@@ -14,7 +14,7 @@ discard block |
||
| 14 | 14 | Assert::keyExists($croninfo, 'summary'); |
| 15 | 15 | Assert::keyExists($croninfo, 'tag'); |
| 16 | 16 | |
| 17 | - Logger::info('cron [metarefresh]: Running cron in cron tag [' . $croninfo['tag'] . '] '); |
|
| 17 | + Logger::info('cron [metarefresh]: Running cron in cron tag ['.$croninfo['tag'].'] '); |
|
| 18 | 18 | |
| 19 | 19 | try { |
| 20 | 20 | $config = \SimpleSAML\Configuration::getInstance(); |
@@ -32,7 +32,7 @@ discard block |
||
| 32 | 32 | continue; |
| 33 | 33 | } |
| 34 | 34 | |
| 35 | - Logger::info('cron [metarefresh]: Executing set [' . $setkey . ']'); |
|
| 35 | + Logger::info('cron [metarefresh]: Executing set ['.$setkey.']'); |
|
| 36 | 36 | |
| 37 | 37 | $expireAfter = $set->getInteger('expireAfter', null); |
| 38 | 38 | if ($expireAfter !== null) { |
@@ -98,7 +98,7 @@ discard block |
||
| 98 | 98 | $source['conditionalGET'] = $conditionalGET; |
| 99 | 99 | } |
| 100 | 100 | |
| 101 | - Logger::debug('cron [metarefresh]: In set [' . $setkey . '] loading source [' . $source['src'] . ']'); |
|
| 101 | + Logger::debug('cron [metarefresh]: In set ['.$setkey.'] loading source ['.$source['src'].']'); |
|
| 102 | 102 | $metaloader->loadSource($source); |
| 103 | 103 | } |
| 104 | 104 | |
@@ -120,6 +120,6 @@ discard block |
||
| 120 | 120 | } |
| 121 | 121 | } |
| 122 | 122 | } catch (\Exception $e) { |
| 123 | - $croninfo['summary'][] = 'Error during metarefresh: ' . $e->getMessage(); |
|
| 123 | + $croninfo['summary'][] = 'Error during metarefresh: '.$e->getMessage(); |
|
| 124 | 124 | } |
| 125 | 125 | } |
@@ -10,7 +10,7 @@ discard block |
||
| 10 | 10 | $sets = $mconfig->getConfigList('sets', []); |
| 11 | 11 | |
| 12 | 12 | foreach ($sets as $setkey => $set) { |
| 13 | - \SimpleSAML\Logger::info('[metarefresh]: Executing set [' . $setkey . ']'); |
|
| 13 | + \SimpleSAML\Logger::info('[metarefresh]: Executing set ['.$setkey.']'); |
|
| 14 | 14 | |
| 15 | 15 | try { |
| 16 | 16 | $expireAfter = $set->getInteger('expireAfter', null); |
@@ -55,7 +55,7 @@ discard block |
||
| 55 | 55 | $source['whitelist'] = $whitelist; |
| 56 | 56 | } |
| 57 | 57 | |
| 58 | - \SimpleSAML\Logger::debug('[metarefresh]: In set [' . $setkey . '] loading source [' . $source['src'] . ']'); |
|
| 58 | + \SimpleSAML\Logger::debug('[metarefresh]: In set ['.$setkey.'] loading source ['.$source['src'].']'); |
|
| 59 | 59 | $metaloader->loadSource($source); |
| 60 | 60 | } |
| 61 | 61 | |
@@ -57,7 +57,7 @@ discard block |
||
| 57 | 57 | private function loadAttributeMap(string $attributemap_filename): void |
| 58 | 58 | { |
| 59 | 59 | $config = \SimpleSAML\Configuration::getInstance(); |
| 60 | - include($config->getPathValue('attributemap', 'attributemap/') . $attributemap_filename . '.php'); |
|
| 60 | + include($config->getPathValue('attributemap', 'attributemap/').$attributemap_filename.'.php'); |
|
| 61 | 61 | // Note that $attributemap is defined in the included attributemap-file! |
| 62 | 62 | $this->attributes = $attributemap; |
| 63 | 63 | } |
@@ -131,9 +131,9 @@ discard block |
||
| 131 | 131 | private function getEntryXML(array $entry): string |
| 132 | 132 | { |
| 133 | 133 | $entityid = $entry['entityid']; |
| 134 | - return ' <AttributeFilterPolicy id="' . $entityid . |
|
| 135 | - '"><PolicyRequirementRule xsi:type="basic:AttributeRequesterString" value="' . $entityid . |
