Passed
Push — master ( 0c0a9d...5256fe )
by Alexandre
01:49
created
src/OAuth2/GrantTypes/RefreshTokenGrantType.php 1 patch
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -65,18 +65,18 @@  discard block
 block discarded – undo
65 65
         }
66 66
 
67 67
         $refreshToken = $request->getParsedBody()['refresh_token'] ?? '';
68
-        if(!$refreshToken) {
68
+        if (!$refreshToken) {
69 69
             throw new OAuthException('invalid_request', 'Missing a required parameter : refresh_token',
70 70
                 'https://tools.ietf.org/html/rfc6749#section-4.3');
71 71
         }
72 72
 
73 73
         $refreshToken = $this->refreshTokenStorage->get($refreshToken);
74
-        if(!$refreshToken || $refreshToken->getClientId() !== $client->getIdentifier()) {
74
+        if (!$refreshToken || $refreshToken->getClientId() !== $client->getIdentifier()) {
75 75
             throw new OAuthException('invalid_grant', 'Refresh token is invalid',
76 76
                 'https://tools.ietf.org/html/rfc6749#section-4.3');
77 77
         }
78 78
 
79
-        if(!is_null($refreshToken->getExpiresAt()) && $refreshToken->getExpiresAt() < time()) {
79
+        if (!is_null($refreshToken->getExpiresAt()) && $refreshToken->getExpiresAt() < time()) {
80 80
             $this->refreshTokenStorage->revoke($refreshToken->getToken());
81 81
 
82 82
             throw new OAuthException('invalid_grant', 'Refresh token has expired',
@@ -84,16 +84,16 @@  discard block
 block discarded – undo
84 84
         }
85 85
 
86 86
         $includedScopes = isset($request->getParsedBody()['scope']) ? explode(' ', $request->getParsedBody()['scope']) : null;
87
-        if(is_array($includedScopes) && !empty(array_diff($includedScopes, explode(' ', $refreshToken->getToken())))) {
87
+        if (is_array($includedScopes) && !empty(array_diff($includedScopes, explode(' ', $refreshToken->getToken())))) {
88 88
             throw new OAuthException('invalid_scope',
89
-                'Some of scope included are not granted for this token. Scope granted : ' . $refreshToken->getScope(),
89
+                'Some of scope included are not granted for this token. Scope granted : '.$refreshToken->getScope(),
90 90
                 'https://tools.ietf.org/html/rfc6749#section-6');
91 91
         }
92 92
 
93 93
         // issue an access token token and, optionally, a refresh token
94 94
         $accessToken = $this->accessTokenStorage->create($client->getIdentifier(), $refreshToken->getUserId(), $refreshToken->getScope());
95 95
         $newRefreshToken = null;
96
-        if($this->configurationRepository->getConfig(Config::REGENERATE_REFRESH_TOKENS_AFTER_USE)) {
96
+        if ($this->configurationRepository->getConfig(Config::REGENERATE_REFRESH_TOKENS_AFTER_USE)) {
97 97
             $this->refreshTokenStorage->revoke($refreshToken->getToken());
98 98
             $newRefreshToken = $this->refreshTokenStorage->create(
99 99
                 $refreshToken->getClientId(), $refreshToken->getUserId(), $refreshToken->getScope())->getToken();
Please login to merge, or discard this patch.
src/OAuth2/GrantTypes/AuthorizationCodeGrantType.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -73,7 +73,7 @@
 block discarded – undo
73 73
 
74 74
         $this->authorizationCodeStorage->revoke($authorizationCode->getCode());
75 75
 
76
-        if($authorizationCode->getExpiresAt() < time()) {
76
+        if ($authorizationCode->getExpiresAt() < time()) {
77 77
             throw new OAuthException('invalid_grant', 'Authorization code has expired',
78 78
                 'https://tools.ietf.org/html/rfc6749#section-4.1.3');
79 79
         }
Please login to merge, or discard this patch.
src/OAuth2/EndpointMessages/Authorization/AuthorizationRequest.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -96,11 +96,11 @@
 block discarded – undo
96 96
      * @throws \Exception
97 97
      */
98 98
     public function validate() {
99
-        if(!$this->responseType) {
99
+        if (!$this->responseType) {
100 100
             throw new \Exception('Missing response_type parameter');
101 101
         }
102 102
 
103
-        if(!$this->clientId) {
103
+        if (!$this->clientId) {
104 104
             throw new \Exception('Missing client_id parameter');
105 105
         }
106 106
         return true;
Please login to merge, or discard this patch.
src/OAuth2/ResponseTypes/CodeResponseType.php 1 patch
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -44,7 +44,7 @@
 block discarded – undo
44 44
      * @throws OAuthException
45 45
      */
46 46
     public function handle(ServerRequestInterface $request, ResourceOwnerInterface $resourceOwner,
47
-                           RegisteredClient $client, ?array $scope = null, ?array $extendedResponseTypes = null): array
47
+                            RegisteredClient $client, ?array $scope = null, ?array $extendedResponseTypes = null): array
48 48
     {
49 49
         if (is_array($client->getSupportedGrantTypes()) && !in_array('authorization_code', $client->getSupportedGrantTypes())) {
50 50
             throw new OAuthException('unauthorized_client',
Please login to merge, or discard this patch.
src/OAuth2/ResponseTypes/ResponseTypeInterface.php 1 patch
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -28,7 +28,7 @@
 block discarded – undo
28 28
      * @return array
29 29
      */
30 30
     public function handle(ServerRequestInterface $request, ResourceOwnerInterface $resourceOwner,
31
-                           RegisteredClient $client, ?array $scope = null, ?array $extendedResponseTypes = null): array;
31
+                            RegisteredClient $client, ?array $scope = null, ?array $extendedResponseTypes = null): array;
32 32
 
