@@ -27,9 +27,9 @@ discard block |
||
27 | 27 | #private const EDUPKI_ENDPOINT_PUBLIC = "https://pki.edupki.org/edupki-ca/cgi-bin/pub/soap?wsdl=1"; |
28 | 28 | #private const EDUPKI_ENDPOINT_RA = "https://ra.edupki.org/edupki-ca/cgi-bin/ra/soap?wsdl=1"; |
29 | 29 | |
30 | - private const LOCATION_RA_CERT = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
31 | - private const LOCATION_RA_KEY = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
32 | - private const LOCATION_WEBROOT = ROOT . "/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
30 | + private const LOCATION_RA_CERT = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem"; |
|
31 | + private const LOCATION_RA_KEY = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey"; |
|
32 | + private const LOCATION_WEBROOT = ROOT."/config/SilverbulletClientCerts/eduPKI-webserver-root.pem"; |
|
33 | 33 | private const EDUPKI_RA_ID = 700; |
34 | 34 | private const EDUPKI_CERT_PROFILE_BOTH = "Radius Server SOAP"; |
35 | 35 | private const EDUPKI_CERT_PROFILE_IDP = "Radius Server SOAP"; |
@@ -49,13 +49,13 @@ discard block |
||
49 | 49 | parent::__construct(); |
50 | 50 | |
51 | 51 | if (stat(CertificationAuthorityEduPkiServer::LOCATION_RA_CERT) === FALSE) { |
52 | - throw new Exception("RA operator PEM file not found: " . CertificationAuthorityEduPkiServer::LOCATION_RA_CERT); |
|
52 | + throw new Exception("RA operator PEM file not found: ".CertificationAuthorityEduPkiServer::LOCATION_RA_CERT); |
|
53 | 53 | } |
54 | 54 | if (stat(CertificationAuthorityEduPkiServer::LOCATION_RA_KEY) === FALSE) { |
55 | - throw new Exception("RA operator private key file not found: " . CertificationAuthorityEduPkiServer::LOCATION_RA_KEY); |
|
55 | + throw new Exception("RA operator private key file not found: ".CertificationAuthorityEduPkiServer::LOCATION_RA_KEY); |
|
56 | 56 | } |
57 | 57 | if (stat(CertificationAuthorityEduPkiServer::LOCATION_WEBROOT) === FALSE) { |
58 | - throw new Exception("CA website root CA file not found: " . CertificationAuthorityEduPkiServer::LOCATION_WEBROOT); |
|
58 | + throw new Exception("CA website root CA file not found: ".CertificationAuthorityEduPkiServer::LOCATION_WEBROOT); |
|
59 | 59 | } |
60 | 60 | } |
61 | 61 | |
@@ -122,22 +122,22 @@ discard block |
||
122 | 122 | throw new Exception("Unexpected policies requested."); |
123 | 123 | } |
124 | 124 | $altArray = [# Array mit den Subject Alternative Names |
125 | - "email:" . $csr["USERMAIL"] |
|
125 | + "email:".$csr["USERMAIL"] |
|
126 | 126 | ]; |
127 | 127 | foreach ($csr["ALTNAMES"] as $oneAltName) { |
128 | - $altArray[] = "DNS:" . $oneAltName; |
|
128 | + $altArray[] = "DNS:".$oneAltName; |
|
129 | 129 | } |
130 | 130 | $soapPub = $this->initEduPKISoapSession("PUBLIC"); |
131 | 131 | $this->loggerInstance->debug(5, "FIRST ACTUAL SOAP REQUEST (Public, newRequest)!\n"); |
132 | - $this->loggerInstance->debug(5, "PARAM_1: " . CertificationAuthorityEduPkiServer::EDUPKI_RA_ID . "\n"); |
|
133 | - $this->loggerInstance->debug(5, "PARAM_2: " . $csr["CSR_STRING"] . "\n"); |
|
132 | + $this->loggerInstance->debug(5, "PARAM_1: ".CertificationAuthorityEduPkiServer::EDUPKI_RA_ID."\n"); |
|
133 | + $this->loggerInstance->debug(5, "PARAM_2: ".$csr["CSR_STRING"]."\n"); |
|
134 | 134 | $this->loggerInstance->debug(5, "PARAM_3: "); |
135 | 135 | $this->loggerInstance->debug(5, $altArray); |
136 | - $this->loggerInstance->debug(5, "PARAM_4: " . $profile . "\n"); |
|
137 | - $this->loggerInstance->debug(5, "PARAM_5: " . sha1("notused") . "\n"); |
|
138 | - $this->loggerInstance->debug(5, "PARAM_6: " . $csr["USERNAME"] . "\n"); |
|
139 | - $this->loggerInstance->debug(5, "PARAM_7: " . $csr["USERMAIL"] . "\n"); |
|
140 | - $this->loggerInstance->debug(5, "PARAM_8: " . ProfileSilverbullet::PRODUCTNAME . "\n"); |
|
136 | + $this->loggerInstance->debug(5, "PARAM_4: ".$profile."\n"); |
|
137 | + $this->loggerInstance->debug(5, "PARAM_5: ".sha1("notused")."\n"); |
|
138 | + $this->loggerInstance->debug(5, "PARAM_6: ".$csr["USERNAME"]."\n"); |
|
139 | + $this->loggerInstance->debug(5, "PARAM_7: ".$csr["USERMAIL"]."\n"); |
|
140 | + $this->loggerInstance->debug(5, "PARAM_8: ".ProfileSilverbullet::PRODUCTNAME."\n"); |
|
141 | 141 | $this->loggerInstance->debug(5, "PARAM_9: false\n"); |
142 | 142 | $soapNewRequest = $soapPub->newRequest( |
143 | 143 | CertificationAuthorityEduPkiServer::EDUPKI_RA_ID, # RA-ID |
@@ -159,11 +159,11 @@ discard block |
||
159 | 159 | } catch (Exception $e) { |
