Test Failed
Push — release_2_1 ( adef88...954e67 )
by Stefan
09:51
created
core/CertificationAuthorityEduPkiServer.php 1 patch
Spacing   +37 added lines, -37 removed lines patch added patch discarded remove patch
@@ -17,9 +17,9 @@  discard block
 block discarded – undo
17 17
 class CertificationAuthorityEduPkiServer extends EntityWithDBProperties implements CertificationAuthorityInterface
18 18
 {
19 19
 
20
-    private const LOCATION_RA_CERT = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem";
21
-    private const LOCATION_RA_KEY = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey";
22
-    private const LOCATION_WEBROOT = ROOT . "/config/SilverbulletClientCerts/eduPKI-webserver-root.pem";
20
+    private const LOCATION_RA_CERT = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem";
21
+    private const LOCATION_RA_KEY = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey";
22
+    private const LOCATION_WEBROOT = ROOT."/config/SilverbulletClientCerts/eduPKI-webserver-root.pem";
23 23
     private const EDUPKI_RA_ID = 700;
24 24
     private const EDUPKI_CERT_PROFILE = "Radius Server SOAP";
25 25
     private const EDUPKI_RA_PKEY_PASSPHRASE = "...";
@@ -35,13 +35,13 @@  discard block
 block discarded – undo
35 35
         parent::__construct();
36 36
 
37 37
         if (stat(CertificationAuthorityEduPkiServer::LOCATION_RA_CERT) === FALSE) {
38
-            throw new Exception("RA operator PEM file not found: " . CertificationAuthorityEduPkiServer::LOCATION_RA_CERT);
38
+            throw new Exception("RA operator PEM file not found: ".CertificationAuthorityEduPkiServer::LOCATION_RA_CERT);
39 39
         }
40 40
         if (stat(CertificationAuthorityEduPkiServer::LOCATION_RA_KEY) === FALSE) {
41
-            throw new Exception("RA operator private key file not found: " . CertificationAuthorityEduPkiServer::LOCATION_RA_KEY);
41
+            throw new Exception("RA operator private key file not found: ".CertificationAuthorityEduPkiServer::LOCATION_RA_KEY);
42 42
         }
43 43
         if (stat(CertificationAuthorityEduPkiServer::LOCATION_WEBROOT) === FALSE) {
44
-            throw new Exception("CA website root CA file not found: " . CertificationAuthorityEduPkiServer::LOCATION_WEBROOT);
44
+            throw new Exception("CA website root CA file not found: ".CertificationAuthorityEduPkiServer::LOCATION_WEBROOT);
45 45
         }
46 46
     }
47 47
 
@@ -99,19 +99,19 @@  discard block
 block discarded – undo
99 99
         // initialise connection to eduPKI CA / eduroam RA and send the request to them
100 100
         try {
101 101
             $altArray = [# Array mit den Subject Alternative Names
102
-                "email:" . $csr["USERMAIL"]
102
+                "email:".$csr["USERMAIL"]
103 103
             ];
104 104
             $soapPub = $this->initEduPKISoapSession("PUBLIC");
105 105
             $this->loggerInstance->debug(5, "FIRST ACTUAL SOAP REQUEST (Public, newRequest)!\n");
106
-            $this->loggerInstance->debug(5, "PARAM_1: " . CertificationAuthorityEduPkiServer::EDUPKI_RA_ID . "\n");
107
-            $this->loggerInstance->debug(5, "PARAM_2: " . $csr["CSR_STRING"] . "\n");
106
+            $this->loggerInstance->debug(5, "PARAM_1: ".CertificationAuthorityEduPkiServer::EDUPKI_RA_ID."\n");
107
+            $this->loggerInstance->debug(5, "PARAM_2: ".$csr["CSR_STRING"]."\n");
108 108
             $this->loggerInstance->debug(5, "PARAM_3: ");
109 109
             $this->loggerInstance->debug(5, $altArray);
110
-            $this->loggerInstance->debug(5, "PARAM_4: " . CertificationAuthorityEduPkiServer::EDUPKI_CERT_PROFILE . "\n");
111
-            $this->loggerInstance->debug(5, "PARAM_5: " . sha1("notused") . "\n");
112
-            $this->loggerInstance->debug(5, "PARAM_6: " . $csr["USERNAME"] . "\n");
113
-            $this->loggerInstance->debug(5, "PARAM_7: " . $csr["USERMAIL"] . "\n");
114
-            $this->loggerInstance->debug(5, "PARAM_8: " . ProfileSilverbullet::PRODUCTNAME . "\n");
110
+            $this->loggerInstance->debug(5, "PARAM_4: ".CertificationAuthorityEduPkiServer::EDUPKI_CERT_PROFILE."\n");
111
+            $this->loggerInstance->debug(5, "PARAM_5: ".sha1("notused")."\n");
112
+            $this->loggerInstance->debug(5, "PARAM_6: ".$csr["USERNAME"]."\n");
113
+            $this->loggerInstance->debug(5, "PARAM_7: ".$csr["USERMAIL"]."\n");
114
+            $this->loggerInstance->debug(5, "PARAM_8: ".ProfileSilverbullet::PRODUCTNAME."\n");
115 115
             $this->loggerInstance->debug(5, "PARAM_9: false\n");
116 116
             $soapNewRequest = $soapPub->newRequest(
117 117
                     CertificationAuthorityEduPkiServer::EDUPKI_RA_ID, # RA-ID
@@ -133,11 +133,11 @@  discard block
 block discarded – undo
133 133
         } catch (Exception $e) {
134 134
             // PHP 7.1 can do this much better
135 135
             if (is_soap_fault($e)) {
136
-                throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}:  {
136
+                throw new Exception("Error when sending SOAP request: "."{$e->faultcode}:  {
137 137
                     $e->faultstring
138 138
                 }\n");
139 139
             }
140
-            throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage());
140
+            throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage());
141 141
         }
142 142
         try {
143 143
             $soap = $this->initEduPKISoapSession("RA");
@@ -171,7 +171,7 @@  discard block
 block discarded – undo
171 171
             // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file
172 172
             // rather than just using the string. Grr.
173 173
             $tempdir = \core\common\Entity::createTemporaryDirectory("test");
174
-            file_put_contents($tempdir['dir'] . "/content.txt", $soapCleartext);
174
+            file_put_contents($tempdir['dir']."/content.txt", $soapCleartext);
175 175
             // retrieve our RA cert from filesystem                    
176 176
             // the RA certificates are not needed right now because we
177 177
             // have resorted to S/MIME signatures with openssl command-line
@@ -183,7 +183,7 @@  discard block
 block discarded – undo
183 183
             // sign the data, using cmdline because openssl_pkcs7_sign produces strange results
184 184
             // -binary didn't help, nor switch -md to sha1 sha256 or sha512
185 185
             $this->loggerInstance->debug(5, "Actual content to be signed is this:\n  $soapCleartext\n");
186
-        $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem";
186
+        $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem";
187 187
             $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline:   $execCmd\n");
188 188
             $output = [];
189 189
             $return = 999;
@@ -192,21 +192,21 @@  discard block
 block discarded – undo
192 192
                 throw new Exception("Non-zero return value from openssl smime!");
193 193
             }
194 194
             // and get the signature blob back from the filesystem
195
-            $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt"));
195
+            $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt"));
196 196
             $this->loggerInstance->debug(5, "Request for server approveRequest has parameters:\n");
197
-            $this->loggerInstance->debug(5, $soapReqnum . "\n");
198
-            $this->loggerInstance->debug(5, $soapCleartext . "\n"); // PHP magically encodes this as base64 while sending!
199
-            $this->loggerInstance->debug(5, $detachedSig . "\n");
197
+            $this->loggerInstance->debug(5, $soapReqnum."\n");
198
+            $this->loggerInstance->debug(5, $soapCleartext."\n"); // PHP magically encodes this as base64 while sending!
199
+            $this->loggerInstance->debug(5, $detachedSig."\n");
200 200
             $soapIssueCert = $soap->approveRequest($soapReqnum, $soapCleartext, $detachedSig);
201
-            $this->loggerInstance->debug(5, "approveRequest Request was: \n" . $soap->__getLastRequest());
202
-            $this->loggerInstance->debug(5, "approveRequest Response was: \n" . $soap->__getLastResponse());
201
+            $this->loggerInstance->debug(5, "approveRequest Request was: \n".$soap->__getLastRequest());
202
+            $this->loggerInstance->debug(5, "approveRequest Response was: \n".$soap->__getLastResponse());
203 203
             if ($soapIssueCert === FALSE) {
204 204
                 throw new Exception("The locally approved request was NOT processed by the CA.");
205 205
             }
206 206
         } catch (SoapFault $e) {
207
-            throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
207
+            throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
208 208
         } catch (Exception $e) {
209
-            throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage());
209
+            throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage());
210 210
         }
211 211
         return $soapReqnum;
212 212
     }
@@ -258,9 +258,9 @@  discard block
 block discarded – undo
258 258
                 throw new Exception("CAInfo has no root certificate for us!");
259 259
             }
260 260
         } catch (SoapFault $e) {
261
-            throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
261
+            throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
262 262
         } catch (Exception $e) {
263
-            throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage());
263
+            throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage());
264 264
         }
265 265
         return [
266 266
             "CERT" => openssl_x509_read($parsedCert['pem']),
@@ -293,12 +293,12 @@  discard block
 block discarded – undo
293 293
             // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file
294 294
             // rather than just using the string. Grr.
295 295
             $tempdir = \core\common\Entity::createTemporaryDirectory("test");
296
-            file_put_contents($tempdir['dir'] . "/content.txt", $soapRawRevRequest);
296
+            file_put_contents($tempdir['dir']."/content.txt", $soapRawRevRequest);
297 297
             // retrieve our RA cert from filesystem
298 298
             // sign the data, using cmdline because openssl_pkcs7_sign produces strange results
299 299
             // -binary didn't help, nor switch -md to sha1 sha256 or sha512
300 300
             $this->loggerInstance->debug(5, "Actual content to be signed is this:\n$soapRawRevRequest\n");
301
-        $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPkiServer::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPkiServer::LOCATION_RA_CERT;
301
+        $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPkiServer::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPkiServer::LOCATION_RA_CERT;
302 302
             $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n");
303 303
             $output = [];
304 304
             $return = 999;
@@ -307,7 +307,7 @@  discard block
 block discarded – undo
307 307
                 throw new Exception("Non-zero return value from openssl smime!");
308 308
             }
309 309
             // and get the signature blob back from the filesystem
310
-            $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt"));
310
+            $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt"));
311 311
             $soapIssueRev = $soap->approveRevocationRequest($soapRevocationSerial, $soapRawRevRequest, $detachedSig);
312 312
             if ($soapIssueRev === FALSE) {
313 313
                 throw new Exception("The locally approved revocation request was NOT processed by the CA.");
@@ -315,9 +315,9 @@  discard block
 block discarded – undo
315 315
         } catch (Exception $e) {
316 316
             // PHP 7.1 can do this much better
317 317
             if (is_soap_fault($e)) {
318
-                throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: {$e->faultstring}\n");
318
+                throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: {$e->faultstring}\n");
319 319
             }
320
-            throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage());
320
+            throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage());
321 321
         }
322 322
     }
323 323
 
