@@ -140,7 +140,7 @@ |
||
| 140 | 140 | |
| 141 | 141 | $httpResponse = (new Response)->setContent( |
| 142 | 142 | $this->templateEngine->render( |
| 143 | - '@default/gateway/'.$view.'.html.twig', |
|
| 143 | + '@default/gateway/' . $view . '.html.twig', |
|
| 144 | 144 | $parameters |
| 145 | 145 | ) |
| 146 | 146 | ); |
@@ -41,7 +41,7 @@ |
||
| 41 | 41 | * {@inheritdoc} the gelf message is an array which cannot be logged into a single line |
| 42 | 42 | * By jsonencoding the message we can write it on a single line |
| 43 | 43 | */ |
| 44 | - public function format(array|LogRecord $record) |
|
| 44 | + public function format(array | LogRecord $record) |
|
| 45 | 45 | { |
| 46 | 46 | $message = $this->formatter->format($record); |
| 47 | 47 | |
@@ -86,20 +86,20 @@ |
||
| 86 | 86 | private function isValidResponseStatus(string $status): bool |
| 87 | 87 | { |
| 88 | 88 | return in_array($status, [ |
| 89 | - Constants::STATUS_SUCCESS, // weeee! |
|
| 90 | - Constants::STATUS_REQUESTER, // Something is wrong with the AuthnRequest |
|
| 91 | - Constants::STATUS_RESPONDER, // Something went wrong with the Response |
|
| 92 | - Constants::STATUS_VERSION_MISMATCH, // The version of the request message was incorrect |
|
| 89 | + Constants::STATUS_SUCCESS, // weeee! |
|
| 90 | + Constants::STATUS_REQUESTER, // Something is wrong with the AuthnRequest |
|
| 91 | + Constants::STATUS_RESPONDER, // Something went wrong with the Response |
|
| 92 | + Constants::STATUS_VERSION_MISMATCH, // The version of the request message was incorrect |
|
| 93 | 93 | ]); |
| 94 | 94 | } |
| 95 | 95 | |
| 96 | 96 | private function isValidResponseSubStatus($subStatus): bool |
| 97 | 97 | { |
| 98 | 98 | return in_array($subStatus, [ |
| 99 | - Constants::STATUS_AUTHN_FAILED, // failed authentication |
|
| 99 | + Constants::STATUS_AUTHN_FAILED, // failed authentication |
|
| 100 | 100 | Constants::STATUS_INVALID_ATTR, |
| 101 | 101 | Constants::STATUS_INVALID_NAMEID_POLICY, |
| 102 | - Constants::STATUS_NO_AUTHN_CONTEXT, // insufficient Loa or Loa cannot be met |
|
| 102 | + Constants::STATUS_NO_AUTHN_CONTEXT, // insufficient Loa or Loa cannot be met |
|
| 103 | 103 | Constants::STATUS_NO_AVAILABLE_IDP, |
| 104 | 104 | Constants::STATUS_NO_PASSIVE, |
| 105 | 105 | Constants::STATUS_NO_SUPPORTED_IDP, |
@@ -236,7 +236,7 @@ |
||
| 236 | 236 | public function render($view, array $parameters = [], ?Response $response = null): Response |
| 237 | 237 | { |
| 238 | 238 | return parent::render( |
| 239 | - '@default/gateway/'.$view.'.html.twig', |
|
| 239 | + '@default/gateway/' . $view . '.html.twig', |
|
| 240 | 240 | $parameters, |
| 241 | 241 | $response, |
| 242 | 242 | ); |
@@ -43,7 +43,7 @@ |
||
| 43 | 43 | /** |
| 44 | 44 | * @return array View parameters 'title' and 'description' |
| 45 | 45 | */ |
| 46 | - protected function getPageTitleAndDescription(\Exception|Throwable $exception): array |
|
| 46 | + protected function getPageTitleAndDescription(\Exception | Throwable $exception): array |
|
| 47 | 47 | { |
| 48 | 48 | $translator = $this->getTranslator(); |
| 49 | 49 | |
@@ -78,7 +78,7 @@ discard block |
||
| 78 | 78 | public function selectSecondFactorForVerification( |
| 79 | 79 | string $authenticationMode, |
| 80 | 80 | Request $request, |
| 81 | - ): Response|RedirectResponse { |
|
| 81 | + ): Response | RedirectResponse { |
|
| 82 | 82 | $this->supportsAuthenticationMode($authenticationMode); |
| 83 | 83 | $context = $this->getResponseContext($authenticationMode); |
| 84 | 84 | $originalRequestId = $context->getInResponseTo(); |
