Passed
Push — release_2_0 ( c9a182...4d277c )
by Stefan
09:38
created
devices/apple_mobileconfig/MobileconfigSuperclass.php 2 patches
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -701,7 +701,7 @@
 block discarded – undo
701 701
                             \core\common\Entity::$nomenclature_inst, 
702 702
                             count($this->CAsAccountedFor)+1, 
703 703
                             ($ca['root'] ? _("Root") : _("Intermediate"))) . 
704
-              "</string>
704
+                "</string>
705 705
                <key>PayloadIdentifier</key>
706 706
                <string>" . self::$iPhonePayloadPrefix . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string>
707 707
                <key>PayloadOrganization</key>
Please login to merge, or discard this patch.
Spacing   +48 added lines, -48 removed lines patch added patch discarded remove patch
@@ -98,15 +98,15 @@  discard block
 block discarded – undo
98 98
       <key>PayloadDescription</key>
99 99
          <string>$tagline</string>
100 100
       <key>PayloadDisplayName</key>
101
-         <string>" . CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'] . "</string>
101
+         <string>".CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']."</string>
102 102
       <key>PayloadIdentifier</key>
103
-         <string>" . self::$iPhonePayloadPrefix . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang</string>
103
+         <string>" . self::$iPhonePayloadPrefix.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang</string>
104 104
       <key>PayloadOrganization</key>
105
-         <string>" . htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['general:instname'][0]), ENT_XML1, 'UTF-8') . ( $this->attributes['internal:profile_count'][0] > 1 ? " (" . htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['profile:name'][0]), ENT_XML1, 'UTF-8') . ")" : "") . "</string>
105
+         <string>".htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['general:instname'][0]), ENT_XML1, 'UTF-8').($this->attributes['internal:profile_count'][0] > 1 ? " (".htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['profile:name'][0]), ENT_XML1, 'UTF-8').")" : "")."</string>
106 106
       <key>PayloadType</key>
107 107
          <string>Configuration</string>
108 108
       <key>PayloadUUID</key>
109
-         <string>" . \core\common\Entity::uuid('', self::$iPhonePayloadPrefix . $this->massagedConsortium . $this->massagedCountry . $this->massagedInst . $this->massagedProfile) . "</string>
109
+         <string>" . \core\common\Entity::uuid('', self::$iPhonePayloadPrefix.$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile)."</string>
110 110
       <key>PayloadVersion</key>
111 111
          <integer>1</integer>";
112 112
         \core\common\Entity::outOfThePotatoes();
@@ -138,21 +138,21 @@  discard block
 block discarded – undo
138 138
     {
139 139
         \core\common\Entity::intoThePotatoes();
140 140
         if (isset($this->attributes['support:info_file'])) {
141
-            return MobileconfigSuperclass::BUFFER_CONSENT_PRE . htmlspecialchars(iconv("UTF-8", "UTF-8//TRANSLIT", $this->attributes['support:info_file'][0]), ENT_XML1, 'UTF-8') . MobileconfigSuperclass::BUFFER_CONSENT_POST;
141
+            return MobileconfigSuperclass::BUFFER_CONSENT_PRE.htmlspecialchars(iconv("UTF-8", "UTF-8//TRANSLIT", $this->attributes['support:info_file'][0]), ENT_XML1, 'UTF-8').MobileconfigSuperclass::BUFFER_CONSENT_POST;
142 142
         }
143 143
         if ($this->attributes['internal:verify_userinput_suffix'][0] != 0) {
144 144
             if ($this->attributes['internal:hint_userinput_suffix'][0] != 0) {
145
-                $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . sprintf(_("Important Notice: your username MUST end exactly with '...@%s' !"), $this->attributes['internal:realm'][0]) . MobileconfigSuperclass::BUFFER_CONSENT_POST;
145
+                $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE.sprintf(_("Important Notice: your username MUST end exactly with '...@%s' !"), $this->attributes['internal:realm'][0]).MobileconfigSuperclass::BUFFER_CONSENT_POST;
146 146
                 \core\common\Entity::outOfThePotatoes();
147 147
                 return $retval;
148 148
             } else { 
149 149
             if (strlen($this->attributes['internal:realm'][0]) > 0) {
150 150
                 /// note space between variable and exclamation mark - makes sure users don't mistakenly think the exclamation mark is part of the required username!
151
-                $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . sprintf(_("Important Notice: your username MUST contain an '@' and end with ...%s !"), $this->attributes['internal:realm'][0]) . MobileconfigSuperclass::BUFFER_CONSENT_POST;
151
+                $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE.sprintf(_("Important Notice: your username MUST contain an '@' and end with ...%s !"), $this->attributes['internal:realm'][0]).MobileconfigSuperclass::BUFFER_CONSENT_POST;
152 152
                 \core\common\Entity::outOfThePotatoes();
153 153
                 return $retval;
154 154
             }
155
-            $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . _("Important Notice: your username MUST be in the form of xxx@yyy where the yyy is a common suffix identifying your Identity Provider. Please find out what to use there and enter the username in the correct format.") . MobileconfigSuperclass::BUFFER_CONSENT_POST;
155
+            $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE._("Important Notice: your username MUST be in the form of xxx@yyy where the yyy is a common suffix identifying your Identity Provider. Please find out what to use there and enter the username in the correct format.").MobileconfigSuperclass::BUFFER_CONSENT_POST;
156 156
             \core\common\Entity::outOfThePotatoes();
157 157
             return $retval;
158 158
             }
@@ -177,7 +177,7 @@  discard block
 block discarded – undo
177 177
         // also escape htmlspecialchars
178 178
         // not all names and profiles have a name, so be prepared
179 179
 
180
-        $this->loggerInstance->debug(5, "List of available attributes: " . var_export($this->attributes, TRUE));
180
+        $this->loggerInstance->debug(5, "List of available attributes: ".var_export($this->attributes, TRUE));
181 181
 
182 182
         $this->instName = $this->attributes['general:instname'][0] ?? _("Unnamed Organisation");
183 183
         $this->profileName = $this->attributes['profile:name'][0] ?? _("Unnamed Profile");
@@ -219,7 +219,7 @@  discard block
 block discarded – undo
219 219
 
220 220
         file_put_contents('installer_profile', $outputXml);
221 221
 
222
-        $fileName = $this->installerBasename . '.mobileconfig';
222
+        $fileName = $this->installerBasename.'.mobileconfig';
223 223
 
224 224
         if (!$this->sign) {
225 225
             rename("installer_profile", $fileName);
@@ -227,7 +227,7 @@  discard block
 block discarded – undo
227 227
             return $fileName;
228 228
         }
229 229
         // still here? Then we are signing.
230
-        $signing = system($this->sign . " installer_profile '$fileName' > /dev/null");
230
+        $signing = system($this->sign." installer_profile '$fileName' > /dev/null");
231 231
         if ($signing === FALSE) {
232 232
             $this->loggerInstance->debug(2, "Signing the mobileconfig installer $fileName FAILED!\n");
233 233
         }
@@ -246,19 +246,19 @@  discard block
 block discarded – undo
246 246
         \core\common\Entity::intoThePotatoes();
247 247
         $ssidCount = count($this->attributes['internal:SSID']);
248 248
         $certCount = count($this->attributes['internal:CAs'][0]);
249
-        $out = "<p>" . _("For best results, please use the built-in browser (Safari) to open the configuration file.") . "</p>";
249
+        $out = "<p>"._("For best results, please use the built-in browser (Safari) to open the configuration file.")."</p>";
250 250
         $out .= "<p>";
251 251
         $out .= _("The profile will install itself after you click (or tap) the button. You will be asked for confirmation/input at several points:");
252 252
         $out .= "<ul>";
253
-        $out .= "<li>" . _("to install the profile") . "</li>";
254
-        $out .= "<li>" . ngettext("to accept the server certificate authority", "to accept the server certificate authorities", $certCount);
253
+        $out .= "<li>"._("to install the profile")."</li>";
254
+        $out .= "<li>".ngettext("to accept the server certificate authority", "to accept the server certificate authorities", $certCount);
255 255
         if ($certCount > 1) {
256
-            $out .= " " . sprintf(_("(%d times)"), $certCount);
256
+            $out .= " ".sprintf(_("(%d times)"), $certCount);
257 257
         }
258 258
         $out .= "</li>";
259
-        $out .= "<li>" . _("to enter the username and password you have been given by your organisation");
259
+        $out .= "<li>"._("to enter the username and password you have been given by your organisation");
260 260
         if ($ssidCount > 1) {
261
-            $out .= " " . sprintf(_("(%d times each, because %s is installed for %d SSIDs)"), $ssidCount, CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'], $ssidCount);
261
+            $out .= " ".sprintf(_("(%d times each, because %s is installed for %d SSIDs)"), $ssidCount, CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'], $ssidCount);
262 262
         }
263 263
         $out .= "</li>";
264 264
         $out .= "</ul>";
@@ -311,7 +311,7 @@  discard block
 block discarded – undo
311 311
         $retval .= "                <key>RoamingConsortiumOIs</key>
312 312
                 <array>";
313 313
 
314
-        $retval .= "<string>" . strtoupper($consortiumOi) . "</string>";
314
+        $retval .= "<string>".strtoupper($consortiumOi)."</string>";
315 315
 
