Passed
Push — master ( 034956...2b8b29 )
by Maja
16:38
created
core/CertificationAuthorityEduPki.php 1 patch
Spacing   +37 added lines, -37 removed lines patch added patch discarded remove patch
@@ -17,9 +17,9 @@  discard block
 block discarded – undo
17 17
 class CertificationAuthorityEduPki extends EntityWithDBProperties implements CertificationAuthorityInterface
18 18
 {
19 19
 
20
-    private const LOCATION_RA_CERT = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem";
21
-    private const LOCATION_RA_KEY = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey";
22
-    private const LOCATION_WEBROOT = ROOT . "/config/SilverbulletClientCerts/eduPKI-webserver-root.pem";
20
+    private const LOCATION_RA_CERT = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem";
21
+    private const LOCATION_RA_KEY = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey";
22
+    private const LOCATION_WEBROOT = ROOT."/config/SilverbulletClientCerts/eduPKI-webserver-root.pem";
23 23
     private const EDUPKI_RA_ID = 700;
24 24
     private const EDUPKI_CERT_PROFILE = "User SOAP";
25 25
     private const EDUPKI_RA_PKEY_PASSPHRASE = "...";
@@ -35,13 +35,13 @@  discard block
 block discarded – undo
35 35
         parent::__construct();
36 36
 
37 37
         if (stat(CertificationAuthorityEduPki::LOCATION_RA_CERT) === FALSE) {
38
-            throw new Exception("RA operator PEM file not found: " . CertificationAuthorityEduPki::LOCATION_RA_CERT);
38
+            throw new Exception("RA operator PEM file not found: ".CertificationAuthorityEduPki::LOCATION_RA_CERT);
39 39
         }
40 40
         if (stat(CertificationAuthorityEduPki::LOCATION_RA_KEY) === FALSE) {
41
-            throw new Exception("RA operator private key file not found: " . CertificationAuthorityEduPki::LOCATION_RA_KEY);
41
+            throw new Exception("RA operator private key file not found: ".CertificationAuthorityEduPki::LOCATION_RA_KEY);
42 42
         }
43 43
         if (stat(CertificationAuthorityEduPki::LOCATION_WEBROOT) === FALSE) {
44
-            throw new Exception("CA website root CA file not found: " . CertificationAuthorityEduPki::LOCATION_WEBROOT);
44
+            throw new Exception("CA website root CA file not found: ".CertificationAuthorityEduPki::LOCATION_WEBROOT);
45 45
         }
46 46
     }
47 47
 
@@ -72,19 +72,19 @@  discard block
 block discarded – undo
72 72
         // initialise connection to eduPKI CA / eduroam RA and send the request to them
73 73
         try {
74 74
             $altArray = [# Array mit den Subject Alternative Names
75
-                "email:" . $csr["USERNAME"]
75
+                "email:".$csr["USERNAME"]
76 76
             ];
77 77
             $soapPub = $this->initEduPKISoapSession("PUBLIC");
78 78
             $this->loggerInstance->debug(5, "FIRST ACTUAL SOAP REQUEST (Public, newRequest)!\n");
79
-            $this->loggerInstance->debug(5, "PARAM_1: " . CertificationAuthorityEduPki::EDUPKI_RA_ID . "\n");
80
-            $this->loggerInstance->debug(5, "PARAM_2: " . $csr["CSR"] . "\n");
79
+            $this->loggerInstance->debug(5, "PARAM_1: ".CertificationAuthorityEduPki::EDUPKI_RA_ID."\n");
80
+            $this->loggerInstance->debug(5, "PARAM_2: ".$csr["CSR"]."\n");
81 81
             $this->loggerInstance->debug(5, "PARAM_3: ");
82 82
             $this->loggerInstance->debug(5, $altArray);
83
-            $this->loggerInstance->debug(5, "PARAM_4: " . CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE . "\n");
84
-            $this->loggerInstance->debug(5, "PARAM_5: " . sha1("notused") . "\n");
85
-            $this->loggerInstance->debug(5, "PARAM_6: " . $csr["USERNAME"] . "\n");
86
-            $this->loggerInstance->debug(5, "PARAM_7: " . $csr["USERNAME"] . "\n");
87
-            $this->loggerInstance->debug(5, "PARAM_8: " . ProfileSilverbullet::PRODUCTNAME . "\n");
83
+            $this->loggerInstance->debug(5, "PARAM_4: ".CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE."\n");
84
+            $this->loggerInstance->debug(5, "PARAM_5: ".sha1("notused")."\n");
85
+            $this->loggerInstance->debug(5, "PARAM_6: ".$csr["USERNAME"]."\n");
86
+            $this->loggerInstance->debug(5, "PARAM_7: ".$csr["USERNAME"]."\n");
87
+            $this->loggerInstance->debug(5, "PARAM_8: ".ProfileSilverbullet::PRODUCTNAME."\n");
88 88
             $this->loggerInstance->debug(5, "PARAM_9: false\n");
89 89
             $soapNewRequest = $soapPub->newRequest(
90 90
                     CertificationAuthorityEduPki::EDUPKI_RA_ID, # RA-ID
@@ -106,11 +106,11 @@  discard block
 block discarded – undo
106 106
         } catch (Exception $e) {
107 107
             // PHP 7.1 can do this much better
108 108
             if (is_soap_fault($e)) {
109
-                throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}:  {
109
+                throw new Exception("Error when sending SOAP request: "."{$e->faultcode}:  {
110 110
                     $e->faultstring
111 111
                 }\n");
112 112
             }
113
-            throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage());
113
+            throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage());
114 114
         }
115 115
         try {
116 116
             $soap = $this->initEduPKISoapSession("RA");
@@ -122,8 +122,8 @@  discard block
 block discarded – undo
122 122
                     $soapReqnum, [
123 123
                 "RaID" => CertificationAuthorityEduPki::EDUPKI_RA_ID,
124 124
                 "Role" => CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE,
125
-                "Subject" => "DC=eduroam,DC=test,DC=test,C=" . $csr["FED"] . ",O=" . \config\ConfAssistant::CONSORTIUM['name'] . ",OU=" . $csr["FED"] . ",CN=" . $csr['USERNAME'] . ",emailAddress=" . $csr['USERNAME'],
126
-                "SubjectAltNames" => ["email:" . $csr["USERNAME"]],
125
+                "Subject" => "DC=eduroam,DC=test,DC=test,C=".$csr["FED"].",O=".\config\ConfAssistant::CONSORTIUM['name'].",OU=".$csr["FED"].",CN=".$csr['USERNAME'].",emailAddress=".$csr['USERNAME'],
126
+                "SubjectAltNames" => ["email:".$csr["USERNAME"]],
127 127
                 "NotBefore" => (new \DateTime())->format('c'),
128 128
                 "NotAfter" => $expiry->format('c'),
129 129
                     ]
@@ -142,7 +142,7 @@  discard block
 block discarded – undo
142 142
             // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file
143 143
             // rather than just using the string. Grr.
144 144
             $tempdir = \core\common\Entity::createTemporaryDirectory("test");
145
-            file_put_contents($tempdir['dir'] . "/content.txt", $soapCleartext);
145
+            file_put_contents($tempdir['dir']."/content.txt", $soapCleartext);
146 146
             // retrieve our RA cert from filesystem                    
147 147
             // the RA certificates are not needed right now because we
148 148
             // have resorted to S/MIME signatures with openssl command-line
@@ -154,7 +154,7 @@  discard block
 block discarded – undo
154 154
             // sign the data, using cmdline because openssl_pkcs7_sign produces strange results
155 155
             // -binary didn't help, nor switch -md to sha1 sha256 or sha512
156 156
             $this->loggerInstance->debug(5, "Actual content to be signed is this:\n  $soapCleartext\n");
157
-            $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem";
157
+            $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem";
158 158
             $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline:   $execCmd\n");
159 159
             $output = [];
160 160
             $return = 999;
@@ -163,14 +163,14 @@  discard block
 block discarded – undo
163 163
                 throw new Exception("Non-zero return value from openssl smime!");
164 164
             }
165 165
             // and get the signature blob back from the filesystem
166
-            $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt"));
166
+            $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt"));
167 167
             $this->loggerInstance->debug(5, "Request for server approveRequest has parameters:\n");
168
-            $this->loggerInstance->debug(5, $soapReqnum . "\n");
169
-            $this->loggerInstance->debug(5, $soapCleartext . "\n"); // PHP magically encodes this as base64 while sending!
170
-            $this->loggerInstance->debug(5, $detachedSig . "\n");
168
+            $this->loggerInstance->debug(5, $soapReqnum."\n");
169
+            $this->loggerInstance->debug(5, $soapCleartext."\n"); // PHP magically encodes this as base64 while sending!
170
+            $this->loggerInstance->debug(5, $detachedSig."\n");
171 171
             $soapIssueCert = $soap->approveRequest($soapReqnum, $soapCleartext, $detachedSig);
172
-            $this->loggerInstance->debug(5, "approveRequest Request was: \n" . $soap->__getLastRequest());
173
-            $this->loggerInstance->debug(5, "approveRequest Response was: \n" . $soap->__getLastResponse());
172
+            $this->loggerInstance->debug(5, "approveRequest Request was: \n".$soap->__getLastRequest());
173
+            $this->loggerInstance->debug(5, "approveRequest Response was: \n".$soap->__getLastResponse());
174 174
             if ($soapIssueCert === FALSE) {
175 175
                 throw new Exception("The locally approved request was NOT processed by the CA.");
176 176
             }
@@ -207,9 +207,9 @@  discard block
 block discarded – undo
207 207
                 throw new Exception("CAInfo has no root certificate for us!");
208 208
             }
209 209
         } catch (SoapFault $e) {
210
-            throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
210
+            throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
211 211
         } catch (Exception $e) {
212
-            throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage());
212
+            throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage());
213 213
         }
214 214
         return [
215 215
             "CERT" => openssl_x509_read($parsedCert['pem']),
@@ -242,12 +242,12 @@  discard block
 block discarded – undo
242 242
             // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file
243 243
             // rather than just using the string. Grr.
244 244
             $tempdir = \core\common\Entity::createTemporaryDirectory("test");
245
-            file_put_contents($tempdir['dir'] . "/content.txt", $soapRawRevRequest);
245
+            file_put_contents($tempdir['dir']."/content.txt", $soapRawRevRequest);
246 246
             // retrieve our RA cert from filesystem
247 247
             // sign the data, using cmdline because openssl_pkcs7_sign produces strange results
248 248
             // -binary didn't help, nor switch -md to sha1 sha256 or sha512
249 249
             $this->loggerInstance->debug(5, "Actual content to be signed is this:\n$soapRawRevRequest\n");
250
-            $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPki::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPki::LOCATION_RA_CERT;
250
+            $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPki::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPki::LOCATION_RA_CERT;
251 251
             $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n");
252 252
             $output = [];
253 253
             $return = 999;
@@ -256,7 +256,7 @@  discard block
 block discarded – undo
256 256
                 throw new Exception("Non-zero return value from openssl smime!");
257 257
             }
258 258
             // and get the signature blob back from the filesystem
259
-            $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt"));
259
+            $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt"));
260 260
             $soapIssueRev = $soap->approveRevocationRequest($soapRevocationSerial, $soapRawRevRequest, $detachedSig);
261 261
             if ($soapIssueRev === FALSE) {
262 262
                 throw new Exception("The locally approved revocation request was NOT processed by the CA.");
@@ -264,9 +264,9 @@  discard block
 block discarded – undo
264 264
         } catch (Exception $e) {
265 265
             // PHP 7.1 can do this much better
266 266
             if (is_soap_fault($e)) {
267
-                throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: {$e->faultstring}\n");
267
+                throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: {$e->faultstring}\n");
268 268
             }
269
-            throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage());
269
+            throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage());
270 270
         }
271 271
     }
272 272
 
