@@ -243,7 +243,7 @@ |
||
243 | 243 | * @method \Psr\Http\Message\ResponseInterface urlsLookupGroup(array $params = ['url']) |
244 | 244 | * @method \Psr\Http\Message\ResponseInterface urlsLookupUser(array $params = ['url']) |
245 | 245 | */ |
246 | -class Flickr extends OAuth1Provider{ |
|
246 | +class Flickr extends OAuth1Provider { |
|
247 | 247 | |
248 | 248 | public const PERM_READ = 'read'; |
249 | 249 | public const PERM_WRITE = 'write'; |
@@ -17,7 +17,7 @@ |
||
17 | 17 | /** |
18 | 18 | * @method \Psr\Http\Message\ResponseInterface me() |
19 | 19 | */ |
20 | -class MicrosoftGraph extends AzureActiveDirectory{ |
|
20 | +class MicrosoftGraph extends AzureActiveDirectory { |
|
21 | 21 | |
22 | 22 | public const SCOPE_USER_READ = 'User.Read'; |
23 | 23 | public const SCOPE_USER_READBASIC_ALL = 'User.ReadBasic.All'; |
@@ -14,22 +14,22 @@ |
||
14 | 14 | |
15 | 15 | use function function_exists, hash, realpath, str_replace, strlen, substr; |
16 | 16 | |
17 | -if(!function_exists(__NAMESPACE__.'\\getProviders')){ |
|
17 | +if (!function_exists(__NAMESPACE__.'\\getProviders')) { |
|
18 | 18 | |
19 | 19 | function getProviders():array{ |
20 | 20 | $providers = []; |
21 | 21 | |
22 | 22 | /** @var \SplFileInfo $e */ |
23 | - foreach(new RecursiveIteratorIterator(new RecursiveDirectoryIterator(__DIR__, FilesystemIterator::SKIP_DOTS)) as $e){ |
|
23 | + foreach (new RecursiveIteratorIterator(new RecursiveDirectoryIterator(__DIR__, FilesystemIterator::SKIP_DOTS)) as $e) { |
|
24 | 24 | |
25 | - if($e->getExtension() !== 'php' || realpath($e->getPath()) === __DIR__){ |
|
25 | + if ($e->getExtension() !== 'php' || realpath($e->getPath()) === __DIR__) { |
|
26 | 26 | continue; |
27 | 27 | } |
28 | 28 | |
29 | 29 | $class = __NAMESPACE__.str_replace('/', '\\', substr($e->getPathname(), strlen(__DIR__), -4)); |
30 | 30 | $r = new ReflectionClass($class); |
31 | 31 | |
32 | - if(!$r->implementsInterface(OAuthInterface::class) || $r->isAbstract()){ |
|
32 | + if (!$r->implementsInterface(OAuthInterface::class) || $r->isAbstract()) { |
|
33 | 33 | continue; |
34 | 34 | } |
35 | 35 |
@@ -164,11 +164,9 @@ |
||
164 | 164 | |
165 | 165 | if(!$data || !is_array($data)){ |
166 | 166 | throw new ProviderException('unable to parse token response'); |
167 | - } |
|
168 | - elseif(isset($data['error'])){ |
|
167 | + } elseif(isset($data['error'])){ |
|
169 | 168 | throw new ProviderException('error retrieving access token: '.$data['message']); |
170 | - } |
|
171 | - elseif(!isset($data['session']['key'])){ |
|
169 | + } elseif(!isset($data['session']['key'])){ |
|
172 | 170 | throw new ProviderException('token missing'); |
173 | 171 | } |
174 | 172 |
@@ -75,7 +75,7 @@ discard block |
||
75 | 75 | * @method \Psr\Http\Message\ResponseInterface userGetWeeklyChartList(array $params = ['user']) |
76 | 76 | * @method \Psr\Http\Message\ResponseInterface userGetWeeklyTrackChart(array $params = ['from', 'to', 'user']) |
77 | 77 | */ |
78 | -class LastFM extends OAuthProvider{ |
|
78 | +class LastFM extends OAuthProvider { |
|
79 | 79 | |
80 | 80 | public const PERIOD_OVERALL = 'overall'; |
81 | 81 | public const PERIOD_7DAY = '7day'; |
@@ -93,7 +93,7 @@ discard block |
||
93 | 93 | self::PERIOD_12MONTH, |
94 | 94 | ]; |
95 | 95 | |
96 | - protected string $authURL = 'https://www.last.fm/api/auth'; |
|
96 | + protected string $authURL = 'https://www.last.fm/api/auth'; |
|
97 | 97 | protected ?string $apiURL = 'https://ws.audioscrobbler.com/2.0'; |
98 | 98 | protected ?string $userRevokeURL = 'https://www.last.fm/settings/applications'; |
99 | 99 | protected ?string $endpointMap = LastFMEndpoints::class; |
@@ -122,8 +122,8 @@ discard block |
||
122 | 122 | |
123 | 123 | $signature = ''; |
124 | 124 | |
125 | - foreach($params as $k => $v){ |
|
126 | - if(!in_array($k, ['format', 'callback'])){ |
|
125 | + foreach ($params as $k => $v) { |
|
126 | + if (!in_array($k, ['format', 'callback'])) { |
|
127 | 127 | $signature .= $k.$v; |
128 | 128 | } |
129 | 129 | } |
@@ -162,13 +162,13 @@ discard block |
||