@@ -417,9 +417,9 @@  discard block
 block discarded – undo
417 417
      */
418 418
     public function soapToXmlInteger($x)
419 419
     {
420
-        return '<' . $x[0] . '>'
420
+        return '<'.$x[0].'>'
421 421
                 . htmlentities($x[1], ENT_NOQUOTES | ENT_XML1)
422
-                . '</' . $x[0] . '>';
422
+                . '</'.$x[0].'>';
423 423
     }
424 424
 
425 425
     /**
@@ -438,9 +438,9 @@  discard block
 block discarded – undo
438 438
         // dump private key into directory
439 439
         $outstring = "";
440 440
         openssl_pkey_export($privateKey, $outstring);
441
-        file_put_contents($tempdir . "/pkey.pem", $outstring);
441
+        file_put_contents($tempdir."/pkey.pem", $outstring);
442 442
         // PHP can only do one DC in the Subject. But we need three.
443
-        $execCmd = \config\Master::PATHS['openssl'] . " req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$fed/CN=$username/emailAddress=$username";
443
+        $execCmd = \config\Master::PATHS['openssl']." req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$fed/CN=$username/emailAddress=$username";
444 444
         $this->loggerInstance->debug(2, "Calling openssl req with following cmdline: $execCmd\n");
445 445
         $output = [];
446 446
         $return = 999;
Please login to merge, or discard this patch.
core/CertificationAuthorityEmbeddedRSA.php 1 patch
Spacing   +20 added lines, -20 removed lines patch added patch discarded remove patch
@@ -16,10 +16,10 @@  discard block
 block discarded – undo
16 16
 class CertificationAuthorityEmbeddedRSA extends EntityWithDBProperties implements CertificationAuthorityInterface
17 17
 {
18 18
 
19
-    private const LOCATION_ROOT_CA = ROOT . "/config/SilverbulletClientCerts/rootca-RSA.pem";
20
-    private const LOCATION_ISSUING_CA = ROOT . "/config/SilverbulletClientCerts/real-RSA.pem";
21
-    private const LOCATION_ISSUING_KEY = ROOT . "/config/SilverbulletClientCerts/real-RSA.key";
22
-    private const LOCATION_CONFIG = ROOT . "/config/SilverbulletClientCerts/openssl-RSA.cnf";
19
+    private const LOCATION_ROOT_CA = ROOT."/config/SilverbulletClientCerts/rootca-RSA.pem";
20
+    private const LOCATION_ISSUING_CA = ROOT."/config/SilverbulletClientCerts/real-RSA.pem";
21
+    private const LOCATION_ISSUING_KEY = ROOT."/config/SilverbulletClientCerts/real-RSA.key";
22
+    private const LOCATION_CONFIG = ROOT."/config/SilverbulletClientCerts/openssl-RSA.cnf";
23 23
 