160 | 160 | // PHP 7.1 can do this much better |
161 | 161 | if (is_soap_fault($e)) { |
162 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: { |
|
162 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: { |
|
163 | 163 | $e->faultstring |
164 | 164 | }\n"); |
165 | 165 | } |
166 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
166 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
167 | 167 | } |
168 | 168 | try { |
169 | 169 | $soap = $this->initEduPKISoapSession("RA"); |
@@ -195,7 +195,7 @@ discard block |
||
195 | 195 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
196 | 196 | // rather than just using the string. Grr. |
197 | 197 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
198 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapCleartext); |
|
198 | + file_put_contents($tempdir['dir']."/content.txt", $soapCleartext); |
|
199 | 199 | // retrieve our RA cert from filesystem |
200 | 200 | // the RA certificates are not needed right now because we |
201 | 201 | // have resorted to S/MIME signatures with openssl command-line |
@@ -207,7 +207,7 @@ discard block |
||
207 | 207 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
208 | 208 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
209 | 209 | $this->loggerInstance->debug(2, "Actual content to be signed is this:\n $soapCleartext\n"); |
210 | - $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPkiServer::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPkiServer::LOCATION_RA_CERT; |
|
210 | + $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPkiServer::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPkiServer::LOCATION_RA_CERT; |
|
211 | 211 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
212 | 212 | $output = []; |
213 | 213 | $return = 999; |
@@ -216,21 +216,21 @@ discard block |
||
216 | 216 | throw new Exception("Non-zero return value from openssl smime!"); |
217 | 217 | } |
218 | 218 | // and get the signature blob back from the filesystem |
219 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
219 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
220 | 220 | $this->loggerInstance->debug(5, "Request for server approveRequest has parameters:\n"); |
221 | - $this->loggerInstance->debug(5, $soapReqnum . "\n"); |
|
222 | - $this->loggerInstance->debug(5, $soapCleartext . "\n"); // PHP magically encodes this as base64 while sending! |
|
223 | - $this->loggerInstance->debug(5, $detachedSig . "\n"); |
|
221 | + $this->loggerInstance->debug(5, $soapReqnum."\n"); |
|
222 | + $this->loggerInstance->debug(5, $soapCleartext."\n"); // PHP magically encodes this as base64 while sending! |
|
223 | + $this->loggerInstance->debug(5, $detachedSig."\n"); |
|
224 | 224 | $soapIssueCert = $soap->approveRequest($soapReqnum, $soapCleartext, $detachedSig); |
225 | - $this->loggerInstance->debug(5, "approveRequest Request was: \n" . $soap->__getLastRequest()); |
|
226 | - $this->loggerInstance->debug(5, "approveRequest Response was: \n" . $soap->__getLastResponse()); |
|
225 | + $this->loggerInstance->debug(5, "approveRequest Request was: \n".$soap->__getLastRequest()); |
|
226 | + $this->loggerInstance->debug(5, "approveRequest Response was: \n".$soap->__getLastResponse()); |
|
227 | 227 | if ($soapIssueCert === FALSE) { |
228 | 228 | throw new Exception("The locally approved request was NOT processed by the CA."); |
229 | 229 | } |
230 | 230 | } catch (SoapFault $e) { |
231 | - throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
231 | + throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
232 | 232 | } catch (Exception $e) { |
233 | - throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage()); |
|
233 | + throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage()); |
|
234 | 234 | } |
235 | 235 | return $soapReqnum; |
236 | 236 | } |
@@ -282,9 +282,9 @@ discard block |
||
282 | 282 | throw new Exception("CAInfo has no root certificate for us!"); |
283 | 283 | } |
284 | 284 | } catch (SoapFault $e) { |
285 | - throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
285 | + throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n"); |
|
286 | 286 | } catch (Exception $e) { |
287 | - throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage()); |
|
287 | + throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage()); |
|
288 | 288 | } |
289 | 289 | return [ |
290 | 290 | "CERT" => openssl_x509_read($parsedCert['pem']), |
@@ -317,12 +317,12 @@ discard block |
||
