@@ -21,7 +21,7 @@ |
||
| 21 | 21 | * @method \Psr\Http\Message\ResponseInterface getUser(string $username) |
| 22 | 22 | * @method \Psr\Http\Message\ResponseInterface me() |
| 23 | 23 | */ |
| 24 | -class GitHub extends OAuth2Provider implements CSRFToken{ |
|
| 24 | +class GitHub extends OAuth2Provider implements CSRFToken { |
|
| 25 | 25 | |
| 26 | 26 | const SCOPE_USER = 'user'; |
| 27 | 27 | const SCOPE_USER_EMAIL = 'user:email'; |
@@ -243,7 +243,7 @@ |
||
| 243 | 243 | * @method \Psr\Http\Message\ResponseInterface urlsLookupGroup(array $params = ['url']) |
| 244 | 244 | * @method \Psr\Http\Message\ResponseInterface urlsLookupUser(array $params = ['url']) |
| 245 | 245 | */ |
| 246 | -class Flickr extends OAuth1Provider{ |
|
| 246 | +class Flickr extends OAuth1Provider { |
|
| 247 | 247 | |
| 248 | 248 | public const PERM_READ = 'read'; |
| 249 | 249 | public const PERM_WRITE = 'write'; |
@@ -132,7 +132,7 @@ |
||
| 132 | 132 | * @method \Psr\Http\Message\ResponseInterface usersSuggestionsSlugMembers(string $slug, array $params = ['lang']) |
| 133 | 133 | * @method \Psr\Http\Message\ResponseInterface verifyCredentials(array $params = ['include_entities', 'skip_status']) |
| 134 | 134 | */ |
| 135 | -class TwitterCC extends OAuth2Provider implements ClientCredentials{ |
|
| 135 | +class TwitterCC extends OAuth2Provider implements ClientCredentials { |
|
| 136 | 136 | |
| 137 | 137 | protected const AUTH_ERRMSG = 'TwitterCC only supports Client Credentials Grant, use the Twitter OAuth1 class for authentication instead.'; |
| 138 | 138 | |
@@ -17,7 +17,7 @@ |
||
| 17 | 17 | /** |
| 18 | 18 | * @method \Psr\Http\Message\ResponseInterface me() |
| 19 | 19 | */ |
| 20 | -class MicrosoftGraph extends AzureActiveDirectory{ |
|
| 20 | +class MicrosoftGraph extends AzureActiveDirectory { |
|
| 21 | 21 | |
| 22 | 22 | public const SCOPE_USER_READ = 'User.Read'; |
| 23 | 23 | public const SCOPE_USER_READBASIC_ALL = 'User.ReadBasic.All'; |
@@ -14,22 +14,22 @@ |
||
| 14 | 14 | |
| 15 | 15 | use function function_exists, hash, realpath, str_replace, strlen, substr; |
| 16 | 16 | |
| 17 | -if(!function_exists(__NAMESPACE__.'\\getProviders')){ |
|
| 17 | +if (!function_exists(__NAMESPACE__.'\\getProviders')) { |
|
| 18 | 18 | |
| 19 | 19 | function getProviders():array{ |
| 20 | 20 | $providers = []; |
| 21 | 21 | |
| 22 | 22 | /** @var \SplFileInfo $e */ |
| 23 | - foreach(new RecursiveIteratorIterator(new RecursiveDirectoryIterator(__DIR__, FilesystemIterator::SKIP_DOTS)) as $e){ |
|
| 23 | + foreach (new RecursiveIteratorIterator(new RecursiveDirectoryIterator(__DIR__, FilesystemIterator::SKIP_DOTS)) as $e) { |
|
| 24 | 24 | |
| 25 | - if($e->getExtension() !== 'php' || realpath($e->getPath()) === __DIR__){ |
|
| 25 | + if ($e->getExtension() !== 'php' || realpath($e->getPath()) === __DIR__) { |
|
| 26 | 26 | continue; |
| 27 | 27 | } |
| 28 | 28 | |
