributes['internal:verify_userinput_suffix'][0]) && $this->attributes['internal:verify_userinput_suffix'][0] == 1) { |
|
| 209 | + if (!empty($this->attributes['internal:verify_userinput_suffix'][0]) && $this->attributes['internal:verify_userinput_suffix'][0] == 1) { |
|
| 210 | 210 | $configRaw['verify_user_realm_input'] = "True"; |
| 211 | 211 | } |
| 212 | 212 | |
@@ -279,7 +279,7 @@ discard block |
||
| 279 | 279 | } |
| 280 | 280 | $out .= "'DNS:$oneServer'"; |
| 281 | 281 | } |
| 282 | - return "[".$out. "]"; |
|
| 282 | + return "[".$out."]"; |
|
| 283 | 283 | } |
| 284 | 284 | |
| 285 | 285 | /** |
@@ -319,7 +319,7 @@ discard block |
||
| 319 | 319 | * |
| 320 | 320 | * @return string |
| 321 | 321 | */ |
| 322 | - private function mkCAfile(){ |
|
| 322 | + private function mkCAfile() { |
|
| 323 | 323 | $out = ''; |
| 324 | 324 | $cAlist = $this->attributes['internal:CAs'][0]; |
| 325 | 325 | foreach ($cAlist as $oneCa) { |
@@ -335,7 +335,7 @@ discard block |
||
| 335 | 335 | */ |
| 336 | 336 | private function mkIntro() { |
| 337 | 337 | \core\common\Entity::intoThePotatoes(); |
| 338 | - $out = _("This installer has been prepared for {0}").'\n\n'._("More information and comments:").'\n\nEMAIL: {1}\nWWW: {2}\n\n' . |
|
| 338 | + $out = _("This installer has been prepared for {0}").'\n\n'._("More information and comments:").'\n\nEMAIL: {1}\nWWW: {2}\n\n'. |
|
| 339 | 339 | _("Installer created with software from the GEANT project."); |
| 340 | 340 | \core\common\Entity::outOfThePotatoes(); |
| 341 | 341 | return $out; |
@@ -145,7 +145,7 @@ discard block |
||
| 145 | 145 | \core\common\Entity::intoThePotatoes(); |
| 146 | 146 | // that's what all variants support. Sub-classes can change it. |
| 147 | 147 | $this->setSupportedEapMethods([\core\common\EAP::EAPTYPE_PEAP_MSCHAP2, \core\common\EAP::EAPTYPE_TTLS_PAP, \core\common\EAP::EAPTYPE_TTLS_MSCHAP2, \core\common\EAP::EAPTYPE_SILVERBULLET]); |
| 148 | - foreach(\core\common\EAP::listKnownEAPTypes() as $eapType) { |
|
| 148 | + foreach (\core\common\EAP::listKnownEAPTypes() as $eapType) { |
|
| 149 | 149 | if ($eapType->isPasswordRequired() || $eapType->isPasswordOptional()) { |
| 150 | 150 | $this->specialities['internal:verify_userinput_suffix'][serialize($eapType->getArrayRep())] = _("It is not possible to actively verify the user input for suffix match; but if there is no 'Terms of Use' configured, the installer will display a corresponding hint to the user instead."); |
| 151 | 151 | $this->specialities['media:openroaming'][serialize($eapType->getArrayRep())] = _("OpenRoaming is not provisioned due to severe UI limitations during install time."); |
@@ -185,15 +185,15 @@ discard block |
||
| 185 | 185 | <key>PayloadDescription</key> |
| 186 | 186 | <string>$tagline</string> |
| 187 | 187 | <key>PayloadDisplayName</key> |
| 188 | - <string>" . \config\ConfAssistant::CONSORTIUM['display_name'] . "</string> |
|
| 188 | + <string>".\config\ConfAssistant::CONSORTIUM['display_name']."</string> |
|
| 189 | 189 | <key>PayloadIdentifier</key> |
| 190 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang</string> |
|
| 190 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang</string> |
|
| 191 | 191 | <key>PayloadOrganization</key> |
| 192 | - <string>" . htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['general:instname'][0]), ENT_XML1, 'UTF-8') . ( $this->attributes['internal:profile_count'][0] > 1 ? " (" . htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['profile:name'][0]), ENT_XML1, 'UTF-8') . ")" : "") . "</string> |
|
| 192 | + <string>".htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['general:instname'][0]), ENT_XML1, 'UTF-8').($this->attributes['internal:profile_count'][0] > 1 ? " (".htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['profile:name'][0]), ENT_XML1, 'UTF-8').")" : "")."</string> |
|
| 193 | 193 | <key>PayloadType</key> |
| 194 | 194 | <string>Configuration</string> |
| 195 | 195 | <key>PayloadUUID</key> |
| 196 | - <string>" . \core\common\Entity::uuid('', self::IPHONE_PAYLOAD_PREFIX . $this->massagedConsortium . $this->massagedCountry . $this->massagedInst . $this->massagedProfile) . "</string> |
|
| 196 | + <string>" . \core\common\Entity::uuid('', self::IPHONE_PAYLOAD_PREFIX.$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile)."</string> |
|
| 197 | 197 | <key>PayloadVersion</key> |
| 198 | 198 | <integer>1</integer>"; |
| 199 | 199 | \core\common\Entity::outOfThePotatoes(); |
@@ -225,21 +225,21 @@ discard block |
||
| 225 | 225 | { |
| 226 | 226 | \core\common\Entity::intoThePotatoes(); |
| 227 | 227 | if (isset($this->attributes['support:info_file'])) { |
| 228 | - return MobileconfigSuperclass::BUFFER_CONSENT_PRE . htmlspecialchars(iconv("UTF-8", "UTF-8//TRANSLIT", $this->attributes['support:info_file'][0]), ENT_XML1, 'UTF-8') . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