317 | 317 | // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file |
318 | 318 | // rather than just using the string. Grr. |
319 | 319 | $tempdir = \core\common\Entity::createTemporaryDirectory("test"); |
320 | - file_put_contents($tempdir['dir'] . "/content.txt", $soapRawRevRequest); |
|
320 | + file_put_contents($tempdir['dir']."/content.txt", $soapRawRevRequest); |
|
321 | 321 | // retrieve our RA cert from filesystem |
322 | 322 | // sign the data, using cmdline because openssl_pkcs7_sign produces strange results |
323 | 323 | // -binary didn't help, nor switch -md to sha1 sha256 or sha512 |
324 | 324 | $this->loggerInstance->debug(5, "Actual content to be signed is this:\n$soapRawRevRequest\n"); |
325 | - $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPkiServer::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPkiServer::LOCATION_RA_CERT; |
|
325 | + $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPkiServer::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPkiServer::LOCATION_RA_CERT; |
|
326 | 326 | $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n"); |
327 | 327 | $output = []; |
328 | 328 | $return = 999; |
@@ -331,7 +331,7 @@ discard block |
||
331 | 331 | throw new Exception("Non-zero return value from openssl smime!"); |
332 | 332 | } |
333 | 333 | // and get the signature blob back from the filesystem |
334 | - $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt")); |
|
334 | + $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt")); |
|
335 | 335 | $soapIssueRev = $soap->approveRevocationRequest($soapRevocationSerial, $soapRawRevRequest, $detachedSig); |
336 | 336 | if ($soapIssueRev === FALSE) { |
337 | 337 | throw new Exception("The locally approved revocation request was NOT processed by the CA."); |
@@ -339,9 +339,9 @@ discard block |
||
339 | 339 | } catch (Exception $e) { |
340 | 340 | // PHP 7.1 can do this much better |
341 | 341 | if (is_soap_fault($e)) { |
342 | - throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: {$e->faultstring}\n"); |
|
342 | + throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: {$e->faultstring}\n"); |
|
343 | 343 | } |
344 | - throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage()); |
|
344 | + throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage()); |
|
345 | 345 | } |
346 | 346 | } |
347 | 347 | |
@@ -441,9 +441,9 @@ discard block |
||
441 | 441 | */ |
442 | 442 | public function soapToXmlInteger($x) |
443 | 443 | { |
444 | - return '<' . $x[0] . '>' |
|
444 | + return '<'.$x[0].'>' |
|
445 | 445 | . htmlentities($x[1], ENT_NOQUOTES | ENT_XML1) |
446 | - . '</' . $x[0] . '>'; |
|
446 | + . '</'.$x[0].'>'; |
|
447 | 447 | } |
448 | 448 | |
449 | 449 | /** |
@@ -462,9 +462,9 @@ discard block |
||
462 | 462 | // dump private key into directory |
463 | 463 | $outstring = ""; |
464 | 464 | openssl_pkey_export($privateKey, $outstring); |
465 | - file_put_contents($tempdir . "/pkey.pem", $outstring); |
|
465 | + file_put_contents($tempdir."/pkey.pem", $outstring); |
|
466 | 466 | // PHP can only do one DC in the Subject. But we need three. |
467 | - $execCmd = \config\Master::PATHS['openssl'] . " req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$fed/CN=$username/emailAddress=$username"; |
|
467 | + $execCmd = \config\Master::PATHS['openssl']." req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$fed/CN=$username/emailAddress=$username"; |
|
468 | 468 | $this->loggerInstance->debug(2, "Calling openssl req with following cmdline: $execCmd\n"); |
469 | 469 | $output = []; |
470 | 470 | $return = 999; |
@@ -110,7 +110,7 @@ discard block |
||
110 | 110 | public function __construct() |
111 | 111 | { |
112 | 112 | $this->loggerInstance = new Logging(); |
113 | - $this->loggerInstance->debug(4, "--- BEGIN constructing class " . get_class($this) . " .\n"); |
|
113 | + $this->loggerInstance->debug(4, "--- BEGIN constructing class ".get_class($this)." .\n"); |
|
114 | 114 | $this->languageInstance = new Language(); |
115 | 115 | Entity::intoThePotatoes("core"); |
116 | 116 | // some config elements are displayable. We need some dummies to |
@@ -129,13 +129,13 @@ discard block |
||
129 | 129 | $dummy_organisation2a = _("organization"); |
130 | 130 | $dummy_organisation3 = _("entity"); |
131 | 131 | // and do something useless with the strings so that there's no "unused" complaint |
132 | - if (strlen($dummy_NRO . $dummy_idp1 . $dummy_idp2 . $dummy_idp3 . $dummy_hotspot1 . $dummy_hotspot2 . $dummy_hotspot3 . $dummy_organisation1 . $dummy_organisation2 . $dummy_organisation2a . $dummy_organisation3) < 0) { |
