Test Failed
Push — master ( 81a1e2...d0d67d )
by Stefan
32:51 queued 20:40
created
core/DeviceConfig.php 1 patch
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -86,7 +86,7 @@  discard block
 block discarded – undo
86 86
     protected function setSupportedEapMethods($eapArray)
87 87
     {
88 88
         $this->supportedEapMethods = $eapArray;
89
-        $this->loggerInstance->debug(4, "This device (" . __CLASS__ . ") supports the following EAP methods: ");
89
+        $this->loggerInstance->debug(4, "This device (".__CLASS__.") supports the following EAP methods: ");
90 90
         $this->loggerInstance->debug(4, $this->supportedEapMethods);
91 91
     }
92 92
 
@@ -460,7 +460,7 @@  discard block
 block discarded – undo
460 460
                 return $baseName.$inst.'-'.$prof;
461 461
             }
462 462
         }
463
-        return $baseName . $inst;
463
+        return $baseName.$inst;
464 464
     }
465 465
 
466 466
     /**
@@ -590,7 +590,7 @@  discard block
 block discarded – undo
590 590
             // only add network blocks if their respective condition is met in this profile
591 591
             if ($netDetails['condition'] === TRUE || (isset($this->attributes[$netDetails['condition']]) && $this->attributes[$netDetails['condition']] === TRUE)) { 
592 592
                 $networks[$netName] = $netDetails;
593
-                $this->loggerInstance->debug(5,$netName, "\nAdding network: ");
593
+                $this->loggerInstance->debug(5, $netName, "\nAdding network: ");
594 594
             }
595 595
         }
596 596
         // add locally defined SSIDs
Please login to merge, or discard this patch.
core/CertificationAuthorityEduPki.php 1 patch
Spacing   +37 added lines, -37 removed lines patch added patch discarded remove patch
@@ -17,9 +17,9 @@  discard block
 block discarded – undo
17 17
 class CertificationAuthorityEduPki extends EntityWithDBProperties implements CertificationAuthorityInterface
18 18
 {
19 19
 
20
-    private const LOCATION_RA_CERT = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem";
21
-    private const LOCATION_RA_KEY = ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey";
22
-    private const LOCATION_WEBROOT = ROOT . "/config/SilverbulletClientCerts/eduPKI-webserver-root.pem";
20
+    private const LOCATION_RA_CERT = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem";
21
+    private const LOCATION_RA_KEY = ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey";
22
+    private const LOCATION_WEBROOT = ROOT."/config/SilverbulletClientCerts/eduPKI-webserver-root.pem";
23 23
     private const EDUPKI_RA_ID = 700;
24 24
     private const EDUPKI_CERT_PROFILE = "User SOAP";
25 25
     private const EDUPKI_RA_PKEY_PASSPHRASE = "...";
@@ -35,13 +35,13 @@  discard block
 block discarded – undo
35 35
         parent::__construct();
36 36
 
37 37
         if (stat(CertificationAuthorityEduPki::LOCATION_RA_CERT) === FALSE) {
38
-            throw new Exception("RA operator PEM file not found: " . CertificationAuthorityEduPki::LOCATION_RA_CERT);
38
+            throw new Exception("RA operator PEM file not found: ".CertificationAuthorityEduPki::LOCATION_RA_CERT);
39 39
         }
40 40
         if (stat(CertificationAuthorityEduPki::LOCATION_RA_KEY) === FALSE) {
41
-            throw new Exception("RA operator private key file not found: " . CertificationAuthorityEduPki::LOCATION_RA_KEY);
41
+            throw new Exception("RA operator private key file not found: ".CertificationAuthorityEduPki::LOCATION_RA_KEY);
42 42
         }
43 43
         if (stat(CertificationAuthorityEduPki::LOCATION_WEBROOT) === FALSE) {
44
-            throw new Exception("CA website root CA file not found: " . CertificationAuthorityEduPki::LOCATION_WEBROOT);
44
+            throw new Exception("CA website root CA file not found: ".CertificationAuthorityEduPki::LOCATION_WEBROOT);
45 45
         }
46 46
     }
47 47
 
