@@ -20,7 +20,7 @@ |
||
| 20 | 20 | class TestBundle extends Bundle |
| 21 | 21 | { |
| 22 | 22 | /** |
| 23 | - * @return ExtensionInterface |
|
| 23 | + * @return boolean |
|
| 24 | 24 | */ |
| 25 | 25 | public function getContainerExtension() |
| 26 | 26 | { |
@@ -96,7 +96,7 @@ |
||
| 96 | 96 | $client = $this->createClient(); |
| 97 | 97 | $server = []; |
| 98 | 98 | if ($token) { |
| 99 | - $server = ['HTTP_AUTHORIZATION' => 'Bearer ' . $token]; |
|
| 99 | + $server = ['HTTP_AUTHORIZATION' => 'Bearer '.$token]; |
|
| 100 | 100 | } |
| 101 | 101 | $client->request('GET', $url, $parameters = [], $files = [], $server); |
| 102 | 102 | |
@@ -68,7 +68,7 @@ |
||
| 68 | 68 | return; |
| 69 | 69 | } |
| 70 | 70 | |
| 71 | - $dir = __DIR__ . '/App/app/cache'; |
|
| 71 | + $dir = __DIR__.'/App/app/cache'; |
|
| 72 | 72 | |
| 73 | 73 | if (!is_dir($dir)) { |
| 74 | 74 | return; |
@@ -94,10 +94,10 @@ |
||
| 94 | 94 | if ($claimKey === 'aud') { |
| 95 | 95 | if (is_array($claimValue)) { |
| 96 | 96 | foreach ($claimValue as $role) { |
| 97 | - $roles[] = "ROLE_" . strtoupper($role); |
|
| 97 | + $roles[] = "ROLE_".strtoupper($role); |
|
| 98 | 98 | } |
| 99 | 99 | } elseif (is_string($claimValue)) { |
| 100 | - $roles[] = "ROLE_" . strtoupper($claimValue); |
|
| 100 | + $roles[] = "ROLE_".strtoupper($claimValue); |
|
| 101 | 101 | } |
| 102 | 102 | } |
| 103 | 103 | } |
@@ -39,12 +39,12 @@ |
||
| 39 | 39 | |
| 40 | 40 | public function create(ContainerBuilder $container, $id, $config, $userProvider, $defaultEntryPoint) |
| 41 | 41 | { |
| 42 | - $providerId = 'security.authentication.provider.jwt.' . $id; |
|
| 42 | + $providerId = 'security.authentication.provider.jwt.'.$id; |
|
| 43 | 43 | $container |
| 44 | 44 | ->setDefinition($providerId, new DefinitionDecorator('jwt.security.authentication.provider')) |
| 45 | 45 | ->replaceArgument(0, new Reference($userProvider)); |
| 46 | 46 | |
| 47 | - $listenerId = 'security.authentication.listener.jwt.' . $id; |
|
| 47 | + $listenerId = 'security.authentication.listener.jwt.'.$id; |
|
| 48 | 48 | $container->setDefinition($listenerId, new DefinitionDecorator('jwt.security.authentication.listener')); |
| 49 | 49 | |
| 50 | 50 | return [$providerId, $listenerId, $defaultEntryPoint]; |
@@ -155,7 +155,7 @@ |
||
| 155 | 155 | if ($this->requiredClaims) { |
| 156 | 156 | $missing = array_diff_key(array_flip($this->requiredClaims), $claims); |
| 157 | 157 | if (count($missing)) { |
| 158 | - throw new MissingClaimsException("Missing claims: " . implode(', ', $missing)); |
|
| 158 | + throw new MissingClaimsException("Missing claims: ".implode(', ', $missing)); |
|
| 159 | 159 | } |
| 160 | 160 | } |
| 161 | 161 | if ($this->issuer && !isset($claims['iss'])) { |
@@ -68,7 +68,7 @@ discard block |
||
| 68 | 68 | */ |
| 69 | 69 | public function validateTokenWillCallVerifySignatureOnToken() |
| 70 | 70 | { |
| 71 | - $secret = (string)rand(); |
|
| 71 | + $secret = (string) rand(); |
|