316 316
         $retval .= "</array>";
317 317
         // this is an undocumented value found on the net. Does it do something useful?
@@ -352,7 +352,7 @@  discard block
 block discarded – undo
352 352
                   <dict>
353 353
                       <key>AcceptEAPTypes</key>
354 354
                          <array>
355
-                            <integer>" . $eapType['OUTER'] . "</integer>
355
+                            <integer>" . $eapType['OUTER']."</integer>
356 356
                          </array>
357 357
                       <key>EAPFASTProvisionPAC</key>
358 358
                             <true />
@@ -365,7 +365,7 @@  discard block
 block discarded – undo
365 365
 ";
366 366
         if ($realm !== NULL) {
367 367
             $retval .= "<key>OuterIdentity</key>
368
-                                    <string>" . htmlspecialchars($realm, ENT_XML1, 'UTF-8') . "</string>
368
+                                    <string>" . htmlspecialchars($realm, ENT_XML1, 'UTF-8')."</string>
369 369
 ";
370 370
         }
371 371
         $retval .= "<key>PayloadCertificateAnchorUUID</key>
@@ -389,11 +389,11 @@  discard block
 block discarded – undo
389 389
         $retval .= "
390 390
                          </array>";
391 391
         if ($eapType['INNER'] == \core\common\EAP::NE_SILVERBULLET) {
392
-            $retval .= "<key>UserName</key><string>" . $this->clientCert["certObject"]->username . "</string>";
392
+            $retval .= "<key>UserName</key><string>".$this->clientCert["certObject"]->username."</string>";
393 393
         }
394 394
         $retval .= "
395 395
                       <key>TTLSInnerAuthentication</key>
396
-                         <string>" . ($eapType['INNER'] == \core\common\EAP::NONE ? "PAP" : "MSCHAPv2") . "</string>
396
+                         <string>" . ($eapType['INNER'] == \core\common\EAP::NONE ? "PAP" : "MSCHAPv2")."</string>
397 397
                    </dict>";
398 398
         return $retval;
399 399
     }
@@ -413,9 +413,9 @@  discard block
 block discarded – undo
413 413
             // characters are still reversed, invert on use!
414 414
             $buffer .= "<string>Manual</string>
415 415
                   <key>ProxyServer</key>
416
-                  <string>" . strrev($serverAndPort[1]) . "</string>
416
+                  <string>" . strrev($serverAndPort[1])."</string>
417 417
                   <key>ProxyServerPort</key>
418
-                  <integer>" . strrev($serverAndPort[0]) . "</integer>
418
+                  <integer>" . strrev($serverAndPort[0])."</integer>
419 419
                   <key>ProxyPACFallbackAllowed</key>
420 420
                   <false/>";
421 421
         } else {
@@ -444,7 +444,7 @@  discard block
 block discarded – undo
444 444
                     throw new Exception("SSID must be a string!");
445 445
                 }
446 446
                 $escapedSSID = htmlspecialchars($toBeConfigured, ENT_XML1, 'UTF-8');
447
-                $payloadIdentifier = "wifi." . $this->serial;
447
+                $payloadIdentifier = "wifi.".$this->serial;
448 448
                 $payloadShortName = sprintf(_("SSID %s"), $escapedSSID);
449 449
                 $payloadName = sprintf(_("%s configuration for network name %s"), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'], $escapedSSID);
450 450
                 $encryptionTypeString = "WPA";
@@ -474,7 +474,7 @@  discard block
 block discarded – undo
474 474
                 $payloadIdentifier = "hs20.$toBeConfigured";
475 475
                 $knownOiName = array_search($toBeConfigured, CONFIG_CONFASSISTANT['CONSORTIUM']['interworking-consortium-oi']);
476 476
                 if ($knownOiName === FALSE) { // a custom RCOI as set by the IdP admin; do not use the term "eduroam" in that one!
477
-                    $knownOiName = $this->instName . " "._("Roaming Partner");
477
+                    $knownOiName = $this->instName." "._("Roaming Partner");
478 478
                 }
479 479
                 $payloadShortName = $knownOiName;
480 480
                 $payloadName = _("Passpoint roaming configuration ($knownOiName)");
@@ -496,11 +496,11 @@  discard block
 block discarded – undo
496 496
                <key>PayloadDisplayName</key>
497 497
                   <string>$payloadShortName</string>
498 498
                <key>PayloadIdentifier</key>
499
-                  <string>" . self::$iPhonePayloadPrefix . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.$payloadIdentifier</string>
499
+                  <string>".self::$iPhonePayloadPrefix.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.$payloadIdentifier</string>
500 500
                <key>PayloadOrganization</key>
501
-                  <string>" . $this->massagedConsortium . ".1x-config.org</string>
501
+                  <string>".$this->massagedConsortium.".1x-config.org</string>
502 502
                <key>PayloadType</key>
503
-                  <string>com.apple." . ($blocktype == MobileconfigSuperclass::NETWORK_BLOCK_TYPE_WIRED ? "firstactiveethernet" : "wifi") . ".managed</string>";
503
+                  <string>com.apple." . ($blocktype == MobileconfigSuperclass::NETWORK_BLOCK_TYPE_WIRED ? "firstactiveethernet" : "wifi").".managed</string>";
504 504
         $retval .= $this->proxySettings();
505 505
         $retval .= $setupModesString;
506 506
         if ($eapType['INNER'] == \core\common\EAP::NE_SILVERBULLET) {
@@ -512,7 +512,7 @@  discard block
 block discarded – undo
512 512
         }
513 513
         $retval .= "
514 514
                <key>PayloadUUID</key>
515
-                  <string>" . \core\common\Entity::uuid() . "</string>
515
+                  <string>" . \core\common\Entity::uuid()."</string>
516 516
                <key>PayloadVersion</key>
517 517
                   <integer>1</integer>
518 518
                   $wifiNetworkIdentification</dict>";
@@ -542,15 +542,15 @@  discard block
 block discarded – undo
542 542
 	<key>IsHotspot</key>
543 543
 	<false/>
544 544
 	<key>PayloadDescription</key>
545
-	<string>" . sprintf(_("This SSID should not be used after bootstrapping %s"), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']) . "</string>
545
+	<string>" . sprintf(_("This SSID should not be used after bootstrapping %s"), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'])."</string>
546 546
 	<key>PayloadDisplayName</key>
547
-	<string>" . _("Disabled WiFi network") . "</string>
547
+	<string>" . _("Disabled WiFi network")."</string>
548 548
 	<key>PayloadIdentifier</key>
549
-	<string>" . self::$iPhonePayloadPrefix . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.wifi.disabled.$this->removeSerial</string>
549
+	<string>" . self::$iPhonePayloadPrefix.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.wifi.disabled.$this->removeSerial</string>
550 550
 	<key>PayloadType</key>
551 551
 	<string>com.apple.wifi.managed</string>
552 552
 	<key>PayloadUUID</key>
553
-	<string>" . \core\common\Entity::uuid() . "</string>
553
+	<string>".\core\common\Entity::uuid()."</string>
554 554
 	<key>PayloadVersion</key>
555 555
 	<real>1</real>";
556 556
         $retval .= $this->proxySettings();
@@ -629,12 +629,12 @@  discard block
 block discarded – undo
629 629
         $mimeBlob = base64_encode($binaryBlob);
630 630
         $mimeFormatted = chunk_split($mimeBlob, 52, "\r\n");
631 631
         $payloadUUID = \core\common\Entity::uuid('', $mimeBlob);
632
-        $retArray = ["block" => "<dict>" .
632
+        $retArray = ["block" => "<dict>".
633 633
             // we don't include the import password. It's displayed on screen, and should be input by the user.
634 634
             // <key>Password</key>
635 635
             //   <string>" . $this->clientCert['password'] . "</string>
636 636
             "<key>PayloadCertificateFileName</key>
637
-                     <string>" . $this->massagedConsortium . ".pfx</string>
637
+                     <string>" . $this->massagedConsortium.".pfx</string>
638 638
                   <key>PayloadContent</key>
639 639
                      <data>
640 640
 $mimeFormatted
@@ -642,7 +642,7 @@  discard block
 block discarded – undo
642 642
                   <key>PayloadDescription</key>
643 643
                      <string>MIME Base-64 encoded PKCS#12 Client Certificate</string>
644 644
                   <key>PayloadDisplayName</key>
645
-                     <string>" . _("eduroam user certificate") . "</string>
645
+                     <string>"._("eduroam user certificate")."</string>
646 646
                   <key>PayloadIdentifier</key>
647 647
                      <string>com.apple.security.pkcs12.$payloadUUID</string>
648 648
                   <key>PayloadType</key>
@@ -652,7 +652,7 @@  discard block
 block discarded – undo
652 652
                   <key>PayloadVersion</key>
653 653
                      <integer>1</integer>
654 654
                 </dict>",
655
-            "UUID" => $payloadUUID,];
655
+            "UUID" => $payloadUUID, ];
656 656
         \core\common\Entity::outOfThePotatoes();
657 657
         return $retArray;
658 658
     }
@@ -671,7 +671,7 @@  discard block
 block discarded – undo
671 671
         }
672 672
         $expiryTime = new \DateTime($this->clientCert['certObject']->expiry);
673 673
         return "<key>RemovalDate</key>
674
-        <date>" . $expiryTime->format("Y-m-d") . "T" . $expiryTime->format("H:i:s") . "Z</date>";
674
+        <date>" . $expiryTime->format("Y-m-d")."T".$expiryTime->format("H:i:s")."Z</date>";
675 675
     }
676 676
 
677 677
     private $CAsAccountedFor = [];
@@ -695,27 +695,27 @@  discard block
 block discarded – undo
695 695
             $stream = "
696 696
             <dict>
697 697
                <key>PayloadCertificateFileName</key>
698
-               <string>" . $ca['uuid'] . ".der</string>
698
+               <string>" . $ca['uuid'].".der</string>
699 699
                <key>PayloadContent</key>
700 700
                <data>
701
-" . $trimmedPem . "</data>
701
+" . $trimmedPem."</data>
702 702
                <key>PayloadDescription</key>
703
-               <string>" . sprintf(_("The %s Certification Authority"), \core\common\Entity::$nomenclature_inst) . "</string>
703
+               <string>" . sprintf(_("The %s Certification Authority"), \core\common\Entity::$nomenclature_inst)."</string>
704 704
                <key>PayloadDisplayName</key>
705 705
                <string>" . 
706 706
                     /// example: "Identity Provider CA #1 (Root)"
707
-                    sprintf(_("%s CA #%d (%s)" ), 
707
+                    sprintf(_("%s CA #%d (%s)"), 
708 708
                             \core\common\Entity::$nomenclature_inst, 
709
-                            count($this->CAsAccountedFor)+1, 
710
-                            ($ca['root'] ? _("Root") : _("Intermediate"))) . 
709
+                            count($this->CAsAccountedFor) + 1, 
710
+                            ($ca['root'] ? _("Root") : _("Intermediate"))). 
711 711
               "</string>
712 712
                <key>PayloadIdentifier</key>
713
-               <string>" . self::$iPhonePayloadPrefix . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string>
713
+               <string>" . self::$iPhonePayloadPrefix.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string>
714 714
                <key>PayloadOrganization</key>
715
-               <string>" . $this->massagedConsortium . ".1x-config.org</string>
715
+               <string>".$this->massagedConsortium.".1x-config.org</string>
716 716
                <key>PayloadType</key>
717 717
                <string>com.apple.security.root</string>
718
-               <key>PayloadUUID</key><string>" . $ca['uuid'] . "</string>
718
+               <key>PayloadUUID</key><string>" . $ca['uuid']."</string>
719 719
                <key>PayloadVersion</key>
720 720
                <integer>1</integer>
721 721
             </dict>";
Please login to merge, or discard this patch.
core/SanityTests.php 1 patch
Spacing   +41 added lines, -41 removed lines patch added patch discarded remove patch
@@ -49,9 +49,9 @@  discard block
 block discarded – undo
49 49
 use GeoIp2\Database\Reader;
50 50
 use \Exception;
51 51
 
52
-require_once dirname(dirname(__FILE__)) . "/config/_config.php";
53
-require_once dirname(dirname(__FILE__)) . "/core/PHPMailer/src/PHPMailer.php";
54
-require_once dirname(dirname(__FILE__)) . "/core/PHPMailer/src/SMTP.php";
52
+require_once dirname(dirname(__FILE__))."/config/_config.php";
53
+require_once dirname(dirname(__FILE__))."/core/PHPMailer/src/PHPMailer.php";
54
+require_once dirname(dirname(__FILE__))."/core/PHPMailer/src/SMTP.php";
55 55
 
