Passed
Push — master ( 9a636e...af59f2 )
by Alexandre
03:34
created
src/OAuth2OLD/OpenID/encours/Test.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -46,7 +46,7 @@
 block discarded – undo
46 46
         $certsRepository = $this->sqlOauth->getRepository(Cert::class);
47 47
 
48 48
         $actualCerts = $certsRepository->findBy([], ['createdAt' => 'DESC'], 2);
49
-        if(!isset($actualCerts[0])) {
49
+        if (!isset($actualCerts[0])) {
50 50
             list('privKey' => $privKey, 'pubKey' => $pubKey, 'rsa' => $rsa) = $this->generateRSAKeys();
51 51
 
52 52
             $oldCert = new Cert();
Please login to merge, or discard this patch.
src/OAuth2OLD/OpenID/Credentials/IdToken.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -30,12 +30,12 @@
 block discarded – undo
30 30
     {
31 31
         $missingClaims = array_diff(self::REQUIRED_CLAIMS, array_keys($claims));
32 32
         if (!empty($missingClaims)) {
33
-            throw new \Exception('Missing claims : ' . implode(', ', $missingClaims));
33
+            throw new \Exception('Missing claims : '.implode(', ', $missingClaims));
34 34
         }
35 35
 
36 36
         $undefinedClaims = array_diff(array_keys($claims), self::DEFINED_CLAIMS);
37 37
         if (!empty($undefinedClaims)) {
38
-            throw new \Exception('Undefined claims : ' . implode(', ', $undefinedClaims));
38
+            throw new \Exception('Undefined claims : '.implode(', ', $undefinedClaims));
39 39
         }
40 40
 
41 41
         // todo check nonce required if present in authentication request
Please login to merge, or discard this patch.
src/OAuth2OLD/OpenID/Models/StandardClaims.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -445,7 +445,7 @@
 block discarded – undo
445 445
     {
446 446
         $getter = 'get'.ucfirst($this->snakeToCamel($offset));
447 447
         $result = $this->{$getter}();
448
-        if(is_object($result)) {
448
+        if (is_object($result)) {
449 449
             return json_encode($result);
450 450
         }
451 451
         return $result;
Please login to merge, or discard this patch.
src/OAuth2OLD/OpenID/Models/AddressClaim.php 1 patch
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -142,22 +142,22 @@
 block discarded – undo
142 142
     function jsonSerialize()
143 143
     {
144 144
         $data = [];
145
-        if($this->formatted) {
145
+        if ($this->formatted) {
146 146
             $data['formatted'] = $this->formatted;
147 147
         }
148
-        if($this->streetAddress) {
148
+        if ($this->streetAddress) {
149 149
             $data['street_address'] = $this->streetAddress;
150 150
         }
151
-        if($this->locality) {
151
+        if ($this->locality) {
152 152
             $data['locality'] = $this->locality;
153 153
         }
154
-        if($this->region) {
154
+        if ($this->region) {
155 155
             $data['region'] = $this->region;
156 156
         }
157
-        if($this->postalCode) {
157
+        if ($this->postalCode) {
158 158
             $data['postal_code'] = $this->postalCode;
159 159
         }
160
-        if($this->country) {
160
+        if ($this->country) {
161 161
             $data['country'] = $this->country;
162 162
         }
163 163
         return empty($data) ? '' : json_encode($data);
Please login to merge, or discard this patch.
src/OAuth2OLD/Repositories/GrantTypeRepository.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -75,7 +75,7 @@
 block discarded – undo
75 75
         $clientCredentialsGrantType = new ClientCredentialsGrantType($scopePolicyManager, $accessTokenStorage);
76 76
         $resourceOwnerPasswordCredentialsGrantType = new ResourceOwnerPasswordCredentialsGrantType(
77 77
             $resourceOwnerProvider, $scopePolicyManager, $accessTokenStorage, $refreshTokenStorage);
78
-        $refreshTokenGrantType = new RefreshTokenGrantType($configurationRepository , $scopePolicyManager, $accessTokenStorage, $refreshTokenStorage);
78
+        $refreshTokenGrantType = new RefreshTokenGrantType($configurationRepository, $scopePolicyManager, $accessTokenStorage, $refreshTokenStorage);
79 79
         return [
80 80
             $authorizationCodeGrantType->getUri() => $authorizationCodeGrantType,
81 81
             $clientCredentialsGrantType->getUri() => $clientCredentialsGrantType,
Please login to merge, or discard this patch.
src/OAuth2OLD/Repositories/ConfigurationRepository.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -40,7 +40,7 @@  discard block
 block discarded – undo
40 40
     public function __construct(array $config = [])
41 41
     {
42 42
         if (array_diff(self::MINIMAL_CONFIG, array_keys($config))) {
43
-            throw new \Exception('Missing minimal configuration. Required : ' . implode(', ', self::MINIMAL_CONFIG));
43
+            throw new \Exception('Missing minimal configuration. Required : '.implode(', ', self::MINIMAL_CONFIG));
44 44
         }
45 45
 
