@@ -2,11 +2,11 @@ |
||
| 2 | 2 | |
| 3 | 3 | $ignoreErrors = []; |
| 4 | 4 | $ignoreErrors[] = [ |
| 5 | - // identifier: function.deprecated |
|
| 6 | - 'message' => '#^Call to deprecated function GuzzleHttp\\\\json_decode\\(\\)\\: |
|
| 5 | + // identifier: function.deprecated |
|
| 6 | + 'message' => '#^Call to deprecated function GuzzleHttp\\\\json_decode\\(\\)\\: |
|
| 7 | 7 | json_decode will be removed in guzzlehttp/guzzle\\:8\\.0\\. Use Utils\\:\\:jsonDecode instead\\.$#', |
| 8 | - 'count' => 1, |
|
| 9 | - 'path' => __DIR__ . '/../../src/Surfnet/StepupGateway/GatewayBundle/Entity/SamlEntity.php', |
|
| 8 | + 'count' => 1, |
|
| 9 | + 'path' => __DIR__ . '/../../src/Surfnet/StepupGateway/GatewayBundle/Entity/SamlEntity.php', |
|
| 10 | 10 | ]; |
| 11 | 11 | |
| 12 | 12 | return ['parameters' => ['ignoreErrors' => $ignoreErrors]]; |
@@ -6,12 +6,12 @@ |
||
| 6 | 6 | |
| 7 | 7 | return RectorConfig::configure() |
| 8 | 8 | ->withPaths([ |
| 9 | - __DIR__ . '/../../ci', |
|
| 10 | - __DIR__ . '/../../config', |
|
| 11 | - __DIR__ . '/../../public', |
|
| 12 | - __DIR__ . '/../../src', |
|
| 13 | - __DIR__ . '/../../tests', |
|
| 14 | - __DIR__ . '/../../templates', |
|
| 9 | + __DIR__ . '/../../ci', |
|
| 10 | + __DIR__ . '/../../config', |
|
| 11 | + __DIR__ . '/../../public', |
|
| 12 | + __DIR__ . '/../../src', |
|
| 13 | + __DIR__ . '/../../tests', |
|
| 14 | + __DIR__ . '/../../templates', |
|
| 15 | 15 | ]) |
| 16 | 16 | // uncomment to reach your current PHP version |
| 17 | 17 | // ->withPhpSets() |
@@ -213,7 +213,7 @@ discard block |
||
| 213 | 213 | $request = Saml2AuthnRequest::createNew($authnRequest); |
| 214 | 214 | $query = $request->buildRequestQuery(); |
| 215 | 215 | |
| 216 | - $this->getSession()->visit($request->getDestination().'?'.$query); |
|
| 216 | + $this->getSession()->visit($request->getDestination() . '?' . $query); |
|
| 217 | 217 | } |
| 218 | 218 | |
| 219 | 219 | #[\Behat\Step\When('/^([^\\\']*) starts an SFO authentication requiring LoA ([^\\\']*)$/')] |
@@ -266,7 +266,7 @@ discard block |
||
| 266 | 266 | ); |
| 267 | 267 | $request = Saml2AuthnRequest::createNew($authnRequest); |
| 268 | 268 | $query = $request->buildRequestQuery(); |
| 269 | - $this->getSession()->visit($authnRequest->getDestination().'?'.$query); |
|
| 269 | + $this->getSession()->visit($authnRequest->getDestination() . '?' . $query); |
|
| 270 | 270 | } |
| 271 | 271 | |
| 272 | 272 | #[\Behat\Step\When('/^([^\\\']*) starts an authentication requiring LoA ([^\\\']*)$/')] |
@@ -307,7 +307,7 @@ discard block |
||
| 307 | 307 | $request = Saml2AuthnRequest::createNew($authnRequest); |
| 308 | 308 | $query = $request->buildRequestQuery(); |
| 309 | 309 | |
| 310 | - $this->getSession()->visit($request->getDestination().'?'.$query); |
|
| 310 | + $this->getSession()->visit($request->getDestination() . '?' . $query); |
|
| 311 | 311 | } |
| 312 | 312 | |
| 313 | 313 | #[\Behat\Step\When('/^I authenticate at the IdP as ([^\\\']*)$/')] |
@@ -193,7 +193,7 @@ discard block |
||
| 193 | 193 | #[\Behat\Step\Given('/^an institution "([^"]*)" that allows "([^"]*)"$/')] |
| 194 | 194 | public function anInstitutionThatAllows(string $institution, string $option): void |
| 195 | 195 | { |
| 196 | - switch(true) { |
|
| 196 | + switch (true) { |
|
| 197 | 197 | case $option === 'sso_on_2fa': |
| 198 | 198 | $optionColumnName = 'sso_on2fa_enabled'; |
| 199 | 199 | break; |
@@ -395,7 +395,7 @@ discard block |
||
| 395 | 395 | private function getCookieNames(array $responseCookieHeaders): array |
| 396 | 396 | { |
| 397 | 397 | $response = []; |
| 398 | - foreach($responseCookieHeaders as $cookie) { |
|
| 398 | + foreach ($responseCookieHeaders as $cookie) { |
|
| 399 | 399 | $parts = explode('=', $cookie); |
| 400 | 400 | $response[] = array_shift($parts); |
| 401 | 401 | } |