@@ -1,6 +1,6 @@ |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -declare(strict_types=1); |
|
| 3 | +declare(strict_types = 1); |
|
| 4 | 4 | |
| 5 | 5 | /* |
| 6 | 6 | * The MIT License (MIT) |
@@ -1,6 +1,6 @@ |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -declare(strict_types=1); |
|
| 3 | +declare(strict_types = 1); |
|
| 4 | 4 | |
| 5 | 5 | /* |
| 6 | 6 | * The MIT License (MIT) |
@@ -1,6 +1,6 @@ |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -declare(strict_types=1); |
|
| 3 | +declare(strict_types = 1); |
|
| 4 | 4 | |
| 5 | 5 | /* |
| 6 | 6 | * The MIT License (MIT) |
@@ -1,6 +1,6 @@ |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -declare(strict_types=1); |
|
| 3 | +declare(strict_types = 1); |
|
| 4 | 4 | |
| 5 | 5 | /* |
| 6 | 6 | * The MIT License (MIT) |
@@ -1,6 +1,6 @@ |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -declare(strict_types=1); |
|
| 3 | +declare(strict_types = 1); |
|
| 4 | 4 | |
| 5 | 5 | /* |
| 6 | 6 | * The MIT License (MIT) |
@@ -1,6 +1,6 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -declare(strict_types=1); |
|
| 3 | +declare(strict_types = 1); |
|
| 4 | 4 | |
| 5 | 5 | /* |
| 6 | 6 | * The MIT License (MIT) |
@@ -225,7 +225,7 @@ discard block |
||
| 225 | 225 | ->children() |
| 226 | 226 | ->arrayNode('pre_configured_authorization') |
| 227 | 227 | ->validate() |
| 228 | - ->ifTrue(function ($value) { |
|
| 228 | + ->ifTrue(function($value) { |
|
| 229 | 229 | if (false === $value['enabled']) { |
| 230 | 230 | return false; |
| 231 | 231 | } |
@@ -272,8 +272,8 @@ discard block |
||
| 272 | 272 | $files = []; |
| 273 | 273 | $accessor = PropertyAccess::createPropertyAccessor(); |
| 274 | 274 | $parameters = [ |
| 275 | - 'oauth2_server.authorization_endpoint.form_handler' => ['type' => 'alias', 'path' => '[form][handler]'], |
|
| 276 | - 'oauth2_server.authorization_endpoint.user_account_manager' => ['type' => 'alias', 'path' => '[user_account_manager]'], |
|
| 275 | + 'oauth2_server.authorization_endpoint.form_handler' => ['type' => 'alias', 'path' => '[form][handler]'], |
|
| 276 | + 'oauth2_server.authorization_endpoint.user_account_manager' => ['type' => 'alias', 'path' => '[user_account_manager]'], |
|
| 277 | 277 | 'oauth2_server.authorization_endpoint.template' => ['type' => 'parameter', 'path' => '[template]'], |
| 278 | 278 | 'oauth2_server.authorization_endpoint.allow_scope_selection' => ['type' => 'parameter', 'path' => '[allow_scope_selection]'], |
| 279 | 279 | 'oauth2_server.authorization_endpoint.type' => ['type' => 'parameter', 'path' => '[form][type]'], |
@@ -301,7 +301,7 @@ discard block |
||
| 301 | 301 | $parameters['oauth2_server.authorization_request_loader.request_object.encryption.key_encryption_algorithms'] = ['type' => 'parameter', 'path' => '[request_object][encryption][key_encryption_algorithms]']; |
| 302 | 302 | $parameters['oauth2_server.authorization_request_loader.request_object.encryption.content_encryption_algorithms'] = ['type' => 'parameter', 'path' => '[request_object][encryption][content_encryption_algorithms]']; |
| 303 | 303 | $parameters['oauth2_server.authorization_request_loader.request_object.encryption.required'] = ['type' => 'parameter', 'path' => '[request_object][encryption][required]']; |
| 304 | - $parameters['oauth2_server.authorization_request_loader.request_object.encryption.key_set'] = ['type' => 'alias', 'path' => '[request_object][encryption][key_set]']; |
|