| 228 | + return MobileconfigSuperclass::BUFFER_CONSENT_PRE.htmlspecialchars(iconv("UTF-8", "UTF-8//TRANSLIT", $this->attributes['support:info_file'][0]), ENT_XML1, 'UTF-8').MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
| 229 | 229 | } |
| 230 | 230 | if ($this->attributes['internal:verify_userinput_suffix'][0] != 0) { |
| 231 | 231 | if ($this->attributes['internal:hint_userinput_suffix'][0] != 0) { |
| 232 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . sprintf(_("Important Notice: your username MUST end exactly with '...@%s' !"), $this->attributes['internal:realm'][0]) . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
| 232 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE.sprintf(_("Important Notice: your username MUST end exactly with '...@%s' !"), $this->attributes['internal:realm'][0]).MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
| 233 | 233 | \core\common\Entity::outOfThePotatoes(); |
| 234 | 234 | return $retval; |
| 235 | 235 | } else { |
| 236 | 236 | if (strlen($this->attributes['internal:realm'][0]) > 0) { |
| 237 | 237 | /// note space between variable and exclamation mark - makes sure users don't mistakenly think the exclamation mark is part of the required username! |
| 238 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . sprintf(_("Important Notice: your username MUST contain an '@' and end with ...%s !"), $this->attributes['internal:realm'][0]) . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
| 238 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE.sprintf(_("Important Notice: your username MUST contain an '@' and end with ...%s !"), $this->attributes['internal:realm'][0]).MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
| 239 | 239 | \core\common\Entity::outOfThePotatoes(); |
| 240 | 240 | return $retval; |
| 241 | 241 | } |
| 242 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . _("Important Notice: your username MUST be in the form of xxx@yyy where the yyy is a common suffix identifying your Identity Provider. Please find out what to use there and enter the username in the correct format.") . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
| 242 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE._("Important Notice: your username MUST be in the form of xxx@yyy where the yyy is a common suffix identifying your Identity Provider. Please find out what to use there and enter the username in the correct format.").MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
| 243 | 243 | \core\common\Entity::outOfThePotatoes(); |
| 244 | 244 | return $retval; |
| 245 | 245 | } |
@@ -263,7 +263,7 @@ discard block |
||
| 263 | 263 | // also escape htmlspecialchars |
| 264 | 264 | // not all names and profiles have a name, so be prepared |
| 265 | 265 | |
| 266 | - $this->loggerInstance->debug(5, "List of available attributes: " . var_export($this->attributes, TRUE)); |
|
| 266 | + $this->loggerInstance->debug(5, "List of available attributes: ".var_export($this->attributes, TRUE)); |
|
| 267 | 267 | |
| 268 | 268 | $this->instName = $this->attributes['general:instname'][0] ?? _("Unnamed Organisation"); |
| 269 | 269 | $this->profileName = $this->attributes['profile:name'][0] ?? _("Unnamed Profile"); |
@@ -305,7 +305,7 @@ discard block |
||
| 305 | 305 | |
| 306 | 306 | file_put_contents('installer_profile', $outputXml); |
| 307 | 307 | |
| 308 | - $fileName = $this->installerBasename . '.mobileconfig'; |
|
| 308 | + $fileName = $this->installerBasename.'.mobileconfig'; |
|
| 309 | 309 | |
| 310 | 310 | if (!$this->sign) { |
| 311 | 311 | rename("installer_profile", $fileName); |
@@ -313,7 +313,7 @@ discard block |
||
| 313 | 313 | return $fileName; |
| 314 | 314 | } |
| 315 | 315 | // still here? Then we are signing. |
| 316 | - $signing = system($this->sign . " installer_profile '$fileName' > /dev/null"); |
|
| 316 | + $signing = system($this->sign." installer_profile '$fileName' > /dev/null"); |
|
| 317 | 317 | if ($signing === FALSE) { |
| 318 | 318 | $this->loggerInstance->debug(2, "Signing the mobileconfig installer $fileName FAILED!\n"); |
| 319 | 319 | } |
@@ -337,19 +337,19 @@ discard block |
||
| 337 | 337 | $oiCount = $oiCount + count($netDetail['oi']); |
| 338 | 338 | } |
| 339 | 339 | $certCount = count($this->attributes['internal:CAs'][0]); |
| 340 | - $out = "<p>" . _("For best results, please use the built-in browser (Safari) to open the configuration file.") . "</p>"; |
|
| 340 | + $out = "<p>"._("For best results, please use the built-in browser (Safari) to open the configuration file.")."</p>"; |
|
| 341 | 341 | $out .= "<p>"; |
| 342 | 342 | $out .= _("The profile will install itself after you click (or tap) the button. You will be asked for confirmation/input at several points:"); |
| 343 | 343 | $out .= "<ul>"; |
