@@ -1,7 +1,7 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | 2 | namespace Elphin\LEClient; |
| 3 | 3 | |
| 4 | -require_once(__DIR__.'/../vendor/autoload.php'); |
|
| 4 | +require_once(__DIR__ . '/../vendor/autoload.php'); |
|
| 5 | 5 | |
| 6 | 6 | //Sets the maximum execution time to two minutes, to be sure. |
| 7 | 7 | ini_set('max_execution_time', 120); |
@@ -15,7 +15,7 @@ discard block |
||
| 15 | 15 | |
| 16 | 16 | $email = ['[email protected]']; |
| 17 | 17 | $basename = 'le.dixo.net'; |
| 18 | -$domains=['le.dixo.net']; |
|
| 18 | +$domains = ['le.dixo.net']; |
|
| 19 | 19 | |
| 20 | 20 | $logger = new DiagnosticLogger; |
| 21 | 21 | |
@@ -46,8 +46,8 @@ discard block |
||
| 46 | 46 | } |
| 47 | 47 | } |
| 48 | 48 | catch (\Exception $e) { |
| 49 | - echo $e->getMessage()."\n"; |
|
| 50 | - echo $e->getTraceAsString()."\n"; |
|
| 49 | + echo $e->getMessage() . "\n"; |
|
| 50 | + echo $e->getTraceAsString() . "\n"; |
|
| 51 | 51 | |
| 52 | 52 | echo "\nDiagnostic logs\n"; |
| 53 | 53 | $logger->dumpConsole(); |
@@ -1,7 +1,7 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | 2 | namespace Elphin\LEClient; |
| 3 | 3 | |
| 4 | -require_once(__DIR__.'/../vendor/autoload.php'); |
|
| 4 | +require_once(__DIR__ . '/../vendor/autoload.php'); |
|
| 5 | 5 | |
| 6 | 6 | //Sets the maximum execution time to two minutes, to be sure. |
| 7 | 7 | ini_set('max_execution_time', 120); |
@@ -15,7 +15,7 @@ discard block |
||
| 15 | 15 | |
| 16 | 16 | $email = ['[email protected]']; |
| 17 | 17 | $basename = 'le.dixo.net'; |
| 18 | -$domains=['le.dixo.net']; |
|
| 18 | +$domains = ['le.dixo.net']; |
|
| 19 | 19 | |
| 20 | 20 | $logger = new DiagnosticLogger; |
| 21 | 21 | |
@@ -26,14 +26,14 @@ discard block |
||
| 26 | 26 | // in the array (argument 2) will be on the certificate. |
| 27 | 27 | $order = $client->getOrCreateOrder($basename, $domains); |
| 28 | 28 | // Check whether there are any authorizations pending. If that is the case, try to verify the pending authorizations. |
| 29 | -if(!$order->allAuthorizationsValid()) |
|
| 29 | +if (!$order->allAuthorizationsValid()) |
|
| 30 | 30 | { |
| 31 | 31 | // Get the DNS challenges from the pending authorizations. |
| 32 | 32 | $pending = $order->getPendingAuthorizations(LEOrder::CHALLENGE_TYPE_DNS); |
| 33 | 33 | // Walk the list of pending authorization DNS challenges. |
| 34 | - if(!empty($pending)) |
|
| 34 | + if (!empty($pending)) |
|
| 35 | 35 | { |
| 36 | - foreach($pending as $challenge) |
|
| 36 | + foreach ($pending as $challenge) |
|
| 37 | 37 | { |
| 38 | 38 | // Let LetsEncrypt verify this challenge, which should have been fulfilled in exampleDNSStart.php. |
| 39 | 39 | $order->verifyPendingOrderAuthorization($challenge['identifier'], LEOrder::CHALLENGE_TYPE_DNS); |
@@ -41,12 +41,12 @@ discard block |
||
| 41 | 41 | } |
| 42 | 42 | } |
| 43 | 43 | // Check once more whether all authorizations are valid before we can finalize the order. |
