Test Failed
Push — master ( 2c3e89...a4f29d )
by Florian
04:18 queued 13s
created
src/Authenticator/CookieAuthenticator.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -161,7 +161,7 @@  discard block
 block discarded – undo
161 161
         $usernameField = $this->credentialFields[IdentifierInterface::CREDENTIAL_USERNAME];
162 162
         $passwordField = $this->credentialFields[IdentifierInterface::CREDENTIAL_PASSWORD];
163 163
 
164
-        return $data[$usernameField] . $data[$passwordField];
164
+        return $data[$usernameField].$data[$passwordField];
165 165
     }
166 166
 
167 167
     /**
@@ -179,7 +179,7 @@  discard block
 block discarded – undo
179 179
 
180 180
         $usernameField = $this->credentialFields[IdentifierInterface::CREDENTIAL_USERNAME];
181 181
 
182
-        return (string)json_encode([$data[$usernameField], $hash], JSON_THROW_ON_ERROR);
182
+        return (string) json_encode([$data[$usernameField], $hash], JSON_THROW_ON_ERROR);
183 183
     }
184 184
 
185 185
     /**
Please login to merge, or discard this patch.
src/Authenticator/HttpDigestAuthenticator.php 1 patch
Spacing   +9 added lines, -9 removed lines patch added patch discarded remove patch
@@ -201,7 +201,7 @@  discard block
 block discarded – undo
201 201
     protected function getDigestFromApacheHeaders(?string $digest)
202 202
     {
203 203
         if (empty($digest) && function_exists('apache_request_headers')) {
204
-            $headers = (array)apache_request_headers();
204
+            $headers = (array) apache_request_headers();
205 205
             if (!empty($headers['Authorization']) && strpos($headers['Authorization'], 'Digest ') === 0) {
206 206
                 $digest = substr($headers['Authorization'], 7);
207 207
             }
@@ -248,9 +248,9 @@  discard block
 block discarded – undo
248 248
     public function generateResponseHash(array $digest, string $password, string $method): string
249 249
     {
250 250
         return md5(
251
-            $password .
252
-            ':' . $digest['nonce'] . ':' . $digest['nc'] . ':' . $digest['cnonce'] . ':' . $digest['qop'] . ':' .
253
-            md5($method . ':' . $digest['uri'])
251
+            $password.
252
+            ':'.$digest['nonce'].':'.$digest['nc'].':'.$digest['cnonce'].':'.$digest['qop'].':'.
253
+            md5($method.':'.$digest['uri'])
254 254
         );
255 255
     }
256 256
 
@@ -264,7 +264,7 @@  discard block
 block discarded – undo
264 264
      */
265 265
     public static function generatePasswordHash(string $username, string $password, string $realm): string
266 266
     {
267
-        return md5($username . ':' . $realm . ':' . $password);
267
+        return md5($username.':'.$realm.':'.$password);
268 268
     }
269 269
 
270 270
     /**
@@ -300,7 +300,7 @@  discard block
 block discarded – undo
300 300
             }
301 301
         }
302 302
 
303
-        return ['WWW-Authenticate' => 'Digest ' . implode(',', $opts)];
303
+        return ['WWW-Authenticate' => 'Digest '.implode(',', $opts)];
304 304
     }
305 305
 
306 306
     /**
@@ -311,8 +311,8 @@  discard block
 block discarded – undo
311 311
     protected function generateNonce(): string
312 312
     {
313 313
         $expiryTime = microtime(true) + $this->nonceLifetime;
314
-        $signatureValue = hash_hmac('sha1', $expiryTime . ':' . $this->secret, $this->secret);
315
-        $nonceValue = $expiryTime . ':' . $signatureValue;
314
+        $signatureValue = hash_hmac('sha1', $expiryTime.':'.$this->secret, $this->secret);
315
+        $nonceValue = $expiryTime.':'.$signatureValue;
316 316
 
317 317
         return base64_encode($nonceValue);
318 318
     }
@@ -338,7 +338,7 @@  discard block
 block discarded – undo
338 338
             return false;
339 339
         }
340 340
         $secret = $this->secret;
341
-        $check = hash_hmac('sha1', $expires . ':' . $secret, $secret);
341
+        $check = hash_hmac('sha1', $expires.':'.$secret, $secret);
342 342
 
