@@ -60,7 +60,7 @@ |
||
60 | 60 | private function sortCollection(): void |
61 | 61 | { |
62 | 62 | // The collection is first sorted by LoA level and then in alphabetic order. |
63 | - uasort($this->collection, function (AvailableTokenInterface $a, AvailableTokenInterface $b): int { |
|
63 | + uasort($this->collection, function(AvailableTokenInterface $a, AvailableTokenInterface $b): int { |
|
64 | 64 | if ($a->getLoaLevel() === $b->getLoaLevel()) { |
65 | 65 | return strcmp((string) $a->getType(), (string) $b->getType()); |
66 | 66 | } |
@@ -57,7 +57,7 @@ |
||
57 | 57 | return $this->maxNumberOfRegistrations; |
58 | 58 | } |
59 | 59 | |
60 | - public function getRegistrationsLeft(): int|float |
|
60 | + public function getRegistrationsLeft(): int | float |
|
61 | 61 | { |
62 | 62 | $total = $this->maxNumberOfRegistrations; |
63 | 63 |
@@ -63,7 +63,7 @@ |
||
63 | 63 | return -10; |
64 | 64 | } |
65 | 65 | |
66 | - public function createAuthenticator(ContainerBuilder $container, string $firewallName, array $config, string $userProviderId): string|array |
|
66 | + public function createAuthenticator(ContainerBuilder $container, string $firewallName, array $config, string $userProviderId): string | array |
|
67 | 67 | { |
68 | 68 | return $config; |
69 | 69 | } |
@@ -96,9 +96,9 @@ |
||
96 | 96 | path: '/second-factor/{state}/{secondFactorId}/revoke', |
97 | 97 | name: 'ss_second_factor_revoke', |
98 | 98 | requirements: ['state' => '^(unverified|verified|vetted)$'], |
99 | - methods: ['GET','POST'] |
|
99 | + methods: ['GET', 'POST'] |
|
100 | 100 | )] |
101 | - public function revoke(Request $request, string $state, string $secondFactorId): array|Response |
|
101 | + public function revoke(Request $request, string $state, string $secondFactorId): array | Response |
|
102 | 102 | { |
103 | 103 | $identity = $this->getIdentity(); |
104 | 104 |
@@ -35,9 +35,9 @@ |
||
35 | 35 | #[Route( |
36 | 36 | path: '/registration/yubikey/prove-possession', |
37 | 37 | name: 'ss_registration_yubikey_prove_possession', |
38 | - methods: ['GET','POST'], |
|
38 | + methods: ['GET', 'POST'], |
|
39 | 39 | )] |
40 | - public function provePossession(Request $request): \Symfony\Component\HttpFoundation\RedirectResponse|array |
|
40 | + public function provePossession(Request $request): \Symfony\Component\HttpFoundation\RedirectResponse | array |
|
41 | 41 | { |
42 | 42 | $this->assertSecondFactorEnabled('yubikey'); |
43 | 43 |
@@ -49,7 +49,7 @@ discard block |
||
49 | 49 | { |
50 | 50 | $configuration = new Configuration(); |
51 | 51 | $config = $this->processConfiguration($configuration, $configs); |
52 | - $loader = new Loader\YamlFileLoader($container, new FileLocator(__DIR__.'/../Resources/config')); |
|
52 | + $loader = new Loader\YamlFileLoader($container, new FileLocator(__DIR__ . '/../Resources/config')); |
|
53 | 53 | $loader->load('services.yml'); |
54 | 54 | |
55 | 55 | foreach ($config['providers'] as $provider => $providerConfiguration) { |
@@ -154,7 +154,7 @@ discard block |
||
154 | 154 | $hostedDefinition = $this->buildHostedEntityDefinition($provider, $configuration, $routes); |
155 | 155 | $container->setDefinition('gssp.provider.' . $provider . '.hosted_entities', $hostedDefinition); |
156 | 156 | |
157 | - $hostedSpDefinition = (new Definition()) |
|
157 | + $hostedSpDefinition = (new Definition()) |
|
158 | 158 | ->setClass(\Surfnet\SamlBundle\Entity\ServiceProvider::class) |
159 | 159 | ->setFactory([ |
160 | 160 | new Reference('gssp.provider.' . $provider . '.hosted_entities'), |
@@ -192,7 +192,7 @@ discard block |
||
192 | 192 | |
193 | 193 | private function createRemoteDefinition(string $provider, array $configuration, ContainerBuilder $container): void |
194 | 194 | { |
195 | - $definition = new Definition(IdentityProvider::class, [ |