@@ -75,19 +75,19 @@  discard block
 block discarded – undo
75 75
         // initialise connection to eduPKI CA / eduroam RA and send the request to them
76 76
         try {
77 77
             $altArray = [# Array mit den Subject Alternative Names
78
-                "email:" . $csr["USERNAME"]
78
+                "email:".$csr["USERNAME"]
79 79
             ];
80 80
             $soapPub = $this->initEduPKISoapSession("PUBLIC");
81 81
             $this->loggerInstance->debug(5, "FIRST ACTUAL SOAP REQUEST (Public, newRequest)!\n");
82
-            $this->loggerInstance->debug(5, "PARAM_1: " . CertificationAuthorityEduPki::EDUPKI_RA_ID . "\n");
83
-            $this->loggerInstance->debug(5, "PARAM_2: " . $csr["CSR_STRING"] . "\n");
82
+            $this->loggerInstance->debug(5, "PARAM_1: ".CertificationAuthorityEduPki::EDUPKI_RA_ID."\n");
83
+            $this->loggerInstance->debug(5, "PARAM_2: ".$csr["CSR_STRING"]."\n");
84 84
             $this->loggerInstance->debug(5, "PARAM_3: ");
85 85
             $this->loggerInstance->debug(5, $altArray);
86
-            $this->loggerInstance->debug(5, "PARAM_4: " . CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE . "\n");
87
-            $this->loggerInstance->debug(5, "PARAM_5: " . sha1("notused") . "\n");
88
-            $this->loggerInstance->debug(5, "PARAM_6: " . $csr["USERNAME"] . "\n");
89
-            $this->loggerInstance->debug(5, "PARAM_7: " . $csr["USERNAME"] . "\n");
90
-            $this->loggerInstance->debug(5, "PARAM_8: " . \config\ConfAssistant::SILVERBULLET['product_name'] . "\n");
86
+            $this->loggerInstance->debug(5, "PARAM_4: ".CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE."\n");
87
+            $this->loggerInstance->debug(5, "PARAM_5: ".sha1("notused")."\n");
88
+            $this->loggerInstance->debug(5, "PARAM_6: ".$csr["USERNAME"]."\n");
89
+            $this->loggerInstance->debug(5, "PARAM_7: ".$csr["USERNAME"]."\n");
90
+            $this->loggerInstance->debug(5, "PARAM_8: ".\config\ConfAssistant::SILVERBULLET['product_name']."\n");
91 91
             $this->loggerInstance->debug(5, "PARAM_9: false\n");
92 92
             $soapNewRequest = $soapPub->newRequest(
93 93
                     CertificationAuthorityEduPki::EDUPKI_RA_ID, # RA-ID
@@ -109,11 +109,11 @@  discard block
 block discarded – undo
109 109
         } catch (Exception $e) {
110 110
             // PHP 7.1 can do this much better
111 111
             if (is_soap_fault($e)) {
112
-                throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}:  {
112
+                throw new Exception("Error when sending SOAP request: "."{$e->faultcode}:  {
113 113
                     $e->faultstring
114 114
                 }\n");
115 115
             }
116
-            throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage());
116
+            throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage());
117 117
         }
118 118
         try {
119 119
             $soap = $this->initEduPKISoapSession("RA");
@@ -125,8 +125,8 @@  discard block
 block discarded – undo
125 125
                     $soapReqnum, [
126 126
                 "RaID" => CertificationAuthorityEduPki::EDUPKI_RA_ID,
127 127
                 "Role" => CertificationAuthorityEduPki::EDUPKI_CERT_PROFILE,
128
-                "Subject" => "DC=eduroam,DC=test,DC=test,C=" . $csr["FED"] . ",O=" . \config\ConfAssistant::CONSORTIUM['name'] . ",OU=" . $csr["FED"] . ",CN=" . $csr['USERNAME'] . ",emailAddress=" . $csr['USERNAME'],
129
-                "SubjectAltNames" => ["email:" . $csr["USERNAME"]],
128
+                "Subject" => "DC=eduroam,DC=test,DC=test,C=".$csr["FED"].",O=".\config\ConfAssistant::CONSORTIUM['name'].",OU=".$csr["FED"].",CN=".$csr['USERNAME'].",emailAddress=".$csr['USERNAME'],
129
+                "SubjectAltNames" => ["email:".$csr["USERNAME"]],
130 130
                 "NotBefore" => (new \DateTime())->format('c'),
131 131
                 "NotAfter" => $expiry->format('c'),
132 132
                     ]
@@ -145,7 +145,7 @@  discard block
 block discarded – undo
145 145
             // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file
146 146
             // rather than just using the string. Grr.
147 147
             $tempdir = \core\common\Entity::createTemporaryDirectory("test");
148
-            file_put_contents($tempdir['dir'] . "/content.txt", $soapCleartext);
148
+            file_put_contents($tempdir['dir']."/content.txt", $soapCleartext);
149 149
             // retrieve our RA cert from filesystem                    
150 150
             // the RA certificates are not needed right now because we
151 151
             // have resorted to S/MIME signatures with openssl command-line
@@ -157,7 +157,7 @@  discard block
 block discarded – undo
157 157
             // sign the data, using cmdline because openssl_pkcs7_sign produces strange results
158 158
             // -binary didn't help, nor switch -md to sha1 sha256 or sha512
159 159
             $this->loggerInstance->debug(5, "Actual content to be signed is this:\n  $soapCleartext\n");
160
-            $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer " . ROOT . "/config/SilverbulletClientCerts/edupki-test-ra.pem";
160
+            $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.clearkey -signer ".ROOT."/config/SilverbulletClientCerts/edupki-test-ra.pem";
161 161
             $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline:   $execCmd\n");
162 162
             $output = [];
163 163
             $return = 999;
@@ -166,14 +166,14 @@  discard block
 block discarded – undo
166 166
                 throw new Exception("Non-zero return value from openssl smime!");
