@@ -129,7 +129,7 @@ discard block |
||
129 | 129 | $this->test_result = []; |
130 | 130 | $this->test_result['global'] = 0; |
131 | 131 | // parse the schema file to find out the number of expected rows... |
132 | - $schema = file(dirname(dirname(__FILE__)) . "/schema/schema.sql"); |
|
132 | + $schema = file(dirname(dirname(__FILE__))."/schema/schema.sql"); |
|
133 | 133 | $this->profileOptionCount = 0; |
134 | 134 | $passedTheWindmill = FALSE; |
135 | 135 | foreach ($schema as $schemaLine) { |
@@ -156,7 +156,7 @@ discard block |
||
156 | 156 | { |
157 | 157 | $this->out[$test] = []; |
158 | 158 | $this->name = $test; |
159 | - $m_name = 'test' . $test; |
|
159 | + $m_name = 'test'.$test; |
|
160 | 160 | $this->test_result[$test] = 0; |
161 | 161 | if (!method_exists($this, $m_name)) { |
162 | 162 | $this->storeTestResult(\core\common\Entity::L_ERROR, "Configuration error, no test configured for <strong>$test</strong>."); |
@@ -269,9 +269,9 @@ discard block |
||
269 | 269 | private function testPhp() |
270 | 270 | { |
271 | 271 | if (version_compare(phpversion(), $this->needversionPHP, '>=')) { |
272 | - $this->storeTestResult(\core\common\Entity::L_OK, "<strong>PHP</strong> is sufficiently recent. You are running " . phpversion() . "."); |
|
272 | + $this->storeTestResult(\core\common\Entity::L_OK, "<strong>PHP</strong> is sufficiently recent. You are running ".phpversion()."."); |
|
273 | 273 | } else { |
274 | - $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>PHP</strong> is too old. We need at least $this->needversionPHP, but you only have " . phpversion() . "."); |
|
274 | + $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>PHP</strong> is too old. We need at least $this->needversionPHP, but you only have ".phpversion()."."); |
|
275 | 275 | } |
276 | 276 | } |
277 | 277 | |
@@ -284,12 +284,12 @@ discard block |
||
284 | 284 | */ |
285 | 285 | private function runConstantsTest($config) |
286 | 286 | { |
287 | - $templateConfig = file_get_contents(ROOT . "/config/$config-template.php"); |
|
288 | - $newTemplateConfig = preg_replace("/class *$config/", "class $config" . "_template", $templateConfig); |
|
289 | - file_put_contents(ROOT . "/var/tmp/$config-template.php", $newTemplateConfig); |
|
290 | - include(ROOT . "/var/tmp/$config-template.php"); |
|
291 | - unlink(ROOT . "/var/tmp/$config-template.php"); |
|
292 | - $rft = new \ReflectionClass("\config\\$config" . "_template"); |
|
287 | + $templateConfig = file_get_contents(ROOT."/config/$config-template.php"); |
|
288 | + $newTemplateConfig = preg_replace("/class *$config/", "class $config"."_template", $templateConfig); |
|
289 | + file_put_contents(ROOT."/var/tmp/$config-template.php", $newTemplateConfig); |
|
290 | + include(ROOT."/var/tmp/$config-template.php"); |
|
291 | + unlink(ROOT."/var/tmp/$config-template.php"); |
|
292 | + $rft = new \ReflectionClass("\config\\$config"."_template"); |
|
293 | 293 | $templateConstants = $rft->getConstants(); |
294 | 294 | $failResults = []; |
295 | 295 | foreach ($templateConstants as $constant => $value) { |
@@ -306,7 +306,7 @@ discard block |
||
306 | 306 | * Check if all required constants are set |
307 | 307 | */ |
308 | 308 | private function testConfigConstants() { |
309 | - set_error_handler(function ($severity, $message, $file, $line) { |
|
309 | + set_error_handler(function($severity, $message, $file, $line) { |
|
310 | 310 | throw new \ErrorException($message, $severity, $severity, $file, $line); |
311 | 311 | }); |
312 | 312 | |
@@ -317,7 +317,7 @@ discard block |
||
317 | 317 | $failCount = $failCount + count($failResults); |
318 | 318 | if (count($failResults) > 0) { |
319 | 319 | $this->storeTestResult(\core\common\Entity::L_ERROR, |
320 | - "<strong>The following constants are not set:</strong>" . implode(', ', $failResults)); |
|
320 | + "<strong>The following constants are not set:</strong>".implode(', ', $failResults)); |
|
321 | 321 | } |
322 | 322 | } |
323 | 323 | |
@@ -341,7 +341,7 @@ discard block |
||
341 | 341 | $this->storeTestResult(\core\common\Entity::L_OK, "<strong>cat_base_url</strong> set correctly"); |
342 | 342 | } else { |
343 | 343 | $rootFromScript = $m[1] === '' ? '/' : $m[1]; |
344 | - $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>cat_base_url</strong> is set to <strong>" . \config\Master::PATHS['cat_base_url'] . "</strong> and should be <strong>$rootFromScript</strong>"); |
|
344 | + $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>cat_base_url</strong> is set to <strong>".\config\Master::PATHS['cat_base_url']."</strong> and should be <strong>$rootFromScript</strong>"); |
|
345 | 345 | } |
346 | 346 | } |
347 | 347 | |
@@ -362,7 +362,7 @@ discard block |
||
362 | 362 | if (count($probeReturns) == 0) { |
363 | 363 | $this->storeTestResult(common\Entity::L_OK, "All configured RADIUS/UDP probes are reachable."); |
364 | 364 | } else { |
365 | - $this->storeTestResult(common\Entity::L_ERROR, "The following RADIUS probes are NOT reachable: " . implode(', ', $probeReturns)); |
|
365 | + $this->storeTestResult(common\Entity::L_ERROR, "The following RADIUS probes are NOT reachable: ".implode(', ', $probeReturns)); |
|
366 | 366 | } |
367 | 367 | } |
368 | 368 | |
@@ -380,9 +380,9 @@ discard block |
||
380 | 380 | $SSPconfig = \SimpleSAML\Configuration::getInstance(); |
381 | 381 | $sspVersion = explode('.', $SSPconfig->getVersion()); |
382 | 382 | if ((int) $sspVersion[0] >= $this->needversionSSP['major'] && (int) $sspVersion[1] >= $this->needversionSSP['minor']) { |
383 | - $this->storeTestResult(\core\common\Entity::L_OK, "<strong>simpleSAMLphp</strong> is sufficently recent. You are running " . implode('.', $sspVersion)); |
|
383 | + $this->storeTestResult(\core\common\Entity::L_OK, "<strong>simpleSAMLphp</strong> is sufficently recent. You are running ".implode('.', $sspVersion)); |
|
384 | 384 | } else { |
385 | - $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>simpleSAMLphp</strong> is too old. We need at least " . implode('.', $this->needversionSSP)); |
|
385 | + $this->storeTestResult(\core\common\Entity::L_ERROR, "<strong>simpleSAMLphp</strong> is too old. We need at least ".implode('.', $this->needversionSSP)); |
|
386 | 386 | } |
387 | 387 | } |
388 | 388 | } |
@@ -409,7 +409,7 @@ discard block |
||
409 | 409 | $A = $this->getExecPath('zip'); |
410 | 410 | if ($A['exec'] != "") { |
411 | 411 | $fullOutput = []; |
412 | - $t = exec($A['exec'] . ' --version', $fullOutput); |
|
412 | + $t = exec($A['exec'].' --version', $fullOutput); |
|
413 | 413 | if ($A['exec_is'] == "EXPLICIT") { |
414 | 414 | $this->storeTestResult(\core\common\Entity::L_OK, "<strong>".$fullOutput[1]."</strong> was found and is configured explicitly in your config."); |
415 | 415 | } else { |
@@ -447,8 +447,8 @@ discard block |
||
447 | 447 | */ |
448 | 448 | private function testLogdir() |
449 | 449 | { |
450 | - if (fopen(\config\Master::PATHS['logdir'] . "/debug.log", "a") == FALSE) { |
|
451 | - $this->storeTestResult(\core\common\Entity::L_WARN, "Log files in <strong>" . \config\Master::PATHS['logdir'] . "</strong> are not writable!"); |
|
450 | + if (fopen(\config\Master::PATHS['logdir']."/debug.log", "a") == FALSE) { |
|
451 | + $this->storeTestResult(\core\common\Entity::L_WARN, "Log files in <strong>".\config\Master::PATHS['logdir']."</strong> are not writable!"); |
|
452 | 452 | } else { |
453 | 453 | $this->storeTestResult(\core\common\Entity::L_OK, "Log directory is writable."); |
454 | 454 | } |
@@ -576,7 +576,7 @@ discard block |
||
576 | 576 | { |