@@ -192,7 +192,7 @@ discard block |
||
| 192 | 192 | public function chooseSecondFactor( |
| 193 | 193 | Request $request, |
| 194 | 194 | string $authenticationMode, |
| 195 | - ): Response|RedirectResponse|array { |
|
| 195 | + ): Response | RedirectResponse | array { |
|
| 196 | 196 | $this->supportsAuthenticationMode($authenticationMode); |
| 197 | 197 | $context = $this->getResponseContext($authenticationMode); |
| 198 | 198 | $originalRequestId = $context->getInResponseTo(); |
@@ -479,7 +479,7 @@ discard block |
||
| 479 | 479 | )] |
| 480 | 480 | public function verifySmsSecondFactor( |
| 481 | 481 | Request $request, |
| 482 | - ): Response|RedirectResponse { |
|
| 482 | + ): Response | RedirectResponse { |
|
| 483 | 483 | if (!$request->get('authenticationMode', false)) { |
| 484 | 484 | throw new RuntimeException('Unable to determine the authentication mode in the SMS verification action'); |
| 485 | 485 | } |
@@ -559,7 +559,7 @@ discard block |
||
| 559 | 559 | )] |
| 560 | 560 | public function verifySmsSecondFactorChallenge( |
| 561 | 561 | Request $request, |
| 562 | - ): Response|array { |
|
| 562 | + ): Response | array { |
|
| 563 | 563 | if (!$request->get('authenticationMode', false)) { |
| 564 | 564 | throw new RuntimeException('Unable to determine the authentication mode in the SMS challenge action'); |
| 565 | 565 | } |
@@ -46,7 +46,7 @@ discard block |
||
| 46 | 46 | ResponseContext $sfoResponseContext, |
| 47 | 47 | ResponseContext $ssoResponseContext, |
| 48 | 48 | ) { |
| 49 | - $this->secondFactorService = $secondFactorService; |
|
| 49 | + $this->secondFactorService = $secondFactorService; |
|
| 50 | 50 | $this->authenticationChannelLogger = $authenticationChannelLogger; |
| 51 | 51 | $this->sfoResponseContext = $sfoResponseContext; |
| 52 | 52 | $this->ssoResponseContext = $ssoResponseContext; |
@@ -69,7 +69,7 @@ discard block |
||
| 69 | 69 | 'institution' => $secondFactor->getInstitution(), |
| 70 | 70 | 'authentication_result' => $context->isSecondFactorVerified() ? 'OK' : 'FAILED', |
| 71 | 71 | 'resulting_loa' => (string) $loa, |
| 72 | - 'sso' => $context->isVerifiedBySsoOn2faCookie() ? 'YES': 'NO', |
|
| 72 | + 'sso' => $context->isVerifiedBySsoOn2faCookie() ? 'YES' : 'NO', |
|
| 73 | 73 | ]; |
| 74 | 74 | |
| 75 | 75 | if ($context->isVerifiedBySsoOn2faCookie()) { |
@@ -69,7 +69,7 @@ |
||
| 69 | 69 | if ($subjectNameIdFromResponse !== $secondFactor->getSecondFactorIdentifier()) { |
| 70 | 70 | throw new ReceivedInvalidSubjectNameIdException( |
| 71 | 71 | sprintf( |
| 72 | - 'The nameID received from the GSSP (%s) did not match the selected second factor (%s). This '. |
|
| 72 | + 'The nameID received from the GSSP (%s) did not match the selected second factor (%s). This ' . |
|
| 73 | 73 | 'might be an indication someone is tampering with a GSSP. The authentication was started by %s', |
| 74 | 74 | $subjectNameIdFromResponse, |
| 75 | 75 | $secondFactor->getSecondFactorIdentifier(), |
@@ -102,7 +102,7 @@ |
||
| 102 | 102 | } |
| 103 | 103 | |
| 104 | 104 | $secondFactor = $this->secondFactorService->findByUuid($selectedSecondFactorUuid); |
| 105 | - $loaLevel = $this->secondFactorService->getLoaLevel($secondFactor); |
|
| 105 | + $loaLevel = $this->secondFactorService->getLoaLevel($secondFactor); |
|
| 106 | 106 | $this->responseValidator->validate($request, $secondFactor, $responseContext->getIdentityNameId()); |
| 107 | 107 | |
| 108 | 108 | $authnContextClassRef = $this->loaAliasLookupService->findAliasByLoa($loaLevel); |