@@ -367,7 +367,7 @@ discard block |
||
367 | 367 | if (\config\Master::MAILSETTINGS['notify_nro']) { |
368 | 368 | foreach ($admins as $id) { |
369 | 369 | $user = new User($id); |
370 | - /// organisation |
|
370 | + /// organisation |
|
371 | 371 | $retval = $user->sendMailToUser(sprintf(_("%s in your federation was created"), common\Entity::$nomenclature_participant), $message); |
372 | 372 | if ($retval === FALSE) { |
373 | 373 | $this->loggerInstance->debug(2, "Mail to federation admin was NOT sent!\n"); |
@@ -434,7 +434,7 @@ discard block |
||
434 | 434 | $newReq = new CertificationAuthorityEduPkiServer(); |
435 | 435 | $reqserial = $newReq->sendRequestToCa($csr, $revocationPin, $expiryDays); |
436 | 436 | if ($reqserial > 0) { |
437 | - $this->loggerInstance->writeAudit($user, "NEW", "Certificate request - NRO: ".$this->tld." - serial: ".$reqserial." - subject: ".$csr['SUBJECT']); |
|
437 | + $this->loggerInstance->writeAudit($user, "NEW", "Certificate request - NRO: ".$this->tld." - serial: ".$reqserial." - subject: ".$csr['SUBJECT']); |
|
438 | 438 | $reqQuery = "INSERT INTO federation_servercerts " |
439 | 439 | ."(federation_id, ca_name, request_serial, distinguished_name, status, revocation_pin) " |
440 | 440 | ."VALUES (?, 'eduPKI', ?, ?, 'REQUESTED', ?)"; |
@@ -494,7 +494,7 @@ discard block |
||
494 | 494 | $result = $this->databaseHandle->exec($query); |
495 | 495 | $rows = $result->fetch_all(); |
496 | 496 | foreach ($rows as $row) { |
497 | - $activeProfiles[] = $row[0]; |
|
497 | + $activeProfiles[] = $row[0]; |
|
498 | 498 | } |
499 | 499 | $query = "SELECT institution.inst_id AS inst_id, profile.profile_id AS profile_id, profile_option.option_value AS cert FROM profile_option JOIN profile ON profile_option.profile_id=profile.profile_id JOIN institution ON profile.inst_id=institution.inst_id WHERE profile_option.option_name='eap:ca_file' and institution.country='".$this->tld."'"; |
500 | 500 | $result = $this->databaseHandle->exec($query); |
@@ -579,7 +579,7 @@ discard block |
||
579 | 579 | 'country' => strtoupper($idp->federation), |
580 | 580 | 'instance' => $idp, |
581 | 581 | 'realms' => $idpQuery->realms] |
582 | - ; |
|
582 | + ; |
|
583 | 583 | $returnarray[$idp->identifier] = $idpInfo; |
584 | 584 | } |
585 | 585 | if ($activeOnly != 0) { // we're only doing this once. |
@@ -159,17 +159,17 @@ |
||
159 | 159 | } |
160 | 160 | } |
161 | 161 | |
162 | - /** |
|
163 | - * Writes an audit log entry to the audit log file - static version. These audits are semantic logs; they don't record every single modification |
|
164 | - * in the database, but provide a logical "who did what" overview. The exact modification SQL statements are logged |
|
165 | - * automatically with writeSQLAudit() instead. The log file path is configurable in _config.php. |
|
166 | - * |
|
167 | - * @param string $user persistent identifier of the user who triggered the action |
|
168 | - * @param string $category type of modification, from the fixed vocabulary: "NEW", "OWN", "MOD", "DEL" |
|
169 | - * @param string $message message to log into the audit log |
|
170 | - * @return boolean TRUE if successful. Will terminate script execution on failure. |
|
171 | - * @throws Exception |
|
172 | - */ |
|
162 | + /** |
|
163 | + * Writes an audit log entry to the audit log file - static version. These audits are semantic logs; they don't record every single modification |
|
164 | + * in the database, but provide a logical "who did what" overview. The exact modification SQL statements are logged |
|
165 | + * automatically with writeSQLAudit() instead. The log file path is configurable in _config.php. |
|
166 | + * |
|
167 | + * @param string $user persistent identifier of the user who triggered the action |
|
168 | + * @param string $category type of modification, from the fixed vocabulary: "NEW", "OWN", "MOD", "DEL" |
|
169 | + * @param string $message message to log into the audit log |
|
170 | + * @return boolean TRUE if successful. Will terminate script execution on failure. |
|
171 | + * @throws Exception |
|
172 | + */ |
|
173 | 173 | public static function writeAudit_s($user, $category, $message) |
174 | 174 | { |
175 | 175 | switch ($category) { |
@@ -49,7 +49,7 @@ discard block |
||
49 | 49 | */ |
50 | 50 | private function writeToFile($filename, $message) |
51 | 51 | { |
52 | - file_put_contents(\config\Master::PATHS['logdir'] . "/$filename", sprintf("%-015s", microtime(TRUE)) . $message, FILE_APPEND); |
|
52 | + file_put_contents(\config\Master::PATHS['logdir']."/$filename", sprintf("%-015s", microtime(TRUE)).$message, FILE_APPEND); |
|
53 | 53 | } |
54 | 54 | |
55 | 55 | /** |
@@ -61,7 +61,7 @@ discard block |
||
61 | 61 | */ |
62 | 62 | private static function writeToFile_s($filename, $message) |
63 | 63 | { |
64 | - file_put_contents(\config\Master::PATHS['logdir'] . "/$filename", sprintf("%-015s", microtime(TRUE)) . $message, FILE_APPEND); |
|
64 | + file_put_contents(\config\Master::PATHS['logdir']."/$filename", sprintf("%-015s", microtime(TRUE)).$message, FILE_APPEND); |
|
65 | 65 | } |
66 | 66 | |
67 | 67 | /** |
@@ -89,9 +89,9 @@ discard block |
||
89 | 89 | $output .= " [$file / $function / $line] "; |
90 | 90 | } |
91 | 91 | if (is_string($stuff)) { |
92 | - $output .= $prefix . $stuff . $suffix; |
|
92 | + $output .= $prefix.$stuff.$suffix; |
|
93 | 93 | } else { |
94 | - $output .= $prefix . var_export($stuff, TRUE) . $suffix; |
|
94 | + $output .= $prefix.var_export($stuff, TRUE).$suffix; |
|
95 | 95 | } |
96 | 96 | $this->writeToFile("debug.log", $output); |
97 | 97 | |
@@ -123,9 +123,9 @@ discard block |
||
123 | 123 | $output .= " [$file / $function / $line] "; |
124 | 124 | } |
125 | 125 | if (is_string($stuff)) { |
126 | - $output .= $prefix . $stuff . $suffix; |
|
126 | + $output .= $prefix.$stuff.$suffix; |
|
127 | 127 | } else { |
128 | - $output .= $prefix . var_export($stuff, TRUE) . $suffix; |
|
128 | + $output .= $prefix.var_export($stuff, TRUE).$suffix; |
|
129 | 129 | } |
130 | 130 | self::writeToFile_s("debug.log", $output); |
131 | 131 | return; |
@@ -201,7 +201,7 @@ discard block |
||