577 | 577 | $A = $this->getExecPath('openssl'); |
578 | 578 | if ($A['exec'] != "") { |
579 | - $t = exec($A['exec'] . ' version'); |
|
579 | + $t = exec($A['exec'].' version'); |
|
580 | 580 | if ($A['exec_is'] == "EXPLICIT") { |
581 | 581 | $this->storeTestResult(\core\common\Entity::L_OK, "<strong>$t</strong> was found and is configured explicitly in your config."); |
582 | 582 | } else { |
@@ -604,14 +604,14 @@ discard block |
||
604 | 604 | } |
605 | 605 | $A = $this->getExecPath('makensis'); |
606 | 606 | if ($A['exec'] != "") { |
607 | - $t = exec($A['exec'] . ' -VERSION'); |
|
607 | + $t = exec($A['exec'].' -VERSION'); |
|
608 | 608 | if ($A['exec_is'] == "EXPLICIT") { |
609 | 609 | $this->storeTestResult(\core\common\Entity::L_OK, "<strong>makensis $t</strong> was found and is configured explicitly in your config."); |
610 | 610 | } else { |
611 | 611 | $this->storeTestResult(\core\common\Entity::L_WARN, "<strong>makensis $t</strong> was found, but is not configured with an absolute path in your config."); |
612 | 612 | } |
613 | 613 | $outputArray = []; |
614 | - exec($A['exec'] . ' -HELP', $outputArray); |
|
614 | + exec($A['exec'].' -HELP', $outputArray); |
|
615 | 615 | $t1 = count(preg_grep('/INPUTCHARSET/', $outputArray)); |
616 | 616 | if ($t1 == 1 && \config\ConfAssistant::NSIS_VERSION == 2) { |
617 | 617 | $this->storeTestResult(\core\common\Entity::L_ERROR, "Declared NSIS_VERSION does not seem to match the file pointed to by PATHS['makensis']!"); |
@@ -641,7 +641,7 @@ discard block |
||
641 | 641 | $NSIS_Module_status = []; |
642 | 642 | foreach ($this->NSISModules as $module) { |
643 | 643 | unset($out); |
644 | - exec(\config\ConfAssistant::PATHS['makensis'] . " -V1 '-X!include $module' '-XOutFile $exe' '-XSection X' '-XSectionEnd'", $out, $retval); |
|
644 | + exec(\config\ConfAssistant::PATHS['makensis']." -V1 '-X!include $module' '-XOutFile $exe' '-XSection X' '-XSectionEnd'", $out, $retval); |
|
645 | 645 | if ($retval > 0) { |
646 | 646 | $NSIS_Module_status[$module] = 0; |
647 | 647 | } else { |
@@ -708,8 +708,8 @@ discard block |
||
708 | 708 | $locales = shell_exec("locale -a"); |
709 | 709 | $allthere = ""; |
710 | 710 | foreach (\config\Master::LANGUAGES as $onelanguage) { |
711 | - if (preg_match("/" . $onelanguage['locale'] . "/", $locales) == 0) { |
|
712 | - $allthere .= $onelanguage['locale'] . " "; |
|
711 | + if (preg_match("/".$onelanguage['locale']."/", $locales) == 0) { |
|
712 | + $allthere .= $onelanguage['locale']." "; |
|
713 | 713 | } |
714 | 714 | } |
715 | 715 | if ($allthere == "") { |
@@ -723,47 +723,47 @@ discard block |
||
723 | 723 | ["SETTING" => \config\Master::APPEARANCE['from-mail'], |
724 | 724 | "DEFVALUE" => "[email protected]", |
725 | 725 | "COMPLAINTSTRING" => "APPEARANCE/from-mail ", |
726 | - "REQUIRED" => FALSE,], |
|
726 | + "REQUIRED" => FALSE, ], |
|
727 | 727 | ["SETTING" => \config\Master::APPEARANCE['support-contact']['url'], |
728 | 728 | "DEFVALUE" => "[email protected]?body=Only%20English%20language%20please!", |
729 | 729 | "COMPLAINTSTRING" => "APPEARANCE/support-contact/url ", |
730 | - "REQUIRED" => FALSE,], |
|
730 | + "REQUIRED" => FALSE, ], |
|
731 | 731 | ["SETTING" => \config\Master::APPEARANCE['support-contact']['display'], |
732 | 732 | "DEFVALUE" => "[email protected]", |
733 | 733 | "COMPLAINTSTRING" => "APPEARANCE/support-contact/display ", |
734 | - "REQUIRED" => FALSE,], |
|
734 | + "REQUIRED" => FALSE, ], |
|
735 | 735 | ["SETTING" => \config\Master::APPEARANCE['support-contact']['developer-mail'], |
736 | 736 | "DEFVALUE" => "[email protected]", |
737 | 737 | "COMPLAINTSTRING" => "APPEARANCE/support-contact/mail ", |
738 | - "REQUIRED" => FALSE,], |
|
738 | + "REQUIRED" => FALSE, ], |
|
739 | 739 | ["SETTING" => \config\Master::APPEARANCE['abuse-mail'], |
740 | 740 | "DEFVALUE" => "[email protected]", |
741 | 741 | "COMPLAINTSTRING" => "APPEARANCE/abuse-mail ", |
742 | - "REQUIRED" => FALSE,], |
|
742 | + "REQUIRED" => FALSE, ], |
|
743 | 743 | ["SETTING" => \config\Master::APPEARANCE['MOTD'], |
744 | 744 | "DEFVALUE" => "Release Candidate. All bugs to be shot on sight!", |
745 | 745 | "COMPLAINTSTRING" => "APPEARANCE/MOTD ", |
746 | - "REQUIRED" => FALSE,], |
|
746 | + "REQUIRED" => FALSE, ], |
|
747 | 747 | ["SETTING" => \config\Master::APPEARANCE['webcert_CRLDP'], |
748 | 748 | "DEFVALUE" => ['list', 'of', 'CRL', 'pointers'], |
749 | 749 | "COMPLAINTSTRING" => "APPEARANCE/webcert_CRLDP ", |
750 | - "REQUIRED" => TRUE,], |
|
750 | + "REQUIRED" => TRUE, ], |
|
751 | 751 | ["SETTING" => \config\Master::APPEARANCE['webcert_OCSP'], |
752 | 752 | "DEFVALUE" => ['list', 'of', 'OCSP', 'pointers'], |
753 | 753 | "COMPLAINTSTRING" => "APPEARANCE/webcert_OCSP ", |
754 | - "REQUIRED" => TRUE,], |
|
754 | + "REQUIRED" => TRUE, ], |
|
755 | 755 | ["SETTING" => \config\Master::DB['INST']['host'], |
756 | 756 | "DEFVALUE" => "db.host.example", |
757 | 757 | "COMPLAINTSTRING" => "DB/INST ", |
758 | - "REQUIRED" => TRUE,], |
|
758 | + "REQUIRED" => TRUE, ], |
|
759 | 759 | ["SETTING" => \config\Master::DB['INST']['host'], |
760 | 760 | "DEFVALUE" => "db.host.example", |
761 | 761 | "COMPLAINTSTRING" => "DB/USER ", |
762 | - "REQUIRED" => TRUE,], |
|
762 | + "REQUIRED" => TRUE, ], |
|
763 | 763 | ["SETTING" => \config\Master::DB['EXTERNAL']['host'], |
764 | 764 | "DEFVALUE" => "customerdb.otherhost.example", |
765 | 765 | "COMPLAINTSTRING" => "DB/EXTERNAL ", |
766 | - "REQUIRED" => FALSE,], |
|
766 | + "REQUIRED" => FALSE, ], |
|
767 | 767 | ]; |
768 | 768 | |
769 | 769 | /** |
@@ -792,11 +792,11 @@ discard block |
||
792 | 792 | if (isset(\config\Diagnostics::RADIUSTESTS['TLS-clientcerts'])) { |
793 | 793 | foreach (\config\Diagnostics::RADIUSTESTS['TLS-clientcerts'] as $cadata) { |
794 | 794 | foreach ($cadata['certificates'] as $cert_files) { |
795 | - if (file_get_contents(ROOT . "/config/cli-certs/" . $cert_files['public']) === FALSE) { |
|
796 | - $defaultvalues .= "CERTIFICATE/" . $cert_files['public'] . " "; |
|
795 | + if (file_get_contents(ROOT."/config/cli-certs/".$cert_files['public']) === FALSE) { |
|
796 | + $defaultvalues .= "CERTIFICATE/".$cert_files['public']." "; |
|
797 | 797 | } |
798 | - if (file_get_contents(ROOT . "/config/cli-certs/" . $cert_files['private']) === FALSE) { |
|
799 | - $defaultvalues .= "CERTIFICATE/" . $cert_files['private'] . " "; |
|
798 | + if (file_get_contents(ROOT."/config/cli-certs/".$cert_files['private']) === FALSE) { |
|
799 | + $defaultvalues .= "CERTIFICATE/".$cert_files['private']." "; |
|
800 | 800 | } |
801 | 801 | } |
802 | 802 | } |
@@ -889,14 +889,14 @@ discard block |
||
889 | 889 | if ($global_no_cache) { |
890 | 890 | foreach ($Devs as $dev => $D) { |
891 | 891 | if (empty($D['options']['no_cache']) || $D['options']['no_cache'] != 0) { |
892 | - $no_cache_dev .= $dev . " "; |
|
892 | + $no_cache_dev .= $dev." "; |
|
893 | 893 | $no_cache_dev_count++; |
894 | 894 | } |
895 | 895 | } |
896 | 896 | } else { |
897 | 897 | foreach ($Devs as $dev => $D) { |
898 | 898 | if (!empty($D['options']['no_cache']) && $D['options']['no_cache'] != 0) { |
899 | - $no_cache_dev .= $dev . " "; |
|
899 | + $no_cache_dev .= $dev." "; |
|
900 | 900 | $no_cache_dev_count++; |
901 | 901 | } |
902 | 902 | } |
@@ -935,13 +935,13 @@ discard block |
||
935 | 935 | $mail->isHTML(FALSE); |
936 | 936 | $mail->CharSet = 'UTF-8'; |
937 | 937 | $mail->From = \config\Master::APPEARANCE['from-mail']; |
938 | - $mail->FromName = \config\Master::APPEARANCE['productname'] . " Invitation System"; |
|