33 33
     public function getDefaultResponseMode(): string;
34 34
     public function isQueryResponseModeSupported(): bool;
Please login to merge, or discard this patch.
src/OAuth2/OpenID/ResponseTypes/CodeResponseType.php 2 patches
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -40,7 +40,7 @@
 block discarded – undo
40 40
      * @return array
41 41
      */
42 42
     public function handle(ServerRequestInterface $request, ResourceOwnerInterface $resourceOwner,
43
-                           RegisteredClient $client, ?array $scope = null, ?array $extendedResponseTypes = null): array
43
+                            RegisteredClient $client, ?array $scope = null, ?array $extendedResponseTypes = null): array
44 44
     {
45 45
         // TODO: Implement handle() method.
46 46
     }
Please login to merge, or discard this patch.
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -62,7 +62,7 @@
 block discarded – undo
62 62
 
63 63
         }
64 64
 
65
-        if(!$state && $this->configurationRepository->getConfig(Config::ENFORCE_STATE)) {
65
+        if (!$state && $this->configurationRepository->getConfig(Config::ENFORCE_STATE)) {
66 66
             throw new OAuthException('invalid_request',
67 67
                 'Missing a required parameter : state',
68 68
                 'http://openid.net/specs/openid-connect-core-1_0.html#AuthorizationEndpoint'
Please login to merge, or discard this patch.
src/OAuth2/OpenID/ResponseTypes/IdTokenResponseType.php 2 patches
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -33,7 +33,7 @@
 block discarded – undo
33 33
      * @return array
34 34
      */
35 35
     public function handle(ServerRequestInterface $request, ResourceOwnerInterface $resourceOwner,
36
-                           RegisteredClient $client, ?array $scope = null, ?array $extendedResponseTypes = null): array
36
+                            RegisteredClient $client, ?array $scope = null, ?array $extendedResponseTypes = null): array
37 37
     {
38 38
         $claims = [];
39 39
 
Please login to merge, or discard this patch.
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -37,12 +37,12 @@
 block discarded – undo
37 37
     {
38 38
         $claims = [];
39 39
 
40
-        if(isset($extendedResponseTypes['code'])) {
40
+        if (isset($extendedResponseTypes['code'])) {
41 41
             //c_hash
42 42
             $code = $extendedResponseTypes['code']->handle()['code'];
43 43
             $result['code'] = $code;
44 44
         }
45
-        if(isset($extendedResponseTypes['token'])) {
45
+        if (isset($extendedResponseTypes['token'])) {
46 46
             //at_hash
47 47
             $token = $extendedResponseTypes['token']->handle()['token'];
48 48
             $result['token'] = $token;
Please login to merge, or discard this patch.
src/OAuth2/OpenID/ResponseTypes/NoneResponseType.php 1 patch
Indentation   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -30,7 +30,7 @@  discard block
 block discarded – undo
30 30
      * @return array
31 31
      */
32 32
     public function handle(ServerRequestInterface $request, ResourceOwnerInterface $resourceOwner,
33
-                           RegisteredClient $client, ?array $scope = null, ?array $extendedResponseTypes = null): array
33
+                            RegisteredClient $client, ?array $scope = null, ?array $extendedResponseTypes = null): array
34 34
     {
35 35
         return [];
36 36
     }
@@ -63,6 +63,6 @@  discard block
 block discarded – undo
63 63
 
64 64
     public function getExtendedResponseTypes(): ?array
65 65
     {
66
-       return null;
66
+        return null;
67 67
     }
68 68
 }
69 69
\ No newline at end of file
Please login to merge, or discard this patch.
src/OAuth2/OpenID/Credentials/IdToken.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -30,12 +30,12 @@
 block discarded – undo
30 30
     {
31 31
         $missingClaims = array_diff(self::REQUIRED_CLAIMS, array_keys($claims));
32 32
         if (!empty($missingClaims)) {
33
-            throw new \Exception('Missing claims : ' . implode(', ', $missingClaims));
33
+            throw new \Exception('Missing claims : '.implode(', ', $missingClaims));
34 34
         }
35 35
 
36 36
         $undefinedClaims = array_diff(array_keys($claims), self::DEFINED_CLAIMS);
37 37
         if (!empty($undefinedClaims)) {
38
-            throw new \Exception('Undefined claims : ' . implode(', ', $undefinedClaims));
38
+            throw new \Exception('Undefined claims : '.implode(', ', $undefinedClaims));
39 39
         }
40 40
 
41 41
         // todo check nonce required if present in authentication request
Please login to merge, or discard this patch.