|
| 136 | - '" />' . $this->getEntryXMLcontent($entry) . '</AttributeFilterPolicy>'; |
|
| 134 | + return ' <AttributeFilterPolicy id="'.$entityid. |
|
| 135 | + '"><PolicyRequirementRule xsi:type="basic:AttributeRequesterString" value="'.$entityid. |
|
| 136 | + '" />'.$this->getEntryXMLcontent($entry).'</AttributeFilterPolicy>'; |
|
| 137 | 137 | } |
| 138 | 138 | |
| 139 | 139 | |
@@ -150,7 +150,7 @@ discard block |
||
| 150 | 150 | |
| 151 | 151 | $ret = ''; |
| 152 | 152 | foreach ($entry['attributes'] as $a) { |
| 153 | - $ret .= ' <AttributeRule attributeID="' . $this->getAttributeID($a) . |
|
| 153 | + $ret .= ' <AttributeRule attributeID="'.$this->getAttributeID($a). |
|
| 154 | 154 | '"><PermitValueRule xsi:type="basic:ANY" /></AttributeRule>'; |
| 155 | 155 | } |
| 156 | 156 | return $ret; |
@@ -106,13 +106,13 @@ discard block |
||
| 106 | 106 | try { |
| 107 | 107 | list($data, $responseHeaders) = \SimpleSAML\Utils\HTTP::fetch($source['src'], $context, true); |
| 108 | 108 | } catch (\Exception $e) { |
| 109 | - Logger::warning('metarefresh: ' . $e->getMessage()); |
|
| 109 | + Logger::warning('metarefresh: '.$e->getMessage()); |
|
| 110 | 110 | } |
| 111 | 111 | |
| 112 | 112 | // We have response headers, so the request succeeded |
| 113 | 113 | if (!isset($responseHeaders)) { |
| 114 | 114 | // No response headers, this means the request failed in some way, so re-use old data |
| 115 | - Logger::debug('No response from ' . $source['src'] . ' - attempting to re-use cached metadata'); |
|
| 115 | + Logger::debug('No response from '.$source['src'].' - attempting to re-use cached metadata'); |
|
| 116 | 116 | $this->addCachedMetadata($source); |
| 117 | 117 | return; |
| 118 | 118 | } elseif (preg_match('@^HTTP/1\.[01]\s304\s@', $responseHeaders[0])) { |
@@ -122,7 +122,7 @@ discard block |
||
| 122 | 122 | return; |
| 123 | 123 | } elseif (!preg_match('@^HTTP/1\.[01]\s200\s@', $responseHeaders[0])) { |
| 124 | 124 | // Other error |
| 125 | - Logger::debug('Error from ' . $source['src'] . ' - attempting to re-use cached metadata'); |
|
| 125 | + Logger::debug('Error from '.$source['src'].' - attempting to re-use cached metadata'); |
|
| 126 | 126 | $this->addCachedMetadata($source); |
| 127 | 127 | return; |
| 128 | 128 | } |
@@ -141,8 +141,8 @@ discard block |
||
| 141 | 141 | try { |
| 142 | 142 | $entities = $this->loadXML($data, $source); |
| 143 | 143 | } catch (\Exception $e) { |
| 144 | - Logger::debug('XML parser error when parsing ' . $source['src'] . ' - attempting to re-use cached metadata'); |
|
| 145 | - Logger::debug('XML parser returned: ' . $e->getMessage()); |
|
| 144 | + Logger::debug('XML parser error when parsing '.$source['src'].' - attempting to re-use cached metadata'); |
|
| 145 | + Logger::debug('XML parser returned: '.$e->getMessage()); |
|
| 146 | 146 | $this->addCachedMetadata($source); |
| 147 | 147 | return; |
| 148 | 148 | } |
@@ -150,14 +150,14 @@ discard block |
||
| 150 | 150 | foreach ($entities as $entity) { |
| 151 | 151 | if (isset($source['blacklist'])) { |
| 152 | 152 | if (!empty($source['blacklist']) && in_array($entity->getEntityId(), $source['blacklist'], true)) { |
| 153 | - Logger::info('Skipping "' . $entity->getEntityId().'" - blacklisted.' . "\n"); |
|
| 153 | + Logger::info('Skipping "'.$entity->getEntityId().'" - blacklisted.'."\n"); |
|
| 154 | 154 | continue; |
