@@ -1,9 +1,9 @@ |
||
1 | 1 | <?php |
2 | 2 | use App\Kernel; |
3 | 3 | |
4 | -require_once dirname(__DIR__).'/vendor/autoload_runtime.php'; |
|
5 | -require_once dirname(__DIR__).'/config/bootstrap.php'; |
|
4 | +require_once dirname(__DIR__) . '/vendor/autoload_runtime.php'; |
|
5 | +require_once dirname(__DIR__) . '/config/bootstrap.php'; |
|
6 | 6 | |
7 | -return function (array $context) { |
|
7 | +return function(array $context) { |
|
8 | 8 | return new Kernel($context['APP_ENV'], (bool) $context['APP_DEBUG']); |
9 | 9 | }; |
@@ -34,7 +34,7 @@ |
||
34 | 34 | ->scalarNode('http_basic_realm') |
35 | 35 | ->defaultValue('Secure Gateway API') |
36 | 36 | ->validate() |
37 | - ->ifTrue(function ($realm) { |
|
37 | + ->ifTrue(function($realm) { |
|
38 | 38 | return !is_string($realm) || empty($realm); |
39 | 39 | }) |
40 | 40 | ->thenInvalid("Invalid HTTP Basic realm '%s'. Must be string and non-empty.") |
@@ -140,7 +140,7 @@ |
||
140 | 140 | |
141 | 141 | $httpResponse = (new Response)->setContent( |
142 | 142 | $this->templateEngine->render( |
143 | - '@default/gateway/'.$view.'.html.twig', |
|
143 | + '@default/gateway/' . $view . '.html.twig', |
|
144 | 144 | $parameters |
145 | 145 | ) |
146 | 146 | ); |
@@ -41,7 +41,7 @@ |
||
41 | 41 | * {@inheritdoc} the gelf message is an array which cannot be logged into a single line |
42 | 42 | * By jsonencoding the message we can write it on a single line |
43 | 43 | */ |
44 | - public function format(array|LogRecord $record) |
|
44 | + public function format(array | LogRecord $record) |
|
45 | 45 | { |
46 | 46 | $message = $this->formatter->format($record); |
47 | 47 |
@@ -86,20 +86,20 @@ |
||
86 | 86 | private function isValidResponseStatus(string $status): bool |
87 | 87 | { |
88 | 88 | return in_array($status, [ |
89 | - Constants::STATUS_SUCCESS, // weeee! |
|
90 | - Constants::STATUS_REQUESTER, // Something is wrong with the AuthnRequest |
|
91 | - Constants::STATUS_RESPONDER, // Something went wrong with the Response |
|
92 | - Constants::STATUS_VERSION_MISMATCH, // The version of the request message was incorrect |
|
89 | + Constants::STATUS_SUCCESS, // weeee! |
|
90 | + Constants::STATUS_REQUESTER, // Something is wrong with the AuthnRequest |
|
91 | + Constants::STATUS_RESPONDER, // Something went wrong with the Response |
|
92 | + Constants::STATUS_VERSION_MISMATCH, // The version of the request message was incorrect |
|
93 | 93 | ]); |
94 | 94 | } |
95 | 95 | |
96 | 96 | private function isValidResponseSubStatus($subStatus): bool |
97 | 97 | { |
98 | 98 | return in_array($subStatus, [ |
99 | - Constants::STATUS_AUTHN_FAILED, // failed authentication |
|
99 | + Constants::STATUS_AUTHN_FAILED, // failed authentication |
|
100 | 100 | Constants::STATUS_INVALID_ATTR, |
101 | 101 | Constants::STATUS_INVALID_NAMEID_POLICY, |
102 | - Constants::STATUS_NO_AUTHN_CONTEXT, // insufficient Loa or Loa cannot be met |
|
102 | + Constants::STATUS_NO_AUTHN_CONTEXT, // insufficient Loa or Loa cannot be met |
|
103 | 103 | Constants::STATUS_NO_AVAILABLE_IDP, |
104 | 104 | Constants::STATUS_NO_PASSIVE, |
105 | 105 | Constants::STATUS_NO_SUPPORTED_IDP, |
@@ -236,7 +236,7 @@ |
||
236 | 236 | public function render($view, array $parameters = [], ?Response $response = null): Response |
237 | 237 | { |
238 | 238 | return parent::render( |