|
195 | + $definition = new Definition(IdentityProvider::class, [ |
|
196 | 196 | [ |
197 | 197 | 'entityId' => $configuration['entity_id'], |
198 | 198 | 'ssoUrl' => $configuration['sso_url'], |
@@ -249,14 +249,14 @@ discard block |
||
249 | 249 | |
250 | 250 | private function validateDescriptions($descriptions, $appUrl, string $provider, string $type): void |
251 | 251 | { |
252 | - $regex ="/%%{$type}_link_start%%[a-zA-Z0-9 ]+%%{$type}_link_end%%/"; |
|
252 | + $regex = "/%%{$type}_link_start%%[a-zA-Z0-9 ]+%%{$type}_link_end%%/"; |
|
253 | 253 | foreach ($descriptions as $lang => $description) { |
254 | 254 | if ($appUrl !== false && preg_match($regex, (string) $description) === 0) { |
255 | 255 | throw new InvalidConfigurationException( |
256 | 256 | sprintf( |
257 | 257 | 'You have configured a GSSP provider with app URL\'s but the description is not ' . |
258 | 258 | 'configured correctly yet. Missing "%%%1$s_link_start%%" or "%%%1$s_link_end%%" in ' . |
259 | - 'GSSP description for language "%2$s" in "providers.%3$s.view_config.description" of '. |
|
259 | + 'GSSP description for language "%2$s" in "providers.%3$s.view_config.description" of ' . |
|
260 | 260 | 'samlstepupproviders.yml', |
261 | 261 | $type, |
262 | 262 | $lang, |
@@ -145,7 +145,7 @@ discard block |
||
145 | 145 | #[Route( |
146 | 146 | path: '/second-factor/{secondFactorId}/self-asserted-token-registration/{recoveryTokenId}', |
147 | 147 | name: 'ss_second_factor_self_asserted_tokens_recovery_token', |
148 | - methods: ['GET','POST'] |
|
148 | + methods: ['GET', 'POST'] |
|
149 | 149 | )] |
150 | 150 | public function selfAssertedTokenRegistrationRecoveryToken( |
151 | 151 | Request $request, |
@@ -269,7 +269,7 @@ discard block |
||
269 | 269 | #[Route( |
270 | 270 | path: '/second-factor/{secondFactorId}/self-asserted-token-registration/{recoveryTokenId}/authenticate', |
271 | 271 | name: 'ss_second_factor_self_asserted_tokens_recovery_token_sms', |
272 | - methods: ['GET','POST'] |
|
272 | + methods: ['GET', 'POST'] |
|
273 | 273 | )] |
274 | 274 | public function selfAssertedTokenRecoveryTokenSmsAuthentication( |
275 | 275 | Request $request, |
@@ -342,7 +342,7 @@ discard block |
||
342 | 342 | #[Route( |
343 | 343 | path: '/second-factor/{secondFactorId}/safe-store', |
344 | 344 | name: 'ss_registration_recovery_token_safe_store', |
345 | - methods: ['GET','POST'] |
|
345 | + methods: ['GET', 'POST'] |
|
346 | 346 | )] |
347 | 347 | public function registerCreateRecoveryTokenSafeStore(Request $request, string $secondFactorId): Response |
348 | 348 | { |
@@ -387,7 +387,7 @@ discard block |
||
387 | 387 | #[Route( |
388 | 388 | path: '/second-factor/{secondFactorId}/sms', |
389 | 389 | name: 'ss_registration_recovery_token_sms', |
390 | - methods: ['GET','POST'], |
|
390 | + methods: ['GET', 'POST'], |
|
391 | 391 | )] |
392 | 392 | public function registerRecoveryTokenSms(Request $request, string $secondFactorId): Response |
393 | 393 | { |
@@ -106,7 +106,7 @@ |
||
106 | 106 | |
107 | 107 | public function hasRequestId(): bool |
108 | 108 | { |
109 | - return $this->requestStack->getSession()->has(self::SAML_SESSION_KEY. 'request_id'); |
|
109 | + return $this->requestStack->getSession()->has(self::SAML_SESSION_KEY . 'request_id'); |
|
110 | 110 | } |
111 | 111 | |
112 | 112 | public function clearRequestId(): void |
@@ -52,7 +52,7 @@ |
||
52 | 52 | AuthenticationManagerInterface $authenticationManager, |
53 | 53 | private readonly SamlAuthenticationLogger $authenticationLogger, |
54 | 54 | ) { |
55 | - $this->authenticationManager = $authenticationManager; |
|
55 | + $this->authenticationManager = $authenticationManager; |
|
56 | 56 | } |
57 | 57 | |
58 | 58 | public function process(RequestEvent $event): void |