@@ -106,13 +106,13 @@ discard block |
||
106 | 106 | try { |
107 | 107 | list($data, $responseHeaders) = \SimpleSAML\Utils\HTTP::fetch($source['src'], $context, true); |
108 | 108 | } catch (\Exception $e) { |
109 | - Logger::warning('metarefresh: ' . $e->getMessage()); |
|
109 | + Logger::warning('metarefresh: '.$e->getMessage()); |
|
110 | 110 | } |
111 | 111 | |
112 | 112 | // We have response headers, so the request succeeded |
113 | 113 | if (!isset($responseHeaders)) { |
114 | 114 | // No response headers, this means the request failed in some way, so re-use old data |
115 | - Logger::debug('No response from ' . $source['src'] . ' - attempting to re-use cached metadata'); |
|
115 | + Logger::debug('No response from '.$source['src'].' - attempting to re-use cached metadata'); |
|
116 | 116 | $this->addCachedMetadata($source); |
117 | 117 | return; |
118 | 118 | } elseif (preg_match('@^HTTP/1\.[01]\s304\s@', $responseHeaders[0])) { |
@@ -122,7 +122,7 @@ discard block |
||
122 | 122 | return; |
123 | 123 | } elseif (!preg_match('@^HTTP/1\.[01]\s200\s@', $responseHeaders[0])) { |
124 | 124 | // Other error |
125 | - Logger::debug('Error from ' . $source['src'] . ' - attempting to re-use cached metadata'); |
|
125 | + Logger::debug('Error from '.$source['src'].' - attempting to re-use cached metadata'); |
|
126 | 126 | $this->addCachedMetadata($source); |
127 | 127 | return; |
128 | 128 | } |
@@ -141,8 +141,8 @@ discard block |
||
141 | 141 | try { |
142 | 142 | $entities = $this->loadXML($data, $source); |
143 | 143 | } catch (\Exception $e) { |
144 | - Logger::debug('XML parser error when parsing ' . $source['src'] . ' - attempting to re-use cached metadata'); |
|
145 | - Logger::debug('XML parser returned: ' . $e->getMessage()); |
|
144 | + Logger::debug('XML parser error when parsing '.$source['src'].' - attempting to re-use cached metadata'); |
|
145 | + Logger::debug('XML parser returned: '.$e->getMessage()); |
|
146 | 146 | $this->addCachedMetadata($source); |
147 | 147 | return; |
148 | 148 | } |
@@ -150,14 +150,14 @@ discard block |
||
150 | 150 | foreach ($entities as $entity) { |
151 | 151 | if (isset($source['blacklist'])) { |
152 | 152 | if (!empty($source['blacklist']) && in_array($entity->getEntityId(), $source['blacklist'], true)) { |
153 | - Logger::info('Skipping "' . $entity->getEntityId().'" - blacklisted.' . "\n"); |
|
153 | + Logger::info('Skipping "'.$entity->getEntityId().'" - blacklisted.'."\n"); |
|
154 | 154 | continue; |
155 | 155 | } |
156 | 156 | } |
157 | 157 | |
158 | 158 | if (isset($source['whitelist'])) { |
159 | 159 | if (!empty($source['whitelist']) && !in_array($entity->getEntityId(), $source['whitelist'], true)) { |
160 | - Logger::info('Skipping "' . $entity->getEntityId() . '" - not in the whitelist.' . "\n"); |
|
160 | + Logger::info('Skipping "'.$entity->getEntityId().'" - not in the whitelist.'."\n"); |
|
161 | 161 | continue; |
162 | 162 | } |
163 | 163 | } |
@@ -165,7 +165,7 @@ discard block |
||
165 | 165 | if (array_key_exists('certificates', $source) && $source['certificates'] !== null) { |
166 | 166 | if (!$entity->validateSignature($source['certificates'])) { |
167 | 167 | Logger::info( |
168 | - 'Skipping "' . $entity->getEntityId() . '" - could not verify signature using certificate.' . "\n" |
|
168 | + 'Skipping "'.$entity->getEntityId().'" - could not verify signature using certificate.'."\n" |
|
169 | 169 | ); |
170 | 170 | continue; |
171 | 171 | } |
@@ -178,12 +178,12 @@ discard block |
||
178 | 178 | : XMLSecurityDSig::SHA1; |
179 | 179 | if (!$entity->validateFingerprint($source['validateFingerprint'], $algo)) { |
180 | 180 | Logger::info( |
181 | - 'Skipping "' . $entity->getEntityId() . '" - could not verify signature using fingerprint.' . "\n" |
|
181 | + 'Skipping "'.$entity->getEntityId().'" - could not verify signature using fingerprint.'."\n" |
|
182 | 182 | ); |
183 | 183 | continue; |
184 | 184 | } |
185 | 185 | } else { |
186 | - Logger::info('Skipping validation with fingerprint since option certificate is set.' . "\n"); |
|