938 | + $mail->FromName = \config\Master::APPEARANCE['productname']." Invitation System"; |
|
939 | 939 | $mail->addAddress(\config\Master::APPEARANCE['abuse-mail']); |
940 | 940 | $mail->Subject = "testing CAT configuration mail"; |
941 | 941 | $mail->Body = "Testing CAT mailing\n"; |
942 | 942 | $sent = $mail->send(); |
943 | 943 | if ($sent) { |
944 | - $this->storeTestResult(\core\common\Entity::L_OK, "mailer settings appear to be working, check " . \config\Master::APPEARANCE['abuse-mail'] . " mailbox if the message was receiced."); |
|
944 | + $this->storeTestResult(\core\common\Entity::L_OK, "mailer settings appear to be working, check ".\config\Master::APPEARANCE['abuse-mail']." mailbox if the message was receiced."); |
|
945 | 945 | } else { |
946 | 946 | $this->storeTestResult(\core\common\Entity::L_ERROR, "mailer settings failed, check the Config::MAILSETTINGS"); |
947 | 947 | } |
@@ -211,7 +211,7 @@ discard block |
||
211 | 211 | $node->appendChild($childNode); |
212 | 212 | } |
213 | 213 | if (!empty($namespace)) { |
214 | - $ns = $domElement->createAttributeNS(null,'xmlns'); |
|
214 | + $ns = $domElement->createAttributeNS(null, 'xmlns'); |
|
215 | 215 | $ns->value = $namespace; |
216 | 216 | $childNode->appendChild($ns); |
217 | 217 | } |
@@ -238,7 +238,7 @@ discard block |
||
238 | 238 | $nextChild = $domElement->createElement($nameC, $cl); |
239 | 239 | $childNode->appendChild($nextChild); |
240 | 240 | if (!empty($namespaceC)) { |
241 | - $ns = $domElement->createAttributeNS(null,'xmlns'); |
|
241 | + $ns = $domElement->createAttributeNS(null, 'xmlns'); |
|
242 | 242 | $ns->value = $namespaceC; |
243 | 243 | $nextChild->appendChild($ns); |
244 | 244 | } |
@@ -260,7 +260,7 @@ discard block |
||
260 | 260 | $childNode->appendChild($nextChild); |
261 | 261 | } |
262 | 262 | if (!empty($namespaceC)) { |
263 | - $ns = $domElement->createAttributeNS(null,'xmlns'); |
|
263 | + $ns = $domElement->createAttributeNS(null, 'xmlns'); |
|
264 | 264 | $ns->value = $namespaceC; |
265 | 265 | $nextChild->appendChild($ns); |
266 | 266 | } |
@@ -90,7 +90,7 @@ discard block |
||
90 | 90 | ], |
91 | 91 | 'condition' => TRUE], |
92 | 92 | 'OpenRoaming® (%REALM%)' => [ |
93 | - 'ssid' => [], /* OpenRoaming has left SSIDs behind */ |
|
93 | + 'ssid' => [], /* OpenRoaming has left SSIDs behind */ |
|
94 | 94 | 'oi' => [ |
95 | 95 | '5A03BA0000', /* OpenRoaming/AllIdentities/SettlementFree/NoPersonalData/BaselineQoS */ |
96 | 96 | '5A03BA0800', /* OpenRoaming/EduIdentities/SettlementFree/NoPersonalData/BaselineQoS */ |
@@ -155,7 +155,7 @@ discard block |
||
155 | 155 | 'makensis' => 'makensis', |
156 | 156 | 'zip' => 'zip', |
157 | 157 | 'trust-store-mozilla' => '/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem', |
158 | - 'trust-store-custom' => __DIR__ . "/known-roots.pem", |
|
158 | + 'trust-store-custom' => __DIR__."/known-roots.pem", |
|
159 | 159 | ]; |
160 | 160 | |
161 | 161 | /** |
@@ -193,13 +193,13 @@ discard block |
||
193 | 193 | 'db' => 'radacct', |
194 | 194 | 'user' => 'someuser', |
195 | 195 | 'pass' => 'somepass', |
196 | - 'readonly' => TRUE,], |
|
196 | + 'readonly' => TRUE, ], |
|
197 | 197 | 'RADIUS_2' => [ |
198 | 198 | 'host' => 'auth-2.hosted.eduroam.org', |
199 | 199 | 'db' => 'radacct', |
200 | 200 | 'user' => 'someuser', |
201 | 201 | 'pass' => 'somepass', |
202 | - 'readonly' => TRUE,], |
|
202 | + 'readonly' => TRUE, ], |
|
203 | 203 | ]; |
204 | 204 | |
205 | 205 | /** |
@@ -51,7 +51,7 @@ discard block |
||
51 | 51 | $installerPath = $this->installerBasename.".sh"; |
52 | 52 | $this->copyFile("eduroam_linux_main.sh", $installerPath); |
53 | 53 | |
54 | - if ( !file_exists($installerPath) ) { |
|
54 | + if (!file_exists($installerPath)) { |
|
55 | 55 | throw new Exception('File not found.'); |
56 | 56 | } |
57 | 57 | |
@@ -68,7 +68,7 @@ discard block |
||
68 | 68 | fwrite($installer, 'printf -v INIT_CONFIRMATION "$INIT_CONFIRMATION_TMP" "$ORGANISATION"'."\n\n"); |
69 | 69 | fwrite($installer, 'main "$@"; exit'."\n"); |
70 | 70 | } catch (Exception $e) { |
71 | - echo 'Error message: ' .$e->getMessage(); |
|
71 | + echo 'Error message: '.$e->getMessage(); |
|
72 | 72 | } finally { |
73 | 73 | fclose($installer); |
74 | 74 | return($installerPath); |
@@ -204,11 +204,11 @@ discard block |
||
204 | 204 | $config['USER_REALM'] = $this->attributes['internal:realm'][0]; |
205 | 205 | } |
206 | 206 | |
207 | - if(!empty($this->attributes['internal:hint_userinput_suffix'][0]) && $this->attributes['internal:hint_userinput_suffix'][0] == 1) { |
|
207 | + if (!empty($this->attributes['internal:hint_userinput_suffix'][0]) && $this->attributes['internal:hint_userinput_suffix'][0] == 1) { |
|
208 | 208 | $configRaw['HINT_USER_INPUT'] = true; |
209 | 209 | } |
210 | 210 | |
211 | - if(!empty($this->attributes['internal:verify_userinput_suffix'][0]) && $this->attributes['internal:verify_userinput_suffix'][0] == 1) { |
|
211 | + if (!empty($this->attributes['internal:verify_userinput_suffix'][0]) && $this->attributes['internal:verify_userinput_suffix'][0] == 1) { |
|
212 | 212 | $configRaw['VERIFY_USER_REALM_INPUT'] = true; |
213 | 213 | } else { |
214 | 214 | $configRaw['VERIFY_USER_REALM_INPUT'] = false; |
@@ -219,7 +219,7 @@ discard block |
||
219 | 219 | } |
220 | 220 | |
221 | 221 | foreach ($configRaw as $name => $value) { |
222 | - fwrite($file, $name ."=". $value."\n"); |
|
222 | + fwrite($file, $name."=".$value."\n"); |
|
223 | 223 | } |
224 | 224 | |
225 | 225 | if ($tou === '') { |
@@ -283,7 +283,7 @@ discard block |
||
283 | 283 | } |
284 | 284 | $out .= "'DNS:$oneServer'"; |
285 | 285 | } |
286 | - return "(".$out. ")"; |
|
286 | + return "(".$out.")"; |
|
287 | 287 | } |
288 | 288 | |
289 | 289 | /** |
@@ -323,7 +323,7 @@ discard block |
||
323 | 323 | * |
324 | 324 | * @return string |
325 | 325 | */ |
326 | - private function mkCAfile(){ |
|
326 | + private function mkCAfile() { |
|
327 | 327 | $out = ''; |
328 | 328 | $cAlist = $this->attributes['internal:CAs'][0]; |
329 | 329 | foreach ($cAlist as $oneCa) { |
@@ -339,7 +339,7 @@ discard block |
||
339 | 339 | */ |
340 | 340 | private function mkIntro() { |
341 | 341 | \core\common\Entity::intoThePotatoes(); |
342 | - $out = _("This installer has been prepared for %s").'\n\n'._("More information and comments:").'\n\nE-Mail: %s\nWWW: %s\n\n' . |
|
342 | + $out = _("This installer has been prepared for %s").'\n\n'._("More information and comments:").'\n\nE-Mail: %s\nWWW: %s\n\n'. |
|
343 | 343 | _("Installer created with software from the GEANT project."); |
344 | 344 | \core\common\Entity::outOfThePotatoes(); |
345 | 345 | return $out; |
@@ -60,7 +60,7 @@ discard block |
||
60 | 60 | public function writeInstaller() { |
61 | 61 | $installerPath = $this->installerBasename.".py"; |
62 | 62 | $this->copyFile("main.py", $installerPath); |
63 | - $installer = fopen($installerPath,"a"); |
|
63 | + $installer = fopen($installerPath, "a"); |
|
64 | 64 | if ($installer === FALSE) { |
65 | 65 | throw new Exception("Unable to open installer file for writing!"); |
66 | 66 | } |
@@ -202,11 +202,11 @@ discard block |
||
202 | 202 | $config['user_realm'] = $this->attributes['internal:realm'][0]; |
203 | 203 | } |
204 | 204 | |
205 | - if(!empty($this->attributes['internal:hint_userinput_suffix'][0]) && $this->attributes['internal:hint_userinput_suffix'][0] == 1) { |
|
205 | + if (!empty($this->attributes['internal:hint_userinput_suffix'][0]) && $this->attributes['internal:hint_userinput_suffix'][0] == 1) { |
|
206 | 206 | $configRaw['hint_user_input'] = "True"; |
207 | 207 | } |
208 | 208 | |