201 | 201 | $logTextStep1 = preg_replace("/[\n\r]/", "", $query); |
202 | 202 | $logTextStep2 = preg_replace("/ +/", " ", $logTextStep1); |
203 | 203 | $logTextStep3 = iconv("UTF-8", "UTF-8//IGNORE", $logTextStep2); |
204 | - $this->writeToFile("audit-SQL.log", " " . $logTextStep3 . "\n"); |
|
204 | + $this->writeToFile("audit-SQL.log", " ".$logTextStep3."\n"); |
|
205 | 205 | } |
206 | 206 | |
207 | 207 | |
@@ -219,6 +219,6 @@ discard block |
||
219 | 219 | $logTextStep1 = preg_replace("/[\n\r]/", "", $query); |
220 | 220 | $logTextStep2 = preg_replace("/ +/", " ", $logTextStep1); |
221 | 221 | $logTextStep3 = iconv("UTF-8", "UTF-8//IGNORE", $logTextStep2); |
222 | - self::writeToFile_s("audit-SQL.log", " " . $logTextStep3 . "\n"); |
|
222 | + self::writeToFile_s("audit-SQL.log", " ".$logTextStep3."\n"); |
|
223 | 223 | } |
224 | 224 | } |
225 | 225 | \ No newline at end of file |
@@ -173,8 +173,8 @@ discard block |
||
173 | 173 | return false; |
174 | 174 | } |
175 | 175 | $entityId = $matches[1]; |
176 | - $url = \config\Diagnostics::EDUGAINRESOLVER['url'] . "?action=get_entity_name&type=idp&opt=2&e_id=$entityId"; |
|
177 | - \core\common\Logging::debug_s(4, $url, "URL: ","\n"); |
|
176 | + $url = \config\Diagnostics::EDUGAINRESOLVER['url']."?action=get_entity_name&type=idp&opt=2&e_id=$entityId"; |
|
177 | + \core\common\Logging::debug_s(4, $url, "URL: ", "\n"); |
|
178 | 178 | $ch = curl_init($url); |
179 | 179 | if ($ch === false) { |
180 | 180 | $loggerInstance->debug(2, "Unable ask eduGAIN about IdP - CURL init failed!"); |
@@ -200,10 +200,10 @@ discard block |
||
200 | 200 | return false; |
201 | 201 | } |
202 | 202 | if ($responseDetails['name'] === null) { |
203 | - \core\common\Logging::debug_s(4,"User not in eduGAIN\n"); |
|
203 | + \core\common\Logging::debug_s(4, "User not in eduGAIN\n"); |
|
204 | 204 | return false; |
205 | 205 | } |
206 | - \core\common\Logging::debug_s(4,"User in eduGAIN\n"); |
|
206 | + \core\common\Logging::debug_s(4, "User in eduGAIN\n"); |
|
207 | 207 | $_SESSION['eduGAIN'] = $responseDetails['regauth']; |
208 | 208 | return true; |
209 | 209 | } |
@@ -243,7 +243,7 @@ discard block |
||
243 | 243 | * @return boolean did it work? |
244 | 244 | */ |
245 | 245 | public static function sendMailToCATadmins($subject, $content) { |
246 | - if (!isset(\config\Master::APPEARANCE['cat-admin-mail']) || \config\Master::APPEARANCE['cat-admin-mail'] === []) { |
|
246 | + if (!isset(\config\Master::APPEARANCE['cat-admin-mail']) || \config\Master::APPEARANCE['cat-admin-mail'] === []) { |
|
247 | 247 | return; |
248 | 248 | } |
249 | 249 | foreach (\config\Master::APPEARANCE['cat-admin-mail'] as $mailaddr) { |
@@ -266,8 +266,8 @@ discard block |
||
266 | 266 | common\Entity::intoThePotatoes(); |
267 | 267 | $mail = \core\common\OutsideComm::mailHandle(); |
268 | 268 | // who to whom? |
269 | - $mail->FromName = \config\Master::APPEARANCE['productname'] . " Notification System"; |
|
270 | - $mail->addReplyTo(\config\Master::APPEARANCE['support-contact']['developer-mail'], \config\Master::APPEARANCE['productname'] . " " . _("Feedback")); |
|
269 | + $mail->FromName = \config\Master::APPEARANCE['productname']." Notification System"; |
|
270 | + $mail->addReplyTo(\config\Master::APPEARANCE['support-contact']['developer-mail'], \config\Master::APPEARANCE['productname']." "._("Feedback")); |
|
271 | 271 | $mail->addAddress($mailaddr); |
272 | 272 | // what do we want to say? |
273 | 273 | $mail->Subject = $subject; |
@@ -333,7 +333,7 @@ discard block |
||
333 | 333 | } |
334 | 334 | $lookFor .= "$name"; |
335 | 335 | } |
336 | - $finding = preg_match("/^(" . $lookFor . "):(.*)/", $oneRow->user_id, $matches); |
|
336 | + $finding = preg_match("/^(".$lookFor."):(.*)/", $oneRow->user_id, $matches); |
|
337 | 337 | if ($finding === 0 || $finding === false) { |
338 | 338 | return false; |
339 | 339 | } |
@@ -352,7 +352,7 @@ discard block |
||
352 | 352 | $matchedProviders[] = $idp; |
353 | 353 | $name = $idp; |
354 | 354 | if ($skipCurl == 0) { |
355 | - $url = \config\Diagnostics::EDUGAINRESOLVER['url'] . "?action=get_entity_name&type=idp&e_id=$idp&lang=$lang"; |
|
355 | + $url = \config\Diagnostics::EDUGAINRESOLVER['url']."?action=get_entity_name&type=idp&e_id=$idp&lang=$lang"; |
|
356 | 356 | $ch = curl_init($url); |
357 | 357 | if ($ch === false) { |
358 | 358 | $loggerInstance->debug(2, "Unable ask eduGAIN about IdP - CURL init failed!"); |
@@ -377,7 +377,7 @@ discard block |
||
377 | 377 | } |
378 | 378 | curl_close($ch); |
379 | 379 | } |
380 | - $listOfProviders[] = User::PROVIDER_STRINGS[$providerStrings[0]] . " - IdP: " . $name; |
|
380 | + $listOfProviders[] = User::PROVIDER_STRINGS[$providerStrings[0]]." - IdP: ".$name; |
|
381 | 381 | } |
382 | 382 | break; |
383 | 383 | case $providerStrings[2]: |
@@ -393,7 +393,7 @@ discard block |
||
393 | 393 | return false; |
394 | 394 | } |
395 | 395 | } |
396 | - \core\common\Logging::debug_s(4,$listOfProviders, "PROVIDERS:\n", "\n"); |
|
396 | + \core\common\Logging::debug_s(4, $listOfProviders, "PROVIDERS:\n", "\n"); |
|
397 | 397 | return $listOfProviders; |
398 | 398 | } |
399 | 399 | } |
400 | 400 | \ No newline at end of file |
@@ -17,9 +17,9 @@ discard block |
||
17 | 17 | class CertificationAuthorityEduPki extends EntityWithDBProperties implements CertificationAuthorityInterface |
18 | 18 | { |
19 | 19 | |
20 | - private const LOCATION_RA_CERT = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
21 | - private const LOCATION_RA_KEY = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
22 | - private const LOCATION_WEBROOT = ROOT . "/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
20 | + private const LOCATION_RA_CERT = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
21 | + private const LOCATION_RA_KEY = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
22 | + private const LOCATION_WEBROOT = ROOT."/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
23 | 23 | private const EDUPKI_RA_ID = 700; |
24 | 24 | private const EDUPKI_CERT_PROFILE = "User SOAP"; |
25 | 25 | private const EDUPKI_RA_PKEY_PASSPHRASE = "..."; |