56 56
 class SanityTests extends CAT
57 57
 {
@@ -93,7 +93,7 @@  discard block
 block discarded – undo
93 93
         $this->test_result = [];
94 94
         $this->test_result['global'] = 0;
95 95
         // parse the schema file to find out the number of expected rows...
96
-        $schema = file(dirname(dirname(__FILE__)) . "/schema/schema.sql");
96
+        $schema = file(dirname(dirname(__FILE__))."/schema/schema.sql");
97 97
         $this->profile_option_ct = 0;
98 98
         $passedTheWindmill = FALSE;
99 99
         foreach ($schema as $schemaLine) {
@@ -120,7 +120,7 @@  discard block
 block discarded – undo
120 120
     {
121 121
         $this->out[$test] = [];
122 122
         $this->name = $test;
123
-        $m_name = $test . '_test';
123
+        $m_name = $test.'_test';
124 124
         $this->test_result[$test] = 0;
125 125
         if (!method_exists($this, $m_name)) {
126 126
             $this->testReturn(\core\common\Entity::L_ERROR, "Configuration error, no test configured for <strong>$test</strong>.");
@@ -229,9 +229,9 @@  discard block
 block discarded – undo
229 229
     private function php_test()
230 230
     {
231 231
         if (version_compare(phpversion(), $this->php_needversion, '>=')) {
232
-            $this->testReturn(\core\common\Entity::L_OK, "<strong>PHP</strong> is sufficiently recent. You are running " . phpversion() . ".");
232
+            $this->testReturn(\core\common\Entity::L_OK, "<strong>PHP</strong> is sufficiently recent. You are running ".phpversion().".");
233 233
         } else {
234
-            $this->testReturn(\core\common\Entity::L_ERROR, "<strong>PHP</strong> is too old. We need at least $this->php_needversion, but you only have " . phpversion() . ".");
234
+            $this->testReturn(\core\common\Entity::L_ERROR, "<strong>PHP</strong> is too old. We need at least $this->php_needversion, but you only have ".phpversion().".");
235 235
         }
236 236
     }
237 237
 
@@ -248,7 +248,7 @@  discard block
 block discarded – undo
248 248
             $this->testReturn(\core\common\Entity::L_OK, "<strong>cat_base_url</strong> set correctly");
249 249
         } else {
250 250
             $rootFromScript = $m[1] === '' ? '/' : $m[1];
251
-            $this->testReturn(\core\common\Entity::L_ERROR, "<strong>cat_base_url</strong> is set to <strong>" . CONFIG['PATHS']['cat_base_url'] . "</strong> and should be <strong>$rootFromScript</strong>");
251
+            $this->testReturn(\core\common\Entity::L_ERROR, "<strong>cat_base_url</strong> is set to <strong>".CONFIG['PATHS']['cat_base_url']."</strong> and should be <strong>$rootFromScript</strong>");
252 252
         }
253 253
     }
254 254
 
@@ -266,9 +266,9 @@  discard block
 block discarded – undo
266 266
             $SSPconfig = \SimpleSAML\Configuration::getInstance();
267 267
             $sspVersion = explode('.', $SSPconfig->getVersion());
268 268
             if ((int) $sspVersion[0] >= $this->ssp_needversion['major'] && (int) $sspVersion[1] >= $this->ssp_needversion['minor']) {
269
-                $this->testReturn(\core\common\Entity::L_OK, "<strong>simpleSAMLphp</strong> is sufficently recent. You are running " . implode('.', $sspVersion));
269
+                $this->testReturn(\core\common\Entity::L_OK, "<strong>simpleSAMLphp</strong> is sufficently recent. You are running ".implode('.', $sspVersion));
270 270
             } else {
271
-                $this->testReturn(\core\common\Entity::L_ERROR, "<strong>simpleSAMLphp</strong> is too old. We need at least " . implode('.', $this->ssp_needversion));
271
+                $this->testReturn(\core\common\Entity::L_ERROR, "<strong>simpleSAMLphp</strong> is too old. We need at least ".implode('.', $this->ssp_needversion));
272 272
             }
273 273
         }
274 274
     }
@@ -329,8 +329,8 @@  discard block
 block discarded – undo
329 329
      */
330 330
     private function logdir_test()
331 331
     {
332
-        if (fopen(CONFIG['PATHS']['logdir'] . "/debug.log", "a") == FALSE) {
333
-            $this->testReturn(\core\common\Entity::L_WARN, "Log files in <strong>" . CONFIG['PATHS']['logdir'] . "</strong> are not writable!");
332
+        if (fopen(CONFIG['PATHS']['logdir']."/debug.log", "a") == FALSE) {
333
+            $this->testReturn(\core\common\Entity::L_WARN, "Log files in <strong>".CONFIG['PATHS']['logdir']."</strong> are not writable!");
334 334
         } else {
335 335
             $this->testReturn(\core\common\Entity::L_OK, "Log directory is writable.");
336 336
         }
@@ -367,10 +367,10 @@  discard block
 block discarded – undo
367 367
         } else {
368 368
             $classname = 'Imagick';
369 369
         }
370
-        if (class_exists('\\' . $classname)) {
370
+        if (class_exists('\\'.$classname)) {
371 371
             $this->testReturn(\core\common\Entity::L_OK, "PHP extension <strong>$classname</strong> is installed.");
372 372
         } else {
373
-            $this->testReturn(\core\common\Entity::L_ERROR, "PHP extension <strong>$classname</strong> not found! Get it from your distribution or <a href='http://pecl.php.net/get/" . strtolower($classname) . "'>here</a>.");
373
+            $this->testReturn(\core\common\Entity::L_ERROR, "PHP extension <strong>$classname</strong> not found! Get it from your distribution or <a href='http://pecl.php.net/get/".strtolower($classname)."'>here</a>.");
374 374
         }
375 375
 
376 376
         if (function_exists('ImageCreate')) {
@@ -468,15 +468,15 @@  discard block
 block discarded – undo
468 468
         }
469 469
         $output = [];
470 470
         $retval = -100;
471
-        $t = exec($A['exec'] . ' version', $output, $retval);
471
+        $t = exec($A['exec'].' version', $output, $retval);
472 472
         if ($retval != 0 || count($output) != 1) {
473 473
             $this->testReturn(\core\common\Entity::L_ERROR, "<strong>openssl</strong> was not found on your system despite being configured!");
474 474
             return;
475 475
         }
476 476
         if ($A['exec_is'] == "EXPLICIT") {
477
-            $this->testReturn(\core\common\Entity::L_OK, "<strong>" . $output[0] . "</strong> was found and is configured explicitly in your config.");
477
+            $this->testReturn(\core\common\Entity::L_OK, "<strong>".$output[0]."</strong> was found and is configured explicitly in your config.");
478 478
         } else {
479
-            $this->testReturn(\core\common\Entity::L_WARN, "<strong>" . $output[0] . "</strong> was found, but is not configured with an absolute path in your config.");
479
+            $this->testReturn(\core\common\Entity::L_WARN, "<strong>".$output[0]."</strong> was found, but is not configured with an absolute path in your config.");
480 480
         }
481 481
     }
482 482
 
@@ -502,7 +502,7 @@  discard block
 block discarded – undo
502 502
         }
503 503
         $output = [];
504 504
         $retval = -100;
505
-        $t = exec($A['exec'] . ' -VERSION', $output, $retval);
505
+        $t = exec($A['exec'].' -VERSION', $output, $retval);
506 506
         if ($retval != 0 || count($output) != 1) {
507 507
             $this->testReturn(\core\common\Entity::L_ERROR, "<strong>makensis</strong> was not found on your system despite being configured!");
508 508
             return;
@@ -513,7 +513,7 @@  discard block
 block discarded – undo
513 513
             $this->testReturn(\core\common\Entity::L_WARN, "<strong>makensis $t</strong> was found, but is not configured with an absolute path in your config.");
514 514
         }
515 515
         $outputArray = [];
516
-        exec($A['exec'] . ' -HELP', $outputArray);
516
+        exec($A['exec'].' -HELP', $outputArray);
517 517
         $t1 = count(preg_grep('/INPUTCHARSET/', $outputArray));
518 518
         if ($t1 == 1 && CONFIG_CONFASSISTANT['NSIS_VERSION'] == 2) {
519 519
             $this->testReturn(\core\common\Entity::L_ERROR, "Declared NSIS_VERSION does not seem to match the file pointed to by PATHS['makensis']!");
@@ -540,7 +540,7 @@  discard block
 block discarded – undo
540 540
         $NSIS_Module_status = [];
541 541
         foreach ($this->NSIS_Modules as $module) {
542 542
             unset($out);
543
-            exec(CONFIG_CONFASSISTANT['PATHS']['makensis'] . " -V1 '-X!include $module' '-XOutFile $exe' '-XSection X' '-XSectionEnd'", $out, $retval);
543
+            exec(CONFIG_CONFASSISTANT['PATHS']['makensis']." -V1 '-X!include $module' '-XOutFile $exe' '-XSection X' '-XSectionEnd'", $out, $retval);
544 544
             if ($retval > 0) {
545 545
                 $NSIS_Module_status[$module] = 0;
546 546
             } else {
@@ -605,8 +605,8 @@  discard block
 block discarded – undo
605 605
         $locales = shell_exec("locale -a");
606 606
         $allthere = "";
607 607
         foreach (CONFIG['LANGUAGES'] as $onelanguage) {
608
-            if (preg_match("/" . $onelanguage['locale'] . "/", $locales) == 0) {
609
-                $allthere .= $onelanguage['locale'] . " ";
608
+            if (preg_match("/".$onelanguage['locale']."/", $locales) == 0) {
609
+                $allthere .= $onelanguage['locale']." ";
610 610
             }
611 611
         }
612 612
         if ($allthere == "") {
@@ -620,47 +620,47 @@  discard block
 block discarded – undo
620 620
         ["SETTING" => CONFIG['APPEARANCE']['from-mail'],
621 621
             "DEFVALUE" => "[email protected]",
622 622
             "COMPLAINTSTRING" => "APPEARANCE/from-mail ",
623
-            "REQUIRED" => FALSE,],
623
+            "REQUIRED" => FALSE, ],
624 624
         ["SETTING" => CONFIG['APPEARANCE']['support-contact']['url'],
625 625
             "DEFVALUE" => "[email protected]?body=Only%20English%20language%20please!",
626 626
             "COMPLAINTSTRING" => "APPEARANCE/support-contact/url ",
627
-            "REQUIRED" => FALSE,],
627
+            "REQUIRED" => FALSE, ],
628 628
         ["SETTING" => CONFIG['APPEARANCE']['support-contact']['display'],
629 629
             "DEFVALUE" => "[email protected]",
630 630
             "COMPLAINTSTRING" => "APPEARANCE/support-contact/display ",
631
-            "REQUIRED" => FALSE,],
631
+            "REQUIRED" => FALSE, ],
632 632
         ["SETTING" => CONFIG['APPEARANCE']['support-contact']['developer-mail'],
633 633
             "DEFVALUE" => "[email protected]",
634 634
             "COMPLAINTSTRING" => "APPEARANCE/support-contact/mail ",
635
-            "REQUIRED" => FALSE,],
635
+            "REQUIRED" => FALSE, ],
636 636
         ["SETTING" => CONFIG['APPEARANCE']['abuse-mail'],
637 637
             "DEFVALUE" => "[email protected]",
638 638
             "COMPLAINTSTRING" => "APPEARANCE/abuse-mail ",
639
-            "REQUIRED" => FALSE,],
639
+            "REQUIRED" => FALSE, ],
640 640
         ["SETTING" => CONFIG['APPEARANCE']['MOTD'],
641 641
             "DEFVALUE" => "Release Candidate. All bugs to be shot on sight!",
642 642
             "COMPLAINTSTRING" => "APPEARANCE/MOTD ",
643
-            "REQUIRED" => FALSE,],
643
+            "REQUIRED" => FALSE, ],
644 644
         ["SETTING" => CONFIG['APPEARANCE']['webcert_CRLDP'],
645 645
             "DEFVALUE" => ['list', 'of', 'CRL', 'pointers'],
646 646
             "COMPLAINTSTRING" => "APPEARANCE/webcert_CRLDP ",
647
-            "REQUIRED" => TRUE,],
647
+            "REQUIRED" => TRUE, ],
648 648
         ["SETTING" => CONFIG['APPEARANCE']['webcert_OCSP'],
649 649
             "DEFVALUE" => ['list', 'of', 'OCSP', 'pointers'],
650 650
             "COMPLAINTSTRING" => "APPEARANCE/webcert_OCSP ",
651
-            "REQUIRED" => TRUE,],
651
+            "REQUIRED" => TRUE, ],
652 652
         ["SETTING" => CONFIG['DB']['INST']['host'],
653 653
             "DEFVALUE" => "db.host.example",
654 654
             "COMPLAINTSTRING" => "DB/INST ",
655
-            "REQUIRED" => TRUE,],
655
+            "REQUIRED" => TRUE, ],
656 656
         ["SETTING" => CONFIG['DB']['INST']['host'],
657 657
             "DEFVALUE" => "db.host.example",
658 658
             "COMPLAINTSTRING" => "DB/USER ",
659
-            "REQUIRED" => TRUE,],
659
+            "REQUIRED" => TRUE, ],
660 660
         ["SETTING" => CONFIG['DB']['EXTERNAL']['host'],
661 661
             "DEFVALUE" => "customerdb.otherhost.example",
662 662
             "COMPLAINTSTRING" => "DB/EXTERNAL ",
663
-            "REQUIRED" => FALSE,],
663
+            "REQUIRED" => FALSE, ],
664 664
     ];
665 665
 