209 | - if(!empty($this->attributes['internal:verify_userinput_suffix'][0]) && $this->attributes['internal:verify_userinput_suffix'][0] == 1) { |
|
209 | + if (!empty($this->attributes['internal:verify_userinput_suffix'][0]) && $this->attributes['internal:verify_userinput_suffix'][0] == 1) { |
|
210 | 210 | $configRaw['verify_user_realm_input'] = "True"; |
211 | 211 | } |
212 | 212 | |
@@ -279,7 +279,7 @@ discard block |
||
279 | 279 | } |
280 | 280 | $out .= "'DNS:$oneServer'"; |
281 | 281 | } |
282 | - return "[".$out. "]"; |
|
282 | + return "[".$out."]"; |
|
283 | 283 | } |
284 | 284 | |
285 | 285 | /** |
@@ -319,7 +319,7 @@ discard block |
||
319 | 319 | * |
320 | 320 | * @return string |
321 | 321 | */ |
322 | - private function mkCAfile(){ |
|
322 | + private function mkCAfile() { |
|
323 | 323 | $out = ''; |
324 | 324 | $cAlist = $this->attributes['internal:CAs'][0]; |
325 | 325 | foreach ($cAlist as $oneCa) { |
@@ -335,7 +335,7 @@ discard block |
||
335 | 335 | */ |
336 | 336 | private function mkIntro() { |
337 | 337 | \core\common\Entity::intoThePotatoes(); |
338 | - $out = _("This installer has been prepared for {0}").'\n\n'._("More information and comments:").'\n\nEMAIL: {1}\nWWW: {2}\n\n' . |
|
338 | + $out = _("This installer has been prepared for {0}").'\n\n'._("More information and comments:").'\n\nEMAIL: {1}\nWWW: {2}\n\n'. |
|
339 | 339 | _("Installer created with software from the GEANT project."); |
340 | 340 | \core\common\Entity::outOfThePotatoes(); |
341 | 341 | return $out; |
@@ -145,7 +145,7 @@ discard block |
||
145 | 145 | \core\common\Entity::intoThePotatoes(); |
146 | 146 | // that's what all variants support. Sub-classes can change it. |
147 | 147 | $this->setSupportedEapMethods([\core\common\EAP::EAPTYPE_PEAP_MSCHAP2, \core\common\EAP::EAPTYPE_TTLS_PAP, \core\common\EAP::EAPTYPE_TTLS_MSCHAP2, \core\common\EAP::EAPTYPE_SILVERBULLET]); |
148 | - foreach(\core\common\EAP::listKnownEAPTypes() as $eapType) { |
|
148 | + foreach (\core\common\EAP::listKnownEAPTypes() as $eapType) { |
|
149 | 149 | if ($eapType->isPasswordRequired() || $eapType->isPasswordOptional()) { |
150 | 150 | $this->specialities['internal:verify_userinput_suffix'][serialize($eapType->getArrayRep())] = _("It is not possible to actively verify the user input for suffix match; but if there is no 'Terms of Use' configured, the installer will display a corresponding hint to the user instead."); |
151 | 151 | $this->specialities['media:openroaming'][serialize($eapType->getArrayRep())] = _("OpenRoaming is not provisioned due to severe UI limitations during install time."); |
@@ -185,15 +185,15 @@ discard block |
||
185 | 185 | <key>PayloadDescription</key> |
186 | 186 | <string>$tagline</string> |
187 | 187 | <key>PayloadDisplayName</key> |
188 | - <string>" . \config\ConfAssistant::CONSORTIUM['display_name'] . "</string> |
|
188 | + <string>".\config\ConfAssistant::CONSORTIUM['display_name']."</string> |
|
189 | 189 | <key>PayloadIdentifier</key> |
190 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang</string> |
|
190 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang</string> |
|
191 | 191 | <key>PayloadOrganization</key> |
192 | - <string>" . htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['general:instname'][0]), ENT_XML1, 'UTF-8') . ( $this->attributes['internal:profile_count'][0] > 1 ? " (" . htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['profile:name'][0]), ENT_XML1, 'UTF-8') . ")" : "") . "</string> |
|
192 | + <string>".htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['general:instname'][0]), ENT_XML1, 'UTF-8').($this->attributes['internal:profile_count'][0] > 1 ? " (".htmlspecialchars(iconv("UTF-8", "UTF-8//IGNORE", $this->attributes['profile:name'][0]), ENT_XML1, 'UTF-8').")" : "")."</string> |
|
193 | 193 | <key>PayloadType</key> |
194 | 194 | <string>Configuration</string> |
195 | 195 | <key>PayloadUUID</key> |
196 | - <string>" . \core\common\Entity::uuid('', self::IPHONE_PAYLOAD_PREFIX . $this->massagedConsortium . $this->massagedCountry . $this->massagedInst . $this->massagedProfile) . "</string> |
|
196 | + <string>" . \core\common\Entity::uuid('', self::IPHONE_PAYLOAD_PREFIX.$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile)."</string> |
|
197 | 197 | <key>PayloadVersion</key> |
198 | 198 | <integer>1</integer>"; |
199 | 199 | \core\common\Entity::outOfThePotatoes(); |
@@ -225,21 +225,21 @@ discard block |
||
225 | 225 | { |
226 | 226 | \core\common\Entity::intoThePotatoes(); |
227 | 227 | if (isset($this->attributes['support:info_file'])) { |
228 | - return MobileconfigSuperclass::BUFFER_CONSENT_PRE . htmlspecialchars(iconv("UTF-8", "UTF-8//TRANSLIT", $this->attributes['support:info_file'][0]), ENT_XML1, 'UTF-8') . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
228 | + return MobileconfigSuperclass::BUFFER_CONSENT_PRE.htmlspecialchars(iconv("UTF-8", "UTF-8//TRANSLIT", $this->attributes['support:info_file'][0]), ENT_XML1, 'UTF-8').MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
229 | 229 | } |
230 | 230 | if ($this->attributes['internal:verify_userinput_suffix'][0] != 0) { |
231 | 231 | if ($this->attributes['internal:hint_userinput_suffix'][0] != 0) { |
232 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . sprintf(_("Important Notice: your username MUST end exactly with '...@%s' !"), $this->attributes['internal:realm'][0]) . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
232 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE.sprintf(_("Important Notice: your username MUST end exactly with '...@%s' !"), $this->attributes['internal:realm'][0]).MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
233 | 233 | \core\common\Entity::outOfThePotatoes(); |
234 | 234 | return $retval; |
235 | 235 | } else { |
236 | 236 | if (strlen($this->attributes['internal:realm'][0]) > 0) { |
237 | 237 | /// note space between variable and exclamation mark - makes sure users don't mistakenly think the exclamation mark is part of the required username! |
238 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . sprintf(_("Important Notice: your username MUST contain an '@' and end with ...%s !"), $this->attributes['internal:realm'][0]) . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
238 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE.sprintf(_("Important Notice: your username MUST contain an '@' and end with ...%s !"), $this->attributes['internal:realm'][0]).MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
239 | 239 | \core\common\Entity::outOfThePotatoes(); |
240 | 240 | return $retval; |
241 | 241 | } |
242 | - $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE . _("Important Notice: your username MUST be in the form of xxx@yyy where the yyy is a common suffix identifying your Identity Provider. Please find out what to use there and enter the username in the correct format.") . MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
242 | + $retval = MobileconfigSuperclass::BUFFER_CONSENT_PRE._("Important Notice: your username MUST be in the form of xxx@yyy where the yyy is a common suffix identifying your Identity Provider. Please find out what to use there and enter the username in the correct format.").MobileconfigSuperclass::BUFFER_CONSENT_POST; |
|
243 | 243 | \core\common\Entity::outOfThePotatoes(); |
244 | 244 | return $retval; |
245 | 245 | } |
@@ -263,7 +263,7 @@ discard block |
||
263 | 263 | // also escape htmlspecialchars |
264 | 264 | // not all names and profiles have a name, so be prepared |
265 | 265 | |