@@ -35,13 +35,13 @@ discard block |
||
35 | 35 | parent::__construct(); |
36 | 36 | |
37 | 37 | if (stat(CertificationAuthorityEduPki::LOCATION_RA_CERT) === FALSE) { |
38 | - throw new Exception("RA operator PEM file not found: " . CertificationAuthorityEduPki::LOCATION_RA_CERT); |
|
38 | + throw new Exception("RA operator PEM file not found: ".CertificationAuthorityEduPki::LOCATION_RA_CERT); |
|
39 | 39 | } |
40 | 40 | if (stat(CertificationAuthorityEduPki::LOCATION_RA_KEY) === FALSE) { |
41 | - throw new Exception("RA operator private key file not found: " . CertificationAuthorityEduPki::LOCATION_RA_KEY); |
|
41 | + throw new Exception("RA operator private key file not found: ".CertificationAuthorityEduPki::LOCATION_RA_KEY); |
|
42 | 42 | } |
43 | 43 | if (stat(CertificationAuthorityEduPki::LOCATION_WEBROOT) === FALSE) { |
44 | - throw new Exception("CA website root CA file not found: " . CertificationAuthorityEduPki::LOCATION_WEBROOT); |
|
44 | + throw new Exception("CA website root CA file not found: ".CertificationAuthorityEduPki::LOCATION_WEBROOT); |
|
45 | 45 | } |
46 | 46 | } |
47 | 47 | |
@@ -75,19 +75,19 @@ discard block |
||
75 | 75 | // initialise connection to eduPKI CA / eduroam RA and send the request to them |
76 | 76 | try { |
77 | 77 | $altArray = [# Array mit den Subject Alternative Names |
78 | - "email:" . $csr["USERNAME"] |
|
78 | + "email:".$csr["USERNAME"] |
|
79 | 79 | ]; |
80 | 80 | $soapPub = $this->initEduPKISoapSession("PUBLIC"); |
81 | 81 | $this->loggerInstance->debug(5, "FIRST ACTUAL SOAP REQUEST (Public, newRequest)!\n"); |
82 | - $this->loggerInstance->debug(5, "PARAM_1: " . CertificationAuthorityEduPki::EDUPKI_RA_ID . "\n"); |
|
83 | - $this->loggerInstance->debug(5, "PARAM_2: " . $csr["CSR_STRING"] . "\n"); |
|
82 | + $this->loggerInstance->debug(5, "PARAM_1: ".CertificationAuthorityEduPki::EDUPKI_RA_ID."\n"); |
|
83 | + $this->loggerInstance->debug(5, "PARAM_2: ".$csr["CSR_STRING"]."\n"); |
|
84 | 84 | $this->loggerInstance->debug(5, "PARAM_3: "); |
85 | 85 | $this->loggerInstance->debug(5, $altArray); |
86 | - $this->loggerInstance->debug(5, "PARAM_4: " . CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE . "\n"); |
|
87 | - $this->loggerInstance->debug(5, "PARAM_5: " . sha1("notused") . "\n"); |
|
88 | - $this->loggerInstance->debug(5, "PARAM_6: " . $csr["USERNAME"] . "\n"); |
|
89 | - $this->loggerInstance->debug(5, "PARAM_7: " . $csr["USERNAME"] . "\n"); |
|
90 | - $this->loggerInstance->debug(5, "PARAM_8: " . \config\ConfAssistant::SILVERBULLET['product_name'] . "\n"); |
|
86 | + $this->loggerInstance->debug(5, "PARAM_4: ".CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE."\n"); |
|
87 | + $this->loggerInstance->debug(5, "PARAM_5: ".sha1("notused")."\n"); |
|
88 | + $this->loggerInstance->debug(5, "PARAM_6: ".$csr["USERNAME"]."\n"); |
|
89 | + $this->loggerInstance->debug(5, "PARAM_7: ".$csr["USERNAME"]."\n"); |
|
90 | + $this->loggerInstance->debug(5, "PARAM_8: ".\config\ConfAssistant::SILVERBULLET['product_name']."\n"); |
|
91 | 91 | $this->loggerInstance->debug(5, "PARAM_9: false\n"); |
92 | 92 | $soapNewRequest = $soapPub->newRequest( |
93 | 93 | CertificationAuthorityEduPki::EDUPKI_RA_ID, # RA-ID |
@@ -109,11 +109,11 @@ discard block |
||
109 | 109 | } catch (Exception $e) { |
110 | 110 | // PHP 7.1 can do this much better |
111 | 111 | if (is_soap_fault($e)) { |
112 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: { |
|
112 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: { |
|
113 | 113 | $e->faultstring |
114 | 114 | }\n"); |
115 | 115 | } |
116 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
116 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
117 | 117 | } |
118 | 118 | try { |
119 | 119 | $soap = $this->initEduPKISoapSession("RA"); |
@@ -125,8 +125,8 @@ discard block |
||
125 | 125 | $soapReqnum, [ |
126 | 126 | "RaID" => CertificationAuthorityEduPki::EDUPKI_RA_ID, |
127 | 127 | "Role" => CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE, |
128 | - "Subject" => "DC=eduroam,DC=test,DC=test,C=" . $csr["FED"] . ",O=" . \config\ConfAssistant::CONSORTIUM['name'] . ",OU=" . $csr["FED"] . ",CN=" . $csr['USERNAME'] . ",emailAddress=" . $csr['USERNAME'], |
|
129 | - "SubjectAltNames" => ["email:" . $csr["USERNAME"]], |
|
128 | + "Subject" => "DC=eduroam,DC=test,DC=test,C=".$csr["FED"].",O=".\config\ConfAssistant::CONSORTIUM['name'].",OU=".$csr["FED"].",CN=".$csr['USERNAME'].",emailAddress=".$csr['USERNAME'], |
|
129 | + "SubjectAltNames" => ["email:".$csr["USERNAME"]], |
|
130 | 130 | "NotBefore" => (new \DateTime())->format('c'), |
131 | 131 | "NotAfter" => $expiry->format('c'), |
132 | 132 | ] |
@@ -145,7 +145,7 @@ discard block |
||
145 | 145 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
146 | 146 | // rather than just using the string. Grr. |
147 | 147 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
148 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapCleartext); |
|
148 | + file_put_contents($tempdir['dir']."/content.txt", $soapCleartext); |
|
149 | 149 | // retrieve our RA cert from filesystem |
150 | 150 | // the RA certificates are not needed right now because we |
151 | 151 | // have resorted to S/MIME signatures with openssl command-line |
@@ -157,7 +157,7 @@ discard block |
||
157 | 157 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
158 | 158 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
159 | 159 | $this->loggerInstance->debug(5, "Actual content to be signed is this:\n $soapCleartext\n"); |
160 | - $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
160 | + $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
161 | 161 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
162 | 162 | $output = []; |
163 | 163 | $return = 999; |
@@ -166,14 +166,14 @@ discard block |
||
166 | 166 | throw new Exception("Non-zero return value from openssl smime!"); |
167 | 167 | } |
168 | 168 | // and get the signature blob back from the filesystem |
169 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
169 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
170 | 170 | $this->loggerInstance->debug(5, "Request for server approveRequest has parameters:\n"); |