| 155 | 155 | } |
| 156 | 156 | } |
| 157 | 157 | |
| 158 | 158 | if (isset($source['whitelist'])) { |
| 159 | 159 | if (!empty($source['whitelist']) && !in_array($entity->getEntityId(), $source['whitelist'], true)) { |
| 160 | - Logger::info('Skipping "' . $entity->getEntityId() . '" - not in the whitelist.' . "\n"); |
|
| 160 | + Logger::info('Skipping "'.$entity->getEntityId().'" - not in the whitelist.'."\n"); |
|
| 161 | 161 | continue; |
| 162 | 162 | } |
| 163 | 163 | } |
@@ -165,7 +165,7 @@ discard block |
||
| 165 | 165 | if (array_key_exists('certificates', $source) && $source['certificates'] !== null) { |
| 166 | 166 | if (!$entity->validateSignature($source['certificates'])) { |
| 167 | 167 | Logger::info( |
| 168 | - 'Skipping "' . $entity->getEntityId() . '" - could not verify signature using certificate.' . "\n" |
|
| 168 | + 'Skipping "'.$entity->getEntityId().'" - could not verify signature using certificate.'."\n" |
|
| 169 | 169 | ); |
| 170 | 170 | continue; |
| 171 | 171 | } |
@@ -178,12 +178,12 @@ discard block |
||
| 178 | 178 | : XMLSecurityDSig::SHA1; |
| 179 | 179 | if (!$entity->validateFingerprint($source['validateFingerprint'], $algo)) { |
| 180 | 180 | Logger::info( |
| 181 | - 'Skipping "' . $entity->getEntityId() . '" - could not verify signature using fingerprint.' . "\n" |
|
| 181 | + 'Skipping "'.$entity->getEntityId().'" - could not verify signature using fingerprint.'."\n" |
|
| 182 | 182 | ); |
| 183 | 183 | continue; |
| 184 | 184 | } |
| 185 | 185 | } else { |
| 186 | - Logger::info('Skipping validation with fingerprint since option certificate is set.' . "\n"); |
|
| 186 | + Logger::info('Skipping validation with fingerprint since option certificate is set.'."\n"); |
|
| 187 | 187 | } |
| 188 | 188 | } |
| 189 | 189 | |
@@ -234,11 +234,11 @@ discard block |
||
| 234 | 234 | $sourceState = $this->state[$source['src']]; |
| 235 | 235 | |
| 236 | 236 | if (isset($sourceState['last-modified'])) { |
| 237 | - $rawheader .= 'If-Modified-Since: ' . $sourceState['last-modified'] . "\r\n"; |
|
| 237 | + $rawheader .= 'If-Modified-Since: '.$sourceState['last-modified']."\r\n"; |
|
| 238 | 238 | } |
| 239 | 239 | |
| 240 | 240 | if (isset($sourceState['etag'])) { |
| 241 | - $rawheader .= 'If-None-Match: ' . $sourceState['etag'] . "\r\n"; |
|
| 241 | + $rawheader .= 'If-None-Match: '.$sourceState['etag']."\r\n"; |
|
| 242 | 242 | } |
| 243 | 243 | } |
| 244 | 244 | } |
@@ -310,10 +310,10 @@ discard block |
||
| 310 | 310 | try { |
| 311 | 311 | $doc = \SAML2\DOMDocumentFactory::fromString($data); |
| 312 | 312 | } catch (\Exception $e) { |
| 313 | - throw new \Exception('Failed to read XML from ' . $source['src']); |
|
| 313 | + throw new \Exception('Failed to read XML from '.$source['src']); |
|
| 314 | 314 | } |
| 315 | 315 | if ($doc->documentElement === null) { |
| 316 | - throw new \Exception('Opened file is not an XML document: ' . $source['src']); |
|
| 316 | + throw new \Exception('Opened file is not an XML document: '.$source['src']); |
|
| 317 | 317 | } |
| 318 | 318 | return \SimpleSAML\Metadata\SAMLParser::parseDescriptorsElement($doc->documentElement); |
| 319 | 319 | } |
@@ -330,9 +330,9 @@ discard block |
||
| 330 | 330 | Logger::debug('Writing: '.$this->stateFile); |
| 331 | 331 | \SimpleSAML\Utils\System::writeFile( |
| 332 | 332 | $this->stateFile, |