46 46
         $this->config = array_merge(self::DEFAULT_CONFIG, $config);
@@ -52,7 +52,7 @@  discard block
 block discarded – undo
52 52
      * @throws \Exception
53 53
      */
54 54
     public function getConfig(string $name) {
55
-        if(!array_key_exists($name, $this->config)) {
55
+        if (!array_key_exists($name, $this->config)) {
56 56
             throw new \Exception("Unknown config '$name' in ".implode(', ', array_keys($this->config)));
57 57
         }
58 58
         return $this->config[$name];
Please login to merge, or discard this patch.
src/OAuth2OLD/Repositories/StorageRepository.php 1 patch
Spacing   +3 added lines, -3 removed lines patch added patch discarded remove patch
@@ -34,10 +34,10 @@  discard block
 block discarded – undo
34 34
     public function __construct(array $storages)
35 35
     {
36 36
         foreach (static::STORAGES_INTERFACES as $name => $interface) {
37
-            if(!isset($storages[$name])) {
37
+            if (!isset($storages[$name])) {
38 38
                 throw new \Exception("Missing storage '$name'");
39 39
             }
40
-            if(!is_a($storages[$name], $interface)) {
40
+            if (!is_a($storages[$name], $interface)) {
41 41
                 throw new \Exception("Storage '$name' must implement '$interface'");
42 42
             }
43 43
             $this->storages[$name] = $storages[$name];
@@ -50,7 +50,7 @@  discard block
 block discarded – undo
50 50
      * @throws \Exception
51 51
      */
52 52
     public function getStorage(string $name) {
53
-        if(!isset($this->storages[$name])) {
53
+        if (!isset($this->storages[$name])) {
54 54
             throw new \Exception("Unknown storage '$name'");
55 55
         }
56 56
         return $this->storages[$name];
Please login to merge, or discard this patch.
src/OAuth2OLD/Repositories/ClientAuthenticatorRepository.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -29,7 +29,7 @@
 block discarded – undo
29 29
      */
30 30
     public function __construct(array $authenticators)
31 31
     {
32
-        if(!isset($authenticators[ClientPasswordAuthenticator::class])) {
32
+        if (!isset($authenticators[ClientPasswordAuthenticator::class])) {
33 33
             throw new \Exception('Authorization server MUST support the HTTP Basic authentication scheme');
34 34
         }
35 35
         $this->authenticators = $authenticators;
Please login to merge, or discard this patch.
src/OAuth2/ScopePolicy/ScopePolicyManager.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -49,7 +49,7 @@  discard block
 block discarded – undo
49 49
      */
50 50
     public function verifyScopes(ClientInterface $client, array $scopes): void
51 51
     {
52
-        if(empty($scopes)) {
52
+        if (empty($scopes)) {
53 53
             throw new OAuthException('invalid_scope',
54 54
                 'The request scope is unknown.',
55 55
                 'https://tools.ietf.org/html/rfc6749#section-4.1');
@@ -57,7 +57,7 @@  discard block
 block discarded – undo
57 57
 
58 58
         if ($client instanceof RegisteredClient && is_array($client->getMetadata()->getScope())) {
59 59
             $supportedScopes = explode(' ', $client->getMetadata()->getScope());
60
-            if(!empty(array_diff($scopes, $supportedScopes))) {
60
+            if (!empty(array_diff($scopes, $supportedScopes))) {
61 61
                 throw new OAuthException('invalid_scope',
62 62
                     'The request scope is invalid. Supported scopes : '.$client->getMetadata()->getScope(),
63 63
                     'https://tools.ietf.org/html/rfc6749#section-4.1');
Please login to merge, or discard this patch.