666 666
     /**
@@ -688,11 +688,11 @@  discard block
 block discarded – undo
688 688
         if (isset(CONFIG_DIAGNOSTICS['RADIUSTESTS']['TLS-clientcerts'])) {
689 689
             foreach (CONFIG_DIAGNOSTICS['RADIUSTESTS']['TLS-clientcerts'] as $cadata) {
690 690
                 foreach ($cadata['certificates'] as $cert_files) {
691
-                    if (file_get_contents(ROOT . "/config/cli-certs/" . $cert_files['public']) === FALSE) {
692
-                        $defaultvalues .= "CERTIFICATE/" . $cert_files['public'] . " ";
691
+                    if (file_get_contents(ROOT."/config/cli-certs/".$cert_files['public']) === FALSE) {
692
+                        $defaultvalues .= "CERTIFICATE/".$cert_files['public']." ";
693 693
                     }
694
-                    if (file_get_contents(ROOT . "/config/cli-certs/" . $cert_files['private']) === FALSE) {
695
-                        $defaultvalues .= "CERTIFICATE/" . $cert_files['private'] . " ";
694
+                    if (file_get_contents(ROOT."/config/cli-certs/".$cert_files['private']) === FALSE) {
695
+                        $defaultvalues .= "CERTIFICATE/".$cert_files['private']." ";
696 696
                     }
697 697
                 }
698 698
             }
@@ -785,14 +785,14 @@  discard block
 block discarded – undo
785 785
         if ($global_no_cache) {
786 786
             foreach ($Devs as $dev => $D) {
787 787
                 if (empty($D['options']['no_cache']) || $D['options']['no_cache'] != 0) {
788
-                    $no_cache_dev .= $dev . " ";
788
+                    $no_cache_dev .= $dev." ";
789 789
                     $no_cache_dev_count++;
790 790
                 }
791 791
             }
792 792
         } else {
793 793
             foreach ($Devs as $dev => $D) {
794 794
                 if (!empty($D['options']['no_cache']) && $D['options']['no_cache'] != 0) {
795
-                    $no_cache_dev .= $dev . " ";
795
+                    $no_cache_dev .= $dev." ";
796 796
                     $no_cache_dev_count++;
797 797
                 }
798 798
             }
@@ -831,13 +831,13 @@  discard block
 block discarded – undo
831 831
         $mail->isHTML(FALSE);
832 832
         $mail->CharSet = 'UTF-8';
833 833
         $mail->From = CONFIG['APPEARANCE']['from-mail'];
834
-        $mail->FromName = CONFIG['APPEARANCE']['productname'] . " Invitation System";
834
+        $mail->FromName = CONFIG['APPEARANCE']['productname']." Invitation System";
835 835
         $mail->addAddress(CONFIG['APPEARANCE']['abuse-mail']);
836 836
         $mail->Subject = "testing CAT configuration mail";
837 837
         $mail->Body = "Testing CAT mailing\n";
838 838
         $sent = $mail->send();
839 839
         if ($sent) {
840
-            $this->testReturn(\core\common\Entity::L_OK, "mailer settings appear to be working, check " . CONFIG['APPEARANCE']['abuse-mail'] . " mailbox if the message was receiced.");
840
+            $this->testReturn(\core\common\Entity::L_OK, "mailer settings appear to be working, check ".CONFIG['APPEARANCE']['abuse-mail']." mailbox if the message was receiced.");
841 841
         } else {
842 842
             $this->testReturn(\core\common\Entity::L_ERROR, "mailer settings failed, check the Config::MAILSETTINGS");
843 843
         }
Please login to merge, or discard this patch.
core/common/Entity.php 1 patch
Spacing   +15 added lines, -15 removed lines patch added patch discarded remove patch
@@ -94,7 +94,7 @@  discard block
 block discarded – undo
94 94
      */
95 95
     public function __construct() {
96 96
         $this->loggerInstance = new Logging();
97
-        $this->loggerInstance->debug(3, "--- BEGIN constructing class " . get_class($this) . " .\n");
97
+        $this->loggerInstance->debug(3, "--- BEGIN constructing class ".get_class($this)." .\n");
98 98
         $this->languageInstance = new Language();
99 99
         Entity::intoThePotatoes("core");
100 100
         // some config elements are displayable. We need some dummies to 
@@ -106,7 +106,7 @@  discard block
 block discarded – undo
106 106
         $dummy_inst2 = _("organisation");
107 107
         $dummy_inst3 = _("Identity Provider");
108 108
         // and do something useless with the strings so that there's no "unused" complaint
109
-        if (strlen($dummy_NRO . $dummy_inst1 . $dummy_inst2 . $dummy_inst3) < 0) {
109
+        if (strlen($dummy_NRO.$dummy_inst1.$dummy_inst2.$dummy_inst3) < 0) {
110 110
             throw new \Exception("Strings are usually not shorter than 0 characters. We've encountered a string blackhole.");
111 111
         }
112 112
         Entity::$nomenclature_fed = _(CONFIG_CONFASSISTANT['CONSORTIUM']['nomenclature_federation']);
@@ -121,7 +121,7 @@  discard block
 block discarded – undo
121 121
      * Logs the end of lifetime of the entity to the debug log on level 5.
122 122
      */
123 123
     public function __destruct() {
124
-        (new Logging())->debug(5, "--- KILL Destructing class " . get_class($this) . " .\n");
124
+        (new Logging())->debug(5, "--- KILL Destructing class ".get_class($this)." .\n");
125 125
     }
126 126
 
127 127
     /**
@@ -151,7 +151,7 @@  discard block
 block discarded – undo
151 151
      */
152 152
     public function createTemporaryDirectory($purpose = 'installer', $failIsFatal = 1) {
153 153
         $loggerInstance = new Logging();
154
-        $name = md5(time() . rand());
154
+        $name = md5(time().rand());
155 155
         $path = ROOT;
156 156
         switch ($purpose) {
157 157
             case 'silverbullet':
@@ -169,7 +169,7 @@  discard block
 block discarded – undo
169 169
             default:
170 170
                 throw new Exception("unable to create temporary directory due to unknown purpose: $purpose\n");
171 171
         }
172
-        $tmpDir = $path . '/' . $name;
172
+        $tmpDir = $path.'/'.$name;
173 173
         $loggerInstance->debug(4, "temp dir: $purpose : $tmpDir\n");
174 174
         if (!mkdir($tmpDir, 0700, true)) {
175 175
             if ($failIsFatal) {
@@ -189,7 +189,7 @@  discard block
 block discarded – undo
189 189
      * @return void
190 190
      */
191 191
     public static function rrmdir($dir) {
192
-        foreach (glob($dir . '/*') as $file) {
192
+        foreach (glob($dir.'/*') as $file) {
193 193
             if (is_dir($file)) {
194 194
                 Entity::rrmdir($file);
195 195
             } else {
@@ -214,12 +214,12 @@  discard block
 block discarded – undo
214 214
         }
215 215
         // these substr() are guaranteed to yield actual string data, as the
216 216
         // base string is an MD5 hash - has sufficient length
217
-        $uuid = /** @scrutinizer ignore-type */ substr($chars, 0, 8) . '-';
218
-        $uuid .= /** @scrutinizer ignore-type */ substr($chars, 8, 4) . '-';
219
-        $uuid .= /** @scrutinizer ignore-type */ substr($chars, 12, 4) . '-';
220
-        $uuid .= /** @scrutinizer ignore-type */ substr($chars, 16, 4) . '-';
217
+        $uuid = /** @scrutinizer ignore-type */ substr($chars, 0, 8).'-';
218
+        $uuid .= /** @scrutinizer ignore-type */ substr($chars, 8, 4).'-';
219
+        $uuid .= /** @scrutinizer ignore-type */ substr($chars, 12, 4).'-';
220
+        $uuid .= /** @scrutinizer ignore-type */ substr($chars, 16, 4).'-';
221 221
         $uuid .= /** @scrutinizer ignore-type */ substr($chars, 20, 12);
222
-        return $prefix . $uuid;
222
+        return $prefix.$uuid;
223 223
     }
224 224
 
