@@ -372,20 +372,20 @@ discard block |
||
| 372 | 372 | ); |
| 373 | 373 | // Generate a new private (and public) key pair |
| 374 | 374 | $privkey = openssl_pkey_new(array( |
| 375 | - "private_key_bits" => 4096, |
|
| 376 | - "private_key_type" => OPENSSL_KEYTYPE_RSA)); |
|
| 375 | + "private_key_bits" => 4096, |
|
| 376 | + "private_key_type" => OPENSSL_KEYTYPE_RSA)); |
|
| 377 | 377 | // export private key to $clientprivateKey (as string) |
| 378 | 378 | openssl_pkey_export($privkey, $this->radsec_priv); |
| 379 | 379 | // Generate a certificate signing request |
| 380 | 380 | $csr = openssl_csr_new($dn, $privkey, |
| 381 | - array('digest_alg' => 'sha256', 'config' => ROOT . "/config/ManagedSPCerts/openssl.cnf")); |
|
| 381 | + array('digest_alg' => 'sha256', 'config' => ROOT . "/config/ManagedSPCerts/openssl.cnf")); |
|
| 382 | 382 | // get CA certificate and private key |
| 383 | 383 | $caprivkey = array(file_get_contents(ROOT . "/config/ManagedSPCerts/eduroamSP-CA.key"), |
| 384 | 384 | \config\Master::MANAGEDSP['capass']); |
| 385 | 385 | $cacert = file_get_contents(ROOT . "/config/ManagedSPCerts/eduroamSP-CA.pem"); |
| 386 | 386 | $this->setTLSSerialNumber(); |
| 387 | 387 | $clientcert = openssl_csr_sign($csr, $cacert, $caprivkey, \config\Master::MANAGEDSP['daystoexpiry'], |
| 388 | - array('digest_alg'=>'sha512', 'config' => ROOT . "/config/ManagedSPCerts/openssl.cnf"), $this->radsec_cert_serial_no); |
|
| 388 | + array('digest_alg'=>'sha512', 'config' => ROOT . "/config/ManagedSPCerts/openssl.cnf"), $this->radsec_cert_serial_no); |
|
| 389 | 389 | openssl_x509_export($clientcert, $this->radsec_cert); |
| 390 | 390 | } |
| 391 | 391 | /** |
@@ -506,9 +506,9 @@ discard block |
||
| 506 | 506 | */ |
| 507 | 507 | public function renewtls() |
| 508 | 508 | { |
| 509 | - $id = $this->identifier; |
|
| 510 | - $futureTlsClient = $this->createTLScredentials(); |
|
| 511 | - $this->databaseHandle->exec("UPDATE deployment SET radsec_priv = ?, radsec_cert = ?, radsec_cert_serial_number = ? WHERE deployment_id = ?", "ssii", $this->radsec_priv, $this->radsec_cert, $this->radsec_cert_serial_no, $id); |
|
| 509 | + $id = $this->identifier; |
|
| 510 | + $futureTlsClient = $this->createTLScredentials(); |
|
| 511 | + $this->databaseHandle->exec("UPDATE deployment SET radsec_priv = ?, radsec_cert = ?, radsec_cert_serial_number = ? WHERE deployment_id = ?", "ssii", $this->radsec_priv, $this->radsec_cert, $this->radsec_cert_serial_no, $id); |
|
| 512 | 512 | } |
| 513 | 513 | |
| 514 | 514 | /** |
@@ -518,38 +518,38 @@ discard block |
||
| 518 | 518 | */ |
| 519 | 519 | public function tlsfromcsr($csr) |
| 520 | 520 | { |
| 521 | - $id = $this->identifier; |
|
| 522 | - $dn = array(); |
|
| 523 | - $dn['rdnSequence'] = array(); |
|
| 524 | - $dn['rdnSequence'][0] = array(); |
|
| 525 | - $dn['rdnSequence'][0][] = array('type' => 'id-at-organizationName', 'value' => array()); |
|
| 526 | - $dn['rdnSequence'][0][0]['value']['utf8String'] = 'eduroam'; |
|
| 527 | - $dn['rdnSequence'][1] = array(); |
|
| 528 | - $dn['rdnSequence'][1][] = array('type' => 'id-at-organizationalUnitName', 'value' => array()); |
|
| 529 | - $dn['rdnSequence'][1][0]['value']['utf8String'] = 'eduroam Managed SP'; |
|
| 530 | - $dn['rdnSequence'][2] = array(); |
|
| 531 | - $dn['rdnSequence'][2][] = array('type' => 'id-at-commonName', 'value' => array()); |
|
| 532 | - $dn['rdnSequence'][2][0]['value']['utf8String'] = 'SP' . $this->identifier . "-" . $this->institution; |
|
| 533 | - $csr->setDN($dn); |
|
| 534 | - $pemcakey = file_get_contents(ROOT . "/config/ManagedSPCerts/eduroamSP-CA.key"); |
|
| 535 | - $cakey = \phpseclib3\Crypt\PublicKeyLoader::loadPrivateKey($pemcakey, \config\Master::MANAGEDSP['capass'] ); |
|
| 536 | - $pemca = file_get_contents(ROOT . "/config/ManagedSPCerts/eduroamSP-CA.pem"); |
|
| 537 | - $ca = new \phpseclib3\File\X509(); |
|
| 538 | - $ca->loadX509($pemca); |
|
| 539 | - $ca->setPrivateKey($cakey); |
|
| 540 | - // Sign the updated request, producing the certificate. |
|
| 541 | - $x509 = new \phpseclib3\File\X509(); |
|
| 542 | - $csr->setExtension('id-ce-keyUsage', ['digitalSignature', 'nonRepudiation', 'keyEncipherment']); |
|
| 543 | - $csr->setExtension('id-ce-extKeyUsage', ['id-kp-clientAuth']); |
|
| 544 | - $csr->setExtension('id-ce-basicConstraints', ['cA' => false], false); |
|
| 545 | - $x509->setEndDate('+' . \config\Master::MANAGEDSP['daystoexpiry'] . ' days'); |
|
| 546 | - $this->setTLSSerialNumber(999999999999999999); |
|
| 547 | - $x509->setSerialNumber($this->radsec_cert_serial_no, 10); |
|
| 548 | - $cert = $x509->loadX509($x509->saveX509($x509->sign($ca, $csr))); |
|
| 549 | - $this->radsec_cert = $x509->saveX509($cert); |
|
| 550 | - $this->radsec_priv = NULL; |
|
| 551 | - //$futureTlsClient = $this->createTLScredentials(); |
|
| 552 | - $this->databaseHandle->exec("UPDATE deployment SET radsec_priv = NULL, radsec_cert = ?, radsec_cert_serial_number = ? WHERE deployment_id = ?", "sii", $this->radsec_cert, $this->radsec_cert_serial_no, $id); |
|
| 521 | + $id = $this->identifier; |
|
| 522 | + $dn = array(); |
|
| 523 | + $dn['rdnSequence'] = array(); |
|
| 524 | + $dn['rdnSequence'][0] = array(); |
|
| 525 | + $dn['rdnSequence'][0][] = array('type' => 'id-at-organizationName', 'value' => array()); |
|
| 526 | + $dn['rdnSequence'][0][0]['value']['utf8String'] = 'eduroam'; |
|
| 527 | + $dn['rdnSequence'][1] = array(); |
|
| 528 | + $dn['rdnSequence'][1][] = array('type' => 'id-at-organizationalUnitName', 'value' => array()); |
|
| 529 | + $dn['rdnSequence'][1][0]['value']['utf8String'] = 'eduroam Managed SP'; |
|
| 530 | + $dn['rdnSequence'][2] = array(); |
|
| 531 | + $dn['rdnSequence'][2][] = array('type' => 'id-at-commonName', 'value' => array()); |
|
| 532 | + $dn['rdnSequence'][2][0]['value']['utf8String'] = 'SP' . $this->identifier . "-" . $this->institution; |
|
| 533 | + $csr->setDN($dn); |
|
| 534 | + $pemcakey = file_get_contents(ROOT . "/config/ManagedSPCerts/eduroamSP-CA.key"); |
|
| 535 | + $cakey = \phpseclib3\Crypt\PublicKeyLoader::loadPrivateKey($pemcakey, \config\Master::MANAGEDSP['capass'] ); |
|
| 536 | + $pemca = file_get_contents(ROOT . "/config/ManagedSPCerts/eduroamSP-CA.pem"); |
|
| 537 | + $ca = new \phpseclib3\File\X509(); |
|
| 538 | + $ca->loadX509($pemca); |
|
| 539 | + $ca->setPrivateKey($cakey); |
|
| 540 | + // Sign the updated request, producing the certificate. |
|
| 541 | + $x509 = new \phpseclib3\File\X509(); |
|
| 542 | + $csr->setExtension('id-ce-keyUsage', ['digitalSignature', 'nonRepudiation', 'keyEncipherment']); |
|
| 543 | + $csr->setExtension('id-ce-extKeyUsage', ['id-kp-clientAuth']); |
|
| 544 | + $csr->setExtension('id-ce-basicConstraints', ['cA' => false], false); |
|
| 545 | + $x509->setEndDate('+' . \config\Master::MANAGEDSP['daystoexpiry'] . ' days'); |
|
| 546 | + $this->setTLSSerialNumber(999999999999999999); |
|
| 547 | + $x509->setSerialNumber($this->radsec_cert_serial_no, 10); |
|
| 548 | + $cert = $x509->loadX509($x509->saveX509($x509->sign($ca, $csr))); |
|
| 549 | + $this->radsec_cert = $x509->saveX509($cert); |
|
| 550 | + $this->radsec_priv = NULL; |
|
| 551 | + //$futureTlsClient = $this->createTLScredentials(); |
|
| 552 | + $this->databaseHandle->exec("UPDATE deployment SET radsec_priv = NULL, radsec_cert = ?, radsec_cert_serial_number = ? WHERE deployment_id = ?", "sii", $this->radsec_cert, $this->radsec_cert_serial_no, $id); |
|
| 553 | 553 | } |
| 554 | 554 | /** |
| 555 | 555 | * marks the deployment as deactivated |
@@ -883,11 +883,11 @@ discard block |
||
| 883 | 883 | unlink("$zipdir/$key/detail.zip"); |
| 884 | 884 | $files = scandir("$zipdir/$key/"); |
| 885 | 885 | foreach($files as $file) { |
| 886 | - if ($file == '.' || $file == '..') continue; |
|
| 887 | - $data = file_get_contents("$zipdir/$key/$file"); |
|
| 888 | - $zipt->addFromString("radius-$key/$file", $data); |
|
| 889 | - $cnt += 1; |
|
| 890 | - unlink("$zipdir/$key/$file"); |
|
| 886 | + if ($file == '.' || $file == '..') continue; |
|
| 887 | + $data = file_get_contents("$zipdir/$key/$file"); |
|
| 888 | + $zipt->addFromString("radius-$key/$file", $data); |
|
| 889 | + $cnt += 1; |
|
| 890 | + unlink("$zipdir/$key/$file"); |
|
| 891 | 891 | } |
| 892 | 892 | if (file_exists("$zipdir/$key")) { |
| 893 | 893 | rmdir("$zipdir/$key"); |
@@ -883,7 +883,9 @@ |
||
| 883 | 883 | unlink("$zipdir/$key/detail.zip"); |
| 884 | 884 | $files = scandir("$zipdir/$key/"); |
| 885 | 885 | foreach($files as $file) { |
| 886 | - if ($file == '.' || $file == '..') continue; |
|
| 886 | + if ($file == '.' || $file == '..') { |
|
| 887 | + continue; |
|
| 888 | + } |
|
| 887 | 889 | $data = file_get_contents("$zipdir/$key/$file"); |
| 888 | 890 | $zipt->addFromString("radius-$key/$file", $data); |
| 889 | 891 | $cnt += 1; |
@@ -337,7 +337,7 @@ discard block |
||
| 337 | 337 | $serverCandidates[IdPlist::geoDistance($adminLocation, ['lat' => $iterator->location_lat, 'lon' => $iterator->location_lon])] = $iterator->server_id; |
| 338 | 338 | } |
| 339 | 339 | if ($clients > $maxSupportedClients * 0.9) { |
| 340 | - $this->loggerInstance->debug(1, "A RADIUS server for Managed SP (" . $iterator->server_id . ") is serving at more than 90% capacity!"); |
|
| 340 | + $this->loggerInstance->debug(1, "A RADIUS server for Managed SP (".$iterator->server_id.") is serving at more than 90% capacity!"); |
|
| 341 | 341 | } |
| 342 | 342 | } |
| 343 | 343 | if (count($serverCandidates) == 0 && $federation != "DEFAULT") { |
@@ -359,7 +359,7 @@ discard block |
||
| 359 | 359 | * |
| 360 | 360 | * @throws Exception |
| 361 | 361 | */ |
| 362 | - private function setTLSSerialNumber($max=PHP_INT_MAX) { |