266 | - $this->loggerInstance->debug(5, "List of available attributes: " . var_export($this->attributes, TRUE)); |
|
266 | + $this->loggerInstance->debug(5, "List of available attributes: ".var_export($this->attributes, TRUE)); |
|
267 | 267 | |
268 | 268 | $this->instName = $this->attributes['general:instname'][0] ?? _("Unnamed Organisation"); |
269 | 269 | $this->profileName = $this->attributes['profile:name'][0] ?? _("Unnamed Profile"); |
@@ -305,7 +305,7 @@ discard block |
||
305 | 305 | |
306 | 306 | file_put_contents('installer_profile', $outputXml); |
307 | 307 | |
308 | - $fileName = $this->installerBasename . '.mobileconfig'; |
|
308 | + $fileName = $this->installerBasename.'.mobileconfig'; |
|
309 | 309 | |
310 | 310 | if (!$this->sign) { |
311 | 311 | rename("installer_profile", $fileName); |
@@ -313,7 +313,7 @@ discard block |
||
313 | 313 | return $fileName; |
314 | 314 | } |
315 | 315 | // still here? Then we are signing. |
316 | - $signing = system($this->sign . " installer_profile '$fileName' > /dev/null"); |
|
316 | + $signing = system($this->sign." installer_profile '$fileName' > /dev/null"); |
|
317 | 317 | if ($signing === FALSE) { |
318 | 318 | $this->loggerInstance->debug(2, "Signing the mobileconfig installer $fileName FAILED!\n"); |
319 | 319 | } |
@@ -337,19 +337,19 @@ discard block |
||
337 | 337 | $oiCount = $oiCount + count($netDetail['oi']); |
338 | 338 | } |
339 | 339 | $certCount = count($this->attributes['internal:CAs'][0]); |
340 | - $out = "<p>" . _("For best results, please use the built-in browser (Safari) to open the configuration file.") . "</p>"; |
|
340 | + $out = "<p>"._("For best results, please use the built-in browser (Safari) to open the configuration file.")."</p>"; |
|
341 | 341 | $out .= "<p>"; |
342 | 342 | $out .= _("The profile will install itself after you click (or tap) the button. You will be asked for confirmation/input at several points:"); |
343 | 343 | $out .= "<ul>"; |
344 | - $out .= "<li>" . _("to install the profile") . "</li>"; |
|
345 | - $out .= "<li>" . ngettext("to accept the server certificate authority", "to accept the server certificate authorities", $certCount); |
|
344 | + $out .= "<li>"._("to install the profile")."</li>"; |
|
345 | + $out .= "<li>".ngettext("to accept the server certificate authority", "to accept the server certificate authorities", $certCount); |
|
346 | 346 | if ($certCount > 1) { |
347 | - $out .= " " . sprintf(_("(%d times)"), $certCount); |
|
347 | + $out .= " ".sprintf(_("(%d times)"), $certCount); |
|
348 | 348 | } |
349 | 349 | $out .= "</li>"; |
350 | - $out .= "<li>" . _("to enter the username and password you have been given by your organisation"); |
|
350 | + $out .= "<li>"._("to enter the username and password you have been given by your organisation"); |
|
351 | 351 | if ($ssidCount > 1) { |
352 | - $out .= " " . sprintf(_("(%d times each, because %d SSIDs and %d Passpoint networks are installed)"), $ssidCount+$oiCount, $ssidCount, $oiCount); |
|
352 | + $out .= " ".sprintf(_("(%d times each, because %d SSIDs and %d Passpoint networks are installed)"), $ssidCount + $oiCount, $ssidCount, $oiCount); |
|
353 | 353 | } |
354 | 354 | $out .= "</li>"; |
355 | 355 | $out .= "</ul>"; |
@@ -389,7 +389,7 @@ discard block |
||
389 | 389 | <key>ServiceProviderRoamingEnabled</key> |
390 | 390 | <true/> |
391 | 391 | <key>DisplayedOperatorName</key> |
392 | - <string>" . $oiName . "</string>"; |
|
392 | + <string>" . $oiName."</string>"; |
|
393 | 393 | // if we don't know the realm, omit the entire DomainName key |
394 | 394 | if (isset($this->attributes['internal:realm'])) { |
395 | 395 | $retval .= "<key>DomainName</key> |
@@ -402,7 +402,7 @@ discard block |
||
402 | 402 | <array>"; |
403 | 403 | |
404 | 404 | foreach ($consortiumOi as $oneCons) { |
405 | - $retval .= "<string>" . strtoupper($oneCons) . "</string>"; |
|
405 | + $retval .= "<string>".strtoupper($oneCons)."</string>"; |
|
406 | 406 | } |
407 | 407 | |
408 | 408 | $retval .= "</array>"; |
@@ -440,7 +440,7 @@ discard block |
||
440 | 440 | <dict> |
441 | 441 | <key>AcceptEAPTypes</key> |
442 | 442 | <array> |
443 | - <integer>" . $eapType['OUTER'] . "</integer> |
|
443 | + <integer>" . $eapType['OUTER']."</integer> |
|
444 | 444 | </array> |
445 | 445 | <key>EAPFASTProvisionPAC</key> |
446 | 446 | <true /> |
@@ -453,7 +453,7 @@ discard block |
||
453 | 453 | "; |
454 | 454 | if ($realm !== NULL) { |
455 | 455 | $retval .= "<key>OuterIdentity</key> |
456 | - <string>" . htmlspecialchars($realm, ENT_XML1, 'UTF-8') . "</string> |
|
456 | + <string>" . htmlspecialchars($realm, ENT_XML1, 'UTF-8')."</string> |
|
457 | 457 | "; |
458 | 458 | } |
459 | 459 | $retval .= "<key>PayloadCertificateAnchorUUID</key> |
@@ -477,11 +477,11 @@ discard block |
||
477 | 477 | $retval .= " |
478 | 478 | </array>"; |
479 | 479 | if ($eapType['INNER'] == \core\common\EAP::NE_SILVERBULLET) { |
480 | - $retval .= "<key>UserName</key><string>" . $this->clientCert["certObject"]->username . "</string>"; |
|
480 | + $retval .= "<key>UserName</key><string>".$this->clientCert["certObject"]->username."</string>"; |
|
481 | 481 | } |
482 | 482 | $retval .= " |
483 | 483 | <key>TTLSInnerAuthentication</key> |
484 | - <string>" . ($eapType['INNER'] == \core\common\EAP::NE_PAP ? "PAP" : "MSCHAPv2") . "</string> |
|
484 | + <string>" . ($eapType['INNER'] == \core\common\EAP::NE_PAP ? "PAP" : "MSCHAPv2")."</string> |
|
485 | 485 | </dict>"; |
486 | 486 | return $retval; |
487 | 487 | } |
@@ -501,9 +501,9 @@ discard block |
||
501 | 501 | // characters are still reversed, invert on use! |
502 | 502 | $buffer .= "<string>Manual</string> |
503 | 503 | <key>ProxyServer</key> |
504 | - <string>" . strrev($serverAndPort[1]) . "</string> |
|
504 | + <string>" . strrev($serverAndPort[1])."</string> |
|
505 | 505 | <key>ProxyServerPort</key> |
506 | - <integer>" . strrev($serverAndPort[0]) . "</integer> |
|
506 | + <integer>" . strrev($serverAndPort[0])."</integer> |
|
507 | 507 | <key>ProxyPACFallbackAllowed</key> |
508 | 508 | <false/>"; |
509 | 509 | } else { |
@@ -553,7 +553,7 @@ discard block |
||
553 | 553 | throw new Exception("SSID must be a string!"); |
554 | 554 | } |
555 | 555 | $escapedSSID = htmlspecialchars($toBeConfigured, ENT_XML1, 'UTF-8'); |
556 | - $payloadIdentifier = "wifi." . $this->serial; |
|
556 | + $payloadIdentifier = "wifi.".$this->serial; |
|
557 | 557 | $payloadShortName = sprintf(_("%s - SSID %s"), $prettyName, $escapedSSID); |
558 | 558 | $payloadName = sprintf(_("%s configuration for network name %s"), $prettyName, $escapedSSID); |
559 | 559 | $encryptionTypeString = $this->encryptionString(); |
@@ -583,9 +583,9 @@ discard block |
||
583 | 583 | if (count($toBeConfigured) == 0) { |
584 | 584 | return ""; |
585 | 585 | } |
586 | - $payloadIdentifier = "hs20.".implode('-',$toBeConfigured); |
|
586 | + $payloadIdentifier = "hs20.".implode('-', $toBeConfigured); |
|
587 | 587 | $payloadShortName = sprintf(_("%s - RCOI"), $prettyName); |
588 | - $payloadName = sprintf(_("%s configuration (Passpoint RCOI)"),$prettyName); |
|
588 | + $payloadName = sprintf(_("%s configuration (Passpoint RCOI)"), $prettyName); |
|
589 | 589 | $encryptionTypeString = $this->encryptionString(); |
590 | 590 | $setupModesString = ""; |
591 | 591 | $wifiNetworkIdentification = $this->passPointBlock($toBeConfigured, $prettyName); |
@@ -604,11 +604,11 @@ discard block |
||
604 | 604 | <key>PayloadDisplayName</key> |
605 | 605 | <string>$payloadShortName</string> |
606 | 606 | <key>PayloadIdentifier</key> |