24 24
     /**
25 25
      * string with the PEM variant of the root CA
@@ -66,11 +66,11 @@  discard block
 block discarded – undo
66 66
         parent::__construct();
67 67
         $this->rootPem = file_get_contents(CertificationAuthorityEmbeddedRSA::LOCATION_ROOT_CA);
68 68
         if ($this->rootPem === FALSE) {
69
-            throw new Exception("Root CA PEM file not found: " . CertificationAuthorityEmbeddedRSA::LOCATION_ROOT_CA);
69
+            throw new Exception("Root CA PEM file not found: ".CertificationAuthorityEmbeddedRSA::LOCATION_ROOT_CA);
70 70
         }
71 71
         $this->issuingCertRaw = file_get_contents(CertificationAuthorityEmbeddedRSA::LOCATION_ISSUING_CA);
72 72
         if ($this->issuingCertRaw === FALSE) {
73
-            throw new Exception("Issuing CA PEM file not found: " . CertificationAuthorityEmbeddedRSA::LOCATION_ISSUING_CA);
73
+            throw new Exception("Issuing CA PEM file not found: ".CertificationAuthorityEmbeddedRSA::LOCATION_ISSUING_CA);
74 74
         }
75 75
         $rootParsed = openssl_x509_read($this->rootPem);
76 76
         $issuingCertCandidate = openssl_x509_read($this->issuingCertRaw);
@@ -80,15 +80,15 @@  discard block
 block discarded – undo
80 80
         }
81 81
         $this->issuingCert = $issuingCertCandidate;
82 82
         if (stat(CertificationAuthorityEmbeddedRSA::LOCATION_ISSUING_KEY) === FALSE) {
83
-            throw new Exception("Private key not found: " . CertificationAuthorityEmbeddedRSA::LOCATION_ISSUING_KEY);
83
+            throw new Exception("Private key not found: ".CertificationAuthorityEmbeddedRSA::LOCATION_ISSUING_KEY);
84 84
         }
85
-        $issuingKeyTemp = openssl_pkey_get_private("file://" . CertificationAuthorityEmbeddedRSA::LOCATION_ISSUING_KEY);
85
+        $issuingKeyTemp = openssl_pkey_get_private("file://".CertificationAuthorityEmbeddedRSA::LOCATION_ISSUING_KEY);
86 86
         if ($issuingKeyTemp === FALSE || is_resource($issuingKeyTemp)) {
87 87
             throw new Exception("The private key did not parse correctly (or is not a PHP8 object)!");
88 88
         }
89 89
         $this->issuingKey = $issuingKeyTemp;
90 90
         if (stat(CertificationAuthorityEmbeddedRSA::LOCATION_CONFIG) === FALSE) {
91
-            throw new Exception("openssl configuration not found: " . CertificationAuthorityEmbeddedRSA::LOCATION_CONFIG);
91
+            throw new Exception("openssl configuration not found: ".CertificationAuthorityEmbeddedRSA::LOCATION_CONFIG);
92 92
         }
93 93
         $this->conffile = CertificationAuthorityEmbeddedRSA::LOCATION_CONFIG;
94 94
     }
@@ -131,27 +131,27 @@  discard block
 block discarded – undo
131 131
         // generate stub index.txt file
132 132
         $tempdirArray = \core\common\Entity::createTemporaryDirectory("test");
133 133
         $tempdir = $tempdirArray['dir'];
134
-        $nowIndexTxt = (new \DateTime())->format("ymdHis") . "Z";
135
-        $expiryIndexTxt = $originalExpiry->format("ymdHis") . "Z";
134
+        $nowIndexTxt = (new \DateTime())->format("ymdHis")."Z";
135
+        $expiryIndexTxt = $originalExpiry->format("ymdHis")."Z";
136 136
         // serials for our CA are always integers
137 137
         $serialHex = strtoupper(dechex((int) $cert->serial));
138 138
         if (strlen($serialHex) % 2 == 1) {
139
-            $serialHex = "0" . $serialHex;
139
+            $serialHex = "0".$serialHex;
140 140
         }
141 141
 
142
-        $indexStatement = "$certstatus\t$expiryIndexTxt\t" . ($certstatus == "R" ? "$nowIndexTxt,unspecified" : "") . "\t$serialHex\tunknown\t/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$federation/CN=$cert->username\n";
142
+        $indexStatement = "$certstatus\t$expiryIndexTxt\t".($certstatus == "R" ? "$nowIndexTxt,unspecified" : "")."\t$serialHex\tunknown\t/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$federation/CN=$cert->username\n";
143 143
         $this->loggerInstance->debug(4, "index.txt contents-to-be: $indexStatement");
144
-        if (!file_put_contents($tempdir . "/index.txt", $indexStatement)) {
144
+        if (!file_put_contents($tempdir."/index.txt", $indexStatement)) {
145 145
             $this->loggerInstance->debug(1, "Unable to write openssl index.txt file for revocation handling!");
146 146
         }
147 147
         // index.txt.attr is dull but needs to exist
148
-        file_put_contents($tempdir . "/index.txt.attr", "unique_subject = yes\n");
148
+        file_put_contents($tempdir."/index.txt.attr", "unique_subject = yes\n");
149 149
         // call "openssl ocsp" to manufacture our own OCSP statement
150 150
         // adding "-rmd sha1" to the following command-line makes the
151 151
         // choice of signature algorithm for the response explicit
152 152
         // but it's only available from openssl-1.1.0 (which we do not
153 153
         // want to require just for that one thing).
154
-        $execCmd = \config\Master::PATHS['openssl'] . " ocsp -issuer " . CertificationAuthorityEmbeddedRSA::LOCATION_ISSUING_CA . " -sha1 -ndays 10 -no_nonce -serial 0x$serialHex -CA " . CertificationAuthorityEmbeddedRSA::LOCATION_ISSUING_CA . " -rsigner " . CertificationAuthorityEmbeddedRSA::LOCATION_ISSUING_CA . " -rkey " . CertificationAuthorityEmbeddedRSA::LOCATION_ISSUING_KEY . " -index $tempdir/index.txt -no_cert_verify -respout $tempdir/$serialHex.response.der";
154
+        $execCmd = \config\Master::PATHS['openssl']." ocsp -issuer ".CertificationAuthorityEmbeddedRSA::LOCATION_ISSUING_CA." -sha1 -ndays 10 -no_nonce -serial 0x$serialHex -CA ".CertificationAuthorityEmbeddedRSA::LOCATION_ISSUING_CA." -rsigner ".CertificationAuthorityEmbeddedRSA::LOCATION_ISSUING_CA." -rkey ".CertificationAuthorityEmbeddedRSA::LOCATION_ISSUING_KEY." -index $tempdir/index.txt -no_cert_verify -respout $tempdir/$serialHex.response.der";
155 155
         $this->loggerInstance->debug(2, "Calling openssl ocsp with following cmdline: $execCmd\n");
156 156
         $output = [];
157 157
         $return = 999;
@@ -159,11 +159,11 @@  discard block
 block discarded – undo
159 159
         if ($return !== 0) {
160 160
             throw new Exception("Non-zero return value from openssl ocsp!");
161 161
         }
162
-        $ocsp = file_get_contents($tempdir . "/$serialHex.response.der");
162
+        $ocsp = file_get_contents($tempdir."/$serialHex.response.der");
163 163
         // remove the temp dir!
164
-        unlink($tempdir . "/$serialHex.response.der");
165
-        unlink($tempdir . "/index.txt.attr");
166
-        unlink($tempdir . "/index.txt");
164
+        unlink($tempdir."/$serialHex.response.der");
165
+        unlink($tempdir."/index.txt.attr");
166
+        unlink($tempdir."/index.txt");
167 167
         rmdir($tempdir);
168 168
         $this->databaseHandle->exec("UPDATE silverbullet_certificate SET OCSP = ?, OCSP_timestamp = NOW() WHERE serial_number = ?", "si", $ocsp, $cert->serial);
169 169
         return $ocsp;
Please login to merge, or discard this patch.
web/admin/inc/filepreview.php 1 patch
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -22,7 +22,7 @@  discard block
 block discarded – undo
22 22
 ?>
23 23
 <?php
24 24
 
25
-require_once dirname(dirname(dirname(dirname(__FILE__)))) . "/config/_config.php";
25
+require_once dirname(dirname(dirname(dirname(__FILE__))))."/config/_config.php";
26 26
 
27 27
 $validator = new \web\lib\common\InputValidation();
28 28
 $idRaw = $_GET["id"] ?? "";
@@ -37,7 +37,7 @@  discard block
 block discarded – undo
37 37
         // Set data type and caching for 30 days
38 38
         $info = new finfo();
39 39
         $filetype = $info->buffer($finalBlob, FILEINFO_MIME_TYPE);
40
-        header("Content-type: " . $filetype);
40
+        header("Content-type: ".$filetype);
41 41
 
