@@ -59,7 +59,7 @@ discard block |
||
59 | 59 | |
60 | 60 | $error = $this->pdo->errorInfo(); |
61 | 61 | if ($error[0] !== '00000') { |
62 | - throw new PDOException($error[2], (int)$error[0]); |
|
62 | + throw new PDOException($error[2], (int) $error[0]); |
|
63 | 63 | } |
64 | 64 | |
65 | 65 | if (!$statement instanceof PDOStatement) { |
@@ -79,7 +79,7 @@ discard block |
||
79 | 79 | { |
80 | 80 | foreach ($conditions as $key => $value) { |
81 | 81 | unset($conditions[$key]); |
82 | - $conditions[':' . $key] = $value; |
|
82 | + $conditions[':'.$key] = $value; |
|
83 | 83 | } |
84 | 84 | |
85 | 85 | $statement = $this->buildStatement(); |
@@ -9,16 +9,16 @@ discard block |
||
9 | 9 | $phiveUrl = 'https://phar.io/releases/phive.phar'; |
10 | 10 | $phiveKeyUrl = 'https://phar.io/releases/phive.phar.asc'; |
11 | 11 | |
12 | -if (!file_exists('.' . $ds . 'phive.phar')) { |
|
13 | - echo 'Downloading Phive (' . $phiveUrl . ')...' . PHP_EOL; |
|
14 | - file_put_contents('.' . $ds . 'phive.phar', file_get_contents( |
|
12 | +if (!file_exists('.'.$ds.'phive.phar')) { |
|
13 | + echo 'Downloading Phive ('.$phiveUrl.')...'.PHP_EOL; |
|
14 | + file_put_contents('.'.$ds.'phive.phar', file_get_contents( |
|
15 | 15 | $phiveUrl |
16 | 16 | )); |
17 | 17 | } |
18 | 18 | |
19 | -if (!file_exists('.' . $ds . 'phive.phar.asc')) { |
|
20 | - echo 'Downloading Phive Key (' . $phiveKeyUrl . ')...' . PHP_EOL; |
|
21 | - file_put_contents('.' . $ds . 'phive.phar.asc', file_get_contents( |
|
19 | +if (!file_exists('.'.$ds.'phive.phar.asc')) { |
|
20 | + echo 'Downloading Phive Key ('.$phiveKeyUrl.')...'.PHP_EOL; |
|
21 | + file_put_contents('.'.$ds.'phive.phar.asc', file_get_contents( |
|
22 | 22 | $phiveUrl |
23 | 23 | )); |
24 | 24 | } else { |
@@ -41,5 +41,5 @@ discard block |
||
41 | 41 | $keys = implode(',', $keys); |
42 | 42 | |
43 | 43 | $output = ''; |
44 | -exec('php .' . $ds . 'phive.phar install --target ./bin --trust-gpg-keys ' . $keys . ' --force-accept-unsigned', $output); |
|
44 | +exec('php .'.$ds.'phive.phar install --target ./bin --trust-gpg-keys '.$keys.' --force-accept-unsigned', $output); |
|
45 | 45 | echo implode(PHP_EOL, $output); |
@@ -155,7 +155,7 @@ discard block |
||
155 | 155 | return new Result(null, Result::FAILURE_CREDENTIALS_INVALID); |
156 | 156 | } |
157 | 157 | |
158 | - $result = json_decode((string)json_encode($result), true); |
|
158 | + $result = json_decode((string) json_encode($result), true); |
|
159 | 159 | |
160 | 160 | $key = IdentifierInterface::CREDENTIAL_JWT_SUBJECT; |
161 | 161 | if (empty($result[$key])) { |
@@ -213,7 +213,7 @@ discard block |
||
213 | 213 | { |
214 | 214 | return JWT::decode( |
215 | 215 | $token, |
216 | - new Key((string)$this->secretKey, $this->algorithms[0]) |
|
216 | + new Key((string) $this->secretKey, $this->algorithms[0]) |
|
217 | 217 | ); |
218 | 218 | } |
219 | 219 | } |