| @@ -121,16 +121,16 @@ discard block | ||
| 121 | 121 | // Unpack our jwt to verify it is correctly formed | 
| 122 | 122 | $token = $this->unpackJwt($accessToken); | 
| 123 | 123 | // app tokens must be signed in RSA | 
| 124 | -        if (! isset($token['header']['alg']) || $token['header']['alg'] != 'RS256') { | |
| 124 | +        if (!isset($token['header']['alg']) || $token['header']['alg'] != 'RS256') { | |
| 125 | 125 |              throw new \Exception('Token is not using the correct signing algorithm RS256 '.$accessToken); | 
| 126 | 126 | } | 
| 127 | 127 | // app tokens are RSA signed with a key ID in the header of the token | 
| 128 | -        if (! isset($token['header']['kid'])) { | |
| 128 | +        if (!isset($token['header']['kid'])) { | |
| 129 | 129 |              throw new \Exception('Token with unknown RSA key id can not be validated '.$accessToken); | 
| 130 | 130 | } | 
| 131 | 131 | // Make sure the key id is known to our azure ad information | 
| 132 | 132 | $kid = $token['header']['kid']; | 
| 133 | -        if (! isset($this->azureActiveDirectory->signingKeys[$kid])) { | |
| 133 | +        if (!isset($this->azureActiveDirectory->signingKeys[$kid])) { | |
| 134 | 134 |              throw new \Exception('Token signed with unknown KID '.$kid); | 
| 135 | 135 | } | 
| 136 | 136 | // get the x509 encoded cert body | 
| @@ -207,7 +207,7 @@ discard block | ||
| 207 | 207 | $roles = $user->roles()->get()->all(); | 
| 208 | 208 |          foreach ($roles as $key => $role) { | 
| 209 | 209 | $role->permissions = $role->abilities()->get()->all(); | 
| 210 | -            if (! count($role->permissions)) { | |
| 210 | +            if (!count($role->permissions)) { | |
| 211 | 211 | unset($roles[$key]); | 
| 212 | 212 | } | 
| 213 | 213 | } |