162 | 162 | protected function parseTokenResponse(ResponseInterface $response):AccessToken{ |
163 | 163 | $data = get_json($response, true); |
164 | 164 | |
165 | - if(!$data || !is_array($data)){ |
|
165 | + if (!$data || !is_array($data)) { |
|
166 | 166 | throw new ProviderException('unable to parse token response'); |
167 | 167 | } |
168 | - elseif(isset($data['error'])){ |
|
168 | + elseif (isset($data['error'])) { |
|
169 | 169 | throw new ProviderException('error retrieving access token: '.$data['message']); |
170 | 170 | } |
171 | - elseif(!isset($data['session']['key'])){ |
|
171 | + elseif (!isset($data['session']['key'])) { |
|
172 | 172 | throw new ProviderException('token missing'); |
173 | 173 | } |
174 | 174 | |
@@ -208,7 +208,7 @@ discard block |
||
208 | 208 | |
209 | 209 | $params['api_sig'] = $this->getSignature($params); |
210 | 210 | |
211 | - if($method === 'POST'){ |
|
211 | + if ($method === 'POST') { |
|
212 | 212 | $body = $params; |
213 | 213 | $params = []; |
214 | 214 | } |
@@ -216,11 +216,11 @@ discard block |
||
216 | 216 | /** @phan-suppress-next-line PhanTypeMismatchArgumentNullable */ |
217 | 217 | $request = $this->requestFactory->createRequest($method, $this->mergeQuery($this->apiURL, $params)); |
218 | 218 | |
219 | - foreach(array_merge($this->apiHeaders, $headers ?? []) as $header => $value){ |
|
219 | + foreach (array_merge($this->apiHeaders, $headers ?? []) as $header => $value) { |
|
220 | 220 | $request = $request->withAddedHeader($header, $value); |
221 | 221 | } |
222 | 222 | |
223 | - if($method === 'POST'){ |
|
223 | + if ($method === 'POST') { |
|
224 | 224 | $request = $request->withHeader('Content-Type', 'application/x-www-form-urlencoded'); |
225 | 225 | $body = $this->streamFactory->createStream($this->buildQuery($body, PHP_QUERY_RFC1738)); |
226 | 226 | $request = $request->withBody($body); |
@@ -18,7 +18,7 @@ |
||
18 | 18 | |
19 | 19 | /** |
20 | 20 | */ |
21 | -abstract class AzureActiveDirectory extends OAuth2Provider implements CSRFToken{ |
|
21 | +abstract class AzureActiveDirectory extends OAuth2Provider implements CSRFToken { |
|
22 | 22 | |
23 | 23 | public const SCOPE_OPENID = 'openid'; |
24 | 24 | public const SCOPE_OPENID_EMAIL = 'email'; |
@@ -16,7 +16,7 @@ |
||
16 | 16 | |
17 | 17 | namespace chillerlan\OAuth\Providers\Amazon; |
18 | 18 | |
19 | -use chillerlan\OAuth\Core\{CSRFToken, OAuth2Provider, TokenRefresh,}; |
|
19 | +use chillerlan\OAuth\Core\{CSRFToken, OAuth2Provider, TokenRefresh, }; |
|
20 | 20 | |
21 | 21 | /** |
22 | 22 | * @method \Psr\Http\Message\ResponseInterface userProfile() |
@@ -21,7 +21,7 @@ |
||
21 | 21 | /** |
22 | 22 | * @method \Psr\Http\Message\ResponseInterface me() |
23 | 23 | */ |
24 | -class Google extends OAuth2Provider implements CSRFToken{ |
|
24 | +class Google extends OAuth2Provider implements CSRFToken { |
|
25 | 25 | |
26 | 26 | public const SCOPE_EMAIL = 'email'; |
27 | 27 | public const SCOPE_PROFILE = 'profile'; |
@@ -20,7 +20,7 @@ |
||
20 | 20 | /** |
21 | 21 | * @method \Psr\Http\Message\ResponseInterface me() |
22 | 22 | */ |
23 | -class Gitter extends OAuth2Provider implements CSRFToken{ |
|
23 | +class Gitter extends OAuth2Provider implements CSRFToken { |
|
24 | 24 | |
25 | 25 | public const SCOPE_FLOW = 'flow'; |
26 | 26 | public const SCOPE_PRIVATE = 'private'; |
@@ -50,7 +50,7 @@ discard block |
||
50 | 50 | OAuthStorageInterface $storage, |
51 | 51 | SettingsContainerInterface $options, |
52 | 52 | LoggerInterface $logger = null |
53 | - ){ |
|
53 | + ) { |
|
54 | 54 | parent::__construct($http, $storage, $options, $logger); |
55 | 55 | |
56 | 56 | $this->setRegion('eu'); |
@@ -65,7 +65,7 @@ discard block |
||
65 | 65 | public function setRegion(string $region):BattleNet{ |
66 | 66 | $region = strtolower($region); |
67 | 67 | |
68 | - if(!in_array($region, ['apac', 'cn', 'eu', 'us'], true)){ |
|
68 | + if (!in_array($region, ['apac', 'cn', 'eu', 'us'], true)) { |
|
69 | 69 | throw new ProviderException('invalid region: '.$region); |
70 | 70 | } |
71 | 71 |