@@ -99,7 +99,7 @@ discard block |
||
99 | 99 | int $type = IToken::TEMPORARY_TOKEN, |
100 | 100 | int $remember = IToken::DO_NOT_REMEMBER): IToken { |
101 | 101 | if (mb_strlen($name) > 128) { |
102 | - $name = mb_substr($name, 0, 120) . '…'; |
|
102 | + $name = mb_substr($name, 0, 120).'…'; |
|
103 | 103 | } |
104 | 104 | |
105 | 105 | $dbToken = $this->newToken($token, $uid, $loginName, $password, $name, $type, $remember); |
@@ -117,7 +117,7 @@ discard block |
||
117 | 117 | if (isset($this->cache[$tokenHash])) { |
118 | 118 | if ($this->cache[$tokenHash] instanceof DoesNotExistException) { |
119 | 119 | $ex = $this->cache[$tokenHash]; |
120 | - throw new InvalidTokenException("Token does not exist: " . $ex->getMessage(), 0, $ex); |
|
120 | + throw new InvalidTokenException("Token does not exist: ".$ex->getMessage(), 0, $ex); |
|
121 | 121 | } |
122 | 122 | $token = $this->cache[$tokenHash]; |
123 | 123 | } else { |
@@ -131,12 +131,12 @@ discard block |
||
131 | 131 | $this->rotate($token, $tokenId, $tokenId); |
132 | 132 | } catch (DoesNotExistException $ex2) { |
133 | 133 | $this->cache[$tokenHash] = $ex2; |
134 | - throw new InvalidTokenException("Token does not exist: " . $ex->getMessage(), 0, $ex); |
|
134 | + throw new InvalidTokenException("Token does not exist: ".$ex->getMessage(), 0, $ex); |
|
135 | 135 | } |
136 | 136 | } |
137 | 137 | } |
138 | 138 | |
139 | - if ((int)$token->getExpires() !== 0 && $token->getExpires() < $this->time->getTime()) { |
|
139 | + if ((int) $token->getExpires() !== 0 && $token->getExpires() < $this->time->getTime()) { |
|
140 | 140 | throw new ExpiredTokenException($token); |
141 | 141 | } |
142 | 142 | |
@@ -156,10 +156,10 @@ discard block |
||
156 | 156 | try { |
157 | 157 | $token = $this->mapper->getTokenById($tokenId); |
158 | 158 | } catch (DoesNotExistException $ex) { |
159 | - throw new InvalidTokenException("Token with ID $tokenId does not exist: " . $ex->getMessage(), 0, $ex); |
|
159 | + throw new InvalidTokenException("Token with ID $tokenId does not exist: ".$ex->getMessage(), 0, $ex); |
|
160 | 160 | } |
161 | 161 | |
162 | - if ((int)$token->getExpires() !== 0 && $token->getExpires() < $this->time->getTime()) { |
|
162 | + if ((int) $token->getExpires() !== 0 && $token->getExpires() < $this->time->getTime()) { |
|
163 | 163 | throw new ExpiredTokenException($token); |
164 | 164 | } |
165 | 165 | |
@@ -178,7 +178,7 @@ discard block |
||
178 | 178 | public function renewSessionToken(string $oldSessionId, string $sessionId): IToken { |
179 | 179 | $this->cache->clear(); |
180 | 180 | |
181 | - return $this->atomic(function () use ($oldSessionId, $sessionId) { |
|
181 | + return $this->atomic(function() use ($oldSessionId, $sessionId) { |
|
182 | 182 | $token = $this->getToken($oldSessionId); |
183 | 183 | |
184 | 184 | if (!($token instanceof PublicKeyToken)) { |
@@ -223,10 +223,10 @@ discard block |
||
223 | 223 | $this->cache->clear(); |
224 | 224 | |
225 | 225 | $olderThan = $this->time->getTime() - (int) $this->config->getSystemValue('session_lifetime', 60 * 60 * 24); |
226 | - $this->logger->debug('Invalidating session tokens older than ' . date('c', $olderThan), ['app' => 'cron']); |
|
226 | + $this->logger->debug('Invalidating session tokens older than '.date('c', $olderThan), ['app' => 'cron']); |
|
227 | 227 | $this->mapper->invalidateOld($olderThan, IToken::DO_NOT_REMEMBER); |
228 | 228 | $rememberThreshold = $this->time->getTime() - (int) $this->config->getSystemValue('remember_login_cookie_lifetime', 60 * 60 * 24 * 15); |
