Failed Conditions
Pull Request — master (#17)
by Florent
18:45 queued 13:29
created
src/Bundle/Server/Model/PreConfiguredAuthorizationRepository.php 1 patch
Spacing   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-declare(strict_types=1);
3
+declare(strict_types = 1);
4 4
 
5 5
 /*
6 6
  * The MIT License (MIT)
@@ -56,7 +56,7 @@  discard block
 block discarded – undo
56 56
     /**
57 57
      * {@inheritdoc}
58 58
      */
59
-    public function create(UserAccountId $userAccountId, ClientId $clientId, array $scopes, ?ResourceServerId $resourceServerId): PreConfiguredAuthorization
59
+    public function create(UserAccountId $userAccountId, ClientId $clientId, array $scopes, ? ResourceServerId $resourceServerId) : PreConfiguredAuthorization
60 60
     {
61 61
         $hash = $this->calculateHash($userAccountId, $clientId, $scopes, $resourceServerId);
62 62
         $preConfiguredAuthorization = PreConfiguredAuthorization::createEmpty();
@@ -68,7 +68,7 @@  discard block
 block discarded – undo
68 68
     /**
69 69
      * {@inheritdoc}
70 70
      */
71
-    public function find(UserAccountId $userAccountId, ClientId $clientId, array $scopes, ?ResourceServerId $resourceServerId): ?PreConfiguredAuthorization
71
+    public function find(UserAccountId $userAccountId, ClientId $clientId, array $scopes, ? ResourceServerId $resourceServerId) : ? PreConfiguredAuthorization
72 72
     {
73 73
         $hash = $this->calculateHash($userAccountId, $clientId, $scopes, $resourceServerId);
74 74
         $preConfiguredAuthorization = $this->getFromCache($hash);
@@ -114,7 +114,7 @@  discard block
 block discarded – undo
114 114
      *
115 115
      * @return PreConfiguredAuthorization|null
116 116
      */
117
-    private function getFromCache(PreConfiguredAuthorizationId $preConfiguredAuthorizationId): ?PreConfiguredAuthorization
117
+    private function getFromCache(PreConfiguredAuthorizationId $preConfiguredAuthorizationId): ? PreConfiguredAuthorization
118 118
     {
119 119
         $itemKey = sprintf('oauth2-pre_configured_authorization-%s', $preConfiguredAuthorizationId->getValue());
120 120
         if (null !== $this->cache) {
@@ -149,7 +149,7 @@  discard block
 block discarded – undo
149 149
      *
150 150
      * @return PreConfiguredAuthorizationId
151 151
      */
152
-    private function calculateHash(ResourceOwnerId $resourceOwnerId, ClientId $clientId, array $scope, ?ResourceServerId $resourceServerId): PreConfiguredAuthorizationId
152
+    private function calculateHash(ResourceOwnerId $resourceOwnerId, ClientId $clientId, array $scope, ? ResourceServerId $resourceServerId) : PreConfiguredAuthorizationId
153 153
     {
154 154
         return PreConfiguredAuthorizationId::create(hash(
155 155
             'sha512',
Please login to merge, or discard this patch.
src/Bundle/Server/Model/AuthCodeRepository.php 1 patch
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-declare(strict_types=1);
3
+declare(strict_types = 1);
4 4
 
