@@ -20,7 +20,7 @@ |
||
20 | 20 | class TestBundle extends Bundle |
21 | 21 | { |
22 | 22 | /** |
23 | - * @return ExtensionInterface |
|
23 | + * @return boolean |
|
24 | 24 | */ |
25 | 25 | public function getContainerExtension() |
26 | 26 | { |
@@ -96,7 +96,7 @@ |
||
96 | 96 | $client = $this->createClient(); |
97 | 97 | $server = []; |
98 | 98 | if ($token) { |
99 | - $server = ['HTTP_AUTHORIZATION' => 'Bearer ' . $token]; |
|
99 | + $server = ['HTTP_AUTHORIZATION' => 'Bearer '.$token]; |
|
100 | 100 | } |
101 | 101 | $client->request('GET', $url, $parameters = [], $files = [], $server); |
102 | 102 |
@@ -68,7 +68,7 @@ |
||
68 | 68 | return; |
69 | 69 | } |
70 | 70 | |
71 | - $dir = __DIR__ . '/App/app/cache'; |
|
71 | + $dir = __DIR__.'/App/app/cache'; |
|
72 | 72 | |
73 | 73 | if (!is_dir($dir)) { |
74 | 74 | return; |
@@ -94,10 +94,10 @@ |
||
94 | 94 | if ($claimKey === 'aud') { |
95 | 95 | if (is_array($claimValue)) { |
96 | 96 | foreach ($claimValue as $role) { |
97 | - $roles[] = "ROLE_" . strtoupper($role); |
|
97 | + $roles[] = "ROLE_".strtoupper($role); |
|
98 | 98 | } |
99 | 99 | } elseif (is_string($claimValue)) { |
100 | - $roles[] = "ROLE_" . strtoupper($claimValue); |
|
100 | + $roles[] = "ROLE_".strtoupper($claimValue); |
|
101 | 101 | } |
102 | 102 | } |
103 | 103 | } |
@@ -39,12 +39,12 @@ |
||
39 | 39 | |
40 | 40 | public function create(ContainerBuilder $container, $id, $config, $userProvider, $defaultEntryPoint) |
41 | 41 | { |
42 | - $providerId = 'security.authentication.provider.jwt.' . $id; |
|
42 | + $providerId = 'security.authentication.provider.jwt.'.$id; |
|
43 | 43 | $container |
44 | 44 | ->setDefinition($providerId, new DefinitionDecorator('jwt.security.authentication.provider')) |
45 | 45 | ->replaceArgument(0, new Reference($userProvider)); |
46 | 46 | |
47 | - $listenerId = 'security.authentication.listener.jwt.' . $id; |
|
47 | + $listenerId = 'security.authentication.listener.jwt.'.$id; |
|
48 | 48 | $container->setDefinition($listenerId, new DefinitionDecorator('jwt.security.authentication.listener')); |
49 | 49 | |
50 | 50 | return [$providerId, $listenerId, $defaultEntryPoint]; |
@@ -155,7 +155,7 @@ |
||
155 | 155 | if ($this->requiredClaims) { |
156 | 156 | $missing = array_diff_key(array_flip($this->requiredClaims), $claims); |
157 | 157 | if (count($missing)) { |
158 | - throw new MissingClaimsException("Missing claims: " . implode(', ', $missing)); |
|
158 | + throw new MissingClaimsException("Missing claims: ".implode(', ', $missing)); |
|
159 | 159 | } |
160 | 160 | } |
161 | 161 | if ($this->issuer && !isset($claims['iss'])) { |
@@ -68,7 +68,7 @@ discard block |
||
68 | 68 | */ |
69 | 69 | public function validateTokenWillCallVerifySignatureOnToken() |
70 | 70 | { |
71 | - $secret = (string)rand(); |
|
71 | + $secret = (string) rand(); |
|
72 | 72 | $key = new JwtKey(['secret' => $secret]); |
73 | 73 | $key->validateToken($this->createTokenMock($secret, $key)); |
74 | 74 | } |
@@ -87,7 +87,7 @@ discard block |
||
87 | 87 | */ |
88 | 88 | public function canLoadSecretFromLoader() |
89 | 89 | { |
90 | - $secret = (string)rand(); |
|
90 | + $secret = (string) rand(); |
|
91 | 91 | $token = $this->createTokenMock($secret); |
92 | 92 | |
93 | 93 | $loaderMock = $this->getMockBuilder(SecretLoader::class)->getMock(); |
@@ -1,4 +1,4 @@ discard block |
||
1 | -<?php declare(strict_types=1); |
|
1 | +<?php declare(strict_types = 1); |
|
2 | 2 | /* |
3 | 3 | * This file is part of the KleijnWeb\JwtBundle package. |
4 | 4 | * |
@@ -73,7 +73,7 @@ discard block |
||
73 | 73 | { |
74 | 74 | $tokenString = $request->headers->get($this->header); |
75 | 75 | |
76 | - if ($this->header == self::HEADER_AUTH && 0 === strpos((string)$tokenString, 'Bearer ')) { |
|
76 | + if ($this->header == self::HEADER_AUTH && 0 === strpos((string) $tokenString, 'Bearer ')) { |
|
77 | 77 | $tokenString = substr($tokenString, 7); |
78 | 78 | } |
79 | 79 |
@@ -61,7 +61,7 @@ discard block |
||
61 | 61 | $mock = $this->authenticationManagerMock; |
62 | 62 | $mock->expects($this->once()) |
63 | 63 | ->method('authenticate') |
64 | - ->with($this->callback(function (JwtAuthenticationToken $token) use ($tokenString) { |
|
64 | + ->with($this->callback(function(JwtAuthenticationToken $token) use ($tokenString) { |
|
65 | 65 | return $token->getCredentials() === $tokenString; |
66 | 66 | })); |
67 | 67 | |
@@ -82,7 +82,7 @@ discard block |
||
82 | 82 | $mock = $this->authenticationManagerMock; |
83 | 83 | $mock->expects($this->once()) |
84 | 84 | ->method('authenticate') |
85 | - ->with($this->callback(function (JwtAuthenticationToken $token) use ($tokenString) { |
|
85 | + ->with($this->callback(function(JwtAuthenticationToken $token) use ($tokenString) { |
|
86 | 86 | return $token->getCredentials() === $tokenString; |
87 | 87 | })); |
88 | 88 | |
@@ -103,7 +103,7 @@ discard block |
||
103 | 103 | $mock = $this->authenticationManagerMock; |
104 | 104 | $mock->expects($this->once()) |
105 | 105 | ->method('authenticate') |
106 | - ->with($this->callback(function (JwtAuthenticationToken $token) use ($tokenString) { |
|
106 | + ->with($this->callback(function(JwtAuthenticationToken $token) use ($tokenString) { |
|
107 | 107 | return $token->getCredentials() === $tokenString; |
108 | 108 | })); |
109 | 109 | |
@@ -143,7 +143,7 @@ discard block |
||
143 | 143 | $mock = $this->authenticationManagerMock; |
144 | 144 | $mock->expects($this->once()) |
145 | 145 | ->method('authenticate') |
146 | - ->willReturnCallback(function () use ($authenticatedToken) { |
|
146 | + ->willReturnCallback(function() use ($authenticatedToken) { |
|
147 | 147 | return $authenticatedToken; |
148 | 148 | }); |
149 | 149 |