@@ -189,7 +189,7 @@ discard block |
||
189 | 189 | { |
190 | 190 | if($this->token_validation_url) { |
191 | 191 | $this->logger->debug('validate oauth2 token via rfc7662 token validation endpoint ['.$this->token_validation_url.']', [ |
192 | - 'category' => get_class($this), |
|
192 | + 'category' => get_class($this), |
|
193 | 193 | ]); |
194 | 194 | |
195 | 195 | $url = str_replace('{token}', $token, $this->token_validation_url); |
@@ -200,7 +200,7 @@ discard block |
||
200 | 200 | } |
201 | 201 | |
202 | 202 | $this->logger->debug('validate token via openid-connect userinfo_endpoint ['.$discovery['userinfo_endpoint'].']', [ |
203 | - 'category' => get_class($this), |
|
203 | + 'category' => get_class($this), |
|
204 | 204 | ]); |
205 | 205 | |
206 | 206 | $url = $discovery['userinfo_endpoint'].'?access_token='.$token; |
@@ -217,7 +217,7 @@ discard block |
||
217 | 217 | if($code === 200) { |
218 | 218 | $attributes = json_decode($result, true); |
219 | 219 | $this->logger->debug('successfully verified oauth2 access token via authorization server', [ |
220 | - 'category' => get_class($this), |
|
220 | + 'category' => get_class($this), |
|
221 | 221 | ]); |
222 | 222 | |
223 | 223 | if(!isset($attributes[$this->identity_attribute])) { |
@@ -235,7 +235,7 @@ discard block |
||
235 | 235 | return true; |
236 | 236 | } else { |
237 | 237 | $this->logger->error('failed verify oauth2 access token via authorization server, received status ['.$code.']', [ |
238 | - 'category' => get_class($this), |
|
238 | + 'category' => get_class($this), |
|
239 | 239 | ]); |
240 | 240 | |
241 | 241 | throw new Exception('failed verify oauth2 access token via authorization server'); |
@@ -260,7 +260,7 @@ discard block |
||
260 | 260 | } |
261 | 261 | |
262 | 262 | $this->logger->debug('fetch user attributes from userinfo_endpoint ['.$discovery['userinfo_endpoint'].']', [ |
263 | - 'category' => get_class($this), |
|
263 | + 'category' => get_class($this), |
|
264 | 264 | ]); |
265 | 265 | |
266 | 266 | $url = $discovery['userinfo_endpoint'].'?access_token='.$this->access_token; |
@@ -275,13 +275,13 @@ discard block |
||
275 | 275 | if($code === 200) { |
276 | 276 | $attributes = json_decode($result, true); |
277 | 277 | $this->logger->debug('successfully requested user attributes from userinfo_endpoint', [ |
278 | - 'category' => get_class($this), |
|
278 | + 'category' => get_class($this), |
|
279 | 279 | ]); |
280 | 280 | |
281 | 281 | return $this->attributes = $attributes; |
282 | 282 | } else { |
283 | 283 | $this->logger->error('failed requesting user attributes from userinfo_endpoint, status code ['.$code.']', [ |
284 | - 'category' => get_class($this), |
|
284 | + 'category' => get_class($this), |
|
285 | 285 | ]); |
286 | 286 | |
287 | 287 | throw new Exception('failed requesting user attribute from userinfo_endpoint'); |
@@ -74,8 +74,8 @@ discard block |
||
74 | 74 | return $this; |
75 | 75 | } |
76 | 76 | |
77 | - foreach($config as $option => $value) { |
|
78 | - switch($option) { |
|
77 | + foreach ($config as $option => $value) { |
|
78 | + switch ($option) { |
|
79 | 79 | case 'provider_url': |
80 | 80 | case 'token_validation_url': |
81 | 81 | case 'identity_attribute': |
@@ -156,7 +156,7 @@ discard block |
||
156 | 156 | $code = curl_getinfo($ch, CURLINFO_HTTP_CODE); |
157 | 157 | curl_close($ch); |
158 | 158 | |
159 | - if($code === 200) { |
|
159 | + if ($code === 200) { |
|
160 | 160 | $discovery = json_decode($result, true); |
161 | 161 | $this->logger->debug('received openid-connect discovery document from ['.$url.']', [ |
162 | 162 | 'category' => get_class($this), |
@@ -187,7 +187,7 @@ discard block |
||
187 | 187 | */ |
188 | 188 | protected function verifyToken(string $token): bool |
189 | 189 | { |
190 | - if($this->token_validation_url) { |
|
190 | + if ($this->token_validation_url) { |
|
191 | 191 | $this->logger->debug('validate oauth2 token via rfc7662 token validation endpoint ['.$this->token_validation_url.']', [ |
192 | 192 | 'category' => get_class($this), |
193 | 193 | ]); |
@@ -214,19 +214,19 @@ discard block |
||
214 | 214 | curl_close($ch); |
215 | 215 | $response = json_decode($result, true); |
216 | 216 | |
217 | - if($code === 200) { |
|
217 | + if ($code === 200) { |
|
218 | 218 | $attributes = json_decode($result, true); |
219 | 219 | $this->logger->debug('successfully verified oauth2 access token via authorization server', [ |
220 | 220 | 'category' => get_class($this), |
221 | 221 | ]); |
222 | 222 | |
223 | - if(!isset($attributes[$this->identity_attribute])) { |
|
223 | + if (!isset($attributes[$this->identity_attribute])) { |
|
224 | 224 | throw new Exception('identity attribute '.$this->identity_attribute.' not found in oauth2 response'); |
225 | 225 | } |
226 | 226 | |
227 | 227 | $this->identifier = $attributes['preferred_username']; |
228 | 228 | |
229 | - if($this->token_validation_url) { |
|
229 | + if ($this->token_validation_url) { |
|
230 | 230 | $this->attributes = $attributes; |
231 | 231 | } else { |
232 | 232 | $this->access_token = $token; |
@@ -250,7 +250,7 @@ discard block |
||
250 | 250 | */ |
251 | 251 | public function getAttributes(): array |
252 | 252 | { |
253 | - if(count($this->attributes) !== 0) { |
|
253 | + if (count($this->attributes) !== 0) { |
|
254 | 254 | return $this->attributes; |
255 | 255 | } |
256 | 256 | |
@@ -272,7 +272,7 @@ discard block |
||
272 | 272 | curl_close($ch); |
273 | 273 | $response = json_decode($result, true); |
274 | 274 | |
275 | - if($code === 200) { |
|
275 | + if ($code === 200) { |
|
276 | 276 | $attributes = json_decode($result, true); |
277 | 277 | $this->logger->debug('successfully requested user attributes from userinfo_endpoint', [ |
278 | 278 | 'category' => get_class($this), |