@@ -74,7 +74,7 @@ |
||
| 74 | 74 | $this->stateHandler = $stateHandler; |
| 75 | 75 | $this->assertionSigningService = $assertionSigningService; |
| 76 | 76 | |
| 77 | - $this->currentTime = is_null($now) ? new DateTime('now', new DateTimeZone('UTC')): $now; |
|
| 77 | + $this->currentTime = is_null($now) ? new DateTime('now', new DateTimeZone('UTC')) : $now; |
|
| 78 | 78 | } |
| 79 | 79 | |
| 80 | 80 | /** |
@@ -48,7 +48,7 @@ |
||
| 48 | 48 | public function getConfigurationOf(string $serviceProvider): ServiceProvider |
| 49 | 49 | { |
| 50 | 50 | if (!$this->isConnected($serviceProvider)) { |
| 51 | - throw UnknownProviderException::create($serviceProvider, (string )$this->allowed); |
|
| 51 | + throw UnknownProviderException::create($serviceProvider, (string) $this->allowed); |
|
| 52 | 52 | } |
| 53 | 53 | |
| 54 | 54 | return $this->samlEntityService->getServiceProvider($serviceProvider); |
@@ -96,7 +96,7 @@ |
||
| 96 | 96 | $response = $this->responseProxy->createProxyResponse( |
| 97 | 97 | $responseContext->reconstituteAssertion(), |
| 98 | 98 | $responseContext->getDestination(), |
| 99 | - (string)$grantedLoa |
|
| 99 | + (string) $grantedLoa |
|
| 100 | 100 | ); |
| 101 | 101 | |
| 102 | 102 | $logger->notice(sprintf( |
@@ -107,7 +107,7 @@ |
||
| 107 | 107 | 'institution' => $secondFactor->institution, |
| 108 | 108 | 'authentication_result' => $stateHandler->isSecondFactorVerified() ? 'OK' : 'FAILED', |
| 109 | 109 | 'resulting_loa' => (string) $loa, |
| 110 | - 'sso' => $stateHandler->isVerifiedBySsoOn2faCookie() ? 'YES': 'NO', |
|
| 110 | + 'sso' => $stateHandler->isVerifiedBySsoOn2faCookie() ? 'YES' : 'NO', |
|
| 111 | 111 | ]; |
| 112 | 112 | |
| 113 | 113 | if ($stateHandler->isVerifiedBySsoOn2faCookie()) { |
@@ -95,20 +95,20 @@ |
||
| 95 | 95 | private function isValidResponseStatus($status) |
| 96 | 96 | { |
| 97 | 97 | return in_array($status, [ |
| 98 | - Constants::STATUS_SUCCESS, // weeee! |
|
| 99 | - Constants::STATUS_REQUESTER, // Something is wrong with the AuthnRequest |
|
| 100 | - Constants::STATUS_RESPONDER, // Something went wrong with the Response |
|
| 101 | - Constants::STATUS_VERSION_MISMATCH, // The version of the request message was incorrect |
|
| 98 | + Constants::STATUS_SUCCESS, // weeee! |
|
| 99 | + Constants::STATUS_REQUESTER, // Something is wrong with the AuthnRequest |
|
| 100 | + Constants::STATUS_RESPONDER, // Something went wrong with the Response |
|
| 101 | + Constants::STATUS_VERSION_MISMATCH, // The version of the request message was incorrect |
|
| 102 | 102 | ]); |
| 103 | 103 | } |
| 104 | 104 | |
| 105 | 105 | private function isValidResponseSubStatus($subStatus) |
| 106 | 106 | { |
| 107 | 107 | return in_array($subStatus, [ |
| 108 | - Constants::STATUS_AUTHN_FAILED, // failed authentication |
|
| 108 | + Constants::STATUS_AUTHN_FAILED, // failed authentication |
|
| 109 | 109 | Constants::STATUS_INVALID_ATTR, |
| 110 | 110 | Constants::STATUS_INVALID_NAMEID_POLICY, |
| 111 | - Constants::STATUS_NO_AUTHN_CONTEXT, // insufficient Loa or Loa cannot be met |
|
| 111 | + Constants::STATUS_NO_AUTHN_CONTEXT, // insufficient Loa or Loa cannot be met |
|
| 112 | 112 | Constants::STATUS_NO_AVAILABLE_IDP, |
| 113 | 113 | Constants::STATUS_NO_PASSIVE, |
| 114 | 114 | Constants::STATUS_NO_SUPPORTED_IDP, |
@@ -79,7 +79,7 @@ |
||
| 79 | 79 | $this->samlEntityService = $samlEntityService; |
| 80 | 80 | $this->stateHandler = $stateHandler; |
| 81 | 81 | $this->logger = $logger; |
| 82 | - $this->generationTime = is_null($now) ? new DateTime('now', new DateTimeZone('UTC')): $now; |
|
| 82 | + $this->generationTime = is_null($now) ? new DateTime('now', new DateTimeZone('UTC')) : $now; |
|
| 83 | 83 | } |
| 84 | 84 | |
| 85 | 85 | /** |
@@ -29,7 +29,7 @@ |
||
| 29 | 29 | { |
| 30 | 30 | $builder->add('send_challenge', SubmitType::class, [ |
| 31 | 31 | 'label' => 'gateway.form.gateway_send_sms_challenge.button.send_challenge', |
| 32 | - 'attr' => [ 'class' => 'btn btn-primary' ], |
|
| 32 | + 'attr' => ['class' => 'btn btn-primary'], |
|
| 33 | 33 | ]); |
| 34 | 34 | } |
| 35 | 35 | |
@@ -94,7 +94,7 @@ |
||
| 94 | 94 | return new Cookie( |
| 95 | 95 | $this->configuration->getName(), |
| 96 | 96 | $value, |
| 97 | - $this->configuration->isPersistent() ? $this->getTimestamp($this->configuration->getLifetime()): 0, |
|
| 97 | + $this->configuration->isPersistent() ? $this->getTimestamp($this->configuration->getLifetime()) : 0, |
|
| 98 | 98 | '/', |
| 99 | 99 | null, |
| 100 | 100 | true, |
@@ -247,7 +247,7 @@ discard block |
||
| 247 | 247 | |
| 248 | 248 | // Filter the selected second factor from the array collection |
| 249 | 249 | $secondFactorFiltered = $secondFactors->filter( |
| 250 | - function ($secondFactor) use ($secondFactorType) { |
|
| 250 | + function($secondFactor) use ($secondFactorType) { |
|
| 251 | 251 | return $secondFactorType === $secondFactor->secondFactorType; |
| 252 | 252 | } |
| 253 | 253 | ); |
@@ -392,7 +392,7 @@ discard block |
||
| 392 | 392 | $form = $this->createForm(VerifyYubikeyOtpType::class, $command)->handleRequest($request); |
| 393 | 393 | $cancelForm = $this->buildCancelAuthenticationForm($authenticationMode)->handleRequest($request); |
| 394 | 394 | |
| 395 | - if ($form->isSubmitted() && $form->isValid()) { |
|
| 395 | + if ($form->isSubmitted() && $form->isValid()) { |
|
| 396 | 396 | $result = $this->getStepupService()->verifyYubikeyOtp($command); |
| 397 | 397 | if ($result->didOtpVerificationFail()) { |
| 398 | 398 | $form->addError( |