| @@ -200,7 +200,7 @@ discard block | ||
| 200 | 200 | $request = Saml2AuthnRequest::createNew($authnRequest); | 
| 201 | 201 | $query = $request->buildRequestQuery(); | 
| 202 | 202 | |
| 203 | - $this->getSession()->visit($request->getDestination().'?'.$query); | |
| 203 | + $this->getSession()->visit($request->getDestination() . '?' . $query); | |
| 204 | 204 | } | 
| 205 | 205 | |
| 206 | 206 | /** | 
| @@ -256,7 +256,7 @@ discard block | ||
| 256 | 256 | ); | 
| 257 | 257 | $request = Saml2AuthnRequest::createNew($authnRequest); | 
| 258 | 258 | $query = $request->buildRequestQuery(); | 
| 259 | - $this->getSession()->visit($authnRequest->getDestination().'?'.$query); | |
| 259 | + $this->getSession()->visit($authnRequest->getDestination() . '?' . $query); | |
| 260 | 260 | } | 
| 261 | 261 | |
| 262 | 262 | /** | 
| @@ -297,7 +297,7 @@ discard block | ||
| 297 | 297 | |
| 298 | 298 | $request = Saml2AuthnRequest::createNew($authnRequest); | 
| 299 | 299 | $query = $request->buildRequestQuery(); | 
| 300 | - $this->getSession()->visit($request->getDestination().'?'.$query); | |
| 300 | + $this->getSession()->visit($request->getDestination() . '?' . $query); | |
| 301 | 301 | } | 
| 302 | 302 | |
| 303 | 303 | /** | 
| @@ -3,7 +3,7 @@ | ||
| 3 | 3 | use App\Kernel; | 
| 4 | 4 | use Symfony\Component\HttpFoundation\Request; | 
| 5 | 5 | |
| 6 | -require dirname(__DIR__).'/config/bootstrap.php'; | |
| 6 | +require dirname(__DIR__) . '/config/bootstrap.php'; | |
| 7 | 7 | |
| 8 | 8 |  $kernel = new Kernel('test', false); | 
| 9 | 9 | $request = Request::createFromGlobals(); | 
| @@ -66,7 +66,7 @@ | ||
| 66 | 66 | $this->hostedIdentityProvider = $hostedIdentityProvider; | 
| 67 | 67 | $this->proxyStateHandler = $proxyStateHandler; | 
| 68 | 68 | $this->assertionSigningService = $assertionSigningService; | 
| 69 | -        $this->currentTime = is_null($now) ? new DateTime('now', new DateTimeZone('UTC')): $now; | |
| 69 | +        $this->currentTime = is_null($now) ? new DateTime('now', new DateTimeZone('UTC')) : $now; | |
| 70 | 70 | } | 
| 71 | 71 | |
| 72 | 72 | /** | 
| @@ -56,7 +56,7 @@ discard block | ||
| 56 | 56 |                      ->scalarNode('sso') | 
| 57 | 57 | ->isRequired() | 
| 58 | 58 | ->validate() | 
| 59 | -                            ->ifTrue(function ($v) { | |
| 59 | +                            ->ifTrue(function($v) { | |
| 60 | 60 | return !is_string($v) || strlen($v) === 0; | 
| 61 | 61 | }) | 
| 62 | 62 |                              ->thenInvalid('SSO route must be a non-empty string') | 
| @@ -65,7 +65,7 @@ discard block | ||
| 65 | 65 |                      ->scalarNode('consume_assertion') | 
| 66 | 66 | ->isRequired() | 
| 67 | 67 | ->validate() | 
| 68 | -                            ->ifTrue(function ($v) { | |
| 68 | +                            ->ifTrue(function($v) { | |
| 69 | 69 | return !is_string($v) || strlen($v) === 0; | 
| 70 | 70 | }) | 
| 71 | 71 |                              ->thenInvalid('Consume assertion route must be a non-empty string') | 
| @@ -74,7 +74,7 @@ discard block | ||
| 74 | 74 |                      ->scalarNode('metadata') | 
| 75 | 75 | ->isRequired() | 
| 76 | 76 | ->validate() | 
| 77 | -                            ->ifTrue(function ($v) { | |
| 77 | +                            ->ifTrue(function($v) { | |
| 78 | 78 | return !is_string($v) || strlen($v) === 0; | 
| 79 | 79 | }) | 
| 80 | 80 |                              ->thenInvalid('Metadata route must be a non-empty string') | 
| @@ -42,7 +42,7 @@ | ||
| 42 | 42 | $taggedServices = array_keys($taggedServices); | 
| 43 | 43 | |
| 44 | 44 |          foreach ($taggedServices as $id) { | 
| 45 | - $gsspIdMatches= []; | |
| 45 | + $gsspIdMatches = []; | |
| 46 | 46 |              preg_match('/^gssp\.view_config\.(\w+)$/', $id, $gsspIdMatches); | 
| 47 | 47 |              if (!is_array($gsspIdMatches)) { | 
| 48 | 48 |                  throw new InvalidConfigurationException('A manually tagged view config service was named incorrectly.'); | 
| @@ -74,7 +74,7 @@ | ||
| 74 | 74 | $this->stateHandler = $stateHandler; | 
| 75 | 75 | $this->assertionSigningService = $assertionSigningService; | 
| 76 | 76 | |
| 77 | -        $this->currentTime = is_null($now) ? new DateTime('now', new DateTimeZone('UTC')): $now; | |
| 77 | +        $this->currentTime = is_null($now) ? new DateTime('now', new DateTimeZone('UTC')) : $now; | |
| 78 | 78 | } | 
| 79 | 79 | |
| 80 | 80 | /** | 
| @@ -48,7 +48,7 @@ | ||
| 48 | 48 | public function getConfigurationOf(string $serviceProvider): ServiceProvider | 
| 49 | 49 |      { | 
| 50 | 50 |          if (!$this->isConnected($serviceProvider)) { | 
| 51 | - throw UnknownProviderException::create($serviceProvider, (string )$this->allowed); | |
| 51 | + throw UnknownProviderException::create($serviceProvider, (string) $this->allowed); | |
| 52 | 52 | } | 
| 53 | 53 | |
| 54 | 54 | return $this->samlEntityService->getServiceProvider($serviceProvider); | 
| @@ -96,7 +96,7 @@ | ||
| 96 | 96 | $response = $this->responseProxy->createProxyResponse( | 
| 97 | 97 | $responseContext->reconstituteAssertion(), | 
| 98 | 98 | $responseContext->getDestination(), | 
| 99 | - (string)$grantedLoa | |
| 99 | + (string) $grantedLoa | |
| 100 | 100 | ); | 
| 101 | 101 | |
| 102 | 102 | $logger->notice(sprintf( | 
| @@ -107,7 +107,7 @@ | ||
| 107 | 107 | 'institution' => $secondFactor->institution, | 
| 108 | 108 | 'authentication_result' => $stateHandler->isSecondFactorVerified() ? 'OK' : 'FAILED', | 
| 109 | 109 | 'resulting_loa' => (string) $loa, | 
| 110 | - 'sso' => $stateHandler->isVerifiedBySsoOn2faCookie() ? 'YES': 'NO', | |
| 110 | + 'sso' => $stateHandler->isVerifiedBySsoOn2faCookie() ? 'YES' : 'NO', | |
| 111 | 111 | ]; | 
| 112 | 112 | |
| 113 | 113 |          if ($stateHandler->isVerifiedBySsoOn2faCookie()) { |