|
132 | + if (strlen($dummy_NRO.$dummy_idp1.$dummy_idp2.$dummy_idp3.$dummy_hotspot1.$dummy_hotspot2.$dummy_hotspot3.$dummy_organisation1.$dummy_organisation2.$dummy_organisation2a.$dummy_organisation3) < 0) { |
|
133 | 133 | throw new Exception("Strings are usually not shorter than 0 characters. We've encountered a string blackhole."); |
134 | 134 | } |
135 | - $xyzVariableFed = \config\ConfAssistant::CONSORTIUM['nomenclature_federation'] . ""; |
|
136 | - $xyzVariableIdP = \config\ConfAssistant::CONSORTIUM['nomenclature_idp'] . ""; |
|
137 | - $xyzVariableHotspot = \config\ConfAssistant::CONSORTIUM['nomenclature_hotspot'] . ""; |
|
138 | - $xyzVariableParticipant = \config\ConfAssistant::CONSORTIUM['nomenclature_participant'] . ""; |
|
135 | + $xyzVariableFed = \config\ConfAssistant::CONSORTIUM['nomenclature_federation'].""; |
|
136 | + $xyzVariableIdP = \config\ConfAssistant::CONSORTIUM['nomenclature_idp'].""; |
|
137 | + $xyzVariableHotspot = \config\ConfAssistant::CONSORTIUM['nomenclature_hotspot'].""; |
|
138 | + $xyzVariableParticipant = \config\ConfAssistant::CONSORTIUM['nomenclature_participant'].""; |
|
139 | 139 | Entity::$nomenclature_fed = _($xyzVariableFed); |
140 | 140 | Entity::$nomenclature_idp = _($xyzVariableIdP); |
141 | 141 | Entity::$nomenclature_hotspot = _($xyzVariableHotspot); |
@@ -151,7 +151,7 @@ discard block |
||
151 | 151 | */ |
152 | 152 | public function __destruct() |
153 | 153 | { |
154 | - (new Logging())->debug(5, "--- KILL Destructing class " . get_class($this) . " .\n"); |
|
154 | + (new Logging())->debug(5, "--- KILL Destructing class ".get_class($this)." .\n"); |
|
155 | 155 | } |
156 | 156 | |
157 | 157 | /** |
@@ -184,7 +184,7 @@ discard block |
||
184 | 184 | public static function createTemporaryDirectory($purpose = 'installer', $failIsFatal = 1) |
185 | 185 | { |
186 | 186 | $loggerInstance = new Logging(); |
187 | - $name = md5(time() . rand()); |
|
187 | + $name = md5(time().rand()); |
|
188 | 188 | $path = ROOT; |
189 | 189 | switch ($purpose) { |
190 | 190 | case 'silverbullet': |
@@ -202,7 +202,7 @@ discard block |
||
202 | 202 | default: |
203 | 203 | throw new Exception("unable to create temporary directory due to unknown purpose: $purpose\n"); |
204 | 204 | } |
205 | - $tmpDir = $path . '/' . $name; |
|
205 | + $tmpDir = $path.'/'.$name; |
|
206 | 206 | $loggerInstance->debug(4, "temp dir: $purpose : $tmpDir\n"); |
207 | 207 | if (!mkdir($tmpDir, 0700, true)) { |
208 | 208 | if ($failIsFatal) { |
@@ -223,7 +223,7 @@ discard block |
||
223 | 223 | */ |
224 | 224 | public static function rrmdir($dir) |
225 | 225 | { |
226 | - foreach (glob($dir . '/*') as $file) { |
|
226 | + foreach (glob($dir.'/*') as $file) { |
|
227 | 227 | if (is_dir($file)) { |
228 | 228 | Entity::rrmdir($file); |
229 | 229 | } else { |
@@ -249,12 +249,12 @@ discard block |
||
249 | 249 | } |
250 | 250 | // these substr() are guaranteed to yield actual string data, as the |
251 | 251 | // base string is an MD5 hash - has sufficient length |
252 | - $uuid = /** @scrutinizer ignore-type */ substr($chars, 0, 8) . '-'; |
|
253 | - $uuid .= /** @scrutinizer ignore-type */ substr($chars, 8, 4) . '-'; |
|
254 | - $uuid .= /** @scrutinizer ignore-type */ substr($chars, 12, 4) . '-'; |
|
255 | - $uuid .= /** @scrutinizer ignore-type */ substr($chars, 16, 4) . '-'; |
|
252 | + $uuid = /** @scrutinizer ignore-type */ substr($chars, 0, 8).'-'; |
|
253 | + $uuid .= /** @scrutinizer ignore-type */ substr($chars, 8, 4).'-'; |
|
254 | + $uuid .= /** @scrutinizer ignore-type */ substr($chars, 12, 4).'-'; |
|
255 | + $uuid .= /** @scrutinizer ignore-type */ substr($chars, 16, 4).'-'; |
|
256 | 256 | $uuid .= /** @scrutinizer ignore-type */ substr($chars, 20, 12); |
257 | - return $prefix . $uuid; |
|
257 | + return $prefix.$uuid; |
|
258 | 258 | } |
259 | 259 | |
260 | 260 | /** |
@@ -295,7 +295,7 @@ discard block |
||
295 | 295 | for ($i = count($trace); $i--; $i > 0) { |
296 | 296 | if (isset($trace[$i - 1]['class']) && preg_match('/Entity/', $trace[$i - 1]['class'])) { |
297 | 297 | if ($showTrace) { |
298 | - echo "FOUND caller: " . /** @scrutinizer ignore-type */ print_r($trace[$i], true) . " - class is " . $trace[$i]['class']; |
|
298 | + echo "FOUND caller: "./** @scrutinizer ignore-type */ print_r($trace[$i], true)." - class is ".$trace[$i]['class']; |
|
299 | 299 | } |
300 | 300 | $caller = $trace[$i]; |