@@ -366,9 +366,9 @@  discard block
 block discarded – undo
366 366
      */
367 367
     public function soapToXmlInteger($x)
368 368
     {
369
-        return '<' . $x[0] . '>'
369
+        return '<'.$x[0].'>'
370 370
                 . htmlentities($x[1], ENT_NOQUOTES | ENT_XML1)
371
-                . '</' . $x[0] . '>';
371
+                . '</'.$x[0].'>';
372 372
     }
373 373
 
374 374
     /**
@@ -387,9 +387,9 @@  discard block
 block discarded – undo
387 387
         // dump private key into directory
388 388
         $outstring = "";
389 389
         openssl_pkey_export($privateKey, $outstring);
390
-        file_put_contents($tempdir . "/pkey.pem", $outstring);
390
+        file_put_contents($tempdir."/pkey.pem", $outstring);
391 391
         // PHP can only do one DC in the Subject. But we need three.
392
-        $execCmd = \config\Master::PATHS['openssl'] . " req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$fed/CN=$username/emailAddress=$username";
392
+        $execCmd = \config\Master::PATHS['openssl']." req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$fed/CN=$username/emailAddress=$username";
393 393
         $this->loggerInstance->debug(2, "Calling openssl req with following cmdline: $execCmd\n");
394 394
         $output = [];
395 395
         $return = 999;
Please login to merge, or discard this patch.
core/CertificationAuthorityEmbeddedECDSA.php 1 patch
Spacing   +20 added lines, -20 removed lines patch added patch discarded remove patch
@@ -16,10 +16,10 @@  discard block
 block discarded – undo
16 16
 class CertificationAuthorityEmbeddedECDSA extends EntityWithDBProperties implements CertificationAuthorityInterface
17 17
 {
18 18
 
19
-    private const LOCATION_ROOT_CA = ROOT . "/config/SilverbulletClientCerts/rootca-ECDSA.pem";
20
-    private const LOCATION_ISSUING_CA = ROOT . "/config/SilverbulletClientCerts/real-ECDSA.pem";
21
-    private const LOCATION_ISSUING_KEY = ROOT . "/config/SilverbulletClientCerts/real-ECDSA.key";
22
-    private const LOCATION_CONFIG = ROOT . "/config/SilverbulletClientCerts/openssl-ECDSA.cnf";
19
+    private const LOCATION_ROOT_CA = ROOT."/config/SilverbulletClientCerts/rootca-ECDSA.pem";
20
+    private const LOCATION_ISSUING_CA = ROOT."/config/SilverbulletClientCerts/real-ECDSA.pem";
21
+    private const LOCATION_ISSUING_KEY = ROOT."/config/SilverbulletClientCerts/real-ECDSA.key";
22
+    private const LOCATION_CONFIG = ROOT."/config/SilverbulletClientCerts/openssl-ECDSA.cnf";
23 23
 
24 24
     /**
25 25
      * string with the PEM variant of the root CA
@@ -66,11 +66,11 @@  discard block
 block discarded – undo
66 66
         parent::__construct();
67 67
         $this->rootPem = file_get_contents(CertificationAuthorityEmbeddedECDSA::LOCATION_ROOT_CA);
68 68
         if ($this->rootPem === FALSE) {
69
-            throw new Exception("Root CA PEM file not found: " . CertificationAuthorityEmbeddedECDSA::LOCATION_ROOT_CA);
69
+            throw new Exception("Root CA PEM file not found: ".CertificationAuthorityEmbeddedECDSA::LOCATION_ROOT_CA);
70 70
         }
71 71
         $this->issuingCertRaw = file_get_contents(CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA);
72 72
         if ($this->issuingCertRaw === FALSE) {
73
-            throw new Exception("Issuing CA PEM file not found: " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA);
73
+            throw new Exception("Issuing CA PEM file not found: ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA);
74 74
         }
75 75
         $rootParsed = openssl_x509_read($this->rootPem);
76 76
         $this->issuingCert = openssl_x509_read($this->issuingCertRaw);
@@ -78,15 +78,15 @@  discard block
 block discarded – undo
78 78
             throw new Exception("At least one CA PEM file did not parse correctly!");
79 79
         }
80 80
         if (stat(CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY) === FALSE) {
81
-            throw new Exception("Private key not found: " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY);
81
+            throw new Exception("Private key not found: ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY);
82 82
         }
83
-        $issuingKeyTemp = openssl_pkey_get_private("file://" . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY);
83
+        $issuingKeyTemp = openssl_pkey_get_private("file://".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY);
84 84
         if ($issuingKeyTemp === FALSE) {
85 85
             throw new Exception("The private key did not parse correctly!");
86 86
         }
87 87
         $this->issuingKey = $issuingKeyTemp;
88 88
         if (stat(CertificationAuthorityEmbeddedECDSA::LOCATION_CONFIG) === FALSE) {
89
-            throw new Exception("openssl configuration not found: " . CertificationAuthorityEmbeddedECDSA::LOCATION_CONFIG);
89
+            throw new Exception("openssl configuration not found: ".CertificationAuthorityEmbeddedECDSA::LOCATION_CONFIG);
90 90
         }
91 91
         $this->conffile = CertificationAuthorityEmbeddedECDSA::LOCATION_CONFIG;
92 92
     }
@@ -129,27 +129,27 @@  discard block
 block discarded – undo
129 129
         // generate stub index.txt file
130 130
         $tempdirArray = \core\common\Entity::createTemporaryDirectory("test");
131 131
         $tempdir = $tempdirArray['dir'];
132
-        $nowIndexTxt = (new \DateTime())->format("ymdHis") . "Z";
133
-        $expiryIndexTxt = $originalExpiry->format("ymdHis") . "Z";
132
+        $nowIndexTxt = (new \DateTime())->format("ymdHis")."Z";
133
+        $expiryIndexTxt = $originalExpiry->format("ymdHis")."Z";
134 134
         // serials for our CA are always integers
135 135
         $serialHex = strtoupper(dechex((int) $cert->serial));
136 136
         if (strlen($serialHex) % 2 == 1) {
137
-            $serialHex = "0" . $serialHex;
137
+            $serialHex = "0".$serialHex;
138 138
         }
139 139
 