5 5
 /*
6 6
  * The MIT License (MIT)
@@ -78,7 +78,7 @@  discard block
 block discarded – undo
78 78
     /**
79 79
      * {@inheritdoc}
80 80
      */
81
-    public function create(ClientId $clientId, UserAccountId $userAccountId, array $queryParameters, string $redirectUri, DataBag $parameters, DataBag $metadatas, array $scopes, bool $withRefreshToken, ?ResourceServerId $resourceServerId, ?\DateTimeImmutable $expiresAt): AuthCode
81
+    public function create(ClientId $clientId, UserAccountId $userAccountId, array $queryParameters, string $redirectUri, DataBag $parameters, DataBag $metadatas, array $scopes, bool $withRefreshToken, ? ResourceServerId $resourceServerId, ? \DateTimeImmutable $expiresAt) : AuthCode
82 82
     {
83 83
         if (null === $expiresAt) {
84 84
             $expiresAt = new \DateTimeImmutable(sprintf('now +%u seconds', $this->lifetime));
@@ -105,7 +105,7 @@  discard block
 block discarded – undo
105 105
     /**
106 106
      * {@inheritdoc}
107 107
      */
108
-    public function find(AuthCodeId $authCodeId): ?AuthCode
108
+    public function find(AuthCodeId $authCodeId): ? AuthCode
109 109
     {
110 110
         $authCode = $this->getFromCache($authCodeId);
111 111
         if (null === $authCode) {
@@ -150,7 +150,7 @@  discard block
 block discarded – undo
150 150
      *
151 151
      * @return AuthCode|null
152 152
      */
153
-    private function getFromCache(AuthCodeId $authCodeId): ?AuthCode
153
+    private function getFromCache(AuthCodeId $authCodeId): ? AuthCode
154 154
     {
155 155
         $itemKey = sprintf('oauth2-auth_code-%s', $authCodeId->getValue());
156 156
         if (null !== $this->cache) {
Please login to merge, or discard this patch.
src/Bundle/Server/Plugin/ScopeManagerPlugin/ScopeManagerPlugin.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-declare(strict_types=1);
3
+declare(strict_types = 1);
4 4
 
5 5
 /*
6 6
  * The MIT License (MIT)
@@ -47,7 +47,7 @@  discard block
 block discarded – undo
47 47
 
48 48
         $parameters = [
49 49
             'oauth2_server.scope_manager.scope_policy' => ['type' => 'parameter', 'path' => '[policy]'],
50
-            'oauth2_server.scope.available_scope'      => ['type' => 'parameter', 'path' => '[available_scope]', 'callback' => function ($value) {
50
+            'oauth2_server.scope.available_scope'      => ['type' => 'parameter', 'path' => '[available_scope]', 'callback' => function($value) {
51 51
                 return array_unique($value);
52 52
             }],
53 53
         ];
Please login to merge, or discard this patch.
ResourceOwnerPasswordCredentialsGrantTypePlugin.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-declare(strict_types=1);
3
+declare(strict_types = 1);
4 4
 
5 5
 /*
6 6
  * The MIT License (MIT)
@@ -67,7 +67,7 @@  discard block
 block discarded – undo
67 67
         }
68 68
 
69 69
         $parameters = [
70
-            'oauth2_server.resource_owner_password_credentials_grant_type.user_account_manager' => ['type' => 'alias',     'path' => '[user_account_manager]'],
70
+            'oauth2_server.resource_owner_password_credentials_grant_type.user_account_manager' => ['type' => 'alias', 'path' => '[user_account_manager]'],
71 71
         ];
72 72
 
73 73
         $this->loadParameters($parameters, $pluginConfiguration, $container);
Please login to merge, or discard this patch.
src/Bundle/Server/Plugin/JWTAccessTokenPlugin/JWTAccessTokenPlugin.php 1 patch
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-declare(strict_types=1);
3
+declare(strict_types = 1);
4 4
 
5 5
 /*
6 6
  * The MIT License (MIT)
@@ -52,12 +52,12 @@  discard block
 block discarded – undo
52 52
             'oauth2_server.jwt_access_token.manager.issuer'                       => ['type' => 'parameter', 'path' => '[issuer]'],
53 53
             'oauth2_server.jwt_access_token.manager.token_lifetime'               => ['type' => 'parameter', 'path' => '[token_lifetime]'],
54 54
             'oauth2_server.jwt_access_token.manager.signature_algorithm'          => ['type' => 'parameter', 'path' => '[signature_algorithm]'],
55
-            'oauth2_server.jwt_access_token.manager.signature_key_set'            => ['type' => 'alias',     'path' => '[signature_key_set]'],
55
+            'oauth2_server.jwt_access_token.manager.signature_key_set'            => ['type' => 'alias', 'path' => '[signature_key_set]'],
56 56
             'oauth2_server.jwt_access_token.manager.key_encryption_algorithm'     => ['type' => 'parameter', 'path' => '[key_encryption_algorithm]'],
57 57
             'oauth2_server.jwt_access_token.manager.content_encryption_algorithm' => ['type' => 'parameter', 'path' => '[content_encryption_algorithm]'],
58 58
             'oauth2_server.jwt_access_token.manager.claim_checkers'               => ['type' => 'parameter', 'path' => '[claim_checkers]'],
59 59
             'oauth2_server.jwt_access_token.manager.header_checkers'              => ['type' => 'parameter', 'path' => '[header_checkers]'],
60
-            'oauth2_server.jwt_access_token.manager.key_encryption_key_set'       => ['type' => 'alias',     'path' => '[key_encryption_key_set]'],
60
+            'oauth2_server.jwt_access_token.manager.key_encryption_key_set'       => ['type' => 'alias', 'path' => '[key_encryption_key_set]'],
61 61
         ];
62 62
 