| 344 | - $out .= "<li>" . _("to install the profile") . "</li>"; |
|
| 345 | - $out .= "<li>" . ngettext("to accept the server certificate authority", "to accept the server certificate authorities", $certCount); |
|
| 344 | + $out .= "<li>"._("to install the profile")."</li>"; |
|
| 345 | + $out .= "<li>".ngettext("to accept the server certificate authority", "to accept the server certificate authorities", $certCount); |
|
| 346 | 346 | if ($certCount > 1) { |
| 347 | - $out .= " " . sprintf(_("(%d times)"), $certCount); |
|
| 347 | + $out .= " ".sprintf(_("(%d times)"), $certCount); |
|
| 348 | 348 | } |
| 349 | 349 | $out .= "</li>"; |
| 350 | - $out .= "<li>" . _("to enter the username and password you have been given by your organisation"); |
|
| 350 | + $out .= "<li>"._("to enter the username and password you have been given by your organisation"); |
|
| 351 | 351 | if ($ssidCount > 1) { |
| 352 | - $out .= " " . sprintf(_("(%d times each, because %d SSIDs and %d Passpoint networks are installed)"), $ssidCount+$oiCount, $ssidCount, $oiCount); |
|
| 352 | + $out .= " ".sprintf(_("(%d times each, because %d SSIDs and %d Passpoint networks are installed)"), $ssidCount + $oiCount, $ssidCount, $oiCount); |
|
| 353 | 353 | } |
| 354 | 354 | $out .= "</li>"; |
| 355 | 355 | $out .= "</ul>"; |
@@ -389,7 +389,7 @@ discard block |
||
| 389 | 389 | <key>ServiceProviderRoamingEnabled</key> |
| 390 | 390 | <true/> |
| 391 | 391 | <key>DisplayedOperatorName</key> |
| 392 | - <string>" . $oiName . "</string>"; |
|
| 392 | + <string>" . $oiName."</string>"; |
|
| 393 | 393 | // if we don't know the realm, omit the entire DomainName key |
| 394 | 394 | if (isset($this->attributes['internal:realm'])) { |
| 395 | 395 | $retval .= "<key>DomainName</key> |
@@ -402,7 +402,7 @@ discard block |
||
| 402 | 402 | <array>"; |
| 403 | 403 | |
| 404 | 404 | foreach ($consortiumOi as $oneCons) { |
| 405 | - $retval .= "<string>" . strtoupper($oneCons) . "</string>"; |
|
| 405 | + $retval .= "<string>".strtoupper($oneCons)."</string>"; |
|
| 406 | 406 | } |
| 407 | 407 | |
| 408 | 408 | $retval .= "</array>"; |
@@ -440,7 +440,7 @@ discard block |
||
| 440 | 440 | <dict> |
| 441 | 441 | <key>AcceptEAPTypes</key> |
| 442 | 442 | <array> |
| 443 | - <integer>" . $eapType['OUTER'] . "</integer> |
|
| 443 | + <integer>" . $eapType['OUTER']."</integer> |
|
| 444 | 444 | </array> |
| 445 | 445 | <key>EAPFASTProvisionPAC</key> |
| 446 | 446 | <true /> |
@@ -453,7 +453,7 @@ discard block |
||
| 453 | 453 | "; |
| 454 | 454 | if ($realm !== NULL) { |
| 455 | 455 | $retval .= "<key>OuterIdentity</key> |
| 456 | - <string>" . htmlspecialchars($realm, ENT_XML1, 'UTF-8') . "</string> |
|
| 456 | + <string>" . htmlspecialchars($realm, ENT_XML1, 'UTF-8')."</string> |
|
| 457 | 457 | "; |
| 458 | 458 | } |
| 459 | 459 | $retval .= "<key>PayloadCertificateAnchorUUID</key> |
@@ -477,11 +477,11 @@ discard block |
||
| 477 | 477 | $retval .= " |
| 478 | 478 | </array>"; |
| 479 | 479 | if ($eapType['INNER'] == \core\common\EAP::NE_SILVERBULLET) { |
| 480 | - $retval .= "<key>UserName</key><string>" . $this->clientCert["certObject"]->username . "</string>"; |
|
| 480 | + $retval .= "<key>UserName</key><string>".$this->clientCert["certObject"]->username."</string>"; |
|
| 481 | 481 | } |
| 482 | 482 | $retval .= " |
| 483 | 483 | <key>TTLSInnerAuthentication</key> |
| 484 | - <string>" . ($eapType['INNER'] == \core\common\EAP::NE_PAP ? "PAP" : "MSCHAPv2") . "</string> |
|
| 484 | + <string>" . ($eapType['INNER'] == \core\common\EAP::NE_PAP ? "PAP" : "MSCHAPv2")."</string> |
|
| 485 | 485 | </dict>"; |
| 486 | 486 | return $retval; |
| 487 | 487 | } |
@@ -501,9 +501,9 @@ discard block |
||
| 501 | 501 | // characters are still reversed, invert on use! |
| 502 | 502 | $buffer .= "<string>Manual</string> |
| 503 | 503 | <key>ProxyServer</key> |
| 504 | - <string>" . strrev($serverAndPort[1]) . "</string> |
|
| 504 | + <string>" . strrev($serverAndPort[1])."</string> |
|
| 505 | 505 | <key>ProxyServerPort</key> |
| 506 | - <integer>" . strrev($serverAndPort[0]) . "</integer> |
|
| 506 | + <integer>" . strrev($serverAndPort[0])."</integer> |
|
| 507 | 507 | <key>ProxyPACFallbackAllowed</key> |
| 508 | 508 | <false/>"; |
| 509 | 509 | } else { |
@@ -553,7 +553,7 @@ discard block |
||
| 553 | 553 | throw new Exception("SSID must be a string!"); |
| 554 | 554 | } |
| 555 | 555 | $escapedSSID = htmlspecialchars($toBeConfigured, ENT_XML1, 'UTF-8'); |
| 556 | - $payloadIdentifier = "wifi." . $this->serial; |
|
| 556 | + $payloadIdentifier = "wifi.".$this->serial; |
|
| 557 | 557 | $payloadShortName = sprintf(_("%s - SSID %s"), $prettyName, $escapedSSID); |
| 558 | 558 | $payloadName = sprintf(_("%s configuration for network name %s"), $prettyName, $escapedSSID); |
| 559 | 559 | $encryptionTypeString = $this->encryptionString(); |