171 | - $this->loggerInstance->debug(5, $soapReqnum . "\n"); |
|
172 | - $this->loggerInstance->debug(5, $soapCleartext . "\n"); // PHP magically encodes this as base64 while sending! |
|
173 | - $this->loggerInstance->debug(5, $detachedSig . "\n"); |
|
171 | + $this->loggerInstance->debug(5, $soapReqnum."\n"); |
|
172 | + $this->loggerInstance->debug(5, $soapCleartext."\n"); // PHP magically encodes this as base64 while sending! |
|
173 | + $this->loggerInstance->debug(5, $detachedSig."\n"); |
|
174 | 174 | $soapIssueCert = $soap->approveRequest($soapReqnum, $soapCleartext, $detachedSig); |
175 | - $this->loggerInstance->debug(5, "approveRequest Request was: \n" . $soap->__getLastRequest()); |
|
176 | - $this->loggerInstance->debug(5, "approveRequest Response was: \n" . $soap->__getLastResponse()); |
|
175 | + $this->loggerInstance->debug(5, "approveRequest Request was: \n".$soap->__getLastRequest()); |
|
176 | + $this->loggerInstance->debug(5, "approveRequest Response was: \n".$soap->__getLastResponse()); |
|
177 | 177 | if ($soapIssueCert === FALSE) { |
178 | 178 | throw new Exception("The locally approved request was NOT processed by the CA."); |
179 | 179 | } |
@@ -210,9 +210,9 @@ discard block |
||
210 | 210 | throw new Exception("CAInfo has no root certificate for us!"); |
211 | 211 | } |
212 | 212 | } catch (SoapFault $e) { |
213 | - throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
213 | + throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
214 | 214 | } catch (Exception $e) { |
215 | - throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage()); |
|
215 | + throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage()); |
|
216 | 216 | } |
217 | 217 | return [ |
218 | 218 | "CERT" => openssl_x509_read($parsedCert['pem']), |
@@ -245,12 +245,12 @@ discard block |
||
245 | 245 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
246 | 246 | // rather than just using the string. Grr. |
247 | 247 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
248 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapRawRevRequest); |
|
248 | + file_put_contents($tempdir['dir']."/content.txt", $soapRawRevRequest); |
|
249 | 249 | // retrieve our RA cert from filesystem |
250 | 250 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
251 | 251 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
252 | 252 | $this->loggerInstance->debug(5, "Actual content to be signed is this:\n$soapRawRevRequest\n"); |
253 | - $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPki::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPki::LOCATION_RA_CERT; |
|
253 | + $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPki::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPki::LOCATION_RA_CERT; |
|
254 | 254 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
255 | 255 | $output = []; |
256 | 256 | $return = 999; |
@@ -259,7 +259,7 @@ discard block |
||
259 | 259 | throw new Exception("Non-zero return value from openssl smime!"); |
260 | 260 | } |
261 | 261 | // and get the signature blob back from the filesystem |
262 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
262 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
263 | 263 | $soapIssueRev = $soap->approveRevocationRequest($soapRevocationSerial, $soapRawRevRequest, $detachedSig); |
264 | 264 | if ($soapIssueRev === FALSE) { |
265 | 265 | throw new Exception("The locally approved revocation request was NOT processed by the CA."); |
@@ -267,9 +267,9 @@ discard block |
||
267 | 267 | } catch (Exception $e) { |
268 | 268 | // PHP 7.1 can do this much better |
269 | 269 | if (is_soap_fault($e)) { |
270 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: {$e->faultstring}\n"); |
|
270 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: {$e->faultstring}\n"); |
|
271 | 271 | } |
272 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
272 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
273 | 273 | } |
274 | 274 | } |
275 | 275 | |
@@ -289,7 +289,7 @@ discard block |
||
289 | 289 | 'http' => [ |
290 | 290 | 'timeout' => 60, |
291 | 291 | 'user_agent' => 'Stefan', |
292 | - 'header'=> array( "Accept-language: en" ), |
|
292 | + 'header'=> array("Accept-language: en"), |
|
293 | 293 | 'protocol_version' => 1.1 |
294 | 294 | ], |
295 | 295 | 'ssl' => [ |
@@ -370,9 +370,9 @@ discard block |
||
370 | 370 | */ |
371 | 371 | public function soapToXmlInteger($x) |
372 | 372 | { |
373 | - return '<' . $x[0] . '>' |
|
373 | + return '<'.$x[0].'>' |
|
374 | 374 | . htmlentities($x[1], ENT_NOQUOTES | ENT_XML1) |
375 | - . '</' . $x[0] . '>'; |
|
375 | + . '</'.$x[0].'>'; |
|
376 | 376 | } |
377 | 377 | |
378 | 378 | /** |
@@ -391,9 +391,9 @@ discard block |
||
391 | 391 | // dump private key into directory |
392 | 392 | $outstring = ""; |
393 | 393 | openssl_pkey_export($privateKey, $outstring); |
394 | - file_put_contents($tempdir . "/pkey.pem", $outstring); |
|
394 | + file_put_contents($tempdir."/pkey.pem", $outstring); |
|
395 | 395 | // PHP can only do one DC in the Subject. But we need three. |
396 | - $execCmd = \config\Master::PATHS['openssl'] . " req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$fed/CN=$username/emailAddress=$username"; |
|
396 | + $execCmd = \config\Master::PATHS['openssl']." req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$fed/CN=$username/emailAddress=$username"; |
|
397 | 397 | $this->loggerInstance->debug(2, "Calling openssl req with following cmdline: $execCmd\n"); |
398 | 398 | $output = []; |
399 | 399 | $return = 999; |
@@ -109,7 +109,7 @@ discard block |
||
109 | 109 | $deployment->deactivate(); |
110 | 110 | } |
111 | 111 | header("Location: overview_org.php?inst_id=" . $my_inst->identifier . '&' . urldecode(http_build_query($response)) . '#profilebox_' . |
112 | - $deployment->identifier); |
|
112 | + $deployment->identifier); |
|
113 | 113 | exit(0); |
114 | 114 | case web\lib\common\FormElements::BUTTON_REMOVESP: |
115 | 115 | $deployment->remove(); |
@@ -140,9 +140,9 @@ discard block |
||
140 | 140 | // valid signature |