63 63
         $this->loadParameters($parameters, $pluginConfiguration, $container);
Please login to merge, or discard this patch.
src/Bundle/Server/Plugin/OpenIdConnectPlugin/OpenIdConnectPlugin.php 1 patch
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-declare(strict_types=1);
3
+declare(strict_types = 1);
4 4
 
5 5
 /*
6 6
  * The MIT License (MIT)
@@ -75,17 +75,17 @@  discard block
 block discarded – undo
75 75
             ->children()
76 76
                 ->arrayNode('session_management')
77 77
                     ->validate()
78
-                        ->ifTrue(function ($value) {
78
+                        ->ifTrue(function($value) {
79 79
                             return $value['enabled'] && empty($value['path']);
80 80
                         })->thenInvalid('The option "path" must be set when the Session Management is enabled.')
81 81
                     ->end()
82 82
                     ->validate()
83
-                        ->ifTrue(function ($value) {
83
+                        ->ifTrue(function($value) {
84 84
                             return $value['enabled'] && empty($value['storage_name']);
85 85
                         })->thenInvalid('The option "storage_name" must be set when the Session Management is enabled.')
86 86
                     ->end()
87 87
                     ->validate()
88
-                        ->ifTrue(function ($value) {
88
+                        ->ifTrue(function($value) {
89 89
                             return $value['enabled'] && empty($value['template']);
90 90
                         })->thenInvalid('The option "template" must be set when the Session Management is enabled.')
91 91
                     ->end()
@@ -316,10 +316,10 @@  discard block
 block discarded – undo
316 316
             'oauth2_server.openid_connect.userinfo_endpoint.signature.enabled'  => ['type' => 'parameter', 'path' => '[userinfo_endpoint][signature][enabled]'],
317 317
             'oauth2_server.openid_connect.metadata.enabled'                     => ['type' => 'parameter', 'path' => '[metadata][enabled]'],
318 318
             'oauth2_server.openid_connect.id_token.response_type.id_token'      => ['type' => 'parameter', 'path' => '[response_type][id_token]'],
319
-            'oauth2_server.openid_connect.claims_supported'                     => ['type' => 'parameter', 'path' => '[claims_supported]', 'callback' => function ($data) {
319
+            'oauth2_server.openid_connect.claims_supported'                     => ['type' => 'parameter', 'path' => '[claims_supported]', 'callback' => function($data) {
320 320
                 return array_unique($data);
321 321
             }],
322
-            'oauth2_server.openid_connect.claims_locales_supported'             => ['type' => 'parameter', 'path' => '[claims_locales_supported]', 'callback' => function ($data) {
322
+            'oauth2_server.openid_connect.claims_locales_supported'             => ['type' => 'parameter', 'path' => '[claims_locales_supported]', 'callback' => function($data) {
323 323
                 return array_unique($data);
324 324
             }],
325 325
         ];
Please login to merge, or discard this patch.
src/Bundle/Server/Plugin/JWTBearerPlugin/JWTBearerPlugin.php 1 patch
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-declare(strict_types=1);
3
+declare(strict_types = 1);
4 4
 
5 5
 /*
6 6
  * The MIT License (MIT)
@@ -66,7 +66,7 @@  discard block
 block discarded – undo
66 66
 