42 42
         switch ($filetype) {
43 43
             case "text/rtf": // fall-through, same treatment
@@ -54,7 +54,7 @@  discard block
 block discarded – undo
54 54
         header("Cache-Control: must-revalidate");
55 55
         $offset = 60 * 60 * 24 * 30;
56 56
         // gmdate can't possibly fail, because it operates on time() and an integer offset
57
-        $ExpStr = "Expires: " . /** @scrutinizer ignore-type */ gmdate("D, d M Y H:i:s", time() + $offset) . " GMT";
57
+        $ExpStr = "Expires: "./** @scrutinizer ignore-type */ gmdate("D, d M Y H:i:s", time() + $offset)." GMT";
58 58
         header($ExpStr);
59 59
         //  Print out the image
60 60
         echo $finalBlob;
Please login to merge, or discard this patch.
web/admin/inc/userStats.inc.php 1 patch
Spacing   +14 added lines, -14 removed lines patch added patch discarded remove patch
@@ -9,7 +9,7 @@  discard block
 block discarded – undo
9 9
  * ******************************************************************************
10 10
  */
11 11
 
12
-require_once dirname(dirname(dirname(dirname(__FILE__)))) . "/config/_config.php";
12
+require_once dirname(dirname(dirname(dirname(__FILE__))))."/config/_config.php";
13 13
 
14 14
 $auth = new \web\lib\admin\Authentication();
15 15
 $auth->authenticate();
@@ -29,31 +29,31 @@  discard block
 block discarded – undo
29 29
 ?>
30 30
 
31 31
 <h1><?php $tablecaption = _("User Authentication Records"); echo $tablecaption; ?></h1>
32
-<p><?php echo _("Note that:");?></p>
32
+<p><?php echo _("Note that:"); ?></p>
33 33
 <ul>
34
-    <li><?php echo _("Authentication records are deleted after six months retention time");?></li>
35
-    <li><?php echo _("Operator Domain is based on the RADIUS attribute 'Operator-Name' and not sent by all hotspots");?></li>
36
-    <li><?php echo _("Different MAC addresses per credential may be due to MAC Address randomisation in recent operating systems");?></li>
34
+    <li><?php echo _("Authentication records are deleted after six months retention time"); ?></li>
35
+    <li><?php echo _("Operator Domain is based on the RADIUS attribute 'Operator-Name' and not sent by all hotspots"); ?></li>
36
+    <li><?php echo _("Different MAC addresses per credential may be due to MAC Address randomisation in recent operating systems"); ?></li>
37 37
 </ul>
38 38
 <table class='authrecord'>
39
-    <caption><?php echo $tablecaption;?></caption>
39
+    <caption><?php echo $tablecaption; ?></caption>
40 40
     <tr>
41
-        <th scope="col"><strong><?php echo _("Timestamp");?></strong></th>
42
-        <th scope="col"><strong><?php echo _("Credential");?></strong></th>
43
-        <th scope="col"><strong><?php echo _("MAC Address");?></strong></th>
44
-        <th scope="col"><strong><?php echo _("Result");?></strong></th>
45
-        <th scope="col"><strong><?php echo _("Operator Domain");?></strong></th>
41
+        <th scope="col"><strong><?php echo _("Timestamp"); ?></strong></th>
42
+        <th scope="col"><strong><?php echo _("Credential"); ?></strong></th>
43
+        <th scope="col"><strong><?php echo _("MAC Address"); ?></strong></th>
44
+        <th scope="col"><strong><?php echo _("Result"); ?></strong></th>
45
+        <th scope="col"><strong><?php echo _("Operator Domain"); ?></strong></th>
46 46
     </tr>
47 47
     <?php
48 48
     $userAuthData = $profile->getUserAuthRecords($userInt);
49 49
     foreach ($userAuthData as $oneRecord) {
50
-        echo "<tr class='".($oneRecord['RESULT'] == "Access-Accept" ? "auth-success" : "auth-fail" )."'>"
50
+        echo "<tr class='".($oneRecord['RESULT'] == "Access-Accept" ? "auth-success" : "auth-fail")."'>"
51 51
                 . "<td>".$oneRecord['TIMESTAMP']."</td>"
52 52
                 // $oneRecord['CN'] is a simple string, not an array, so disable Scrutinizer type check here
53
-                . "<td>"./** @scrutinizer ignore-type */ substr_replace($oneRecord['CN'], "@…", strpos($oneRecord['CN'],"@"))."</td>"
53
+                . "<td>"./** @scrutinizer ignore-type */ substr_replace($oneRecord['CN'], "@…", strpos($oneRecord['CN'], "@"))."</td>"
54 54
                 . "<td>".$oneRecord['MAC']."</td>"
55 55
                 . "<td>".($oneRecord['RESULT'] == "Access-Accept" ? _("Success") : _("Failure"))."</td>"
56
-                . "<td>".substr($oneRecord['OPERATOR'] ?? "1(unknown)",1)."</td>"
56
+                . "<td>".substr($oneRecord['OPERATOR'] ?? "1(unknown)", 1)."</td>"
57 57
                 . "</tr>";
58 58
     }
59 59
     ?>
Please login to merge, or discard this patch.
core/CertificationAuthorityEmbeddedECDSA.php 1 patch
Spacing   +21 added lines, -21 removed lines patch added patch discarded remove patch
@@ -16,10 +16,10 @@  discard block
 block discarded – undo
16 16
 class CertificationAuthorityEmbeddedECDSA extends EntityWithDBProperties implements CertificationAuthorityInterface
17 17
 {
18 18
 
19
-    private const LOCATION_ROOT_CA = ROOT . "/config/SilverbulletClientCerts/rootca-ECDSA.pem";
20
-    private const LOCATION_ISSUING_CA = ROOT . "/config/SilverbulletClientCerts/real-ECDSA.pem";
21
-    private const LOCATION_ISSUING_KEY = ROOT . "/config/SilverbulletClientCerts/real-ECDSA.key";
22
-    private const LOCATION_CONFIG = ROOT . "/config/SilverbulletClientCerts/openssl-ECDSA.cnf";
19
+    private const LOCATION_ROOT_CA = ROOT."/config/SilverbulletClientCerts/rootca-ECDSA.pem";
20
+    private const LOCATION_ISSUING_CA = ROOT."/config/SilverbulletClientCerts/real-ECDSA.pem";
21
+    private const LOCATION_ISSUING_KEY = ROOT."/config/SilverbulletClientCerts/real-ECDSA.key";
22
+    private const LOCATION_CONFIG = ROOT."/config/SilverbulletClientCerts/openssl-ECDSA.cnf";
23 23
 
24 24
     /**
25 25
      * string with the PEM variant of the root CA
@@ -66,29 +66,29 @@  discard block
 block discarded – undo
66 66
         parent::__construct();
67 67
         $this->rootPem = file_get_contents(CertificationAuthorityEmbeddedECDSA::LOCATION_ROOT_CA);
68 68
         if ($this->rootPem === FALSE) {
69
-            throw new Exception("Root CA PEM file not found: " . CertificationAuthorityEmbeddedECDSA::LOCATION_ROOT_CA);
69
+            throw new Exception("Root CA PEM file not found: ".CertificationAuthorityEmbeddedECDSA::LOCATION_ROOT_CA);
70 70
         }
71 71
         $this->issuingCertRaw = file_get_contents(CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA);
72 72
         if ($this->issuingCertRaw === FALSE) {
73
-            throw new Exception("Issuing CA PEM file not found: " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA);
73
+            throw new Exception("Issuing CA PEM file not found: ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA);
74 74
         }
75 75
         $rootParsed = openssl_x509_read($this->rootPem);
76 76
         $issuingCertCandidate = openssl_x509_read($this->issuingCertRaw);
77
-        if ($issuingCertCandidate === FALSE || is_resource($issuingCertCandidate)|| $rootParsed === FALSE) {
77
+        if ($issuingCertCandidate === FALSE || is_resource($issuingCertCandidate) || $rootParsed === FALSE) {
78 78
             throw new Exception("At least one CA PEM file did not parse correctly (or not a PHP8 resource)!");
79 79
         }
80 80
         $this->issuingCert = $issuingCertCandidate;
81 81
         