140
-        $indexStatement = "$certstatus\t$expiryIndexTxt\t" . ($certstatus == "R" ? "$nowIndexTxt,unspecified" : "") . "\t$serialHex\tunknown\t/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$federation/CN=$cert->username\n";
140
+        $indexStatement = "$certstatus\t$expiryIndexTxt\t".($certstatus == "R" ? "$nowIndexTxt,unspecified" : "")."\t$serialHex\tunknown\t/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$federation/CN=$cert->username\n";
141 141
         $this->loggerInstance->debug(4, "index.txt contents-to-be: $indexStatement");
142
-        if (!file_put_contents($tempdir . "/index.txt", $indexStatement)) {
142
+        if (!file_put_contents($tempdir."/index.txt", $indexStatement)) {
143 143
             $this->loggerInstance->debug(1, "Unable to write openssl index.txt file for revocation handling!");
144 144
         }
145 145
         // index.txt.attr is dull but needs to exist
146
-        file_put_contents($tempdir . "/index.txt.attr", "unique_subject = yes\n");
146
+        file_put_contents($tempdir."/index.txt.attr", "unique_subject = yes\n");
147 147
         // call "openssl ocsp" to manufacture our own OCSP statement
148 148
         // adding "-rmd sha1" to the following command-line makes the
149 149
         // choice of signature algorithm for the response explicit
150 150
         // but it's only available from openssl-1.1.0 (which we do not
151 151
         // want to require just for that one thing).
152
-        $execCmd = \config\Master::PATHS['openssl'] . " ocsp -issuer " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA . " -sha1 -ndays 10 -no_nonce -serial 0x$serialHex -CA " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA . " -rsigner " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA . " -rkey " . CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY . " -index $tempdir/index.txt -no_cert_verify -respout $tempdir/$serialHex.response.der";
152
+        $execCmd = \config\Master::PATHS['openssl']." ocsp -issuer ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA." -sha1 -ndays 10 -no_nonce -serial 0x$serialHex -CA ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA." -rsigner ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_CA." -rkey ".CertificationAuthorityEmbeddedECDSA::LOCATION_ISSUING_KEY." -index $tempdir/index.txt -no_cert_verify -respout $tempdir/$serialHex.response.der";
153 153
         $this->loggerInstance->debug(2, "Calling openssl ocsp with following cmdline: $execCmd\n");
154 154
         $output = [];
155 155
         $return = 999;
@@ -157,11 +157,11 @@  discard block
 block discarded – undo
157 157
         if ($return !== 0) {
158 158
             throw new Exception("Non-zero return value from openssl ocsp!");
159 159
         }
160
-        $ocsp = file_get_contents($tempdir . "/$serialHex.response.der");
160
+        $ocsp = file_get_contents($tempdir."/$serialHex.response.der");
161 161
         // remove the temp dir!
162
-        unlink($tempdir . "/$serialHex.response.der");
163
-        unlink($tempdir . "/index.txt.attr");
164
-        unlink($tempdir . "/index.txt");
162
+        unlink($tempdir."/$serialHex.response.der");
163
+        unlink($tempdir."/index.txt.attr");
164
+        unlink($tempdir."/index.txt");
165 165
         rmdir($tempdir);
166 166
         $this->databaseHandle->exec("UPDATE silverbullet_certificate SET OCSP = ?, OCSP_timestamp = NOW() WHERE serial_number = ?", "si", $ocsp, $cert->serial);
167 167
         return $ocsp;
Please login to merge, or discard this patch.
core/EntityWithDBProperties.php 1 patch
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -139,7 +139,7 @@  discard block
 block discarded – undo
139 139
             case "core\User":
140 140
                 return $this->userName;
141 141
             default:
142
-                throw new Exception("Operating on a class where we don't know the relevant identifier in the DB - " . get_class($this) . "!");
142
+                throw new Exception("Operating on a class where we don't know the relevant identifier in the DB - ".get_class($this)."!");
143 143
         }
144 144
     }
145 145
 
@@ -177,7 +177,7 @@  discard block
 block discarded – undo
177 177
      */
178 178
     public function beginFlushAttributes($extracondition = "")
179 179
     {
180
-        $quotedIdentifier = (!is_int($this->getRelevantIdentifier()) ? "\"" : "") . $this->getRelevantIdentifier() . (!is_int($this->getRelevantIdentifier()) ? "\"" : "");
180
+        $quotedIdentifier = (!is_int($this->getRelevantIdentifier()) ? "\"" : "").$this->getRelevantIdentifier().(!is_int($this->getRelevantIdentifier()) ? "\"" : "");
181 181
         $this->databaseHandle->exec("DELETE FROM $this->entityOptionTable WHERE $this->entityIdColumn = $quotedIdentifier AND option_name NOT LIKE '%_file' $extracondition");
182 182
         $this->updateFreshness();
183 183
         $execFlush = $this->databaseHandle->exec("SELECT row FROM $this->entityOptionTable WHERE $this->entityIdColumn = $quotedIdentifier $extracondition");
@@ -197,7 +197,7 @@  discard block
 block discarded – undo
197 197
      */
198 198
     public function commitFlushAttributes(array $tobedeleted)
199 199
     {
200
-        $quotedIdentifier = (!is_int($this->getRelevantIdentifier()) ? "\"" : "") . $this->getRelevantIdentifier() . (!is_int($this->getRelevantIdentifier()) ? "\"" : "");
200
+        $quotedIdentifier = (!is_int($this->getRelevantIdentifier()) ? "\"" : "").$this->getRelevantIdentifier().(!is_int($this->getRelevantIdentifier()) ? "\"" : "");
201 201
         foreach (array_keys($tobedeleted) as $row) {
202 202
             $this->databaseHandle->exec("DELETE FROM $this->entityOptionTable WHERE $this->entityIdColumn = $quotedIdentifier AND row = $row");
203 203
             $this->updateFreshness();
@@ -226,7 +226,7 @@  discard block
 block discarded – undo
226 226
     {
227 227
         $relevantId = $this->getRelevantIdentifier();
228 228
         $identifierType = (is_int($relevantId) ? "i" : "s");
229
-        $this->databaseHandle->exec("INSERT INTO $this->entityOptionTable ($this->entityIdColumn, option_name, option_lang, option_value) VALUES(?,?,?,?)", $identifierType . "sss", $relevantId, $attrName, $attrLang, $attrValue);
229
+        $this->databaseHandle->exec("INSERT INTO $this->entityOptionTable ($this->entityIdColumn, option_name, option_lang, option_value) VALUES(?,?,?,?)", $identifierType."sss", $relevantId, $attrName, $attrLang, $attrValue);
230 230
         $this->updateFreshness();
231 231
     }
232 232
 
Please login to merge, or discard this patch.
core/DeviceConfig.php 2 patches
Indentation   -1 removed lines patch added patch discarded remove patch
@@ -109,7 +109,6 @@
 block discarded – undo
109 109
      * ["my.server.name"] => "my.server.name"
110 110
      * ["foo.bar.de", "baz.bar.ge"] => "e"
111 111
      * ["server1.example.com", "server2.example.com", "serverN.example.com"] => ".example.com"
112
-
113 112
      * @return string
114 113
      */
115 114
     public function longestNameSuffix()
Please login to merge, or discard this patch.
Spacing   +20 added lines, -20 removed lines patch added patch discarded remove patch
@@ -85,7 +85,7 @@  discard block
 block discarded – undo
85 85
     protected function setSupportedEapMethods($eapArray)
86 86
     {
87 87
         $this->supportedEapMethods = $eapArray;
88
-        $this->loggerInstance->debug(4, "This device (" . __CLASS__ . ") supports the following EAP methods: ");
88
+        $this->loggerInstance->debug(4, "This device (".__CLASS__.") supports the following EAP methods: ");
89 89
         $this->loggerInstance->debug(4, $this->supportedEapMethods);
90 90
     }
91 91
 
@@ -137,7 +137,7 @@  discard block
 block discarded – undo
137 137
                     break 2;
138 138
                 }
139 139
             }
140
-            $longestSuffix = $candidate . $longestSuffix;
140
+            $longestSuffix = $candidate.$longestSuffix;
141 141
         }
142 142
         return $longestSuffix;
143 143
     }
@@ -175,7 +175,7 @@  discard block
 block discarded – undo
175 175
             throw new Exception("No EAP type available.");
176 176
         }
177 177
         $this->attributes = $this->getProfileAttributes($profile);
178
-        $this->deviceUUID = common\Entity::uuid('', 'CAT' . $profile->institution . "-" . $profile->identifier . "-" . $this->device_id);
178
+        $this->deviceUUID = common\Entity::uuid('', 'CAT'.$profile->institution."-".$profile->identifier."-".$this->device_id);
179 179
 
180 180
 
181 181
         // if we are instantiating a Silverbullet profile AND have been given
@@ -199,8 +199,8 @@  discard block
 block discarded – undo
199 199
         // create temporary directory, its full path will be saved in $this->FPATH;
200 200
         $tempDir = \core\common\Entity::createTemporaryDirectory($purpose);
201 201
         $this->FPATH = $tempDir['dir'];
202
-        mkdir($tempDir['dir'] . '/tmp');
203
-        chdir($tempDir['dir'] . '/tmp');
202
+        mkdir($tempDir['dir'].'/tmp');
203
+        chdir($tempDir['dir'].'/tmp');
204 204
         $caList = [];
205 205
         $x509 = new \core\common\X509();
206 206
         if (isset($this->attributes['eap:ca_file'])) {
@@ -236,7 +236,7 @@  discard block
 block discarded – undo
236 236
         $this->support_url_substitute = sprintf(_("your local %s support page"), \config\ConfAssistant::CONSORTIUM['display_name']);
237 237
 