167 167
             }
168 168
             // and get the signature blob back from the filesystem
169
-            $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt"));
169
+            $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt"));
170 170
             $this->loggerInstance->debug(5, "Request for server approveRequest has parameters:\n");
171
-            $this->loggerInstance->debug(5, $soapReqnum . "\n");
172
-            $this->loggerInstance->debug(5, $soapCleartext . "\n"); // PHP magically encodes this as base64 while sending!
173
-            $this->loggerInstance->debug(5, $detachedSig . "\n");
171
+            $this->loggerInstance->debug(5, $soapReqnum."\n");
172
+            $this->loggerInstance->debug(5, $soapCleartext."\n"); // PHP magically encodes this as base64 while sending!
173
+            $this->loggerInstance->debug(5, $detachedSig."\n");
174 174
             $soapIssueCert = $soap->approveRequest($soapReqnum, $soapCleartext, $detachedSig);
175
-            $this->loggerInstance->debug(5, "approveRequest Request was: \n" . $soap->__getLastRequest());
176
-            $this->loggerInstance->debug(5, "approveRequest Response was: \n" . $soap->__getLastResponse());
175
+            $this->loggerInstance->debug(5, "approveRequest Request was: \n".$soap->__getLastRequest());
176
+            $this->loggerInstance->debug(5, "approveRequest Response was: \n".$soap->__getLastResponse());
177 177
             if ($soapIssueCert === FALSE) {
178 178
                 throw new Exception("The locally approved request was NOT processed by the CA.");
179 179
             }
@@ -210,9 +210,9 @@  discard block
 block discarded – undo
210 210
                 throw new Exception("CAInfo has no root certificate for us!");
211 211
             }
212 212
         } catch (SoapFault $e) {
213
-            throw new Exception("SoapFault: Error when sending or receiving SOAP message: " . "{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
213
+            throw new Exception("SoapFault: Error when sending or receiving SOAP message: "."{$e->faultcode}: {$e->faultname}: {$e->faultstring}: {$e->faultactor}: {$e->detail}: {$e->headerfault}\n");
214 214
         } catch (Exception $e) {
215
-            throw new Exception("Exception: Something odd happened between the SOAP requests:" . $e->getMessage());
215
+            throw new Exception("Exception: Something odd happened between the SOAP requests:".$e->getMessage());
216 216
         }
217 217
         return [
218 218
             "CERT" => openssl_x509_read($parsedCert['pem']),
@@ -245,12 +245,12 @@  discard block
 block discarded – undo
245 245
             // for obnoxious reasons, we have to dump the request into a file and let pkcs7_sign read from the file
246 246
             // rather than just using the string. Grr.
247 247
             $tempdir = \core\common\Entity::createTemporaryDirectory("test");
248
-            file_put_contents($tempdir['dir'] . "/content.txt", $soapRawRevRequest);
248
+            file_put_contents($tempdir['dir']."/content.txt", $soapRawRevRequest);
249 249
             // retrieve our RA cert from filesystem
250 250
             // sign the data, using cmdline because openssl_pkcs7_sign produces strange results
251 251
             // -binary didn't help, nor switch -md to sha1 sha256 or sha512
252 252
             $this->loggerInstance->debug(5, "Actual content to be signed is this:\n$soapRawRevRequest\n");
253
-            $execCmd = \config\Master::PATHS['openssl'] . " smime -sign -binary -in " . $tempdir['dir'] . "/content.txt -out " . $tempdir['dir'] . "/signature.txt -outform pem -inkey " . CertificationAuthorityEduPki::LOCATION_RA_KEY . " -signer " . CertificationAuthorityEduPki::LOCATION_RA_CERT;
253
+            $execCmd = \config\Master::PATHS['openssl']." smime -sign -binary -in ".$tempdir['dir']."/content.txt -out ".$tempdir['dir']."/signature.txt -outform pem -inkey ".CertificationAuthorityEduPki::LOCATION_RA_KEY." -signer ".CertificationAuthorityEduPki::LOCATION_RA_CERT;
254 254
             $this->loggerInstance->debug(2, "Calling openssl smime with following cmdline: $execCmd\n");
255 255
             $output = [];
256 256
             $return = 999;
@@ -259,7 +259,7 @@  discard block
 block discarded – undo
259 259
                 throw new Exception("Non-zero return value from openssl smime!");
260 260
             }
261 261
             // and get the signature blob back from the filesystem
262
-            $detachedSig = trim(file_get_contents($tempdir['dir'] . "/signature.txt"));
262
+            $detachedSig = trim(file_get_contents($tempdir['dir']."/signature.txt"));
263 263
             $soapIssueRev = $soap->approveRevocationRequest($soapRevocationSerial, $soapRawRevRequest, $detachedSig);
264 264
             if ($soapIssueRev === FALSE) {
265 265
                 throw new Exception("The locally approved revocation request was NOT processed by the CA.");
@@ -267,9 +267,9 @@  discard block
 block discarded – undo
267 267
         } catch (Exception $e) {
268 268
             // PHP 7.1 can do this much better
269 269
             if (is_soap_fault($e)) {
270
-                throw new Exception("Error when sending SOAP request: " . "{$e->faultcode}: {$e->faultstring}\n");
270
+                throw new Exception("Error when sending SOAP request: "."{$e->faultcode}: {$e->faultstring}\n");
271 271
             }
272
-            throw new Exception("Something odd happened while doing the SOAP request:" . $e->getMessage());
272
+            throw new Exception("Something odd happened while doing the SOAP request:".$e->getMessage());
273 273
         }
274 274
     }
275 275
 
