@@ -83,15 +83,15 @@ discard block |
||
83 | 83 | public function aUserIdentifiedByWithAVettedToken($institution, $nameId, $tokenType) |
84 | 84 | { |
85 | 85 | switch (strtolower($tokenType)) { |
86 | - case "yubikey": |
|
87 | - $this->currentToken = $this->fixtureService->registerYubikeyToken($nameId, $institution); |
|
88 | - break; |
|
89 | - case "sms": |
|
90 | - $this->currentToken = $this->fixtureService->registerSmsToken($nameId, $institution); |
|
91 | - break; |
|
92 | - case "tiqr": |
|
93 | - $this->currentToken = $this->fixtureService->registerTiqrToken($nameId, $institution); |
|
94 | - break; |
|
86 | + case "yubikey": |
|
87 | + $this->currentToken = $this->fixtureService->registerYubikeyToken($nameId, $institution); |
|
88 | + break; |
|
89 | + case "sms": |
|
90 | + $this->currentToken = $this->fixtureService->registerSmsToken($nameId, $institution); |
|
91 | + break; |
|
92 | + case "tiqr": |
|
93 | + $this->currentToken = $this->fixtureService->registerTiqrToken($nameId, $institution); |
|
94 | + break; |
|
95 | 95 | } |
96 | 96 | } |
97 | 97 | |
@@ -101,15 +101,15 @@ discard block |
||
101 | 101 | public function aUserIdentifiedByWithASelfAssertedToken($institution, $nameId, $tokenType) |
102 | 102 | { |
103 | 103 | switch (strtolower($tokenType)) { |
104 | - case "yubikey": |
|
105 | - $this->currentToken = $this->fixtureService->registerYubikeyToken($nameId, $institution, true); |
|
106 | - break; |
|
107 | - case "sms": |
|
108 | - $this->currentToken = $this->fixtureService->registerSmsToken($nameId, $institution, true); |
|
109 | - break; |
|
110 | - case "tiqr": |
|
111 | - $this->currentToken = $this->fixtureService->registerTiqrToken($nameId, $institution, true); |
|
112 | - break; |
|
104 | + case "yubikey": |
|
105 | + $this->currentToken = $this->fixtureService->registerYubikeyToken($nameId, $institution, true); |
|
106 | + break; |
|
107 | + case "sms": |
|
108 | + $this->currentToken = $this->fixtureService->registerSmsToken($nameId, $institution, true); |
|
109 | + break; |
|
110 | + case "tiqr": |
|
111 | + $this->currentToken = $this->fixtureService->registerTiqrToken($nameId, $institution, true); |
|
112 | + break; |
|
113 | 113 | } |
114 | 114 | } |
115 | 115 | |
@@ -197,11 +197,11 @@ discard block |
||
197 | 197 | public function anInstitutionThatAllows(string $institution, string $option) |
198 | 198 | { |
199 | 199 | switch(true) { |
200 | - case $option === 'sso_on_2fa': |
|
201 | - $optionColumnName = 'sso_on2fa_enabled'; |
|
202 | - break; |
|
203 | - default: |
|
204 | - throw new RuntimeException(sprintf('Option "%s" is not supported', $option)); |
|
200 | + case $option === 'sso_on_2fa': |
|
201 | + $optionColumnName = 'sso_on2fa_enabled'; |
|
202 | + break; |
|
203 | + default: |
|
204 | + throw new RuntimeException(sprintf('Option "%s" is not supported', $option)); |
|
205 | 205 | } |
206 | 206 | $this->fixtureService->configureBoolean($institution, $optionColumnName, true); |
207 | 207 | } |
@@ -212,15 +212,15 @@ discard block |
||
212 | 212 | public function iShouldSelectMyTokenOnTheWAYG($tokenType) |
213 | 213 | { |
214 | 214 | switch (strtolower($tokenType)) { |
215 | - case "yubikey": |
|
216 | - $this->minkContext->pressButton('gateway_choose_second_factor_choose_yubikey'); |
|
217 | - break; |
|
218 | - case "sms": |
|
219 | - $this->minkContext->pressButton('gateway_choose_second_factor_choose_sms'); |
|