| 304 | + $parameters['oauth2_server.authorization_request_loader.request_object.encryption.key_set'] = ['type' => 'alias', 'path' => '[request_object][encryption][key_set]']; |
|
| 305 | 305 | } |
| 306 | 306 | |
| 307 | 307 | $parameters['oauth2_server.authorization_request_loader.request_object.reference_enabled'] = ['type' => 'parameter', 'path' => '[request_object][reference][enabled]']; |
@@ -449,7 +449,7 @@ discard block |
||
| 449 | 449 | */ |
| 450 | 450 | private function areClientAssertionSignatureAlgorithmsInvalid() |
| 451 | 451 | { |
| 452 | - return function ($data) { |
|
| 452 | + return function($data) { |
|
| 453 | 453 | if (false === $data['enabled']) { |
| 454 | 454 | return false; |
| 455 | 455 | } |
@@ -465,7 +465,7 @@ discard block |
||
| 465 | 465 | */ |
| 466 | 466 | private function isClientAssertionEncryptionParameterInvalid($parameter) |
| 467 | 467 | { |
| 468 | - return function ($data) use ($parameter) { |
|
| 468 | + return function($data) use ($parameter) { |
|
| 469 | 469 | if (false === $data['encryption']['enabled']) { |
| 470 | 470 | return false; |
| 471 | 471 | } |
@@ -1,6 +1,6 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -declare(strict_types=1); |
|
| 3 | +declare(strict_types = 1); |
|
| 4 | 4 | |
| 5 | 5 | /* |
| 6 | 6 | * The MIT License (MIT) |
@@ -75,17 +75,17 @@ discard block |
||
| 75 | 75 | ->children() |
| 76 | 76 | ->arrayNode('session_management') |
| 77 | 77 | ->validate() |
| 78 | - ->ifTrue(function ($value) { |
|
| 78 | + ->ifTrue(function($value) { |
|
| 79 | 79 | return $value['enabled'] && empty($value['path']); |
| 80 | 80 | })->thenInvalid('The option "path" must be set when the Session Management is enabled.') |
| 81 | 81 | ->end() |
| 82 | 82 | ->validate() |
| 83 | - ->ifTrue(function ($value) { |
|
| 83 | + ->ifTrue(function($value) { |
|
| 84 | 84 | return $value['enabled'] && empty($value['storage_name']); |
| 85 | 85 | })->thenInvalid('The option "storage_name" must be set when the Session Management is enabled.') |
| 86 | 86 | ->end() |
| 87 | 87 | ->validate() |
| 88 | - ->ifTrue(function ($value) { |
|
| 88 | + ->ifTrue(function($value) { |
|
| 89 | 89 | return $value['enabled'] && empty($value['template']); |
| 90 | 90 | })->thenInvalid('The option "template" must be set when the Session Management is enabled.') |
| 91 | 91 | ->end() |
@@ -316,10 +316,10 @@ discard block |
||
| 316 | 316 | 'oauth2_server.openid_connect.userinfo_endpoint.signature.enabled' => ['type' => 'parameter', 'path' => '[userinfo_endpoint][signature][enabled]'], |
| 317 | 317 | 'oauth2_server.openid_connect.metadata.enabled' => ['type' => 'parameter', 'path' => '[metadata][enabled]'], |
| 318 | 318 | 'oauth2_server.openid_connect.id_token.response_type.id_token' => ['type' => 'parameter', 'path' => '[response_type][id_token]'], |
| 319 | - 'oauth2_server.openid_connect.claims_supported' => ['type' => 'parameter', 'path' => '[claims_supported]', 'callback' => function ($data) { |
|
| 319 | + 'oauth2_server.openid_connect.claims_supported' => ['type' => 'parameter', 'path' => '[claims_supported]', 'callback' => function($data) { |
|
| 320 | 320 | return array_unique($data); |
| 321 | 321 | }], |
| 322 | - 'oauth2_server.openid_connect.claims_locales_supported' => ['type' => 'parameter', 'path' => '[claims_locales_supported]', 'callback' => function ($data) { |
|
| 322 | + 'oauth2_server.openid_connect.claims_locales_supported' => ['type' => 'parameter', 'path' => '[claims_locales_supported]', 'callback' => function($data) { |
|