| 44 | -if($order->allAuthorizationsValid()) |
|
| 44 | +if ($order->allAuthorizationsValid()) |
|
| 45 | 45 | { |
| 46 | 46 | // Finalize the order first, if that is not yet done. |
| 47 | - if(!$order->isFinalized()) $order->finalizeOrder(); |
|
| 47 | + if (!$order->isFinalized()) $order->finalizeOrder(); |
|
| 48 | 48 | // Check whether the order has been finalized before we can get the certificate. If finalized, get the certificate. |
| 49 | - if($order->isFinalized()) $order->getCertificate(); |
|
| 49 | + if ($order->isFinalized()) $order->getCertificate(); |
|
| 50 | 50 | |
| 51 | 51 | //finally, here's how we revoke |
| 52 | 52 | //echo "REVOKING...\n"; |
@@ -1,7 +1,7 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | 2 | namespace Elphin\LEClient; |
| 3 | 3 | |
| 4 | -require_once(__DIR__.'/../vendor/autoload.php'); |
|
| 4 | +require_once(__DIR__ . '/../vendor/autoload.php'); |
|
| 5 | 5 | |
| 6 | 6 | //Sets the maximum execution time to two minutes, to be sure. |
| 7 | 7 | ini_set('max_execution_time', 120); |
@@ -22,20 +22,20 @@ discard block |
||
| 22 | 22 | // domains in the array (argument 2) will be on the certificate. |
| 23 | 23 | $order = $client->getOrCreateOrder($basename, $domains); |
| 24 | 24 | // Check whether there are any authorizations pending. If that is the case, try to verify the pending authorizations. |
| 25 | -if(!$order->allAuthorizationsValid()) |
|
| 25 | +if (!$order->allAuthorizationsValid()) |
|
| 26 | 26 | { |
| 27 | 27 | // Get the HTTP challenges from the pending authorizations. |
| 28 | 28 | $pending = $order->getPendingAuthorizations(LEOrder::CHALLENGE_TYPE_HTTP); |
| 29 | 29 | // Walk the list of pending authorization HTTP challenges. |
| 30 | - if(!empty($pending)) |
|
| 30 | + if (!empty($pending)) |
|
| 31 | 31 | { |
| 32 | - foreach($pending as $challenge) |
|
| 32 | + foreach ($pending as $challenge) |
|
| 33 | 33 | { |
| 34 | 34 | // Define the folder in which to store the challenge. For the purpose of this example, a fictitious path is |
| 35 | 35 | // set. |
| 36 | 36 | $folder = '/path/to/' . $challenge['identifier'] . '/.well-known/acme-challenge/'; |
| 37 | 37 | // Check if that directory yet exists. If not, create it. |
| 38 | - if(!file_exists($folder)) mkdir($folder, 0777, true); |
|
| 38 | + if (!file_exists($folder)) mkdir($folder, 0777, true); |
|
| 39 | 39 | // Store the challenge file for this domain. |
| 40 | 40 | file_put_contents($folder . $challenge['filename'], $challenge['content']); |
| 41 | 41 | // Let LetsEncrypt verify this challenge. |
@@ -44,12 +44,12 @@ discard block |
||
| 44 | 44 | } |
| 45 | 45 | } |
| 46 | 46 | // Check once more whether all authorizations are valid before we can finalize the order. |
| 47 | -if($order->allAuthorizationsValid()) |
|
| 47 | +if ($order->allAuthorizationsValid()) |
|
| 48 | 48 | { |
| 49 | 49 | // Finalize the order first, if that is not yet done. |
| 50 | - if(!$order->isFinalized()) $order->finalizeOrder(); |