@@ -583,9 +583,9 @@ discard block |
||
| 583 | 583 | if (count($toBeConfigured) == 0) { |
| 584 | 584 | return ""; |
| 585 | 585 | } |
| 586 | - $payloadIdentifier = "hs20.".implode('-',$toBeConfigured); |
|
| 586 | + $payloadIdentifier = "hs20.".implode('-', $toBeConfigured); |
|
| 587 | 587 | $payloadShortName = sprintf(_("%s - RCOI"), $prettyName); |
| 588 | - $payloadName = sprintf(_("%s configuration (Passpoint RCOI)"),$prettyName); |
|
| 588 | + $payloadName = sprintf(_("%s configuration (Passpoint RCOI)"), $prettyName); |
|
| 589 | 589 | $encryptionTypeString = $this->encryptionString(); |
| 590 | 590 | $setupModesString = ""; |
| 591 | 591 | $wifiNetworkIdentification = $this->passPointBlock($toBeConfigured, $prettyName); |
@@ -604,11 +604,11 @@ discard block |
||
| 604 | 604 | <key>PayloadDisplayName</key> |
| 605 | 605 | <string>$payloadShortName</string> |
| 606 | 606 | <key>PayloadIdentifier</key> |
| 607 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.$payloadIdentifier</string> |
|
| 607 | + <string>".self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.$payloadIdentifier</string> |
|
| 608 | 608 | <key>PayloadOrganization</key> |
| 609 | - <string>" . $this->massagedConsortium . ".1x-config.org</string> |
|
| 609 | + <string>".$this->massagedConsortium.".1x-config.org</string> |
|
| 610 | 610 | <key>PayloadType</key> |
| 611 | - <string>com.apple." . ($blocktype == MobileconfigSuperclass::NETWORK_BLOCK_TYPE_WIRED ? "firstactiveethernet" : "wifi") . ".managed</string>"; |
|
| 611 | + <string>com.apple." . ($blocktype == MobileconfigSuperclass::NETWORK_BLOCK_TYPE_WIRED ? "firstactiveethernet" : "wifi").".managed</string>"; |
|
| 612 | 612 | $retval .= $this->proxySettings(); |
| 613 | 613 | $retval .= $setupModesString; |
| 614 | 614 | if ($eapType['INNER'] == \core\common\EAP::NE_SILVERBULLET) { |
@@ -620,7 +620,7 @@ discard block |
||
| 620 | 620 | } |
| 621 | 621 | $retval .= " |
| 622 | 622 | <key>PayloadUUID</key> |
| 623 | - <string>" . \core\common\Entity::uuid() . "</string> |
|
| 623 | + <string>" . \core\common\Entity::uuid()."</string> |
|
| 624 | 624 | <key>PayloadVersion</key> |
| 625 | 625 | <integer>1</integer> |
| 626 | 626 | $wifiNetworkIdentification</dict>"; |
@@ -650,15 +650,15 @@ discard block |
||
| 650 | 650 | <key>IsHotspot</key> |
| 651 | 651 | <false/> |
| 652 | 652 | <key>PayloadDescription</key> |
| 653 | - <string>" . sprintf(_("This SSID should not be used after bootstrapping %s"), \config\ConfAssistant::CONSORTIUM['display_name']) . "</string> |
|
| 653 | + <string>" . sprintf(_("This SSID should not be used after bootstrapping %s"), \config\ConfAssistant::CONSORTIUM['display_name'])."</string> |
|
| 654 | 654 | <key>PayloadDisplayName</key> |
| 655 | - <string>" . _("Disabled WiFi network") . "</string> |
|
| 655 | + <string>" . _("Disabled WiFi network")."</string> |
|
| 656 | 656 | <key>PayloadIdentifier</key> |
| 657 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.wifi.disabled.$this->removeSerial</string> |
|
| 657 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.wifi.disabled.$this->removeSerial</string> |
|
| 658 | 658 | <key>PayloadType</key> |
| 659 | 659 | <string>com.apple.wifi.managed</string> |
| 660 | 660 | <key>PayloadUUID</key> |
| 661 | - <string>" . \core\common\Entity::uuid() . "</string> |
|
| 661 | + <string>".\core\common\Entity::uuid()."</string> |
|
| 662 | 662 | <key>PayloadVersion</key> |
| 663 | 663 | <real>1</real>"; |
| 664 | 664 | $retval .= $this->proxySettings(); |
@@ -738,12 +738,12 @@ discard block |
||
| 738 | 738 | $mimeBlob = base64_encode($binaryBlob); |
| 739 | 739 | $mimeFormatted = chunk_split($mimeBlob, 52, "\r\n"); |
| 740 | 740 | $payloadUUID = \core\common\Entity::uuid('', $mimeBlob); |
| 741 | - $retArray = ["block" => "<dict>" . |
|
| 741 | + $retArray = ["block" => "<dict>". |
|
| 742 | 742 | // we don't include the import password. It's displayed on screen, and should be input by the user. |
| 743 | 743 | // <key>Password</key> |
| 744 | 744 | // <string>" . $this->clientCert['password'] . "</string> |
| 745 | 745 | "<key>PayloadCertificateFileName</key> |
| 746 | - <string>" . $this->massagedConsortium . ".pfx</string> |
|
| 746 | + <string>" . $this->massagedConsortium.".pfx</string> |
|
| 747 | 747 | <key>PayloadContent</key> |
| 748 | 748 | <data> |
| 749 | 749 | $mimeFormatted |
@@ -751,7 +751,7 @@ discard block |
||
| 751 | 751 | <key>PayloadDescription</key> |
| 752 | 752 | <string>MIME Base-64 encoded PKCS#12 Client Certificate</string> |
| 753 | 753 | <key>PayloadDisplayName</key> |
| 754 | - <string>" . _("User certificate") . "</string> |
|
| 754 | + <string>"._("User certificate")."</string> |
|
| 755 | 755 | <key>PayloadIdentifier</key> |
| 756 | 756 | <string>com.apple.security.pkcs12.$payloadUUID</string> |