| 323 | 323 | return array_unique($data); |
| 324 | 324 | }], |
| 325 | 325 | ]; |
@@ -1,6 +1,6 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -declare(strict_types=1); |
|
| 3 | +declare(strict_types = 1); |
|
| 4 | 4 | |
| 5 | 5 | /* |
| 6 | 6 | * The MIT License (MIT) |
@@ -61,7 +61,7 @@ discard block |
||
| 61 | 61 | } |
| 62 | 62 | |
| 63 | 63 | $parameters = [ |
| 64 | - 'oauth2_server.refresh_token.token_manager' => ['type' => 'alias', 'path' => '[manager]'], |
|
| 64 | + 'oauth2_server.refresh_token.token_manager' => ['type' => 'alias', 'path' => '[manager]'], |
|
| 65 | 65 | 'oauth2_server.refresh_token.token_class' => ['type' => 'parameter', 'path' => '[class]'], |
| 66 | 66 | 'oauth2_server.refresh_token.min_length' => ['type' => 'parameter', 'path' => '[min_length]'], |
| 67 | 67 | 'oauth2_server.refresh_token.max_length' => ['type' => 'parameter', 'path' => '[max_length]'], |
@@ -80,7 +80,7 @@ discard block |
||
| 80 | 80 | ->isRequired() |
| 81 | 81 | ->addDefaultsIfNotSet() |
| 82 | 82 | ->validate() |
| 83 | - ->ifTrue(function ($value) { |
|
| 83 | + ->ifTrue(function($value) { |
|
| 84 | 84 | return $value['min_length'] >= $value['max_length']; |
| 85 | 85 | }) |
| 86 | 86 | ->thenInvalid('The configuration option "min_length" must be lower than "max_length".') |
@@ -104,7 +104,7 @@ discard block |
||
| 104 | 104 | ->scalarNode('class') |
| 105 | 105 | ->info('Refresh token class.') |
| 106 | 106 | ->validate() |
| 107 | - ->ifTrue(function ($value) { |
|
| 107 | + ->ifTrue(function($value) { |
|
| 108 | 108 | return !class_exists($value); |
| 109 | 109 | })->thenInvalid('The class does not exist.') |
| 110 | 110 | ->end() |
@@ -1,6 +1,6 @@ discard block |
||
| 1 | 1 | <?php |
| 2 | 2 | |
| 3 | -declare(strict_types=1); |
|
| 3 | +declare(strict_types = 1); |
|
| 4 | 4 | |
| 5 | 5 | /* |
| 6 | 6 | * The MIT License (MIT) |
@@ -52,12 +52,12 @@ discard block |
||
| 52 | 52 | 'oauth2_server.jwt_access_token.manager.issuer' => ['type' => 'parameter', 'path' => '[issuer]'], |
| 53 | 53 | 'oauth2_server.jwt_access_token.manager.token_lifetime' => ['type' => 'parameter', 'path' => '[token_lifetime]'], |
| 54 | 54 | 'oauth2_server.jwt_access_token.manager.signature_algorithm' => ['type' => 'parameter', 'path' => '[signature_algorithm]'], |
| 55 | - 'oauth2_server.jwt_access_token.manager.signature_key_set' => ['type' => 'alias', 'path' => '[signature_key_set]'], |
|
| 55 | + 'oauth2_server.jwt_access_token.manager.signature_key_set' => ['type' => 'alias', 'path' => '[signature_key_set]'], |
|
| 56 | 56 | 'oauth2_server.jwt_access_token.manager.key_encryption_algorithm' => ['type' => 'parameter', 'path' => '[key_encryption_algorithm]'], |
| 57 | 57 | 'oauth2_server.jwt_access_token.manager.content_encryption_algorithm' => ['type' => 'parameter', 'path' => '[content_encryption_algorithm]'], |
| 58 | 58 | 'oauth2_server.jwt_access_token.manager.claim_checkers' => ['type' => 'parameter', 'path' => '[claim_checkers]'], |
| 59 | 59 | 'oauth2_server.jwt_access_token.manager.header_checkers' => ['type' => 'parameter', 'path' => '[header_checkers]'], |
| 60 | - 'oauth2_server.jwt_access_token.manager.key_encryption_key_set' => ['type' => 'alias', 'path' => '[key_encryption_key_set]'], |
|
| 60 | + 'oauth2_server.jwt_access_token.manager.key_encryption_key_set' => ['type' => 'alias', 'path' => '[key_encryption_key_set]'], |
|
| 61 | 61 | ]; |
| 62 | 62 | |
| 63 | 63 | $this->loadParameters($parameters, $pluginConfiguration, $container); |