@@ -1,6 +1,6 @@ |
||
1 | 1 | <?php |
2 | 2 | |
3 | -declare(strict_types=1); |
|
3 | +declare(strict_types = 1); |
|
4 | 4 | |
5 | 5 | /* |
6 | 6 | * The MIT License (MIT) |
@@ -1,6 +1,6 @@ |
||
1 | 1 | <?php |
2 | 2 | |
3 | -declare(strict_types=1); |
|
3 | +declare(strict_types = 1); |
|
4 | 4 | |
5 | 5 | /* |
6 | 6 | * The MIT License (MIT) |
@@ -1,6 +1,6 @@ |
||
1 | 1 | <?php |
2 | 2 | |
3 | -declare(strict_types=1); |
|
3 | +declare(strict_types = 1); |
|
4 | 4 | |
5 | 5 | /* |
6 | 6 | * The MIT License (MIT) |
@@ -1,6 +1,6 @@ |
||
1 | 1 | <?php |
2 | 2 | |
3 | -declare(strict_types=1); |
|
3 | +declare(strict_types = 1); |
|
4 | 4 | |
5 | 5 | /* |
6 | 6 | * The MIT License (MIT) |
@@ -1,6 +1,6 @@ |
||
1 | 1 | <?php |
2 | 2 | |
3 | -declare(strict_types=1); |
|
3 | +declare(strict_types = 1); |
|
4 | 4 | |
5 | 5 | /* |
6 | 6 | * The MIT License (MIT) |
@@ -1,6 +1,6 @@ discard block |
||
1 | 1 | <?php |
2 | 2 | |
3 | -declare(strict_types=1); |
|
3 | +declare(strict_types = 1); |
|
4 | 4 | |
5 | 5 | /* |
6 | 6 | * The MIT License (MIT) |
@@ -225,7 +225,7 @@ discard block |
||
225 | 225 | ->children() |
226 | 226 | ->arrayNode('pre_configured_authorization') |
227 | 227 | ->validate() |
228 | - ->ifTrue(function ($value) { |
|
228 | + ->ifTrue(function($value) { |
|
229 | 229 | if (false === $value['enabled']) { |
230 | 230 | return false; |
231 | 231 | } |
@@ -272,8 +272,8 @@ discard block |
||
272 | 272 | $files = []; |
273 | 273 | $accessor = PropertyAccess::createPropertyAccessor(); |
274 | 274 | $parameters = [ |
275 | - 'oauth2_server.authorization_endpoint.form_handler' => ['type' => 'alias', 'path' => '[form][handler]'], |
|
276 | - 'oauth2_server.authorization_endpoint.user_account_manager' => ['type' => 'alias', 'path' => '[user_account_manager]'], |
|
275 | + 'oauth2_server.authorization_endpoint.form_handler' => ['type' => 'alias', 'path' => '[form][handler]'], |
|
276 | + 'oauth2_server.authorization_endpoint.user_account_manager' => ['type' => 'alias', 'path' => '[user_account_manager]'], |
|
277 | 277 | 'oauth2_server.authorization_endpoint.template' => ['type' => 'parameter', 'path' => '[template]'], |
278 | 278 | 'oauth2_server.authorization_endpoint.allow_scope_selection' => ['type' => 'parameter', 'path' => '[allow_scope_selection]'], |
279 | 279 | 'oauth2_server.authorization_endpoint.type' => ['type' => 'parameter', 'path' => '[form][type]'], |
@@ -301,7 +301,7 @@ discard block |
||
301 | 301 | $parameters['oauth2_server.authorization_request_loader.request_object.encryption.key_encryption_algorithms'] = ['type' => 'parameter', 'path' => '[request_object][encryption][key_encryption_algorithms]']; |
302 | 302 | $parameters['oauth2_server.authorization_request_loader.request_object.encryption.content_encryption_algorithms'] = ['type' => 'parameter', 'path' => '[request_object][encryption][content_encryption_algorithms]']; |
303 | 303 | $parameters['oauth2_server.authorization_request_loader.request_object.encryption.required'] = ['type' => 'parameter', 'path' => '[request_object][encryption][required]']; |
304 | - $parameters['oauth2_server.authorization_request_loader.request_object.encryption.key_set'] = ['type' => 'alias', 'path' => '[request_object][encryption][key_set]']; |
|
304 | + $parameters['oauth2_server.authorization_request_loader.request_object.encryption.key_set'] = ['type' => 'alias', 'path' => '[request_object][encryption][key_set]']; |