@@ -369,9 +369,9 @@  discard block
 block discarded – undo
369 369
      */
370 370
     public function soapToXmlInteger($x)
371 371
     {
372
-        return '<' . $x[0] . '>'
372
+        return '<'.$x[0].'>'
373 373
                 . htmlentities($x[1], ENT_NOQUOTES | ENT_XML1)
374
-                . '</' . $x[0] . '>';
374
+                . '</'.$x[0].'>';
375 375
     }
376 376
 
377 377
     /**
@@ -390,9 +390,9 @@  discard block
 block discarded – undo
390 390
         // dump private key into directory
391 391
         $outstring = "";
392 392
         openssl_pkey_export($privateKey, $outstring);
393
-        file_put_contents($tempdir . "/pkey.pem", $outstring);
393
+        file_put_contents($tempdir."/pkey.pem", $outstring);
394 394
         // PHP can only do one DC in the Subject. But we need three.
395
-        $execCmd = \config\Master::PATHS['openssl'] . " req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=" . \config\ConfAssistant::CONSORTIUM['name'] . "/OU=$fed/CN=$username/emailAddress=$username";
395
+        $execCmd = \config\Master::PATHS['openssl']." req -new -sha256 -key $tempdir/pkey.pem -out $tempdir/request.csr -subj /DC=test/DC=test/DC=eduroam/C=$fed/O=".\config\ConfAssistant::CONSORTIUM['name']."/OU=$fed/CN=$username/emailAddress=$username";
396 396
         $this->loggerInstance->debug(2, "Calling openssl req with following cmdline: $execCmd\n");
397 397
         $output = [];
398 398
         $return = 999;
Please login to merge, or discard this patch.
web/user/tou.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -62,7 +62,7 @@
 block discarded – undo
62 62
     they are from the same user group. You are not allowed to share them to an unlimited
63 63
     audience (e.g. on a publicly accessible web server).</li>
64 64
 <li>If You are an eduroam Identity Provider administrator, you are allowed to download and pass on the Installers to
65
-your own <?php echo \config\ConfAssistant::CONSORTIUM['nomenclature_idp'];?> end users, e.g. on the support web pages of your <?php echo \config\ConfAssistant::CONSORTIUM['nomenclature_idp'];?>, on Welcome Package CDs or USB sticks, etc.</li>
65
+your own <?php echo \config\ConfAssistant::CONSORTIUM['nomenclature_idp']; ?> end users, e.g. on the support web pages of your <?php echo \config\ConfAssistant::CONSORTIUM['nomenclature_idp']; ?>, on Welcome Package CDs or USB sticks, etc.</li>
66 66
 <li>If You are a third-party not affiliated with eduroam, you are only allowed to download and pass on
67 67
 the Metadata and/or the Installers after having received written permission by the eduroam Operations team.</li>
68 68
 </ul>
Please login to merge, or discard this patch.
web/admin/inc/manageAdmins.inc.php 1 patch
Spacing   +8 added lines, -8 removed lines patch added patch discarded remove patch
@@ -20,7 +20,7 @@  discard block
 block discarded – undo
20 20
  */
21 21
 ?>
22 22
 <?php
23
-require_once dirname(dirname(dirname(dirname(__FILE__)))) . "/config/_config.php";
23
+require_once dirname(dirname(dirname(dirname(__FILE__))))."/config/_config.php";
24 24
 
25 25
 $auth = new \web\lib\admin\Authentication();
26 26
 $languageInstance = new \core\common\Language();
@@ -82,7 +82,7 @@  discard block
 block discarded – undo
82 82
                 $ownermgmt = new \core\UserManagement();
83 83
                 $ownermgmt->addAdminToIdp($my_inst, $_SESSION['user']);
84 84
             } else {
85
-                echo "Fatal Error: you wanted to take control over an " . \config\ConfAssistant::CONSORTIUM['nomenclature_participant'] . ", but are not a " . \config\ConfAssistant::CONSORTIUM['nomenclature_federation'] . " operator!";
85
+                echo "Fatal Error: you wanted to take control over an ".\config\ConfAssistant::CONSORTIUM['nomenclature_participant'].", but are not a ".\config\ConfAssistant::CONSORTIUM['nomenclature_federation']." operator!";
86 86
                 exit(1);
87 87
             }
88 88
             break;
@@ -118,7 +118,7 @@  discard block
 block discarded – undo
118 118
                 default:
119 119
                     throw new Exception("Error: unknown encryption status of invitation!?!");
120 120
             }
121
-            echo $uiElements->boxRemark(ngettext("The invitation email was sent successfully.", "All invitation emails were sent successfully.", $counter) . " " . $cryptText, _("Sent successfully."));
121
+            echo $uiElements->boxRemark(ngettext("The invitation email was sent successfully.", "All invitation emails were sent successfully.", $counter)." ".$cryptText, _("Sent successfully."));
122 122
             break;
123 123
         case "FAILURE":
124 124
             echo $uiElements->boxError(_("No invitation email could be sent!"), _("Sending failure!"));
@@ -138,7 +138,7 @@  discard block
 block discarded – undo
138 138
                 default:
139 139
                     throw new Exception("Error: unknown encryption status of invitation!?!");
140 140
             }
141
-            echo $uiElements->boxWarning(sprintf(_("Some invitation emails were sent successfully (%s in total), the others failed."), $counter) . " " . $cryptText, _("Partial success."));
141
+            echo $uiElements->boxWarning(sprintf(_("Some invitation emails were sent successfully (%s in total), the others failed."), $counter)." ".$cryptText, _("Partial success."));
142 142
             break;
143 143
         case "INVALIDSYNTAX":
144 144
             echo $uiElements->boxError(_("The invitation email address was malformed, no invitation was sent!"), _("The invitation email address was malformed, no invitation was sent!"));
@@ -190,7 +190,7 @@  discard block
 block discarded – undo
190 190
                 <?php echo $invite; ?>
191 191
             </td>
192 192
             <td>
193
-                <form action='inc/manageAdmins.inc.php?inst_id=<?php echo $my_inst->identifier ?>' method='post' <?php echo ( $oneowner['ID'] != $_SESSION['user'] ? "onsubmit='popupRedirectWindow(this); return false;'" : "" ); ?> accept-charset='UTF-8'>
193
+                <form action='inc/manageAdmins.inc.php?inst_id=<?php echo $my_inst->identifier ?>' method='post' <?php echo ($oneowner['ID'] != $_SESSION['user'] ? "onsubmit='popupRedirectWindow(this); return false;'" : ""); ?> accept-charset='UTF-8'>
194 194
                     <input type='hidden' name='admin_id' value='<?php echo $oneowner['ID']; ?>'></input>
195 195
                     <button type='submit' name='submitbutton' class='delete' value='<?php echo web\lib\common\FormElements::BUTTON_DELETE; ?>'><?php echo _("Delete Administrator") ?></button>
196 196
                 </form>
@@ -207,10 +207,10 @@  discard block
 block discarded – undo
207 207
 $loggerInstance = new \core\common\Logging();
208 208
 $loggerInstance->debug(4, "Displaying pending invitations for $my_inst->identifier.\n");
209 209
 if (count($pending_invites) > 0) {
210
-    echo "<strong>" . _("Pending invitations for this IdP") . "</strong>";
210
+    echo "<strong>"._("Pending invitations for this IdP")."</strong>";
211 211
     echo "<table>";
212 212
     foreach ($pending_invites as $invitee) {
213
-        echo "<tr><td>" . $invitee['mail'] . "</td><td>" . sprintf(_("(expires %s)"), $invitee['expiry']) . "</td></tr>";
213
+        echo "<tr><td>".$invitee['mail']."</td><td>".sprintf(_("(expires %s)"), $invitee['expiry'])."</td></tr>";
214 214
     }
215 215
     echo "</table>";
216 216
 }
@@ -232,7 +232,7 @@  discard block
 block discarded – undo
232 232
 