| 757 | 757 | <key>PayloadType</key> |
@@ -761,7 +761,7 @@ discard block |
||
| 761 | 761 | <key>PayloadVersion</key> |
| 762 | 762 | <integer>1</integer> |
| 763 | 763 | </dict>", |
| 764 | - "UUID" => $payloadUUID,]; |
|
| 764 | + "UUID" => $payloadUUID, ]; |
|
| 765 | 765 | \core\common\Entity::outOfThePotatoes(); |
| 766 | 766 | return $retArray; |
| 767 | 767 | } |
@@ -779,7 +779,7 @@ discard block |
||
| 779 | 779 | } |
| 780 | 780 | $expiryTime = new \DateTime($this->clientCert['certObject']->expiry); |
| 781 | 781 | return "<key>RemovalDate</key> |
| 782 | - <date>" . $expiryTime->format("Y-m-d") . "T" . $expiryTime->format("H:i:s") . "Z</date>"; |
|
| 782 | + <date>" . $expiryTime->format("Y-m-d")."T".$expiryTime->format("H:i:s")."Z</date>"; |
|
| 783 | 783 | } |
| 784 | 784 | |
| 785 | 785 | /** |
@@ -801,27 +801,27 @@ discard block |
||
| 801 | 801 | $stream = " |
| 802 | 802 | <dict> |
| 803 | 803 | <key>PayloadCertificateFileName</key> |
| 804 | - <string>" . $ca['uuid'] . ".der</string> |
|
| 804 | + <string>" . $ca['uuid'].".der</string> |
|
| 805 | 805 | <key>PayloadContent</key> |
| 806 | 806 | <data> |
| 807 | -" . $trimmedPem . "</data> |
|
| 807 | +" . $trimmedPem."</data> |
|
| 808 | 808 | <key>PayloadDescription</key> |
| 809 | - <string>" . sprintf(_("The %s Certification Authority"), \core\common\Entity::$nomenclature_idp) . "</string> |
|
| 809 | + <string>" . sprintf(_("The %s Certification Authority"), \core\common\Entity::$nomenclature_idp)."</string> |
|
| 810 | 810 | <key>PayloadDisplayName</key> |
| 811 | 811 | <string>" . |
| 812 | 812 | /// example: "Identity Provider CA #1 (Root)" |
| 813 | - sprintf(_("%s CA #%d (%s)" ), |
|
| 813 | + sprintf(_("%s CA #%d (%s)"), |
|
| 814 | 814 | \core\common\Entity::$nomenclature_idp, |
| 815 | - count($this->CAsAccountedFor)+1, |
|
| 816 | - ($ca['root'] ? _("Root") : _("Intermediate"))) . |
|
| 815 | + count($this->CAsAccountedFor) + 1, |
|
| 816 | + ($ca['root'] ? _("Root") : _("Intermediate"))). |
|
| 817 | 817 | "</string> |
| 818 | 818 | <key>PayloadIdentifier</key> |
| 819 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
|
| 819 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
|
| 820 | 820 | <key>PayloadOrganization</key> |
| 821 | - <string>" . $this->massagedConsortium . ".1x-config.org</string> |
|
| 821 | + <string>".$this->massagedConsortium.".1x-config.org</string> |
|
| 822 | 822 | <key>PayloadType</key> |
| 823 | 823 | <string>com.apple.security.root</string> |
| 824 | - <key>PayloadUUID</key><string>" . $ca['uuid'] . "</string> |
|
| 824 | + <key>PayloadUUID</key><string>" . $ca['uuid']."</string> |
|
| 825 | 825 | <key>PayloadVersion</key> |
| 826 | 826 | <integer>1</integer> |
| 827 | 827 | </dict>"; |
@@ -143,7 +143,7 @@ discard block |
||
| 143 | 143 | $dom = new \DOMDocument('1.0', 'utf-8'); |
| 144 | 144 | $root = $dom->createElement($rootname); |
| 145 | 145 | $dom->appendChild($root); |
| 146 | - $ns = $dom->createAttributeNS( 'http://www.w3.org/2001/XMLSchema-instance', 'xsi:noNamespaceSchemaLocation' ); |
|
| 146 | + $ns = $dom->createAttributeNS('http://www.w3.org/2001/XMLSchema-instance', 'xsi:noNamespaceSchemaLocation'); |
|
| 147 | 147 | $ns->value = "eap-metadata.xsd"; |
| 148 | 148 | $root->appendChild($ns); |
| 149 | 149 | |
@@ -193,7 +193,7 @@ discard block |
||
| 193 | 193 | $authMethods = new \core\DeviceXMLmain(); |
| 194 | 194 | $authMethods->setChild('AuthenticationMethod', $this->authMethodsList); |
| 195 | 195 | $eapIdp->setChild('AuthenticationMethods', $authMethods); |
| 196 | - $eapIdp->setChild('CredentialApplicability', $this->getCredentialApplicability($ssids,$oids)); |
|
| 196 | + $eapIdp->setChild('CredentialApplicability', $this->getCredentialApplicability($ssids, $oids)); |
|
| 197 | 197 | // TODO $eap_idp->setChild('ValidUntil',$this->getValidUntil()); |
| 198 | 198 | $eapIdp->setChild('ProviderInfo', $this->providerInfo); |
| 199 | 199 | // TODO $eap_idp->setChild('VendorSpecific',$this->getVendorSpecific()); |
@@ -20,7 +20,7 @@ |
||
| 20 | 20 | */ |
| 21 | 21 | ?> |
| 22 | 22 | <?php |
| 23 | -require_once dirname(dirname(dirname(dirname(__FILE__)))) . "/config/_config.php"; |
|
| 23 | +require_once dirname(dirname(dirname(dirname(__FILE__))))."/config/_config.php"; |
|
| 24 | 24 | |
| 25 | 25 | $auth = new \web\lib\admin\Authentication(); |
| 26 | 26 | $languageInstance = new \core\common\Language(); |
@@ -26,7 +26,7 @@ discard block |
||
| 26 | 26 | */ |
| 27 | 27 | ?> |
| 28 | 28 | <?php |
| 29 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
| 29 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
| 30 | 30 | |
| 31 | 31 | function displaySilverbulletPropertyWidget(&$theProfile, $readonly, &$uiElements) { |
| 32 | 32 | ?> |
@@ -43,14 +43,14 @@ discard block |
||
| 43 | 43 | <ul style='margin:1px'> |