|
| 50 | + if (!$order->isFinalized()) $order->finalizeOrder(); |
|
| 51 | 51 | // Check whether the order has been finalized before we can get the certificate. If finalized, get the certificate. |
| 52 | - if($order->isFinalized()) $order->getCertificate(); |
|
| 52 | + if ($order->isFinalized()) $order->getCertificate(); |
|
| 53 | 53 | } |
| 54 | 54 | |
| 55 | 55 | echo "\nDiagnostic logs\n"; |
@@ -45,7 +45,7 @@ discard block |
||
| 45 | 45 | $this->log = $log; |
| 46 | 46 | |
| 47 | 47 | if (empty($storage->getAccountPublicKey()) || empty($storage->getAccountPrivateKey())) { |
| 48 | - $this->log->notice("No account found for ".implode(',', $email).", attempting to create account"); |
|
| 48 | + $this->log->notice("No account found for " . implode(',', $email) . ", attempting to create account"); |
|
| 49 | 49 | |
| 50 | 50 | $accountKey = LEFunctions::RSAgenerateKeys(); |
| 51 | 51 | $storage->setAccountPublicKey($accountKey['public']); |
@@ -70,7 +70,7 @@ discard block |
||
| 70 | 70 | */ |
| 71 | 71 | private function createLEAccount($email) |
| 72 | 72 | { |
| 73 | - $contact = array_map(function ($addr) { |
|
| 73 | + $contact = array_map(function($addr) { |
|
| 74 | 74 | return empty($addr) ? '' : (strpos($addr, 'mailto') === false ? 'mailto:' . $addr : $addr); |
| 75 | 75 | }, $email); |
| 76 | 76 | |
@@ -142,7 +142,7 @@ discard block |
||
| 142 | 142 | */ |
| 143 | 143 | public function updateAccount($email) |
| 144 | 144 | { |
| 145 | - $contact = array_map(function ($addr) { |
|
| 145 | + $contact = array_map(function($addr) { |
|
| 146 | 146 | return empty($addr) ? '' : (strpos($addr, 'mailto') === false ? 'mailto:' . $addr : $addr); |
| 147 | 147 | }, $email); |
| 148 | 148 | |
@@ -177,7 +177,7 @@ discard block |
||
| 177 | 177 | */ |
| 178 | 178 | public function changeAccountKeys() |
| 179 | 179 | { |
| 180 | - $new=LEFunctions::RSAgenerateKeys(); |
|
| 180 | + $new = LEFunctions::RSAgenerateKeys(); |
|
| 181 | 181 | |
| 182 | 182 | $privateKey = openssl_pkey_get_private($new['private']); |
| 183 | 183 | if ($privateKey === false) { |
@@ -14,7 +14,7 @@ discard block |
||
| 14 | 14 | |
| 15 | 15 | public function __construct($dir = null) |
| 16 | 16 | { |
| 17 | - $this->dir = $dir ?? getcwd().DIRECTORY_SEPARATOR.'certificates'; |
|
| 17 | + $this->dir = $dir ?? getcwd() . DIRECTORY_SEPARATOR . 'certificates'; |
|
| 18 | 18 | |
| 19 | 19 | if (!is_dir($this->dir)) { |
| 20 | 20 | /** @scrutinizer ignore-unhandled */ @mkdir($this->dir); |
@@ -59,7 +59,7 @@ discard block |
||
| 59 | 59 | |
| 60 | 60 | private function getDomainKey($domain, $suffix) |
| 61 | 61 | { |
| 62 | - return str_replace('*', 'wildcard', $domain).'.'.$suffix; |
|
| 62 | + return str_replace('*', 'wildcard', $domain) . '.' . $suffix; |
|
| 63 | 63 | } |
| 64 | 64 | /** |
| 65 | 65 | * @inheritdoc |
@@ -127,8 +127,8 @@ discard block |
||
| 127 | 127 | |
| 128 | 128 | private function getMetadataFilename($key) |