229 | - $this->logger->debug('Invalidating remembered session tokens older than ' . date('c', $rememberThreshold), ['app' => 'cron']); |
|
229 | + $this->logger->debug('Invalidating remembered session tokens older than '.date('c', $rememberThreshold), ['app' => 'cron']); |
|
230 | 230 | $this->mapper->invalidateOld($rememberThreshold, IToken::REMEMBER); |
231 | 231 | } |
232 | 232 | |
@@ -298,7 +298,7 @@ discard block |
||
298 | 298 | } |
299 | 299 | |
300 | 300 | private function hashPassword(string $password): string { |
301 | - return $this->hasher->hash(sha1($password) . $password); |
|
301 | + return $this->hasher->hash(sha1($password).$password); |
|
302 | 302 | } |
303 | 303 | |
304 | 304 | public function rotate(IToken $token, string $oldTokenId, string $newTokenId): IToken { |
@@ -321,7 +321,7 @@ discard block |
||
321 | 321 | |
322 | 322 | private function encrypt(string $plaintext, string $token): string { |
323 | 323 | $secret = $this->config->getSystemValue('secret'); |
324 | - return $this->crypto->encrypt($plaintext, $token . $secret); |
|
324 | + return $this->crypto->encrypt($plaintext, $token.$secret); |
|
325 | 325 | } |
326 | 326 | |
327 | 327 | /** |
@@ -330,7 +330,7 @@ discard block |
||
330 | 330 | private function decrypt(string $cipherText, string $token): string { |
331 | 331 | $secret = $this->config->getSystemValue('secret'); |
332 | 332 | try { |
333 | - return $this->crypto->decrypt($cipherText, $token . $secret); |
|
333 | + return $this->crypto->decrypt($cipherText, $token.$secret); |
|
334 | 334 | } catch (\Exception $ex) { |
335 | 335 | // Retry with empty secret as a fallback for instances where the secret might not have been set by accident |
336 | 336 | try { |
@@ -338,7 +338,7 @@ discard block |
||
338 | 338 | } catch (\Exception $ex2) { |
339 | 339 | // Delete the invalid token |
340 | 340 | $this->invalidateToken($token); |
341 | - throw new InvalidTokenException("Could not decrypt token password: " . $ex->getMessage(), 0, $ex2); |
|
341 | + throw new InvalidTokenException("Could not decrypt token password: ".$ex->getMessage(), 0, $ex2); |
|
342 | 342 | } |
343 | 343 | } |
344 | 344 | } |
@@ -359,7 +359,7 @@ discard block |
||
359 | 359 | |
360 | 360 | private function hashToken(string $token): string { |
361 | 361 | $secret = $this->config->getSystemValue('secret'); |
362 | - return hash('sha512', $token . $secret); |
|
362 | + return hash('sha512', $token.$secret); |
|
363 | 363 | } |
364 | 364 | |
365 | 365 | /** |
@@ -461,7 +461,7 @@ discard block |
||
461 | 461 | if (!isset($hashNeedsUpdate[$t->getPasswordHash()])) { |
462 | 462 | if ($t->getPasswordHash() === null) { |
463 | 463 | $hashNeedsUpdate[$t->getPasswordHash() ?: ''] = true; |
464 | - } elseif (!$this->hasher->verify(sha1($password) . $password, $t->getPasswordHash())) { |
|
464 | + } elseif (!$this->hasher->verify(sha1($password).$password, $t->getPasswordHash())) { |
|
465 | 465 | $hashNeedsUpdate[$t->getPasswordHash() ?: ''] = true; |
466 | 466 | } else { |
467 | 467 | $hashNeedsUpdate[$t->getPasswordHash() ?: ''] = false; |
@@ -488,6 +488,6 @@ discard block |
||
488 | 488 | while ($error = openssl_error_string()) { |
489 | 489 | $errors[] = $error; |
490 | 490 | } |
491 | - $this->logger->critical('Something is wrong with your openssl setup: ' . implode(', ', $errors)); |
|
491 | + $this->logger->critical('Something is wrong with your openssl setup: '.implode(', ', $errors)); |
|
492 | 492 | } |
493 | 493 | } |