141 | 141 | $data = openssl_x509_parse($deployment->radsec_cert); |
142 | 142 | $certdata = array( |
143 | - $data['serialNumberHex'], |
|
144 | - date_create_from_format('ymdGis', substr($data['validTo'], 0, -1))->format('YmdHis') |
|
145 | - ); |
|
143 | + $data['serialNumberHex'], |
|
144 | + date_create_from_format('ymdGis', substr($data['validTo'], 0, -1))->format('YmdHis') |
|
145 | + ); |
|
146 | 146 | $torevoke = implode('#', $certdata); |
147 | 147 | $response = $deployment->setRADIUSconfig(0, 0, $torevoke); |
148 | 148 | $deployment->tlsfromcsr($csr); |
@@ -194,7 +194,7 @@ discard block |
||
194 | 194 | } |
195 | 195 | header("Location: overview_org.php?inst_id=" . $my_inst->identifier . '&' . urldecode(http_build_query($response)) . '#profilebox_' . $deployment->identifier); |
196 | 196 | exit(0); |
197 | - default: |
|
197 | + default: |
|
198 | 198 | throw new Exception("Unknown button action requested!"); |
199 | 199 | } |
200 | 200 | } |
@@ -27,7 +27,7 @@ discard block |
||
27 | 27 | */ |
28 | 28 | ?> |
29 | 29 | <?php |
30 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
30 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
31 | 31 | |
32 | 32 | |
33 | 33 | $deco = new \web\lib\admin\PageDecoration(); |
@@ -41,10 +41,10 @@ discard block |
||
41 | 41 | ( $_POST['consortium'] == "OpenRoaming" && count($myfed->getAttributes("fed:openroaming")) > 0 ) |
42 | 42 | ) |
43 | 43 | ) {*/ |
44 | - if (isset($_POST['consortium']) && $_POST['consortium'] == "eduroam") |
|
44 | + if (isset($_POST['consortium']) && $_POST['consortium'] == "eduroam") |
|
45 | 45 | { |
46 | 46 | $deployment = $my_inst->newDeployment(\core\AbstractDeployment::DEPLOYMENTTYPE_MANAGED, $_POST['consortium']); |
47 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier . '#profilebox_' . $deployment->identifier); |
|
47 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier.'#profilebox_'.$deployment->identifier); |
|
48 | 48 | exit(0); |
49 | 49 | } else { |
50 | 50 | throw new Exception("Desired consortium for Managed SP needs to be specified, and allowed!"); |
@@ -101,19 +101,19 @@ discard block |
||
101 | 101 | if (isset($_POST['agreement']) && $_POST['agreement'] == "true") { |
102 | 102 | $deployment->addAttribute("hiddenmanagedsp:tou_accepted", NULL, 1); |
103 | 103 | } |
104 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier . '#profilebox_' . $deployment->identifier); |
|
104 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier.'#profilebox_'.$deployment->identifier); |
|
105 | 105 | exit(0); |
106 | 106 | case web\lib\common\FormElements::BUTTON_DELETE: |
107 | 107 | $response = $deployment->setRADIUSconfig(); |
108 | 108 | if (in_array('OK', $response)) { |
109 | 109 | $deployment->deactivate(); |
110 | 110 | } |
111 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier . '&' . urldecode(http_build_query($response)) . '#profilebox_' . |
|
111 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier.'&'.urldecode(http_build_query($response)).'#profilebox_'. |
|
112 | 112 | $deployment->identifier); |
113 | 113 | exit(0); |
114 | 114 | case web\lib\common\FormElements::BUTTON_REMOVESP: |
115 | 115 | $deployment->remove(); |
116 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier); |
|
116 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier); |
|
117 | 117 | exit(0); |
118 | 118 | case web\lib\common\FormElements::BUTTON_RENEWTLS: |
119 | 119 | $data = openssl_x509_parse($deployment->radsec_cert); |
@@ -124,14 +124,14 @@ discard block |
||
124 | 124 | $torevoke = implode('#', $certdata); |
125 | 125 | $response = $deployment->setRADIUSconfig(0, 0, $torevoke); |
126 | 126 | $deployment->renewtls(); |
127 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier . '#profilebox_' . $deployment->identifier); |
|
127 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier.'#profilebox_'.$deployment->identifier); |
|
128 | 128 | exit(0); |
129 | 129 | case web\lib\common\FormElements::BUTTON_USECSR: |
130 | 130 | if (isset($_FILES['upload']) && $_FILES['upload']['size'] > 0) { |
131 | 131 | $csrpem = file_get_contents($_FILES['upload']['tmp_name']); |
132 | 132 | if ($csrpem === FALSE) { |
133 | 133 | // seems we can't work with this file for some reason. Ignore. |
134 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier . '&errormsg=NOCSR_' . $deployment->identifier . '#profilebox_' . $deployment->identifier); |
|
134 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier.'&errormsg=NOCSR_'.$deployment->identifier.'#profilebox_'.$deployment->identifier); |
|
135 | 135 | exit(0); |
136 | 136 | } |
137 | 137 | $csr = new \phpseclib3\File\X509(); |
@@ -146,10 +146,10 @@ discard block |
||
146 | 146 | $torevoke = implode('#', $certdata); |
147 | 147 | $response = $deployment->setRADIUSconfig(0, 0, $torevoke); |
148 | 148 | $deployment->tlsfromcsr($csr); |
149 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier . '#profilebox_' . $deployment->identifier); |
|
149 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier.'#profilebox_'.$deployment->identifier); |
|
150 | 150 | exit(0); |
151 | 151 | } else { |
152 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier . '&errormsg=WRONGCSR_' . $deployment->identifier . '#profilebox_' . $deployment->identifier); |
|
152 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier.'&errormsg=WRONGCSR_'.$deployment->identifier.'#profilebox_'.$deployment->identifier); |
|
153 | 153 | exit(0); |
154 | 154 | } |
155 | 155 | } |
@@ -159,7 +159,7 @@ discard block |
||
159 | 159 | if (in_array('OK', $response)) { |
160 | 160 | $deployment->activate(); |
161 | 161 | } |
162 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier . '&' . urldecode(http_build_query($response)) . '#profilebox_' . $deployment->identifier); |
|
162 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier.'&'.urldecode(http_build_query($response)).'#profilebox_'.$deployment->identifier); |
|
163 | 163 | exit(0); |
164 | 164 | } else { |
165 | 165 | throw new Exception("Activate button pushed without acknowledged ToUs!"); |
@@ -192,7 +192,7 @@ discard block |
||
192 | 192 | } else { |
193 | 193 | $response = ['NOOP', 'NOOP']; |