220 | - break; |
|
221 | - case "tiqr": |
|
222 | - $this->minkContext->pressButton('gateway_choose_second_factor_choose_tiqr'); |
|
223 | - break; |
|
215 | + case "yubikey": |
|
216 | + $this->minkContext->pressButton('gateway_choose_second_factor_choose_yubikey'); |
|
217 | + break; |
|
218 | + case "sms": |
|
219 | + $this->minkContext->pressButton('gateway_choose_second_factor_choose_sms'); |
|
220 | + break; |
|
221 | + case "tiqr": |
|
222 | + $this->minkContext->pressButton('gateway_choose_second_factor_choose_tiqr'); |
|
223 | + break; |
|
224 | 224 | } |
225 | 225 | } |
226 | 226 |
@@ -186,20 +186,20 @@ discard block |
||
186 | 186 | $this->loadPrivateKey(new PrivateKey('/var/www/html/ci/certificates/sp.key', 'default')) |
187 | 187 | ); |
188 | 188 | switch ($loa) { |
189 | - case "1": |
|
190 | - case "2": |
|
191 | - case "3": |
|
192 | - $authnRequest->setRequestedAuthnContext( |
|
193 | - ['AuthnContextClassRef' => ['http://stepup.example.com/assurance/sfo-level' . $loa]] |
|
194 | - ); |
|
195 | - break; |
|
196 | - case "self-asserted": |
|
197 | - $authnRequest->setRequestedAuthnContext( |
|
198 | - ['AuthnContextClassRef' => ['http://stepup.example.com/assurance/loa-self-asserted']] |
|
199 | - ); |
|
200 | - break; |
|
201 | - default: |
|
202 | - throw new RuntimeException(sprintf('The specified LoA-%s is not supported', $loa)); |
|
189 | + case "1": |
|
190 | + case "2": |
|
191 | + case "3": |
|
192 | + $authnRequest->setRequestedAuthnContext( |
|
193 | + ['AuthnContextClassRef' => ['http://stepup.example.com/assurance/sfo-level' . $loa]] |
|
194 | + ); |
|
195 | + break; |
|
196 | + case "self-asserted": |
|
197 | + $authnRequest->setRequestedAuthnContext( |
|
198 | + ['AuthnContextClassRef' => ['http://stepup.example.com/assurance/loa-self-asserted']] |
|
199 | + ); |
|
200 | + break; |
|
201 | + default: |
|
202 | + throw new RuntimeException(sprintf('The specified LoA-%s is not supported', $loa)); |
|
203 | 203 | } |
204 | 204 | $request = Saml2AuthnRequest::createNew($authnRequest); |
205 | 205 | $query = $request->buildRequestQuery(); |
@@ -284,19 +284,19 @@ discard block |
||
284 | 284 | ); |
285 | 285 | |
286 | 286 | switch ($loa) { |
287 | - case "1": |
|
288 | - case "2": |
|
289 | - case "3": |
|
290 | - $authnRequest->setRequestedAuthnContext( |
|
291 | - ['AuthnContextClassRef' => ['http://stepup.example.com/assurance/level' . $loa]] |
|
292 | - ); |
|
293 | - break; |
|
294 | - case "self-asserted": |
|
295 | - $authnRequest->setRequestedAuthnContext( |
|
296 | - ['AuthnContextClassRef' => ['http://stepup.example.com/assurance/loa-self-asserted']] |
|
297 | - ); |
|
298 | - default: |
|
299 | - throw new RuntimeException(sprintf('The specified LoA-%s is not supported', $loa)); |
|
287 | + case "1": |
|
288 | + case "2": |
|
289 | + case "3": |
|
290 | + $authnRequest->setRequestedAuthnContext( |
|
291 | + ['AuthnContextClassRef' => ['http://stepup.example.com/assurance/level' . $loa]] |
|
292 | + ); |
|
293 | + break; |
|
294 | + case "self-asserted": |
|
295 | + $authnRequest->setRequestedAuthnContext( |
|
296 | + ['AuthnContextClassRef' => ['http://stepup.example.com/assurance/loa-self-asserted']] |
|
297 | + ); |
|
298 | + default: |
|
299 | + throw new RuntimeException(sprintf('The specified LoA-%s is not supported', $loa)); |
|
300 | 300 | } |
301 | 301 | |
302 | 302 | $request = Saml2AuthnRequest::createNew($authnRequest); |