238 238
         if ($this->signer && $this->options['sign']) {
239
-            $this->sign = ROOT . '/signer/' . $this->signer;
239
+            $this->sign = ROOT.'/signer/'.$this->signer;
240 240
         }
241 241
         $this->installerBasename = $this->getInstallerBasename();
242 242
         common\Entity::outOfThePotatoes();
@@ -296,10 +296,10 @@  discard block
 block discarded – undo
296 296
      */
297 297
     protected function findSourceFile($file)
298 298
     {
299
-        if (is_file($this->module_path . '/Files/' . $this->device_id . '/' . $file)) {
300
-            return $this->module_path . '/Files/' . $this->device_id . '/' . $file;
301
-        } elseif (is_file($this->module_path . '/Files/' . $file)) {
302
-            return $this->module_path . '/Files/' . $file;
299
+        if (is_file($this->module_path.'/Files/'.$this->device_id.'/'.$file)) {
300
+            return $this->module_path.'/Files/'.$this->device_id.'/'.$file;
301
+        } elseif (is_file($this->module_path.'/Files/'.$file)) {
302
+            return $this->module_path.'/Files/'.$file;
303 303
         } else {
304 304
             $this->loggerInstance->debug(2, "requested file $file does not exist\n");
305 305
             return FALSE;
@@ -423,17 +423,17 @@  discard block
 block discarded – undo
423 423
      */
424 424
     private function getInstallerBasename()
425 425
     {
426
-        $baseName = $this->customTranslit(\config\ConfAssistant::CONSORTIUM['name']) . "-" . $this->getDeviceId();
426
+        $baseName = $this->customTranslit(\config\ConfAssistant::CONSORTIUM['name'])."-".$this->getDeviceId();
427 427
         if (isset($this->attributes['profile:customsuffix'][1])) {
428 428
             // this string will end up as a filename on a filesystem, so always
429 429
             // take a latin-based language variant if available
430 430
             // and then scrub non-ASCII just in case
431
-            return $baseName . $this->customTranslit($this->attributes['profile:customsuffix'][1]);
431
+            return $baseName.$this->customTranslit($this->attributes['profile:customsuffix'][1]);
432 432
         }
433 433
         // Okay, no custom suffix. 
434 434
         // Use the configured inst name and apply shortening heuristics
435 435
         $lang_pointer = \config\Master::LANGUAGES[$this->languageInstance->getLang()]['latin_based'] == TRUE ? 0 : 1;
436
-        $this->loggerInstance->debug(5, "getInstallerBasename1:" . $this->attributes['general:instname'][$lang_pointer] . "\n");
436
+        $this->loggerInstance->debug(5, "getInstallerBasename1:".$this->attributes['general:instname'][$lang_pointer]."\n");
437 437
         $inst = $this->customTranslit($this->attributes['general:instname'][$lang_pointer]);
438 438
         $this->loggerInstance->debug(4, "getInstallerBasename2:$inst\n");
439 439
         $Inst_a = explode('_', $inst);
@@ -448,10 +448,10 @@  discard block
 block discarded – undo
448 448
             if (!empty($this->attributes['profile:name']) && !empty($this->attributes['profile:name'][$lang_pointer])) {
449 449
                 $profTemp = $this->customTranslit($this->attributes['profile:name'][$lang_pointer]);
450 450
                 $prof = preg_replace('/_+$/', '', $profTemp);
451
-                return $baseName . $inst . '-' . $prof;
451
+                return $baseName.$inst.'-'.$prof;
452 452
             }
453 453
         }
454
-        return $baseName . $inst;
454
+        return $baseName.$inst;
455 455
     }
456 456
 
457 457
     /**
@@ -569,7 +569,7 @@  discard block
 block discarded – undo
569 569
                 $ext = 'unsupported';
570 570
             }
571 571
             $this->loggerInstance->debug(5, "saveLogoFile: $mime : $ext\n");
572
-            $fileName = 'logo-' . $type . $iterator . '.' . $ext;
572
+            $fileName = 'logo-'.$type.$iterator.'.'.$ext;
573 573
             $fileHandle = fopen($fileName, "w");
574 574
             if (!$fileHandle) {
575 575
                 $this->loggerInstance->debug(2, "saveLogoFile failed for: $fileName\n");
@@ -596,13 +596,13 @@  discard block
 block discarded – undo
596 596
         $mime = $finfo->buffer($blob);
597 597
         $ext = isset($this->mime_extensions[$mime]) ? $this->mime_extensions[$mime] : 'usupported';
598 598
         $this->loggerInstance->debug(5, "saveInfoFile: $mime : $ext\n");
599
-        $fileHandle = fopen('local-info.' . $ext, "w");
599
+        $fileHandle = fopen('local-info.'.$ext, "w");
600 600
         if ($fileHandle === FALSE) {
601 601
             throw new Exception("problem opening the file");
602 602
         }
603 603
         fwrite($fileHandle, $blob);
604 604
         fclose($fileHandle);
605
-        return(['name' => 'local-info.' . $ext, 'mime' => $ext]);
605
+        return(['name' => 'local-info.'.$ext, 'mime' => $ext]);
606 606
     }
607 607
 
608 608
     /**
@@ -656,9 +656,9 @@  discard block
 block discarded – undo
656 656
     {
657 657
         $outerId = NULL;
658 658
         if (isset($this->attributes['internal:use_anon_outer']) && $this->attributes['internal:use_anon_outer'][0] == "1" && isset($this->attributes['internal:realm'])) {
659
-            $outerId = "@" . $this->attributes['internal:realm'][0];
659
+            $outerId = "@".$this->attributes['internal:realm'][0];
660 660
             if (isset($this->attributes['internal:anon_local_value'])) {
661
-                $outerId = $this->attributes['internal:anon_local_value'][0] . $outerId;
661
+                $outerId = $this->attributes['internal:anon_local_value'][0].$outerId;
662 662
             }
663 663
         }
664 664
         return $outerId;
Please login to merge, or discard this patch.
core/AbstractProfile.php 1 patch
Spacing   +9 added lines, -9 removed lines patch added patch discarded remove patch
@@ -134,7 +134,7 @@  discard block
 block discarded – undo
134 134
     protected function saveDownloadDetails($idpIdentifier, $profileId, $deviceId, $area, $lang, $eapType)
135 135
     {
136 136
         if (\config\Master::PATHS['logdir']) {
137
-            $file = fopen(\config\Master::PATHS['logdir'] . "/download_details.log", "a");
137
+            $file = fopen(\config\Master::PATHS['logdir']."/download_details.log", "a");
138 138
             if ($file === FALSE) {
139 139
                 throw new Exception("Unable to open file for append: $file");
140 140
             }
@@ -169,9 +169,9 @@  discard block
 block discarded – undo
169 169
             }
170 170
             // check if a CA with identical DN was added - alert NRO if so
171 171
             if (array_search($ca['subject'], $baselineCA) !== FALSE) {
172
-                $retval[AbstractProfile::CA_CLASH_ADDED] .= "#SHA1 for CA with DN '" . print_r($ca['subject'], TRUE) . "' has SHA1 fingerprints (pre-existing) " . /** @scrutinizer ignore-type */ array_search($ca['subject'], $baselineCA) . " and (added) " . $ca['sha1'];
172
+                $retval[AbstractProfile::CA_CLASH_ADDED] .= "#SHA1 for CA with DN '".print_r($ca['subject'], TRUE)."' has SHA1 fingerprints (pre-existing) "./** @scrutinizer ignore-type */ array_search($ca['subject'], $baselineCA)." and (added) ".$ca['sha1'];
173 173
             } else {
174
-                $retval[AbstractProfile::CA_ADDED] .= "#CA with DN '" . print_r($ca['subject'], TRUE) . "' and SHA1 fingerprint " . $ca['sha1'] . " was added as trust anchor";
174
+                $retval[AbstractProfile::CA_ADDED] .= "#CA with DN '".print_r($ca['subject'], TRUE)."' and SHA1 fingerprint ".$ca['sha1']." was added as trust anchor";
175 175
             }
176 176
         }
177 177
         // check if a servername was added
@@ -181,7 +181,7 @@  discard block
 block discarded – undo
181 181
         }
182 182
         foreach ($new->getAttributes("eap:server_name") as $newName) {
183 183
             if (!in_array($newName['value'], $baselineNames)) {
184
-                $retval[AbstractProfile::SERVERNAME_ADDED] .= "#New server name '" . $newName['value'] . "' added";
184
+                $retval[AbstractProfile::SERVERNAME_ADDED] .= "#New server name '".$newName['value']."' added";
185 185
             }
186 186
         }
187 187
         return $retval;
@@ -205,7 +205,7 @@  discard block
 block discarded – undo
205 205
             $eaptype = new common\EAP($eapQuery->eap_method_id);
206 206
             $eapTypeArray[] = $eaptype;
207 207
         }
208
-        $this->loggerInstance->debug(4, "This profile supports the following EAP types:\n" . print_r($eapTypeArray, true));
208
+        $this->loggerInstance->debug(4, "This profile supports the following EAP types:\n".print_r($eapTypeArray, true));
209 209
         return $eapTypeArray;
210 210
     }
211 211
 
@@ -287,16 +287,16 @@  discard block
 block discarded – undo
287 287
         if (count($this->getAttributes("internal:checkuser_outer")) > 0) {
288 288
             // we are supposed to use a specific outer username for checks, 
289 289
             // which is different from the outer username we put into installers
290
-            return $this->getAttributes("internal:checkuser_value")[0]['value'] . "@" . $realm;
290
+            return $this->getAttributes("internal:checkuser_value")[0]['value']."@".$realm;
291 291
         }
292 292
         if (count($this->getAttributes("internal:use_anon_outer")) > 0) {
293 293
             // no special check username, but there is an anon outer ID for
294 294
             // installers - so let's use that one
295
-            return $this->getAttributes("internal:anon_local_value")[0]['value'] . "@" . $realm;
295
+            return $this->getAttributes("internal:anon_local_value")[0]['value']."@".$realm;
296 296
         }
297 297
         // okay, no guidance on outer IDs at all - but we need *something* to
298 298
         // test with for the RealmChecks. So:
299
-        return "@" . $realm;
299
+        return "@".$realm;
300 300
     }
301 301
 
