@@ -26,4 +26,4 @@ |
||
| 26 | 26 | $Gui->defaultPagePrelude(); |
| 27 | 27 | |
| 28 | 28 | // and now, serve actual data |
| 29 | -include("skins/".$Gui->skinObject->skin."/index.php"); |
|
| 29 | +include("skins/" . $Gui->skinObject->skin . "/index.php"); |
|
@@ -19,7 +19,7 @@ discard block |
||
| 19 | 19 | * @package ModuleWriting |
| 20 | 20 | */ |
| 21 | 21 | namespace devices\xml; |
| 22 | -require_once(dirname(__FILE__).'/XML.inc.php'); |
|
| 22 | +require_once(dirname(__FILE__) . '/XML.inc.php'); |
|
| 23 | 23 | |
| 24 | 24 | /** |
| 25 | 25 | * This class implements full functionality of the generic XML device |
@@ -154,7 +154,7 @@ discard block |
||
| 154 | 154 | $objs = []; |
| 155 | 155 | if ($this->langScope === 'global') { |
| 156 | 156 | foreach ($attributeList['langs'] as $language => $value) { |
| 157 | - $language = ( $language === 'C' ? 'any' : $language ); |
|
| 157 | + $language = ($language === 'C' ? 'any' : $language); |
|
| 158 | 158 | $obj = new $className(); |
| 159 | 159 | $obj->setValue($value); |
| 160 | 160 | $obj->setAttributes(['lang' => $language]); |
@@ -178,7 +178,7 @@ discard block |
||
| 178 | 178 | $profileNameLangs = $attr['profile:name']['langs']; |
| 179 | 179 | } |
| 180 | 180 | foreach ($instNameLangs as $language => $value) { |
| 181 | - $language = ( $language === 'C' ? 'any' : $language ); |
|
| 181 | + $language = ($language === 'C' ? 'any' : $language); |
|
| 182 | 182 | $displayname = new DisplayName(); |
| 183 | 183 | if (isset($profileNameLangs)) { |
| 184 | 184 | $langOrC = isset($profileNameLangs[$language]) ? $profileNameLangs[$language] : $profileNameLangs['C']; |
@@ -351,7 +351,7 @@ discard block |
||
| 351 | 351 | $clientCertificateObject->setValue(base64_encode($this->clientCert["certdata"])); |
| 352 | 352 | $clientCertificateObject->setAttributes(['format' => 'PKCS12', 'encoding' => 'base64']); |
| 353 | 353 | |
| 354 | - $clientsidecredential->setProperty('ClientCertificate',$clientCertificateObject); |
|
| 354 | + $clientsidecredential->setProperty('ClientCertificate', $clientCertificateObject); |
|
| 355 | 355 | } |
| 356 | 356 | |
| 357 | 357 | $authmethod->setProperty('ClientSideCredential', $clientsidecredential); |
@@ -12,11 +12,11 @@ discard block |
||
| 12 | 12 | |
| 13 | 13 | array_push($FAQ, [ |
| 14 | 14 | 'title' => sprintf(_("My %s is not listed. Can't I just use any of the other ones?"), $skinObject->nomenclature_inst), |
| 15 | - 'text' => sprintf(_("No! The installers contain security settings which are specific to the %s. If you are not from that %s, your computer will detect that you are about to send your username and credential to an unauthorised server and will abort the login. Using a different %s installer is <i>guaranteed to not work</i>!"),$skinObject->nomenclature_inst,$skinObject->nomenclature_inst,$skinObject->nomenclature_inst) |
|
| 15 | + 'text' => sprintf(_("No! The installers contain security settings which are specific to the %s. If you are not from that %s, your computer will detect that you are about to send your username and credential to an unauthorised server and will abort the login. Using a different %s installer is <i>guaranteed to not work</i>!"), $skinObject->nomenclature_inst, $skinObject->nomenclature_inst, $skinObject->nomenclature_inst) |
|
| 16 | 16 | ]); |
| 17 | 17 | |
| 18 | 18 | array_push($FAQ, [ |
| 19 | - 'title' => sprintf(_("What can I do to get my %s listed?"),$skinObject->nomenclature_inst), |
|
| 19 | + 'title' => sprintf(_("What can I do to get my %s listed?"), $skinObject->nomenclature_inst), |
|