67 67
         $accessor = PropertyAccess::createPropertyAccessor();
68 68
         if (true === $accessor->getValue($pluginConfiguration, '[encryption][enabled]')) {
69
-            $parameters['oauth2_server.jwt_bearer_grant_type.encryption.key_set'] = ['type' => 'alias',     'path' => '[encryption][key_set]'];
69
+            $parameters['oauth2_server.jwt_bearer_grant_type.encryption.key_set'] = ['type' => 'alias', 'path' => '[encryption][key_set]'];
70 70
             $parameters['oauth2_server.jwt_bearer_grant_type.encryption.required'] = ['type' => 'parameter', 'path' => '[encryption][required]'];
71 71
         }
72 72
 
@@ -207,7 +207,7 @@  discard block
 block discarded – undo
207 207
      */
208 208
     private function isClientAssertionEncryptionParameterInvalid($parameter)
209 209
     {
210
-        return function ($data) use ($parameter) {
210
+        return function($data) use ($parameter) {
211 211
             if (false === $data['encryption']['enabled']) {
212 212
                 return false;
213 213
             }
Please login to merge, or discard this patch.
src/Bundle/Server/Plugin/ClientManagerPlugin/ClientManagerPlugin.php 1 patch
Spacing   +12 added lines, -12 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-declare(strict_types=1);
3
+declare(strict_types = 1);
4 4
 
5 5
 /*
6 6
  * The MIT License (MIT)
@@ -110,7 +110,7 @@  discard block
 block discarded – undo
110 110
                 $parameters['oauth2_server.token_endpoint_auth_method.client_assertion_jwt.encryption.key_encryption_algorithms'] = ['type' => 'parameter', 'path' => '[token_endpoint_auth_methods][client_assertion_jwt][encryption][key_encryption_algorithms]'];
111 111
                 $parameters['oauth2_server.token_endpoint_auth_method.client_assertion_jwt.encryption.content_encryption_algorithms'] = ['type' => 'parameter', 'path' => '[token_endpoint_auth_methods][client_assertion_jwt][encryption][content_encryption_algorithms]'];
112 112
                 $parameters['oauth2_server.token_endpoint_auth_method.client_assertion_jwt.encryption.required'] = ['type' => 'parameter', 'path' => '[token_endpoint_auth_methods][client_assertion_jwt][encryption][required]'];
113
-                $parameters['oauth2_server.token_endpoint_auth_method.client_assertion_jwt.encryption.key_set'] = ['type' => 'alias',     'path' => '[token_endpoint_auth_methods][client_assertion_jwt][encryption][key_set]'];
113
+                $parameters['oauth2_server.token_endpoint_auth_method.client_assertion_jwt.encryption.key_set'] = ['type' => 'alias', 'path' => '[token_endpoint_auth_methods][client_assertion_jwt][encryption][key_set]'];
114 114
             }
115 115
         }
116 116
 