186 | + Logger::info('Skipping validation with fingerprint since option certificate is set.'."\n"); |
|
187 | 187 | } |
188 | 188 | } |
189 | 189 | |
@@ -234,11 +234,11 @@ discard block |
||
234 | 234 | $sourceState = $this->state[$source['src']]; |
235 | 235 | |
236 | 236 | if (isset($sourceState['last-modified'])) { |
237 | - $rawheader .= 'If-Modified-Since: ' . $sourceState['last-modified'] . "\r\n"; |
|
237 | + $rawheader .= 'If-Modified-Since: '.$sourceState['last-modified']."\r\n"; |
|
238 | 238 | } |
239 | 239 | |
240 | 240 | if (isset($sourceState['etag'])) { |
241 | - $rawheader .= 'If-None-Match: ' . $sourceState['etag'] . "\r\n"; |
|
241 | + $rawheader .= 'If-None-Match: '.$sourceState['etag']."\r\n"; |
|
242 | 242 | } |
243 | 243 | } |
244 | 244 | } |
@@ -310,10 +310,10 @@ discard block |
||
310 | 310 | try { |
311 | 311 | $doc = \SAML2\DOMDocumentFactory::fromString($data); |
312 | 312 | } catch (\Exception $e) { |
313 | - throw new \Exception('Failed to read XML from ' . $source['src']); |
|
313 | + throw new \Exception('Failed to read XML from '.$source['src']); |
|
314 | 314 | } |
315 | 315 | if ($doc->documentElement === null) { |
316 | - throw new \Exception('Opened file is not an XML document: ' . $source['src']); |
|
316 | + throw new \Exception('Opened file is not an XML document: '.$source['src']); |
|
317 | 317 | } |
318 | 318 | return \SimpleSAML\Metadata\SAMLParser::parseDescriptorsElement($doc->documentElement); |
319 | 319 | } |
@@ -330,9 +330,9 @@ discard block |
||
330 | 330 | Logger::debug('Writing: '.$this->stateFile); |
331 | 331 | \SimpleSAML\Utils\System::writeFile( |
332 | 332 | $this->stateFile, |
333 | - "<?php\n/* This file was generated by the metarefresh module at " . $this->getTime() . ".\n" . |
|
334 | - " Do not update it manually as it will get overwritten. */\n" . |
|
335 | - '$state = ' . var_export($this->state, true) . ";\n?>\n", |
|
333 | + "<?php\n/* This file was generated by the metarefresh module at ".$this->getTime().".\n". |
|
334 | + " Do not update it manually as it will get overwritten. */\n". |
|
335 | + '$state = '.var_export($this->state, true).";\n?>\n", |
|
336 | 336 | 0644 |
337 | 337 | ); |
338 | 338 | } |
@@ -347,19 +347,19 @@ discard block |
||
347 | 347 | public function dumpMetadataStdOut(): void |
348 | 348 | { |
349 | 349 | foreach ($this->metadata as $category => $elements) { |
350 | - echo '/* The following data should be added to metadata/' . $category . '.php. */' . "\n"; |
|
350 | + echo '/* The following data should be added to metadata/'.$category.'.php. */'."\n"; |
|
351 | 351 | |
352 | 352 | foreach ($elements as $m) { |
353 | 353 | $filename = $m['filename']; |
354 | 354 | $entityID = $m['metadata']['entityid']; |
355 | 355 | |
356 | 356 | echo "\n"; |
357 | - echo '/* The following metadata was generated from '.$filename.' on ' . $this->getTime() . '. */' . "\n"; |
|
358 | - echo '$metadata[\'' . addslashes($entityID) . '\'] = ' . var_export($m['metadata'], true) . ';' . "\n"; |
|
357 | + echo '/* The following metadata was generated from '.$filename.' on '.$this->getTime().'. */'."\n"; |
|
358 | + echo '$metadata[\''.addslashes($entityID).'\'] = '.var_export($m['metadata'], true).';'."\n"; |
|
359 | 359 | } |
360 | 360 | |
361 | 361 | echo "\n"; |
362 | - echo '/* End of data which should be added to metadata/' . $category . '.php. */' . "\n"; |
|
362 | + echo '/* End of data which should be added to metadata/'.$category.'.php. */'."\n"; |
|
363 | 363 | echo "\n"; |
364 | 364 | } |
365 | 365 | } |
@@ -440,7 +440,7 @@ discard block |
||
440 | 440 | |
441 | 441 | $arpxml = $arp->getXML(); |
442 | 442 | |
443 | - Logger::info('Writing ARP file: ' . $arpfile . "\n"); |
|
443 | + Logger::info('Writing ARP file: '.$arpfile."\n"); |
|
444 | 444 | file_put_contents($arpfile, $arpxml); |
445 | 445 | } |
446 | 446 | |
@@ -458,37 +458,37 @@ discard block |
||
458 | 458 | } |
459 | 459 | |
460 | 460 | if (!file_exists($outputDir)) { |
461 | - Logger::info('Creating directory: ' . $outputDir . "\n"); |
|
461 | + Logger::info('Creating directory: '.$outputDir."\n"); |
|