| 72 | 72 | $key = new JwtKey(['secret' => $secret]); |
| 73 | 73 | $key->validateToken($this->createTokenMock($secret, $key)); |
| 74 | 74 | } |
@@ -87,7 +87,7 @@ discard block |
||
| 87 | 87 | */ |
| 88 | 88 | public function canLoadSecretFromLoader() |
| 89 | 89 | { |
| 90 | - $secret = (string)rand(); |
|
| 90 | + $secret = (string) rand(); |
|
| 91 | 91 | $token = $this->createTokenMock($secret); |
| 92 | 92 | |
| 93 | 93 | $loaderMock = $this->getMockBuilder(SecretLoader::class)->getMock(); |
@@ -1,4 +1,4 @@ discard block |
||
| 1 | -<?php declare(strict_types=1); |
|
| 1 | +<?php declare(strict_types = 1); |
|
| 2 | 2 | /* |
| 3 | 3 | * This file is part of the KleijnWeb\JwtBundle package. |
| 4 | 4 | * |
@@ -73,7 +73,7 @@ discard block |
||
| 73 | 73 | { |
| 74 | 74 | $tokenString = $request->headers->get($this->header); |
| 75 | 75 | |
| 76 | - if ($this->header == self::HEADER_AUTH && 0 === strpos((string)$tokenString, 'Bearer ')) { |
|
| 76 | + if ($this->header == self::HEADER_AUTH && 0 === strpos((string) $tokenString, 'Bearer ')) { |
|
| 77 | 77 | $tokenString = substr($tokenString, 7); |
| 78 | 78 | } |
| 79 | 79 | |
@@ -61,7 +61,7 @@ discard block |
||
| 61 | 61 | $mock = $this->authenticationManagerMock; |
| 62 | 62 | $mock->expects($this->once()) |
| 63 | 63 | ->method('authenticate') |
| 64 | - ->with($this->callback(function (JwtAuthenticationToken $token) use ($tokenString) { |
|
| 64 | + ->with($this->callback(function(JwtAuthenticationToken $token) use ($tokenString) { |
|
| 65 | 65 | return $token->getCredentials() === $tokenString; |
| 66 | 66 | })); |
| 67 | 67 | |
@@ -82,7 +82,7 @@ discard block |
||
| 82 | 82 | $mock = $this->authenticationManagerMock; |
| 83 | 83 | $mock->expects($this->once()) |
| 84 | 84 | ->method('authenticate') |
| 85 | - ->with($this->callback(function (JwtAuthenticationToken $token) use ($tokenString) { |
|
| 85 | + ->with($this->callback(function(JwtAuthenticationToken $token) use ($tokenString) { |
|
| 86 | 86 | return $token->getCredentials() === $tokenString; |
| 87 | 87 | })); |
| 88 | 88 | |
@@ -103,7 +103,7 @@ discard block |
||
| 103 | 103 | $mock = $this->authenticationManagerMock; |
| 104 | 104 | $mock->expects($this->once()) |
| 105 | 105 | ->method('authenticate') |
| 106 | - ->with($this->callback(function (JwtAuthenticationToken $token) use ($tokenString) { |
|
| 106 | + ->with($this->callback(function(JwtAuthenticationToken $token) use ($tokenString) { |
|
| 107 | 107 | return $token->getCredentials() === $tokenString; |
| 108 | 108 | })); |
| 109 | 109 | |
@@ -143,7 +143,7 @@ discard block |
||
| 143 | 143 | $mock = $this->authenticationManagerMock; |
| 144 | 144 | $mock->expects($this->once()) |
| 145 | 145 | ->method('authenticate') |
| 146 | - ->willReturnCallback(function () use ($authenticatedToken) { |
|
| 146 | + ->willReturnCallback(function() use ($authenticatedToken) { |
|
| 147 | 147 | return $authenticatedToken; |
| 148 | 148 | }); |
| 149 | 149 | |