239 | - '@default/gateway/'.$view.'.html.twig', |
|
239 | + '@default/gateway/' . $view . '.html.twig', |
|
240 | 240 | $parameters, |
241 | 241 | $response, |
242 | 242 | ); |
@@ -43,7 +43,7 @@ |
||
43 | 43 | /** |
44 | 44 | * @return array View parameters 'title' and 'description' |
45 | 45 | */ |
46 | - protected function getPageTitleAndDescription(\Exception|Throwable $exception): array |
|
46 | + protected function getPageTitleAndDescription(\Exception | Throwable $exception): array |
|
47 | 47 | { |
48 | 48 | $translator = $this->getTranslator(); |
49 | 49 |
@@ -294,7 +294,7 @@ |
||
294 | 294 | $form->addError( |
295 | 295 | new FormError( |
296 | 296 | $this->get('translator') |
297 | - ->trans('gateway.form.gateway_choose_second_factor.unknown_second_factor_type'), |
|
297 | + ->trans('gateway.form.gateway_choose_second_factor.unknown_second_factor_type'), |
|
298 | 298 | ), |
299 | 299 | ); |
300 | 300 | } |
@@ -78,7 +78,7 @@ discard block |
||
78 | 78 | public function selectSecondFactorForVerification( |
79 | 79 | string $authenticationMode, |
80 | 80 | Request $request, |
81 | - ): Response|RedirectResponse { |
|
81 | + ): Response | RedirectResponse { |
|
82 | 82 | $this->supportsAuthenticationMode($authenticationMode); |
83 | 83 | $context = $this->getResponseContext($authenticationMode); |
84 | 84 | $originalRequestId = $context->getInResponseTo(); |
@@ -192,7 +192,7 @@ discard block |
||
192 | 192 | public function chooseSecondFactor( |
193 | 193 | Request $request, |
194 | 194 | string $authenticationMode, |
195 | - ): Response|RedirectResponse|array { |
|
195 | + ): Response | RedirectResponse | array { |
|
196 | 196 | $this->supportsAuthenticationMode($authenticationMode); |
197 | 197 | $context = $this->getResponseContext($authenticationMode); |
198 | 198 | $originalRequestId = $context->getInResponseTo(); |
@@ -479,7 +479,7 @@ discard block |
||
479 | 479 | )] |
480 | 480 | public function verifySmsSecondFactor( |
481 | 481 | Request $request, |
482 | - ): Response|RedirectResponse { |
|
482 | + ): Response | RedirectResponse { |
|
483 | 483 | if (!$request->get('authenticationMode', false)) { |
484 | 484 | throw new RuntimeException('Unable to determine the authentication mode in the SMS verification action'); |
485 | 485 | } |
@@ -559,7 +559,7 @@ discard block |
||
559 | 559 | )] |
560 | 560 | public function verifySmsSecondFactorChallenge( |
561 | 561 | Request $request, |
562 | - ): Response|array { |
|
562 | + ): Response | array { |
|
563 | 563 | if (!$request->get('authenticationMode', false)) { |
564 | 564 | throw new RuntimeException('Unable to determine the authentication mode in the SMS challenge action'); |
565 | 565 | } |
@@ -69,7 +69,7 @@ |
||
69 | 69 | if ($subjectNameIdFromResponse !== $secondFactor->getSecondFactorIdentifier()) { |
70 | 70 | throw new ReceivedInvalidSubjectNameIdException( |
71 | 71 | sprintf( |
72 | - 'The nameID received from the GSSP (%s) did not match the selected second factor (%s). This '. |
|
72 | + 'The nameID received from the GSSP (%s) did not match the selected second factor (%s). This ' . |
|
73 | 73 | 'might be an indication someone is tampering with a GSSP. The authentication was started by %s', |
74 | 74 | $subjectNameIdFromResponse, |
75 | 75 | $secondFactor->getSecondFactorIdentifier(), |