301 | 301 | break; |
@@ -305,8 +305,8 @@ discard block |
||
305 | 305 | // otherwise, on the filename relative to ROOT |
306 | 306 | $myName = $caller['class'] ?? substr($caller['file'], strlen(ROOT)); |
307 | 307 | if ($showTrace === TRUE) { |
308 | - echo "<pre>" . /** @scrutinizer ignore-type */ print_r($trace, true) . "</pre>"; |
|
309 | - echo "CLASS = " . $myName . "<br/>"; |
|
308 | + echo "<pre>"./** @scrutinizer ignore-type */ print_r($trace, true)."</pre>"; |
|
309 | + echo "CLASS = ".$myName."<br/>"; |
|
310 | 310 | } |
311 | 311 | if (preg_match("/diag/", $myName) == 1) { |
312 | 312 | $ret = "diagnostics"; |
@@ -340,11 +340,11 @@ discard block |
||
340 | 340 | if ($catalogue === NULL) { |
341 | 341 | $theCatalogue = Entity::determineOwnCatalogue($trace); |
342 | 342 | textdomain($theCatalogue); |
343 | - bindtextdomain($theCatalogue, ROOT . "/translation/"); |
|
343 | + bindtextdomain($theCatalogue, ROOT."/translation/"); |
|
344 | 344 | bind_textdomain_codeset($theCatalogue, "UTF-8"); |
345 | 345 | } else { |
346 | 346 | textdomain($catalogue); |
347 | - bindtextdomain($catalogue, ROOT . "/translation/"); |
|
347 | + bindtextdomain($catalogue, ROOT."/translation/"); |
|
348 | 348 | bind_textdomain_codeset($catalogue, "UTF-8"); |
349 | 349 | } |
350 | 350 | } |
@@ -105,9 +105,9 @@ discard block |
||
105 | 105 | |
106 | 106 | $attributesLowLevel = array_merge($this->deviceLevelAttributes, $this->eapLevelAttributes); |
107 | 107 | |
108 | - $this->loggerInstance->debug(5, "Device-Level Attributes: " . /** @scrutinizer ignore-type */ print_r($this->deviceLevelAttributes, true)); |
|
109 | - $this->loggerInstance->debug(5, "EAP-Level Attributes: " . /** @scrutinizer ignore-type */ print_r($this->eapLevelAttributes, true)); |
|
110 | - $this->loggerInstance->debug(5, "All low-Level Attributes: " . /** @scrutinizer ignore-type */ print_r($attributesLowLevel, true)); |
|
108 | + $this->loggerInstance->debug(5, "Device-Level Attributes: "./** @scrutinizer ignore-type */ print_r($this->deviceLevelAttributes, true)); |
|
109 | + $this->loggerInstance->debug(5, "EAP-Level Attributes: "./** @scrutinizer ignore-type */ print_r($this->eapLevelAttributes, true)); |
|
110 | + $this->loggerInstance->debug(5, "All low-Level Attributes: "./** @scrutinizer ignore-type */ print_r($attributesLowLevel, true)); |
|
111 | 111 | |
112 | 112 | // now fetch and merge profile-level attributes if not already set on deeper level |
113 | 113 | |
@@ -137,7 +137,7 @@ discard block |
||
137 | 137 | } |
138 | 138 | } |
139 | 139 | |
140 | - $this->loggerInstance->debug(5, "Merged Attributes: " . /** @scrutinizer ignore-type */ print_r($attributesLowLevel, true)); |
|
140 | + $this->loggerInstance->debug(5, "Merged Attributes: "./** @scrutinizer ignore-type */ print_r($attributesLowLevel, true)); |
|
141 | 141 | |
142 | 142 | // now, fetch and merge IdP-wide attributes |
143 | 143 | |
@@ -152,7 +152,7 @@ discard block |
||
152 | 152 | // add the internal attribute to that effect |
153 | 153 | |
154 | 154 | if (isset($this->attributes['media:openroaming_always'])) { |
155 | - $this->attributes = array_merge($this->attributes, $this->addInternalAttributes([ "internal:openroaming" => TRUE ] )); |
|
155 | + $this->attributes = array_merge($this->attributes, $this->addInternalAttributes(["internal:openroaming" => TRUE])); |
|
156 | 156 | } |
157 | 157 | |
158 | 158 | $this->loggerInstance->debug(4, "--- END Constructing new Profile object ... ---\n"); |
@@ -200,7 +200,7 @@ discard block |
||
200 | 200 | "row_id" => $attributeQuery->row_id, |
201 | 201 | "flag" => $optinfo['flag'], |
202 | 202 | "device" => ($devicesOrEAPMethods == "DEVICES" ? $attributeQuery->deviceormethod : NULL), |
203 | - "eapmethod" => ($devicesOrEAPMethods == "DEVICES" ? 0 : (new \core\common\EAP($attributeQuery->deviceormethod))->getArrayRep() )]; |
|
203 | + "eapmethod" => ($devicesOrEAPMethods == "DEVICES" ? 0 : (new \core\common\EAP($attributeQuery->deviceormethod))->getArrayRep())]; |
|
204 | 204 | } |
205 | 205 | return $temparray; |
206 | 206 | } |
@@ -309,7 +309,7 @@ discard block |
||
309 | 309 | */ |
310 | 310 | public function setAnonymousIDSupport($shallwe) |
311 | 311 | { |
312 | - $this->databaseHandle->exec("UPDATE profile SET use_anon_outer = " . ($shallwe === true ? "1" : "0") . " WHERE profile_id = $this->identifier"); |
|
312 | + $this->databaseHandle->exec("UPDATE profile SET use_anon_outer = ".($shallwe === true ? "1" : "0")." WHERE profile_id = $this->identifier"); |