| 20 | 20 | 'text' => sprintf(_("Contact %s administrators at your %s and complain. It will take at most one hour of their time to get things done."), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'], $skinObject->nomenclature_inst) |
| 21 | 21 | ]); |
| 22 | 22 | |
@@ -32,14 +32,14 @@ discard block |
||
| 32 | 32 | |
| 33 | 33 | if (CONFIG_CONFASSISTANT['CONSORTIUM']['name'] == "eduroam") { |
| 34 | 34 | array_push($FAQ, [ |
| 35 | - 'title' => sprintf(_("What is this %s thing anyway?"),CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']), |
|
| 36 | - 'text' => sprintf(_("%s is a global WiFi roaming consortium which gives members of education and research access to the internet <i>for free</i> on all %s hotspots on the planet. There are several million %s users already, enjoying free internet access on more than 6.000 hotspots! Visit <a href='http://www.eduroam.org'>the %s homepage</a> for more details."),CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'],CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'],CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'],CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']) |
|
| 35 | + 'title' => sprintf(_("What is this %s thing anyway?"), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']), |
|
| 36 | + 'text' => sprintf(_("%s is a global WiFi roaming consortium which gives members of education and research access to the internet <i>for free</i> on all %s hotspots on the planet. There are several million %s users already, enjoying free internet access on more than 6.000 hotspots! Visit <a href='http://www.eduroam.org'>the %s homepage</a> for more details."), CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'], CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'], CONFIG_CONFASSISTANT['CONSORTIUM']['display_name'], CONFIG_CONFASSISTANT['CONSORTIUM']['display_name']) |
|
| 37 | 37 | ]); |
| 38 | 38 | } |
| 39 | 39 | |
| 40 | 40 | array_push($FAQ, [ |
| 41 | 41 | 'title' => sprintf(_("Is it safe to use %s installers?"), CONFIG['APPEARANCE']['productname']), |
| 42 | - 'text' => sprintf(_("%s installers configure security settings on your device, therefore you should be sure that you are using genuine ones."), CONFIG['APPEARANCE']['productname']) . ' ' . ( isset(CONFIG_CONFASSISTANT['CONSORTIUM']['signer_name']) && CONFIG_CONFASSISTANT['CONSORTIUM']['signer_name'] != "" ? sprintf(_("This is why %s installers are digitally signed by %s. Watch out for a system message confirming this."), CONFIG['APPEARANCE']['productname'], CONFIG_CONFASSISTANT['CONSORTIUM']['signer_name']) : ""), |
|
| 42 | + 'text' => sprintf(_("%s installers configure security settings on your device, therefore you should be sure that you are using genuine ones."), CONFIG['APPEARANCE']['productname']) . ' ' . (isset(CONFIG_CONFASSISTANT['CONSORTIUM']['signer_name']) && CONFIG_CONFASSISTANT['CONSORTIUM']['signer_name'] != "" ? sprintf(_("This is why %s installers are digitally signed by %s. Watch out for a system message confirming this."), CONFIG['APPEARANCE']['productname'], CONFIG_CONFASSISTANT['CONSORTIUM']['signer_name']) : ""), |
|
| 43 | 43 | ]); |
| 44 | 44 | |
| 45 | 45 | array_push($FAQ, [ |
@@ -125,6 +125,7 @@ discard block |
||
| 125 | 125 | * |
| 126 | 126 | * @param string $device |
| 127 | 127 | * @param AbstractProfile $profile |
| 128 | + * @param string $generatedFor |
|
| 128 | 129 | * @return array info about the new installer (mime and link) |
| 129 | 130 | */ |
| 130 | 131 | private function generateNewInstaller($device, $profile, $generatedFor, $token, $password) { |
@@ -459,6 +460,10 @@ discard block |
||
