@@ -44,7 +44,7 @@ discard block |
||
| 44 | 44 | { |
| 45 | 45 | $service->get( |
| 46 | 46 | '/common_names/disabled', |
| 47 | - function (Request $request, TokenInfo $tokenInfo) { |
|
| 47 | + function(Request $request, TokenInfo $tokenInfo) { |
|
| 48 | 48 | $tokenInfo->getScope()->requireScope(['admin', 'portal']); |
| 49 | 49 | |
| 50 | 50 | return new ApiResponse('common_names', $this->commonNames->getDisabled()); |
@@ -53,7 +53,7 @@ discard block |
||
| 53 | 53 | |
| 54 | 54 | $service->get( |
| 55 | 55 | '/common_names/disabled/:commonName', |
| 56 | - function ($commonName, Request $request, TokenInfo $tokenInfo) { |
|
| 56 | + function($commonName, Request $request, TokenInfo $tokenInfo) { |
|
| 57 | 57 | $tokenInfo->getScope()->requireScope(['admin', 'portal']); |
| 58 | 58 | InputValidation::commonName($commonName); |
| 59 | 59 | |
@@ -63,7 +63,7 @@ discard block |
||
| 63 | 63 | |
| 64 | 64 | $service->post( |
| 65 | 65 | '/common_names/disabled/:commonName', |
| 66 | - function ($commonName, Request $request, TokenInfo $tokenInfo) { |
|
| 66 | + function($commonName, Request $request, TokenInfo $tokenInfo) { |
|
| 67 | 67 | $tokenInfo->getScope()->requireScope(['admin']); |
| 68 | 68 | InputValidation::commonName($commonName); |
| 69 | 69 | $this->logger->info(sprintf('disabling common_name "%s"', $commonName)); |
@@ -75,7 +75,7 @@ discard block |
||
| 75 | 75 | |
| 76 | 76 | $service->delete( |
| 77 | 77 | '/common_names/disabled/:commonName', |
| 78 | - function ($commonName, Request $request, TokenInfo $tokenInfo) { |
|
| 78 | + function($commonName, Request $request, TokenInfo $tokenInfo) { |
|
| 79 | 79 | $tokenInfo->getScope()->requireScope(['admin']); |
| 80 | 80 | InputValidation::commonName($commonName); |
| 81 | 81 | $this->logger->info(sprintf('enabling common_name "%s"', $commonName)); |
@@ -54,7 +54,7 @@ discard block |
||
| 54 | 54 | { |
| 55 | 55 | $service->get( |
| 56 | 56 | '/users/disabled', |
| 57 | - function (Request $request, TokenInfo $tokenInfo) { |
|
| 57 | + function(Request $request, TokenInfo $tokenInfo) { |
|
| 58 | 58 | $tokenInfo->getScope()->requireScope(['admin']); |
| 59 | 59 | |
| 60 | 60 | return new ApiResponse('users', $this->users->getDisabled()); |
@@ -63,7 +63,7 @@ discard block |
||
| 63 | 63 | |
| 64 | 64 | $service->get( |
| 65 | 65 | '/users/disabled/:userId', |
| 66 | - function ($userId, Request $request, TokenInfo $tokenInfo) { |
|
| 66 | + function($userId, Request $request, TokenInfo $tokenInfo) { |
|
| 67 | 67 | $tokenInfo->getScope()->requireScope(['admin', 'portal']); |
| 68 | 68 | InputValidation::userId($userId); |
| 69 | 69 | |
@@ -73,7 +73,7 @@ discard block |
||
| 73 | 73 | |
| 74 | 74 | $service->post( |
| 75 | 75 | '/users/disabled/:userId', |
| 76 | - function ($userId, Request $request, TokenInfo $tokenInfo) { |
|
| 76 | + function($userId, Request $request, TokenInfo $tokenInfo) { |
|
| 77 | 77 | $tokenInfo->getScope()->requireScope(['admin']); |
| 78 | 78 | InputValidation::userId($userId); |
| 79 | 79 | $this->logger->info(sprintf('disabling user "%s"', $userId)); |
@@ -84,7 +84,7 @@ discard block |
||
| 84 | 84 | |
| 85 | 85 | $service->delete( |
| 86 | 86 | '/users/disabled/:userId', |
| 87 | - function ($userId, Request $request, TokenInfo $tokenInfo) { |
|
| 87 | + function($userId, Request $request, TokenInfo $tokenInfo) { |
|
| 88 | 88 | $tokenInfo->getScope()->requireScope(['admin']); |
| 89 | 89 | InputValidation::userId($userId); |
| 90 | 90 | $this->logger->info(sprintf('enabling user "%s"', $userId)); |
@@ -95,7 +95,7 @@ discard block |
||
| 95 | 95 | |
| 96 | 96 | $service->get( |
| 97 | 97 | '/users/otp_secrets', |
| 98 | - function (Request $request, TokenInfo $tokenInfo) { |
|
| 98 | + function(Request $request, TokenInfo $tokenInfo) { |
|
| 99 | 99 | $tokenInfo->getScope()->requireScope(['admin']); |
| 100 | 100 | |
| 101 | 101 | return new ApiResponse('users', $this->otpSecret->getOtpSecrets()); |
@@ -104,7 +104,7 @@ discard block |
||
| 104 | 104 | |
| 105 | 105 | $service->get( |
| 106 | 106 | '/users/otp_secrets/:userId', |
| 107 | - function ($userId, Request $request, TokenInfo $tokenInfo) { |
|
| 107 | + function($userId, Request $request, TokenInfo $tokenInfo) { |
|
| 108 | 108 | $tokenInfo->getScope()->requireScope(['admin', 'portal']); |
| 109 | 109 | InputValidation::userId($userId); |
| 110 | 110 | |
@@ -116,7 +116,7 @@ discard block |
||
| 116 | 116 | |
| 117 | 117 | $service->post( |
| 118 | 118 | '/users/otp_secrets/:userId', |
| 119 | - function ($userId, Request $request, TokenInfo $tokenInfo) { |
|
| 119 | + function($userId, Request $request, TokenInfo $tokenInfo) { |
|
| 120 | 120 | $tokenInfo->getScope()->requireScope(['portal']); |
| 121 | 121 | InputValidation::userId($userId); |
| 122 | 122 | $otpSecret = $request->getPostParameter('otp_secret'); |
@@ -128,7 +128,7 @@ discard block |
||
| 128 | 128 | |
| 129 | 129 | $service->delete( |
| 130 | 130 | '/users/otp_secrets/:userId', |
| 131 | - function ($userId, Request $request, TokenInfo $tokenInfo) { |
|
| 131 | + function($userId, Request $request, TokenInfo $tokenInfo) { |
|
| 132 | 132 | $tokenInfo->getScope()->requireScope(['admin']); |
| 133 | 133 | InputValidation::userId($userId); |
| 134 | 134 | |
@@ -138,7 +138,7 @@ discard block |
||
| 138 | 138 | |
| 139 | 139 | $service->get( |
| 140 | 140 | '/users/groups/:userId', |
| 141 | - function ($userId, Request $request, TokenInfo $tokenInfo) { |
|
| 141 | + function($userId, Request $request, TokenInfo $tokenInfo) { |
|
| 142 | 142 | $tokenInfo->getScope()->requireScope(['admin', 'portal']); |
| 143 | 143 | InputValidation::userId($userId); |
| 144 | 144 | |