225 225
     /**
@@ -258,7 +258,7 @@  discard block
 block discarded – undo
258 258
         for ($i = count($trace); $i--; $i > 0) {
259 259
             if (isset($trace[$i - 1]['class']) && preg_match('/Entity/', $trace[$i - 1]['class'])) {
260 260
                 if ($showTrace) {
261
-                    echo "FOUND caller: ".print_r($trace[$i],true). " - class is ".$trace[$i]['class'];
261
+                    echo "FOUND caller: ".print_r($trace[$i], true)." - class is ".$trace[$i]['class'];
262 262
                 }
263 263
                 $caller = $trace[$i];
264 264
                 break;
@@ -269,7 +269,7 @@  discard block
 block discarded – undo
269 269
         $myName = $caller['class'] ?? substr($caller['file'], strlen(ROOT));
270 270
         if ($showTrace === TRUE) {   
271 271
             echo "<pre>".print_r($trace, true)."</pre>";
272
-            echo "CLASS = " . $myName ."<br/>";
272
+            echo "CLASS = ".$myName."<br/>";
273 273
         }
274 274
         if (preg_match("/diag/", $myName) == 1) {
275 275
             $ret = "diagnostics";
@@ -302,10 +302,10 @@  discard block
 block discarded – undo
302 302
         if ($catalogue === NULL) {
303 303
             $theCatalogue = Entity::determineOwnCatalogue($trace);
304 304
             textdomain($theCatalogue);
305
-            bindtextdomain($theCatalogue, ROOT . "/translation/");
305
+            bindtextdomain($theCatalogue, ROOT."/translation/");
306 306
         } else {
307 307
             textdomain($catalogue);
308
-            bindtextdomain($catalogue, ROOT . "/translation/");
308
+            bindtextdomain($catalogue, ROOT."/translation/");
309 309
         }
310 310
     }
311 311
 
Please login to merge, or discard this patch.
core/CertificationAuthorityEduPkiServer.php 1 patch
Spacing   +37 added lines, -37 removed lines patch added patch discarded remove patch
@@ -17,9 +17,9 @@  discard block
 block discarded – undo
17 17
 class CertificationAuthorityEduPkiServer extends EntityWithDBProperties implements CertificationAuthorityInterface
18 18
 {
19 19
 
20
-    private const LOCATION_RA_CERT = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem";
21
-    private const LOCATION_RA_KEY = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey";
22
-    private const LOCATION_WEBROOT = ROOT . "/config/SilverbulletClientCerts/eduPKI-webserver-root.pem";
20
+    private const LOCATION_RA_CERT = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem";
21
+    private const LOCATION_RA_KEY = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey";
22
+    private const LOCATION_WEBROOT = ROOT."/config/SilverbulletClientCerts/eduPKI-webserver-root.pem";
23 23
     private const EDUPKI_RA_ID = 700;
24 24
     private const EDUPKI_CERT_PROFILE = "Radius Server SOAP";
25 25
     private const EDUPKI_RA_PKEY_PASSPHRASE = "...";
@@ -35,13 +35,13 @@  discard block
 block discarded – undo
35 35
         parent::__construct();
36 36
 
37 37
         if (stat(CertificationAuthorityEduPkiServer::LOCATION_RA_CERT) === FALSE) {
38
-            throw new Exception("RA operator PEM file not found: " . CertificationAuthorityEduPkiServer::LOCATION_RA_CERT);
38
+            throw new Exception("RA operator PEM file not found: ".CertificationAuthorityEduPkiServer::LOCATION_RA_CERT);
39 39
         }
40 40
         if (stat(CertificationAuthorityEduPkiServer::LOCATION_RA_KEY) === FALSE) {
41
-            throw new Exception("RA operator private key file not found: " . CertificationAuthorityEduPkiServer::LOCATION_RA_KEY);
41
+            throw new Exception("RA operator private key file not found: ".CertificationAuthorityEduPkiServer::LOCATION_RA_KEY);
42 42
         }
43 43
         if (stat(CertificationAuthorityEduPkiServer::LOCATION_WEBROOT) === FALSE) {
44
-            throw new Exception("CA website root CA file not found: " . CertificationAuthorityEduPkiServer::LOCATION_WEBROOT);
44
+            throw new Exception("CA website root CA file not found: ".CertificationAuthorityEduPkiServer::LOCATION_WEBROOT);
45 45
         }
46 46
     }
47 47
 
@@ -91,19 +91,19 @@  discard block
 block discarded – undo
91 91
         // initialise connection to eduPKI CA / eduroam RA and send the request to them
92 92
         try {
93 93
             $altArray = [# Array mit den Subject Alternative Names
94
-                "email:" . $csr["USERMAIL"]
94
+                "email:".$csr["USERMAIL"]
95 95
             ];
96 96
             $soapPub = $this->initEduPKISoapSession("PUBLIC");
97 97
             $this->loggerInstance->debug(5, "FIRST ACTUAL SOAP REQUEST (Public, newRequest)!\n");
98
-            $this->loggerInstance->debug(5, "PARAM_1: " . CertificationAuthorityEduPkiServer::EDUPKI_RA_ID . "\n");
99
-            $this->loggerInstance->debug(5, "PARAM_2: " . $csr["CSR"] . "\n");
98
+            $this->loggerInstance->debug(5, "PARAM_1: ".CertificationAuthorityEduPkiServer::EDUPKI_RA_ID."\n");
99
+            $this->loggerInstance->debug(5, "PARAM_2: ".$csr["CSR"]."\n");
100 100
             $this->loggerInstance->debug(5, "PARAM_3: ");
101 101
             $this->loggerInstance->debug(5, $altArray);
102
-            $this->loggerInstance->debug(5, "PARAM_4: " . CertificationAuthorityEduPkiServer::EDUPKI_CERT_PROFILE . "\n");
103
-            $this->loggerInstance->debug(5, "PARAM_5: " . sha1("notused") . "\n");
104
-            $this->loggerInstance->debug(5, "PARAM_6: " . $csr["USERNAME"] . "\n");
105
-            $this->loggerInstance->debug(5, "PARAM_7: " . $csr["USERMAIL"] . "\n");
106
-            $this->loggerInstance->debug(5, "PARAM_8: " . ProfileSilverbullet::PRODUCTNAME . "\n");
102
+            $this->loggerInstance->debug(5, "PARAM_4: ".CertificationAuthorityEduPkiServer::EDUPKI_CERT_PROFILE."\n");
103
+            $this->loggerInstance->debug(5, "PARAM_5: ".sha1("notused")."\n");
104
+            $this->loggerInstance->debug(5, "PARAM_6: ".$csr["USERNAME"]."\n");
105
+            $this->loggerInstance->debug(5, "PARAM_7: ".$csr["USERMAIL"]."\n");
106
+            $this->loggerInstance->debug(5, "PARAM_8: ".ProfileSilverbullet::PRODUCTNAME."\n");
107 107
             $this->loggerInstance->debug(5, "PARAM_9: false\n");
108 108
             $soapNewRequest = $soapPub->newRequest(
109 109
                     CertificationAuthorityEduPkiServer::EDUPKI_RA_ID, # RA-ID
@@ -125,11 +125,11 @@  discard block
 block discarded – undo
125 125
         } catch (Exception $e) {
126 126
             // PHP 7.1 can do this much better
127 127
             if (is_soap_fault($e)) {
128
-                throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}:  {
128
+                throw new Exception("Error when sending SOAP request: "."{$e->faultcode}:  {
129 129
                     $e->faultstring
130 130
                 }\n");
131 131
             }
132
-            throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage());
132
+            throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage());
133 133
         }
134 134
         try {
135 135
             $soap = $this->initEduPKISoapSession("RA");
@@ -163,7 +163,7 @@  discard block
 block discarded – undo
163 163
             // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file
164 164
             // rather than just using the string. Grr.
165 165
             $tempdir = \core\common\Entity::createTemporaryDirectory("test");
166
-            file_put_contents($tempdir['dir'] . "/content.txt", $soapCleartext);
166
+            file_put_contents($tempdir['dir']."/content.txt", $soapCleartext);
167 167
             // retrieve our RA cert from filesystem                    
168 168
             // the RA certificates are not needed right now because we
169 169
             // have resorted to S/MIME signatures with openssl command-line
@@ -175,7 +175,7 @@  discard block
 block discarded – undo
175 175
             // sign the data, using cmdline because openssl_pkcs7_sign produces strange results
176 176
             // -binary didn't help, nor switch -md to sha1 sha256 or sha512
177 177
             $this->loggerInstance->debug(5, "Actual content to be signed is this:\n  $soapCleartext\n");
178
-            $execCmd = CONFIG['PATHS']['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem";
178
+            $execCmd = CONFIG['PATHS']['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem";
179 179
             $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline:   $execCmd\n");
180 180
             $output = [];
181 181
             $return = 999;
@@ -184,21 +184,21 @@  discard block
 block discarded – undo
184 184
                 throw new Exception("Non-zero return value from openssl smime!");
185 185
             }
186 186
             // and get the signature blob back from the filesystem
187
-            $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt"));
187
+            $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt"));
188 188
             $this->loggerInstance->debug(5, "Request for server approveRequest has parameters:\n");
189
-            $this->loggerInstance->debug(5, $soapReqnum . "\n");
190
-            $this->loggerInstance->debug(5, $soapCleartext . "\n"); // PHP magically encodes this as base64 while sending!
191
-            $this->loggerInstance->debug(5, $detachedSig . "\n");
189
+            $this->loggerInstance->debug(5, $soapReqnum."\n");
190
+            $this->loggerInstance->debug(5, $soapCleartext."\n"); // PHP magically encodes this as base64 while sending!
191
+            $this->loggerInstance->debug(5, $detachedSig."\n");
192 192
             $soapIssueCert = $soap->approveRequest($soapReqnum, $soapCleartext, $detachedSig);
193
-            $this->loggerInstance->debug(5, "approveRequest Request was: \n" . $soap->__getLastRequest());
194
-            $this->loggerInstance->debug(5, "approveRequest Response was: \n" . $soap->__getLastResponse());
193
+            $this->loggerInstance->debug(5, "approveRequest Request was: \n".$soap->__getLastRequest());
194
+            $this->loggerInstance->debug(5, "approveRequest Response was: \n".$soap->__getLastResponse());
195 195
             if ($soapIssueCert === FALSE) {
196 196
                 throw new Exception("The locally approved request was NOT processed by the CA.");
197 197
             }
198 198
         } catch (SoapFault $e) {
199
-            throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
199
+            throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
200 200
         } catch (Exception $e) {
201
-            throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage());
201
+            throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage());
202 202
         }
203 203
         return $soapReqnum;
204 204
     }
@@ -248,9 +248,9 @@  discard block
 block discarded – undo
248 248
                 throw new Exception("CAInfo has no root certificate for us!");
249 249
             }
250 250
         } catch (SoapFault $e) {
251
-            throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
251
+            throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
252 252
         } catch (Exception $e) {
253
-            throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage());
253
+            throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage());
254 254
         }
255 255
         return [
256 256
             "CERT" => openssl_x509_read($parsedCert['pem']),
@@ -283,12 +283,12 @@  discard block
 block discarded – undo
283 283
             // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file
284 284
             // rather than just using the string. Grr.
285 285
             $tempdir = \core\common\Entity::createTemporaryDirectory("test");
286
-            file_put_contents($tempdir['dir'] . "/content.txt", $soapRawRevRequest);
286
+            file_put_contents($tempdir['dir']."/content.txt", $soapRawRevRequest);
287 287
             // retrieve our RA cert from filesystem
288 288
             // sign the data, using cmdline because openssl_pkcs7_sign produces strange results
289 289
             // -binary didn't help, nor switch -md to sha1 sha256 or sha512
290 290
             $this->loggerInstance->debug(5, "Actual content to be signed is this:\n$soapRawRevRequest\n");
291
-            $execCmd = CONFIG['PATHS']['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPkiServer::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPkiServer::LOCATION_RA_CERT;
291
+            $execCmd = CONFIG['PATHS']['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPkiServer::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPkiServer::LOCATION_RA_CERT;
292 292
             $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n");
293 293
             $output = [];
294 294
             $return = 999;
@@ -297,7 +297,7 @@  discard block
 block discarded – undo
297 297
                 throw new Exception("Non-zero return value from openssl smime!");
298 298
             }
299 299
             // and get the signature blob back from the filesystem
300
-            $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt"));
300
+            $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt"));
301 301
             $soapIssueRev = $soap->approveRevocationRequest($soapRevocationSerial, $soapRawRevRequest, $detachedSig);
302 302
             if ($soapIssueRev === FALSE) {
303 303
                 throw new Exception("The locally approved revocation request was NOT processed by the CA.");
@@ -305,9 +305,9 @@  discard block
 block discarded – undo
305 305
         } catch (Exception $e) {
306 306
             // PHP 7.1 can do this much better
307 307
             if (is_soap_fault($e)) {
308
-                throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: {$e->faultstring}\n");
308
+                throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: {$e->faultstring}\n");
309 309
             }
310
-            throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage());
310
+            throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage());
311 311
         }
312 312
     }
313 313
 