| 129 | 129 | { |
| 130 | - $key=str_replace('*', 'wildcard', $key); |
|
| 131 | - $file=$this->dir.DIRECTORY_SEPARATOR.$key; |
|
| 130 | + $key = str_replace('*', 'wildcard', $key); |
|
| 131 | + $file = $this->dir . DIRECTORY_SEPARATOR . $key; |
|
| 132 | 132 | return $file; |
| 133 | 133 | } |
| 134 | 134 | /** |
@@ -136,7 +136,7 @@ discard block |
||
| 136 | 136 | */ |
| 137 | 137 | public function getMetadata($key) |
| 138 | 138 | { |
| 139 | - $file=$this->getMetadataFilename($key); |
|
| 139 | + $file = $this->getMetadataFilename($key); |
|
| 140 | 140 | if (!file_exists($file)) { |
| 141 | 141 | return null; |
| 142 | 142 | } |
@@ -148,7 +148,7 @@ discard block |
||
| 148 | 148 | */ |
| 149 | 149 | public function setMetadata($key, $value) |
| 150 | 150 | { |
| 151 | - $file=$this->getMetadataFilename($key); |
|
| 151 | + $file = $this->getMetadataFilename($key); |
|
| 152 | 152 | if (is_null($value)) { |
| 153 | 153 | //nothing to store, ensure file is removed |
| 154 | 154 | if (file_exists($file)) { |
@@ -164,7 +164,7 @@ discard block |
||
| 164 | 164 | */ |
| 165 | 165 | public function hasMetadata($key) |
| 166 | 166 | { |
| 167 | - $file=$this->getMetadataFilename($key); |
|
| 167 | + $file = $this->getMetadataFilename($key); |
|
| 168 | 168 | return file_exists($file); |
| 169 | 169 | } |
| 170 | 170 | } |
@@ -154,7 +154,7 @@ |
||
| 154 | 154 | //4xx/5xx failures are not expected and we throw exceptions for them |
| 155 | 155 | $msg = "$method $URL failed"; |
| 156 | 156 | if ($e->hasResponse()) { |
| 157 | - $body = (string)$e->getResponse()->getBody(); |
|
| 157 | + $body = (string) $e->getResponse()->getBody(); |
|
| 158 | 158 | $json = json_decode($body, true); |
| 159 | 159 | if (!empty($json) && isset($json['detail'])) { |
| 160 | 160 | $msg .= " ({$json['detail']})"; |
@@ -104,7 +104,7 @@ |
||
| 104 | 104 | 'query' => [ |
| 105 | 105 | 'name' => $name, |
| 106 | 106 | 'type' => $type, |
| 107 | - 'edns_client_subnet' => '0.0.0.0/0', //disable geotagged dns results |
|
| 107 | + 'edns_client_subnet' => '0.0.0.0/0', //disable geotagged dns results |
|
| 108 | 108 | 'ct' => 'application/dns-json', //cloudflare requires this |
| 109 | 109 | ], |
| 110 | 110 | 'headers' => [ |
@@ -13,7 +13,7 @@ |
||
| 13 | 13 | public function checkChallenge($domain, $requiredDigest) : bool |
| 14 | 14 | { |
| 15 | 15 | $hostname = '_acme-challenge.' . str_replace('*.', '', $domain); |
| 16 | - $records = dns_get_record($hostname, DNS_TXT); |
|
| 16 | + $records = dns_get_record($hostname, DNS_TXT); |
|
| 17 | 17 | foreach ($records as $record) { |
| 18 | 18 | if ($record['host'] == $hostname && $record['type'] == 'TXT' && $record['txt'] == $requiredDigest) { |
| 19 | 19 | return true; |
@@ -10,7 +10,7 @@ |
||
| 10 | 10 | */ |
| 11 | 11 | class Sleep |
| 12 | 12 | { |
| 13 | - public function for($seconds) |
|
| 13 | + public function for ($seconds) |
|
| 14 | 14 | { |
| 15 | 15 | sleep($seconds); |
| 16 | 16 | } |