| 44 | 44 | <?php |
| 45 | 45 | foreach ($completeness as $missing_attrib) { |
| 46 | - echo "<li>" . $uiElements->displayName($missing_attrib) . "</li>"; |
|
| 46 | + echo "<li>".$uiElements->displayName($missing_attrib)."</li>"; |
|
| 47 | 47 | } |
| 48 | 48 | ?> |
| 49 | 49 | </ul> |
| 50 | 50 | </div> |
| 51 | 51 | <?php |
| 52 | 52 | } else { |
| 53 | - echo sprintf(_("You can create up to %d users."), $maxusers[0]['value']) . "<br/>" . sprintf(_("Their credentials will carry the name <strong>%s</strong>."), $theProfile->realm); |
|
| 53 | + echo sprintf(_("You can create up to %d users."), $maxusers[0]['value'])."<br/>".sprintf(_("Their credentials will carry the name <strong>%s</strong>."), $theProfile->realm); |
|
| 54 | 54 | } |
| 55 | 55 | ?> |
| 56 | 56 | <br/> |
@@ -59,7 +59,7 @@ discard block |
||
| 59 | 59 | if ($readonly === FALSE) { |
| 60 | 60 | ?> |
| 61 | 61 | <form action='edit_silverbullet.php?inst_id=<?php echo $theProfile->institution; ?>&profile_id=<?php echo $theProfile->identifier; ?>' method='POST'> |
| 62 | - <button <?php echo ( is_array($completeness) ? "disabled" : "" ); ?> type='submit' name='sb_action' value='sb_edit'><?php echo _("Manage User Base"); ?></button> |
|
| 62 | + <button <?php echo (is_array($completeness) ? "disabled" : ""); ?> type='submit' name='sb_action' value='sb_edit'><?php echo _("Manage User Base"); ?></button> |
|
| 63 | 63 | </form> |
| 64 | 64 | <?php |
| 65 | 65 | } |
@@ -94,21 +94,21 @@ discard block |
||
| 94 | 94 | $has_overrides = TRUE; |
| 95 | 95 | } |
| 96 | 96 | } |
| 97 | - $buffer_eaptypediv = "<div style='margin-bottom:40px; float:left;'>" . _("<strong>EAP Types</strong> (in order of preference):") . "<br/>"; |
|
| 97 | + $buffer_eaptypediv = "<div style='margin-bottom:40px; float:left;'>"._("<strong>EAP Types</strong> (in order of preference):")."<br/>"; |
|
| 98 | 98 | $typelist = $theProfile->getEapMethodsinOrderOfPreference(); |
| 99 | 99 | $allcomplete = TRUE; |
| 100 | 100 | foreach ($typelist as $eaptype) { |
| 101 | 101 | $buffer_eaptypediv .= $eaptype->getPrintableRep(); |
| 102 | 102 | $completeness = $theProfile->isEapTypeDefinitionComplete($eaptype); |
| 103 | 103 | if ($completeness === true) { |
| 104 | - $buffer_eaptypediv .= " <div class='acceptable'>" . _("OK") . "</div>"; |
|
| 104 | + $buffer_eaptypediv .= " <div class='acceptable'>"._("OK")."</div>"; |
|
| 105 | 105 | } else { |
| 106 | 106 | $buffer_eaptypediv .= " <div class='notacceptable'>"; |
| 107 | 107 | $buffer_eaptypediv .= _("Information needed!"); |
| 108 | 108 | if (is_array($completeness)) { |
| 109 | 109 | $buffer_eaptypediv .= "<ul style='margin:1px'>"; |
| 110 | 110 | foreach ($completeness as $missing_attrib) { |
| 111 | - $buffer_eaptypediv .= "<li>" . $uiElements->displayName($missing_attrib) . "</li>"; |
|
| 111 | + $buffer_eaptypediv .= "<li>".$uiElements->displayName($missing_attrib)."</li>"; |
|
| 112 | 112 | } |
| 113 | 113 | $buffer_eaptypediv .= "</ul>"; |
| 114 | 114 | } |
@@ -120,7 +120,7 @@ discard block |
||
| 120 | 120 | foreach ($attribs as $attrib) { |
| 121 | 121 | if ($attrib['level'] == \core\Options::LEVEL_METHOD && !preg_match("/^internal:/", $attrib['name']) && !$justOnce) { |
| 122 | 122 | $justOnce = TRUE; |
| 123 | - $buffer_eaptypediv .= "<img src='../resources/images/icons/Letter-E-blue-icon.png' alt='" . _("Options on EAP Method/Device level are in effect.") . "'>"; |
|
| 123 | + $buffer_eaptypediv .= "<img src='../resources/images/icons/Letter-E-blue-icon.png' alt='"._("Options on EAP Method/Device level are in effect.")."'>"; |
|
| 124 | 124 | } |
| 125 | 125 | } |
| 126 | 126 | $buffer_eaptypediv .= "<br/>"; |
@@ -166,11 +166,11 @@ discard block |
||
| 166 | 166 | if (\config\Master::FUNCTIONALITY_LOCATIONS['DIAGNOSTICS'] == "LOCAL") { |
| 167 | 167 | $diagUrl = "../diag/"; |
| 168 | 168 | } else { |
| 169 | - $diagUrl = \config\Master::FUNCTIONALITY_LOCATIONS['DIAGNOSTICS'] . "/diag/"; |
|
| 169 | + $diagUrl = \config\Master::FUNCTIONALITY_LOCATIONS['DIAGNOSTICS']."/diag/"; |
|
| 170 | 170 | } |
| 171 | 171 | ?> |
| 172 | - <form action='<?php echo $diagUrl . "action_realmcheck.php?inst_id=" . $theProfile->institution . "&profile_id=" . $theProfile->identifier ?>' method='post' accept-charset='UTF-8'> |
|
| 173 | - <input type='hidden' name='comefrom' value='<?php echo htmlspecialchars($link . $_SERVER['SCRIPT_NAME']); ?>'/> |
|
| 172 | + <form action='<?php echo $diagUrl."action_realmcheck.php?inst_id=".$theProfile->institution."&profile_id=".$theProfile->identifier ?>' method='post' accept-charset='UTF-8'> |
|
| 173 | + <input type='hidden' name='comefrom' value='<?php echo htmlspecialchars($link.$_SERVER['SCRIPT_NAME']); ?>'/> |
|
| 174 | 174 | <button type='submit' name='profile_action' value='check' <?php echo ($has_realm ? "" : "disabled='disabled'"); ?> title='<?php echo _("The realm can only be checked if you configure the realm!"); ?>'> |