|
313 | 313 | } |
314 | 314 | |
315 | 315 | /** Toggle special username for realm checks |
@@ -319,7 +319,7 @@ discard block |
||
319 | 319 | * @return void |
320 | 320 | */ |
321 | 321 | public function setRealmCheckUser($shallwe, $localpart = NULL) { |
322 | - $this->databaseHandle->exec("UPDATE profile SET checkuser_outer = " . ($shallwe === true ? "1" : "0") . " WHERE profile_id = $this->identifier"); |
|
322 | + $this->databaseHandle->exec("UPDATE profile SET checkuser_outer = ".($shallwe === true ? "1" : "0")." WHERE profile_id = $this->identifier"); |
|
323 | 323 | if ($localpart !== NULL) { |
324 | 324 | $this->databaseHandle->exec("UPDATE profile SET checkuser_value = ? WHERE profile_id = $this->identifier", "s", $localpart); |
325 | 325 | } |
@@ -334,8 +334,8 @@ discard block |
||
334 | 334 | */ |
335 | 335 | public function setInputVerificationPreference($verify, $hint) |
336 | 336 | { |
337 | - $this->databaseHandle->exec("UPDATE profile SET verify_userinput_suffix = " . ($verify === true ? "1" : "0") . |
|
338 | - ", hint_userinput_suffix = " . ($hint === true ? "1" : "0") . |
|
337 | + $this->databaseHandle->exec("UPDATE profile SET verify_userinput_suffix = ".($verify === true ? "1" : "0"). |
|
338 | + ", hint_userinput_suffix = ".($hint === true ? "1" : "0"). |
|
339 | 339 | " WHERE profile_id = $this->identifier"); |
340 | 340 | } |
341 | 341 |
@@ -454,7 +454,7 @@ discard block |
||
454 | 454 | $result = $this->databaseHandle->exec($query); |
455 | 455 | $rows = $result->fetch_all(); |
456 | 456 | foreach ($rows as $row) { |
457 | - $activeProfiles[] = $row[0]; |
|
457 | + $activeProfiles[] = $row[0]; |
|
458 | 458 | } |
459 | 459 | $query = "SELECT institution.inst_id AS inst_id, profile.profile_id AS profile_id, profile_option.option_value AS cert FROM profile_option JOIN profile ON profile_option.profile_id=profile.profile_id JOIN institution ON profile.inst_id=institution.inst_id WHERE profile_option.option_name='eap:ca_file' and institution.country='".$this->tld."'"; |
460 | 460 | $result = $this->databaseHandle->exec($query); |
@@ -531,7 +531,7 @@ discard block |
||
531 | 531 | 'country' => strtoupper($idp->federation), |
532 | 532 | 'instance' => $idp, |
533 | 533 | 'realms' => $idpQuery->realms] |
534 | - ; |
|
534 | + ; |
|
535 | 535 | $returnarray[$idp->identifier] = $idpInfo; |
536 | 536 | } |
537 | 537 | if ($activeOnly != 0) { // we're only doing this once. |
@@ -304,7 +304,7 @@ discard block |
||
304 | 304 | // for now (no OpenRoaming client certs available) only run server-side tests |
305 | 305 | foreach ($listOfIPs as $oneIP) { |
306 | 306 | $connectionResult = $connectionTests->cApathCheck($oneIP); |
307 | - if ($connectionResult != \core\diag\AbstractTest::RETVAL_OK || ( isset($connectionTests->TLS_CA_checks_result['cert_oddity']) && count($connectionTests->TLS_CA_checks_result['cert_oddity']) > 0)) { |
|
307 | + if ($connectionResult != \core\diag\AbstractTest::RETVAL_OK || (isset($connectionTests->TLS_CA_checks_result['cert_oddity']) && count($connectionTests->TLS_CA_checks_result['cert_oddity']) > 0)) { |
|
308 | 308 | $allHostsOkay = FALSE; |
309 | 309 | } else { |
310 | 310 | $oneHostOkay = TRUE; |
@@ -913,7 +913,7 @@ discard block |
||
913 | 913 | $profileStatus = self::CERT_STATUS_OK; |
914 | 914 | foreach ($rows as $row) { |
915 | 915 | $encodedCert = $row[0]; |
916 | - $tm = $x509->processCertificate(base64_decode($encodedCert))['full_details']['validTo_time_t']- time(); |
|
916 | + $tm = $x509->processCertificate(base64_decode($encodedCert))['full_details']['validTo_time_t'] - time(); |
|
917 | 917 | if ($tm < \config\ConfAssistant::CERT_WARNINGS['expiry_critical']) { |
918 | 918 | $certStatus = self::CERT_STATUS_ERROR; |
919 | 919 | } elseif ($tm < \config\ConfAssistant::CERT_WARNINGS['expiry_warning']) { |
@@ -374,7 +374,7 @@ |
||
374 | 374 | throw new Exception("Unknown test requested: default case reached!"); |
375 | 375 | } |
376 | 376 | $returnarray['datetime'] = date("Y-m-d H:i:s"); |
377 | -if ($token!= '' && is_dir($jsonDir.'/'.$token)) { |
|
377 | +if ($token != '' && is_dir($jsonDir.'/'.$token)) { |
|
378 | 378 | @mkdir($jsonDir.'/'.$token, 0777, true); |
379 | 379 | } |
380 | 380 | $json_data = json_encode($returnarray); |
@@ -132,7 +132,7 @@ discard block |
||
132 | 132 | $expectedName = $addr['hostname']; |
133 | 133 | $protocols = []; |
134 | 134 | if (isset($addr['protocols'])) { |
135 | - foreach($addr['protocols'] as $protocol) { |