343 343
         return hash_equals($check, $checksum);
344 344
     }
Please login to merge, or discard this patch.
src/Identifier/Resolver/PdoResolver.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -59,7 +59,7 @@  discard block
 block discarded – undo
59 59
 
60 60
         $error = $this->pdo->errorInfo();
61 61
         if ($error[0] !== '00000') {
62
-            throw new PDOException($error[2], (int)$error[0]);
62
+            throw new PDOException($error[2], (int) $error[0]);
63 63
         }
64 64
 
65 65
         if (!$statement instanceof PDOStatement) {
@@ -79,7 +79,7 @@  discard block
 block discarded – undo
79 79
     {
80 80
         foreach ($conditions as $key => $value) {
81 81
             unset($conditions[$key]);
82
-            $conditions[':' . $key] = $value;
82
+            $conditions[':'.$key] = $value;
83 83
         }
84 84
 
85 85
         $statement = $this->buildStatement();
Please login to merge, or discard this patch.
config/composer_phive.php 1 patch
Spacing   +7 added lines, -7 removed lines patch added patch discarded remove patch
@@ -9,16 +9,16 @@  discard block
 block discarded – undo
9 9
 $phiveUrl = 'https://phar.io/releases/phive.phar';
10 10
 $phiveKeyUrl = 'https://phar.io/releases/phive.phar.asc';
11 11
 
12
-if (!file_exists('.' . $ds . 'phive.phar')) {
13
-    echo 'Downloading Phive (' . $phiveUrl . ')...' . PHP_EOL;
14
-    file_put_contents('.' . $ds . 'phive.phar', file_get_contents(
12
+if (!file_exists('.'.$ds.'phive.phar')) {
13
+    echo 'Downloading Phive ('.$phiveUrl.')...'.PHP_EOL;
14
+    file_put_contents('.'.$ds.'phive.phar', file_get_contents(
15 15
         $phiveUrl
16 16
     ));
17 17
 }
18 18
 
19
-if (!file_exists('.' . $ds . 'phive.phar.asc')) {
20
-    echo 'Downloading Phive Key (' . $phiveKeyUrl . ')...' . PHP_EOL;
21
-    file_put_contents('.' . $ds . 'phive.phar.asc', file_get_contents(
19
+if (!file_exists('.'.$ds.'phive.phar.asc')) {
20
+    echo 'Downloading Phive Key ('.$phiveKeyUrl.')...'.PHP_EOL;
21
+    file_put_contents('.'.$ds.'phive.phar.asc', file_get_contents(
22 22
         $phiveUrl
23 23
     ));
24 24
 } else {
@@ -41,5 +41,5 @@  discard block
 block discarded – undo
41 41
 $keys = implode(',', $keys);
42 42
 
43 43
 $output = '';
44
-exec('php .' . $ds . 'phive.phar install --target ./bin --trust-gpg-keys ' . $keys . ' --force-accept-unsigned', $output);
44
+exec('php .'.$ds.'phive.phar install --target ./bin --trust-gpg-keys '.$keys.' --force-accept-unsigned', $output);
45 45
 echo implode(PHP_EOL, $output);
Please login to merge, or discard this patch.
src/Authenticator/JwtAuthenticator.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -155,7 +155,7 @@  discard block
 block discarded – undo
155 155
             return new Result(null, Result::FAILURE_CREDENTIALS_INVALID);
156 156
         }
157 157
 
158
-        $result = json_decode((string)json_encode($result), true);
158
+        $result = json_decode((string) json_encode($result), true);
159 159
 
160 160
         $key = IdentifierInterface::CREDENTIAL_JWT_SUBJECT;
161 161
         if (empty($result[$key])) {
@@ -213,7 +213,7 @@  discard block
 block discarded – undo
213 213
     {
214 214
         return JWT::decode(
215 215
             $token,
216
-            new Key((string)$this->secretKey, $this->algorithms[0])
216
+            new Key((string) $this->secretKey, $this->algorithms[0])
217 217
         );
218 218
     }
219 219
 }
Please login to merge, or discard this patch.