|
| 362 | + private function setTLSSerialNumber($max = PHP_INT_MAX) { |
|
| 363 | 363 | $nonDupSerialFound = FALSE; |
| 364 | 364 | do { |
| 365 | 365 | $serial = random_int(1000000000, $max); |
@@ -379,7 +379,7 @@ discard block |
||
| 379 | 379 | */ |
| 380 | 380 | private function createTLScredentials() |
| 381 | 381 | { |
| 382 | - $clientName = 'SP' . $this->identifier . '-' . $this->institution; |
|
| 382 | + $clientName = 'SP'.$this->identifier.'-'.$this->institution; |
|
| 383 | 383 | $dn = array( |
| 384 | 384 | "organizationName" => "eduroam", |
| 385 | 385 | "organizationalUnitName" => "eduroam Managed SP", |
@@ -393,14 +393,14 @@ discard block |
||
| 393 | 393 | openssl_pkey_export($privkey, $this->radsec_priv); |
| 394 | 394 | // Generate a certificate signing request |
| 395 | 395 | $csr = openssl_csr_new($dn, $privkey, |
| 396 | - array('digest_alg' => 'sha256', 'config' => ROOT . "/config/ManagedSPCerts/openssl.cnf")); |
|
| 396 | + array('digest_alg' => 'sha256', 'config' => ROOT."/config/ManagedSPCerts/openssl.cnf")); |
|
| 397 | 397 | // get CA certificate and private key |
| 398 | - $caprivkey = array(file_get_contents(ROOT . "/config/ManagedSPCerts/eduroamSP-CA.key"), |
|
| 398 | + $caprivkey = array(file_get_contents(ROOT."/config/ManagedSPCerts/eduroamSP-CA.key"), |
|
| 399 | 399 | \config\Master::MANAGEDSP['capass']); |
| 400 | - $cacert = file_get_contents(ROOT . "/config/ManagedSPCerts/eduroamSP-CA.pem"); |
|
| 400 | + $cacert = file_get_contents(ROOT."/config/ManagedSPCerts/eduroamSP-CA.pem"); |
|
| 401 | 401 | $this->setTLSSerialNumber(); |
| 402 | 402 | $clientcert = openssl_csr_sign($csr, $cacert, $caprivkey, \config\Master::MANAGEDSP['daystoexpiry'], |
| 403 | - array('digest_alg'=>'sha512', 'config' => ROOT . "/config/ManagedSPCerts/openssl.cnf"), $this->radsec_cert_serial_no); |
|
| 403 | + array('digest_alg'=>'sha512', 'config' => ROOT."/config/ManagedSPCerts/openssl.cnf"), $this->radsec_cert_serial_no); |
|
| 404 | 404 | openssl_x509_export($clientcert, $this->radsec_cert); |
| 405 | 405 | } |
| 406 | 406 | /** |
@@ -425,8 +425,8 @@ discard block |
||
| 425 | 425 | $conditional1 = "AND activity_time > DATE_SUB(NOW(), INTERVAL $backlog SECOND )"; |
| 426 | 426 | $conditional2 = "DESC"; |
| 427 | 427 | } |
| 428 | - $client = 'SP' . $this->identifier . '-' . $this->institution; |
|
| 429 | - $stats = $this->databaseHandle->exec("SELECT activity_time, realm, mac, cui, result, ap_id, prot, outer_user FROM activity WHERE owner = ? $conditional1 ORDER BY activity_time $conditional2", "s", $client ); |
|
| 428 | + $client = 'SP'.$this->identifier.'-'.$this->institution; |
|
| 429 | + $stats = $this->databaseHandle->exec("SELECT activity_time, realm, mac, cui, result, ap_id, prot, outer_user FROM activity WHERE owner = ? $conditional1 ORDER BY activity_time $conditional2", "s", $client); |
|
| 430 | 430 | |
| 431 | 431 | return mysqli_fetch_all($stats, \MYSQLI_ASSOC); |
| 432 | 432 | } |
@@ -544,11 +544,11 @@ discard block |
||
| 544 | 544 | $dn['rdnSequence'][1][0]['value']['utf8String'] = 'eduroam Managed SP'; |
| 545 | 545 | $dn['rdnSequence'][2] = array(); |
| 546 | 546 | $dn['rdnSequence'][2][] = array('type' => 'id-at-commonName', 'value' => array()); |
| 547 | - $dn['rdnSequence'][2][0]['value']['utf8String'] = 'SP' . $this->identifier . "-" . $this->institution; |
|
| 547 | + $dn['rdnSequence'][2][0]['value']['utf8String'] = 'SP'.$this->identifier."-".$this->institution; |
|
| 548 | 548 | $csr->setDN($dn); |
| 549 | - $pemcakey = file_get_contents(ROOT . "/config/ManagedSPCerts/eduroamSP-CA.key"); |
|
| 550 | - $cakey = \phpseclib3\Crypt\PublicKeyLoader::loadPrivateKey($pemcakey, \config\Master::MANAGEDSP['capass'] ); |
|
| 551 | - $pemca = file_get_contents(ROOT . "/config/ManagedSPCerts/eduroamSP-CA.pem"); |
|
| 549 | + $pemcakey = file_get_contents(ROOT."/config/ManagedSPCerts/eduroamSP-CA.key"); |
|
| 550 | + $cakey = \phpseclib3\Crypt\PublicKeyLoader::loadPrivateKey($pemcakey, \config\Master::MANAGEDSP['capass']); |
|
| 551 | + $pemca = file_get_contents(ROOT."/config/ManagedSPCerts/eduroamSP-CA.pem"); |
|
| 552 | 552 | $ca = new \phpseclib3\File\X509(); |
| 553 | 553 | $ca->loadX509($pemca); |
| 554 | 554 | $ca->setPrivateKey($cakey); |
@@ -557,7 +557,7 @@ discard block |
||
| 557 | 557 | $csr->setExtension('id-ce-keyUsage', ['digitalSignature', 'nonRepudiation', 'keyEncipherment']); |
| 558 | 558 | $csr->setExtension('id-ce-extKeyUsage', ['id-kp-clientAuth']); |
| 559 | 559 | $csr->setExtension('id-ce-basicConstraints', ['cA' => false], false); |
| 560 | - $x509->setEndDate('+' . \config\Master::MANAGEDSP['daystoexpiry'] . ' days'); |
|
| 560 | + $x509->setEndDate('+'.\config\Master::MANAGEDSP['daystoexpiry'].' days'); |
|
| 561 | 561 | $this->setTLSSerialNumber(999999999999999999); |
| 562 | 562 | $x509->setSerialNumber($this->radsec_cert_serial_no, 10); |
| 563 | 563 | $cert = $x509->loadX509($x509->saveX509($x509->sign($ca, $csr))); |
@@ -599,7 +599,7 @@ discard block |
||
| 599 | 599 | { |
| 600 | 600 | $customAttrib = $this->getAttributes("managedsp:operatorname"); |
| 601 | 601 | if (count($customAttrib) == 0) { |
| 602 | - return "1sp." . $this->identifier . "-" . $this->institution . \config\ConfAssistant::SILVERBULLET['realm_suffix']; |
|
| 602 | + return "1sp.".$this->identifier."-".$this->institution.\config\ConfAssistant::SILVERBULLET['realm_suffix']; |
|
| 603 | 603 | } |
| 604 | 604 | return $customAttrib[0]["value"]; |
| 605 | 605 | } |
@@ -614,24 +614,24 @@ discard block |
||
| 614 | 614 | private function sendToRADIUS(int $idx, $post) |
| 615 | 615 | { |
| 616 | 616 | $hostname = "radius_hostname_$idx"; |
| 617 | - $p = "server$idx" . "_secret"; |
|
| 617 | + $p = "server$idx"."_secret"; |
|
| 618 | 618 | $key = $this->$p; |
| 619 | - $p = "server$idx" . "_iv"; |
|
| 619 | + $p = "server$idx"."_iv"; |
|
| 620 | 620 | $iv = $this->$p; |
| 621 | - $p = "server$idx" . "_token"; |
|
| 621 | + $p = "server$idx"."_token"; |
|
| 622 | 622 | $token = $this->$p; |
| 623 | - $encrypted = openssl_encrypt($post . "&token=$token", "CHACHA20", $key, 0, $iv); |
|
| 623 | + $encrypted = openssl_encrypt($post."&token=$token", "CHACHA20", $key, 0, $iv); |
|
| 624 | 624 | if ($encrypted !== false) { |
| 625 | - $post = "enc=". urlencode(base64_encode($encrypted)); |
|
| 625 | + $post = "enc=".urlencode(base64_encode($encrypted)); |
|
| 626 | 626 | } |
| 627 | - $ch = curl_init("http://" . $this->$hostname . ':' . \config\Master::MANAGEDSP['radiusconfigport']); |
|
| 627 | + $ch = curl_init("http://".$this->$hostname.':'.\config\Master::MANAGEDSP['radiusconfigport']); |
|
| 628 | 628 | if ($ch === FALSE) { |
| 629 | 629 | $res = 'FAILURE'; |
| 630 | 630 | } else { |
| 631 | 631 | curl_setopt($ch, CURLOPT_USERAGENT, "CAT-ManagedSP"); |
| 632 | 632 | curl_setopt($ch, CURLOPT_POST, 1); |
| 633 | 633 | curl_setopt($ch, CURLOPT_POSTFIELDS, $post); |
| 634 | - $this->loggerInstance->debug(1, "Posting to http://" . $this->$hostname . ':' . \config\Master::MANAGEDSP['radiusconfigport'] . "/$post\n"); |
|
| 634 | + $this->loggerInstance->debug(1, "Posting to http://".$this->$hostname.':'.\config\Master::MANAGEDSP['radiusconfigport']."/$post\n"); |
|
| 635 | 635 | curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1); |
| 636 | 636 | curl_setopt($ch, CURLOPT_HEADER, 0); |
| 637 | 637 | curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); |
@@ -671,19 +671,19 @@ discard block |
||
| 671 | 671 | } else { |
| 672 | 672 | $txt = $remove ? _('Profile deactivation failed') : _('Profile activation/modification failed'); |
| 673 | 673 | } |
| 674 | - $txt = $txt . ' '; |
|
| 674 | + $txt = $txt.' '; |
|
| 675 | 675 | if (array_count_values($response)[$status] == 2) { |
| 676 | - $txt = $txt . _('on both RADIUS servers: primary and backup') . '.'; |
|
| 676 | + $txt = $txt._('on both RADIUS servers: primary and backup').'.'; |
|
| 677 | 677 | } else { |
| 678 | 678 | if ($response['res[1]'] == $status) { |
| 679 | - $txt = $txt . _('on primary RADIUS server') . '.'; |
|
| 679 | + $txt = $txt._('on primary RADIUS server').'.'; |
|
| 680 | 680 | } else { |
| 681 | - $txt = $txt . _('on backup RADIUS server') . '.'; |
|
| 681 | + $txt = $txt._('on backup RADIUS server').'.'; |
|
| 682 | 682 | } |
| 683 | 683 | } |
| 684 | 684 | $mail = \core\common\OutsideComm::mailHandle(); |
| 685 | 685 | $email = $this->getAttributes("support:email")[0]['value']; |
| 686 | - $mail->FromName = \config\Master::APPEARANCE['productname'] . " Notification System"; |
|
| 686 | + $mail->FromName = \config\Master::APPEARANCE['productname']." Notification System"; |
|
| 687 | 687 | $mail->addAddress($email); |
| 688 | 688 | if ($status == 'OK') { |
| 689 | 689 | $mail->Subject = _('RADIUS profile update problem fixed'); |
@@ -717,7 +717,7 @@ discard block |
||
| 717 | 717 | return NULL; |
| 718 | 718 | } |
| 719 | 719 | $timeout = 10; |
| 720 | - curl_setopt($ch, CURLOPT_URL, 'http://' . $host); |
|
| 720 | + curl_setopt($ch, CURLOPT_URL, 'http://'.$host); |
|
| 721 | 721 | curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); |
| 722 | 722 | curl_setopt($ch, CURLOPT_TIMEOUT, $timeout); |
| 723 | 723 | curl_exec($ch); |
@@ -811,52 +811,52 @@ discard block |
||
| 811 | 811 | { |
| 812 | 812 | $toPost = ($onlyone ? array($onlyone => '') : array(1 => '', 2 => '')); |
| 813 | 813 | if ($torevoke != '') { |
| 814 | - $toPostTemplate = 'instid=' . $this->institution . '&deploymentid=' . $this->identifier . |
|
| 814 | + $toPostTemplate = 'instid='.$this->institution.'&deploymentid='.$this->identifier. |
|
| 815 | 815 | "&torevoke=$torevoke"; |