82 82
         if (stat(CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY) === FALSE) {
83
-            throw new Exception("Private key not found: " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY);
83
+            throw new Exception("Private key not found: ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY);
84 84
         }
85
-        $issuingKeyTemp = openssl_pkey_get_private("file://" . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY);
85
+        $issuingKeyTemp = openssl_pkey_get_private("file://".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY);
86 86
         if ($issuingKeyTemp === FALSE || is_resource($issuingKeyTemp)) {
87 87
             throw new Exception("The private key did not parse correctly (or not a PHP8 resource)!");
88 88
         }
89 89
         $this->issuingKey = $issuingKeyTemp;
90 90
         if (stat(CertificationAuthorityEmbeddedECDSA::LOCATION_CONFIG) === FALSE) {
91
-            throw new Exception("openssl configuration not found: " . CertificationAuthorityEmbeddedECDSA::LOCATION_CONFIG);
91
+            throw new Exception("openssl configuration not found: ".CertificationAuthorityEmbeddedECDSA::LOCATION_CONFIG);
92 92
         }
93 93
         $this->conffile = CertificationAuthorityEmbeddedECDSA::LOCATION_CONFIG;
94 94
     }
@@ -131,27 +131,27 @@  discard block
 block discarded – undo
131 131
         // generate stub index.txt file
132 132
         $tempdirArray = \core\common\Entity::createTemporaryDirectory("test");
133 133
         $tempdir = $tempdirArray['dir'];
134
-        $nowIndexTxt = (new \DateTime())->format("ymdHis") . "Z";
135
-        $expiryIndexTxt = $originalExpiry->format("ymdHis") . "Z";
134
+        $nowIndexTxt = (new \DateTime())->format("ymdHis")."Z";
135
+        $expiryIndexTxt = $originalExpiry->format("ymdHis")."Z";
136 136
         // serials for our CA are always integers
137 137
         $serialHex = strtoupper(dechex((int) $cert->serial));
138 138
         if (strlen($serialHex) % 2 == 1) {
139
-            $serialHex = "0" . $serialHex;
139
+            $serialHex = "0".$serialHex;
140 140
         }
141 141
 
142
-        $indexStatement = "$certstatus\t$expiryIndexTxt\t" . ($certstatus == "R" ? "$nowIndexTxt,unspecified" : "") . "\t$serialHex\tunknown\t/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$federation/CN=$cert->username\n";
142
+        $indexStatement = "$certstatus\t$expiryIndexTxt\t".($certstatus == "R" ? "$nowIndexTxt,unspecified" : "")."\t$serialHex\tunknown\t/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$federation/CN=$cert->username\n";
143 143
         $this->loggerInstance->debug(4, "index.txt contents-to-be: $indexStatement");
144
-        if (!file_put_contents($tempdir . "/index.txt", $indexStatement)) {
144
+        if (!file_put_contents($tempdir."/index.txt", $indexStatement)) {
145 145
             $this->loggerInstance->debug(1, "Unable to write openssl index.txt file for revocation handling!");
146 146
         }
147 147
         // index.txt.attr is dull but needs to exist
148
-        file_put_contents($tempdir . "/index.txt.attr", "unique_subject = yes\n");
148
+        file_put_contents($tempdir."/index.txt.attr", "unique_subject = yes\n");
149 149
         // call "openssl ocsp" to manufacture our own OCSP statement
150 150
         // adding "-rmd sha1" to the following command-line makes the
151 151
         // choice of signature algorithm for the response explicit
152 152
         // but it's only available from openssl-1.1.0 (which we do not
153 153
         // want to require just for that one thing).
154
-        $execCmd = \config\Master::PATHS['openssl'] . " ocsp -issuer " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA . " -sha1 -ndays 10 -no_nonce -serial 0x$serialHex -CA " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA . " -rsigner " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA . " -rkey " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY . " -index $tempdir/index.txt -no_cert_verify -respout $tempdir/$serialHex.response.der";
154
+        $execCmd = \config\Master::PATHS['openssl']." ocsp -issuer ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA." -sha1 -ndays 10 -no_nonce -serial 0x$serialHex -CA ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA." -rsigner ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA." -rkey ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY." -index $tempdir/index.txt -no_cert_verify -respout $tempdir/$serialHex.response.der";
155 155
         $this->loggerInstance->debug(2, "Calling openssl ocsp with following cmdline: $execCmd\n");
156 156
         $output = [];
157 157
         $return = 999;
@@ -159,11 +159,11 @@  discard block
 block discarded – undo
159 159
         if ($return !== 0) {
160 160
             throw new Exception("Non-zero return value from openssl ocsp!");
161 161
         }
162
-        $ocsp = file_get_contents($tempdir . "/$serialHex.response.der");
162
+        $ocsp = file_get_contents($tempdir."/$serialHex.response.der");
163 163
         // remove the temp dir!
164
-        unlink($tempdir . "/$serialHex.response.der");
165
-        unlink($tempdir . "/index.txt.attr");
166
-        unlink($tempdir . "/index.txt");
164
+        unlink($tempdir."/$serialHex.response.der");
165
+        unlink($tempdir."/index.txt.attr");
166
+        unlink($tempdir."/index.txt");
167 167
         rmdir($tempdir);
168 168
         $this->databaseHandle->exec("UPDATE silverbullet_certificate SET OCSP = ?, OCSP_timestamp = NOW() WHERE serial_number = ?", "si", $ocsp, $cert->serial);
169 169
         return $ocsp;
Please login to merge, or discard this patch.
core/diag/Logopath.php 1 patch
Spacing   +14 added lines, -14 removed lines patch added patch discarded remove patch
@@ -117,11 +117,11 @@  discard block
 block discarded – undo
117 117
         $this->possibleFailureReasons = $_SESSION["SUSPECTS"] ?? []; // if we know nothing, don't talk to anyone
118 118
         $this->additionalFindings = $_SESSION["EVIDENCE"] ?? [];
119 119
 
120
-        $this->subjectPrefix = _("[eduroam Diagnostics]") . " ";
120
+        $this->subjectPrefix = _("[eduroam Diagnostics]")." ";
121 121
         $this->finalGreeting = "\n"
122 122
                 . _("(This service is in an early stage. We apologise if this is a false alert. If this is the case, please send an email report to [email protected], forwarding the entire message (including the 'SUSPECTS' and 'EVIDENCE' data at the end), and explain why this is a false positive.)")
123 123
                 . "\n"
124
-                . _("Yours sincerely,") . "\n"
124
+                . _("Yours sincerely,")."\n"
125 125
                 . "\n"
126 126
                 . _("Ed U. Roam, the eduroam diagnostics algorithm");
127 127
 