233 233
     if (!$is_admin_himself) {
234 234
         echo "<form action='inc/manageAdmins.inc.php?inst_id=$my_inst->identifier' method='post' onsubmit='popupRedirectWindow(this); return false;' accept-charset='UTF-8'>
235
-    <button type='submit' name='submitbutton' value='" . web\lib\common\FormElements::BUTTON_TAKECONTROL . "'>" . sprintf(_("Take control of this %s"), $uiElements->nomenclatureParticipant) . "</button>
235
+    <button type='submit' name='submitbutton' value='".web\lib\common\FormElements::BUTTON_TAKECONTROL."'>".sprintf(_("Take control of this %s"), $uiElements->nomenclatureParticipant)."</button>
236 236
 </form>";
237 237
     }
238 238
 }
Please login to merge, or discard this patch.
utils/notify_invitation_expiry.php 1 patch
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -21,7 +21,7 @@  discard block
 block discarded – undo
21 21
 
22 22
 // please run this as a cron job every hour
23 23
 
24
-require_once dirname(dirname(__FILE__)) . "/config/_config.php";
24
+require_once dirname(dirname(__FILE__))."/config/_config.php";
25 25
 
26 26
 // iterate through all federations and see if there are recently expired 
27 27
 // invitations for any of them
@@ -55,7 +55,7 @@  discard block
 block discarded – undo
55 55
     $admins = $this_fed->listFederationAdmins();
56 56
     $mailtext = "Hello,
57 57
 
58
-invitation tokens for the following new ". \config\ConfAssistant::CONSORTIUM['nomenclature_participant'] ." have recently expired:
58
+invitation tokens for the following new ". \config\ConfAssistant::CONSORTIUM['nomenclature_participant']." have recently expired:
59 59
 
60 60
 ";
61 61
     foreach ($listofinstnames as $instname) {
@@ -65,7 +65,7 @@  discard block
 block discarded – undo
65 65
     if ($numberofexistingidps > 0) {
66 66
         $mailtext .= "
67 67
 
68
-Additionally, $numberofexistingidps invitations for an existing ". \config\ConfAssistant::CONSORTIUM['nomenclature_participant']." have expired.
68
+Additionally, $numberofexistingidps invitations for an existing ".\config\ConfAssistant::CONSORTIUM['nomenclature_participant']." have expired.
69 69
         ";
70 70
     }
71 71
     $mailtext .= "
@@ -73,7 +73,7 @@  discard block
 block discarded – undo
73 73
 
74 74
 Greetings,
75 75
 
76
-A humble " . \config\Master::APPEARANCE['productname'] . " cron job
76
+A humble " . \config\Master::APPEARANCE['productname']." cron job
77 77
 ";
78 78
 
79 79
     foreach ($admins as $admin) {
Please login to merge, or discard this patch.
devices/ms/DeviceVista7.php 1 patch
Spacing   +31 added lines, -31 removed lines patch added patch discarded remove patch
@@ -76,7 +76,7 @@  discard block
 block discarded – undo
76 76
                 $delProfiles[] = $ssid;
77 77
             }
78 78
             if ($cipher == 'TKIP') {
79
-                $delProfiles[] = $ssid . ' (TKIP)';
79
+                $delProfiles[] = $ssid.' (TKIP)';
80 80
             }
81 81
         }
82 82
 