194 | 194 | } |
195 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier . '&' . urldecode(http_build_query($response)) . '#profilebox_' . $deployment->identifier); |
|
195 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier.'&'.urldecode(http_build_query($response)).'#profilebox_'.$deployment->identifier); |
|
196 | 196 | exit(0); |
197 | 197 | default: |
198 | 198 | throw new Exception("Unknown button action requested!"); |
@@ -201,10 +201,10 @@ discard block |
||
201 | 201 | if (isset($_POST['command'])) { |
202 | 202 | switch ($_POST['command']) { |
203 | 203 | case web\lib\common\FormElements::BUTTON_CLOSE: |
204 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier) . '#profilebox_' . $deployment->identifier; |
|
204 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier).'#profilebox_'.$deployment->identifier; |
|
205 | 205 | exit(0); |
206 | 206 | default: |
207 | - header("Location: overview_org.php?inst_id=" . $my_inst->identifier . '#profilebox_' . $deployment->identifier); |
|
207 | + header("Location: overview_org.php?inst_id=".$my_inst->identifier.'#profilebox_'.$deployment->identifier); |
|
208 | 208 | exit(0); |
209 | 209 | } |
210 | 210 | } |
@@ -230,7 +230,7 @@ discard block |
||
230 | 230 | echo $uiElements->instLevelInfoBoxes($my_inst); |
231 | 231 | $deploymentOptions = $deployment->getAttributes(); |
232 | 232 | echo "<form enctype='multipart/form-data' action='edit_hotspot.php?inst_id=$my_inst->identifier&deployment_id=$deployment->identifier' method='post' accept-charset='UTF-8'> |
233 | - <input type='hidden' name='MAX_FILE_SIZE' value='" . \config\Master::MAX_UPLOAD_SIZE . "'>"; |
|
233 | + <input type='hidden' name='MAX_FILE_SIZE' value='".\config\Master::MAX_UPLOAD_SIZE."'>"; |
|
234 | 234 | $optionDisplay = new \web\lib\admin\OptionDisplay($deploymentOptions, \core\Options::LEVEL_PROFILE); |
235 | 235 | ?> |
236 | 236 | <fieldset class='option_container' id='managedsp_override'> |
@@ -264,7 +264,7 @@ discard block |
||
264 | 264 | <!-- input for VLAN identifier for guests--> |
265 | 265 | <td> |
266 | 266 | <span id='guest_vlan_label'> |
267 | - <?php echo sprintf(_("VLAN tag for guests:"), ($guest_vlan === NULL ? "" : " " . _("(unset with '0')"))); ?> |
|
267 | + <?php echo sprintf(_("VLAN tag for guests:"), ($guest_vlan === NULL ? "" : " "._("(unset with '0')"))); ?> |
|
268 | 268 | </span> |
269 | 269 | </td> |
270 | 270 | <td> |
@@ -280,7 +280,7 @@ discard block |
||
280 | 280 | <!-- input for VLAN identifier for home users--> |
281 | 281 | <td> |
282 | 282 | <span id='vlan_label'> |
283 | - <?php echo sprintf(_("VLAN tag for own users%s:"), ($vlan === NULL ? "" : " " . _("(unset with '0')"))); ?> |
|
283 | + <?php echo sprintf(_("VLAN tag for own users%s:"), ($vlan === NULL ? "" : " "._("(unset with '0')"))); ?> |
|
284 | 284 | </span> |
285 | 285 | </td> |
286 | 286 | <td> |
@@ -300,7 +300,7 @@ discard block |
||
300 | 300 | </fieldset> |
301 | 301 | |
302 | 302 | <?php |
303 | - echo "<p><button type='submit' name='submitbutton' class='deploymentopts' value='" . web\lib\common\FormElements::BUTTON_SAVE . "'>" . _("Save data") . "</button><button type='button' class='delete' name='abortbutton' value='abort' onclick='javascript:window.location = \"overview_org.php?inst_id=$my_inst->identifier\"'>" . _("Discard changes") . "</button></p></form>"; |
|
303 | + echo "<p><button type='submit' name='submitbutton' class='deploymentopts' value='".web\lib\common\FormElements::BUTTON_SAVE."'>"._("Save data")."</button><button type='button' class='delete' name='abortbutton' value='abort' onclick='javascript:window.location = \"overview_org.php?inst_id=$my_inst->identifier\"'>"._("Discard changes")."</button></p></form>"; |
|
304 | 304 | echo $deco->footer(); |
305 | 305 | ?> |
306 | 306 | <script> |
@@ -11,33 +11,33 @@ |
||
11 | 11 | isset($_REQUEST['instid']) && isset($_REQUEST['deploymentid']) && |
12 | 12 | (isset($_REQUEST['port']) && isset($_REQUEST['secret']) && isset($_REQUEST['pskkey']) && isset($_REQUEST['country']) || |
13 | 13 | isset($_REQUEST['torevoke']))) { |
14 | - if (isset($_REQUEST['remove'])) { |
|
14 | + if (isset($_REQUEST['remove'])) { |
|
15 | 15 | $remove = 1; |
16 | - } else { |
|
16 | + } else { |
|
17 | 17 | if (isset($_REQUEST['operatorname'])) { |
18 | - $opn = trim($_REQUEST['operatorname']); |
|
18 | + $opn = trim($_REQUEST['operatorname']); |
|
19 | 19 | } |
20 | 20 | if (isset($_REQUEST['vlan']) && isset($_REQUEST['realmforvlan']) && |
21 | 21 | is_array($_REQUEST['realmforvlan'])) { |
22 | - $vlans = $_REQUEST['vlan'] . '#' . implode('#', $_REQUEST['realmforvlan']); |
|
22 | + $vlans = $_REQUEST['vlan'] . '#' . implode('#', $_REQUEST['realmforvlan']); |
|
23 | 23 | } |
24 | 24 | if (isset($_REQUEST['guest_vlan'])) { |
25 | - $guest_vlan = $_REQUEST['guest_vlan']; |
|
25 | + $guest_vlan = $_REQUEST['guest_vlan']; |
|
26 | 26 | } |
27 | - } |
|
28 | - if (isset($_REQUEST['torevoke'])) { |
|
29 | - $el = explode('#', $_REQUEST['torevoke']); |
|
30 | - $res = cat_socket(implode(':', array($_REQUEST['instid'], $_REQUEST['deploymentid'], $el[0], $el[1]))); |
|
31 | - } else { |
|
32 | - # arguments 5-7 are Base64 encoded |
|
33 | - $res = cat_socket(implode(':', array($_REQUEST['country'], |
|
34 | - $_REQUEST['instid'], $_REQUEST['deploymentid'], |
|
35 | - $_REQUEST['port'], |
|
36 | - base64_encode($_REQUEST['secret']), |
|
37 | - base64_encode($opn), |
|
38 | - base64_encode($vlans), base64_encode($_REQUEST['pskkey']), $guest_vlan, $remove))); |
|
39 | - } |
|
40 | - echo $res; |
|
27 | + } |
|
28 | + if (isset($_REQUEST['torevoke'])) { |
|
29 | + $el = explode('#', $_REQUEST['torevoke']); |
|
30 | + $res = cat_socket(implode(':', array($_REQUEST['instid'], $_REQUEST['deploymentid'], $el[0], $el[1]))); |
|
31 | + } else { |
|
32 | + # arguments 5-7 are Base64 encoded |
|
33 | + $res = cat_socket(implode(':', array($_REQUEST['country'], |
|
34 | + $_REQUEST['instid'], $_REQUEST['deploymentid'], |
|
35 | + $_REQUEST['port'], |
|
36 | + base64_encode($_REQUEST['secret']), |
|
37 | + base64_encode($opn), |
|