@@ -132,13 +132,13 @@  discard block
 block discarded – undo
132 132
                 "bcc" => [],
133 133
                 "reply-to" => [Logopath::TARGET_EDUROAM_OT],
134 134
                 "subject" => _("[POLICYVIOLATION NATIONAL] IdP with no entry in eduroam database"),
135
-                "body" => _("Dear NRO administrator,") . "\n"
135
+                "body" => _("Dear NRO administrator,")."\n"
136 136
                 . "\n"
137
-                . wordwrap(sprintf(_("an end-user requested diagnostics for realm %s. Real-time connectivity checks determined that the realm exists, but we were unable to find an IdP with that realm in the eduroam database."), $this->additionalFindings['REALM'])) . "\n"
137
+                . wordwrap(sprintf(_("an end-user requested diagnostics for realm %s. Real-time connectivity checks determined that the realm exists, but we were unable to find an IdP with that realm in the eduroam database."), $this->additionalFindings['REALM']))."\n"
138 138
                 . "\n"
139
-                . _("By not listing IdPs in the eduroam database, you are violating the eduroam policy.") . "\n"
139
+                . _("By not listing IdPs in the eduroam database, you are violating the eduroam policy.")."\n"
140 140
                 . "\n"
141
-                . _("Additionally, this creates operational issues. In particular, we are unable to direct end users to their IdP for further diagnosis/instructions because there are no contact points for that IdP in the database.") . "\n"
141
+                . _("Additionally, this creates operational issues. In particular, we are unable to direct end users to their IdP for further diagnosis/instructions because there are no contact points for that IdP in the database.")."\n"
142 142
                 . "\n"
143 143
                 . _("Please stop the policy violation ASAP by listing the IdP which is associated to this realm.")
144 144
                 . "\n",
@@ -149,11 +149,11 @@  discard block
 block discarded – undo
149 149
                 "bcc" => [],
150 150
                 "reply-to" => [Logopath::TARGET_ENDUSER],
151 151
                 "subject" => _("[TECHNICAL PROBLEM] Administrator suspects technical problem with your IdP"),
152
-                "body" => _("Dear IdP administrator,") . "\n"
152
+                "body" => _("Dear IdP administrator,")."\n"
153 153
                 . "\n"
154 154
                 . sprintf(_("an organisation administrator requested diagnostics for realm %s. "), $this->additionalFindings['REALM'])
155 155
                 . "\n"
156
-                . _("Real-time connectivity checks determined that the realm appears to be working in acceptable parameters, but the administrator insisted to contact you with the supplemental information below.") . "\n"
156
+                . _("Real-time connectivity checks determined that the realm appears to be working in acceptable parameters, but the administrator insisted to contact you with the supplemental information below.")."\n"
157 157
                 . "\n",
158 158
             ],
159 159
             Logopath::IDP_SUSPECTED_PROBLEM_INTERACTIVE_EVIDENCED => [
@@ -162,11 +162,11 @@  discard block
 block discarded – undo
162 162
                 "bcc" => [],
163 163
                 "reply-to" => [Logopath::TARGET_ENDUSER],
164 164
                 "subject" => _("[TECHNICAL PROBLEM] Administrator suspects technical problem with your IdP"),
165
-                "body" => _("Dear IdP administrator,") . "\n"
165
+                "body" => _("Dear IdP administrator,")."\n"
166 166
                 . "\n"
167 167
                 . sprintf(_("an organisation administrator requested diagnostics for realm %s. "), $this->additionalFindings['REALM'])
168 168
                 . "\n"
169
-                . _("Real-time connectivity checks determined that the realm indeed has an operational problem at this point in time. Please see the supplemental information below.") . "\n"
169
+                . _("Real-time connectivity checks determined that the realm indeed has an operational problem at this point in time. Please see the supplemental information below.")."\n"
170 170
                 . "\n",
171 171
             ],
172 172
         ];
@@ -174,13 +174,13 @@  discard block
 block discarded – undo
174 174
         // add exalted human-readable information to main mail body
175 175
         foreach ($this->mailStack as $oneEntry) {
176 176
             if (isset($this->additionalFindings['INTERACTIVE_ENDUSER_AUTH_TIMESTAMP'])) {
177
-                $oneEntry["body"] .= _("Authentication/Attempt Timestamp of user session:") . " " . $this->additionalFindings['INTERACTIVE_ENDUSER_AUTH_TIMESTAMP'] . "\n";
177
+                $oneEntry["body"] .= _("Authentication/Attempt Timestamp of user session:")." ".$this->additionalFindings['INTERACTIVE_ENDUSER_AUTH_TIMESTAMP']."\n";
178 178
             }
179 179
             if (isset($this->additionalFindings['INTERACTIVE_ENDUSER_MAC'])) {
180
-                $oneEntry["body"] .= _("MAC address of end user in question:") . " " . $this->additionalFindings['INTERACTIVE_ENDUSER_MAC'] . "\n";
180
+                $oneEntry["body"] .= _("MAC address of end user in question:")." ".$this->additionalFindings['INTERACTIVE_ENDUSER_MAC']."\n";
181 181
             }
182 182
             if (isset($this->additionalFindings['INTERACTIVE_ADDITIONAL_COMMENTS'])) {
183
-                $oneEntry["body"] .= _("Additional Comments:") . " " . $this->additionalFindings['INTERACTIVE_ADDITIONAL_COMMENTS'] . "\n";
183
+                $oneEntry["body"] .= _("Additional Comments:")." ".$this->additionalFindings['INTERACTIVE_ADDITIONAL_COMMENTS']."\n";
184 184
             }
185 185
         }
186 186
 