| 816 | 816 | foreach (array_keys($toPost) as $key) { |
| 817 | 817 | $toPost[$key] = $toPostTemplate; |
| 818 | 818 | } |
| 819 | 819 | } else { |
| 820 | 820 | $remove = ($this->status == \core\AbstractDeployment::INACTIVE) ? 0 : 1; |
| 821 | - $toPostTemplate = 'instid=' . $this->institution . '&deploymentid=' . $this->identifier . |
|
| 822 | - '&secret=' . $this->secret . |
|
| 823 | - '&country=' . $this->getAttributes("internal:country")[0]['value'] . |
|
| 824 | - '&pskkey=' . $this->pskkey . '&'; |
|
| 821 | + $toPostTemplate = 'instid='.$this->institution.'&deploymentid='.$this->identifier. |
|
| 822 | + '&secret='.$this->secret. |
|
| 823 | + '&country='.$this->getAttributes("internal:country")[0]['value']. |
|
| 824 | + '&pskkey='.$this->pskkey.'&'; |
|
| 825 | 825 | if ($remove) { |
| 826 | - $toPostTemplate = $toPostTemplate . 'remove=1&'; |
|
| 826 | + $toPostTemplate = $toPostTemplate.'remove=1&'; |
|
| 827 | 827 | } else { |
| 828 | - $toPostTemplate = $toPostTemplate . 'operatorname=' . $this->getOperatorName() . '&'; |
|
| 828 | + $toPostTemplate = $toPostTemplate.'operatorname='.$this->getOperatorName().'&'; |
|
| 829 | 829 | if ($this->getAttributes("managedsp:vlan")[0]['value'] ?? NULL) { |
| 830 | 830 | $allRealms = $this->getAllRealms(); |
| 831 | 831 | if (!empty($allRealms)) { |
| 832 | - $toPostTemplate = $toPostTemplate . 'vlan=' . $this->getAttributes("managedsp:vlan")[0]['value'] . '&'; |
|
| 833 | - $toPostTemplate = $toPostTemplate . 'realmforvlan[]=' . implode('&realmforvlan[]=', $allRealms) . '&'; |
|
| 832 | + $toPostTemplate = $toPostTemplate.'vlan='.$this->getAttributes("managedsp:vlan")[0]['value'].'&'; |
|
| 833 | + $toPostTemplate = $toPostTemplate.'realmforvlan[]='.implode('&realmforvlan[]=', $allRealms).'&'; |
|
| 834 | 834 | } |
| 835 | 835 | } |
| 836 | 836 | if ($this->getAttributes("managedsp:guest_vlan")[0]['value'] ?? NULL) { |
| 837 | - $toPostTemplate = $toPostTemplate . 'guest_vlan=' . $this->getAttributes("managedsp:guest_vlan")[0]['value'] . '&'; |
|
| 837 | + $toPostTemplate = $toPostTemplate.'guest_vlan='.$this->getAttributes("managedsp:guest_vlan")[0]['value'].'&'; |
|
| 838 | 838 | } |
| 839 | 839 | } |
| 840 | 840 | foreach (array_keys($toPost) as $key) { |
| 841 | - $elem = 'port' . $key; |
|
| 842 | - $toPost[$key] = $toPostTemplate . 'port=' . $this->$elem; |
|
| 841 | + $elem = 'port'.$key; |
|
| 842 | + $toPost[$key] = $toPostTemplate.'port='.$this->$elem; |
|
| 843 | 843 | } |
| 844 | 844 | } |
| 845 | 845 | $response = array(); |
| 846 | 846 | foreach ($toPost as $key => $value) { |
| 847 | - $this->loggerInstance->debug(1, 'toPost ' . $toPost[$key] . "\n"); |
|
| 847 | + $this->loggerInstance->debug(1, 'toPost '.$toPost[$key]."\n"); |
|
| 848 | 848 | // temporarly one server $response['res[' . $key . ']'] = $this->sendToRADIUS($key, $toPost[$key]); |
| 849 | 849 | /*if ($key == 2) { |
| 850 | 850 | $response['res[2]'] = 'OK'; |
| 851 | 851 | } else { */ |
| 852 | - $response['res[' . $key . ']'] = $this->sendToRADIUS($key, $toPost[$key]); |
|
| 852 | + $response['res['.$key.']'] = $this->sendToRADIUS($key, $toPost[$key]); |
|
| 853 | 853 | //} |
| 854 | 854 | } |
| 855 | 855 | if ($onlyone) { |
| 856 | - $response['res[' . ($onlyone == 1) ? 2 : 1 . ']'] = \core\AbstractDeployment::RADIUS_OK; |
|
| 856 | + $response['res['.($onlyone == 1) ? 2 : 1.']'] = \core\AbstractDeployment::RADIUS_OK; |
|
| 857 | 857 | } |
| 858 | 858 | foreach (array('OK', 'FAILURE') as $status) { |
| 859 | - if ( ( ($status == 'OK' && $notify) || ($status == 'FAILURE') ) && ( in_array($status, $response) ) ) { |
|
| 859 | + if ((($status == 'OK' && $notify) || ($status == 'FAILURE')) && (in_array($status, $response))) { |
|
| 860 | 860 | $this->sendMailtoAdmin($remove, $response, $status); |
| 861 | 861 | } |
| 862 | 862 | } |
@@ -875,7 +875,7 @@ discard block |
||
| 875 | 875 | $randomiv = ""; |
| 876 | 876 | if ($logs) { |
| 877 | 877 | $randomiv = bin2hex(random_bytes(8)); |
| 878 | - $toPostTemplate = 'logid=DEBUG-' . $this->identifier . '-' .$this->institution . "&backlog=$logs&iv=$randomiv"; |
|
| 878 | + $toPostTemplate = 'logid=DEBUG-'.$this->identifier.'-'.$this->institution."&backlog=$logs&iv=$randomiv"; |
|
| 879 | 879 | foreach (array_keys($toPost) as $key) { |
| 880 | 880 | $toPost[$key] = $toPostTemplate; |
| 881 | 881 | } |
@@ -884,21 +884,21 @@ discard block |
||
| 884 | 884 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
| 885 | 885 | $zipdir = $tempdir['dir']; |
| 886 | 886 | foreach ($toPost as $key => $value) { |
| 887 | - $this->loggerInstance->debug(1, 'toPost ' . $toPost[$key] . "\n"); |
|
| 888 | - $p = "server$key" . "_secret"; |
|
| 887 | + $this->loggerInstance->debug(1, 'toPost '.$toPost[$key]."\n"); |
|
| 888 | + $p = "server$key"."_secret"; |
|
| 889 | 889 | $secret = $this->$p; |
| 890 | - $p = "server$key" . "_token"; |
|
| 890 | + $p = "server$key"."_token"; |
|
| 891 | 891 | $token = $this->$p; |
| 892 | - $response['res[' . $key . ']'] = $this->sendToRADIUS($key, $toPost[$key]); |
|
| 892 | + $response['res['.$key.']'] = $this->sendToRADIUS($key, $toPost[$key]); |
|
| 893 | 893 | $paths = []; |
| 894 | - if (substr($response['res[' . $key . ']'], 0, 8) == 'ZIPDATA:' && $randomiv != '') { |
|
| 895 | - $encrypted = substr($response['res[' . $key . ']'], 8); |
|
| 894 | + if (substr($response['res['.$key.']'], 0, 8) == 'ZIPDATA:' && $randomiv != '') { |
|
| 895 | + $encrypted = substr($response['res['.$key.']'], 8); |
|
| 896 | 896 | $data = openssl_decrypt($encrypted, "CHACHA20", $secret, 0, $randomiv); |
| 897 | 897 | if ($data !== false && substr($data, 0, strlen($token)) == $token) { |
| 898 | 898 | $data = substr($data, strlen($token)); |
| 899 | 899 | } |
| 900 | 900 | if (!file_exists("$zipdir/$key")) { |
| 901 | - mkdir("$zipdir/$key", 0755, true ); |
|
| 901 | + mkdir("$zipdir/$key", 0755, true); |
|
| 902 | 902 | } |
| 903 | 903 | $fileHandle = fopen("$zipdir/$key/detail.zip", "wb"); |
| 904 | 904 | fwrite($fileHandle, $data); |
@@ -906,7 +906,7 @@ discard block |
||
| 906 | 906 | } |
| 907 | 907 | } |
| 908 | 908 | $zipt = new \ZipArchive; |
| 909 | - $zipt->open("$zipdir/detail-" . $this->identifier . '-' .$this->institution . '.zip', \ZipArchive::CREATE); |
|
| 909 | + $zipt->open("$zipdir/detail-".$this->identifier.'-'.$this->institution.'.zip', \ZipArchive::CREATE); |
|
| 910 | 910 | $cnt = 0; |
| 911 | 911 | foreach ($toPost as $key => $value) { |
| 912 | 912 | if (file_exists("$zipdir/$key/detail.zip")) { |
@@ -918,7 +918,7 @@ discard block |
||
| 918 | 918 | $zipf->close(); |
| 919 | 919 | unlink("$zipdir/$key/detail.zip"); |
| 920 | 920 | $files = scandir("$zipdir/$key/"); |
| 921 | - foreach($files as $file) { |
|
| 921 | + foreach ($files as $file) { |
|
| 922 | 922 | if ($file == '.' || $file == '..') continue; |
| 923 | 923 | $data = file_get_contents("$zipdir/$key/$file"); |
| 924 | 924 | $zipt->addFromString("radius-$key/$file", $data); |
@@ -934,14 +934,14 @@ discard block |
||
| 934 | 934 | $zipt->addEmptyDir('.'); |
| 935 | 935 | } |
| 936 | 936 | $zipt->close(); |
| 937 | - if (file_exists("$zipdir/detail-" . $this->identifier . '-' .$this->institution . '.zip')) { |
|
| 938 | - $data = file_get_contents("$zipdir/detail-" . $this->identifier . '-' .$this->institution . '.zip'); |
|
| 939 | - unlink("$zipdir/detail-" . $this->identifier . '-' .$this->institution . '.zip'); |
|
| 937 | + if (file_exists("$zipdir/detail-".$this->identifier.'-'.$this->institution.'.zip')) { |
|
| 938 | + $data = file_get_contents("$zipdir/detail-".$this->identifier.'-'.$this->institution.'.zip'); |
|
| 939 | + unlink("$zipdir/detail-".$this->identifier.'-'.$this->institution.'.zip'); |
|
| 940 | 940 | rmdir($zipdir); |
| 941 | 941 | } |
| 942 | 942 | if ($data !== FALSE) { |
| 943 | 943 | header('Content-Type: application/zip'); |
| 944 | - header("Content-Disposition: attachment; filename=\"detail-".$this->identifier . '-' .$this->institution.".zip\""); |
|
| 944 | + header("Content-Disposition: attachment; filename=\"detail-".$this->identifier.'-'.$this->institution.".zip\""); |
|
| 945 | 945 | header("Content-Transfer-Encoding: binary"); |
| 946 | 946 | echo $data; |
| 947 | 947 | } |
@@ -26,7 +26,7 @@ discard block |
||
| 26 | 26 | */ |
| 27 | 27 | ?> |
| 28 | 28 | <?php |
| 29 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
| 29 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
| 30 | 30 | |
| 31 | 31 | $auth = new \web\lib\admin\Authentication(); |
| 32 | 32 | $deco = new \web\lib\admin\PageDecoration(); |
@@ -92,11 +92,11 @@ discard block |
||
| 92 | 92 | ?> |
| 93 | 93 | |
| 94 | 94 | <select name="INST-list" id="INST-list"> |
| 95 | - <option value=""><?php echo _('---PLEASE CHOOSE---');?></option> |
|
| 95 | + <option value=""><?php echo _('---PLEASE CHOOSE---'); ?></option> |
|
| 96 | 96 | <?php |
| 97 | 97 | $instdata = array(); |
| 98 | 98 | foreach ($extInsts as $iid => $oneInst) { |
| 99 | - print '<option value="' . $iid . '">' . $oneInst['name'] . '</option>'; |
|
| 99 | + print '<option value="'.$iid.'">'.$oneInst['name'].'</option>'; |
|
| 100 | 100 | $instdata[$iid] = array(); |
| 101 | 101 | $instdata[$iid]['name'] = $oneInst['name']; |
| 102 | 102 | $instdata[$iid]['type'] = _('no data'); |
@@ -110,22 +110,22 @@ discard block |
||
| 110 | 110 | $contactdata = ''; |
| 111 | 111 | foreach ($oneInst['contacts'] as $oneContact) { |
| 112 | 112 | if ($contactdata != '') { |
| 113 | - $contactdata = $contactdata . '<br>'; |
|
| 113 | + $contactdata = $contactdata.'<br>'; |
|
| 114 | 114 | } |
| 115 | 115 | if ($oneContact['name']) { |
| 116 | - $contactdata = $contactdata . $oneContact['name']; |
