Test Failed
Branch ci (e543e4)
by Florian
03:15
created
config/composer_phive.php 1 patch
Spacing   +7 added lines, -7 removed lines patch added patch discarded remove patch
@@ -9,16 +9,16 @@  discard block
 block discarded – undo
9 9
 $phiveUrl = 'https://phar.io/releases/phive.phar';
10 10
 $phiveKeyUrl = 'https://phar.io/releases/phive.phar.asc';
11 11
 
12
-if (!file_exists('.' . $ds . 'phive.phar')) {
13
-    echo 'Downloading Phive (' . $phiveUrl . ')...' . PHP_EOL;
14
-    file_put_contents('.' . $ds . 'phive.phar', file_get_contents(
12
+if (!file_exists('.'.$ds.'phive.phar')) {
13
+    echo 'Downloading Phive ('.$phiveUrl.')...'.PHP_EOL;
14
+    file_put_contents('.'.$ds.'phive.phar', file_get_contents(
15 15
         $phiveUrl
16 16
     ));
17 17
 }
18 18
 
19
-if (!file_exists('.' . $ds . 'phive.phar.asc')) {
20
-    echo 'Downloading Phive Key (' . $phiveKeyUrl . ')...' . PHP_EOL;
21
-    file_put_contents('.' . $ds . 'phive.phar.asc', file_get_contents(
19
+if (!file_exists('.'.$ds.'phive.phar.asc')) {
20
+    echo 'Downloading Phive Key ('.$phiveKeyUrl.')...'.PHP_EOL;
21
+    file_put_contents('.'.$ds.'phive.phar.asc', file_get_contents(
22 22
         $phiveUrl
23 23
     ));
24 24
 } else {
@@ -41,5 +41,5 @@  discard block
 block discarded – undo
41 41
 $keys = implode(',', $keys);
42 42
 
43 43
 $output = '';
44
-exec('php .' . $ds . 'phive.phar install --target ./bin --trust-gpg-keys ' . $keys . ' --force-accept-unsigned', $output);
44
+exec('php .'.$ds.'phive.phar install --target ./bin --trust-gpg-keys '.$keys.' --force-accept-unsigned', $output);
45 45
 echo implode(PHP_EOL, $output);
Please login to merge, or discard this patch.
src/Authenticator/JwtAuthenticator.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -155,7 +155,7 @@  discard block
 block discarded – undo
155 155
             return new Result(null, Result::FAILURE_CREDENTIALS_INVALID);
156 156
         }
157 157
 
158
-        $result = json_decode((string)json_encode($result), true);
158
+        $result = json_decode((string) json_encode($result), true);
159 159
 
160 160
         $key = IdentifierInterface::CREDENTIAL_JWT_SUBJECT;
161 161
         if (empty($result[$key])) {
@@ -213,7 +213,7 @@  discard block
 block discarded – undo
213 213
     {
214 214
         return JWT::decode(
215 215
             $token,
216
-            new Key((string)$this->secretKey, $this->algorithms[0])
216
+            new Key((string) $this->secretKey, $this->algorithms[0])
217 217
         );
218 218
     }
219 219
 }
Please login to merge, or discard this patch.
src/Authenticator/HttpDigestAuthenticator.php 1 patch
Spacing   +9 added lines, -9 removed lines patch added patch discarded remove patch
@@ -202,7 +202,7 @@  discard block
 block discarded – undo
202 202
     protected function getDigestFromApacheHeaders(?string $digest)
203 203
     {
204 204
         if (empty($digest) && function_exists('apache_request_headers')) {
205
-            $headers = (array)apache_request_headers();
205
+            $headers = (array) apache_request_headers();
206 206
             if (!empty($headers['Authorization']) && strpos($headers['Authorization'], 'Digest ') === 0) {
207 207
                 $digest = substr($headers['Authorization'], 7);
208 208
             }
@@ -249,9 +249,9 @@  discard block
 block discarded – undo
249 249
     public function generateResponseHash(array $digest, string $password, string $method): string
250 250
     {
251 251
         return md5(
252
-            $password .
253
-            ':' . $digest['nonce'] . ':' . $digest['nc'] . ':' . $digest['cnonce'] . ':' . $digest['qop'] . ':' .
254
-            md5($method . ':' . $digest['uri'])
252
+            $password.
253
+            ':'.$digest['nonce'].':'.$digest['nc'].':'.$digest['cnonce'].':'.$digest['qop'].':'.
254
+            md5($method.':'.$digest['uri'])
255 255
         );
256 256
     }
257 257
 
@@ -265,7 +265,7 @@  discard block
 block discarded – undo
265 265
      */
266 266
     public static function generatePasswordHash(string $username, string $password, string $realm): string
267 267
     {
268
-        return md5($username . ':' . $realm . ':' . $password);
268
+        return md5($username.':'.$realm.':'.$password);
269 269
     }
270 270
 
271 271
     /**
@@ -315,7 +315,7 @@  discard block
 block discarded – undo
315 315
             $formattedOptions[] = $this->formatOptions($key, $value);
316 316
         }
317 317
 
318
-        return ['WWW-Authenticate' => 'Digest ' . implode(',', $formattedOptions)];
318
+        return ['WWW-Authenticate' => 'Digest '.implode(',', $formattedOptions)];
319 319
     }
320 320
 
321 321
     /**
@@ -326,8 +326,8 @@  discard block
 block discarded – undo
326 326
     protected function generateNonce(): string
327 327
     {
328 328
         $expiryTime = microtime(true) + $this->nonceLifetime;
329
-        $signatureValue = hash_hmac('sha1', $expiryTime . ':' . $this->secret, $this->secret);
330
-        $nonceValue = $expiryTime . ':' . $signatureValue;
329
+        $signatureValue = hash_hmac('sha1', $expiryTime.':'.$this->secret, $this->secret);
330
+        $nonceValue = $expiryTime.':'.$signatureValue;
331 331
 
332 332
         return base64_encode($nonceValue);
333 333
     }
@@ -353,7 +353,7 @@  discard block
 block discarded – undo
353 353
             return false;
354 354
         }
355 355
         $secret = $this->secret;
356
-        $check = hash_hmac('sha1', $expires . ':' . $secret, $secret);
356
+        $check = hash_hmac('sha1', $expires.':'.$secret, $secret);
357 357
 
358 358
         return hash_equals($check, $checksum);
359 359
     }
Please login to merge, or discard this patch.