@@ -86,7 +86,7 @@  discard block
 block discarded – undo
86 86
             $iterator = 0;
87 87
             foreach ($allSSID as $ssid => $cipher) {
88 88
                 if ($cipher == 'TKIP') {
89
-                    $windowsProfile[$iterator] = $this->writeWLANprofile($ssid . ' (TKIP)', $ssid, 'WPA', 'TKIP', $eapConfig, $iterator);
89
+                    $windowsProfile[$iterator] = $this->writeWLANprofile($ssid.' (TKIP)', $ssid, 'WPA', 'TKIP', $eapConfig, $iterator);
90 90
                     $iterator++;
91 91
                 }
92 92
                 $windowsProfile[$iterator] = $this->writeWLANprofile($ssid, $ssid, 'WPA2', 'AES', $eapConfig, $iterator);
@@ -148,10 +148,10 @@  discard block
 block discarded – undo
148 148
         $profileFileCont = '<EAPConfig><EapHostConfig xmlns="http://www.microsoft.com/provisioning/EapHostConfig">
149 149
 <EapMethod>
150 150
 <Type xmlns="http://www.microsoft.com/provisioning/EapCommon">' .
151
-                $this->selectedEap["OUTER"] . '</Type>
151
+                $this->selectedEap["OUTER"].'</Type>
152 152
 <VendorId xmlns="http://www.microsoft.com/provisioning/EapCommon">0</VendorId>
153 153
 <VendorType xmlns="http://www.microsoft.com/provisioning/EapCommon">0</VendorType>
154
-<AuthorId xmlns="http://www.microsoft.com/provisioning/EapCommon">' . $authorId . '</AuthorId>
154
+<AuthorId xmlns="http://www.microsoft.com/provisioning/EapCommon">' . $authorId.'</AuthorId>
155 155
 </EapMethod>
156 156
 ';
157 157
 
