@@ -200,7 +200,7 @@ discard block |
||
200 | 200 | $request = Saml2AuthnRequest::createNew($authnRequest); |
201 | 201 | $query = $request->buildRequestQuery(); |
202 | 202 | |
203 | - $this->getSession()->visit($request->getDestination().'?'.$query); |
|
203 | + $this->getSession()->visit($request->getDestination() . '?' . $query); |
|
204 | 204 | } |
205 | 205 | |
206 | 206 | /** |
@@ -256,7 +256,7 @@ discard block |
||
256 | 256 | ); |
257 | 257 | $request = Saml2AuthnRequest::createNew($authnRequest); |
258 | 258 | $query = $request->buildRequestQuery(); |
259 | - $this->getSession()->visit($authnRequest->getDestination().'?'.$query); |
|
259 | + $this->getSession()->visit($authnRequest->getDestination() . '?' . $query); |
|
260 | 260 | } |
261 | 261 | |
262 | 262 | /** |
@@ -297,7 +297,7 @@ discard block |
||
297 | 297 | |
298 | 298 | $request = Saml2AuthnRequest::createNew($authnRequest); |
299 | 299 | $query = $request->buildRequestQuery(); |
300 | - $this->getSession()->visit($request->getDestination().'?'.$query); |
|
300 | + $this->getSession()->visit($request->getDestination() . '?' . $query); |
|
301 | 301 | } |
302 | 302 | |
303 | 303 | /** |
@@ -3,7 +3,7 @@ |
||
3 | 3 | use App\Kernel; |
4 | 4 | use Symfony\Component\HttpFoundation\Request; |
5 | 5 | |
6 | -require dirname(__DIR__).'/config/bootstrap.php'; |
|
6 | +require dirname(__DIR__) . '/config/bootstrap.php'; |
|
7 | 7 | |
8 | 8 | $kernel = new Kernel('test', false); |
9 | 9 | $request = Request::createFromGlobals(); |
@@ -66,7 +66,7 @@ |
||
66 | 66 | $this->hostedIdentityProvider = $hostedIdentityProvider; |
67 | 67 | $this->proxyStateHandler = $proxyStateHandler; |
68 | 68 | $this->assertionSigningService = $assertionSigningService; |
69 | - $this->currentTime = is_null($now) ? new DateTime('now', new DateTimeZone('UTC')): $now; |
|
69 | + $this->currentTime = is_null($now) ? new DateTime('now', new DateTimeZone('UTC')) : $now; |
|
70 | 70 | } |
71 | 71 | |
72 | 72 | /** |
@@ -56,7 +56,7 @@ discard block |
||
56 | 56 | ->scalarNode('sso') |
57 | 57 | ->isRequired() |
58 | 58 | ->validate() |
59 | - ->ifTrue(function ($v) { |
|
59 | + ->ifTrue(function($v) { |
|
60 | 60 | return !is_string($v) || strlen($v) === 0; |
61 | 61 | }) |
62 | 62 | ->thenInvalid('SSO route must be a non-empty string') |
@@ -65,7 +65,7 @@ discard block |
||
65 | 65 | ->scalarNode('consume_assertion') |
66 | 66 | ->isRequired() |
67 | 67 | ->validate() |
68 | - ->ifTrue(function ($v) { |
|
68 | + ->ifTrue(function($v) { |
|
69 | 69 | return !is_string($v) || strlen($v) === 0; |
70 | 70 | }) |
71 | 71 | ->thenInvalid('Consume assertion route must be a non-empty string') |
@@ -74,7 +74,7 @@ discard block |
||
74 | 74 | ->scalarNode('metadata') |
75 | 75 | ->isRequired() |
76 | 76 | ->validate() |
77 | - ->ifTrue(function ($v) { |
|
77 | + ->ifTrue(function($v) { |
|
78 | 78 | return !is_string($v) || strlen($v) === 0; |
79 | 79 | }) |
80 | 80 | ->thenInvalid('Metadata route must be a non-empty string') |
@@ -42,7 +42,7 @@ |
||
42 | 42 | $taggedServices = array_keys($taggedServices); |
43 | 43 | |
44 | 44 | foreach ($taggedServices as $id) { |
45 | - $gsspIdMatches= []; |
|
45 | + $gsspIdMatches = []; |
|
46 | 46 | preg_match('/^gssp\.view_config\.(\w+)$/', $id, $gsspIdMatches); |
47 | 47 | if (!is_array($gsspIdMatches)) { |
48 | 48 | throw new InvalidConfigurationException('A manually tagged view config service was named incorrectly.'); |
@@ -74,7 +74,7 @@ |
||
74 | 74 | $this->stateHandler = $stateHandler; |
75 | 75 | $this->assertionSigningService = $assertionSigningService; |
76 | 76 | |
77 | - $this->currentTime = is_null($now) ? new DateTime('now', new DateTimeZone('UTC')): $now; |
|
77 | + $this->currentTime = is_null($now) ? new DateTime('now', new DateTimeZone('UTC')) : $now; |
|
78 | 78 | } |
79 | 79 | |
80 | 80 | /** |
@@ -48,7 +48,7 @@ |
||
48 | 48 | public function getConfigurationOf(string $serviceProvider): ServiceProvider |
49 | 49 | { |
50 | 50 | if (!$this->isConnected($serviceProvider)) { |
51 | - throw UnknownProviderException::create($serviceProvider, (string )$this->allowed); |
|
51 | + throw UnknownProviderException::create($serviceProvider, (string) $this->allowed); |
|
52 | 52 | } |
53 | 53 | |
54 | 54 | return $this->samlEntityService->getServiceProvider($serviceProvider); |
@@ -96,7 +96,7 @@ |
||
96 | 96 | $response = $this->responseProxy->createProxyResponse( |
97 | 97 | $responseContext->reconstituteAssertion(), |
98 | 98 | $responseContext->getDestination(), |
99 | - (string)$grantedLoa |
|
99 | + (string) $grantedLoa |
|
100 | 100 | ); |
101 | 101 | |
102 | 102 | $logger->notice(sprintf( |
@@ -107,7 +107,7 @@ |
||
107 | 107 | 'institution' => $secondFactor->institution, |
108 | 108 | 'authentication_result' => $stateHandler->isSecondFactorVerified() ? 'OK' : 'FAILED', |
109 | 109 | 'resulting_loa' => (string) $loa, |
110 | - 'sso' => $stateHandler->isVerifiedBySsoOn2faCookie() ? 'YES': 'NO', |
|
110 | + 'sso' => $stateHandler->isVerifiedBySsoOn2faCookie() ? 'YES' : 'NO', |
|
111 | 111 | ]; |
112 | 112 | |
113 | 113 | if ($stateHandler->isVerifiedBySsoOn2faCookie()) { |