607 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.$payloadIdentifier</string> |
|
607 | + <string>".self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.$payloadIdentifier</string> |
|
608 | 608 | <key>PayloadOrganization</key> |
609 | - <string>" . $this->massagedConsortium . ".1x-config.org</string> |
|
609 | + <string>".$this->massagedConsortium.".1x-config.org</string> |
|
610 | 610 | <key>PayloadType</key> |
611 | - <string>com.apple." . ($blocktype == MobileconfigSuperclass::NETWORK_BLOCK_TYPE_WIRED ? "firstactiveethernet" : "wifi") . ".managed</string>"; |
|
611 | + <string>com.apple." . ($blocktype == MobileconfigSuperclass::NETWORK_BLOCK_TYPE_WIRED ? "firstactiveethernet" : "wifi").".managed</string>"; |
|
612 | 612 | $retval .= $this->proxySettings(); |
613 | 613 | $retval .= $setupModesString; |
614 | 614 | if ($eapType['INNER'] == \core\common\EAP::NE_SILVERBULLET) { |
@@ -620,7 +620,7 @@ discard block |
||
620 | 620 | } |
621 | 621 | $retval .= " |
622 | 622 | <key>PayloadUUID</key> |
623 | - <string>" . \core\common\Entity::uuid() . "</string> |
|
623 | + <string>" . \core\common\Entity::uuid()."</string> |
|
624 | 624 | <key>PayloadVersion</key> |
625 | 625 | <integer>1</integer> |
626 | 626 | $wifiNetworkIdentification</dict>"; |
@@ -650,15 +650,15 @@ discard block |
||
650 | 650 | <key>IsHotspot</key> |
651 | 651 | <false/> |
652 | 652 | <key>PayloadDescription</key> |
653 | - <string>" . sprintf(_("This SSID should not be used after bootstrapping %s"), \config\ConfAssistant::CONSORTIUM['display_name']) . "</string> |
|
653 | + <string>" . sprintf(_("This SSID should not be used after bootstrapping %s"), \config\ConfAssistant::CONSORTIUM['display_name'])."</string> |
|
654 | 654 | <key>PayloadDisplayName</key> |
655 | - <string>" . _("Disabled WiFi network") . "</string> |
|
655 | + <string>" . _("Disabled WiFi network")."</string> |
|
656 | 656 | <key>PayloadIdentifier</key> |
657 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.wifi.disabled.$this->removeSerial</string> |
|
657 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.$this->lang.wifi.disabled.$this->removeSerial</string> |
|
658 | 658 | <key>PayloadType</key> |
659 | 659 | <string>com.apple.wifi.managed</string> |
660 | 660 | <key>PayloadUUID</key> |
661 | - <string>" . \core\common\Entity::uuid() . "</string> |
|
661 | + <string>".\core\common\Entity::uuid()."</string> |
|
662 | 662 | <key>PayloadVersion</key> |
663 | 663 | <real>1</real>"; |
664 | 664 | $retval .= $this->proxySettings(); |
@@ -738,12 +738,12 @@ discard block |
||
738 | 738 | $mimeBlob = base64_encode($binaryBlob); |
739 | 739 | $mimeFormatted = chunk_split($mimeBlob, 52, "\r\n"); |
740 | 740 | $payloadUUID = \core\common\Entity::uuid('', $mimeBlob); |
741 | - $retArray = ["block" => "<dict>" . |
|
741 | + $retArray = ["block" => "<dict>". |
|
742 | 742 | // we don't include the import password. It's displayed on screen, and should be input by the user. |
743 | 743 | // <key>Password</key> |
744 | 744 | // <string>" . $this->clientCert['password'] . "</string> |
745 | 745 | "<key>PayloadCertificateFileName</key> |
746 | - <string>" . $this->massagedConsortium . ".pfx</string> |
|
746 | + <string>" . $this->massagedConsortium.".pfx</string> |
|
747 | 747 | <key>PayloadContent</key> |
748 | 748 | <data> |
749 | 749 | $mimeFormatted |
@@ -751,7 +751,7 @@ discard block |
||
751 | 751 | <key>PayloadDescription</key> |
752 | 752 | <string>MIME Base-64 encoded PKCS#12 Client Certificate</string> |
753 | 753 | <key>PayloadDisplayName</key> |
754 | - <string>" . _("User certificate") . "</string> |
|
754 | + <string>"._("User certificate")."</string> |
|
755 | 755 | <key>PayloadIdentifier</key> |
756 | 756 | <string>com.apple.security.pkcs12.$payloadUUID</string> |
757 | 757 | <key>PayloadType</key> |
@@ -761,7 +761,7 @@ discard block |
||
761 | 761 | <key>PayloadVersion</key> |
762 | 762 | <integer>1</integer> |
763 | 763 | </dict>", |
764 | - "UUID" => $payloadUUID,]; |
|
764 | + "UUID" => $payloadUUID, ]; |
|
765 | 765 | \core\common\Entity::outOfThePotatoes(); |
766 | 766 | return $retArray; |
767 | 767 | } |
@@ -779,7 +779,7 @@ discard block |
||
779 | 779 | } |
780 | 780 | $expiryTime = new \DateTime($this->clientCert['certObject']->expiry); |
781 | 781 | return "<key>RemovalDate</key> |
782 | - <date>" . $expiryTime->format("Y-m-d") . "T" . $expiryTime->format("H:i:s") . "Z</date>"; |
|
782 | + <date>" . $expiryTime->format("Y-m-d")."T".$expiryTime->format("H:i:s")."Z</date>"; |
|
783 | 783 | } |
784 | 784 | |
785 | 785 | /** |
@@ -801,27 +801,27 @@ discard block |
||
801 | 801 | $stream = " |
802 | 802 | <dict> |
803 | 803 | <key>PayloadCertificateFileName</key> |
804 | - <string>" . $ca['uuid'] . ".der</string> |
|
804 | + <string>" . $ca['uuid'].".der</string> |
|
805 | 805 | <key>PayloadContent</key> |
806 | 806 | <data> |
807 | -" . $trimmedPem . "</data> |
|
807 | +" . $trimmedPem."</data> |
|
808 | 808 | <key>PayloadDescription</key> |
809 | - <string>" . sprintf(_("The %s Certification Authority"), \core\common\Entity::$nomenclature_idp) . "</string> |
|
809 | + <string>" . sprintf(_("The %s Certification Authority"), \core\common\Entity::$nomenclature_idp)."</string> |
|
810 | 810 | <key>PayloadDisplayName</key> |
811 | 811 | <string>" . |
812 | 812 | /// example: "Identity Provider CA #1 (Root)" |
813 | - sprintf(_("%s CA #%d (%s)" ), |
|
813 | + sprintf(_("%s CA #%d (%s)"), |
|
814 | 814 | \core\common\Entity::$nomenclature_idp, |
815 | - count($this->CAsAccountedFor)+1, |
|
816 | - ($ca['root'] ? _("Root") : _("Intermediate"))) . |
|
815 | + count($this->CAsAccountedFor) + 1, |
|
816 | + ($ca['root'] ? _("Root") : _("Intermediate"))). |
|
817 | 817 | "</string> |
818 | 818 | <key>PayloadIdentifier</key> |
819 | - <string>" . self::IPHONE_PAYLOAD_PREFIX . ".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
|
819 | + <string>" . self::IPHONE_PAYLOAD_PREFIX.".$this->massagedConsortium.$this->massagedCountry.$this->massagedInst.$this->massagedProfile.credential.$this->caSerial</string> |
|
820 | 820 | <key>PayloadOrganization</key> |
821 | - <string>" . $this->massagedConsortium . ".1x-config.org</string> |
|
821 | + <string>".$this->massagedConsortium.".1x-config.org</string> |
|
822 | 822 | <key>PayloadType</key> |
823 | 823 | <string>com.apple.security.root</string> |
824 | - <key>PayloadUUID</key><string>" . $ca['uuid'] . "</string> |
|
824 | + <key>PayloadUUID</key><string>" . $ca['uuid']."</string> |
|
825 | 825 | <key>PayloadVersion</key> |
826 | 826 | <integer>1</integer> |
827 | 827 | </dict>"; |
@@ -143,7 +143,7 @@ discard block |
||
143 | 143 | $dom = new \DOMDocument('1.0', 'utf-8'); |
144 | 144 | $root = $dom->createElement($rootname); |
145 | 145 | $dom->appendChild($root); |
146 | - $ns = $dom->createAttributeNS( 'http://www.w3.org/2001/XMLSchema-instance', 'xsi:noNamespaceSchemaLocation' ); |
|
146 | + $ns = $dom->createAttributeNS('http://www.w3.org/2001/XMLSchema-instance', 'xsi:noNamespaceSchemaLocation'); |
|
147 | 147 | $ns->value = "eap-metadata.xsd"; |
148 | 148 | $root->appendChild($ns); |
149 | 149 | |
@@ -193,7 +193,7 @@ discard block |
||
193 | 193 | $authMethods = new \core\DeviceXMLmain(); |
194 | 194 | $authMethods->setChild('AuthenticationMethod', $this->authMethodsList); |
195 | 195 | $eapIdp->setChild('AuthenticationMethods', $authMethods); |
196 | - $eapIdp->setChild('CredentialApplicability', $this->getCredentialApplicability($ssids,$oids)); |
|
196 | + $eapIdp->setChild('CredentialApplicability', $this->getCredentialApplicability($ssids, $oids)); |
|