| 459 | 460 | readfile($file); |
| 460 | 461 | } |
| 461 | 462 | |
| 463 | + /** |
|
| 464 | + * @param string $destFile |
|
| 465 | + * @param integer $resize |
|
| 466 | + */ |
|
| 462 | 467 | private function processImage($inputImage, $destFile, $width, $height, $resize) { |
| 463 | 468 | $info = new \finfo(); |
| 464 | 469 | $filetype = $info->buffer($inputImage, FILEINFO_MIME_TYPE); |
@@ -485,7 +490,6 @@ discard block |
||
| 485 | 490 | * When called for DiscoJuice, first check if file cache exists |
| 486 | 491 | * If not then generate the file and save it in the cache |
| 487 | 492 | * @param int $idp IdP identifier |
| 488 | - * @param int $disco flag turning on image generation for DiscoJuice |
|
| 489 | 493 | * @param int $width maximum width of the generated image |
| 490 | 494 | * @param int $height maximum height of the generated image |
| 491 | 495 | * if one of these is 0 then it is treated as no upper bound |
@@ -260,6 +260,9 @@ discard block |
||
| 260 | 260 | return _("Sorry, this should not happen - no additional information is available"); |
| 261 | 261 | } |
| 262 | 262 | |
| 263 | + /** |
|
| 264 | + * @param string $file |
|
| 265 | + */ |
|
| 263 | 266 | private function findSourceFile($file) { |
| 264 | 267 | if (is_file($this->module_path . '/Files/' . $this->device_id . '/' . $file)) { |
| 265 | 268 | return $this->module_path . '/Files/' . $this->device_id . '/' . $file; |
@@ -540,6 +543,9 @@ discard block |
||
| 540 | 543 | 'application/pdf' => 'pdf', |
| 541 | 544 | ]; |
| 542 | 545 | |
| 546 | + /** |
|
| 547 | + * @param string $type |
|
| 548 | + */ |
|
| 543 | 549 | private function saveLogoFile($logos,$type) { |
| 544 | 550 | $iterator = 0; |
| 545 | 551 | $returnarray = []; |
@@ -102,7 +102,7 @@ discard block |
||
| 102 | 102 | $dummy_inst2 = _("organisation"); |
| 103 | 103 | // and do something useless with the strings so that there's no "unused" complaint |
| 104 | 104 | // by Scrutinizer |
| 105 | - if( $dummy_NRO . $dummy_inst1 . $dummy_inst2 == "") { |
|
| 105 | + if ($dummy_NRO . $dummy_inst1 . $dummy_inst2 == "") { |
|
| 106 | 106 | // oh well. |
| 107 | 107 | } |
| 108 | 108 | |
@@ -212,7 +212,7 @@ discard block |
||
| 212 | 212 | } |
| 213 | 213 | if (isset($this->attributes['general:logo_file'])) { |
| 214 | 214 | $this->loggerInstance->debug(5, "saving IDP logo\n"); |
| 215 | - $this->attributes['internal:logo_file'] = $this->saveLogoFile($this->attributes['general:logo_file'],'idp'); |
|
| 215 | + $this->attributes['internal:logo_file'] = $this->saveLogoFile($this->attributes['general:logo_file'], 'idp'); |
|
| 216 | 216 | } |
| 217 | 217 | if (isset($this->attributes['fed:logo_file'])) { |
| 218 | 218 | $this->loggerInstance->debug(5, "saving FED logo\n"); |
@@ -552,7 +552,7 @@ discard block |
||
| 552 | 552 | 'application/pdf' => 'pdf', |
| 553 | 553 | ]; |
| 554 | 554 | |
| 555 | - private function saveLogoFile($logos,$type) { |
|
| 555 | + private function saveLogoFile($logos, $type) { |
|
| 556 | 556 | $iterator = 0; |
| 557 | 557 | $returnarray = []; |
| 558 | 558 | foreach ($logos as $blob) { |
@@ -14,6 +14,6 @@ |
||
| 14 | 14 | $validator = new \web\lib\common\InputValidation(); |
| 15 | 15 | |
| 16 | 16 | echo "<pre>"; |
| 17 | -echo "Testing ".$validator->realm(filter_input(INPUT_GET,'realm', FILTER_SANITIZE_STRING))." in ".$validator->string(filter_input(INPUT_GET, 'visited', FILTER_SANITIZE_STRING)); |
|
| 17 | +echo "Testing " . $validator->realm(filter_input(INPUT_GET, 'realm', FILTER_SANITIZE_STRING)) . " in " . $validator->string(filter_input(INPUT_GET, 'visited', FILTER_SANITIZE_STRING)); |
|