| 175 | 175 | <?php echo _("Check realm reachability"); ?> |
| 176 | 176 | </button> |
@@ -203,9 +203,9 @@ discard block |
||
| 203 | 203 | ?> |
| 204 | 204 | <div style='display: flex;'> |
| 205 | 205 | <?php |
| 206 | - $idpLevelUrl = $link . dirname(dirname($_SERVER['SCRIPT_NAME'])) . "?idp=" . $theProfile->institution; |
|
| 207 | - $displayurl = $idpLevelUrl . "&profile=" . $theProfile->identifier; |
|
| 208 | - $QRurl = $idpLevelUrl . "&profile=" . $theProfile->identifier; |
|
| 206 | + $idpLevelUrl = $link.dirname(dirname($_SERVER['SCRIPT_NAME']))."?idp=".$theProfile->institution; |
|
| 207 | + $displayurl = $idpLevelUrl."&profile=".$theProfile->identifier; |
|
| 208 | + $QRurl = $idpLevelUrl."&profile=".$theProfile->identifier; |
|
| 209 | 209 | $qrCode = new \chillerlan\QRCode\QRCode(new \chillerlan\QRCode\QROptions([ |
| 210 | 210 | 'outputType' => \chillerlan\QRCode\QRCode::OUTPUT_IMAGE_PNG, |
| 211 | 211 | 'eccLevel' => \chillerlan\QRCode\QRCode::ECC_H, |
@@ -217,9 +217,9 @@ discard block |
||
| 217 | 217 | if (empty($rawQr)) { |
| 218 | 218 | throw new Exception("Something went seriously wrong during QR code generation!"); |
| 219 | 219 | } |
| 220 | - $uri = "data:image/png;base64," . base64_encode($uiElements->pngInjectConsortiumLogo($rawQr, web\lib\admin\UIElements::QRCODE_PIXELS_PER_SYMBOL)); |
|
| 220 | + $uri = "data:image/png;base64,".base64_encode($uiElements->pngInjectConsortiumLogo($rawQr, web\lib\admin\UIElements::QRCODE_PIXELS_PER_SYMBOL)); |
|
| 221 | 221 | $size = getimagesize($uri); |
| 222 | - echo "<img width='" . ($size[0] / 4) . "' height='" . ($size[1] / 4) . "' src='$uri' alt='QR-code'/>"; |
|
| 222 | + echo "<img width='".($size[0] / 4)."' height='".($size[1] / 4)."' src='$uri' alt='QR-code'/>"; |
|
| 223 | 223 | |
| 224 | 224 | //echo "<nobr>$displayurl</nobr></a>"; |
| 225 | 225 | echo "<p>$displayurl</p></a>"; |
@@ -263,7 +263,7 @@ discard block |
||
| 263 | 263 | <h2><?php |
| 264 | 264 | switch ($deploymentObject->consortium) { |
| 265 | 265 | case "eduroam": |
| 266 | - $displayname = config\ConfAssistant::CONSORTIUM['name'] . " " . core\DeploymentManaged::PRODUCTNAME; |
|
| 266 | + $displayname = config\ConfAssistant::CONSORTIUM['name']." ".core\DeploymentManaged::PRODUCTNAME; |
|
| 267 | 267 | break; |
| 268 | 268 | case "OpenRoaming": |
| 269 | 269 | $displayname = "OpenRoaming ANP"; |
@@ -271,7 +271,7 @@ discard block |
||
| 271 | 271 | default: |
| 272 | 272 | throw new Exception("We are supposed to operate on a roaming consortium we don't know."); |
| 273 | 273 | } |
| 274 | - echo $displayname . " (<span style='color:" . ( $deploymentObject->status == \core\AbstractDeployment::INACTIVE ? "red;'>" . _("inactive") : "green;'>" . _("active") ) . "</span>)"; |
|
| 274 | + echo $displayname." (<span style='color:".($deploymentObject->status == \core\AbstractDeployment::INACTIVE ? "red;'>"._("inactive") : "green;'>"._("active"))."</span>)"; |
|
| 275 | 275 | ?></h2> |
| 276 | 276 | <table> |
| 277 | 277 | <caption><?php echo _("Deployment Details"); ?></caption> |
@@ -285,13 +285,13 @@ discard block |
||
| 285 | 285 | <td><strong><?php echo _("Your primary RADIUS server") ?></strong><br/> |
| 286 | 286 | <?php |
| 287 | 287 | if ($deploymentObject->host1_v4 !== NULL) { |
| 288 | - echo _("IPv4") . ": " . $deploymentObject->host1_v4; |
|
| 288 | + echo _("IPv4").": ".$deploymentObject->host1_v4; |
|
| 289 | 289 | } |
| 290 | 290 | if ($deploymentObject->host1_v4 !== NULL && $deploymentObject->host1_v6 !== NULL) { |
| 291 | 291 | echo "<br/>"; |
| 292 | 292 | } |
| 293 | 293 | if ($deploymentObject->host1_v6 !== NULL) { |
| 294 | - echo _("IPv6") . ": " . $deploymentObject->host1_v6; |
|
| 294 | + echo _("IPv6").": ".$deploymentObject->host1_v6; |
|
| 295 | 295 | } |
| 296 | 296 | ?> |
| 297 | 297 | </td> |
@@ -299,9 +299,9 @@ discard block |
||
| 299 | 299 | <td><?php echo $deploymentObject->port1; ?></td> |
| 300 | 300 | <td> |
| 301 | 301 | <?php |
| 302 | - echo "<img src='" . $radiusMessages[$deploymentObject->radius_status_1]['icon'] . |
|
| 303 | - "' alt='" . $radiusMessages[$deploymentObject->radius_status_1]['text'] . |
|
| 304 | - "' title='" . $radiusMessages[$deploymentObject->radius_status_1]['text'] . "'>"; |
|
| 302 | + echo "<img src='".$radiusMessages[$deploymentObject->radius_status_1]['icon']. |
|
| 303 | + "' alt='".$radiusMessages[$deploymentObject->radius_status_1]['text']. |
|
| 304 | + "' title='".$radiusMessages[$deploymentObject->radius_status_1]['text']."'>"; |
|
| 305 | 305 | ?> |
| 306 | 306 | </td> |
| 307 | 307 | </tr> |
@@ -309,22 +309,22 @@ discard block |
||
| 309 | 309 | <td><strong><?php echo _("Your backup RADIUS server") ?><br/></strong> |
| 310 | 310 | <?php |
| 311 | 311 | if ($deploymentObject->host2_v4 !== NULL) { |