@@ -340,7 +340,7 @@  discard block
 block discarded – undo
340 340
 
341 341
             $handle = \core\common\OutsideComm::mailHandle();
342 342
             // let's identify outselves
343
-            $handle->FromName = \config\Master::APPEARANCE['productname'] . " Real-Time Diagnostics System";
343
+            $handle->FromName = \config\Master::APPEARANCE['productname']." Real-Time Diagnostics System";
344 344
             // add recipients
345 345
             foreach (Logopath::CATEGORYBINDING as $arrayName => $functionName) {
346 346
                 foreach ($theMail[$arrayName] as $onePrincipal) {
Please login to merge, or discard this patch.
web/diag/adminQuery.php 1 patch
Spacing   +44 added lines, -44 removed lines patch added patch discarded remove patch
@@ -19,7 +19,7 @@  discard block
 block discarded – undo
19 19
  * License: see the web/copyright.inc.php file in the file structure or
20 20
  *          <base_url>/copyright.php after deploying the software
21 21
  */
22
-require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php";
22
+require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php";
23 23
 $languageInstance = new \core\common\Language();
24 24
 $languageInstance->setTextDomain("diagnostics");
25 25
 $loggerInstance = new \core\common\Logging();
@@ -61,43 +61,43 @@  discard block
 block discarded – undo
61 61
     $select = "<div id='sp_abuse_problem'>
62 62
 <select style='margin-left: 0px;' id='select_sp_problem'>";
63 63
     foreach ($sp_problem as $pname => $pdesc) {
64
-        $select = $select . "<option value='$pname'>$pdesc</option>\n";
64
+        $select = $select."<option value='$pname'>$pdesc</option>\n";
65 65
     }
66
-    $select = $select . "</select></div>";
66
+    $select = $select."</select></div>";
67 67
     $res = "
68 68
 <input type='hidden' name='token' id='token' value=''>
69 69
 <input type='hidden' name='tests_result' id='tests_result' value=''>
70 70
 <table id='sp_questions'>
71 71
     <tr id='sp_problem_selector'>
72
-        <td>" . _("Select your problem") . "</td>
72
+        <td>" . _("Select your problem")."</td>
73 73
         <td>$select</td>
74 74
     </tr>
75 75
     <tr>
76
-        <td>" . _("What is the realm of the IdP in question?") . "</td>
76
+        <td>"._("What is the realm of the IdP in question?")."</td>
77 77
         <td>
78 78
                 <input type='text' name='admin_realm' id='admin_realm' value='$realmFromURL'>
79
-                <button class='diag_button' id='realm_in_db_admin' style='display: none;' accesskey='R' type='button'>" .
80
-                _("Check this realm") .
79
+                <button class='diag_button' id='realm_in_db_admin' style='display: none;' accesskey='R' type='button'>".
80
+                _("Check this realm").
81 81
                 "</button>
82 82
                 <div id='tests_info_area'></div>
83 83
         </td>
84 84
     </tr>
85 85
     <tr class='hidden_row'>
86
-        <td>" . _("What is the authentication timestamp of the user session in question?") . "</td>
86
+        <td>" . _("What is the authentication timestamp of the user session in question?")."</td>
87 87
         <td><input type='text' id='timestamp' name='timestamp'>
88 88
             <div id='datepicker'></div>
89 89
         </td>
90 90
     </tr>
91 91
     <tr class='hidden_row'>
92
-        <td>" . _("What is the MAC address of the user session in question?") . "</td>
92
+        <td>" . _("What is the MAC address of the user session in question?")."</td>
93 93
         <td><input type='text' id='mac' name='mac'></td>
94 94
     </tr>
95 95
     <tr class='hidden_row'>
96
-        <td>" . _("Additional comments") . "</td>
96
+        <td>" . _("Additional comments")."</td>
97 97
         <td><textarea id='freetext' name='freetext' cols='60' rows='5'></textarea></td>
98 98
     </tr>
99 99
     <tr class='hidden_row'>
100
-        <td>" . _("Please specify an email address on which the IdP can contact you") . "</td>
100
+        <td>" . _("Please specify an email address on which the IdP can contact you")."</td>
101 101
         <td><input type='text' id='email' name='email'></td>
102 102
     </tr>
103 103
     <tr>
@@ -105,82 +105,82 @@  discard block
 block discarded – undo
105 105
         <td></td>
106 106
     </tr>
107 107
     <tr class='hidden_row' id='send_query_to_idp'>
108
-        <td>" . _("Now you can send your query") . "</td>
109
-        <td><button type='submit' class='diag_button' id='submit_idp_query' name='go'>" . _("Send") . "</button></td>
108
+        <td>" . _("Now you can send your query")."</td>
109
+        <td><button type='submit' class='diag_button' id='submit_idp_query' name='go'>" . _("Send")."</button></td>
110 110
     </tr>
111 111
  </table>";
112
-    $res = $res . $javascript;
112
+    $res = $res.$javascript;
113 113
 }
114 114
 if ($queryType == 'idp') {
115 115
     $select = "<div id='idp_reported_problem' style='display:;'>
116 116
 <select style='margin-left:0px;' id='select_idp_problem'>";
117 117
     foreach ($idp_problem as $pname => $pdesc) {
118
-        $select = $select . "<option value='$pname'>$pdesc</option>\n";
118
+        $select = $select."<option value='$pname'>$pdesc</option>\n";
119 119
     }
120
-    $select = $select . "</select></div>";
120
+    $select = $select."</select></div>";
121 121
     $res = "
122 122
 <table id='idp_questions'>
123 123
     <tr>
124
-        <td>" . _("Select your problem") . "</td>
124
+        <td>" . _("Select your problem")."</td>
125 125
         <td>$select</td>
126 126
     </tr>
127 127
     <tr>
128
-        <td>" . _("Identify the SP by one of following means") . "</td>
128
+        <td>"._("Identify the SP by one of following means")."</td>
129 129
         <td></td>
130 130
     </tr>
131 131
     <tr id='by_opname'>
132
-        <td>" . _("SP Operator-Name attribute") . "</td>
132
+        <td>" . _("SP Operator-Name attribute")."</td>
133 133
         <td><input type='text' id='opname' name='opname' value=''></td>
134 134
     </tr>
135 135
     <tr id='spmanually'>
136
-        <td>" . _("Select the SP manually:") . "</td>
136
+        <td>" . _("Select the SP manually:")."</td>
137 137
         <td>
138 138
             <div id='select_asp_country'><a href='' id='asp_countries_list'>
139
-            <span id='opnameselect'>" . _("click to select country and organisation") . "</a></span>
139
+            <span id='opnameselect'>" . _("click to select country and organisation")."</a></span>
140 140
             </div>
141 141
             <div id='select_asp_area'></div>
142 142
         </td>
143 143
     </tr>
144 144
     <tr id='asp_desc' style='display: none;'>
145
-        <td>" . _("or") . ' ' . _("at least describe the SP location") . "</td>
145
+        <td>" . _("or").' '._("at least describe the SP location")."</td>
146 146
         <td><input type='text' id='asp_location' name='asp_location' value=''></td>
147 147
     </tr>
148 148
     <tr>
149
-        <td>" . _("What is the outer ID of the user session in question?") . "</td>
149
+        <td>" . _("What is the outer ID of the user session in question?")."</td>
150 150
         <td><input type='text' id='outer_id' name='outer_id' value=''></td>
151 151
     </tr>
152 152
     <tr>
153
-        <td>" . _("What is the authentication timestamp of the user session in question?") . "</td>
153
+        <td>" . _("What is the authentication timestamp of the user session in question?")."</td>
154 154
         <td>
155 155
             <input type='text' id='timestamp' name='timestamp'>
156 156
             <div id='datepicker'></div>
157 157
         </td>
158 158
     </tr>
159 159
     <tr>
160
-        <td>" . _("What is the MAC address of the user session in question?") . "</td>
160
+        <td>" . _("What is the MAC address of the user session in question?")."</td>
161 161
         <td><input type='text' id='mac' name='mac'></td>
162 162
     </tr>
163 163
     <tr>
164
-        <td>" . _("Additional comments about the problem") . "</td>
164
+        <td>" . _("Additional comments about the problem")."</td>
165 165
         <td><textarea id='freetext' name='freetext' cols='60' rows='5'></textarea></td>
166 166
     </tr>
167 167
     <tr>
168
-        <td>" . _("Do you have any contact details by which the user wishes to be contacted by the SP?") . "</td>
168
+        <td>" . _("Do you have any contact details by which the user wishes to be contacted by the SP?")."</td>
169 169
         <td><textarea id='c_details' name='c_details' cols='60' rows='5'></textarea></td>
170 170
     </tr>
171 171
     <tr>
172
-        <td>" . _("Please specify an email address on which the SP can contact you") . "</td>
172
+        <td>" . _("Please specify an email address on which the SP can contact you")."</td>
173 173
         <td><input type='text' id='email' name='email'></td>
174 174
     </tr>
175 175
     <tr class='hidden_row' id='send_query_to_sp'>
176
-        <td>" . _("Now you can send your query") . "</td>
177
-        <td><button type='submit' class='diag_button' id='submit_sp_query' name='go'>" . _("Send") . "</button></td>
176
+        <td>" . _("Now you can send your query")."</td>
177
+        <td><button type='submit' class='diag_button' id='submit_sp_query' name='go'>" . _("Send")."</button></td>
178 178
     </tr>
179 179
 </table>";
180
-    $res = $res . $javascript;
180
+    $res = $res.$javascript;
181 181
 }
182 182
 if ($queryType == 'idp_send' || $queryType == 'sp_send') {
183
-    include_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php";
183
+    include_once dirname(dirname(dirname(__FILE__)))."/config/_config.php";
184 184
     $cat = new \core\CAT();
185 185
     $returnArray = array();
186 186
     if (count((array) $o) > 0) {
@@ -189,8 +189,8 @@  discard block
 block discarded – undo
189 189
             switch ($key) {
190 190
                 case 'realm':
191 191
                     $pos = strpos($value, '@');
192
-                    if ($pos !== FALSE ) {
193
-                        $value = substr($value, $pos+1);
192
+                    if ($pos !== FALSE) {
193
+                        $value = substr($value, $pos + 1);
194 194
                     }
195 195
                 case 'email':
196 196
                     $returnArray[$key] = filter_var($value, FILTER_VALIDATE_EMAIL);
@@ -231,7 +231,7 @@  discard block
 block discarded – undo
231 231
         $mail = \core\common\OutsideComm::mailHandle();
232 232
         $emails = ['[email protected]'];
233 233
         //$emails = explode(',', $returnArray['idpcontact']);
234
-        $mail->FromName = \config\Master::APPEARANCE['productname'] . " Notification System";
234
+        $mail->FromName = \config\Master::APPEARANCE['productname']." Notification System";
235 235
         foreach ($emails as $email) {
236 236
             $mail->addAddress($email);
237 237
         }
@@ -241,11 +241,11 @@  discard block
 block discarded – undo
241 241
         } else {
242 242
             $link = 'http://';
243 243
         }
244
-        $link .= $_SERVER['SERVER_NAME'] . \core\CAT::getRootUrlPath() . '/diag/show_realmcheck.php?token=' . $returnArray['token'];
244
+        $link .= $_SERVER['SERVER_NAME'].\core\CAT::getRootUrlPath().'/diag/show_realmcheck.php?token='.$returnArray['token'];
245 245
         $returnArray['testurl'] = $link;
246 246
         $mail->Subject = _('Suspected a technical problem with the IdP');
247
-        $txt = _("We suspect a technical problem with the IdP handling the realm") . ' ' . 
248
-                $returnArray['realm'] . ".\n";
247
+        $txt = _("We suspect a technical problem with the IdP handling the realm").' '. 
248
+                $returnArray['realm'].".\n";
249 249
         $txt .= _("The CAT diagnostic test was run for this realm during reporting.\n");
250 250
         $txt .= _("The overall result was ");
251 251
         if ($returnArray['tests_result'] == 0) {
@@ -253,15 +253,15 @@  discard block
 block discarded – undo
253 253
         } else {
254 254
             $txt .= _("failure");
255 255
         }
256
-        $txt .= ".\n" . _("To see details go to ");
256
+        $txt .= ".\n"._("To see details go to ");
257 257
         $txt .= "$link\n\n";
258
-        $txt .= _("The reported problem details are as follows") . "\n";
259
-        $txt .= _("timestamp") . ": " . $returnArray['timestamp'] . "\n";
260
-        $txt .= _("client MAC address") . ": " . $returnArray['mac'] . "\n";
258
+        $txt .= _("The reported problem details are as follows")."\n";
259
+        $txt .= _("timestamp").": ".$returnArray['timestamp']."\n";
260
+        $txt .= _("client MAC address").": ".$returnArray['mac']."\n";
261 261
         if ($returnArray['freetext']) {
262
-            $txt .= _("additional comments") . ': ' . $returnArray['freetext'] . "\n";
262
+            $txt .= _("additional comments").': '.$returnArray['freetext']."\n";
263 263
         }
264
-        $txt .= "\n" . _("You can contact the incident reporter at") . ' ' . $returnArray['email'];
264
+        $txt .= "\n"._("You can contact the incident reporter at").' '.$returnArray['email'];
265 265
         