@@ -407,9 +407,9 @@  discard block
 block discarded – undo
407 407
      */
408 408
     public function soapToXmlInteger($x)
409 409
     {
410
-        return '<' . $x[0] . '>'
410
+        return '<'.$x[0].'>'
411 411
                 . htmlentities($x[1], ENT_NOQUOTES | ENT_XML1)
412
-                . '</' . $x[0] . '>';
412
+                . '</'.$x[0].'>';
413 413
     }
414 414
 
415 415
     /**
@@ -428,9 +428,9 @@  discard block
 block discarded – undo
428 428
         // dump private key into directory
429 429
         $outstring = "";
430 430
         openssl_pkey_export($privateKey, $outstring);
431
-        file_put_contents($tempdir . "/pkey.pem", $outstring);
431
+        file_put_contents($tempdir."/pkey.pem", $outstring);
432 432
         // PHP can only do one DC in the Subject. But we need three.
433
-        $execCmd = CONFIG['PATHS']['openssl'] . " req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$fed/CN=$username/emailAddress=$username";
433
+        $execCmd = CONFIG['PATHS']['openssl']." req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$fed/CN=$username/emailAddress=$username";
434 434
         $this->loggerInstance->debug(2, "Calling openssl req with following cmdline: $execCmd\n");
435 435
         $output = [];
436 436
         $return = 999;
Please login to merge, or discard this patch.
web/admin/overview_certificates.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -26,7 +26,7 @@  discard block
 block discarded – undo
26 26
  */
27 27
 ?>
28 28
 <?php
29
-require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php";
29
+require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php";
30 30
 
31 31
 $auth = new \web\lib\admin\Authentication();
32 32
 $deco = new \web\lib\admin\PageDecoration();
@@ -81,7 +81,7 @@  discard block
 block discarded – undo
81 81
         foreach ($theFed->listTlsCertificates() as $oneCert) { // fetch list a second time, in case we got a cert
82 82
             $status = $oneCert['STATUS'];
83 83
             if ($status == "ISSUED") {
84
-                $status = "<span onclick='alert(\"".str_replace("\n","\\n",$oneCert['CERT'])."\");'>$status</span>";
84
+                $status = "<span onclick='alert(\"".str_replace("\n", "\\n", $oneCert['CERT'])."\");'>$status</span>";
85 85
             }
86 86
             echo "<tr><td>".$oneCert['REQSERIAL']."</td><td>".$oneCert['DN']."</td><td>".$status."</td><td>".$oneCert['EXPIRY']."</td></tr>";
87 87
         }
Please login to merge, or discard this patch.
web/admin/action_req_certificate.php 1 patch
Spacing   +17 added lines, -17 removed lines patch added patch discarded remove patch
@@ -26,7 +26,7 @@  discard block
 block discarded – undo
26 26
  */
27 27
 ?>
28 28
 <?php
29
-require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php";
29
+require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php";
30 30
 
31 31
 $auth = new \web\lib\admin\Authentication();
32 32
 $deco = new \web\lib\admin\PageDecoration();
@@ -72,7 +72,7 @@  discard block
 block discarded – undo
72 72
     // also send user back to the overview page
73 73
     if (isset($_POST['requestcert']) && $_POST['requestcert'] == \web\lib\common\FormElements::BUTTON_SAVE) {
74 74
         // basic sanity checks before we hand this over to openssl
75
-        $sanitisedCsr = $validator->string($_POST['CSR'] ?? "" , TRUE);
75
+        $sanitisedCsr = $validator->string($_POST['CSR'] ?? "", TRUE);
76 76
         if (openssl_csr_get_public_key($sanitisedCsr) === FALSE) {
77 77
             throw new Exception("Sorry: Unable to parse the submitted public key - no public key inside?");
78 78
         }
@@ -86,7 +86,7 @@  discard block
 block discarded – undo
86 86
                 $fed = $validator->Federation($_POST['NRO-list']);
87 87
                 $country = strtoupper($fed->tld);
88 88
                 $DN[] = "C=$country";
89
-                $DN[] = "O=NRO of " . $cat->knownFederations[strtoupper($fed->tld)];
89
+                $DN[] = "O=NRO of ".$cat->knownFederations[strtoupper($fed->tld)];
90 90
                 $DN[] = "CN=comes.from.eduroam.db";
91 91
                 $policies[] = "eduroam IdP";
92 92
                 $policies[] = "eduroam SP";
@@ -104,11 +104,11 @@  discard block
 block discarded – undo
104 104
             default:
105 105
                 throw new Exception("Sorry: Unknown level of issuance requested.");
106 106
         }
107
-        echo "<p>" . _("Requesting a certificate with the following properties");
107
+        echo "<p>"._("Requesting a certificate with the following properties");
108 108
         echo "<ul>";
109
-        echo "<li>" . _("Policy OIDs: ") . implode(", ", $policies) . "</li>";
110
-        echo "<li>" . _("Distinguished Name: ") . implode(", ", $DN) . "</li>";
111
-        echo "<li>" . _("Requester Contact Details: will come from eduroam DB (using stub 'Someone, &lt;[email protected]&gt;').") . "</li>";
109
+        echo "<li>"._("Policy OIDs: ").implode(", ", $policies)."</li>";
110
+        echo "<li>"._("Distinguished Name: ").implode(", ", $DN)."</li>";
111
+        echo "<li>"._("Requester Contact Details: will come from eduroam DB (using stub 'Someone, &lt;[email protected]&gt;').")."</li>";
112 112
         echo "</ul></p>";
113 113
         /* $ossl = proc_open("openssl req -subj '/".implode("/", $DN)."'", [ 0 => ["pipe", "r"], 1 => ["pipe", "w"], 2 => [ "file", "/tmp/voodoo-error", "a"] ], $pipes);
114 114
         if (is_resource($ossl)) {
@@ -121,13 +121,13 @@  discard block
 block discarded – undo
121 121
             throw new Exception("Calling openssl in a fancy way did not work.");
122 122
         }
123 123
         echo "<p>"._("This is the new CSR (return code was $retval)")."<pre>$newCsr</pre></p>"; */
124
-        $newCsrWithMeta = ["CSR" => /* $newCsr */ $_POST['CSR'], "USERNAME" => "Someone", "USERMAIL" => "[email protected]", "SUBJECT" => implode(",", $DN) ,"FED" => $country];
124
+        $newCsrWithMeta = ["CSR" => /* $newCsr */ $_POST['CSR'], "USERNAME" => "Someone", "USERMAIL" => "[email protected]", "SUBJECT" => implode(",", $DN), "FED" => $country];
125 125
         // our certs can be good for max 5 years
126 126
         $fed->requestCertificate($newCsrWithMeta, 1825);
127 127
         echo "<p>"._("The certificate was requested.")."</p>";
128 128
         ?>
129 129
         <form action="overview_certificates.php" method="GET">
130
-            <button type="submit"><?php echo _("Back to Certificate Overview");?></button>
130
+            <button type="submit"><?php echo _("Back to Certificate Overview"); ?></button>
131 131
         </form>
132 132
     <?php
133 133
     echo $deco->footer();
@@ -136,14 +136,14 @@  discard block
 block discarded – undo
136 136
 
137 137
     // if we did not get a SAVE button, display UI for a fresh request instead
138 138
     ?>
139
-    <h2><?php echo _("1. Certificate Holder Details");?></h2>
139
+    <h2><?php echo _("1. Certificate Holder Details"); ?></h2>
140 140
     <form action="action_req_certificate.php" method="POST">
141 141
         <input type="radio" name="LEVEL" id="NRO" value="NRO" checked><?php printf(_("Certificate for %s role"), $uiElements->nomenclatureFed); ?></input>
142 142
         <?php
143 143
         if (count($feds) == 1) {
144 144
             $fedObject = new \core\Federation($feds[0]['value']);
145
-            echo " <strong>" . $cat->knownFederations[$fedObject->tld] . "</strong>";
146
-            echo '<input type="hidden" name="NRO-list" id="NRO-list" value="' . $fedObject->tld . '"/>';
145
+            echo " <strong>".$cat->knownFederations[$fedObject->tld]."</strong>";
146
+            echo '<input type="hidden" name="NRO-list" id="NRO-list" value="'.$fedObject->tld.'"/>';
147 147
         } else {
148 148
             ?>
149 149
             <select name="NRO-list" id="NRO-list">
@@ -151,7 +151,7 @@  discard block
 block discarded – undo
151 151
                 <?php
152 152
                 foreach ($feds as $oneFed) {
153 153
                     $fedObject = new \core\Federation($oneFed['value']);
154
-                    echo '<option value="' . strtoupper($fedObject->tld) . '">' . $cat->knownFederations[$fedObject->tld] . "</option>";
154
+                    echo '<option value="'.strtoupper($fedObject->tld).'">'.$cat->knownFederations[$fedObject->tld]."</option>";
155 155
                 }
156 156
                 ?>
157 157
             </select>
@@ -171,15 +171,15 @@  discard block
 block discarded – undo
171 171
                 }
172 172
             }
173 173
             foreach ($allIdPs as $id => $name) {
174
-                echo '<option value="' . $id . '">' . $name . "</option>";
174
+                echo '<option value="'.$id.'">'.$name."</option>";
175 175
             }
176 176
             ?>
177 177
         </select>
178 178
         <br/>
179
-        <h2><?php echo _("2. CSR generation");?></h2>
180
-        <p><?php echo _("One way to generate an acceptable certificate request is via this openssl one-liner:");?></p>
179
+        <h2><?php echo _("2. CSR generation"); ?></h2>
180
+        <p><?php echo _("One way to generate an acceptable certificate request is via this openssl one-liner:"); ?></p>
181 181
         <p>openssl req -new -newkey rsa:4096 -out test.csr -keyout test.key -subj /DC=test/DC=test/DC=eduroam/C=XY/O=WillBeReplaced/CN=will.be.replaced</p>
182
-        <h2><?php echo _("3. Submission");?></h2>
182
+        <h2><?php echo _("3. Submission"); ?></h2>
183 183
         <?php echo _("Please paste your CSR here:"); ?><br/><textarea name="CSR" id="CSR" rows="20" cols="85"/></textarea><br/>
184 184
     <button type="submit" name="requestcert" id="requestcert" value="<?php echo \web\lib\common\FormElements::BUTTON_SAVE ?>"><?php echo _("Send request"); ?></button>
185 185
 </form>
Please login to merge, or discard this patch.
core/IdP.php 1 patch
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -114,7 +114,7 @@  discard block
 block discarded – undo
114 114
      */
115 115
     public function listProfiles(bool $activeOnly = FALSE)
116 116
     {
117
-        $query = "SELECT profile_id FROM profile WHERE inst_id = $this->identifier" . ($activeOnly ? " AND showtime = 1" : "");
117
+        $query = "SELECT profile_id FROM profile WHERE inst_id = $this->identifier".($activeOnly ? " AND showtime = 1" : "");
118 118
         $allProfiles = $this->databaseHandle->exec($query);
119 119
         $returnarray = [];
120 120
         // SELECT -> resource, not boolean
@@ -124,7 +124,7 @@  discard block
 block discarded – undo
124 124
             $returnarray[] = $oneProfile;
125 125
         }
126 126
 