|
| 116 | + $contactdata = $contactdata.$oneContact['name']; |
|
| 117 | 117 | } |
| 118 | 118 | if ($contactdata != '') { |
| 119 | - $contactdata = $contactdata . '<br>'; |
|
| 119 | + $contactdata = $contactdata.'<br>'; |
|
| 120 | 120 | } |
| 121 | 121 | if ($oneContact['mail']) { |
| 122 | - $contactdata = $contactdata . $oneContact['mail']; |
|
| 122 | + $contactdata = $contactdata.$oneContact['mail']; |
|
| 123 | 123 | } |
| 124 | 124 | if ($contactdata != '') { |
| 125 | - $contactdata = $contactdata . '<br>'; |
|
| 125 | + $contactdata = $contactdata.'<br>'; |
|
| 126 | 126 | } |
| 127 | 127 | if ($oneContact['phone']) { |
| 128 | - $contactdata = $contactdata . $oneContact['phone']; |
|
| 128 | + $contactdata = $contactdata.$oneContact['phone']; |
|
| 129 | 129 | } |
| 130 | 130 | } |
| 131 | 131 | if ($contactdata == '') { |
@@ -144,11 +144,11 @@ discard block |
||
| 144 | 144 | var instts = []; |
| 145 | 145 | <?php |
| 146 | 146 | foreach (array_keys($instdata) as $iid) { |
| 147 | - echo "instservers['" . $iid . "']='" . $instdata[$iid]['servers']. "';\n"; |
|
| 148 | - echo "instname['" . $iid . "']='" . $instdata[$iid]['name']. "';\n"; |
|
| 149 | - echo "insttype['" . $iid . "']='" . $instdata[$iid]['type']. "';\n"; |
|
| 150 | - echo "instcontact['" . $iid . "']='" . $instdata[$iid]['contacts']. "';\n"; |
|
| 151 | - echo "instts['" . $iid . "']='" . $instdata[$iid]['ts']. "';\n"; |
|
| 147 | + echo "instservers['".$iid."']='".$instdata[$iid]['servers']."';\n"; |
|
| 148 | + echo "instname['".$iid."']='".$instdata[$iid]['name']."';\n"; |
|
| 149 | + echo "insttype['".$iid."']='".$instdata[$iid]['type']."';\n"; |
|
| 150 | + echo "instcontact['".$iid."']='".$instdata[$iid]['contacts']."';\n"; |
|
| 151 | + echo "instts['".$iid."']='".$instdata[$iid]['ts']."';\n"; |
|
| 152 | 152 | } |
| 153 | 153 | ?> |
| 154 | 154 | $(document).ready(function(){ |
@@ -170,18 +170,18 @@ discard block |
||
| 170 | 170 | <div id="instdata_area"> |
| 171 | 171 | <table> |
| 172 | 172 | <tr><th align="left" width="350"> |
| 173 | - <?php echo _('Name');?> |
|
| 173 | + <?php echo _('Name'); ?> |
|
| 174 | 174 | </th><th align="left" width="100"> |
| 175 | - <?php echo _('Type');?> |
|
| 175 | + <?php echo _('Type'); ?> |
|
| 176 | 176 | </th> |
| 177 | 177 | <th align="left" width="200"> |
| 178 | - <?php echo _('Servers');?> |
|
| 178 | + <?php echo _('Servers'); ?> |
|
| 179 | 179 | </th> |
| 180 | 180 | <th align="left" width="200"> |
| 181 | - <?php echo _('Contact data');?> |
|
| 181 | + <?php echo _('Contact data'); ?> |
|
| 182 | 182 | </th> |
| 183 | 183 | <th align="left" width="100"> |
| 184 | - <?php echo _('Timestamp');?> |
|
| 184 | + <?php echo _('Timestamp'); ?> |
|
| 185 | 185 | </th> |
| 186 | 186 | </tr> |
| 187 | 187 | <tr id="toshow"></tr> |
@@ -26,7 +26,7 @@ discard block |
||
| 26 | 26 | */ |
| 27 | 27 | ?> |
| 28 | 28 | <?php |
| 29 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
| 29 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
| 30 | 30 | |
| 31 | 31 | $auth = new \web\lib\admin\Authentication(); |
| 32 | 32 | $deco = new \web\lib\admin\PageDecoration(); |
@@ -70,7 +70,7 @@ discard block |
||
| 70 | 70 | $feds = $user->getAttributes("user:fedadmin"); |
| 71 | 71 | foreach ($feds as $oneFed) { |
| 72 | 72 | $theFed = new \core\Federation($oneFed['value']); |
| 73 | - printf("<h2>" . _("Certificate Information for %s %s")."</h2>", $uiElements->nomenclatureFed, $theFed->name); |
|
| 73 | + printf("<h2>"._("Certificate Information for %s %s")."</h2>", $uiElements->nomenclatureFed, $theFed->name); |
|
| 74 | 74 | foreach ($theFed->listTlsCertificates() as $oneCert) { |
| 75 | 75 | if ($oneCert['STATUS'] == "REQUESTED") { |
| 76 | 76 | $theFed->updateCertificateStatus($oneCert['REQSERIAL']); |
@@ -81,13 +81,13 @@ discard block |
||
| 81 | 81 | foreach ($theFed->listTlsCertificates() as $oneCert) { // fetch list a second time, in case we got a cert |
| 82 | 82 | $status = $oneCert['STATUS']; |
| 83 | 83 | echo "<tr>"; |
| 84 | - echo "<td>" . $oneCert['REQSERIAL'] . "</td><td>" . $oneCert['DN'] . "</td><td>" . $status . "</td><td>" . $oneCert['EXPIRY'] . "</td>"; |
|
| 84 | + echo "<td>".$oneCert['REQSERIAL']."</td><td>".$oneCert['DN']."</td><td>".$status."</td><td>".$oneCert['EXPIRY']."</td>"; |
|
| 85 | 85 | if ($status == "ISSUED") { |
| 86 | 86 | ?> |
| 87 | 87 | <td> |
| 88 | 88 | <form action='inc/showCert.inc.php' onsubmit='popupRedirectWindow(this); return false;' accept-charset='UTF-8' method="POST"> |
| 89 | - <input type="hidden" name="certdata" value="<?php echo $oneCert['CERT'];?>"/> |
|
| 90 | - <button type="submit"><?php echo _("Display");?></button> |
|
| 89 | + <input type="hidden" name="certdata" value="<?php echo $oneCert['CERT']; ?>"/> |
|
| 90 | + <button type="submit"><?php echo _("Display"); ?></button> |
|
| 91 | 91 | </form> |
| 92 | 92 | <td> |
| 93 | 93 | <?php |
@@ -20,7 +20,7 @@ discard block |
||
| 20 | 20 | $deployment = $validator->existingDeploymentManaged($_GET['deployment_id'], $inst); |
| 21 | 21 | $format = ''; |
| 22 | 22 | if (isset($_GET['as']) && $_GET['as']=='csv') { |
| 23 | - $format = 'csv'; |
|
| 23 | + $format = 'csv'; |
|
| 24 | 24 | } |
| 25 | 25 | if (!isset($_POST['stats'])) { |
| 26 | 26 | $backlog = $_GET['backlog']; |
@@ -47,25 +47,25 @@ discard block |
||
| 47 | 47 | |
| 48 | 48 | $userAuthData = $deployment->retrieveStatistics($backlogTime); |
| 49 | 49 | if ($format == 'csv') { |
| 50 | - header('Content-Type: text/csv'); |
|
| 50 | + header('Content-Type: text/csv'); |
|
| 51 | 51 | header('Content-Disposition: attachment; filename="backlog_'.$deployment->identifier.'_'.$backlog.'.csv"'); |
| 52 | - $fp = fopen('php://output', 'w'); |
|
| 53 | - fputcsv($fp, [_("Timestamp (UTC)"), _("Outer-Identity"), _("Result"), _("MAC Address"), |
|
| 54 | - _("Chargeable-User-Identity"), _("AP Identifier"), _("Protocol")], ';', '"', ''); |
|
| 55 | - foreach ($userAuthData as $oneRecord) { |
|
| 56 | - fputcsv($fp, [$oneRecord['activity_time'], $oneRecord['outer_user'], |
|
| 57 | - ($oneRecord['result'] == "OK" ? _("Success") : _("Failure")), |
|
| 58 | - $oneRecord['mac'], $oneRecord['cui'], |
|
| 59 | - $oneRecord['ap_id'], $oneRecord['prot']], ';', '"', ''); |
|
| 52 | + $fp = fopen('php://output', 'w'); |
|
| 53 | + fputcsv($fp, [_("Timestamp (UTC)"), _("Outer-Identity"), _("Result"), _("MAC Address"), |
|
| 54 | + _("Chargeable-User-Identity"), _("AP Identifier"), _("Protocol")], ';', '"', ''); |
|
| 55 | + foreach ($userAuthData as $oneRecord) { |
|
| 56 | + fputcsv($fp, [$oneRecord['activity_time'], $oneRecord['outer_user'], |
|
| 57 | + ($oneRecord['result'] == "OK" ? _("Success") : _("Failure")), |
|
| 58 | + $oneRecord['mac'], $oneRecord['cui'], |
|
| 59 | + $oneRecord['ap_id'], $oneRecord['prot']], ';', '"', ''); |
|
| 60 | 60 | } |
| 61 | - fclose($fp); |
|
| 61 | + fclose($fp); |
|
| 62 | 62 | } else { |
| 63 | 63 | ?> |
| 64 | 64 | |
| 65 | 65 | <h1><?php $tablecaption = _("Deployment Usage Records"); echo $tablecaption; ?></h1> |
| 66 | 66 | <p><?php echo _("(AP Identifier is a /-separated tuple of NAS-Identifier/NAS-IP-Address/NAS-IPv6-Address/Called-Station-Id)"); |
| 67 | - echo _("Protocol is a protocol used between a client and RADIUS server, for TLS it is a /-separated tuple TLS/TLS-Client-Cert-Serial"); |
|
| 68 | - ?></p> |
|
| 67 | + echo _("Protocol is a protocol used between a client and RADIUS server, for TLS it is a /-separated tuple TLS/TLS-Client-Cert-Serial"); |
|
| 68 | + ?></p> |
|
| 69 | 69 | <table class='authrecord'> |
| 70 | 70 | <caption><?php echo $tablecaption;?></caption> |
| 71 | 71 | <tr> |
@@ -9,7 +9,7 @@ discard block |
||
| 9 | 9 | * ****************************************************************************** |
| 10 | 10 | */ |
| 11 | 11 | |
| 12 | -require_once dirname(dirname(dirname(dirname(__FILE__)))) . "/config/_config.php"; |
|
| 12 | +require_once dirname(dirname(dirname(dirname(__FILE__))))."/config/_config.php"; |
|
| 13 | 13 | $auth = new \web\lib\admin\Authentication(); |
| 14 | 14 | $auth->authenticate(); |
| 15 | 15 | $languageInstance = new \core\common\Language(); |
@@ -19,7 +19,7 @@ discard block |
||
| 19 | 19 | if ($editMode == 'fullaccess') { |
| 20 | 20 | $deployment = $validator->existingDeploymentManaged($_GET['deployment_id'], $inst); |
| 21 | 21 | $format = ''; |
| 22 | - if (isset($_GET['as']) && $_GET['as']=='csv') { |
|
| 22 | + if (isset($_GET['as']) && $_GET['as'] == 'csv') { |
|
| 23 | 23 | $format = 'csv'; |
| 24 | 24 | } |
| 25 | 25 | if (!isset($_POST['stats'])) { |
@@ -67,19 +67,19 @@ discard block |
||
| 67 | 67 | echo _("Protocol is a protocol used between a client and RADIUS server, for TLS it is a /-separated tuple TLS/TLS-Client-Cert-Serial"); |
| 68 | 68 | ?></p> |
| 69 | 69 | <table class='authrecord'> |
| 70 | - <caption><?php echo $tablecaption;?></caption> |
|
| 70 | + <caption><?php echo $tablecaption; ?></caption> |
|
| 71 | 71 | <tr> |
| 72 | - <th scope="col"><strong><?php echo _("Timestamp (UTC)");?></strong></th> |
|
| 73 | - <th scope="col"><strong><?php echo _("Outer-Identity");?></strong></th> |
|
| 74 | - <th scope="col"><strong><?php echo _("Result");?></strong></th> |
|
| 75 | - <th scope="col"><strong><?php echo _("MAC Address");?></strong></th> |
|
| 76 | - <th scope="col"><strong><?php echo _("Chargeable-User-Identity");?></strong></th> |
|
| 77 | - <th scope="col"><strong><?php echo _("AP Identifier");?></strong></th> |
|
| 78 | - <th scope="col"><strong><?php echo _("Protocol");?></strong></th> |
|
| 72 | + <th scope="col"><strong><?php echo _("Timestamp (UTC)"); ?></strong></th> |
|