197 | 197 | // TODO $eap_idp->setChild('ValidUntil',$this->getValidUntil()); |
198 | 198 | $eapIdp->setChild('ProviderInfo', $this->providerInfo); |
199 | 199 | // TODO $eap_idp->setChild('VendorSpecific',$this->getVendorSpecific()); |
@@ -20,7 +20,7 @@ |
||
20 | 20 | */ |
21 | 21 | ?> |
22 | 22 | <?php |
23 | -require_once dirname(dirname(dirname(dirname(__FILE__)))) . "/config/_config.php"; |
|
23 | +require_once dirname(dirname(dirname(dirname(__FILE__))))."/config/_config.php"; |
|
24 | 24 | |
25 | 25 | $auth = new \web\lib\admin\Authentication(); |
26 | 26 | $languageInstance = new \core\common\Language(); |
@@ -26,7 +26,7 @@ discard block |
||
26 | 26 | */ |
27 | 27 | ?> |
28 | 28 | <?php |
29 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
29 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
30 | 30 | |
31 | 31 | function displaySilverbulletPropertyWidget(&$theProfile, $readonly, &$uiElements) { |
32 | 32 | ?> |
@@ -43,14 +43,14 @@ discard block |
||
43 | 43 | <ul style='margin:1px'> |
44 | 44 | <?php |
45 | 45 | foreach ($completeness as $missing_attrib) { |
46 | - echo "<li>" . $uiElements->displayName($missing_attrib) . "</li>"; |
|
46 | + echo "<li>".$uiElements->displayName($missing_attrib)."</li>"; |
|
47 | 47 | } |
48 | 48 | ?> |
49 | 49 | </ul> |
50 | 50 | </div> |
51 | 51 | <?php |
52 | 52 | } else { |
53 | - echo sprintf(_("You can create up to %d users."), $maxusers[0]['value']) . "<br/>" . sprintf(_("Their credentials will carry the name <strong>%s</strong>."), $theProfile->realm); |
|
53 | + echo sprintf(_("You can create up to %d users."), $maxusers[0]['value'])."<br/>".sprintf(_("Their credentials will carry the name <strong>%s</strong>."), $theProfile->realm); |
|
54 | 54 | } |
55 | 55 | ?> |
56 | 56 | <br/> |
@@ -59,7 +59,7 @@ discard block |
||
59 | 59 | if ($readonly === FALSE) { |
60 | 60 | ?> |
61 | 61 | <form action='edit_silverbullet.php?inst_id=<?php echo $theProfile->institution; ?>&profile_id=<?php echo $theProfile->identifier; ?>' method='POST'> |
62 | - <button <?php echo ( is_array($completeness) ? "disabled" : "" ); ?> type='submit' name='sb_action' value='sb_edit'><?php echo _("Manage User Base"); ?></button> |
|
62 | + <button <?php echo (is_array($completeness) ? "disabled" : ""); ?> type='submit' name='sb_action' value='sb_edit'><?php echo _("Manage User Base"); ?></button> |
|
63 | 63 | </form> |
64 | 64 | <?php |
65 | 65 | } |
@@ -94,21 +94,21 @@ discard block |
||
94 | 94 | $has_overrides = TRUE; |
95 | 95 | } |
96 | 96 | } |
97 | - $buffer_eaptypediv = "<div style='margin-bottom:40px; float:left;'>" . _("<strong>EAP Types</strong> (in order of preference):") . "<br/>"; |
|
97 | + $buffer_eaptypediv = "<div style='margin-bottom:40px; float:left;'>"._("<strong>EAP Types</strong> (in order of preference):")."<br/>"; |
|
98 | 98 | $typelist = $theProfile->getEapMethodsinOrderOfPreference(); |
99 | 99 | $allcomplete = TRUE; |
100 | 100 | foreach ($typelist as $eaptype) { |
101 | 101 | $buffer_eaptypediv .= $eaptype->getPrintableRep(); |
102 | 102 | $completeness = $theProfile->isEapTypeDefinitionComplete($eaptype); |
103 | 103 | if ($completeness === true) { |
104 | - $buffer_eaptypediv .= " <div class='acceptable'>" . _("OK") . "</div>"; |
|
104 | + $buffer_eaptypediv .= " <div class='acceptable'>"._("OK")."</div>"; |
|
105 | 105 | } else { |
106 | 106 | $buffer_eaptypediv .= " <div class='notacceptable'>"; |
107 | 107 | $buffer_eaptypediv .= _("Information needed!"); |
108 | 108 | if (is_array($completeness)) { |
109 | 109 | $buffer_eaptypediv .= "<ul style='margin:1px'>"; |
110 | 110 | foreach ($completeness as $missing_attrib) { |
111 | - $buffer_eaptypediv .= "<li>" . $uiElements->displayName($missing_attrib) . "</li>"; |
|
111 | + $buffer_eaptypediv .= "<li>".$uiElements->displayName($missing_attrib)."</li>"; |
|
112 | 112 | } |
113 | 113 | $buffer_eaptypediv .= "</ul>"; |
114 | 114 | } |
@@ -120,7 +120,7 @@ discard block |
||
120 | 120 | foreach ($attribs as $attrib) { |
121 | 121 | if ($attrib['level'] == \core\Options::LEVEL_METHOD && !preg_match("/^internal:/", $attrib['name']) && !$justOnce) { |
122 | 122 | $justOnce = TRUE; |
123 | - $buffer_eaptypediv .= "<img src='../resources/images/icons/Letter-E-blue-icon.png' alt='" . _("Options on EAP Method/Device level are in effect.") . "'>"; |
|
123 | + $buffer_eaptypediv .= "<img src='../resources/images/icons/Letter-E-blue-icon.png' alt='"._("Options on EAP Method/Device level are in effect.")."'>"; |
|
124 | 124 | } |
125 | 125 | } |
126 | 126 | $buffer_eaptypediv .= "<br/>"; |
@@ -166,11 +166,11 @@ discard block |
||
166 | 166 | if (\config\Master::FUNCTIONALITY_LOCATIONS['DIAGNOSTICS'] == "LOCAL") { |
167 | 167 | $diagUrl = "../diag/"; |
168 | 168 | } else { |
169 | - $diagUrl = \config\Master::FUNCTIONALITY_LOCATIONS['DIAGNOSTICS'] . "/diag/"; |
|
169 | + $diagUrl = \config\Master::FUNCTIONALITY_LOCATIONS['DIAGNOSTICS']."/diag/"; |
|
170 | 170 | } |
171 | 171 | ?> |
172 | - <form action='<?php echo $diagUrl . "action_realmcheck.php?inst_id=" . $theProfile->institution . "&profile_id=" . $theProfile->identifier ?>' method='post' accept-charset='UTF-8'> |
|
173 | - <input type='hidden' name='comefrom' value='<?php echo htmlspecialchars($link . $_SERVER['SCRIPT_NAME']); ?>'/> |
|
172 | + <form action='<?php echo $diagUrl."action_realmcheck.php?inst_id=".$theProfile->institution."&profile_id=".$theProfile->identifier ?>' method='post' accept-charset='UTF-8'> |
|
173 | + <input type='hidden' name='comefrom' value='<?php echo htmlspecialchars($link.$_SERVER['SCRIPT_NAME']); ?>'/> |
|
174 | 174 | <button type='submit' name='profile_action' value='check' <?php echo ($has_realm ? "" : "disabled='disabled'"); ?> title='<?php echo _("The realm can only be checked if you configure the realm!"); ?>'> |
175 | 175 | <?php echo _("Check realm reachability"); ?> |
176 | 176 | </button> |
@@ -203,9 +203,9 @@ discard block |
||
203 | 203 | ?> |
204 | 204 | <div style='display: flex;'> |
205 | 205 | <?php |
206 | - $idpLevelUrl = $link . dirname(dirname($_SERVER['SCRIPT_NAME'])) . "?idp=" . $theProfile->institution; |
|
207 | - $displayurl = $idpLevelUrl . "&profile=" . $theProfile->identifier; |
|
208 | - $QRurl = $idpLevelUrl . "&profile=" . $theProfile->identifier; |
|
206 | + $idpLevelUrl = $link.dirname(dirname($_SERVER['SCRIPT_NAME']))."?idp=".$theProfile->institution; |
|
207 | + $displayurl = $idpLevelUrl."&profile=".$theProfile->identifier; |
|
208 | + $QRurl = $idpLevelUrl."&profile=".$theProfile->identifier; |
|
209 | 209 | $qrCode = new \chillerlan\QRCode\QRCode(new \chillerlan\QRCode\QROptions([ |
210 | 210 | 'outputType' => \chillerlan\QRCode\QRCode::OUTPUT_IMAGE_PNG, |
211 | 211 | 'eccLevel' => \chillerlan\QRCode\QRCode::ECC_H, |
@@ -217,9 +217,9 @@ discard block |
||
217 | 217 | if (empty($rawQr)) { |
218 | 218 | throw new Exception("Something went seriously wrong during QR code generation!"); |
219 | 219 | } |
220 | - $uri = "data:image/png;base64," . base64_encode($uiElements->pngInjectConsortiumLogo($rawQr, web\lib\admin\UIElements::QRCODE_PIXELS_PER_SYMBOL)); |
|
220 | + $uri = "data:image/png;base64,".base64_encode($uiElements->pngInjectConsortiumLogo($rawQr, web\lib\admin\UIElements::QRCODE_PIXELS_PER_SYMBOL)); |
|
221 | 221 | $size = getimagesize($uri); |
222 | - echo "<img width='" . ($size[0] / 4) . "' height='" . ($size[1] / 4) . "' src='$uri' alt='QR-code'/>"; |
|
222 | + echo "<img width='".($size[0] / 4)."' height='".($size[1] / 4)."' src='$uri' alt='QR-code'/>"; |
|
223 | 223 | |