266 266
         $mail->Body = $txt;
267 267
         $sent = $mail->send();
Please login to merge, or discard this patch.
web/admin/edit_federation.php 1 patch
Spacing   +10 added lines, -10 removed lines patch added patch discarded remove patch
@@ -26,7 +26,7 @@  discard block
 block discarded – undo
26 26
  */
27 27
 ?>
28 28
 <?php
29
-require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php";
29
+require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php";
30 30
 
31 31
 $auth = new \web\lib\admin\Authentication();
32 32
 $deco = new \web\lib\admin\PageDecoration();
@@ -61,13 +61,13 @@  discard block
 block discarded – undo
61 61
         ?>
62 62
     </h1>
63 63
     <div class='infobox'>
64
-        <h2><?php $tablecaption = sprintf(_("%s Properties"),$uiElements->nomenclatureFed); echo $tablecaption?></h2>
64
+        <h2><?php $tablecaption = sprintf(_("%s Properties"), $uiElements->nomenclatureFed); echo $tablecaption?></h2>
65 65
         <table>
66
-            <caption><?php echo $tablecaption;?></caption>
66
+            <caption><?php echo $tablecaption; ?></caption>
67 67
             <tr>
68
-                <th class="wai-invisible" scope="col"><?php echo _("Property Type");?></th>
69
-                <th class="wai-invisible" scope="col"><?php echo _("Language if applicable");?></th>
70
-                <th class="wai-invisible" scope="col"><?php echo _("Property Value");?></th>
68
+                <th class="wai-invisible" scope="col"><?php echo _("Property Type"); ?></th>
69
+                <th class="wai-invisible" scope="col"><?php echo _("Language if applicable"); ?></th>
70
+                <th class="wai-invisible" scope="col"><?php echo _("Property Value"); ?></th>
71 71
             </tr>
72 72
             <tr>
73 73
                 <td><?php echo _("Country:"); ?></td>
@@ -78,11 +78,11 @@  discard block
 block discarded – undo
78 78
         </table>
79 79
     </div>
80 80
     <?php
81
-    echo "<form enctype='multipart/form-data' action='edit_federation_result.php?fed_id=$my_fed->tld" . "' method='post' accept-charset='UTF-8'>
82
-              <input type='hidden' name='MAX_FILE_SIZE' value='" . \config\Master::MAX_UPLOAD_SIZE . "'>";
81
+    echo "<form enctype='multipart/form-data' action='edit_federation_result.php?fed_id=$my_fed->tld"."' method='post' accept-charset='UTF-8'>
82
+              <input type='hidden' name='MAX_FILE_SIZE' value='" . \config\Master::MAX_UPLOAD_SIZE."'>";
83 83
     ?>
84 84
     <fieldset class="option_container">
85
-        <legend><strong><?php echo sprintf(_("%s Properties"),$uiElements->nomenclatureFed); ?></strong></legend>
85
+        <legend><strong><?php echo sprintf(_("%s Properties"), $uiElements->nomenclatureFed); ?></strong></legend>
86 86
         <?php
87 87
         $optionDisplay = new \web\lib\admin\OptionDisplay($fed_options, \core\Options::LEVEL_FED);
88 88
         echo $optionDisplay->prefilledOptionTable("fed", $my_fed->tld);
@@ -90,5 +90,5 @@  discard block
 block discarded – undo
90 90
         <button type='button' class='newoption' onclick='getXML("fed", "<?php echo $my_fed->tld ?>")'><?php echo _("Add new option"); ?></button>
91 91
     </fieldset>
92 92
     <?php
93
-    echo "<div><button type='submit' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_SAVE . "'>" . _("Save data") . "</button> <button type='button' class='delete' name='abortbutton' value='abort' onclick='javascript:window.location = \"overview_federation.php\"'>" . _("Discard changes") . "</button></div></form>";
93
+    echo "<div><button type='submit' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_SAVE."'>"._("Save data")."</button> <button type='button' class='delete' name='abortbutton' value='abort' onclick='javascript:window.location = \"overview_federation.php\"'>"._("Discard changes")."</button></div></form>";
94 94
     echo $deco->footer();
Please login to merge, or discard this patch.
web/admin/inc/option_xhr.inc.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -19,11 +19,11 @@
 block discarded – undo
19 19
  *          <base_url>/copyright.php after deploying the software
20 20
  */
21 21
 
22
-require_once dirname(dirname(dirname(dirname(__FILE__)))) . "/config/_config.php";
22
+require_once dirname(dirname(dirname(dirname(__FILE__))))."/config/_config.php";
23 23
 
24 24
 \core\CAT::sessionStart();
25 25
 
26
-if (!isset($_GET["class"] )) {
26
+if (!isset($_GET["class"])) {
27 27
     throw new Exception("Unknown type of option!");
28 28
 }
29 29
 
Please login to merge, or discard this patch.