|
305 | 305 | } |
306 | 306 | |
307 | 307 | $parameters['oauth2_server.authorization_request_loader.request_object.reference_enabled'] = ['type' => 'parameter', 'path' => '[request_object][reference][enabled]']; |
@@ -449,7 +449,7 @@ discard block |
||
449 | 449 | */ |
450 | 450 | private function areClientAssertionSignatureAlgorithmsInvalid() |
451 | 451 | { |
452 | - return function ($data) { |
|
452 | + return function($data) { |
|
453 | 453 | if (false === $data['enabled']) { |
454 | 454 | return false; |
455 | 455 | } |
@@ -465,7 +465,7 @@ discard block |
||
465 | 465 | */ |
466 | 466 | private function isClientAssertionEncryptionParameterInvalid($parameter) |
467 | 467 | { |
468 | - return function ($data) use ($parameter) { |
|
468 | + return function($data) use ($parameter) { |
|
469 | 469 | if (false === $data['encryption']['enabled']) { |
470 | 470 | return false; |
471 | 471 | } |
@@ -1,6 +1,6 @@ discard block |
||
1 | 1 | <?php |
2 | 2 | |
3 | -declare(strict_types=1); |
|
3 | +declare(strict_types = 1); |
|
4 | 4 | |
5 | 5 | /* |
6 | 6 | * The MIT License (MIT) |
@@ -75,17 +75,17 @@ discard block |
||
75 | 75 | ->children() |
76 | 76 | ->arrayNode('session_management') |
77 | 77 | ->validate() |
78 | - ->ifTrue(function ($value) { |
|
78 | + ->ifTrue(function($value) { |
|
79 | 79 | return $value['enabled'] && empty($value['path']); |
80 | 80 | })->thenInvalid('The option "path" must be set when the Session Management is enabled.') |
81 | 81 | ->end() |
82 | 82 | ->validate() |
83 | - ->ifTrue(function ($value) { |
|
83 | + ->ifTrue(function($value) { |
|
84 | 84 | return $value['enabled'] && empty($value['storage_name']); |
85 | 85 | })->thenInvalid('The option "storage_name" must be set when the Session Management is enabled.') |
86 | 86 | ->end() |
87 | 87 | ->validate() |
88 | - ->ifTrue(function ($value) { |
|
88 | + ->ifTrue(function($value) { |
|
89 | 89 | return $value['enabled'] && empty($value['template']); |
90 | 90 | })->thenInvalid('The option "template" must be set when the Session Management is enabled.') |
91 | 91 | ->end() |
@@ -316,10 +316,10 @@ discard block |
||
316 | 316 | 'oauth2_server.openid_connect.userinfo_endpoint.signature.enabled' => ['type' => 'parameter', 'path' => '[userinfo_endpoint][signature][enabled]'], |
317 | 317 | 'oauth2_server.openid_connect.metadata.enabled' => ['type' => 'parameter', 'path' => '[metadata][enabled]'], |
318 | 318 | 'oauth2_server.openid_connect.id_token.response_type.id_token' => ['type' => 'parameter', 'path' => '[response_type][id_token]'], |
319 | - 'oauth2_server.openid_connect.claims_supported' => ['type' => 'parameter', 'path' => '[claims_supported]', 'callback' => function ($data) { |
|
319 | + 'oauth2_server.openid_connect.claims_supported' => ['type' => 'parameter', 'path' => '[claims_supported]', 'callback' => function($data) { |
|
320 | 320 | return array_unique($data); |
321 | 321 | }], |
322 | - 'oauth2_server.openid_connect.claims_locales_supported' => ['type' => 'parameter', 'path' => '[claims_locales_supported]', 'callback' => function ($data) { |
|
322 | + 'oauth2_server.openid_connect.claims_locales_supported' => ['type' => 'parameter', 'path' => '[claims_locales_supported]', 'callback' => function($data) { |
|
323 | 323 | return array_unique($data); |
