@@ -75,7 +75,7 @@ |
||
| 75 | 75 | if ( |
| 76 | 76 | !isset($_SERVER['SSL_CLIENT_CERT']) || |
| 77 | 77 | ($_SERVER['SSL_CLIENT_CERT'] == '') |
| 78 | - ) { |
|
| 78 | + ) { |
|
| 79 | 79 | return; |
| 80 | 80 | } |
| 81 | 81 | |
@@ -93,7 +93,7 @@ |
||
| 93 | 93 | return; |
| 94 | 94 | } |
| 95 | 95 | |
| 96 | - Logger::warning('authX509: user certificate expires in ' . $daysleft . ' days'); |
|
| 96 | + Logger::warning('authX509: user certificate expires in '.$daysleft.' days'); |
|
| 97 | 97 | $state['daysleft'] = $daysleft; |
| 98 | 98 | $state['renewurl'] = $this->renewurl; |
| 99 | 99 | |
@@ -63,7 +63,7 @@ discard block |
||
| 63 | 63 | |
| 64 | 64 | $this->ldapcf = new ConfigHelper( |
| 65 | 65 | $config, |
| 66 | - 'Authentication source ' . var_export($this->authId, true) |
|
| 66 | + 'Authentication source '.var_export($this->authId, true) |
|
| 67 | 67 | ); |
| 68 | 68 | } |
| 69 | 69 | |
@@ -128,7 +128,7 @@ discard block |
||
| 128 | 128 | // value is scalar |
| 129 | 129 | if (array_key_exists($x509_attr, $client_cert_data['subject'])) { |
| 130 | 130 | $value = $client_cert_data['subject'][$x509_attr]; |
| 131 | - Logger::info('authX509: cert ' . $x509_attr . ' = ' . $value); |
|
| 131 | + Logger::info('authX509: cert '.$x509_attr.' = '.$value); |
|
| 132 | 132 | |
| 133 | 133 | $dn = $ldapcf->searchfordn($ldap_attr, $value, true); |
| 134 | 134 | if ($dn !== null) { |
@@ -158,7 +158,7 @@ discard block |
||
| 158 | 158 | $ldap_certs = $ldapcf->getAttributes($dn, $this->ldapusercert); |
| 159 | 159 | |
| 160 | 160 | if (empty($ldap_certs)) { |
| 161 | - Logger::error('authX509: no certificate found in LDAP for dn=' . $dn); |
|
| 161 | + Logger::error('authX509: no certificate found in LDAP for dn='.$dn); |
|
| 162 | 162 | $state['authX509.error'] = "UNKNOWNCERT"; |
| 163 | 163 | $this->authFailed($state); |
| 164 | 164 | |
@@ -176,7 +176,7 @@ discard block |
||
| 176 | 176 | $pem = Utils\Crypto::der2pem($ldap_cert); |
| 177 | 177 | $ldap_cert_data = openssl_x509_parse($pem); |
| 178 | 178 | if ($ldap_cert_data === false) { |
| 179 | - Logger::error('authX509: cert in LDAP is invalid for dn=' . $dn); |
|
| 179 | + Logger::error('authX509: cert in LDAP is invalid for dn='.$dn); |
|
| 180 | 180 | continue; |
| 181 | 181 | } |
| 182 | 182 | |
@@ -189,7 +189,7 @@ discard block |
||
| 189 | 189 | } |
| 190 | 190 | } |
| 191 | 191 | |
| 192 | - Logger::error('authX509: no matching cert in LDAP for dn=' . $dn); |
|
| 192 | + Logger::error('authX509: no matching cert in LDAP for dn='.$dn); |
|
| 193 | 193 | $state['authX509.error'] = "UNKNOWNCERT"; |
| 194 | 194 | $this->authFailed($state); |
| 195 | 195 | |