| 73 | + <th scope="col"><strong><?php echo _("Outer-Identity"); ?></strong></th> |
|
| 74 | + <th scope="col"><strong><?php echo _("Result"); ?></strong></th> |
|
| 75 | + <th scope="col"><strong><?php echo _("MAC Address"); ?></strong></th> |
|
| 76 | + <th scope="col"><strong><?php echo _("Chargeable-User-Identity"); ?></strong></th> |
|
| 77 | + <th scope="col"><strong><?php echo _("AP Identifier"); ?></strong></th> |
|
| 78 | + <th scope="col"><strong><?php echo _("Protocol"); ?></strong></th> |
|
| 79 | 79 | </tr> |
| 80 | 80 | <?php |
| 81 | 81 | foreach ($userAuthData as $oneRecord) { |
| 82 | - echo "<tr class='".($oneRecord['result'] == "OK" ? "auth-success" : "auth-fail" )."'>" |
|
| 82 | + echo "<tr class='".($oneRecord['result'] == "OK" ? "auth-success" : "auth-fail")."'>" |
|
| 83 | 83 | . "<td>".$oneRecord['activity_time']."</td>" |
| 84 | 84 | // $oneRecord['CN'] is a simple string, not an array, so disable Scrutinizer type check here |
| 85 | 85 | . "<td>".$oneRecord['outer_user']."</td>" |
@@ -20,11 +20,11 @@ discard block |
||
| 20 | 20 | * <base_url>/copyright.php after deploying the software |
| 21 | 21 | * */ |
| 22 | 22 | |
| 23 | - /** |
|
| 24 | - * This file is used to display a deployment. |
|
| 25 | - * |
|
| 26 | - * @author Maja Gorecka-Wolniewicz <[email protected]> |
|
| 27 | - */ |
|
| 23 | + /** |
|
| 24 | + * This file is used to display a deployment. |
|
| 25 | + * |
|
| 26 | + * @author Maja Gorecka-Wolniewicz <[email protected]> |
|
| 27 | + */ |
|
| 28 | 28 | ?> |
| 29 | 29 | <?php |
| 30 | 30 | |
@@ -342,7 +342,7 @@ discard block |
||
| 342 | 342 | if ($deploymentObject->radsec_cert != NULL) { |
| 343 | 343 | echo "<i>"; |
| 344 | 344 | echo _('If your certificate is close to expiry or you need to create new RADIUS over TLS credentials') . '<br>' . |
| 345 | - _('click on "Renew RADIUS over TLS credentials" button') . '<br>'; |
|
| 345 | + _('click on "Renew RADIUS over TLS credentials" button') . '<br>'; |
|
| 346 | 346 | |
| 347 | 347 | echo '<br/>' . _('You can upload your own CSR to replace default TLS credentials.') . '<br>' . |
| 348 | 348 | _('Click on "Upload CSR to sign my own TLS credentials"'); |
@@ -361,7 +361,7 @@ discard block |
||
| 361 | 361 | <td> |
| 362 | 362 | <?php printf(_("PSK Identity: %s"), "<span id='pskid_data_$depId'>SP".$depId.'-'.$deploymentObject->institution.'</span>'); |
| 363 | 363 | echo copyIcon("pskid_icon_$depId"); |
| 364 | - ?> |
|
| 364 | + ?> |
|
| 365 | 365 | <br> |
| 366 | 366 | <?php printf(_("PSK hexphrase: %s"), "<span id='pskkey_data_$depId'>".$deploymentObject->pskkey."</span>"); |
| 367 | 367 | echo copyIcon("pskkey_icon_$depId"); |
@@ -564,7 +564,7 @@ discard block |
||
| 564 | 564 | <h1><?php echo $tablecaption; ?></h1> |
| 565 | 565 | <h2><?php echo _("5 most recent authentications");?></h2> |
| 566 | 566 | <p><?php echo _("<b>AP Identifier</b> is a /-separated tuple of NAS-Identifier/NAS-IP-Address/NAS-IPv6-Address/Called-Station-Id") .'<br>'; |
| 567 | - echo _("<b>Protocol</b> is a protocol used between a client and RADIUS server, for TLS it is a /-separated tuple TLS/<i>TLS-Client-Cert-Serial</i>"); ?></p> |
|
| 567 | + echo _("<b>Protocol</b> is a protocol used between a client and RADIUS server, for TLS it is a /-separated tuple TLS/<i>TLS-Client-Cert-Serial</i>"); ?></p> |
|
| 568 | 568 | <table class='authrecord'> |
| 569 | 569 | <caption><?php echo $tablecaption;?></caption> |
| 570 | 570 | <tr style='text-align: left;'> |
@@ -585,9 +585,9 @@ discard block |
||
| 585 | 585 | . "<td>".$oneRecord['outer_user']."</td>" |
| 586 | 586 | . "<td>".($oneRecord['result'] == "OK" ? _("Success") : _("Failure"))."</td>" |
| 587 | 587 | . "<td>".$oneRecord['mac']."</td>" |
| 588 | - . "<td>".substr($oneRecord['cui'], 0, 18) |
|
| 589 | - . ($oneRecord['cui']=='' ? "" : "... " . copyIcon("cui_icon_".$deploymentObject->identifier."_$i") |
|
| 590 | - . "<span style='display: none;' id='cui_data_".$deploymentObject->identifier."_$i'>".$oneRecord['cui'].'</span>')."</td>" |
|
| 588 | + . "<td>".substr($oneRecord['cui'], 0, 18) |
|
| 589 | + . ($oneRecord['cui']=='' ? "" : "... " . copyIcon("cui_icon_".$deploymentObject->identifier."_$i") |
|
| 590 | + . "<span style='display: none;' id='cui_data_".$deploymentObject->identifier."_$i'>".$oneRecord['cui'].'</span>')."</td>" |
|
| 591 | 591 | . "<td>".$oneRecord['ap_id']."</td>" |
| 592 | 592 | . "<td>".$oneRecord['prot']."</td>" |
| 593 | 593 | . "</tr>"; |
@@ -627,7 +627,7 @@ discard block |
||
| 627 | 627 | $query = 'inc/deploymentLogs.inc.php?inst_id='.$deploymentObject->institution."&deployment_id=$depId&backlog="; |
| 628 | 628 | ?></h2> |
| 629 | 629 | <?php echo _('You will receive zip file with logs from both RADIUS servers: primary (folder named radius-1) and secondary (folder named radius-2).') . '<br>' . |
| 630 | - _('If no logs are available an empty zip file is provided.');?> |
|
| 630 | + _('If no logs are available an empty zip file is provided.');?> |
|
| 631 | 631 | <div style='height:3px'></div> |
| 632 | 632 | <button name="logs" type="button" onclick="location.href='<?php echo $query;?>1';"><?php echo _('Today');?> |
| 633 | 633 | </button> |
@@ -659,9 +659,9 @@ discard block |
||
| 659 | 659 | foreach (array($dsp->host1_v4, $dsp->host2_v4) as $host) { |
| 660 | 660 | $connection = @fsockopen($host, \config\Master::MANAGEDSP['radiusconfigport']); |
| 661 | 661 | if (is_resource($connection)) { |
| 662 | - fclose($connection); |
|
| 662 | + fclose($connection); |
|
| 663 | 663 | } else { |
| 664 | - return false; |
|
| 664 | + return false; |
|
| 665 | 665 | } |
| 666 | 666 | } |
| 667 | 667 | return true; |
@@ -683,7 +683,7 @@ discard block |
||
| 683 | 683 | </button> |
| 684 | 684 | <span style='color: red;'> |
| 685 | 685 | <?php if ($hasMail == 0) { |
| 686 | - echo _("Helpdesk mail address is required but missing!"); |
|
| 686 | + echo _("Helpdesk mail address is required but missing!"); |
|
| 687 | 687 | } |
| 688 | 688 | ?> |
| 689 | 689 | </span> |
@@ -95,7 +95,7 @@ discard block |
||
| 95 | 95 | |
| 96 | 96 | <?php |
| 97 | 97 | function copyIcon($target) { |
| 98 | - return '<img class="copy_link" id="'.$target.'" src="../resources/images/icons/Tabler/copy.svg" title="'. _("Copy to clipboard").'" >'; |
|
| 98 | + return '<img class="copy_link" id="'.$target.'" src="../resources/images/icons/Tabler/copy.svg" title="'._("Copy to clipboard").'" >'; |
|
| 99 | 99 | } |
| 100 | 100 | |
| 101 | 101 | /** |
@@ -104,7 +104,7 @@ discard block |
||
| 104 | 104 | * @param \core\DeploymentManaged $deploymentObject the deployment to work with |
| 105 | 105 | * @throws Exception |
| 106 | 106 | */ |
| 107 | -function displayDeploymentPropertyWidget(&$deploymentObject, $errormsg=[]) { |
|
| 107 | +function displayDeploymentPropertyWidget(&$deploymentObject, $errormsg = []) { |
|
| 108 | 108 | // RADIUS status icons |
| 109 | 109 | $depId = $deploymentObject->identifier; |
| 110 | 110 | $radiusMessages = [ |
@@ -114,7 +114,7 @@ discard block |
||
| 114 | 114 | $radius_status = array(); |
| 115 | 115 | $radius_status[0] = $deploymentObject->radius_status_1; |
| 116 | 116 | $radius_status[1] = $deploymentObject->radius_status_2; |
| 117 | - $cacert = file_get_contents(ROOT . "/config/ManagedSPCerts/eduroamSP-CA.pem"); |
|
| 117 | + $cacert = file_get_contents(ROOT."/config/ManagedSPCerts/eduroamSP-CA.pem"); |
|
| 118 | 118 | $retry = $deploymentObject->checkRADIUSHostandConfigDaemon(); |
| 119 | 119 | $isradiusready = radius_ready($deploymentObject); |
| 120 | 120 | if (is_array($retry)) { |
@@ -126,11 +126,11 @@ discard block |
||
| 126 | 126 | } |
| 127 | 127 | ?> |
| 128 | 128 | <div style='display: table-row_id;'> |
| 129 | - <div class='profilebox' id="profilebox_<?php echo $depId;?>" style='display: table-cell;'> |
|
| 129 | + <div class='profilebox' id="profilebox_<?php echo $depId; ?>" style='display: table-cell;'> |
|
| 130 | 130 | <h2><?php |
| 131 | 131 | switch ($deploymentObject->consortium) { |
| 132 | 132 | case "eduroam": |
| 133 | - $displayname = config\ConfAssistant::CONSORTIUM['name'] . " " . core\DeploymentManaged::PRODUCTNAME. ": SP$depId-".$deploymentObject->institution; |
|
| 133 | + $displayname = config\ConfAssistant::CONSORTIUM['name']." ".core\DeploymentManaged::PRODUCTNAME.": SP$depId-".$deploymentObject->institution; |
|
| 134 | 134 | break; |
| 135 | 135 | case "OpenRoaming": |
| 136 | 136 | $displayname = "OpenRoaming ANP"; |
@@ -138,7 +138,7 @@ discard block |
||
| 138 | 138 | default: |
| 139 | 139 | throw new Exception("We are supposed to operate on a roaming consortium we don't know."); |
| 140 | 140 | } |
| 141 | - echo $displayname . " (<span style='color:" . ( $deploymentObject->status == \core\AbstractDeployment::INACTIVE ? "red;'>" . _("inactive") : "green;'>" . _("active") ) . "</span>)"; |
|
| 141 | + echo $displayname." (<span style='color:".($deploymentObject->status == \core\AbstractDeployment::INACTIVE ? "red;'>"._("inactive") : "green;'>"._("active"))."</span>)"; |
|
| 142 | 142 | ?></h2> |
| 143 | 143 | <table class="deployments"> |
| 144 | 144 | <caption><?php echo _("Deployment Details"); ?></caption> |
@@ -171,9 +171,9 @@ discard block |
||
| 171 | 171 | <td> |
| 172 | 172 | <?php |
| 173 | 173 | if ($deploymentObject->status) { |
| 174 | - echo "<img src='" . $radiusMessages[$deploymentObject->radius_status_1]['icon'] . |
|
| 175 | - "' alt='" . $radiusMessages[$deploymentObject->radius_status_1]['text'] . |
|
| 176 | - "' title='" . $radiusMessages[$deploymentObject->radius_status_1]['text'] . "' class='cat-icon'>"; |
|
| 174 | + echo "<img src='".$radiusMessages[$deploymentObject->radius_status_1]['icon']. |