|
135 | + foreach ($addr['protocols'] as $protocol) { |
|
136 | 136 | if ($protocol['enabled']) { |
137 | 137 | $protocols[] = $protocol['type']; |
138 | 138 | } |
@@ -213,7 +213,7 @@ discard block |
||
213 | 213 | $json_data = json_encode($returnArray); |
214 | 214 | |
215 | 215 | if ($token) { |
216 | - $loggerInstance->debug(4, 'JSON data written to ' .$jsonDir.'/'.$token); |
|
216 | + $loggerInstance->debug(4, 'JSON data written to '.$jsonDir.'/'.$token); |
|
217 | 217 | file_put_contents($jsonDir.'/'.$token.'/realm', $json_data); |
218 | 218 | } |
219 | 219 | echo($json_data); |
@@ -424,17 +424,17 @@ discard block |
||
424 | 424 | } |
425 | 425 | echo "<td class='inst_td'> |
426 | 426 | <input type='hidden' name='inst' value='" |
427 | - . $index."'>" |
|
428 | - . "<span style='display:none' class='inst_name'>".$my_idp."</span>" |
|
429 | - . "<span>". $idp_instance->name."</span>" |
|
430 | - . " (<a href='overview_org.php?inst_id=" |
|
431 | - . $idp_instance->identifier."'>" |
|
432 | - . (in_array($index, $userIdps) ? _("manage") : _("view")) |
|
433 | - . "</a>)" |
|
434 | - . (empty($listOfSilverbulletRealms) ? "" : "<ul><li>" ) |
|
435 | - . implode("</li><li>", $listOfSilverbulletRealms) |
|
436 | - . (empty($listOfSilverbulletRealms) ? "" : "</li><ul>" ) |
|
437 | - . "</td>"; |
|
427 | + . $index."'>" |
|
428 | + . "<span style='display:none' class='inst_name'>".$my_idp."</span>" |
|
429 | + . "<span>". $idp_instance->name."</span>" |
|
430 | + . " (<a href='overview_org.php?inst_id=" |
|
431 | + . $idp_instance->identifier."'>" |
|
432 | + . (in_array($index, $userIdps) ? _("manage") : _("view")) |
|
433 | + . "</a>)" |
|
434 | + . (empty($listOfSilverbulletRealms) ? "" : "<ul><li>" ) |
|
435 | + . implode("</li><li>", $listOfSilverbulletRealms) |
|
436 | + . (empty($listOfSilverbulletRealms) ? "" : "</li><ul>" ) |
|
437 | + . "</td>"; |
|
438 | 438 | // deployment status; need to dive into profiles for this |
439 | 439 | // show happy eyeballs if at least one profile is configured/showtime |
440 | 440 | echo "<td>$profileIcon</td>"; |
@@ -489,8 +489,8 @@ discard block |
||
489 | 489 | echo "<form method='post' action='overview_federation.php' accept-charset='UTF-8'> |
490 | 490 | <input type='hidden' name='invitation_id' value='".$oneinvite['token']."'/> |
491 | 491 | <button class='delete' type='submit' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_DELETE."'>"._("Revoke Invitation")."</button> " |
492 | - . sprintf(_("(expires %s)"), $oneinvite['expiry']) |
|
493 | - . "</form>"; |
|
492 | + . sprintf(_("(expires %s)"), $oneinvite['expiry']) |
|
493 | + . "</form>"; |
|
494 | 494 | } |
495 | 495 | echo " </td>"; |
496 | 496 | echo " </tr>"; |
@@ -97,7 +97,7 @@ discard block |
||
97 | 97 | <?php |
98 | 98 | foreach ($cat->printCountryList(1) as $country => $name) { |
99 | 99 | $selected = ''; |
100 | - if ($country == strtoupper($fed_id) ) { |
|
100 | + if ($country == strtoupper($fed_id)) { |
|
101 | 101 | $selected = 'selected'; |
102 | 102 | } |
103 | 103 | echo "<option value='$country' $selected>$name</option>\n"; |
@@ -315,7 +315,7 @@ discard block |
||
315 | 315 | /// nomenclature for 'federation', federation name, nomenclature for 'inst' |
316 | 316 | echo "<tr><td colspan='9'><strong>".sprintf(_("The following %s are in your %s %s:"), $uiElements->nomenclatureParticipant, $uiElements->nomenclatureFed, '<span style="color:green">'.$thefed->name.'</span>')."</strong></td></tr>"; |
317 | 317 | echo "<tbody class='fedlist'>"; |
318 | - echo "<tr><td colspan='1'><strong>". _("Quick search:")." </strong><input style='background:#eeeeee;' type='text' id='qsearch_".$fedId."'></td>"; |
|
318 | + echo "<tr><td colspan='1'><strong>"._("Quick search:")." </strong><input style='background:#eeeeee;' type='text' id='qsearch_".$fedId."'></td>"; |
|
319 | 319 | echo "<td style='border-bottom-style: dotted;border-bottom-width: 1px;'><input type='checkbox' name='profilecheck' id='profile_ck_".$fedId."'></td>"; |
320 | 320 | echo "<td style='border-bottom-style: dotted;border-bottom-width: 1px;'><input type='checkbox' name='orcheck' id='or_ck_".$fedId."'></td>"; |
321 | 321 | echo "<td style='border-bottom-style: dotted;border-bottom-width: 1px;'><input type='checkbox' name='brokencert' id='brokencert_ck_".$fedId."'></td>"; |
@@ -428,14 +428,14 @@ discard block |
||
428 | 428 | <input type='hidden' name='inst' value='" |
429 | 429 | . $index."'>" |