38 | + base64_encode($vlans), base64_encode($_REQUEST['pskkey']), $guest_vlan, $remove))); |
|
39 | + } |
|
40 | + echo $res; |
|
41 | 41 | } else { |
42 | - echo "FAILURE"; |
|
42 | + echo "FAILURE"; |
|
43 | 43 | } |
@@ -19,7 +19,7 @@ |
||
19 | 19 | } |
20 | 20 | if (isset($_REQUEST['vlan']) && isset($_REQUEST['realmforvlan']) && |
21 | 21 | is_array($_REQUEST['realmforvlan'])) { |
22 | - $vlans = $_REQUEST['vlan'] . '#' . implode('#', $_REQUEST['realmforvlan']); |
|
22 | + $vlans = $_REQUEST['vlan'].'#'.implode('#', $_REQUEST['realmforvlan']); |
|
23 | 23 | } |
24 | 24 | if (isset($_REQUEST['guest_vlan'])) { |
25 | 25 | $guest_vlan = $_REQUEST['guest_vlan']; |
@@ -8,7 +8,7 @@ discard block |
||
8 | 8 | * License: see the web/copyright.php file in the file structure |
9 | 9 | * ****************************************************************************** |
10 | 10 | */ |
11 | -require_once dirname(dirname(__FILE__)) . "/config/_config.php"; |
|
11 | +require_once dirname(dirname(__FILE__))."/config/_config.php"; |
|
12 | 12 | |
13 | 13 | /** |
14 | 14 | * The sctipt will be called from crontab |
@@ -28,7 +28,7 @@ discard block |
||
28 | 28 | } |
29 | 29 | |
30 | 30 | |
31 | -while ( $row = mysqli_fetch_object(/** @scrutinizer ignore-type */ $allOpenRoamingProfiles)) { |
|
31 | +while ($row = mysqli_fetch_object(/** @scrutinizer ignore-type */ $allOpenRoamingProfiles)) { |
|
32 | 32 | $profileId = $row->profile_id; |
33 | 33 | $profile = \core\ProfileFactory::instantiate($profileId); |
34 | 34 | $res = $profile->openroamingReadinessTest(); |
@@ -26,7 +26,7 @@ discard block |
||
26 | 26 | */ |
27 | 27 | ?> |
28 | 28 | <?php |
29 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
29 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
30 | 30 | |
31 | 31 | $auth = new \web\lib\admin\Authentication(); |
32 | 32 | $deco = new \web\lib\admin\PageDecoration(); |
@@ -82,9 +82,9 @@ discard block |
||
82 | 82 | echo '<br/>'; |
83 | 83 | echo _("In the 'Timestamp' column we show last update time."); |
84 | 84 | echo '<p/>'; |
85 | - echo _('To check eduroam database specification see') . |
|
86 | - ' <a target="_blank" href="https://monitor.eduroam.org/eduroam-database/v2/docs/eduroam-database-ver30112021.pdf">' . |
|
87 | - _('this document') . '</a>.<p/>'; |
|
85 | + echo _('To check eduroam database specification see'). |
|
86 | + ' <a target="_blank" href="https://monitor.eduroam.org/eduroam-database/v2/docs/eduroam-database-ver30112021.pdf">'. |
|
87 | + _('this document').'</a>.<p/>'; |
|
88 | 88 | echo _('If you cannot find your institution on this list it means that this institution is not present in your upstream data.'); |
89 | 89 | echo '<p/>'; |
90 | 90 | $allAuthorizedFeds = $user->getAttributes("user:fedadmin"); |
@@ -93,11 +93,11 @@ discard block |
||
93 | 93 | ?> |
94 | 94 | |
95 | 95 | <select name="INST-list" id="INST-list"> |
96 | - <option value=""><?php echo _('---PLEASE CHOOSE---');?></option> |
|
96 | + <option value=""><?php echo _('---PLEASE CHOOSE---'); ?></option> |
|
97 | 97 | <?php |
98 | 98 | $instdata = array(); |
99 | 99 | foreach ($extInsts as $iid => $oneInst) { |
100 | - print '<option value="' . $iid . '">' . $oneInst['name'] . '</option>'; |
|
100 | + print '<option value="'.$iid.'">'.$oneInst['name'].'</option>'; |
|
101 | 101 | $instdata[$iid] = array(); |
102 | 102 | $instdata[$iid]['name'] = $oneInst['name']; |
103 | 103 | $instdata[$iid]['type'] = _('no data'); |
@@ -111,22 +111,22 @@ discard block |
||
111 | 111 | $contactdata = ''; |
112 | 112 | foreach ($oneInst['contacts'] as $oneContact) { |
113 | 113 | if ($contactdata != '') { |
114 | - $contactdata = $contactdata . '<br>'; |
|
114 | + $contactdata = $contactdata.'<br>'; |
|
115 | 115 | } |
116 | 116 | if ($oneContact['name']) { |
117 | - $contactdata = $contactdata . $oneContact['name']; |
|
117 | + $contactdata = $contactdata.$oneContact['name']; |
|
118 | 118 | } |
119 | 119 | if ($contactdata != '') { |
120 | - $contactdata = $contactdata . '<br>'; |
|
120 | + $contactdata = $contactdata.'<br>'; |
|
121 | 121 | } |
122 | 122 | if ($oneContact['mail']) { |
123 | - $contactdata = $contactdata . $oneContact['mail']; |
|
123 | + $contactdata = $contactdata.$oneContact['mail']; |
|
124 | 124 | } |
125 | 125 | if ($contactdata != '') { |
126 | - $contactdata = $contactdata . '<br>'; |
|
126 | + $contactdata = $contactdata.'<br>'; |
|
127 | 127 | } |
128 | 128 | if ($oneContact['phone']) { |
129 | - $contactdata = $contactdata . $oneContact['phone']; |
|
129 | + $contactdata = $contactdata.$oneContact['phone']; |
|
130 | 130 | } |
131 | 131 | } |
132 | 132 | if ($contactdata == '') { |
@@ -145,11 +145,11 @@ discard block |
||
145 | 145 | var instts = []; |
146 | 146 | <?php |
147 | 147 | foreach (array_keys($instdata) as $iid) { |
148 | - echo "instservers['" . $iid . "']='" . $instdata[$iid]['servers']. "';\n"; |
|
149 | - echo "instname['" . $iid . "']='" . $instdata[$iid]['name']. "';\n"; |
|
150 | - echo "insttype['" . $iid . "']='" . $instdata[$iid]['type']. "';\n"; |
|
151 | - echo "instcontact['" . $iid . "']='" . $instdata[$iid]['contacts']. "';\n"; |
|
152 | - echo "instts['" . $iid . "']='" . $instdata[$iid]['ts']. "';\n"; |
|
148 | + echo "instservers['".$iid."']='".$instdata[$iid]['servers']."';\n"; |
|
149 | + echo "instname['".$iid."']='".$instdata[$iid]['name']."';\n"; |
|
150 | + echo "insttype['".$iid."']='".$instdata[$iid]['type']."';\n"; |
|
151 | + echo "instcontact['".$iid."']='".$instdata[$iid]['contacts']."';\n"; |
|
152 | + echo "instts['".$iid."']='".$instdata[$iid]['ts']."';\n"; |
|
153 | 153 | } |
154 | 154 | ?> |
155 | 155 | $(document).ready(function(){ |
@@ -171,18 +171,18 @@ discard block |
||
171 | 171 | <div id="instdata_area"> |
172 | 172 | <table> |
173 | 173 | <tr><th align="left" width="350"> |
174 | - <?php echo _('Name');?> |
|
174 | + <?php echo _('Name'); ?> |
|
175 | 175 | </th><th align="left" width="100"> |
176 | - <?php echo _('Type');?> |
|
176 | + <?php echo _('Type'); ?> |
|
177 | 177 | </th> |
178 | 178 | <th align="left" width="200"> |
179 | - <?php echo _('Servers');?> |
|
179 | + <?php echo _('Servers'); ?> |