|
| 175 | + "' alt='".$radiusMessages[$deploymentObject->radius_status_1]['text']. |
|
| 176 | + "' title='".$radiusMessages[$deploymentObject->radius_status_1]['text']."' class='cat-icon'>"; |
|
| 177 | 177 | } |
| 178 | 178 | ?> |
| 179 | 179 | </td> |
@@ -203,9 +203,9 @@ discard block |
||
| 203 | 203 | <td> |
| 204 | 204 | <?php |
| 205 | 205 | if ($deploymentObject->status && $deploymentObject->radius_status_2) { |
| 206 | - echo "<img src='" . $radiusMessages[$deploymentObject->radius_status_2]['icon'] . |
|
| 207 | - "' alt='" . $radiusMessages[$deploymentObject->radius_status_2]['text'] . |
|
| 208 | - "' title='" . $radiusMessages[$deploymentObject->radius_status_2]['text'] . "' class='cat-icon'>"; |
|
| 206 | + echo "<img src='".$radiusMessages[$deploymentObject->radius_status_2]['icon']. |
|
| 207 | + "' alt='".$radiusMessages[$deploymentObject->radius_status_2]['text']. |
|
| 208 | + "' title='".$radiusMessages[$deploymentObject->radius_status_2]['text']."' class='cat-icon'>"; |
|
| 209 | 209 | } |
| 210 | 210 | ?> |
| 211 | 211 | </td> |
@@ -213,7 +213,7 @@ discard block |
||
| 213 | 213 | <tr style="vertical-align:bottom"> |
| 214 | 214 | <td><?php echo _("RADIUS shared secret for both servers"); ?></td> |
| 215 | 215 | <td> |
| 216 | - <span id="shared_data_<?php echo $deploymentObject->identifier;?>"><?php echo $deploymentObject->secret;?></span> |
|
| 216 | + <span id="shared_data_<?php echo $deploymentObject->identifier; ?>"><?php echo $deploymentObject->secret; ?></span> |
|
| 217 | 217 | <?php echo copyIcon("shared_icon_".$deploymentObject->identifier) ?> |
| 218 | 218 | </td> |
| 219 | 219 | <td></td> |
@@ -249,9 +249,9 @@ discard block |
||
| 249 | 249 | <td> |
| 250 | 250 | <?php |
| 251 | 251 | if ($deploymentObject->status) { |
| 252 | - echo "<img src='" . $radiusMessages[$deploymentObject->radius_status_1]['icon'] . |
|
| 253 | - "' alt='" . $radiusMessages[$deploymentObject->radius_status_1]['text'] . |
|
| 254 | - "' title='" . $radiusMessages[$deploymentObject->radius_status_1]['text'] . "' class='cat-icon'>"; |
|
| 252 | + echo "<img src='".$radiusMessages[$deploymentObject->radius_status_1]['icon']. |
|
| 253 | + "' alt='".$radiusMessages[$deploymentObject->radius_status_1]['text']. |
|
| 254 | + "' title='".$radiusMessages[$deploymentObject->radius_status_1]['text']."' class='cat-icon'>"; |
|
| 255 | 255 | } |
| 256 | 256 | ?> |
| 257 | 257 | </td> |
@@ -281,9 +281,9 @@ discard block |
||
| 281 | 281 | <td> |
| 282 | 282 | <?php |
| 283 | 283 | if ($deploymentObject->status && $deploymentObject->radius_status_2) { |
| 284 | - echo "<img src='" . $radiusMessages[$deploymentObject->radius_status_2]['icon'] . |
|
| 285 | - "' alt='" . $radiusMessages[$deploymentObject->radius_status_2]['text'] . |
|
| 286 | - "' title='" . $radiusMessages[$deploymentObject->radius_status_2]['text'] . "' class='cat-icon'>"; |
|
| 284 | + echo "<img src='".$radiusMessages[$deploymentObject->radius_status_2]['icon']. |
|
| 285 | + "' alt='".$radiusMessages[$deploymentObject->radius_status_2]['text']. |
|
| 286 | + "' title='".$radiusMessages[$deploymentObject->radius_status_2]['text']."' class='cat-icon'>"; |
|
| 287 | 287 | } |
| 288 | 288 | ?> |
| 289 | 289 | </td> |
@@ -299,27 +299,27 @@ discard block |
||
| 299 | 299 | <td> |
| 300 | 300 | <?php |
| 301 | 301 | if ($deploymentObject->radsec_priv == '') { |
| 302 | - echo _('The client certificate was created using an uploaded CSR, the private key is not available') . '<br><br>'; |
|
| 302 | + echo _('The client certificate was created using an uploaded CSR, the private key is not available').'<br><br>'; |
|
| 303 | 303 | } |
| 304 | - echo _('Subject:') . ' ' . $data['name'] . '<br>'; |
|
| 305 | - echo _('Serial number:') . ' ' . $data['serialNumberHex'] . '<br>'; |
|
| 306 | - $dleft = floor(($data['validTo_time_t']-time())/(24*60*60)); |
|
| 304 | + echo _('Subject:').' '.$data['name'].'<br>'; |
|
| 305 | + echo _('Serial number:').' '.$data['serialNumberHex'].'<br>'; |
|
| 306 | + $dleft = floor(($data['validTo_time_t'] - time()) / (24 * 60 * 60)); |
|
| 307 | 307 | if ($dleft < 30) { |
| 308 | 308 | echo '<font color="red">'; |
| 309 | 309 | } |
| 310 | - echo _('Not valid after:') . ' '. date_create_from_format('ymdGis', substr($data['validTo'], 0, -1))->format('Y-m-d H:i:s') . ' UTC'; |
|
| 310 | + echo _('Not valid after:').' '.date_create_from_format('ymdGis', substr($data['validTo'], 0, -1))->format('Y-m-d H:i:s').' UTC'; |
|
| 311 | 311 | if ($dleft > 2) { |
| 312 | - echo '<br>' . _('Number of days to expiry:') . ' ' . $dleft; |
|
| 312 | + echo '<br>'._('Number of days to expiry:').' '.$dleft; |
|
| 313 | 313 | } else { |
| 314 | - echo '<br>' . _('If you are using RADIUS over TLS you should urgently renew your credentials') . '!'; |
|
| 314 | + echo '<br>'._('If you are using RADIUS over TLS you should urgently renew your credentials').'!'; |
|
| 315 | 315 | } |
| 316 | 316 | if ($dleft < 30) { echo '</font>'; } |
| 317 | 317 | ?></td> |
| 318 | 318 | </tr><tr><td></td> |
| 319 | 319 | |
| 320 | 320 | <td> |
| 321 | - <span style="display: none;" id="cert_data_<?php echo $depId;?>"><?php echo $deploymentObject->radsec_cert;?></span> |
|
| 322 | - <span style="display: none;" id="ca_cert_data_<?php echo $depId;?>"><?php echo $cacert;?></span> |
|
| 321 | + <span style="display: none;" id="cert_data_<?php echo $depId; ?>"><?php echo $deploymentObject->radsec_cert; ?></span> |
|
| 322 | + <span style="display: none;" id="ca_cert_data_<?php echo $depId; ?>"><?php echo $cacert; ?></span> |
|
| 323 | 323 | <?php if ($deploymentObject->radsec_priv != '') { |
| 324 | 324 | echo _("private key").copyIcon("priv_key_icon_$depId")." "; |
| 325 | 325 | echo '<span style="display: none;" id="priv_key_data_'.$depId.'">'.$deploymentObject->radsec_priv.'</span>'; |
@@ -330,7 +330,7 @@ discard block |
||
| 330 | 330 | echo _("CA certificate").copyIcon("ca_cert_icon_$depId"); |
| 331 | 331 | ?> |
| 332 | 332 | <br/> |
| 333 | - <button name="sendzip" onclick="location.href='inc/sendZip.inc.php?inst_id=<?php echo $deploymentObject->institution;?>&dep_id=<?php echo $depId?>'" type="button"><?php echo _('download ZIP-file with full data');?></button> |
|
| 333 | + <button name="sendzip" onclick="location.href='inc/sendZip.inc.php?inst_id=<?php echo $deploymentObject->institution; ?>&dep_id=<?php echo $depId?>'" type="button"><?php echo _('download ZIP-file with full data'); ?></button> |
|
| 334 | 334 | |
| 335 | 335 | </td> |
| 336 | 336 | <td></td> |
@@ -341,10 +341,10 @@ discard block |
||
| 341 | 341 | <?php |
| 342 | 342 | if ($deploymentObject->radsec_cert != NULL) { |
| 343 | 343 | echo "<i>"; |
| 344 | - echo _('If your certificate is close to expiry or you need to create new RADIUS over TLS credentials') . '<br>' . |
|
| 345 | - _('click on "Renew RADIUS over TLS credentials" button') . '<br>'; |
|
| 344 | + echo _('If your certificate is close to expiry or you need to create new RADIUS over TLS credentials').'<br>'. |
|
| 345 | + _('click on "Renew RADIUS over TLS credentials" button').'<br>'; |
|
| 346 | 346 | |
| 347 | - echo '<br/>' . _('You can upload your own CSR to replace default TLS credentials.') . '<br>' . |
|
| 347 | + echo '<br/>'._('You can upload your own CSR to replace default TLS credentials.').'<br>'. |
|
| 348 | 348 | _('Click on "Upload CSR to sign my own TLS credentials"'); |
| 349 | 349 | echo "</i>"; |
| 350 | 350 | } |
@@ -379,7 +379,7 @@ discard block |
||
| 379 | 379 | |
| 380 | 380 | ?> |
| 381 | 381 | <tr></tr> |
| 382 | - <tr><th colspan="2"><?php echo _('Additional deployment settings');?></th></tr> |
|
| 382 | + <tr><th colspan="2"><?php echo _('Additional deployment settings'); ?></th></tr> |
|
| 383 | 383 | <tr> |
| 384 | 384 | <td> |
| 385 | 385 | <?php |
@@ -459,12 +459,12 @@ discard block |
||
| 459 | 459 | if (array_key_exists('FAILURE', $res) && $res['FAILURE'] > 0) { |
| 460 | 460 | echo '<br>'; |
| 461 | 461 | if ($res['FAILURE'] == 2) { |
| 462 | - echo ' <span style="color: red;">' . _("Activation failure.") . '</span>'; |
|
| 462 | + echo ' <span style="color: red;">'._("Activation failure.").'</span>'; |
|
| 463 | 463 | } else { |
| 464 | 464 | if (isset($_GET['res'][1]) && $_GET['res']['1'] == 'FAILURE') { |
| 465 | - echo ' <span style="color: red;">' . _("Activation failure for your primary RADIUS server.") . '</span>'; |
|
| 465 | + echo ' <span style="color: red;">'._("Activation failure for your primary RADIUS server.").'</span>'; |
|
| 466 | 466 | } else { |
| 467 | - echo ' <span style="color: red;">' . _("Activation failure for your backup RADIUS server.") . '</span>'; |
|
| 467 | + echo ' <span style="color: red;">'._("Activation failure for your backup RADIUS server.").'</span>'; |
|
| 468 | 468 | } |
| 469 | 469 | } |
| 470 | 470 | } |
@@ -491,12 +491,12 @@ discard block |
||
| 491 | 491 | if (array_key_exists('FAILURE', $res) && $res['FAILURE'] > 0) { |
| 492 | 492 | echo '<br>'; |
| 493 | 493 | if ($res['FAILURE'] == 2) { |
| 494 | - echo ' <span style="color: red;">' . _("Failure during deactivation, your request is queued for handling") . '</span>'; |
|
| 494 | + echo ' <span style="color: red;">'._("Failure during deactivation, your request is queued for handling").'</span>'; |
|
| 495 | 495 | } else { |
| 496 | 496 | if (isset($_GET['res'][1]) && $_GET['res']['1'] == 'FAILURE') { |
| 497 | - echo ' <span style="color: red;">' . _("Deactivation failure for your primary RADIUS server, your request is queued.") . '</span>'; |
|
| 497 | + echo ' <span style="color: red;">'._("Deactivation failure for your primary RADIUS server, your request is queued.").'</span>'; |