224 | 224 | //echo "<nobr>$displayurl</nobr></a>"; |
225 | 225 | echo "<p>$displayurl</p></a>"; |
@@ -263,7 +263,7 @@ discard block |
||
263 | 263 | <h2><?php |
264 | 264 | switch ($deploymentObject->consortium) { |
265 | 265 | case "eduroam": |
266 | - $displayname = config\ConfAssistant::CONSORTIUM['name'] . " " . core\DeploymentManaged::PRODUCTNAME; |
|
266 | + $displayname = config\ConfAssistant::CONSORTIUM['name']." ".core\DeploymentManaged::PRODUCTNAME; |
|
267 | 267 | break; |
268 | 268 | case "OpenRoaming": |
269 | 269 | $displayname = "OpenRoaming ANP"; |
@@ -271,7 +271,7 @@ discard block |
||
271 | 271 | default: |
272 | 272 | throw new Exception("We are supposed to operate on a roaming consortium we don't know."); |
273 | 273 | } |
274 | - echo $displayname . " (<span style='color:" . ( $deploymentObject->status == \core\AbstractDeployment::INACTIVE ? "red;'>" . _("inactive") : "green;'>" . _("active") ) . "</span>)"; |
|
274 | + echo $displayname." (<span style='color:".($deploymentObject->status == \core\AbstractDeployment::INACTIVE ? "red;'>"._("inactive") : "green;'>"._("active"))."</span>)"; |
|
275 | 275 | ?></h2> |
276 | 276 | <table> |
277 | 277 | <caption><?php echo _("Deployment Details"); ?></caption> |
@@ -285,13 +285,13 @@ discard block |
||
285 | 285 | <td><strong><?php echo _("Your primary RADIUS server") ?></strong><br/> |
286 | 286 | <?php |
287 | 287 | if ($deploymentObject->host1_v4 !== NULL) { |
288 | - echo _("IPv4") . ": " . $deploymentObject->host1_v4; |
|
288 | + echo _("IPv4").": ".$deploymentObject->host1_v4; |
|
289 | 289 | } |
290 | 290 | if ($deploymentObject->host1_v4 !== NULL && $deploymentObject->host1_v6 !== NULL) { |
291 | 291 | echo "<br/>"; |
292 | 292 | } |
293 | 293 | if ($deploymentObject->host1_v6 !== NULL) { |
294 | - echo _("IPv6") . ": " . $deploymentObject->host1_v6; |
|
294 | + echo _("IPv6").": ".$deploymentObject->host1_v6; |
|
295 | 295 | } |
296 | 296 | ?> |
297 | 297 | </td> |
@@ -299,9 +299,9 @@ discard block |
||
299 | 299 | <td><?php echo $deploymentObject->port1; ?></td> |
300 | 300 | <td> |
301 | 301 | <?php |
302 | - echo "<img src='" . $radiusMessages[$deploymentObject->radius_status_1]['icon'] . |
|
303 | - "' alt='" . $radiusMessages[$deploymentObject->radius_status_1]['text'] . |
|
304 | - "' title='" . $radiusMessages[$deploymentObject->radius_status_1]['text'] . "'>"; |
|
302 | + echo "<img src='".$radiusMessages[$deploymentObject->radius_status_1]['icon']. |
|
303 | + "' alt='".$radiusMessages[$deploymentObject->radius_status_1]['text']. |
|
304 | + "' title='".$radiusMessages[$deploymentObject->radius_status_1]['text']."'>"; |
|
305 | 305 | ?> |
306 | 306 | </td> |
307 | 307 | </tr> |
@@ -309,22 +309,22 @@ discard block |
||
309 | 309 | <td><strong><?php echo _("Your backup RADIUS server") ?><br/></strong> |
310 | 310 | <?php |
311 | 311 | if ($deploymentObject->host2_v4 !== NULL) { |
312 | - echo _("IPv4") . ": " . $deploymentObject->host2_v4; |
|
312 | + echo _("IPv4").": ".$deploymentObject->host2_v4; |
|
313 | 313 | } |
314 | 314 | if ($deploymentObject->host2_v4 !== NULL && $deploymentObject->host2_v6 !== NULL) { |
315 | 315 | echo "<br/>"; |
316 | 316 | } |
317 | 317 | if ($deploymentObject->host2_v6 !== NULL) { |
318 | - echo _("IPv6") . ": " . $deploymentObject->host2_v6; |
|
318 | + echo _("IPv6").": ".$deploymentObject->host2_v6; |
|
319 | 319 | } |
320 | 320 | ?></td> |
321 | 321 | <td><?php echo _("RADIUS port number: ") ?></td> |
322 | 322 | <td><?php echo $deploymentObject->port2; ?></td> |
323 | 323 | <td> |
324 | 324 | <?php |
325 | - echo "<img src='" . $radiusMessages[$deploymentObject->radius_status_2]['icon'] . |
|
326 | - "' alt='" . $radiusMessages[$deploymentObject->radius_status_2]['text'] . |
|
327 | - "' title='" . $radiusMessages[$deploymentObject->radius_status_2]['text'] . "'>"; |
|
325 | + echo "<img src='".$radiusMessages[$deploymentObject->radius_status_2]['icon']. |
|
326 | + "' alt='".$radiusMessages[$deploymentObject->radius_status_2]['text']. |
|
327 | + "' title='".$radiusMessages[$deploymentObject->radius_status_2]['text']."'>"; |
|
328 | 328 | ?> |
329 | 329 | </td> |
330 | 330 | </tr> |
@@ -376,12 +376,12 @@ discard block |
||
376 | 376 | if (array_key_exists('FAILURE', $res) && $res['FAILURE'] > 0) { |
377 | 377 | echo '<br>'; |
378 | 378 | if ($res['FAILURE'] == 2) { |
379 | - echo ' <span style="color: red;">' . _("Activation failure.") . '</span>'; |
|
379 | + echo ' <span style="color: red;">'._("Activation failure.").'</span>'; |
|
380 | 380 | } else { |
381 | 381 | if (isset($_GET['res'][1]) && $_GET['res']['1'] == 'FAILURE') { |
382 | - echo ' <span style="color: red;">' . _("Activation failure for your primary RADIUS server.") . '</span>'; |
|
382 | + echo ' <span style="color: red;">'._("Activation failure for your primary RADIUS server.").'</span>'; |
|
383 | 383 | } else { |
384 | - echo ' <span style="color: red;">' . _("Activation failure for your backup RADIUS server.") . '</span>'; |
|
384 | + echo ' <span style="color: red;">'._("Activation failure for your backup RADIUS server.").'</span>'; |
|
385 | 385 | } |
386 | 386 | } |
387 | 387 | } |
@@ -408,12 +408,12 @@ discard block |
||
408 | 408 | if ($res['FAILURE'] > 0) { |
409 | 409 | echo '<br>'; |
410 | 410 | if ($res['FAILURE'] == 2) { |
411 | - echo ' <span style="color: red;">' . _("Failure during deactivation, your request is queued for handling") . '</span>'; |
|
411 | + echo ' <span style="color: red;">'._("Failure during deactivation, your request is queued for handling").'</span>'; |
|
412 | 412 | } else { |
413 | 413 | if (isset($_GET['res'][1]) && $_GET['res']['1'] == 'FAILURE') { |
414 | - echo ' <span style="color: red;">' . _("Deactivation failure for your primary RADIUS server, your request is queued.") . '</span>'; |
|
414 | + echo ' <span style="color: red;">'._("Deactivation failure for your primary RADIUS server, your request is queued.").'</span>'; |
|
415 | 415 | } else { |
416 | - echo ' <span style="color: red;">' . _("Deactivation failure for your backup RADIUS server, your request is queued.") . '</span>'; |
|
416 | + echo ' <span style="color: red;">'._("Deactivation failure for your backup RADIUS server, your request is queued.").'</span>'; |
|
417 | 417 | } |
418 | 418 | } |
419 | 419 | } |
@@ -544,7 +544,7 @@ discard block |
||
544 | 544 | </button> |
545 | 545 | </div> |
546 | 546 | </form> |
547 | - <form method='post' action='inc/profileAutodetectCA.inc.php?inst_id=<?php echo $my_inst->identifier;?>' onsubmit='popupRedirectWindow(this); return false;' accept-charset='UTF-8'> |
|
547 | + <form method='post' action='inc/profileAutodetectCA.inc.php?inst_id=<?php echo $my_inst->identifier; ?>' onsubmit='popupRedirectWindow(this); return false;' accept-charset='UTF-8'> |
|
548 | 548 | <div> |
549 | 549 | <button type='submit' name='profile_action' value='new'> |
550 | 550 | <?php echo _("New RADIUS/EAP profile (autodetect server details) ..."); ?> |
@@ -616,7 +616,7 @@ discard block |
||
616 | 616 | <div> |
617 | 617 | <input type="hidden" name="consortium" value="eduroam"/> |
618 | 618 | <button type='submit' <?php echo ($hasMail > 0 ? "" : "disabled"); ?> name='profile_action' value='new'> |
619 | - <?php echo sprintf(_("Add %s deployment ..."), \config\ConfAssistant::CONSORTIUM['name'] . " " . \core\DeploymentManaged::PRODUCTNAME); ?> |
|
619 | + <?php echo sprintf(_("Add %s deployment ..."), \config\ConfAssistant::CONSORTIUM['name']." ".\core\DeploymentManaged::PRODUCTNAME); ?> |
|
620 | 620 | </button> |
621 | 621 | |
622 | 622 | </div> |