@@ -21,7 +21,7 @@ |
||
| 21 | 21 | $authUser = $this->findOrCreateUser($user); |
| 22 | 22 | |
| 23 | 23 | // If we have user group information from this oauth attempt |
| 24 | - if(count($user->groups)) { |
|
| 24 | + if (count($user->groups)) { |
|
| 25 | 25 | // remove the users existing database roles before assigning new ones |
| 26 | 26 | \DB::table('assigned_roles') |
| 27 | 27 | ->where('entity_id', $authUser->id) |
@@ -22,17 +22,17 @@ |
||
| 22 | 22 | return $UserFactory->convertAzureUser($user); |
| 23 | 23 | } |
| 24 | 24 | |
| 25 | - public function loginOrRegister (\Illuminate\Http\Request $request) |
|
| 25 | + public function loginOrRegister(\Illuminate\Http\Request $request) |
|
| 26 | 26 | { |
| 27 | 27 | return $request->expectsJson() |
| 28 | 28 | ? response()->json(['message' => $exception->getMessage()], 401) |
| 29 | 29 | : redirect()->guest(config('azure-oath.routes.login')); |
| 30 | 30 | } |
| 31 | 31 | |
| 32 | - public function certAuth () |
|
| 32 | + public function certAuth() |
|
| 33 | 33 | { |
| 34 | 34 | // Make sure we got a client certificate from the web server |
| 35 | - if (! $_SERVER['SSL_CLIENT_CERT']) { |
|
| 35 | + if (!$_SERVER['SSL_CLIENT_CERT']) { |
|
| 36 | 36 | throw new \Exception('TLS client certificate missing'); |
| 37 | 37 | } |
| 38 | 38 | // try to parse the certificate we got |