462 | 462 | $res = @mkdir($outputDir, 0777, true); |
463 | 463 | if ($res === false) { |
464 | - throw new \Exception('Error creating directory: ' . $outputDir); |
|
464 | + throw new \Exception('Error creating directory: '.$outputDir); |
|
465 | 465 | } |
466 | 466 | } |
467 | 467 | |
468 | 468 | foreach ($this->types as $type) { |
469 | - $filename = $outputDir . '/' . $type . '.php'; |
|
469 | + $filename = $outputDir.'/'.$type.'.php'; |
|
470 | 470 | |
471 | 471 | if (array_key_exists($type, $this->metadata)) { |
472 | 472 | $elements = $this->metadata[$type]; |
473 | - Logger::debug('Writing: ' . $filename); |
|
473 | + Logger::debug('Writing: '.$filename); |
|
474 | 474 | |
475 | - $content = '<?php' . "\n" . '/* This file was generated by the metarefresh module at '; |
|
476 | - $content .= $this->getTime() . "\nDo not update it manually as it will get overwritten\n" . '*/' . "\n"; |
|
475 | + $content = '<?php'."\n".'/* This file was generated by the metarefresh module at '; |
|
476 | + $content .= $this->getTime()."\nDo not update it manually as it will get overwritten\n".'*/'."\n"; |
|
477 | 477 | |
478 | 478 | foreach ($elements as $m) { |
479 | 479 | $entityID = $m['metadata']['entityid']; |
480 | - $content .= "\n" . '$metadata[\''; |
|
481 | - $content .= addslashes($entityID) . '\'] = ' . var_export($m['metadata'], true) . ';' . "\n"; |
|
480 | + $content .= "\n".'$metadata[\''; |
|
481 | + $content .= addslashes($entityID).'\'] = '.var_export($m['metadata'], true).';'."\n"; |
|
482 | 482 | } |
483 | 483 | |
484 | - $content .= "\n" . '?>'; |
|
484 | + $content .= "\n".'?>'; |
|
485 | 485 | |
486 | 486 | \SimpleSAML\Utils\System::writeFile($filename, $content, 0644); |
487 | 487 | } elseif (is_file($filename)) { |
488 | 488 | if (unlink($filename)) { |
489 | - Logger::debug('Deleting stale metadata file: ' . $filename); |
|
489 | + Logger::debug('Deleting stale metadata file: '.$filename); |
|
490 | 490 | } else { |
491 | - Logger::warning('Could not delete stale metadata file: ' . $filename); |
|
491 | + Logger::warning('Could not delete stale metadata file: '.$filename); |
|
492 | 492 | } |
493 | 493 | } |
494 | 494 | } |
@@ -511,8 +511,8 @@ discard block |
||
511 | 511 | $entityId = $m['metadata']['entityid']; |
512 | 512 | |
513 | 513 | Logger::debug( |
514 | - 'metarefresh: Add metadata entry ' . |
|
515 | - var_export($entityId, true) . ' in set ' . var_export($set, true) . '.' |
|
514 | + 'metarefresh: Add metadata entry '. |
|
515 | + var_export($entityId, true).' in set '.var_export($set, true).'.' |
|
516 | 516 | ); |
517 | 517 | $metaHandler->saveMetadata($entityId, $set, $m['metadata']); |
518 | 518 | } |
@@ -524,19 +524,19 @@ discard block |
||
524 | 524 | foreach ($metaHandler->getMetadataSet($set) as $entityId => $metadata) { |
525 | 525 | if (!array_key_exists('expire', $metadata)) { |
526 | 526 | Logger::warning( |
527 | - 'metarefresh: Metadata entry without expire timestamp: ' . var_export($entityId, true) . |
|
528 | - ' in set ' . var_export($set, true) . '.' |
|
527 | + 'metarefresh: Metadata entry without expire timestamp: '.var_export($entityId, true). |
|
528 | + ' in set '.var_export($set, true).'.' |
|
529 | 529 | ); |
530 | 530 | continue; |
531 | 531 | } |
532 | 532 | if ($metadata['expire'] > $ct) { |
533 | 533 | continue; |
534 | 534 | } |
535 | - Logger::debug('metarefresh: ' . $entityId . ' expired ' . date('l jS \of F Y h:i:s A', $metadata['expire'])); |
|
535 | + Logger::debug('metarefresh: '.$entityId.' expired '.date('l jS \of F Y h:i:s A', $metadata['expire'])); |
|
536 | 536 | Logger::debug( |
537 | - 'metarefresh: Delete expired metadata entry ' . |
|
538 | - var_export($entityId, true) . ' in set ' . var_export($set, true) . |
|
539 | - '. (' . ($ct - $metadata['expire']) . ' sec)' |
|
537 | + 'metarefresh: Delete expired metadata entry '. |
|
538 | + var_export($entityId, true).' in set '.var_export($set, true). |
|
539 | + '. ('.($ct - $metadata['expire']).' sec)' |
|
540 | 540 | ); |
541 | 541 | $metaHandler->deleteMetadata($entityId, $set); |
542 | 542 | } |