@@ -156,7 +156,7 @@  discard block
 block discarded – undo
156 156
                     ->info('The Client class.')
157 157
                     ->isRequired()
158 158
                     ->validate()
159
-                    ->ifTrue(function ($value) {
159
+                    ->ifTrue(function($value) {
160 160
                         return !class_exists($value);
161 161
                     })
162 162
                     ->thenInvalid('The class does not exist.')
@@ -426,7 +426,7 @@  discard block
 block discarded – undo
426 426
      */
427 427
     private function areClientAssertionSignatureAlgorithmsInvalid()
428 428
     {
429
-        return function ($data) {
429
+        return function($data) {
430 430
             if (false === $data['enabled']) {
431 431
                 return false;
432 432
             }
@@ -442,7 +442,7 @@  discard block
 block discarded – undo
442 442
      */
443 443
     private function isClientAssertionEncryptionParameterInvalid($parameter)
444 444
     {
445
-        return function ($data) use ($parameter) {
445
+        return function($data) use ($parameter) {
446 446
             if (false === $data['encryption']['enabled']) {
447 447
                 return false;
448 448
             }
@@ -456,7 +456,7 @@  discard block
 block discarded – undo
456 456
      */
457 457
     private function isClientSecretBasicRealmInvalid()
458 458
     {
459
-        return function ($data) {
459
+        return function($data) {
460 460
             if (false === $data['enabled']) {
461 461
                 return false;
462 462
             }
@@ -470,7 +470,7 @@  discard block
 block discarded – undo
470 470
      */
471 471
     private function isRegistrationPathValid()
472 472
     {
473
-        return function ($data) {
473
+        return function($data) {
474 474
             return true === $data['enabled'] && empty($data['registration_path']);
475 475
         };
476 476
     }
@@ -480,7 +480,7 @@  discard block
 block discarded – undo
480 480
      */
481 481
     private function isConfigurationPathValid()
482 482
     {
483
-        return function ($data) {
483
+        return function($data) {
484 484
             return true === $data['enabled'] && empty($data['configuration_path']);
485 485
         };
486 486
     }
@@ -490,7 +490,7 @@  discard block
 block discarded – undo
490 490
      */
491 491
     private function isInitialAccessTokenClassValid()
492 492
     {
493
-        return function ($data) {
493
+        return function($data) {
494 494
             return true === $data['enabled'] && (empty($data['class']) || !class_exists($data['class']));
495 495
         };
496 496
     }
@@ -500,7 +500,7 @@  discard block
 block discarded – undo
500 500
      */
501 501
     private function isInitialAccessTokenManagerValid()
502 502
     {
503
-        return function ($data) {
503
+        return function($data) {
504 504
             return true === $data['enabled'] && empty($data['class']);
505 505
         };
506 506
     }
@@ -510,7 +510,7 @@  discard block
 block discarded – undo
510 510
      */
511 511
     private function isSoftwareStatementKeySetValid()
512 512
     {
513
-        return function ($data) {
513
+        return function($data) {
514 514
             return true === $data['enabled'] && empty($data['key_set']);
515 515
         };
516 516
     }
@@ -520,7 +520,7 @@  discard block
 block discarded – undo
520 520
      */
521 521
     private function isSoftwareStatementAlgorithmValid()
522 522
     {
523
-        return function ($data) {
523
+        return function($data) {
524 524
             return true === $data['enabled'] && empty($data['signature_algorithm']);
525 525
         };
526 526
     }
Please login to merge, or discard this patch.
Bundle/Server/Plugin/AuthCodeGrantTypePlugin/AuthCodeGrantTypePlugin.php 1 patch
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -1,6 +1,6 @@  discard block
 block discarded – undo
1 1
 <?php
2 2
 
3
-declare(strict_types=1);
3
+declare(strict_types = 1);
4 4
 
5 5
 /*
6 6
  * The MIT License (MIT)
@@ -46,7 +46,7 @@  discard block
 block discarded – undo
46 46
             ->isRequired()
47 47
             ->addDefaultsIfNotSet()
48 48
             ->validate()
49
-                ->ifTrue(function ($value) {
49
+                ->ifTrue(function($value) {
50 50
                     return $value['min_length'] >= $value['max_length'];
51 51
                 })
52 52
                 ->thenInvalid('The configuration option "min_length" must be lower than "max_length".')
@@ -56,7 +56,7 @@  discard block
 block discarded – undo
56 56
                     ->info('Authorization Code class.')
57 57
                     ->isRequired()
58 58
                     ->validate()
59
-                        ->ifTrue(function ($value) {
59
+                        ->ifTrue(function($value) {
60 60
                             return !class_exists($value);
61 61
                         })
62 62
                         ->thenInvalid('The class does not exist.')
@@ -114,7 +114,7 @@  discard block
 block discarded – undo
114 114
             'oauth2_server.auth_code.lifetime'             => ['type' => 'parameter', 'path' => '[lifetime]'],
115 115
             'oauth2_server.auth_code.enforce_pkce'         => ['type' => 'parameter', 'path' => '[enforce_pkce]'],
116 116
             'oauth2_server.auth_code.allow_public_clients' => ['type' => 'parameter', 'path' => '[allow_public_clients]'],
117
-            'oauth2_server.auth_code.manager'              => ['type' => 'alias',     'path' => '[manager]'],
117
+            'oauth2_server.auth_code.manager'              => ['type' => 'alias', 'path' => '[manager]'],
118 118
         ];
119 119
         $this->loadParameters($parameters, $pluginConfiguration, $container);
120 120
     }
Please login to merge, or discard this patch.