|
| 498 | 498 | } else { |
| 499 | - echo ' <span style="color: red;">' . _("Deactivation failure for your backup RADIUS server, your request is queued.") . '</span>'; |
|
| 499 | + echo ' <span style="color: red;">'._("Deactivation failure for your backup RADIUS server, your request is queued.").'</span>'; |
|
| 500 | 500 | } |
| 501 | 501 | } |
| 502 | 502 | } |
@@ -544,7 +544,7 @@ discard block |
||
| 544 | 544 | </div> |
| 545 | 545 | <?php |
| 546 | 546 | if (!$isradiusready) { |
| 547 | - echo '<p>'. _("We are not able to handle a new configuration request requiring contact with RADIUS servers now.") . '<br>' . _("Check later."); |
|
| 547 | + echo '<p>'._("We are not able to handle a new configuration request requiring contact with RADIUS servers now.").'<br>'._("Check later."); |
|
| 548 | 548 | |
| 549 | 549 | } |
| 550 | 550 | if (count($errormsg) > 0 && array_key_exists($deploymentObject->identifier, $errormsg)) { |
@@ -560,38 +560,38 @@ discard block |
||
| 560 | 560 | </div> |
| 561 | 561 | <div style='width:20px;'></div> <!-- QR code space, reserved --> |
| 562 | 562 | <div style='display: table-cell; min-width:200px;'> |
| 563 | - <?php $tablecaption = _("Hotspot Usage Statistics");?> |
|
| 563 | + <?php $tablecaption = _("Hotspot Usage Statistics"); ?> |
|
| 564 | 564 | <h1><?php echo $tablecaption; ?></h1> |
| 565 | - <h2><?php echo _("5 most recent authentications");?></h2> |
|
| 566 | - <p><?php echo _("<b>AP Identifier</b> is a /-separated tuple of NAS-Identifier/NAS-IP-Address/NAS-IPv6-Address/Called-Station-Id") .'<br>'; |
|
| 565 | + <h2><?php echo _("5 most recent authentications"); ?></h2> |
|
| 566 | + <p><?php echo _("<b>AP Identifier</b> is a /-separated tuple of NAS-Identifier/NAS-IP-Address/NAS-IPv6-Address/Called-Station-Id").'<br>'; |
|
| 567 | 567 | echo _("<b>Protocol</b> is a protocol used between a client and RADIUS server, for TLS it is a /-separated tuple TLS/<i>TLS-Client-Cert-Serial</i>"); ?></p> |
| 568 | 568 | <table class='authrecord'> |
| 569 | - <caption><?php echo $tablecaption;?></caption> |
|
| 569 | + <caption><?php echo $tablecaption; ?></caption> |
|
| 570 | 570 | <tr style='text-align: left;'> |
| 571 | - <th scope="col"><strong><?php echo _("Timestamp (UTC)");?></strong></th> |
|
| 572 | - <th scope="col"><strong><?php echo _("Outer-Identity");?></strong></th> |
|
| 573 | - <th scope="col"><strong><?php echo _("Result");?></strong></th> |
|
| 574 | - <th scope="col"><strong><?php echo _("MAC Address");?></strong></th> |
|
| 575 | - <th scope="col"><strong><?php echo _("Chargeable-User-Identity");?></strong></th> |
|
| 576 | - <th scope="col"><strong><?php echo _("AP Identifier");?></strong></th> |
|
| 577 | - <th scope="col"><strong><?php echo _("Protocol");?></strong></th> |
|
| 571 | + <th scope="col"><strong><?php echo _("Timestamp (UTC)"); ?></strong></th> |
|
| 572 | + <th scope="col"><strong><?php echo _("Outer-Identity"); ?></strong></th> |
|
| 573 | + <th scope="col"><strong><?php echo _("Result"); ?></strong></th> |
|
| 574 | + <th scope="col"><strong><?php echo _("MAC Address"); ?></strong></th> |
|
| 575 | + <th scope="col"><strong><?php echo _("Chargeable-User-Identity"); ?></strong></th> |
|
| 576 | + <th scope="col"><strong><?php echo _("AP Identifier"); ?></strong></th> |
|
| 577 | + <th scope="col"><strong><?php echo _("Protocol"); ?></strong></th> |
|
| 578 | 578 | </tr> |
| 579 | 579 | <?php |
| 580 | - $userAuthData = $deploymentObject->retrieveStatistics(0,5); |
|
| 580 | + $userAuthData = $deploymentObject->retrieveStatistics(0, 5); |
|
| 581 | 581 | $i = 0; |
| 582 | 582 | foreach ($userAuthData as $oneRecord) { |
| 583 | - echo "<tr class='".($oneRecord['result'] == "OK" ? "auth-success" : "auth-fail" )."'>" |
|
| 583 | + echo "<tr class='".($oneRecord['result'] == "OK" ? "auth-success" : "auth-fail")."'>" |
|
| 584 | 584 | . "<td>".$oneRecord['activity_time']."</td>" |
| 585 | 585 | . "<td>".$oneRecord['outer_user']."</td>" |
| 586 | 586 | . "<td>".($oneRecord['result'] == "OK" ? _("Success") : _("Failure"))."</td>" |
| 587 | 587 | . "<td>".$oneRecord['mac']."</td>" |
| 588 | 588 | . "<td>".substr($oneRecord['cui'], 0, 18) |
| 589 | - . ($oneRecord['cui']=='' ? "" : "... " . copyIcon("cui_icon_".$deploymentObject->identifier."_$i") |
|
| 589 | + . ($oneRecord['cui'] == '' ? "" : "... ".copyIcon("cui_icon_".$deploymentObject->identifier."_$i") |
|
| 590 | 590 | . "<span style='display: none;' id='cui_data_".$deploymentObject->identifier."_$i'>".$oneRecord['cui'].'</span>')."</td>" |
| 591 | 591 | . "<td>".$oneRecord['ap_id']."</td>" |
| 592 | 592 | . "<td>".$oneRecord['prot']."</td>" |
| 593 | 593 | . "</tr>"; |
| 594 | - if ($oneRecord['cui']!='') { |
|
| 594 | + if ($oneRecord['cui'] != '') { |
|
| 595 | 595 | $i++; |
| 596 | 596 | } |
| 597 | 597 | } |
@@ -613,11 +613,11 @@ discard block |
||
| 613 | 613 | echo _('Get statistics as CSV file:').' '; |
| 614 | 614 | $query = 'inc/deploymentStats.inc.php?inst_id='.$deploymentObject->institution."&deployment_id=$depId&as=csv&backlog="; |
| 615 | 615 | ?> |
| 616 | - <button name="sendcsv" type="button" onclick="location.href='<?php echo $query;?>WEEK';"><?php echo _('Last week');?> |
|
| 616 | + <button name="sendcsv" type="button" onclick="location.href='<?php echo $query; ?>WEEK';"><?php echo _('Last week'); ?> |
|
| 617 | 617 | </button> |
| 618 | - <button name="sendcsv" type="button" onclick="location.href='<?php echo $query;?>MONTH';"><?php echo _('Last 30 days');?> |
|
| 618 | + <button name="sendcsv" type="button" onclick="location.href='<?php echo $query; ?>MONTH';"><?php echo _('Last 30 days'); ?> |
|
| 619 | 619 | </button> |
| 620 | - <button name="sendcsv" type="button" onclick="location.href='<?php echo $query;?>FULL';"><?php echo _('Last 6 months');?> |
|
| 620 | + <button name="sendcsv" type="button" onclick="location.href='<?php echo $query; ?>FULL';"><?php echo _('Last 6 months'); ?> |
|
| 621 | 621 | </button> |
| 622 | 622 | </div><!-- statistics space --> |
| 623 | 623 | <div style='height:5px'></div> |
@@ -626,14 +626,14 @@ discard block |
||
| 626 | 626 | <h2><?php echo _('To get detailed logs from RADIUS sites click a button below.'); |
| 627 | 627 | $query = 'inc/deploymentLogs.inc.php?inst_id='.$deploymentObject->institution."&deployment_id=$depId&backlog="; |
| 628 | 628 | ?></h2> |
| 629 | - <?php echo _('You will receive zip file with logs from both RADIUS servers: primary (folder named radius-1) and secondary (folder named radius-2).') . '<br>' . |
|
| 630 | - _('If no logs are available an empty zip file is provided.');?> |
|
| 629 | + <?php echo _('You will receive zip file with logs from both RADIUS servers: primary (folder named radius-1) and secondary (folder named radius-2).').'<br>'. |
|
| 630 | + _('If no logs are available an empty zip file is provided.'); ?> |
|
| 631 | 631 | <div style='height:3px'></div> |
| 632 | - <button name="logs" type="button" onclick="location.href='<?php echo $query;?>1';"><?php echo _('Today');?> |
|
| 632 | + <button name="logs" type="button" onclick="location.href='<?php echo $query; ?>1';"><?php echo _('Today'); ?> |
|
| 633 | 633 | </button> |
| 634 | - <button name="logs" type="button" onclick="location.href='<?php echo $query;?>2';"><?php echo _('Last 2 days');?> |
|
| 634 | + <button name="logs" type="button" onclick="location.href='<?php echo $query; ?>2';"><?php echo _('Last 2 days'); ?> |
|
| 635 | 635 | </button> |
| 636 | - <button name="logs" type="button" onclick="location.href='<?php echo $query;?>7';"><?php echo _('Last 7 days');?> |
|
| 636 | + <button name="logs" type="button" onclick="location.href='<?php echo $query; ?>7';"><?php echo _('Last 7 days'); ?> |
|
| 637 | 637 | </button> |
| 638 | 638 | </div> |
| 639 | 639 | </div> |
@@ -681,7 +681,7 @@ discard block |
||
| 681 | 681 | <div> |
| 682 | 682 | <input type="hidden" name="consortium" value="eduroam"/> |
| 683 | 683 | <button type='submit' <?php echo ($hasMail > 0 ? "" : "disabled"); ?> name='profile_action' value='new'> |
| 684 | - <?php echo sprintf(_("Add %s deployment ..."), \config\ConfAssistant::CONSORTIUM['name'] . " " . \core\DeploymentManaged::PRODUCTNAME); ?> |
|
| 684 | + <?php echo sprintf(_("Add %s deployment ..."), \config\ConfAssistant::CONSORTIUM['name']." ".\core\DeploymentManaged::PRODUCTNAME); ?> |
|
| 685 | 685 | </button> |
| 686 | 686 | <span style='color: red;'> |
| 687 | 687 | <?php if ($hasMail == 0) { |
@@ -5,37 +5,37 @@ discard block |
||
| 5 | 5 | $opn = $vlans = ''; |
| 6 | 6 | $guest_vlan = 0; |
| 7 | 7 | if ( isset($_POST['enc']) && $_POST['enc'] != '' && ($enc=base64_decode($_POST['enc'], true)) !== false ) { |
| 8 | - $decrypted = openssl_decrypt($enc, "CHACHA20", SERVER_SECRET, 0, SERVER_IV); |
|
| 9 | - if ($decrypted === false) { |
|
| 10 | - echo "FAILURE"; |
|
| 11 | - exit; |
|
| 12 | - } else { |
|
| 13 | - parse_str($decrypted, $darr); |
|
| 14 | - if (!isset($darr['token']) || $darr['token'] != SERVER_TOKEN) { |
|
| 15 | - echo "FAILURE"; |
|
| 16 | - exit; |
|
| 17 | - } |
|
| 18 | - } |
|
| 8 | + $decrypted = openssl_decrypt($enc, "CHACHA20", SERVER_SECRET, 0, SERVER_IV); |
|
| 9 | + if ($decrypted === false) { |
|
| 10 | + echo "FAILURE"; |
|
| 11 | + exit; |
|
| 12 | + } else { |
|
| 13 | + parse_str($decrypted, $darr); |
|
| 14 | + if (!isset($darr['token']) || $darr['token'] != SERVER_TOKEN) { |
|
| 15 | + echo "FAILURE"; |
|
| 16 | + exit; |
|
| 17 | + } |
|
| 18 | + } |
|
| 19 | 19 | } |
| 20 | 20 | # when a request contains logid and backlog ";s:11:"DEBUG-11-52";s:7:"backlog";s:1:"7";} |
| 21 | 21 | if ( isset($darr['logid']) && isset($darr['backlog']) && isset($darr['iv']) ) { |