324 | 324 | }], |
325 | 325 | ]; |
@@ -1,6 +1,6 @@ discard block |
||
1 | 1 | <?php |
2 | 2 | |
3 | -declare(strict_types=1); |
|
3 | +declare(strict_types = 1); |
|
4 | 4 | |
5 | 5 | /* |
6 | 6 | * The MIT License (MIT) |
@@ -61,7 +61,7 @@ discard block |
||
61 | 61 | } |
62 | 62 | |
63 | 63 | $parameters = [ |
64 | - 'oauth2_server.refresh_token.token_manager' => ['type' => 'alias', 'path' => '[manager]'], |
|
64 | + 'oauth2_server.refresh_token.token_manager' => ['type' => 'alias', 'path' => '[manager]'], |
|
65 | 65 | 'oauth2_server.refresh_token.token_class' => ['type' => 'parameter', 'path' => '[class]'], |
66 | 66 | 'oauth2_server.refresh_token.min_length' => ['type' => 'parameter', 'path' => '[min_length]'], |
67 | 67 | 'oauth2_server.refresh_token.max_length' => ['type' => 'parameter', 'path' => '[max_length]'], |
@@ -80,7 +80,7 @@ discard block |
||
80 | 80 | ->isRequired() |
81 | 81 | ->addDefaultsIfNotSet() |
82 | 82 | ->validate() |
83 | - ->ifTrue(function ($value) { |
|
83 | + ->ifTrue(function($value) { |
|
84 | 84 | return $value['min_length'] >= $value['max_length']; |
85 | 85 | }) |
86 | 86 | ->thenInvalid('The configuration option "min_length" must be lower than "max_length".') |
@@ -104,7 +104,7 @@ discard block |
||
104 | 104 | ->scalarNode('class') |
105 | 105 | ->info('Refresh token class.') |
106 | 106 | ->validate() |
107 | - ->ifTrue(function ($value) { |
|
107 | + ->ifTrue(function($value) { |
|
108 | 108 | return !class_exists($value); |
109 | 109 | })->thenInvalid('The class does not exist.') |
110 | 110 | ->end() |
@@ -1,6 +1,6 @@ discard block |
||
1 | 1 | <?php |
2 | 2 | |
3 | -declare(strict_types=1); |
|
3 | +declare(strict_types = 1); |
|
4 | 4 | |
5 | 5 | /* |
6 | 6 | * The MIT License (MIT) |
@@ -52,12 +52,12 @@ discard block |
||
52 | 52 | 'oauth2_server.jwt_access_token.manager.issuer' => ['type' => 'parameter', 'path' => '[issuer]'], |
53 | 53 | 'oauth2_server.jwt_access_token.manager.token_lifetime' => ['type' => 'parameter', 'path' => '[token_lifetime]'], |
54 | 54 | 'oauth2_server.jwt_access_token.manager.signature_algorithm' => ['type' => 'parameter', 'path' => '[signature_algorithm]'], |
55 | - 'oauth2_server.jwt_access_token.manager.signature_key_set' => ['type' => 'alias', 'path' => '[signature_key_set]'], |
|
55 | + 'oauth2_server.jwt_access_token.manager.signature_key_set' => ['type' => 'alias', 'path' => '[signature_key_set]'], |
|
56 | 56 | 'oauth2_server.jwt_access_token.manager.key_encryption_algorithm' => ['type' => 'parameter', 'path' => '[key_encryption_algorithm]'], |
57 | 57 | 'oauth2_server.jwt_access_token.manager.content_encryption_algorithm' => ['type' => 'parameter', 'path' => '[content_encryption_algorithm]'], |
58 | 58 | 'oauth2_server.jwt_access_token.manager.claim_checkers' => ['type' => 'parameter', 'path' => '[claim_checkers]'], |
59 | 59 | 'oauth2_server.jwt_access_token.manager.header_checkers' => ['type' => 'parameter', 'path' => '[header_checkers]'], |
60 | - 'oauth2_server.jwt_access_token.manager.key_encryption_key_set' => ['type' => 'alias', 'path' => '[key_encryption_key_set]'], |
|
60 | + 'oauth2_server.jwt_access_token.manager.key_encryption_key_set' => ['type' => 'alias', 'path' => '[key_encryption_key_set]'], |
|
61 | 61 | ]; |
62 | 62 | |
63 | 63 | $this->loadParameters($parameters, $pluginConfiguration, $container); |