|
180 | 180 | </th> |
181 | 181 | <th align="left" width="200"> |
182 | - <?php echo _('Contact data');?> |
|
182 | + <?php echo _('Contact data'); ?> |
|
183 | 183 | </th> |
184 | 184 | <th align="left" width="100"> |
185 | - <?php echo _('Timestamp');?> |
|
185 | + <?php echo _('Timestamp'); ?> |
|
186 | 186 | </th> |
187 | 187 | </tr> |
188 | 188 | <tr id="toshow"></tr> |
@@ -47,7 +47,7 @@ discard block |
||
47 | 47 | public function htmlHeadCode() { |
48 | 48 | $cat = new \core\CAT(); |
49 | 49 | \core\common\Entity::intoThePotatoes(); |
50 | - $retval = "<script type='text/javascript' src='https://maps.googleapis.com/maps/api/js?key=" . \config\Master::APPEARANCE['google_maps_api_key'] . "'></script> |
|
50 | + $retval = "<script type='text/javascript' src='https://maps.googleapis.com/maps/api/js?key=".\config\Master::APPEARANCE['google_maps_api_key']."'></script> |
|
51 | 51 | <script type='text/javascript'> |
52 | 52 | // some global variables; |
53 | 53 | var center_lat=49.6114885608729; |
@@ -103,19 +103,19 @@ discard block |
||
103 | 103 | * |
104 | 104 | */ |
105 | 105 | function locator_magic() { |
106 | - geocoder.geocode({'address':\"" . preg_replace("/\"/", """, $this->instName) . "\", 'region':\"" . strtolower($this->fedName) . "\"}, |
|
106 | + geocoder.geocode({'address':\"" . preg_replace("/\"/", """, $this->instName)."\", 'region':\"".strtolower($this->fedName)."\"}, |
|
107 | 107 | function(r,status) { |
108 | 108 | if(status != google.maps.GeocoderStatus.OK) { |
109 | - locate_country(\"" . $cat->knownFederations[strtoupper($this->fedName)]['name'] . "\"); |
|
109 | + locate_country(\"" . $cat->knownFederations[strtoupper($this->fedName)]['name']."\"); |
|
110 | 110 | } else { |
111 | 111 | var i; |
112 | 112 | for(i = 0; i < r.length; i++) { |
113 | 113 | Addr = getAddressElements(r[i].address_components); |
114 | - if(Addr.country == \"" . strtoupper($this->fedName) . "\") |
|
114 | + if(Addr.country == \"" . strtoupper($this->fedName)."\") |
|
115 | 115 | break; |
116 | 116 | } |
117 | - if(Addr.country != \"" . strtoupper($this->fedName) . "\") |
|
118 | - locate_country(\"" . $cat->knownFederations[strtoupper($this->fedName)]['name'] . "\"); |
|
117 | + if(Addr.country != \"" . strtoupper($this->fedName)."\") |
|
118 | + locate_country(\"" . $cat->knownFederations[strtoupper($this->fedName)]['name']."\"); |
|
119 | 119 | else { |
120 | 120 | addMarker(r[i].geometry.location,15,null); |
121 | 121 | } |
@@ -128,7 +128,7 @@ discard block |
||
128 | 128 | */ |
129 | 129 | function markerClicked(m) { |
130 | 130 | info_window.close(); |
131 | - var t = \"" . _("This is location ") . "\"+m.info; |
|
131 | + var t = \"" . _("This is location ")."\"+m.info; |
|
132 | 132 | info_window.setContent(t); |
133 | 133 | info_window.setPosition(m.getPosition()); |
134 | 134 | info_window.open(map,m); |
@@ -207,7 +207,7 @@ discard block |
||
207 | 207 | function getAddressLocation() { |
208 | 208 | var city = $('#address').val(); |
209 | 209 | if(city == '') { |
210 | - alert(\"" . _("nothing entered in the address field") . "\"); |
|
210 | + alert(\"" . _("nothing entered in the address field")."\"); |
|
211 | 211 | return false; |
212 | 212 | } |
213 | 213 | geocoder.geocode( { 'address': city}, function(results, status) { |
@@ -227,7 +227,7 @@ discard block |
||
227 | 227 | * trigger geolocation |
228 | 228 | */ |
229 | 229 | function locateMe() { |
230 | - $('#address').val(\"" . _("locating") . "\"); |
|
230 | + $('#address').val(\"" . _("locating")."\"); |
|
231 | 231 | navigator.geolocation.getCurrentPosition(locate_success,locate_fail,{maximumAge:3600000, timeout:5000}); |
232 | 232 | } |
233 | 233 | |
@@ -345,7 +345,7 @@ discard block |
||
345 | 345 | if ($this->readOnly) { |
346 | 346 | return "<div id='map' class='googlemap'></div>"; |
347 | 347 | } else { |
348 | - return $this->htmlPreEdit($wizard, $additional) . $this->findLocationHtml() . "<div id='map' class='googlemap'></div>" . $this->htmlPostEdit(FALSE); |
|
348 | + return $this->htmlPreEdit($wizard, $additional).$this->findLocationHtml()."<div id='map' class='googlemap'></div>".$this->htmlPostEdit(FALSE); |
|
349 | 349 | } |
350 | 350 | } |
351 | 351 | |
@@ -358,11 +358,11 @@ discard block |
||
358 | 358 | */ |
359 | 359 | public static function optionListDisplayCode($coords, $number) { |
360 | 360 | // quiesce warnings about unused variable |
361 | - if (strlen(sprintf("%s", $coords)) <0) { |
|
361 | + if (strlen(sprintf("%s", $coords)) < 0) { |
|
362 | 362 | throw new \Exception("A miracle! A string with negative length!"); |
363 | 363 | }; |
364 | 364 | \core\common\Entity::intoThePotatoes(); |
365 | - $retval = "<button id='location_b_" . $number . "' class='location_button'>" . _("Click to see location") . " $number</button>"; |
|
365 | + $retval = "<button id='location_b_".$number."' class='location_button'>"._("Click to see location")." $number</button>"; |
|
366 | 366 | \core\common\Entity::outOfThePotatoes(); |
367 | 367 | return $retval; |
368 | 368 | } |
@@ -373,7 +373,7 @@ discard block |
||
373 | 373 | * @return string |
374 | 374 | */ |
375 | 375 | public function bodyTagCode() { |
376 | - return "onload='load(" . ($this->readOnly ? "0" : "1") . ")'"; |
|
376 | + return "onload='load(".($this->readOnly ? "0" : "1").")'"; |
|
377 | 377 | } |
378 | 378 | |
379 | 379 | /** |
@@ -383,7 +383,7 @@ discard block |
||
383 | 383 | */ |
384 | 384 | private function findLocationHtml() { |
385 | 385 | \core\common\Entity::intoThePotatoes(); |
386 | - $retval = "<p>" . _("Address:") . " <input name='address' id='address' /><button type='button' onclick='getAddressLocation()'>" . _("Find address") . "</button> <button type='button' onclick='locateMe()'>" . _("Locate Me!") . "</button></p>"; |
|
386 | + $retval = "<p>"._("Address:")." <input name='address' id='address' /><button type='button' onclick='getAddressLocation()'>"._("Find address")."</button> <button type='button' onclick='locateMe()'>"._("Locate Me!")."</button></p>"; |
|
387 | 387 | \core\common\Entity::outOfThePotatoes(); |
388 | 388 | return $retval; |
389 | 389 | } |