430 | 430 | . "<span style='display:none' class='inst_name'>".$my_idp."</span>" |
431 | - . "<span>". $idp_instance->name."</span>" |
|
431 | + . "<span>".$idp_instance->name."</span>" |
|
432 | 432 | . " (<a href='overview_org.php?inst_id=" |
433 | 433 | . $idp_instance->identifier."'>" |
434 | 434 | . (in_array($index, $userIdps) ? _("manage") : _("view")) |
435 | 435 | . "</a>)" |
436 | - . (empty($listOfSilverbulletRealms) ? "" : "<ul><li>" ) |
|
436 | + . (empty($listOfSilverbulletRealms) ? "" : "<ul><li>") |
|
437 | 437 | . implode("</li><li>", $listOfSilverbulletRealms) |
438 | - . (empty($listOfSilverbulletRealms) ? "" : "</li><ul>" ) |
|
438 | + . (empty($listOfSilverbulletRealms) ? "" : "</li><ul>") |
|
439 | 439 | . "</td>"; |
440 | 440 | // deployment status; need to dive into profiles for this |
441 | 441 | // show happy eyeballs if at least one profile is configured/showtime |
@@ -26,7 +26,7 @@ discard block |
||
26 | 26 | */ |
27 | 27 | ?> |
28 | 28 | <?php |
29 | -require_once dirname(dirname(dirname(__FILE__))) . "/config/_config.php"; |
|
29 | +require_once dirname(dirname(dirname(__FILE__)))."/config/_config.php"; |
|
30 | 30 | |
31 | 31 | $auth = new \web\lib\admin\Authentication(); |
32 | 32 | $deco = new \web\lib\admin\PageDecoration(); |
@@ -70,13 +70,13 @@ discard block |
||
70 | 70 | ?> |
71 | 71 | </h1> |
72 | 72 | <div class='infobox'> |
73 | - <h2><?php $tablecaption = sprintf(_("%s Properties"),$uiElements->nomenclatureFed); echo $tablecaption?></h2> |
|
73 | + <h2><?php $tablecaption = sprintf(_("%s Properties"), $uiElements->nomenclatureFed); echo $tablecaption?></h2> |
|
74 | 74 | <table> |
75 | - <caption><?php echo $tablecaption;?></caption> |
|
75 | + <caption><?php echo $tablecaption; ?></caption> |
|
76 | 76 | <tr> |
77 | - <th class="wai-invisible" scope="col"><?php echo _("Property Type");?></th> |
|
78 | - <th class="wai-invisible" scope="col"><?php echo _("Language if applicable");?></th> |
|
79 | - <th class="wai-invisible" scope="col"><?php echo _("Property Value");?></th> |
|
77 | + <th class="wai-invisible" scope="col"><?php echo _("Property Type"); ?></th> |
|
78 | + <th class="wai-invisible" scope="col"><?php echo _("Language if applicable"); ?></th> |
|
79 | + <th class="wai-invisible" scope="col"><?php echo _("Property Value"); ?></th> |
|
80 | 80 | </tr> |
81 | 81 | <tr> |
82 | 82 | <td><?php echo _("Country:"); ?></td> |
@@ -87,11 +87,11 @@ discard block |
||
87 | 87 | </table> |
88 | 88 | </div> |
89 | 89 | <?php |
90 | - echo "<form enctype='multipart/form-data' action='edit_federation_result.php?fed_id=$my_fed->tld" . "' method='post' accept-charset='UTF-8'> |
|
91 | - <input type='hidden' name='MAX_FILE_SIZE' value='" . \config\Master::MAX_UPLOAD_SIZE . "'>"; |
|
90 | + echo "<form enctype='multipart/form-data' action='edit_federation_result.php?fed_id=$my_fed->tld"."' method='post' accept-charset='UTF-8'> |
|
91 | + <input type='hidden' name='MAX_FILE_SIZE' value='" . \config\Master::MAX_UPLOAD_SIZE."'>"; |
|
92 | 92 | ?> |
93 | 93 | <fieldset class="option_container"> |
94 | - <legend><strong><?php echo sprintf(_("%s Properties"),$uiElements->nomenclatureFed); ?></strong></legend> |
|
94 | + <legend><strong><?php echo sprintf(_("%s Properties"), $uiElements->nomenclatureFed); ?></strong></legend> |
|
95 | 95 | <?php |
96 | 96 | $optionDisplay = new \web\lib\admin\OptionDisplay($fed_options, \core\Options::LEVEL_FED); |
97 | 97 | echo $optionDisplay->prefilledOptionTable("fed", $my_fed->tld); |
@@ -101,10 +101,10 @@ discard block |
||
101 | 101 | <?php |
102 | 102 | echo "<div>"; |
103 | 103 | if ($editMode === 'fullaccess') { |
104 | - echo "<button type='submit' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_SAVE . "'>" . _("Save data") . "</button>"; |
|
104 | + echo "<button type='submit' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_SAVE."'>"._("Save data")."</button>"; |
|
105 | 105 | $discardLabel = _("Discard changes"); |
106 | 106 | } else { |
107 | 107 | $discardLabel = _("Return"); |
108 | 108 | } |
109 | - echo "<button type='button' class='delete' name='abortbutton' value='abort' onclick='javascript:window.location = \"overview_federation.php?fed_id=$fedPost\"'>" . $discardLabel . "</button></div></form>"; |
|
109 | + echo "<button type='button' class='delete' name='abortbutton' value='abort' onclick='javascript:window.location = \"overview_federation.php?fed_id=$fedPost\"'>".$discardLabel."</button></div></form>"; |
|
110 | 110 | echo $deco->footer(); |