| 22 | - if (substr($darr['logid'], 0, 5) == 'DEBUG') { |
|
| 23 | - $logid = substr($darr['logid'], 6); |
|
| 22 | + if (substr($darr['logid'], 0, 5) == 'DEBUG') { |
|
| 23 | + $logid = substr($darr['logid'], 6); |
|
| 24 | 24 | } |
| 25 | - $iv = $darr['iv']; |
|
| 26 | - $res = cat_socket(implode(':', array($logid, $darr['backlog']))); |
|
| 27 | - $cnt = 0; |
|
| 28 | - if (substr($res, 0, strlen(ZIPDIR)) == ZIPDIR) { |
|
| 29 | - $content = file_get_contents($res); |
|
| 25 | + $iv = $darr['iv']; |
|
| 26 | + $res = cat_socket(implode(':', array($logid, $darr['backlog']))); |
|
| 27 | + $cnt = 0; |
|
| 28 | + if (substr($res, 0, strlen(ZIPDIR)) == ZIPDIR) { |
|
| 29 | + $content = file_get_contents($res); |
|
| 30 | 30 | $encrypted = openssl_encrypt(SERVER_TOKEN . $content, "CHACHA20", SERVER_SECRET, 0, $iv); |
| 31 | - header('Content-Type: application/octet-stream'); |
|
| 31 | + header('Content-Type: application/octet-stream'); |
|
| 32 | 32 | header("Content-Transfer-Encoding: binary"); |
| 33 | - echo "ZIPDATA:$encrypted"; |
|
| 34 | - } |
|
| 35 | - if (file_exists($res)) { |
|
| 36 | - unlink($res); |
|
| 37 | - } |
|
| 38 | - exit; |
|
| 33 | + echo "ZIPDATA:$encrypted"; |
|
| 34 | + } |
|
| 35 | + if (file_exists($res)) { |
|
| 36 | + unlink($res); |
|
| 37 | + } |
|
| 38 | + exit; |
|
| 39 | 39 | } |
| 40 | 40 | # MUST provide: deployment_id, inst_id |
| 41 | 41 | # and port, secret, pskkey, country or torevoke |
@@ -44,33 +44,33 @@ discard block |
||
| 44 | 44 | isset($darr['instid']) && isset($darr['deploymentid']) && |
| 45 | 45 | (isset($darr['port']) && isset($darr['secret']) && isset($darr['pskkey']) && isset($darr['country']) || |
| 46 | 46 | isset($darr['torevoke']))) { |
| 47 | - if (isset($darr['remove'])) { |
|
| 47 | + if (isset($darr['remove'])) { |
|
| 48 | 48 | $remove = 1; |
| 49 | - } else { |
|
| 49 | + } else { |
|
| 50 | 50 | if (isset($darr['operatorname'])) { |
| 51 | - $opn = trim($darr['operatorname']); |
|
| 51 | + $opn = trim($darr['operatorname']); |
|
| 52 | 52 | } |
| 53 | 53 | if (isset($darr['vlan']) && isset($darr['realmforvlan']) && |
| 54 | 54 | is_array($darr['realmforvlan'])) { |
| 55 | - $vlans = $darr['vlan'] . '#' . implode('#', $darr['realmforvlan']); |
|
| 55 | + $vlans = $darr['vlan'] . '#' . implode('#', $darr['realmforvlan']); |
|
| 56 | 56 | } |
| 57 | 57 | if (isset($darr['guest_vlan'])) { |
| 58 | - $guest_vlan = $darr['guest_vlan']; |
|
| 58 | + $guest_vlan = $darr['guest_vlan']; |
|
| 59 | + } |
|
| 60 | + } |
|
| 61 | + if (isset($darr['torevoke'])) { |
|
| 62 | + $el = explode('#', $darr['torevoke']); |
|
| 63 | + $res = cat_socket(implode(':', array($darr['instid'], $darr['deploymentid'], $el[0], $el[1]))); |
|
| 64 | + } else { |
|
| 65 | + # arguments 5-7 are Base64 encoded |
|
| 66 | + $res = cat_socket(implode(':', array($darr['country'], |
|
| 67 | + $darr['instid'], $darr['deploymentid'], |
|
| 68 | + $darr['port'], |
|
| 69 | + base64_encode($darr['secret']), |
|
| 70 | + base64_encode($opn), |
|
| 71 | + base64_encode($vlans), base64_encode($darr['pskkey']), $guest_vlan, $remove))); |
|
| 59 | 72 | } |
| 60 | - } |
|
| 61 | - if (isset($darr['torevoke'])) { |
|
| 62 | - $el = explode('#', $darr['torevoke']); |
|
| 63 | - $res = cat_socket(implode(':', array($darr['instid'], $darr['deploymentid'], $el[0], $el[1]))); |
|
| 64 | - } else { |
|
| 65 | - # arguments 5-7 are Base64 encoded |
|
| 66 | - $res = cat_socket(implode(':', array($darr['country'], |
|
| 67 | - $darr['instid'], $darr['deploymentid'], |
|
| 68 | - $darr['port'], |
|
| 69 | - base64_encode($darr['secret']), |
|
| 70 | - base64_encode($opn), |
|
| 71 | - base64_encode($vlans), base64_encode($darr['pskkey']), $guest_vlan, $remove))); |
|
| 72 | - } |
|
| 73 | - echo $res; |
|
| 73 | + echo $res; |
|
| 74 | 74 | } else { |
| 75 | - echo "FAILURE"; |
|
| 75 | + echo "FAILURE"; |
|
| 76 | 76 | } |
@@ -4,7 +4,7 @@ discard block |
||
| 4 | 4 | $remove = 0; |
| 5 | 5 | $opn = $vlans = ''; |
| 6 | 6 | $guest_vlan = 0; |
| 7 | -if ( isset($_POST['enc']) && $_POST['enc'] != '' && ($enc=base64_decode($_POST['enc'], true)) !== false ) { |
|
| 7 | +if (isset($_POST['enc']) && $_POST['enc'] != '' && ($enc = base64_decode($_POST['enc'], true)) !== false) { |
|
| 8 | 8 | $decrypted = openssl_decrypt($enc, "CHACHA20", SERVER_SECRET, 0, SERVER_IV); |
| 9 | 9 | if ($decrypted === false) { |
| 10 | 10 | echo "FAILURE"; |
@@ -18,7 +18,7 @@ discard block |
||
| 18 | 18 | } |
| 19 | 19 | } |
| 20 | 20 | # when a request contains logid and backlog ";s:11:"DEBUG-11-52";s:7:"backlog";s:1:"7";} |
| 21 | -if ( isset($darr['logid']) && isset($darr['backlog']) && isset($darr['iv']) ) { |
|
| 21 | +if (isset($darr['logid']) && isset($darr['backlog']) && isset($darr['iv'])) { |
|
| 22 | 22 | if (substr($darr['logid'], 0, 5) == 'DEBUG') { |
| 23 | 23 | $logid = substr($darr['logid'], 6); |
| 24 | 24 | } |
@@ -27,7 +27,7 @@ discard block |
||
| 27 | 27 | $cnt = 0; |
| 28 | 28 | if (substr($res, 0, strlen(ZIPDIR)) == ZIPDIR) { |
| 29 | 29 | $content = file_get_contents($res); |
| 30 | - $encrypted = openssl_encrypt(SERVER_TOKEN . $content, "CHACHA20", SERVER_SECRET, 0, $iv); |
|
| 30 | + $encrypted = openssl_encrypt(SERVER_TOKEN.$content, "CHACHA20", SERVER_SECRET, 0, $iv); |
|
| 31 | 31 | header('Content-Type: application/octet-stream'); |
| 32 | 32 | header("Content-Transfer-Encoding: binary"); |
| 33 | 33 | echo "ZIPDATA:$encrypted"; |
@@ -52,7 +52,7 @@ discard block |
||
| 52 | 52 | } |
| 53 | 53 | if (isset($darr['vlan']) && isset($darr['realmforvlan']) && |
| 54 | 54 | is_array($darr['realmforvlan'])) { |
| 55 | - $vlans = $darr['vlan'] . '#' . implode('#', $darr['realmforvlan']); |
|
| 55 | + $vlans = $darr['vlan'].'#'.implode('#', $darr['realmforvlan']); |
|
| 56 | 56 | } |
| 57 | 57 | if (isset($darr['guest_vlan'])) { |
| 58 | 58 | $guest_vlan = $darr['guest_vlan']; |
@@ -24,7 +24,7 @@ discard block |
||
| 24 | 24 | * update the local copy |
| 25 | 25 | */ |
| 26 | 26 | |
| 27 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
| 27 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
| 28 | 28 | setlocale(LC_CTYPE, "en_US.UTF-8"); |
| 29 | 29 | require 'config.php'; |
| 30 | 30 | |
@@ -113,7 +113,7 @@ discard block |
||
| 113 | 113 | $this->db_ext->query("SET NAMES 'utf8'"); |
| 114 | 114 | $this->db_local->query("SET NAMES 'utf8mb4'"); |
| 115 | 115 | $result = $this->db_ext->query("SELECT * FROM $table"); |
| 116 | - $queryFields = implode(',', array_column($this->fields[$db][$table_name],0)); |
|
| 116 | + $queryFields = implode(',', array_column($this->fields[$db][$table_name], 0)); |
|
| 117 | 117 | while ($row = $result->fetch_assoc()) { |
| 118 | 118 | $v = []; |
| 119 | 119 | foreach ($this->fields[$db][$table_name] as $field) { |
@@ -131,7 +131,7 @@ discard block |
||
| 131 | 131 | } |
| 132 | 132 | } |
| 133 | 133 | } |
| 134 | - $queryValues = implode(',',$v); |
|
| 134 | + $queryValues = implode(',', $v); |
|
| 135 | 135 | $query = "INSERT INTO $tmpTable (".$queryFields.") VALUES (".$queryValues.")"; |
| 136 | 136 | $this->db_local->query($query); |
| 137 | 137 | } |
@@ -153,9 +153,9 @@ discard block |
||
| 153 | 153 | $realms = explode(',', $row[1]); |
| 154 | 154 | foreach ($contacts as $contact) { |
| 155 | 155 | foreach ($realms as $realm) { |
| 156 | - $email = empty($contact['mail']) ? 'NULL' :'"'.$contact['mail'].'"'; |
|
| 157 | - $name = empty($contact['name']) ? 'NULL' :'"'.$contact['name'].'"'; |
|
| 158 | - $phone = empty($contact['phone']) ? 'NULL' :'"'.$contact['phone'].'"'; |
|
| 156 | + $email = empty($contact['mail']) ? 'NULL' : '"'.$contact['mail'].'"'; |
|
| 157 | + $name = empty($contact['name']) ? 'NULL' : '"'.$contact['name'].'"'; |
|
| 158 | + $phone = empty($contact['phone']) ? 'NULL' : '"'.$contact['phone'].'"'; |
|
| 159 | 159 | $id = $db == 'eduroam' ? $row[2] : '"'.$row[2].'"'; |
| 160 | 160 | $query = "INSERT INTO tmp_institution_admins (name, email, phone, inst_realm, $instid)" |
| 161 | 161 | . ' VALUES ('.$name.','.$email.','.$phone.',"'.$realm.'",'.$id.')'; |
@@ -175,9 +175,9 @@ discard block |
||
| 175 | 175 | } |
| 176 | 176 | |
| 177 | 177 | private function escape($inp) { |
| 178 | - $out=str_replace('\\','\\\\',$inp); |
|
| 179 | - $out=str_replace('"','\"',$out); |
|
| 180 | - $out=str_replace('?','\?',$out); |
|
| 178 | + $out = str_replace('\\', '\\\\', $inp); |
|
| 179 | + $out = str_replace('"', '\"', $out); |
|
| 180 | + $out = str_replace('?', '\?', $out); |
|
| 181 | 181 | $out = 'convert(cast(convert("'.$out.'" using latin1) as binary) using utf8)'; |
| 182 | 182 | return($out); |
| 183 | 183 | } |
@@ -3,7 +3,7 @@ |
||
| 3 | 3 | $databases = [ |
| 4 | 4 | 'eduroam' => "eduroam1_1_tmp", // this is the local copy of eduroam (v1) database created by update_monitor_copy.php |
| 5 | 5 | 'eduroamv2' => "eduroam2_1_tmp", // this is the local copy of eduroam (v2) database created by update_monitor_copy.php |
| 6 | - 'cat' => "cat_twoln_214_test2", // this is the curent production CAT database where we need to put in new identifiers |
|
| 6 | + 'cat' => "cat_twoln_214_test2", // this is the curent production CAT database where we need to put in new identifiers |
|
| 7 | 7 | 'eduroam_new' => "monitor_copy2_test_xxx" // this is the resulting monitor_copy database containing all data required by CAT it must exist but tables will be created by the sript |
| 8 | 8 | ]; |
| 9 | 9 | |
@@ -1,6 +1,6 @@ |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
| 3 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
| 4 | 4 | setlocale(LC_CTYPE, "en_US.UTF-8"); |
| 5 | 5 | require 'config.php'; |
| 6 | 6 | |