| 18 | 18 | print_r($telepath->magic()); |
| 19 | 19 | echo "</pre>"; |
| 20 | 20 | \ No newline at end of file |
@@ -53,14 +53,14 @@ |
||
| 53 | 53 | } |
| 54 | 54 | |
| 55 | 55 | switch ($_GET['token']) { |
| 56 | - case "SELF-REGISTER": |
|
| 57 | - $token = "SELF-REGISTER"; |
|
| 58 | - $checkval = \core\UserManagement::TOKENSTATUS_OK_NEW; |
|
| 59 | - $federation = CONFIG_CONFASSISTANT['CONSORTIUM']['selfservice_registration']; |
|
| 60 | - break; |
|
| 61 | - default: |
|
| 62 | - $token = $validator->token(filter_input(INPUT_GET,'token',FILTER_SANITIZE_STRING)); |
|
| 63 | - $checkval = $usermgmt->checkTokenValidity($token); |
|
| 56 | + case "SELF-REGISTER": |
|
| 57 | + $token = "SELF-REGISTER"; |
|
| 58 | + $checkval = \core\UserManagement::TOKENSTATUS_OK_NEW; |
|
| 59 | + $federation = CONFIG_CONFASSISTANT['CONSORTIUM']['selfservice_registration']; |
|
| 60 | + break; |
|
| 61 | + default: |
|
| 62 | + $token = $validator->token(filter_input(INPUT_GET,'token',FILTER_SANITIZE_STRING)); |
|
| 63 | + $checkval = $usermgmt->checkTokenValidity($token); |
|
| 64 | 64 | } |
| 65 | 65 | |
| 66 | 66 | if ($checkval < 0) { |
@@ -59,7 +59,7 @@ |
||
| 59 | 59 | $federation = CONFIG_CONFASSISTANT['CONSORTIUM']['selfservice_registration']; |
| 60 | 60 | break; |
| 61 | 61 | default: |
| 62 | - $token = $validator->token(filter_input(INPUT_GET,'token',FILTER_SANITIZE_STRING)); |
|
| 62 | + $token = $validator->token(filter_input(INPUT_GET, 'token', FILTER_SANITIZE_STRING)); |
|
| 63 | 63 | $checkval = $usermgmt->checkTokenValidity($token); |
| 64 | 64 | } |
| 65 | 65 | |
@@ -84,14 +84,14 @@ |
||
| 84 | 84 | $langConverted[] = $hardSetLang; |
| 85 | 85 | } |
| 86 | 86 | if (!empty($_REQUEST['lang'])) { |
| 87 | - $recoverLang = filter_input(INPUT_GET,'lang', FILTER_SANITIZE_STRING) ?? filter_input(INPUT_POST, 'lang', FILTER_SANITIZE_STRING); |
|
| 87 | + $recoverLang = filter_input(INPUT_GET, 'lang', FILTER_SANITIZE_STRING) ?? filter_input(INPUT_POST, 'lang', FILTER_SANITIZE_STRING); |
|
| 88 | 88 | $langConverted[] = $recoverLang; |
| 89 | 89 | } |
| 90 | 90 | if (!empty($_SESSION['language'])) { |
| 91 | 91 | $langConverted[] = $_SESSION['language']; |
| 92 | 92 | } |
| 93 | 93 | if (!empty($_SERVER['HTTP_ACCEPT_LANGUAGE'])) { |
| 94 | - $langs = explode(",", filter_input(INPUT_SERVER,"HTTP_ACCEPT_LANGUAGE", FILTER_SANITIZE_STRING)); |
|
| 94 | + $langs = explode(",", filter_input(INPUT_SERVER, "HTTP_ACCEPT_LANGUAGE", FILTER_SANITIZE_STRING)); |
|
| 95 | 95 | foreach ($langs as $lang) { |
| 96 | 96 | $result = []; |
| 97 | 97 | preg_match("/(.*);+.*/", $lang, $result); |
@@ -21,7 +21,7 @@ discard block |
||
| 21 | 21 | |
| 22 | 22 | $cleanToken = FALSE; |
| 23 | 23 | $tokenStatus = ["status" => \core\ProfileSilverbullet::SB_TOKENSTATUS_INVALID, |
| 24 | - "cert_status" => [],]; |
|
| 24 | + "cert_status" => [], ]; |
|
| 25 | 25 | $profile = NULL; |
| 26 | 26 | $idp = NULL; |
| 27 | 27 | $fed = NULL; |
@@ -38,7 +38,7 @@ discard block |
||
| 38 | 38 | // it can be VALID (exists and not redeemed, EXPIRED, REDEEMED or INVALID (non existent) |
| 39 | 39 | $tokenStatus = \core\ProfileSilverbullet::tokenStatus($cleanToken); |
| 40 | 40 | } |
| 41 | -} elseif (isset($_SERVER['SSL_CLIENT_SAN_Email']) || isset($_SERVER['SSL_CLIENT_SAN_Email_0']) ) { |
|
| 41 | +} elseif (isset($_SERVER['SSL_CLIENT_SAN_Email']) || isset($_SERVER['SSL_CLIENT_SAN_Email_0'])) { |
|
| 42 | 42 | // maybe the user authenticated with his client cert? Then pick any of his |
| 43 | 43 | // tokens to go on |
| 44 | 44 | $certname = $_SERVER['SSL_CLIENT_SAN_Email'] ?? $_SERVER['SSL_CLIENT_SAN_Email_0']; |