127
-        $this->loggerInstance->debug(4, "listProfiles: " . print_r($returnarray, true));
127
+        $this->loggerInstance->debug(4, "listProfiles: ".print_r($returnarray, true));
128 128
         return $returnarray;
129 129
     }
130 130
 
@@ -229,7 +229,7 @@  discard block
 block discarded – undo
229 229
                 case AbstractProfile::PROFILETYPE_SILVERBULLET:
230 230
                     $theProfile = new ProfileSilverbullet($identifier, $this);
231 231
                     $theProfile->addSupportedEapMethod(new \core\common\EAP(\core\common\EAP::EAPTYPE_SILVERBULLET), 1);
232
-                    $theProfile->setRealm($this->identifier . "-" . $theProfile->identifier . "." . strtolower($this->federation) . strtolower(CONFIG_CONFASSISTANT['SILVERBULLET']['realm_suffix']));
232
+                    $theProfile->setRealm($this->identifier."-".$theProfile->identifier.".".strtolower($this->federation).strtolower(CONFIG_CONFASSISTANT['SILVERBULLET']['realm_suffix']));
233 233
                     return $theProfile;
234 234
                 default:
235 235
                     throw new Exception("This type of profile is unknown and can not be added.");
@@ -350,7 +350,7 @@  discard block
 block discarded – undo
350 350
     public function getExternalDBId()
351 351
     {
352 352
         if (CONFIG_CONFASSISTANT['CONSORTIUM']['name'] == "eduroam" && isset(CONFIG_CONFASSISTANT['CONSORTIUM']['deployment-voodoo']) && CONFIG_CONFASSISTANT['CONSORTIUM']['deployment-voodoo'] == "Operations Team") { // SW: APPROVED
353
-            $idQuery = $this->databaseHandle->exec("SELECT external_db_id FROM institution WHERE inst_id = $this->identifier AND external_db_syncstate = " . self::EXTERNAL_DB_SYNCSTATE_SYNCED);
353
+            $idQuery = $this->databaseHandle->exec("SELECT external_db_id FROM institution WHERE inst_id = $this->identifier AND external_db_syncstate = ".self::EXTERNAL_DB_SYNCSTATE_SYNCED);
354 354
             // SELECT -> it's a resource, not a boolean
355 355
             if (mysqli_num_rows(/** @scrutinizer ignore-type */ $idQuery) == 0) {
356 356
                 return FALSE;
Please login to merge, or discard this patch.
web/admin/edit_idp_result.php 1 patch
Spacing   +22 added lines, -22 removed lines patch added patch discarded remove patch
@@ -20,7 +20,7 @@  discard block
 block discarded – undo
20 20
  *          <base_url>/copyright.php after deploying the software
21 21
  */
22 22
 
23
-require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php";
23
+require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php";
24 24
 
25 25
 $auth = new \web\lib\admin\Authentication();
26 26
 $loggerInstance = new \core\common\Logging();
@@ -38,15 +38,15 @@  discard block
 block discarded – undo
38 38
 $myInstOriginal = $validator->IdP($_GET['inst_id'], $_SESSION['user']);
39 39
 $instId = $myInstOriginal->identifier;
40 40
 
41
-$hello = _("To whom it may concern,") . "\n\n";
42
-$bye = _("This mail is merely a cross-check because these changes can be security-relevant. If the change was expected, you do not need to take any action.") . "\n\n" .
43
-        _("Greetings, ") . "\n\n" .
41
+$hello = _("To whom it may concern,")."\n\n";
42
+$bye = _("This mail is merely a cross-check because these changes can be security-relevant. If the change was expected, you do not need to take any action.")."\n\n".
43
+        _("Greetings, ")."\n\n".
44 44
         CONFIG['APPEARANCE']['productname_long'];
45 45
 
46 46
 switch ($_POST['submitbutton']) {
47 47
     case web\lib\common\FormElements::BUTTON_DELETE:
48 48
         $myInstOriginal->destroy();
49
-        $loggerInstance->writeAudit($_SESSION['user'], "DEL", "IdP " . $instId);
49
+        $loggerInstance->writeAudit($_SESSION['user'], "DEL", "IdP ".$instId);
50 50
         header("Location: overview_user.php");
51 51
         exit;
52 52
     case web\lib\common\FormElements::BUTTON_FLUSH_AND_RESTART:
@@ -56,9 +56,9 @@  discard block
 block discarded – undo
56 56
         }
57 57
         // flush all IdP attributes and send user to creation wizard
58 58
         $myInstOriginal->flushAttributes();
59
-        $loggerInstance->writeAudit($_SESSION['user'], "DEL", "IdP starting over" . $instId);
60
-        $text = $hello .
61
-                sprintf(_("the %s %s / %s / (previously known as) '%s' has deleted all properties and is starting over freshly. This means that its not recognisable by its name any more, and it may assume a different name in the future. You will get another mail if and when the name change happens."), $ui->nomenclatureInst, strtoupper($myInstOriginal->federation), $myInstOriginal->identifier, $myInstOriginal->name) . "\n\n" .
59
+        $loggerInstance->writeAudit($_SESSION['user'], "DEL", "IdP starting over".$instId);
60
+        $text = $hello.
61
+                sprintf(_("the %s %s / %s / (previously known as) '%s' has deleted all properties and is starting over freshly. This means that its not recognisable by its name any more, and it may assume a different name in the future. You will get another mail if and when the name change happens."), $ui->nomenclatureInst, strtoupper($myInstOriginal->federation), $myInstOriginal->identifier, $myInstOriginal->name)."\n\n".
62 62
                 $bye;
63 63
         $fed = new core\Federation($myInstOriginal->federation);
64 64
         foreach ($fed->listFederationAdmins() as $id) {
@@ -77,19 +77,19 @@  discard block
 block discarded – undo
77 77
             exit(0);
78 78
         }
79 79
         $inst_name = $myInstOriginal->name;
80
-        echo "<h1>" . sprintf(_("Submitted attributes for IdP '%s'"), $inst_name) . "</h1>";
80
+        echo "<h1>".sprintf(_("Submitted attributes for IdP '%s'"), $inst_name)."</h1>";
81 81
         echo "<table>";
82 82
         echo $optionParser->processSubmittedFields($myInstOriginal, $_POST, $_FILES);
83 83
         echo "</table>";
84 84
 // delete cached logo, if present
85
-        $dir = ROOT . '/web/downloads/logos/';
86
-        $globResult = glob($dir . $myInstOriginal->identifier . "_*.png");
85
+        $dir = ROOT.'/web/downloads/logos/';
86
+        $globResult = glob($dir.$myInstOriginal->identifier."_*.png");
87 87
         if ($globResult === FALSE) { // we should catch the improbable error condition
88 88
             $globResult = [];
89 89
         }
90 90
         array_map('unlink', $globResult);
91 91
         $loggerInstance->debug(4, "UNLINK from $dir\n");
92
-        $loggerInstance->writeAudit($_SESSION['user'], "MOD", "IdP " . $myInstOriginal->identifier . " - attributes changed");
92
+        $loggerInstance->writeAudit($_SESSION['user'], "MOD", "IdP ".$myInstOriginal->identifier." - attributes changed");
93 93
 
94 94
 // re-instantiate ourselves... profiles need fresh data
95 95
         $myInstReinstantiated = $validator->IdP($_GET['inst_id'], $_SESSION['user']);
@@ -98,10 +98,10 @@  discard block
 block discarded – undo
98 98
         if (count($significantChanges) > 0) {
99 99
             // send a notification/alert mail to someone we know is in charge
100 100
             /// were made to the *Identity Provider* *LU* / integer number of IdP / (previously known as) Name
101
-            $text = $hello . sprintf(_("significant changes were made to the %s %s / %s / (previously known as) '%s'."), $ui->nomenclatureInst, strtoupper($myInstOriginal->federation), $myInstOriginal->identifier, $myInstOriginal->name) . "\n\n";
101
+            $text = $hello.sprintf(_("significant changes were made to the %s %s / %s / (previously known as) '%s'."), $ui->nomenclatureInst, strtoupper($myInstOriginal->federation), $myInstOriginal->identifier, $myInstOriginal->name)."\n\n";
102 102
             if (isset($significantChanges[\core\IdP::INSTNAME_CHANGED])) {
103
-                $text .= sprintf(_("The %s has changed its name. The details are below:"), $ui->nomenclatureInst) . "\n\n";
104
-                $text .= $significantChanges[\core\IdP::INSTNAME_CHANGED] . "\n\n";
103
+                $text .= sprintf(_("The %s has changed its name. The details are below:"), $ui->nomenclatureInst)."\n\n";
104
+                $text .= $significantChanges[\core\IdP::INSTNAME_CHANGED]."\n\n";
105 105
             }
106 106
             $text .= $bye;
107 107
             // (currently, send hard-wired to NRO - future: for linked insts, check eduroam DBv2 and send to registered admins directly)
@@ -117,15 +117,15 @@  discard block
 block discarded – undo
117 117
 