302 302
     /**
@@ -744,7 +744,7 @@  discard block
 block discarded – undo
744 744
     public function prepShowtime()
745 745
     {
746 746
         $properConfig = $this->readyForShowtime();
747
-        $this->databaseHandle->exec("UPDATE profile SET sufficient_config = " . ($properConfig ? "TRUE" : "FALSE") . " WHERE profile_id = " . $this->identifier);
747
+        $this->databaseHandle->exec("UPDATE profile SET sufficient_config = ".($properConfig ? "TRUE" : "FALSE")." WHERE profile_id = ".$this->identifier);
748 748
 
749 749
         $attribs = $this->getCollapsedAttributes();
750 750
         // if not enough info to go live, set FALSE
Please login to merge, or discard this patch.
web/skins/modern/user/js/cat_js.php 1 patch
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -83,7 +83,7 @@  discard block
 block discarded – undo
83 83
         otherdata = j.otherdata;
84 84
     if(! result) {
85 85
       alert("<?php $cat->javaScriptEscapedEcho(_("no matching data found"))?>");
86
-      document.location.href='<?php echo rtrim(dirname($_SERVER['SCRIPT_NAME']), '/') . '/' ?>';
86
+      document.location.href='<?php echo rtrim(dirname($_SERVER['SCRIPT_NAME']), '/').'/' ?>';
87 87
     }
88 88
     j = j.data;
89 89
     n = j.length;
@@ -220,7 +220,7 @@  discard block
 block discarded – undo
220 220
        result = j1.status;
221 221
        if(! result) {
222 222
             alert("<?php $cat->javaScriptEscapedEcho(_("no matching data found")) ?>");
223
-            document.location.href='<?php echo rtrim(dirname($_SERVER['SCRIPT_NAME']), '/') . '/' ?>';
223
+            document.location.href='<?php echo rtrim(dirname($_SERVER['SCRIPT_NAME']), '/').'/' ?>';
224 224
        }
225 225
        j = j1.data;
226 226
        if(j.description !== undefined && j.description) {
@@ -231,7 +231,7 @@  discard block
 block discarded – undo
231 231
          $("#profile_desc").hide();
232 232
          $("#profile_desc").text('');
233 233
        }
234
-       updateTxt = '<span class="user_info"><?php $cat->javaScriptEscapedEcho(_("This entry was last updated at:"));?>'+' '+j.last_changed+'</span><br/>';
234
+       updateTxt = '<span class="user_info"><?php $cat->javaScriptEscapedEcho(_("This entry was last updated at:")); ?>'+' '+j.last_changed+'</span><br/>';
235 235
        if(j.local_url !== undefined && j.local_url) 
236 236
        txt = txt+'<span class="user_info"><?php $cat->javaScriptEscapedEcho(_("WWW:")); ?> <a href="'+j.local_url+'" target="_blank">'+j.local_url+'</a></span><br/>';
237 237
        if(j.local_email !== undefined && j.local_email) 
Please login to merge, or discard this patch.
web/lib/common/InputValidation.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -40,7 +40,7 @@  discard block
 block discarded – undo
40 40
     private function inputValidationError($customtext)
41 41
     {
42 42
         \core\common\Entity::intoThePotatoes();
43
-        $retval = "<p>" . _("Input validation error: ") . $customtext . "</p>";
43
+        $retval = "<p>"._("Input validation error: ").$customtext."</p>";
44 44
         \core\common\Entity::outOfThePotatoes();
45 45
         return $retval;
46 46
     }
@@ -541,7 +541,7 @@  discard block
 block discarded – undo
541 541
         try {
542 542
             $image->readImageBlob($binary);
543 543
         } catch (\ImagickException $exception) {
544
-            echo "Error" . $exception->getMessage();
544
+            echo "Error".$exception->getMessage();
545 545
             return FALSE;
546 546
         }
547 547
         // image survived the sanity check
Please login to merge, or discard this patch.
web/admin/edit_silverbullet.php 1 patch
Spacing   +69 added lines, -69 removed lines patch added patch discarded remove patch
@@ -20,7 +20,7 @@  discard block
 block discarded – undo
20 20
 /*
21 21
  * Class autoloader invocation, should be included prior to any other code at the entry points to the application
22 22
  */
23
-require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php";
23
+require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php";
24 24
 
25 25
 $auth = new \web\lib\admin\Authentication();
26 26
 $auth->authenticate();
@@ -53,7 +53,7 @@  discard block
 block discarded – undo
53 53
     $fed = new \core\Federation($inst->federation);
54 54
     $allowSb = $fed->getAttributes("fed:silverbullet");
55 55
     if (count($allowSb) == 0) {
56
-        throw new Exception("We were told to create a new SB profile, but this " . \config\ConfAssistant::CONSORTIUM['nomenclature_federation'] . " does not allow SB at all!");
56
+        throw new Exception("We were told to create a new SB profile, but this ".\config\ConfAssistant::CONSORTIUM['nomenclature_federation']." does not allow SB at all!");
57 57
     }
58 58
     // okay, new SB profiles are allowed. 
59 59
     // but is there a support:email attribute on inst level?
@@ -64,7 +64,7 @@  discard block
 block discarded – undo
64 64
     // Create one.
65 65
     $newProfile = $inst->newProfile(core\AbstractProfile::PROFILETYPE_SILVERBULLET);
66 66
     // and modify the REQUEST_URI to add the new profile ID
67
-    $_SERVER['REQUEST_URI'] = $_SERVER['REQUEST_URI'] . "&profile_id=" . $newProfile->identifier;
67
+    $_SERVER['REQUEST_URI'] = $_SERVER['REQUEST_URI']."&profile_id=".$newProfile->identifier;
68 68
     $_GET['profile_id'] = $newProfile->identifier;
69 69
     $profile = $newProfile;
70 70
 } else {
@@ -89,7 +89,7 @@  discard block
 block discarded – undo
89 89
 if (isset($_POST['command'])) {
90 90
     switch ($_POST['command']) {
91 91
         case \web\lib\common\FormElements::BUTTON_CLOSE:
92
-            header("Location: overview_idp.php?inst_id=" . $inst->identifier);
92
+            header("Location: overview_idp.php?inst_id=".$inst->identifier);
93 93
             break;
94 94
         case \web\lib\common\FormElements::BUTTON_TERMSOFUSE:
95 95
             if (isset($_POST['agreement']) && $_POST['agreement'] == 'true') {
@@ -132,7 +132,7 @@  discard block
 block discarded – undo
132 132
                         break;
133 133
                     }
134 134
                     $properName = $validator->syntaxConformUser($elements[0]);
135
-                    $properDate = new DateTime($elements[1] . " 00:00:00");
135
+                    $properDate = new DateTime($elements[1]." 00:00:00");
136 136
                     $numberOfActivations = $elements[2] ?? 5;
137 137
                     $number = $validator->integer($numberOfActivations);
138 138
                     if ($number === FALSE) { // invalid input received, default to sane
@@ -235,18 +235,18 @@  discard block
 block discarded – undo
235 235
                     // warn and ask for confirmation unless already confirmed
236 236
                     if (!isset($_POST['insecureconfirm']) || $_POST['insecureconfirm'] != "CONFIRM") {
237 237
                         echo $deco->pageheader(_("Insecure mail domain!"), "ADMIN-IDP-USERS");
238
-                        echo "<p>" . sprintf(_("The mail domain of the mail address <strong>%s</strong> is not secure: some or all of the mail servers are not accepting encrypted connections (no consistent support for STARTTLS)."), $properEmail) . "</p>";
239
-                        echo "<p>" . _("The invitation would need to be sent in cleartext across the internet, and can possibly be read and abused by anyone in transit.") . "</p>";
240
-                        echo "<p>" . _("Do you want the system to send this mail anyway?") . "</p>";
238
+                        echo "<p>".sprintf(_("The mail domain of the mail address <strong>%s</strong> is not secure: some or all of the mail servers are not accepting encrypted connections (no consistent support for STARTTLS)."), $properEmail)."</p>";
239
+                        echo "<p>"._("The invitation would need to be sent in cleartext across the internet, and can possibly be read and abused by anyone in transit.")."</p>";
240
+                        echo "<p>"._("Do you want the system to send this mail anyway?")."</p>";
241 241
                         echo $formtext;
242
-                        echo "<button type='submit' class='delete'>" . _("DO NOT SEND") . "</button>";
242
+                        echo "<button type='submit' class='delete'>"._("DO NOT SEND")."</button>";
243 243
                         echo "</form>";
244 244
                         echo $formtext;
245
-                        echo "<input type='hidden' name='command' value='" . \web\lib\common\FormElements::BUTTON_SENDINVITATIONMAILBYCAT . "'</>";
245
+                        echo "<input type='hidden' name='command' value='".\web\lib\common\FormElements::BUTTON_SENDINVITATIONMAILBYCAT."'</>";
246 246
                         echo "<input type='hidden' name='address' value='$properEmail'</>";
247
-                        echo "<input type='hidden' name='token' value='" . $invitationObject->invitationTokenString . "'</>";
247
+                        echo "<input type='hidden' name='token' value='".$invitationObject->invitationTokenString."'</>";
248 248
                         echo "<input type='hidden' name='insecureconfirm' value='CONFIRM'/>";
249
-                        echo "<button type='submit'>" . _("Send anyway.") . "</button>";
249
+                        echo "<button type='submit'>"._("Send anyway.")."</button>";
250 250
                         echo "</form>";
251 251
                         echo $deco->footer();
252 252
                         exit;
@@ -297,7 +297,7 @@  discard block
 block discarded – undo
297 297
 $activeUsers = $profile->listActiveUsers();
298 298
 