@@ -164,9 +164,9 @@  discard block
 block discarded – undo
164 164
             $profileFileCont .= '
165 165
 <Config xmlns="http://www.microsoft.com/provisioning/EapHostConfig">
166 166
 <EAPIdentityProviderList xmlns="urn:ietf:params:xml:ns:yang:ietf-eap-metadata">
167
-<EAPIdentityProvider ID="' . $this->deviceUUID . '" namespace="urn:UUID">
167
+<EAPIdentityProvider ID="' . $this->deviceUUID.'" namespace="urn:UUID">
168 168
 <ProviderInfo>
169
-<DisplayName>' . $this->translateString($attr['general:instname'][0]) . '</DisplayName>
169
+<DisplayName>' . $this->translateString($attr['general:instname'][0]).'</DisplayName>
170 170
 </ProviderInfo>
171 171
 <AuthenticationMethods>
172 172
 <AuthenticationMethod>
@@ -178,7 +178,7 @@  discard block
 block discarded – undo
178 178
                 if ($outerUser == '') {
179 179
                     $profileFileCont .= '<AnonymousIdentity>@</AnonymousIdentity>';
180 180
                 } else {
181
-                    $profileFileCont .= '<AnonymousIdentity>' . $outerUser . '@' . $realm . '</AnonymousIdentity>';
181
+                    $profileFileCont .= '<AnonymousIdentity>'.$outerUser.'@'.$realm.'</AnonymousIdentity>';
182 182
                 }
183 183
             }
184 184
             $profileFileCont .= '</ClientSideCredential>
@@ -196,7 +196,7 @@  discard block
 block discarded – undo
196 196
             $profileFileCont .= '
197 197
 </ServerSideCredential>
198 198
 <InnerAuthenticationMethod>
199
-<NonEAPAuthMethod>' .$innerMethod. '</NonEAPAuthMethod>
199
+<NonEAPAuthMethod>' .$innerMethod.'</NonEAPAuthMethod>
200 200
 </InnerAuthenticationMethod>
201 201
 <VendorSpecific>
202 202
 <SessionResumption>false</SessionResumption>
@@ -221,11 +221,11 @@  discard block
 block discarded – undo
221 221
 </eapTls:CredentialsSource>
222 222
 <eapTls:ServerValidation>
223 223
 <eapTls:DisableUserPromptForServerValidation>true</eapTls:DisableUserPromptForServerValidation>
224
-<eapTls:ServerNames>' . $servers . '</eapTls:ServerNames>';
224
+<eapTls:ServerNames>' . $servers.'</eapTls:ServerNames>';
225 225
             if ($caArray) {
226 226
                 foreach ($caArray as $certAuthority) {
227 227
                     if ($certAuthority['root']) {
228
-                        $profileFileCont .= "<eapTls:TrustedRootCA>" . $certAuthority['sha1'] . "</eapTls:TrustedRootCA>\n";
228
+                        $profileFileCont .= "<eapTls:TrustedRootCA>".$certAuthority['sha1']."</eapTls:TrustedRootCA>\n";
229 229
                     }
230 230
                 }
231 231
             }
@@ -257,11 +257,11 @@  discard block
 block discarded – undo
257 257
 <msPeap:EapType>
258 258
 <msPeap:ServerValidation>
259 259
 <msPeap:DisableUserPromptForServerValidation>true</msPeap:DisableUserPromptForServerValidation> 
260
-<msPeap:ServerNames>' . $servers . '</msPeap:ServerNames>';
260
+<msPeap:ServerNames>' . $servers.'</msPeap:ServerNames>';
261 261
             if ($caArray) {
262 262
                 foreach ($caArray as $certAuthority) {
263 263
                     if ($certAuthority['root']) {
264
-                        $vistaExt .= "<msPeap:TrustedRootCA>" . $certAuthority['sha1'] . "</msPeap:TrustedRootCA>\n";
264
+                        $vistaExt .= "<msPeap:TrustedRootCA>".$certAuthority['sha1']."</msPeap:TrustedRootCA>\n";
265 265
                     }
266 266
                 }
267 267
             }
@@ -274,7 +274,7 @@  discard block
 block discarded – undo
274 274
 <msChapV2:UseWinLogonCredentials>false</msChapV2:UseWinLogonCredentials> 
275 275
 </msChapV2:EapType>
276 276
 </baseEap:Eap>
277
-<msPeap:EnableQuarantineChecks>' . $nea . '</msPeap:EnableQuarantineChecks>
277
+<msPeap:EnableQuarantineChecks>' . $nea.'</msPeap:EnableQuarantineChecks>
278 278
 <msPeap:RequireCryptoBinding>false</msPeap:RequireCryptoBinding>
279 279
 </msPeap:EapType>
280 280
 </baseEap:Eap>
@@ -286,11 +286,11 @@  discard block
 block discarded – undo
286 286
 <EapType xmlns="http://www.microsoft.com/provisioning/MsPeapConnectionPropertiesV1">
287 287
 <ServerValidation>
288 288
 <DisableUserPromptForServerValidation>true</DisableUserPromptForServerValidation>
289
-<ServerNames>' . $servers . '</ServerNames>';
289
+<ServerNames>' . $servers.'</ServerNames>';
290 290
             if ($caArray) {
291 291
                 foreach ($caArray as $certAuthority) {
292 292
                     if ($certAuthority['root']) {
293
-                        $w7Ext .= "<TrustedRootCA>" . $certAuthority['sha1'] . "</TrustedRootCA>\n";
293
+                        $w7Ext .= "<TrustedRootCA>".$certAuthority['sha1']."</TrustedRootCA>\n";
294 294
                     }
295 295
                 }
296 296
             }
@@ -303,14 +303,14 @@  discard block
 block discarded – undo
303 303
 <UseWinLogonCredentials>false</UseWinLogonCredentials> 
304 304
 </EapType>
305 305
 </Eap>
306
-<EnableQuarantineChecks>' . $nea . '</EnableQuarantineChecks>
306
+<EnableQuarantineChecks>' . $nea.'</EnableQuarantineChecks>
307 307
 <RequireCryptoBinding>false</RequireCryptoBinding>
308 308
 ';
309 309
             if ($useAnon) {
310 310
                 $w7Ext .= '<PeapExtensions>
311 311
 <IdentityPrivacy xmlns="http://www.microsoft.com/provisioning/MsPeapConnectionPropertiesV2">
312 312
 <EnableIdentityPrivacy>true</EnableIdentityPrivacy>
313
-<AnonymousUserName>' . $outerUser . '</AnonymousUserName>
313
+<AnonymousUserName>' . $outerUser.'</AnonymousUserName>
314 314
 </IdentityPrivacy>
315 315
 </PeapExtensions>
316 316
             ';
@@ -328,8 +328,8 @@  discard block
 block discarded – undo
328 328
         $profileFileContEnd = '</EapHostConfig></EAPConfig>
329 329
 ';
330 330
         $returnArray = [];
331
-        $returnArray['vista'] = $profileFileCont . $vistaExt . $profileFileContEnd;
332
-        $returnArray['w7'] = $profileFileCont . $w7Ext . $profileFileContEnd;
331
+        $returnArray['vista'] = $profileFileCont.$vistaExt.$profileFileContEnd;
332
+        $returnArray['w7'] = $profileFileCont.$w7Ext.$profileFileContEnd;
333 333
         return $returnArray;
334 334
     }
335 335
 
@@ -348,10 +348,10 @@  discard block
 block discarded – undo
348 348
     private function writeWLANprofile($wlanProfileName, $ssid, $auth, $encryption, $eapConfig, $profileNumber) {
349 349
         $profileFileCont = '<?xml version="1.0"?>
350 350
 <WLANProfile xmlns="http://www.microsoft.com/networking/WLAN/profile/v1">
351
-<name>' . $wlanProfileName . '</name>
351
+<name>' . $wlanProfileName.'</name>
352 352
 <SSIDConfig>
353 353
 <SSID>
354
-<name>' . $ssid . '</name>
354
+<name>' . $ssid.'</name>
355 355
 </SSID>
356 356
 <nonBroadcast>true</nonBroadcast>
357 357
 </SSIDConfig>
@@ -361,8 +361,8 @@  discard block
 block discarded – undo
361 361
 <MSM>
362 362
 <security>
363 363
 <authEncryption>
364
-<authentication>' . $auth . '</authentication>
365
-<encryption>' . $encryption . '</encryption>
364
+<authentication>' . $auth.'</authentication>
365
+<encryption>' . $encryption.'</encryption>
366 366
 <useOneX>true</useOneX>
367 367
 </authEncryption>
368 368
 ';
@@ -392,9 +392,9 @@  discard block
 block discarded – undo
392 392
             mkdir('vista');
393 393
         }
394 394
         $vistaFileName = "vista/wlan_prof-$profileNumber.xml";
395
-        file_put_contents($vistaFileName, $profileFileCont . $eapConfig['vista'] . $closing);
395
+        file_put_contents($vistaFileName, $profileFileCont.$eapConfig['vista'].$closing);
396 396
         $sevenFileName = "w7/wlan_prof-$profileNumber.xml";
397
-        file_put_contents($sevenFileName, $profileFileCont . $eapConfig['w7'] . $closing);
397
+        file_put_contents($sevenFileName, $profileFileCont.$eapConfig['w7'].$closing);
398 398
         $this->loggerInstance->debug(2, "Installer has been written into directory $this->FPATH\n");
399 399
         $this->loggerInstance->debug(4, "WLAN_Profile:$wlanProfileName:$encryption\n");
400 400
         return("\"$wlanProfileName\" \"$encryption\"");
@@ -431,8 +431,8 @@  discard block
 block discarded – undo
431 431
             mkdir('vista');
432 432
         }
433 433
         
