@@ -35,7 +35,7 @@ discard block |
||
| 35 | 35 | */ |
| 36 | 36 | public function save(KeyChainRecord $keyChainRecord, $runValidation = true, $attributeNames = null) |
| 37 | 37 | { |
| 38 | - if (! $runValidation && $keyChainRecord->validate()) { |
|
| 38 | + if (!$runValidation && $keyChainRecord->validate()) { |
|
| 39 | 39 | return false; |
| 40 | 40 | } |
| 41 | 41 | |
@@ -69,7 +69,7 @@ discard block |
||
| 69 | 69 | public function decrypt(KeyChainRecord $record) |
| 70 | 70 | { |
| 71 | 71 | |
| 72 | - if ($record->isEncrypted && ! $record->isDecrypted) { |
|
| 72 | + if ($record->isEncrypted && !$record->isDecrypted) { |
|
| 73 | 73 | $record->decryptedKey = \Craft::$app->getSecurity()->decryptByKey( |
| 74 | 74 | base64_decode($record->key), |
| 75 | 75 | \Craft::$app->getConfig()->getGeneral()->securityKey |
@@ -63,7 +63,7 @@ discard block |
||
| 63 | 63 | */ |
| 64 | 64 | public function isKeyCertAPair($attribute, $params, $validator) |
| 65 | 65 | { |
| 66 | - if (! openssl_x509_check_private_key($this->getDecryptedCertificate(), $this->getDecryptedKey())) { |
|
| 66 | + if (!openssl_x509_check_private_key($this->getDecryptedCertificate(), $this->getDecryptedKey())) { |
|
| 67 | 67 | $this->addError($attribute, 'Key and certificate are not a pair.'); |
| 68 | 68 | } |
| 69 | 69 | } |
@@ -86,7 +86,7 @@ discard block |
||
| 86 | 86 | */ |
| 87 | 87 | public function getDecryptedKey() |
| 88 | 88 | { |
| 89 | - if (! $this->decryptedKey) { |
|
| 89 | + if (!$this->decryptedKey) { |
|
| 90 | 90 | KeyChain::getInstance()->getService()->decrypt($this); |
| 91 | 91 | $this->isDecrypted = true; |
| 92 | 92 | } |
@@ -100,7 +100,7 @@ discard block |
||
| 100 | 100 | */ |
| 101 | 101 | public function getDecryptedCertificate() |
| 102 | 102 | { |
| 103 | - if (! $this->decryptedCertificate) { |
|
| 103 | + if (!$this->decryptedCertificate) { |
|
| 104 | 104 | KeyChain::getInstance()->getService()->decrypt($this); |
| 105 | 105 | } |
| 106 | 106 | |
@@ -37,7 +37,7 @@ |
||
| 37 | 37 | ]; |
| 38 | 38 | |
| 39 | 39 | |
| 40 | - if (! ($this->getPlugin() instanceof KeyChain)) { |
|
| 40 | + if (!($this->getPlugin() instanceof KeyChain)) { |
|
| 41 | 41 | $variables['crumbs'][] = [ |
| 42 | 42 | 'url' => UrlHelper::cpUrl($this->getPlugin()->getUniqueId()), |
| 43 | 43 | 'label' => $this->getPlugin()->name, |
@@ -23,7 +23,7 @@ |
||
| 23 | 23 | public $opensslDefaults = [ |
| 24 | 24 | 'digestAlgorithm'=>'sha256', |
| 25 | 25 | 'keyBits'=>2048, |
| 26 | - 'daysExpiry'=>365*2, //2 years |
|
| 26 | + 'daysExpiry'=>365 * 2, //2 years |
|
| 27 | 27 | 'description' => 'My Key Pair', |
| 28 | 28 | 'countryName' => 'US', |
| 29 | 29 | 'stateOrProvinceName' => 'Colorado', |
@@ -157,7 +157,7 @@ discard block |
||
| 157 | 157 | return $this->asJson($keyPair->toArray()); |
| 158 | 158 | } |
| 159 | 159 | |
| 160 | - if (! $keyPair->hasErrors()) { |
|
| 160 | + if (!$keyPair->hasErrors()) { |
|
| 161 | 161 | Craft::$app->getSession()->setNotice(Craft::t('keychain', 'Key pair saved.')); |
| 162 | 162 | } else { |
| 163 | 163 | Craft::$app->getSession()->setError(Craft::t('keychain', 'Key pair didn\'t save.')); |
@@ -190,7 +190,7 @@ discard block |
||
| 190 | 190 | 'id' => $keypairId, |
| 191 | 191 | ])->one(); |
| 192 | 192 | |
| 193 | - $keychainRecord->enabled = ! $keychainRecord->enabled; |
|
| 193 | + $keychainRecord->enabled = !$keychainRecord->enabled; |
|
| 194 | 194 | |
| 195 | 195 | if (KeyChain::getInstance()->getService()->save($keychainRecord)) { |
| 196 | 196 | Craft::$app->getSession()->setNotice(Craft::t('keychain', 'Key pair saved.')); |
@@ -75,7 +75,7 @@ |
||
| 75 | 75 | $keyPairRecord->isDecrypted = true; |
| 76 | 76 | |
| 77 | 77 | |
| 78 | - if (! KeyChain::getInstance()->getService()->save($keyPairRecord)) { |
|
| 78 | + if (!KeyChain::getInstance()->getService()->save($keyPairRecord)) { |
|
| 79 | 79 | $this->stderr( |
| 80 | 80 | sprintf('Failed to save new key pair to the database') . PHP_EOL, |
| 81 | 81 | Console::FG_RED |