299 299
 
300
-echo $deco->defaultPagePrelude(sprintf(_('Managing %s users'), \core\ProfileSilverbullet::PRODUCTNAME ));
300
+echo $deco->defaultPagePrelude(sprintf(_('Managing %s users'), \core\ProfileSilverbullet::PRODUCTNAME));
301 301
 
302 302
 ?>
303 303
 <script src='js/option_expand.js' type='text/javascript'></script>
@@ -360,19 +360,19 @@  discard block
 block discarded – undo
360 360
         case "NOSTIPULATION":
361 361
             break;
362 362
         case "EMAIL-SENT":
363
-            echo $boundaryPre . $uiElements->boxOkay(_("The e-mail was sent successfully."), _("E-mail OK."), FALSE) . $boundaryPost;
363
+            echo $boundaryPre.$uiElements->boxOkay(_("The e-mail was sent successfully."), _("E-mail OK."), FALSE).$boundaryPost;
364 364
             break;
365 365
         case "EMAIL-NOTSENT":
366
-            echo $boundaryPre . $uiElements->boxError(_("The e-mail was NOT sent."), _("E-mail not OK."), FALSE) . $boundaryPost;
366
+            echo $boundaryPre.$uiElements->boxError(_("The e-mail was NOT sent."), _("E-mail not OK."), FALSE).$boundaryPost;
367 367
             break;
368 368
         case "SMS-SENT":
369
-            echo $boundaryPre . $uiElements->boxOkay(_("The SMS was sent successfully."), _("SMS OK."), FALSE) . $boundaryPost;
369
+            echo $boundaryPre.$uiElements->boxOkay(_("The SMS was sent successfully."), _("SMS OK."), FALSE).$boundaryPost;
370 370
             break;
371 371
         case "SMS-NOTSENT":
372
-            echo $boundaryPre . $uiElements->boxOkay(_("The SMS was NOT sent."), _("SMS not OK."), FALSE) . $boundaryPost;
372
+            echo $boundaryPre.$uiElements->boxOkay(_("The SMS was NOT sent."), _("SMS not OK."), FALSE).$boundaryPost;
373 373
             break;
374 374
         case "SMS-FRAGMENT":
375
-            echo $boundaryPre . $uiElements->boxWarning(_("Only a fragment of the SMS was sent. You should re-send it."), _("SMS Fragment."), FALSE) . $boundaryPost;
375
+            echo $boundaryPre.$uiElements->boxWarning(_("Only a fragment of the SMS was sent. You should re-send it."), _("SMS Fragment."), FALSE).$boundaryPost;
376 376
             break;
377 377
     }
378 378
     ?>
@@ -385,17 +385,17 @@  discard block
 block discarded – undo
385 385
             <?php
386 386
             $bufferCurrentUsers = "<table class='sb-user-table' style='max-width:1920px;'>
387 387
                 <tr class='sb-title-row'>
388
-                    <td>" . _("User") . "</td>
389
-                    <td>" . _("Token/Certificate details") . "</td>
390
-                    <td>" . _("User/Token Expiry") . "</td>
391
-                    <td>" . _("Actions") . "</td>
388
+                    <td>" . _("User")."</td>
389
+                    <td>" . _("Token/Certificate details")."</td>
390
+                    <td>" . _("User/Token Expiry")."</td>
391
+                    <td>" . _("Actions")."</td>
392 392
                 </tr>";
393 393
             $bufferPreviousUsers = "<table class='sb-user-table' style='max-width:1920px;'>
394 394
                 <tr class='sb-title-row'>
395
-                    <td>" . _("User") . "</td>
396
-                    <td>" . _("Certificate details") . "</td>
397
-                    <td>" . _("User Expiry") . "</td>
398
-                    <td>" . _("Actions") . "</td>
395
+                    <td>" . _("User")."</td>
396
+                    <td>" . _("Certificate details")."</td>
397
+                    <td>" . _("User Expiry")."</td>
398
+                    <td>" . _("Actions")."</td>
399 399
                 </tr>";
400 400
 
401 401
             natsort($allUsers);
@@ -452,23 +452,23 @@  discard block
 block discarded – undo
452 452
                     $display = empty(devices\Devices::listDevices()[$oneCert->device]['display']) ? $oneCert->device : devices\Devices::listDevices()[$oneCert->device]['display'];
453 453
 
454 454
                     $bufferText = "<div class='sb-certificate-summary ca-summary' $style>
455
-                                    <div class='sb-certificate-details'>" . _("Device:") . " " . $display .
456
-                            "<br>" . _("Serial Number:") . "&nbsp;" . dechex($oneCert->serial) .
457
-                            "<br>" . _("CN:") . "&nbsp;" . explode('@', $oneCert->username)[0] . "@…" .
458
-                            "<br>" . _("Expiry:") . "&nbsp;" . $oneCert->expiry .
459
-                            "<br>" . _("Issued:") . "&nbsp;" . $oneCert->issued .
460
-                            "</div>" .
455
+                                    <div class='sb-certificate-details'>"._("Device:")." ".$display.
456
+                            "<br>"._("Serial Number:")."&nbsp;".dechex($oneCert->serial).
457
+                            "<br>"._("CN:")."&nbsp;".explode('@', $oneCert->username)[0]."@…".
458
+                            "<br>"._("Expiry:")."&nbsp;".$oneCert->expiry.
459
+                            "<br>"._("Issued:")."&nbsp;".$oneCert->issued.
460
+                            "</div>".
461 461
                             "<div style='text-align:right;padding-top: 5px; $buttonStyle'>";
462 462
 