434
-        file_put_contents("vista/lan_prof.xml", $profileFileCont . $eapConfig['vista'] . $closing);
435
-        file_put_contents("w7/lan_prof.xml", $profileFileCont . $eapConfig['w7'] . $closing);
434
+        file_put_contents("vista/lan_prof.xml", $profileFileCont.$eapConfig['vista'].$closing);
435
+        file_put_contents("w7/lan_prof.xml", $profileFileCont.$eapConfig['w7'].$closing);
436 436
         
437 437
     }
438 438
 
@@ -446,7 +446,7 @@  discard block
 block discarded – undo
446 446
     private function writeMainNSH($eap, $attr) {
447 447
         $this->loggerInstance->debug(4, "writeMainNSH");
448 448
         $this->loggerInstance->debug(4, $attr);
449
-        $this->loggerInstance->debug(4, "MYLANG=" . $this->lang . "\n");
449
+        $this->loggerInstance->debug(4, "MYLANG=".$this->lang."\n");
450 450
 
451 451
         $eapOptions = [
452 452
             \core\common\EAP::PEAP => ['str' => 'PEAP', 'exec' => 'user'],
@@ -477,8 +477,8 @@  discard block
 block discarded – undo
477 477
         $this->loggerInstance->debug(4, "EAP_STR=$eapStr\n");
478 478
         $this->loggerInstance->debug(4, $eap);
479 479
 
480
-        $fcontents .= '!define ' . $eapStr;
481
-        $fcontents .= "\n" . '!define EXECLEVEL "' . $execLevel . '"';
480
+        $fcontents .= '!define '.$eapStr;
481
+        $fcontents .= "\n".'!define EXECLEVEL "'.$execLevel.'"';
482 482
         $fcontents .= $this->writeNsisDefines($attr);
483 483
         file_put_contents('main.nsh', $fcontents);
484 484
     }
@@ -507,7 +507,7 @@  discard block
 block discarded – undo
507 507
         }
508 508
         foreach ($caArray as $certAuthority) {
509 509
             $store = $certAuthority['root'] ? "root" : "ca";
510
-            $contentCerts .= '!insertmacro install_ca_cert "' . $certAuthority['file'] . '" "' . $certAuthority['sha1'] . '" "' . $store . "\"\n";
510
+            $contentCerts .= '!insertmacro install_ca_cert "'.$certAuthority['file'].'" "'.$certAuthority['sha1'].'" "'.$store."\"\n";
511 511
         }
512 512
         fwrite($fileHandleCerts, $contentCerts);
513 513
         fclose($fileHandleCerts);
Please login to merge, or discard this patch.
devices/ms/MsTlsProfile.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -45,7 +45,7 @@
 block discarded – undo
45 45
     private function getCredentialSource()
46 46
     {
47 47
         $element = new \core\DeviceXMLmain();
48
-        $element->setChild('CertificateStore','');
48
+        $element->setChild('CertificateStore', '');
49 49
         return($element);
50 50
     }
51 51
     
Please login to merge, or discard this patch.
devices/ms/MsPeapProfile.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -38,7 +38,7 @@
 block discarded – undo
38 38
     {
39 39
         $element = new \core\DeviceXMLmain();
40 40
         $element->setChild('ServerValidation', $this->getPeapServerValidation());
41
-        $element->setChild('FastReconnect','true');
41
+        $element->setChild('FastReconnect', 'true');
42 42
         $element->setChild('InnerEapOptional', 'false');
43 43
         $element->setChild('Eap', $this->getMsChapV2(), self::MS_BASEEAPCONN_NS);
44 44
         $element->setChild('EnableQuarantineChecks', $this->nea);
Please login to merge, or discard this patch.
devices/ms/MsOneX.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -43,8 +43,8 @@
 block discarded – undo
43 43
     {
44 44
         $element = new \core\DeviceXMLmain();
45 45
         $element->setChild('Type', $this->eapConfig->type, self::MS_EAPCOMMON_NS);
46
-        $element->setChild('VendorId',0, self::MS_EAPCOMMON_NS);
47
-        $element->setChild('VendorType',0, self::MS_EAPCOMMON_NS);
46
+        $element->setChild('VendorId', 0, self::MS_EAPCOMMON_NS);
47
+        $element->setChild('VendorType', 0, self::MS_EAPCOMMON_NS);
48 48
         $element->setChild('AuthorId', $this->eapConfig->authorId, self::MS_EAPCOMMON_NS);
49 49
         return($element);
50 50
     }
Please login to merge, or discard this patch.