@@ -96,7 +96,7 @@ |
||
| 96 | 96 | $client = $this->createClient(); |
| 97 | 97 | $server = []; |
| 98 | 98 | if ($token) { |
| 99 | - $server = ['HTTP_AUTHORIZATION' => 'Bearer ' . $token]; |
|
| 99 | + $server = ['HTTP_AUTHORIZATION' => 'Bearer '.$token]; |
|
| 100 | 100 | } |
| 101 | 101 | $client->request('GET', $url, $parameters = [], $files = [], $server); |
| 102 | 102 | |
@@ -68,7 +68,7 @@ |
||
| 68 | 68 | return; |
| 69 | 69 | } |
| 70 | 70 | |
| 71 | - $dir = __DIR__ . '/App/app/cache'; |
|
| 71 | + $dir = __DIR__.'/App/app/cache'; |
|
| 72 | 72 | |
| 73 | 73 | if (!is_dir($dir)) { |
| 74 | 74 | return; |
@@ -94,10 +94,10 @@ |
||
| 94 | 94 | if ($claimKey === 'aud') { |
| 95 | 95 | if (is_array($claimValue)) { |
| 96 | 96 | foreach ($claimValue as $role) { |
| 97 | - $roles[] = "ROLE_" . strtoupper($role); |
|
| 97 | + $roles[] = "ROLE_".strtoupper($role); |
|
| 98 | 98 | } |
| 99 | 99 | } elseif (is_string($claimValue)) { |
| 100 | - $roles[] = "ROLE_" . strtoupper($claimValue); |
|
| 100 | + $roles[] = "ROLE_".strtoupper($claimValue); |
|
| 101 | 101 | } |
| 102 | 102 | } |
| 103 | 103 | } |
@@ -70,7 +70,7 @@ |
||
| 70 | 70 | { |
| 71 | 71 | $tokenString = $request->headers->get($this->header); |
| 72 | 72 | |
| 73 | - if ($this->header == self::HEADER_AUTH && 0 === strpos((string)$tokenString, 'Bearer ')) { |
|
| 73 | + if ($this->header == self::HEADER_AUTH && 0 === strpos((string) $tokenString, 'Bearer ')) { |
|
| 74 | 74 | $tokenString = substr($tokenString, 7); |
| 75 | 75 | } |
| 76 | 76 | |
@@ -39,12 +39,12 @@ |
||
| 39 | 39 | |
| 40 | 40 | public function create(ContainerBuilder $container, $id, $config, $userProvider, $defaultEntryPoint) |
| 41 | 41 | { |
| 42 | - $providerId = 'security.authentication.provider.jwt.' . $id; |
|
| 42 | + $providerId = 'security.authentication.provider.jwt.'.$id; |
|
| 43 | 43 | $container |
| 44 | 44 | ->setDefinition($providerId, new DefinitionDecorator('jwt.security.authentication.provider')) |
| 45 | 45 | ->replaceArgument(0, new Reference($userProvider)); |
| 46 | 46 | |
| 47 | - $listenerId = 'security.authentication.listener.jwt.' . $id; |
|
| 47 | + $listenerId = 'security.authentication.listener.jwt.'.$id; |
|
| 48 | 48 | $container->setDefinition($listenerId, new DefinitionDecorator('jwt.security.authentication.listener')); |
| 49 | 49 | |
| 50 | 50 | return [$providerId, $listenerId, $defaultEntryPoint]; |
@@ -26,7 +26,7 @@ discard block |
||
| 26 | 26 | public function load(array $configs, ContainerBuilder $container) |
| 27 | 27 | { |
| 28 | 28 | $config = $this->processConfiguration(new Configuration(), $configs); |
| 29 | - $loader = new Loader\YamlFileLoader($container, new FileLocator(__DIR__ . '/../Resources/config')); |
|
| 29 | + $loader = new Loader\YamlFileLoader($container, new FileLocator(__DIR__.'/../Resources/config')); |
|
| 30 | 30 | $loader->load('services.yml'); |
| 31 | 31 | |
| 32 | 32 | $keys = []; |
@@ -34,7 +34,7 @@ discard block |
||
| 34 | 34 | foreach ($config['keys'] as $keyId => $keyConfig) { |
| 35 | 35 | |
| 36 | 36 | $keyConfig['kid'] = $keyId; |
| 37 | - $keyDefinition = new Definition('jwt.keys.' . $keyId); |
|
| 37 | + $keyDefinition = new Definition('jwt.keys.'.$keyId); |
|
| 38 | 38 | $keyDefinition->setClass('KleijnWeb\JwtBundle\Jwt\JwtKey'); |
| 39 | 39 | |
| 40 | 40 | if (isset($keyConfig['loader'])) { |
@@ -155,7 +155,7 @@ |
||
| 155 | 155 | if ($this->requiredClaims) { |
| 156 | 156 | $missing = array_diff_key(array_flip($this->requiredClaims), $claims); |
| 157 | 157 | if (count($missing)) { |
| 158 | - throw new MissingClaimsException("Missing claims: " . implode(', ', $missing)); |
|
| 158 | + throw new MissingClaimsException("Missing claims: ".implode(', ', $missing)); |
|
| 159 | 159 | } |
| 160 | 160 | } |
| 161 | 161 | if ($this->issuer && !isset($claims['iss'])) { |
@@ -26,6 +26,6 @@ |
||
| 26 | 26 | */ |
| 27 | 27 | public function registerContainerConfiguration(LoaderInterface $loader) |
| 28 | 28 | { |
| 29 | - $loader->load(__DIR__ . '/config_' . $this->getEnvironment() .'.yml'); |
|
| 29 | + $loader->load(__DIR__.'/config_'.$this->getEnvironment().'.yml'); |
|
| 30 | 30 | } |
| 31 | 31 | } |
@@ -68,7 +68,7 @@ discard block |
||
| 68 | 68 | */ |
| 69 | 69 | public function validateTokenWillCallVerifySignatureOnToken() |
| 70 | 70 | { |
| 71 | - $secret = (string)rand(); |
|
| 71 | + $secret = (string) rand(); |
|
| 72 | 72 | $key = new JwtKey(['secret' => $secret]); |
| 73 | 73 | $key->validateToken($this->createTokenMock($secret, $key)); |
| 74 | 74 | } |
@@ -87,7 +87,7 @@ discard block |
||
| 87 | 87 | */ |
| 88 | 88 | public function canLoadSecretFromLoader() |
| 89 | 89 | { |
| 90 | - $secret = (string)rand(); |
|
| 90 | + $secret = (string) rand(); |
|
| 91 | 91 | $token = $this->createTokenMock($secret); |
| 92 | 92 | |
| 93 | 93 | $loaderMock = $this->getMockBuilder(SecretLoader::class)->getMock(); |