463 463
                     if ($buttonText == "") {
464 464
                         $bufferText .= $formtext
465
-                                . "<input type='hidden' name='certSerial' value='" . $oneCert->serial . "'/>"
466
-                                . "<input type='hidden' name='certAlgo' value='" . $oneCert->ca_type . "'/>"
465
+                                . "<input type='hidden' name='certSerial' value='".$oneCert->serial."'/>"
466
+                                . "<input type='hidden' name='certAlgo' value='".$oneCert->ca_type."'/>"
467 467
                                 . "<button type='submit' "
468 468
                                 . "name='command' "
469
-                                . "value='" . \web\lib\common\FormElements::BUTTON_REVOKECREDENTIAL . "' "
469
+                                . "value='".\web\lib\common\FormElements::BUTTON_REVOKECREDENTIAL."' "
470 470
                                 . "class='delete' "
471
-                                . "onclick='return confirm(\"" . sprintf(_("The device in question will stop functioning with %s. The revocation cannot be undone. Are you sure you want to do this?"), \config\ConfAssistant::CONSORTIUM['display_name']) . "\")'>"
471
+                                . "onclick='return confirm(\"".sprintf(_("The device in question will stop functioning with %s. The revocation cannot be undone. Are you sure you want to do this?"), \config\ConfAssistant::CONSORTIUM['display_name'])."\")'>"
472 472
                                 . _("Revoke")
473 473
                                 . "</button>"
474 474
                                 . "</form>";
@@ -493,13 +493,13 @@  discard block
 block discarded – undo
493 493
                 }
494 494
                 // wrap the revoked and expired certs in a div that is hidden by default
495 495
                 if ($textRevokedCerts !== "") {
496
-                    $textRevokedCerts = "<span style='text-decoration: underline;' id='$oneUserId-revoked-heading' onclick='document.getElementById(\"$oneUserId-revoked-certs\").style.display = \"block\"; document.getElementById(\"$oneUserId-revoked-heading\").style.display = \"none\";'>" . sprintf(ngettext("(show %d revoked certificate)", "(show %d revoked certificates)", $countRevoked), $countRevoked) . "</span><div id='$oneUserId-revoked-certs' style='display:none;'>" . $textRevokedCerts . "</div>";
496
+                    $textRevokedCerts = "<span style='text-decoration: underline;' id='$oneUserId-revoked-heading' onclick='document.getElementById(\"$oneUserId-revoked-certs\").style.display = \"block\"; document.getElementById(\"$oneUserId-revoked-heading\").style.display = \"none\";'>".sprintf(ngettext("(show %d revoked certificate)", "(show %d revoked certificates)", $countRevoked), $countRevoked)."</span><div id='$oneUserId-revoked-certs' style='display:none;'>".$textRevokedCerts."</div>";
497 497
                 }
498 498
                 if ($textExpiredCerts !== "") {
499
-                    $textExpiredCerts = "<span style='text-decoration: underline;' id='$oneUserId-expired-heading' onclick='document.getElementById(\"$oneUserId-expired-certs\").style.display = \"block\"; document.getElementById(\"$oneUserId-expired-heading\").style.display = \"none\";'>" . sprintf(ngettext("(show %d expired certificate)", "(show %d expired certificates)", $countExpired), $countExpired) . "</span><div id='$oneUserId-expired-certs' style='display:none;'>" . $textExpiredCerts . "</div>";
499
+                    $textExpiredCerts = "<span style='text-decoration: underline;' id='$oneUserId-expired-heading' onclick='document.getElementById(\"$oneUserId-expired-certs\").style.display = \"block\"; document.getElementById(\"$oneUserId-expired-heading\").style.display = \"none\";'>".sprintf(ngettext("(show %d expired certificate)", "(show %d expired certificates)", $countExpired), $countExpired)."</span><div id='$oneUserId-expired-certs' style='display:none;'>".$textExpiredCerts."</div>";
500 500
                 }
501 501
                 // and push out the HTML
502
-                ${$outputBuffer} .= $textActiveCerts . "<br/>" . $textExpiredCerts . " " . $textRevokedCerts . "</td>";
502
+                ${$outputBuffer} .= $textActiveCerts."<br/>".$textExpiredCerts." ".$textRevokedCerts."</td>";
503 503
                 $tokenHtmlBuffer = "";
504 504
                 $hasOnePendingInvite = FALSE;
505 505
                 foreach ($tokensWithoutCerts as $invitationObject) {
@@ -510,38 +510,38 @@  discard block
 block discarded – undo
510 510
                             $tokenHtmlBuffer .= "<tr class='sb-certificate-row'><td></td>";
511 511
                             $jsEncodedBody = str_replace('\n', '%0D%0A', str_replace('"', '', json_encode($invitationObject->invitationMailBody())));
512 512
                             $tokenHtmlBuffer .= "<td>";
513
-                            $tokenHtmlBuffer .= sprintf(_("The invitation token %s is ready for sending! Choose how to send it:"), "<input type='text' readonly='readonly' style='background-color:lightgrey;' size='60' value='" . $invitationObject->link() . "' name='token' class='identifiedtokenarea-" . $invitationObject->identifier . "'>(…)<br/>");
513
+                            $tokenHtmlBuffer .= sprintf(_("The invitation token %s is ready for sending! Choose how to send it:"), "<input type='text' readonly='readonly' style='background-color:lightgrey;' size='60' value='".$invitationObject->link()."' name='token' class='identifiedtokenarea-".$invitationObject->identifier."'>(…)<br/>");
514 514
                             $tokenHtmlBuffer .= "<table>
515
-                                    <tr><td style='vertical-align:bottom;'>" . _("E-Mail:") . "</td><td>
515
+                                    <tr><td style='vertical-align:bottom;'>" . _("E-Mail:")."</td><td>
516 516
                                     $formtext
517
-                                <input type='hidden' value='" . $invitationObject->invitationTokenString . "' name='token'><br/>
517
+                                <input type='hidden' value='".$invitationObject->invitationTokenString."' name='token'><br/>
518 518
                                 <input type='text' name='address' id='address-$invitationObject->identifier'/>
519
-                                <button type='button' onclick='window.location=\"mailto:\"+document.getElementById(\"address-$invitationObject->identifier\").value+\"?subject=" . $invitationObject->invitationMailSubject() . "&amp;body=$jsEncodedBody\"; return false;'>" . _("Local mail client") . "</button>
520
-                                <button type='submit' name='command' onclick='document.getElementById(\"spin\").style.display =\"block\"' value='" . \web\lib\common\FormElements::BUTTON_SENDINVITATIONMAILBYCAT . "'>" . _("Send with CAT") . "</button>
519
+                                <button type='button' onclick='window.location=\"mailto:\"+document.getElementById(\"address-$invitationObject->identifier\").value+\"?subject=".$invitationObject->invitationMailSubject()."&amp;body=$jsEncodedBody\"; return false;'>"._("Local mail client")."</button>
520
+                                <button type='submit' name='command' onclick='document.getElementById(\"spin\").style.display =\"block\"' value='" . \web\lib\common\FormElements::BUTTON_SENDINVITATIONMAILBYCAT."'>"._("Send with CAT")."</button>
521 521
                                     </form>
522 522
                                     </td></tr>
523
-                                    <tr><td style='vertical-align:bottom;'>" . _("SMS:") . "</td><td>
523
+                                    <tr><td style='vertical-align:bottom;'>" . _("SMS:")."</td><td>
524 524
                                     $formtext
525
-                                    <input type='hidden' value='" . $invitationObject->invitationTokenString . "' name='token'><br/>
525
+                                    <input type='hidden' value='".$invitationObject->invitationTokenString."' name='token'><br/>
526 526
                                     <input type='text' name='smsnumber' />
527
-				<button type='submit' name='command' value='" . \web\lib\common\FormElements::BUTTON_SENDINVITATIONSMS . "'>" . _("Send in SMS...") . "</button>
527
+				<button type='submit' name='command' value='" . \web\lib\common\FormElements::BUTTON_SENDINVITATIONSMS."'>"._("Send in SMS...")."</button>
528 528
                                     </form>
529 529
 				</td></tr>
530
-                                    <tr><td style='vertical-align:bottom;'>" . _("Manual:") . "</td><td>
531
-				<button type='button' class='clipboardButton' onclick='clipboardCopy(" . $invitationObject->identifier . ");'>" . _("Copy to Clipboard") . "</button>
530
+                                    <tr><td style='vertical-align:bottom;'>" . _("Manual:")."</td><td>
531
+				<button type='button' class='clipboardButton' onclick='clipboardCopy(" . $invitationObject->identifier.");'>"._("Copy to Clipboard")."</button>
532 532
                                     <form style='display:inline-block;' method='post' action='inc/displayQRcode.inc.php' onsubmit='popupQRWindow(this); return false;' accept-charset='UTF-8'>
533
-                                    <input type='hidden' value='" . $invitationObject->invitationTokenString . "' name='token'><br/>
534
-                                      <button type='submit'>" . _("Display QR code") . "</button>
533
+                                    <input type='hidden' value='" . $invitationObject->invitationTokenString."' name='token'><br/>
534
+                                      <button type='submit'>" . _("Display QR code")."</button>
535 535
                                   </form>
536 536
                                         </td></tr>
537 537
                                         
538 538
                                 </table>
539 539
                                 </td>";
540
-                            $tokenHtmlBuffer .= "<td>" . _("Expiry Date:") . " " . $invitationObject->expiry . " UTC<br>" . _("Activations remaining:") . " " . sprintf(_("%d of %d"), $invitationObject->activationsRemaining, $invitationObject->activationsTotal) . "</td>";
540
+                            $tokenHtmlBuffer .= "<td>"._("Expiry Date:")." ".$invitationObject->expiry." UTC<br>"._("Activations remaining:")." ".sprintf(_("%d of %d"), $invitationObject->activationsRemaining, $invitationObject->activationsTotal)."</td>";
541 541
                             $tokenHtmlBuffer .= "<td>"
542 542
                                     . $formtext
543
-                                    . "<input type='hidden' name='invitationtoken' value='" . $invitationObject->invitationTokenString . "'/>"
544
-                                    . "<button type='submit' name='command' value='" . \web\lib\common\FormElements::BUTTON_REVOKEINVITATION . "' class='delete'>" . _("Revoke") . "</button></form>"
543
+                                    . "<input type='hidden' name='invitationtoken' value='".$invitationObject->invitationTokenString."'/>"
544
+                                    . "<button type='submit' name='command' value='".\web\lib\common\FormElements::BUTTON_REVOKEINVITATION."' class='delete'>"._("Revoke")."</button></form>"
545 545
                                     . "</td></tr>";
546 546
                             break;
547 547
                         case core\SilverbulletInvitation::SB_TOKENSTATUS_EXPIRED:
@@ -557,10 +557,10 @@  discard block
 block discarded – undo
557 557
                 }
558 558
                 ${$outputBuffer} .= "<td>$formtext
559 559
                     <div class='sb-date-container' style='min-width: 200px;'>
560
-                        <span><input type='text' maxlength='19' class='sb-date-picker' name='userexpiry' value='" . $profile->getUserExpiryDate($oneUserId) . "'>&nbsp;(UTC)</span>
560
+                        <span><input type='text' maxlength='19' class='sb-date-picker' name='userexpiry' value='".$profile->getUserExpiryDate($oneUserId)."'>&nbsp;(UTC)</span>
561 561
                     </div>
562 562
                     <input type='hidden' name='userid' value='$oneUserId'/>
563
-                    <button type='submit' name='command' value='" . \web\lib\common\FormElements::BUTTON_CHANGEUSEREXPIRY . "'>" . _("Update") . "</button>
563
+                    <button type='submit' name='command' value='".\web\lib\common\FormElements::BUTTON_CHANGEUSEREXPIRY."'>"._("Update")."</button>
564 564
                     </form>
565 565
                 </td>
566 566
                 <td>
@@ -568,33 +568,33 @@  discard block
 block discarded – undo
568 568
 