118 118
         if (isset(CONFIG_CONFASSISTANT['CONSORTIUM']['ssid']) && count(CONFIG_CONFASSISTANT['CONSORTIUM']['ssid']) > 0) {
119 119
             foreach (CONFIG_CONFASSISTANT['CONSORTIUM']['ssid'] as $ssidname) {
120
-                $ssids[] = $ssidname . " " . (isset(CONFIG_CONFASSISTANT['CONSORTIUM']['tkipsupport']) && CONFIG_CONFASSISTANT['CONSORTIUM']['tkipsupport'] === TRUE ? _("(WPA2/AES and WPA/TKIP)") : _("(WPA2/AES)") );
120
+                $ssids[] = $ssidname." ".(isset(CONFIG_CONFASSISTANT['CONSORTIUM']['tkipsupport']) && CONFIG_CONFASSISTANT['CONSORTIUM']['tkipsupport'] === TRUE ? _("(WPA2/AES and WPA/TKIP)") : _("(WPA2/AES)"));
121 121
             }
122 122
         }
123 123
 
124 124
         foreach ($myInstReinstantiated->getAttributes("media:SSID_with_legacy") as $ssidname) {
125
-            $ssids[] = $ssidname['value'] . " " . _("(WPA2/AES and WPA/TKIP)");
125
+            $ssids[] = $ssidname['value']." "._("(WPA2/AES and WPA/TKIP)");
126 126
         }
127 127
         foreach ($myInstReinstantiated->getAttributes("media:SSID") as $ssidname) {
128
-            $ssids[] = $ssidname['value'] . " " . _("(WPA2/AES)");
128
+            $ssids[] = $ssidname['value']." "._("(WPA2/AES)");
129 129
         }
130 130
 
131 131
         echo "<table>";
@@ -133,7 +133,7 @@  discard block
 block discarded – undo
133 133
         if (count($ssids) > 0) {
134 134
             $printedlist = "";
135 135
             foreach ($ssids as $names) {
136
-                $printedlist = $printedlist . "$names ";
136
+                $printedlist = $printedlist."$names ";
137 137
             }
138 138
             echo $uiElements->boxOkay(sprintf(_("Your installers will configure the following SSIDs: <strong>%s</strong>"), $printedlist), _("SSIDs configured"));
139 139
         }
@@ -161,7 +161,7 @@  discard block
 block discarded – undo
161 161
                 // did we get an email address? then, show the silverbullet jumpstart button
162 162
                 // otherwise, issue a smartass comment
163 163
                 if (count($myInstReinstantiated->getAttributes("support:email")) > 0) {
164
-                    echo "<form method='post' action='edit_silverbullet.php?inst_id=$myInstReinstantiated->identifier' accept-charset='UTF-8'><button type='submit'>" . sprintf(_("Continue to %s properties"), \core\ProfileSilverbullet::PRODUCTNAME) . "</button></form>";
164
+                    echo "<form method='post' action='edit_silverbullet.php?inst_id=$myInstReinstantiated->identifier' accept-charset='UTF-8'><button type='submit'>".sprintf(_("Continue to %s properties"), \core\ProfileSilverbullet::PRODUCTNAME)."</button></form>";
165 165
                 } else {
166 166
                     echo "<table>";
167 167
                     echo $uiElements->boxError(sprintf(_("You did not submit an e-mail address. This is required for %s. Please go to the %s dashboard and edit your helpdesk settings to include a helpdesk e-mail address."), core\ProfileSilverbullet::PRODUCTNAME, $ui->nomenclatureInst), _("No support e-mail!"));
@@ -169,10 +169,10 @@  discard block
 block discarded – undo
169 169
                 }
170 170
             }
171 171
             if (CONFIG['FUNCTIONALITY_LOCATIONS']['CONFASSISTANT_RADIUS'] == "LOCAL") {
172
-                echo "<br/><form method='post' action='edit_profile.php?inst_id=$myInstReinstantiated->identifier' accept-charset='UTF-8'><button type='submit'>" . _("Continue to RADIUS/EAP profile definition") . "</button></form>";
172
+                echo "<br/><form method='post' action='edit_profile.php?inst_id=$myInstReinstantiated->identifier' accept-charset='UTF-8'><button type='submit'>"._("Continue to RADIUS/EAP profile definition")."</button></form>";
173 173
             }
174 174
         }
175
-        echo "<br/><form method='post' action='overview_idp.php?inst_id=$myInstReinstantiated->identifier' accept-charset='UTF-8'><button type='submit'>" . _("Continue to dashboard") . "</button></form>";
175
+        echo "<br/><form method='post' action='overview_idp.php?inst_id=$myInstReinstantiated->identifier' accept-charset='UTF-8'><button type='submit'>"._("Continue to dashboard")."</button></form>";
176 176
         echo $deco->footer();
177 177
         break;
178 178
     default:
Please login to merge, or discard this patch.
web/diag/radius_tests.php 1 patch
Spacing   +10 added lines, -10 removed lines patch added patch discarded remove patch
@@ -20,7 +20,7 @@  discard block
 block discarded – undo
20 20
  *          <base_url>/copyright.php after deploying the software
21 21
  */
22 22
 
23
-require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php";
23
+require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php";
24 24
 
25 25
 $loggerInstance = new \core\common\Logging();
26 26
 $validator = new \web\lib\common\InputValidation();
@@ -45,7 +45,7 @@  discard block
 block discarded – undo
45 45
 function disp_name($eap)
46 46
 {
47 47
     $displayName = \core\common\EAP::eapDisplayName($eap);
48
-    return $displayName['OUTER'] . ( $displayName['INNER'] != '' ? '-' . $displayName['INNER'] : '');
48
+    return $displayName['OUTER'].($displayName['INNER'] != '' ? '-'.$displayName['INNER'] : '');
49 49
 }
50 50
 
51 51
 if (!isset($_REQUEST['test_type']) || !$_REQUEST['test_type']) {
@@ -68,7 +68,7 @@  discard block
 block discarded – undo
68 68
     $testsuite = new \core\diag\RADIUSTests($check_realm, $my_profile->getRealmCheckOuterUsername(), $my_profile->getEapMethodsinOrderOfPreference(1), $my_profile->getCollapsedAttributes()['eap:server_name'], $my_profile->getCollapsedAttributes()['eap:ca_file']);
69 69
 } else {
70 70
     $my_profile = NULL;
71
-    $testsuite = new \core\diag\RADIUSTests($check_realm, "@" . $check_realm);
71
+    $testsuite = new \core\diag\RADIUSTests($check_realm, "@".$check_realm);
72 72
 }
73 73
 
74 74
 
@@ -158,10 +158,10 @@  discard block
 block discarded – undo
158 158
                             break;
159 159
                         case \core\common\Entity::L_REMARK:
160 160
                         case \core\common\Entity::L_WARN:
161
-                            $message = _("<strong>Test partially successful</strong>: authentication succeded.") . ' ' . $additional_message[$level];
161
+                            $message = _("<strong>Test partially successful</strong>: authentication succeded.").' '.$additional_message[$level];
162 162
                             break;
163 163
                         case \core\common\Entity::L_ERROR:
164
-                            $message = _("<strong>Test FAILED</strong>: authentication succeded.") . ' ' . $additional_message[$level];
164
+                            $message = _("<strong>Test FAILED</strong>: authentication succeded.").' '.$additional_message[$level];
165 165
                             break;
166 166
                     }
167 167
                     break;
@@ -212,7 +212,7 @@  discard block
 block discarded – undo
212 212
             case \core\diag\RADIUSTests::RETVAL_CONVERSATION_REJECT:
213 213
                 $level = $returnarray['result'][$i]['level'];
214 214
                 if ($level > \core\common\Entity::L_OK) {
215
-                    $message = _("<strong>Test partially successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned.") . ' ' . $additional_message[$level];
215
+                    $message = _("<strong>Test partially successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned.").' '.$additional_message[$level];
216 216
                 } else {
217 217
                     $message = _("<strong>Test successful</strong>: a bidirectional RADIUS conversation with multiple round-trips was carried out, and ended in an Access-Reject as planned.");
218 218
                 }
@@ -235,7 +235,7 @@  discard block
 block discarded – undo
235 235
                 $level = \core\common\Entity::L_ERROR;
236 236
                 break;
237 237
         }
238
-        $loggerInstance->debug(4, "SERVER=" . $returnarray['result'][$i]['server'] . "\n");
238
+        $loggerInstance->debug(4, "SERVER=".$returnarray['result'][$i]['server']."\n");
239 239
         $returnarray['result'][$i]['level'] = $level;
240 240
         $returnarray['result'][$i]['message'] = $message;
241 241
         break;
@@ -252,9 +252,9 @@  discard block
 block discarded – undo
252 252
         }
253 253
         // we tried to contact someone, and know how long that took
254 254
         $returnarray['time_millisec'] = sprintf("%d", $rfc6614suite->TLS_CA_checks_result[$host]['time_millisec']);
255
-        $timeDisplay = ' (' . sprintf(_("elapsed time: %d"), $rfc6614suite->TLS_CA_checks_result[$host]['time_millisec']) . '&nbsp;ms)';
255
+        $timeDisplay = ' ('.sprintf(_("elapsed time: %d"), $rfc6614suite->TLS_CA_checks_result[$host]['time_millisec']).'&nbsp;ms)';
256 256
         if (isset($rfc6614suite->TLS_CA_checks_result[$host]['cert_oddity']) && ($rfc6614suite->TLS_CA_checks_result[$host]['cert_oddity'] == \core\diag\RADIUSTests::CERTPROB_UNKNOWN_CA)) {
257
-            $returnarray['message'] = _("<strong>ERROR</strong>: the server presented a certificate which is from an unknown authority!") . $timeDisplay;
257
+            $returnarray['message'] = _("<strong>ERROR</strong>: the server presented a certificate which is from an unknown authority!").$timeDisplay;
258 258
             $returnarray['level'] = \core\common\Entity::L_ERROR;
259 259
             $returnarray['result'] = $testresult;
260 260
             break;
@@ -264,7 +264,7 @@  discard block
 block discarded – undo
264 264
         $returnarray['level'] = \core\common\Entity::L_OK;
265 265
         // override if the connection was with a mismatching server name
266 266
         if (isset($rfc6614suite->TLS_CA_checks_result[$host]['cert_oddity']) && ($rfc6614suite->TLS_CA_checks_result[$host]['cert_oddity'] == \core\diag\RADIUSTests::CERTPROB_DYN_SERVER_NAME_MISMATCH)) {
267
-            $returnarray['message'] = _("<strong>WARNING</strong>: the server name as discovered in the SRV record does not match any name in the server certificate!") . $timeDisplay;
267
+            $returnarray['message'] = _("<strong>WARNING</strong>: the server name as discovered in the SRV record does not match any name in the server certificate!").$timeDisplay;
268 268
             $returnarray['level'] = \core\common\Entity::L_WARN;
269 269
         }
270 270
         switch ($rfc6614suite->TLS_CA_checks_result[$host]['status']) {
Please login to merge, or discard this patch.