| 29 | 29 | $class = __NAMESPACE__.str_replace('/', '\\', substr($e->getPathname(), strlen(__DIR__), -4)); |
| 30 | 30 | $r = new ReflectionClass($class); |
| 31 | 31 | |
| 32 | - if(!$r->implementsInterface(OAuthInterface::class) || $r->isAbstract()){ |
|
| 32 | + if (!$r->implementsInterface(OAuthInterface::class) || $r->isAbstract()) { |
|
| 33 | 33 | continue; |
| 34 | 34 | } |
| 35 | 35 | |
@@ -232,7 +232,7 @@ discard block |
||
| 232 | 232 | * @method \Psr\Http\Message\ResponseInterface wvwUpgrades(array $params = ['lang']) |
| 233 | 233 | * @method \Psr\Http\Message\ResponseInterface wvwUpgradesId(string $id, array $params = ['lang']) |
| 234 | 234 | */ |
| 235 | -class GuildWars2 extends OAuth2Provider{ |
|
| 235 | +class GuildWars2 extends OAuth2Provider { |
|
| 236 | 236 | |
| 237 | 237 | public const SCOPE_ACCOUNT = 'account'; |
| 238 | 238 | public const SCOPE_INVENTORIES = 'inventories'; |
@@ -262,7 +262,7 @@ discard block |
||
| 262 | 262 | */ |
| 263 | 263 | public function storeGW2Token(string $access_token):AccessToken{ |
| 264 | 264 | |
| 265 | - if(!preg_match('/^[a-f\d\-]{72}$/i', $access_token)){ |
|
| 265 | + if (!preg_match('/^[a-f\d\-]{72}$/i', $access_token)) { |
|
| 266 | 266 | throw new ProviderException('invalid token'); |
| 267 | 267 | } |
| 268 | 268 | |
@@ -272,7 +272,7 @@ discard block |
||
| 272 | 272 | |
| 273 | 273 | $tokeninfo = get_json($this->http->sendRequest($request)); |
| 274 | 274 | |
| 275 | - if(isset($tokeninfo->id) && \strpos($access_token, $tokeninfo->id) === 0){ |
|
| 275 | + if (isset($tokeninfo->id) && \strpos($access_token, $tokeninfo->id) === 0) { |
|
| 276 | 276 | |
| 277 | 277 | $token = new AccessToken([ |
| 278 | 278 | 'provider' => $this->serviceName, |
@@ -18,7 +18,7 @@ |
||
| 18 | 18 | |
| 19 | 19 | /** |
| 20 | 20 | */ |
| 21 | -abstract class AzureActiveDirectory extends OAuth2Provider implements CSRFToken{ |
|
| 21 | +abstract class AzureActiveDirectory extends OAuth2Provider implements CSRFToken { |
|
| 22 | 22 | |
| 23 | 23 | public const SCOPE_OPENID = 'openid'; |
| 24 | 24 | public const SCOPE_OPENID_EMAIL = 'email'; |
@@ -16,7 +16,7 @@ |
||
| 16 | 16 | |
| 17 | 17 | namespace chillerlan\OAuth\Providers\Amazon; |
| 18 | 18 | |
| 19 | -use chillerlan\OAuth\Core\{CSRFToken, OAuth2Provider, TokenRefresh,}; |
|
| 19 | +use chillerlan\OAuth\Core\{CSRFToken, OAuth2Provider, TokenRefresh, }; |
|
| 20 | 20 | |
| 21 | 21 | /** |
| 22 | 22 | * @method \Psr\Http\Message\ResponseInterface userProfile() |
@@ -21,7 +21,7 @@ |
||
| 21 | 21 | /** |
| 22 | 22 | * @method \Psr\Http\Message\ResponseInterface me() |
| 23 | 23 | */ |
| 24 | -class Google extends OAuth2Provider implements CSRFToken{ |
|
| 24 | +class Google extends OAuth2Provider implements CSRFToken { |
|
| 25 | 25 | |
| 26 | 26 | public const SCOPE_EMAIL = 'email'; |
| 27 | 27 | public const SCOPE_PROFILE = 'profile'; |