569 569
                 if ($hasOnePendingInvite || count($validCerts) > 0) {
570 570
                     $deletionText = sprintf(_("All of the currently active devices will stop functioning with %s. This cannot be undone. While the user can be re-activated later, they will then need to be re-provisioned with new invitation tokens. Are you sure you want to do this?"), \config\ConfAssistant::CONSORTIUM['display_name']);
571
-                    ${$outputBuffer} .= $formtext . "
571
+                    ${$outputBuffer} .= $formtext."
572 572
                                     <input type='hidden' name='userid' value='$oneUserId'/>
573 573
                                     <button type='submit' "
574 574
                             . "name='command' "
575
-                            . "value='" . \web\lib\common\FormElements::BUTTON_DEACTIVATEUSER . "' "
575
+                            . "value='".\web\lib\common\FormElements::BUTTON_DEACTIVATEUSER."' "
576 576
                             . "class='delete' "
577
-                            . ( count($validCerts) > 0 ? "onclick='return confirm(\"" . $deletionText . "\")' " : "" )
577
+                            . (count($validCerts) > 0 ? "onclick='return confirm(\"".$deletionText."\")' " : "")
578 578
                             . ">"
579 579
                             . _("Deactivate User")
580 580
                             . "</button>
581 581
                                 </form>";
582 582
                 }
583
-                ${$outputBuffer} .= "<form method='post' action='inc/userStats.inc.php?inst_id=" . $profile->institution . "&amp;profile_id=" . $profile->identifier . "&amp;user_id=$oneUserId' onsubmit='popupStatsWindow(this); return false;' accept-charset='UTF-8'>
584
-                    <button type='submit'>" . _("Show Authentication Records") . "</button>
583
+                ${$outputBuffer} .= "<form method='post' action='inc/userStats.inc.php?inst_id=".$profile->institution."&amp;profile_id=".$profile->identifier."&amp;user_id=$oneUserId' onsubmit='popupStatsWindow(this); return false;' accept-charset='UTF-8'>
584
+                    <button type='submit'>"._("Show Authentication Records")."</button>
585 585
                 </form>";
586 586
                 if (new DateTime() < new DateTime($expiryDate)) { // current user, allow sending new token
587
-                    ${$outputBuffer} .= $formtext . "
587
+                    ${$outputBuffer} .= $formtext."
588 588
                     <input type='hidden' name='userid' value='$oneUserId'/>
589
-                    <button type='submit' name='command' value='" . \web\lib\common\FormElements::BUTTON_NEWINVITATION . "'>" . _("New Invitation") . "</button>
590
-                    <label>" . _("Activations:") . "
589
+                    <button type='submit' name='command' value='".\web\lib\common\FormElements::BUTTON_NEWINVITATION."'>"._("New Invitation")."</button>
590
+                    <label>" . _("Activations:")."
591 591
                         <input type='text' name='invitationsquantity' value='5' maxlength='3' style='width: 30px;'/>
592 592
                     </label>
593 593
                     </form>";
594 594
                 } elseif (count($profile->getUserAuthRecords($oneUserId)) == 0) { // previous user; if there are NO authentication records, allow full deletion - otherwise, need to keep user trace for abuse handling
595
-                    ${$outputBuffer} .= $formtext . "
595
+                    ${$outputBuffer} .= $formtext."
596 596
                     <input type='hidden' name='userid' value='$oneUserId'/>
597
-                    <button type='submit' class='delete' name='command' value='" . \web\lib\common\FormElements::BUTTON_DELETE . "'>" . _("Delete User") . "</button>
597
+                    <button type='submit' class='delete' name='command' value='".\web\lib\common\FormElements::BUTTON_DELETE."'>"._("Delete User")."</button>
598 598
                     </form>";
599 599
                 }
600 600
                 ${$outputBuffer} .= "</div>
@@ -626,13 +626,13 @@  discard block
 block discarded – undo
626 626
                                     . ' If all accounts shown as active above are indeed still valid, please check the box below and push "Save".'
627 627
                                     . ' If any of the accounts are stale, please deactivate them by pushing the corresponding button before doing this.'), \config\ConfAssistant::SILVERBULLET['gracetime'] ?? core\ProfileSilverbullet::SB_ACKNOWLEDGEMENT_REQUIRED_DAYS);
628 628
 
629
-                    echo $formtext . "<div style='padding-bottom: 20px;'>"
629
+                    echo $formtext."<div style='padding-bottom: 20px;'>"
630 630
                     . "
631 631
                     <p>$acknowledgeText</p>
632 632
                     <input type='checkbox' name='acknowledge' value='true'>
633
-                    <label>" . sprintf(_("I have verified that all configured users are still eligible for %s."),\config\ConfAssistant::CONSORTIUM['display_name']) . "</label>
633
+                    <label>".sprintf(_("I have verified that all configured users are still eligible for %s."), \config\ConfAssistant::CONSORTIUM['display_name'])."</label>
634 634
                 </div>
635
-                <button type='submit' name='command' value='" . \web\lib\common\FormElements::BUTTON_ACKUSERELIGIBILITY . "'>" . _("Save") . "</button></form>";
635
+                <button type='submit' name='command' value='" . \web\lib\common\FormElements::BUTTON_ACKUSERELIGIBILITY."'>"._("Save")."</button></form>";
636 636
                 }
637 637
                 ?>
638 638
             </div>
Please login to merge, or discard this patch.
web/admin/edit_hotspot.php 1 patch
Spacing   +10 added lines, -10 removed lines patch added patch discarded remove patch
@@ -26,7 +26,7 @@  discard block
 block discarded – undo
26 26
  */
27 27
 ?>
28 28
 <?php
29
-require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php";
29
+require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php";
30 30
 
31 31
 $deco = new \web\lib\admin\PageDecoration();
32 32
 $validator = new \web\lib\common\InputValidation();
@@ -36,7 +36,7 @@  discard block
 block discarded – undo
36 36
 
37 37
 if (!isset($_GET['deployment_id'])) {
38 38
     $my_inst->newDeployment(\core\AbstractDeployment::DEPLOYMENTTYPE_MANAGED);
39
-    header("Location: overview_sp.php?inst_id=" . $my_inst->identifier);
39
+    header("Location: overview_sp.php?inst_id=".$my_inst->identifier);
40 40
     exit(0);
41 41
 }
42 42
 // if we have come this far, we are editing an existing deployment
@@ -48,7 +48,7 @@  discard block
 block discarded – undo
48 48
         if (in_array('OK', $response)) {
49 49
             $deployment->deactivate();
50 50
         }
51
-        header("Location: overview_sp.php?inst_id=" . $my_inst->identifier . '&' . urldecode(http_build_query($response)));
51
+        header("Location: overview_sp.php?inst_id=".$my_inst->identifier.'&'.urldecode(http_build_query($response)));
52 52
         exit(0);
53 53
     }
54 54
 
@@ -57,7 +57,7 @@  discard block
 block discarded – undo
57 57
         if (in_array('OK', $response)) {
58 58
             $deployment->activate();
59 59
         }
60
-        header("Location: overview_sp.php?inst_id=" . $my_inst->identifier . '&' . urldecode(http_build_query($response)));
60
+        header("Location: overview_sp.php?inst_id=".$my_inst->identifier.'&'.urldecode(http_build_query($response)));
61 61
         exit(0);
62 62
     }
63 63
     
@@ -78,7 +78,7 @@  discard block
 block discarded – undo
78 78
             $deployment->status = core\DeploymentManaged::INACTIVE;
79 79
             $response = $deployment->setRADIUSconfig();
80 80
         }
81
-        header("Location: overview_sp.php?inst_id=" . $my_inst->identifier . '&' . urldecode(http_build_query($response)));
81
+        header("Location: overview_sp.php?inst_id=".$my_inst->identifier.'&'.urldecode(http_build_query($response)));
82 82
         exit(0);
83 83
     }
84 84
 }
@@ -106,12 +106,12 @@  discard block
 block discarded – undo
106 106
     echo $uiElements->instLevelInfoBoxes($my_inst);
107 107
     $deploymentOptions = $deployment->getAttributes();
108 108
     echo "<form enctype='multipart/form-data' action='edit_hotspot.php?inst_id=$my_inst->identifier&amp;deployment_id=$deployment->identifier' method='post' accept-charset='UTF-8'>
109
-                <input type='hidden' name='MAX_FILE_SIZE' value='" . \config\Master::MAX_UPLOAD_SIZE . "'>";
109
+                <input type='hidden' name='MAX_FILE_SIZE' value='".\config\Master::MAX_UPLOAD_SIZE."'>";
110 110
     $optionDisplay = new \web\lib\admin\OptionDisplay($deploymentOptions, "Profile");
111 111
     ?>
112 112
     <?php
113 113
     echo "<fieldset class='option_container' id='managedsp_override'>
114
-    <legend><strong>" . _("Options for this deployment") . "</strong></legend>";
114
+    <legend><strong>" . _("Options for this deployment")."</strong></legend>";
115 115
     ?>
116 116
     <table>
117 117
         <tr>
@@ -129,7 +129,7 @@  discard block
 block discarded – undo
129 129
             <!-- input for VLAN identifier for home users-->
130 130
             <td>
131 131
                 <span id='vlan_label'>
132
-                    <?php echo sprintf(_("VLAN tag for own users%s:"), ($vlan === NULL ? "" : " " . _("(unset with '0')"))); ?>
132
+                    <?php echo sprintf(_("VLAN tag for own users%s:"), ($vlan === NULL ? "" : " "._("(unset with '0')"))); ?>
133 133
                 </span>
134 134
             </td>
135 135
             <td>
@@ -144,10 +144,10 @@  discard block
 block discarded – undo
144 144
     </table>
145 145
     <?php
146 146
     echo $optionDisplay->prefilledOptionTable("managedsp");
147
-    echo "<button type='button' class='newoption' onclick='getXML(\"managedsp\")'>" . _("Add new option") . "</button>";
147
+    echo "<button type='button' class='newoption' onclick='getXML(\"managedsp\")'>"._("Add new option")."</button>";
148 148
     echo "</fieldset>";
149 149
 
150 150
 
151
-    echo "<p><button type='submit' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_SAVE . "'>" . _("Save data") . "</button><button type='button' class='delete' name='abortbutton' value='abort' onclick='javascript:window.location = \"overview_sp.php?inst_id=$my_inst->identifier\"'>" . _("Discard changes") . "</button></p></form>";
151
+    echo "<p><button type='submit' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_SAVE."'>"._("Save data")."</button><button type='button' class='delete' name='abortbutton' value='abort' onclick='javascript:window.location = \"overview_sp.php?inst_id=$my_inst->identifier\"'>"._("Discard changes")."</button></p></form>";
152 152
     echo $deco->footer();
153 153
     
Please login to merge, or discard this patch.