| 312 | - echo _("IPv4") . ": " . $deploymentObject->host2_v4; |
|
| 312 | + echo _("IPv4").": ".$deploymentObject->host2_v4; |
|
| 313 | 313 | } |
| 314 | 314 | if ($deploymentObject->host2_v4 !== NULL && $deploymentObject->host2_v6 !== NULL) { |
| 315 | 315 | echo "<br/>"; |
| 316 | 316 | } |
| 317 | 317 | if ($deploymentObject->host2_v6 !== NULL) { |
| 318 | - echo _("IPv6") . ": " . $deploymentObject->host2_v6; |
|
| 318 | + echo _("IPv6").": ".$deploymentObject->host2_v6; |
|
| 319 | 319 | } |
| 320 | 320 | ?></td> |
| 321 | 321 | <td><?php echo _("RADIUS port number: ") ?></td> |
| 322 | 322 | <td><?php echo $deploymentObject->port2; ?></td> |
| 323 | 323 | <td> |
| 324 | 324 | <?php |
| 325 | - echo "<img src='" . $radiusMessages[$deploymentObject->radius_status_2]['icon'] . |
|
| 326 | - "' alt='" . $radiusMessages[$deploymentObject->radius_status_2]['text'] . |
|
| 327 | - "' title='" . $radiusMessages[$deploymentObject->radius_status_2]['text'] . "'>"; |
|
| 325 | + echo "<img src='".$radiusMessages[$deploymentObject->radius_status_2]['icon']. |
|
| 326 | + "' alt='".$radiusMessages[$deploymentObject->radius_status_2]['text']. |
|
| 327 | + "' title='".$radiusMessages[$deploymentObject->radius_status_2]['text']."'>"; |
|
| 328 | 328 | ?> |
| 329 | 329 | </td> |
| 330 | 330 | </tr> |
@@ -376,12 +376,12 @@ discard block |
||
| 376 | 376 | if (array_key_exists('FAILURE', $res) && $res['FAILURE'] > 0) { |
| 377 | 377 | echo '<br>'; |
| 378 | 378 | if ($res['FAILURE'] == 2) { |
| 379 | - echo ' <span style="color: red;">' . _("Activation failure.") . '</span>'; |
|
| 379 | + echo ' <span style="color: red;">'._("Activation failure.").'</span>'; |
|
| 380 | 380 | } else { |
| 381 | 381 | if (isset($_GET['res'][1]) && $_GET['res']['1'] == 'FAILURE') { |
| 382 | - echo ' <span style="color: red;">' . _("Activation failure for your primary RADIUS server.") . '</span>'; |
|
| 382 | + echo ' <span style="color: red;">'._("Activation failure for your primary RADIUS server.").'</span>'; |
|
| 383 | 383 | } else { |
| 384 | - echo ' <span style="color: red;">' . _("Activation failure for your backup RADIUS server.") . '</span>'; |
|
| 384 | + echo ' <span style="color: red;">'._("Activation failure for your backup RADIUS server.").'</span>'; |
|
| 385 | 385 | } |
| 386 | 386 | } |
| 387 | 387 | } |
@@ -408,12 +408,12 @@ discard block |
||
| 408 | 408 | if ($res['FAILURE'] > 0) { |
| 409 | 409 | echo '<br>'; |
| 410 | 410 | if ($res['FAILURE'] == 2) { |
| 411 | - echo ' <span style="color: red;">' . _("Failure during deactivation, your request is queued for handling") . '</span>'; |
|
| 411 | + echo ' <span style="color: red;">'._("Failure during deactivation, your request is queued for handling").'</span>'; |
|
| 412 | 412 | } else { |
| 413 | 413 | if (isset($_GET['res'][1]) && $_GET['res']['1'] == 'FAILURE') { |
| 414 | - echo ' <span style="color: red;">' . _("Deactivation failure for your primary RADIUS server, your request is queued.") . '</span>'; |
|
| 414 | + echo ' <span style="color: red;">'._("Deactivation failure for your primary RADIUS server, your request is queued.").'</span>'; |
|
| 415 | 415 | } else { |
| 416 | - echo ' <span style="color: red;">' . _("Deactivation failure for your backup RADIUS server, your request is queued.") . '</span>'; |
|
| 416 | + echo ' <span style="color: red;">'._("Deactivation failure for your backup RADIUS server, your request is queued.").'</span>'; |
|
| 417 | 417 | } |
| 418 | 418 | } |
| 419 | 419 | } |
@@ -544,7 +544,7 @@ discard block |
||
| 544 | 544 | </button> |
| 545 | 545 | </div> |
| 546 | 546 | </form> |
| 547 | - <form method='post' action='inc/profileAutodetectCA.inc.php?inst_id=<?php echo $my_inst->identifier;?>' onsubmit='popupRedirectWindow(this); return false;' accept-charset='UTF-8'> |
|
| 547 | + <form method='post' action='inc/profileAutodetectCA.inc.php?inst_id=<?php echo $my_inst->identifier; ?>' onsubmit='popupRedirectWindow(this); return false;' accept-charset='UTF-8'> |
|
| 548 | 548 | <div> |
| 549 | 549 | <button type='submit' name='profile_action' value='new'> |
| 550 | 550 | <?php echo _("New RADIUS/EAP profile (autodetect server details) ..."); ?> |
@@ -616,7 +616,7 @@ discard block |
||
| 616 | 616 | <div> |
| 617 | 617 | <input type="hidden" name="consortium" value="eduroam"/> |
| 618 | 618 | <button type='submit' <?php echo ($hasMail > 0 ? "" : "disabled"); ?> name='profile_action' value='new'> |
| 619 | - <?php echo sprintf(_("Add %s deployment ..."), \config\ConfAssistant::CONSORTIUM['name'] . " " . \core\DeploymentManaged::PRODUCTNAME); ?> |
|
| 619 | + <?php echo sprintf(_("Add %s deployment ..."), \config\ConfAssistant::CONSORTIUM['name']." ".\core\DeploymentManaged::PRODUCTNAME); ?> |
|
| 620 | 620 | </button> |
| 621 | 621 | |
| 622 | 622 | </div> |