| 333 | - "<?php\n/* This file was generated by the metarefresh module at " . $this->getTime() . ".\n" . |
|
| 334 | - " Do not update it manually as it will get overwritten. */\n" . |
|
| 335 | - '$state = ' . var_export($this->state, true) . ";\n?>\n", |
|
| 333 | + "<?php\n/* This file was generated by the metarefresh module at ".$this->getTime().".\n". |
|
| 334 | + " Do not update it manually as it will get overwritten. */\n". |
|
| 335 | + '$state = '.var_export($this->state, true).";\n?>\n", |
|
| 336 | 336 | 0644 |
| 337 | 337 | ); |
| 338 | 338 | } |
@@ -347,19 +347,19 @@ discard block |
||
| 347 | 347 | public function dumpMetadataStdOut(): void |
| 348 | 348 | { |
| 349 | 349 | foreach ($this->metadata as $category => $elements) { |
| 350 | - echo '/* The following data should be added to metadata/' . $category . '.php. */' . "\n"; |
|
| 350 | + echo '/* The following data should be added to metadata/'.$category.'.php. */'."\n"; |
|
| 351 | 351 | |
| 352 | 352 | foreach ($elements as $m) { |
| 353 | 353 | $filename = $m['filename']; |
| 354 | 354 | $entityID = $m['metadata']['entityid']; |
| 355 | 355 | |
| 356 | 356 | echo "\n"; |
| 357 | - echo '/* The following metadata was generated from '.$filename.' on ' . $this->getTime() . '. */' . "\n"; |
|
| 358 | - echo '$metadata[\'' . addslashes($entityID) . '\'] = ' . var_export($m['metadata'], true) . ';' . "\n"; |
|
| 357 | + echo '/* The following metadata was generated from '.$filename.' on '.$this->getTime().'. */'."\n"; |
|
| 358 | + echo '$metadata[\''.addslashes($entityID).'\'] = '.var_export($m['metadata'], true).';'."\n"; |
|
| 359 | 359 | } |
| 360 | 360 | |
| 361 | 361 | echo "\n"; |
| 362 | - echo '/* End of data which should be added to metadata/' . $category . '.php. */' . "\n"; |
|
| 362 | + echo '/* End of data which should be added to metadata/'.$category.'.php. */'."\n"; |
|
| 363 | 363 | echo "\n"; |
| 364 | 364 | } |
| 365 | 365 | } |
@@ -440,7 +440,7 @@ discard block |
||
| 440 | 440 | |
| 441 | 441 | $arpxml = $arp->getXML(); |
| 442 | 442 | |
| 443 | - Logger::info('Writing ARP file: ' . $arpfile . "\n"); |
|
| 443 | + Logger::info('Writing ARP file: '.$arpfile."\n"); |
|
| 444 | 444 | file_put_contents($arpfile, $arpxml); |
| 445 | 445 | } |
| 446 | 446 | |
@@ -458,37 +458,37 @@ discard block |
||
| 458 | 458 | } |
| 459 | 459 | |
| 460 | 460 | if (!file_exists($outputDir)) { |
| 461 | - Logger::info('Creating directory: ' . $outputDir . "\n"); |
|
| 461 | + Logger::info('Creating directory: '.$outputDir."\n"); |
|
| 462 | 462 | $res = @mkdir($outputDir, 0777, true); |
| 463 | 463 | if ($res === false) { |
| 464 | - throw new \Exception('Error creating directory: ' . $outputDir); |
|
| 464 | + throw new \Exception('Error creating directory: '.$outputDir); |
|
| 465 | 465 | } |
| 466 | 466 | } |
| 467 | 467 | |
| 468 | 468 | foreach ($this->types as $type) { |
| 469 | - $filename = $outputDir . '/' . $type . '.php'; |
|
| 469 | + $filename = $outputDir.'/'.$type.'.php'; |
|
| 470 | 470 | |
| 471 | 471 | if (array_key_exists($type, $this->metadata)) { |
| 472 | 472 | $elements = $this->metadata[$type]; |
| 473 | - Logger::debug('Writing: ' . $filename); |
|
| 473 | + Logger::debug('Writing: '.$filename); |
|
| 474 | 474 | |
| 475 | - $content = '<?php' . "\n" . '/* This file was generated by the metarefresh module at '; |
|
