@@ -68,7 +68,7 @@ |
||
68 | 68 | { |
69 | 69 | $tokenString = $request->headers->get('Authorization'); |
70 | 70 | |
71 | - if (0 === strpos((string)$tokenString, 'Bearer ')) { |
|
71 | + if (0 === strpos((string) $tokenString, 'Bearer ')) { |
|
72 | 72 | $tokenString = substr($tokenString, 7); |
73 | 73 | } |
74 | 74 |
@@ -155,7 +155,7 @@ |
||
155 | 155 | if ($this->requiredClaims) { |
156 | 156 | $missing = array_diff_key(array_flip($this->requiredClaims), $claims); |
157 | 157 | if (count($missing)) { |
158 | - throw new MissingClaimsException("Missing claims: " . implode(', ', $missing)); |
|
158 | + throw new MissingClaimsException("Missing claims: ".implode(', ', $missing)); |
|
159 | 159 | } |
160 | 160 | } |
161 | 161 | if ($this->issuer && !isset($claims['iss'])) { |
@@ -94,10 +94,10 @@ |
||
94 | 94 | if ($claimKey === 'aud') { |
95 | 95 | if (is_array($claimValue)) { |
96 | 96 | foreach ($claimValue as $role) { |
97 | - $roles[] = "ROLE_" . strtoupper($role); |
|
97 | + $roles[] = "ROLE_".strtoupper($role); |
|
98 | 98 | } |
99 | 99 | } elseif (is_string($claimValue)) { |
100 | - $roles[] = "ROLE_" . strtoupper($claimValue); |
|
100 | + $roles[] = "ROLE_".strtoupper($claimValue); |
|
101 | 101 | } |
102 | 102 | } |
103 | 103 | } |
@@ -68,7 +68,7 @@ discard block |
||
68 | 68 | */ |
69 | 69 | public function validateTokenWillCallVerifySignatureOnToken() |
70 | 70 | { |
71 | - $secret = (string)rand(); |
|
71 | + $secret = (string) rand(); |
|
72 | 72 | $key = new JwtKey(['secret' => $secret]); |
73 | 73 | $key->validateToken($this->createTokenMock($secret, $key)); |
74 | 74 | } |
@@ -87,7 +87,7 @@ discard block |
||
87 | 87 | */ |
88 | 88 | public function canLoadSecretFromLoader() |
89 | 89 | { |
90 | - $secret = (string)rand(); |
|
90 | + $secret = (string) rand(); |
|
91 | 91 | $token = $this->createTokenMock($secret); |
92 | 92 | |
93 | 93 | $loaderMock = $this->getMockBuilder(SecretLoader::class)->getMock(); |