@@ -13,7 +13,7 @@ |
||
13 | 13 | */ |
14 | 14 | public function up() |
15 | 15 | { |
16 | - Schema::table('users', function (Blueprint $table) { |
|
16 | + Schema::table('users', function(Blueprint $table) { |
|
17 | 17 | // Users must be able to support blank passwords for external identity |
18 | 18 | $table->string('password')->nullable()->change(); |
19 | 19 | // We need a new string field to store the oauth provider unique id in |
@@ -46,7 +46,7 @@ |
||
46 | 46 | */ |
47 | 47 | public function guest() |
48 | 48 | { |
49 | - return ! $this->check(); |
|
49 | + return !$this->check(); |
|
50 | 50 | } |
51 | 51 | |
52 | 52 | /** |
@@ -31,7 +31,7 @@ discard block |
||
31 | 31 | public function certAuth() |
32 | 32 | { |
33 | 33 | // Make sure we got a client certificate from the web server |
34 | - if (! $_SERVER['SSL_CLIENT_CERT']) { |
|
34 | + if (!$_SERVER['SSL_CLIENT_CERT']) { |
|
35 | 35 | throw new \Exception('TLS client certificate missing'); |
36 | 36 | } |
37 | 37 | // try to parse the certificate we got |
@@ -40,7 +40,7 @@ discard block |
||
40 | 40 | $asciicert = str_replace("\t", '', $_SERVER['SSL_CLIENT_CERT']); |
41 | 41 | $cert = $x509->loadX509($asciicert); |
42 | 42 | $names = $x509->getExtension('id-ce-subjectAltName'); |
43 | - if (! $names) { |
|
43 | + if (!$names) { |
|
44 | 44 | throw new \Exception('TLS client cert missing subject alternative names'); |
45 | 45 | } |
46 | 46 | // Search subject alt names for user principal name |
@@ -54,12 +54,12 @@ discard block |
||
54 | 54 | } |
55 | 55 | } |
56 | 56 | } |
57 | - if (! $upn) { |
|
57 | + if (!$upn) { |
|
58 | 58 | throw new \Exception('Could not find user principal name in TLS client cert'); |
59 | 59 | } |
60 | 60 | $user_class = config('azure-oath.user_class'); |
61 | 61 | $user = $user_class::where('userPrincipalName', $upn)->first(); |
62 | - if (! $user) { |
|
62 | + if (!$user) { |
|
63 | 63 | throw new \Exception('No user found with user principal name '.$upn); |
64 | 64 | } |
65 | 65 | //dd($user); |
@@ -98,7 +98,7 @@ |
||
98 | 98 | { |
99 | 99 | //dd($user); |
100 | 100 | // WELL this is extremely stupid. if email address isnt set, use their UPN... |
101 | - if (! $user['mail']) { |
|
101 | + if (!$user['mail']) { |
|
102 | 102 | $user['mail'] = $user['userPrincipalName']; |
103 | 103 | } |
104 | 104 |
@@ -57,7 +57,7 @@ discard block |
||
57 | 57 | */ |
58 | 58 | public function check() |
59 | 59 | { |
60 | - return ! is_null($this->user()); |
|
60 | + return !is_null($this->user()); |
|
61 | 61 | } |
62 | 62 | |
63 | 63 | /** |
@@ -67,7 +67,7 @@ discard block |
||
67 | 67 | */ |
68 | 68 | public function guest() |
69 | 69 | { |
70 | - return ! $this->check(); |
|
70 | + return !$this->check(); |
|
71 | 71 | } |
72 | 72 | |
73 | 73 | /** |
@@ -77,7 +77,7 @@ discard block |
||
77 | 77 | */ |
78 | 78 | public function user() |
79 | 79 | { |
80 | - if (! is_null($this->user)) { |
|
80 | + if (!is_null($this->user)) { |
|
81 | 81 | return $this->user; |
82 | 82 | } |
83 | 83 | } |
@@ -39,7 +39,7 @@ |
||
39 | 39 | |
40 | 40 | public static function userCallback($callback) |
41 | 41 | { |
42 | - if (! is_callable($callback)) { |
|
42 | + if (!is_callable($callback)) { |
|
43 | 43 | throw new \Exception('Must provide a callable.'); |
44 | 44 | } |
45 | 45 |
@@ -1,14 +1,14 @@ |
||
1 | 1 | <?php |
2 | 2 | |
3 | -Route::middleware([config('azure-oath.routes.middleware')])->group(function () { |
|
3 | +Route::middleware([config('azure-oath.routes.middleware')])->group(function() { |
|
4 | 4 | Route::get(config('azure-oath.routes.login'), 'Metrogistics\AzureSocialite\WebAuthController@redirectToOauthProvider'); |
5 | 5 | Route::get(config('azure-oath.routes.callback'), 'Metrogistics\AzureSocialite\WebAuthController@handleOauthResponse'); |
6 | 6 | |
7 | 7 | // This handles a situation where a route with the NAME of login does not exist, we define it to keep from breaking framework redirects hard coded |
8 | - if (! \Route::has('login')) { |
|
8 | + if (!\Route::has('login')) { |
|
9 | 9 | Route::get('login', 'Metrogistics\AzureSocialite\AuthController@loginOrRegister')->name('login'); |
10 | 10 | } |
11 | - if (! \Route::has('register')) { |
|
11 | + if (!\Route::has('register')) { |
|
12 | 12 | Route::get('register', 'Metrogistics\AzureSocialite\AuthController@loginOrRegister')->name('register'); |
13 | 13 | } |
14 | 14 | }); |
@@ -7,9 +7,9 @@ |
||
7 | 7 | |
8 | 8 | class User extends Authenticatable implements |
9 | 9 | \Illuminate\Contracts\Auth\Authenticatable, |
10 | - \Illuminate\Contracts\Auth\Access\Authorizable, |
|
11 | - \Illuminate\Contracts\Auth\CanResetPassword, |
|
12 | - \Tymon\JWTAuth\Contracts\JWTSubject |
|
10 | + \Illuminate\Contracts\Auth\Access\Authorizable, |
|
11 | + \Illuminate\Contracts\Auth\CanResetPassword, |
|
12 | + \Tymon\JWTAuth\Contracts\JWTSubject |
|
13 | 13 | { |
14 | 14 | use Notifiable; |
15 | 15 | use \Silber\Bouncer\Database\HasRolesAndAbilities; |
@@ -6,7 +6,7 @@ discard block |
||
6 | 6 | |
7 | 7 | // Redirect requests to /api to the swagger documentation |
8 | 8 | //$api->any('', function (Illuminate\Http\Request $request) { |
9 | - $api->any('', function () { |
|
9 | + $api->any('', function() { |
|
10 | 10 | return redirect('api/documentation/'); |
11 | 11 | }); |
12 | 12 | |
@@ -17,6 +17,6 @@ discard block |
||
17 | 17 | * @SWG\Response(response="200", description="Hello world example") |
18 | 18 | * ) |
19 | 19 | **/ |
20 | - $api->any('/api/hello', function () { |
|
20 | + $api->any('/api/hello', function() { |
|
21 | 21 | return 'hello world'; |
22 | 22 | }); |