| 476 | - $content .= $this->getTime() . "\nDo not update it manually as it will get overwritten\n" . '*/' . "\n"; |
|
| 475 | + $content = '<?php'."\n".'/* This file was generated by the metarefresh module at '; |
|
| 476 | + $content .= $this->getTime()."\nDo not update it manually as it will get overwritten\n".'*/'."\n"; |
|
| 477 | 477 | |
| 478 | 478 | foreach ($elements as $m) { |
| 479 | 479 | $entityID = $m['metadata']['entityid']; |
| 480 | - $content .= "\n" . '$metadata[\''; |
|
| 481 | - $content .= addslashes($entityID) . '\'] = ' . var_export($m['metadata'], true) . ';' . "\n"; |
|
| 480 | + $content .= "\n".'$metadata[\''; |
|
| 481 | + $content .= addslashes($entityID).'\'] = '.var_export($m['metadata'], true).';'."\n"; |
|
| 482 | 482 | } |
| 483 | 483 | |
| 484 | - $content .= "\n" . '?>'; |
|
| 484 | + $content .= "\n".'?>'; |
|
| 485 | 485 | |
| 486 | 486 | \SimpleSAML\Utils\System::writeFile($filename, $content, 0644); |
| 487 | 487 | } elseif (is_file($filename)) { |
| 488 | 488 | if (unlink($filename)) { |
| 489 | - Logger::debug('Deleting stale metadata file: ' . $filename); |
|
| 489 | + Logger::debug('Deleting stale metadata file: '.$filename); |
|
| 490 | 490 | } else { |
| 491 | - Logger::warning('Could not delete stale metadata file: ' . $filename); |
|
| 491 | + Logger::warning('Could not delete stale metadata file: '.$filename); |
|
| 492 | 492 | } |
| 493 | 493 | } |
| 494 | 494 | } |
@@ -511,8 +511,8 @@ discard block |
||
| 511 | 511 | $entityId = $m['metadata']['entityid']; |
| 512 | 512 | |
| 513 | 513 | Logger::debug( |
| 514 | - 'metarefresh: Add metadata entry ' . |
|
| 515 | - var_export($entityId, true) . ' in set ' . var_export($set, true) . '.' |
|
| 514 | + 'metarefresh: Add metadata entry '. |
|
| 515 | + var_export($entityId, true).' in set '.var_export($set, true).'.' |
|
| 516 | 516 | ); |
| 517 | 517 | $metaHandler->saveMetadata($entityId, $set, $m['metadata']); |
| 518 | 518 | } |
@@ -524,19 +524,19 @@ discard block |
||
| 524 | 524 | foreach ($metaHandler->getMetadataSet($set) as $entityId => $metadata) { |
| 525 | 525 | if (!array_key_exists('expire', $metadata)) { |
| 526 | 526 | Logger::warning( |
| 527 | - 'metarefresh: Metadata entry without expire timestamp: ' . var_export($entityId, true) . |
|
| 528 | - ' in set ' . var_export($set, true) . '.' |
|
| 527 | + 'metarefresh: Metadata entry without expire timestamp: '.var_export($entityId, true). |
|
| 528 | + ' in set '.var_export($set, true).'.' |
|
| 529 | 529 | ); |
| 530 | 530 | continue; |
| 531 | 531 | } |
| 532 | 532 | if ($metadata['expire'] > $ct) { |
| 533 | 533 | continue; |
| 534 | 534 | } |
| 535 | - Logger::debug('metarefresh: ' . $entityId . ' expired ' . date('l jS \of F Y h:i:s A', $metadata['expire'])); |
|
| 535 | + Logger::debug('metarefresh: '.$entityId.' expired '.date('l jS \of F Y h:i:s A', $metadata['expire'])); |
|
| 536 | 536 | Logger::debug( |
| 537 | - 'metarefresh: Delete expired metadata entry ' . |
|
| 538 | - var_export($entityId, true) . ' in set ' . var_export($set, true) . |
|
| 539 | - '. (' . ($ct - $metadata['expire']) . ' sec)' |
|
| 537 | + 'metarefresh: Delete expired metadata entry '. |
|
| 538 | + var_export($entityId, true).' in set '.var_export($set, true). |
|
| 539 | + '. ('.($ct - $metadata['expire']).' sec)' |
|
| 540 | 540 | ); |
| 541 | 541 | $metaHandler->deleteMetadata($entityId, $set); |
| 542 | 542 | } |