Passed
Push — master ( 958228...8f50ae )
by Alexandre
01:44
created
src/OAuth2/Extensions/PKCE/Credentials/AuthorizationCode.php 1 patch
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -24,7 +24,7 @@
 block discarded – undo
24 24
                                 int $expiresAt, ?string $requestedScope = null, ?string $redirectUri = null,
25 25
                                 ?string $codeChallenge = null, ?string $codeChallengeMethod = null)
26 26
     {
27
-       parent::__construct($code, $scope, $clientIdentifier, $resourceOwnerIdentifier, $expiresAt, $requestedScope, $redirectUri);
27
+        parent::__construct($code, $scope, $clientIdentifier, $resourceOwnerIdentifier, $expiresAt, $requestedScope, $redirectUri);
28 28
         $this->codeChallenge = $codeChallenge;
29 29
         $this->codeChallengeMethod = $codeChallengeMethod;
30 30
     }
Please login to merge, or discard this patch.
src/OAuth2/ScopePolicy/ScopePolicyManager.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -59,7 +59,7 @@
 block discarded – undo
59 59
             $supportedScopes = explode(' ', $client->getMetadata()->getScope());
60 60
             if (!empty(array_diff($scopes, $supportedScopes))) {
61 61
                 throw new OAuthException('invalid_scope',
62
-                    'The request scope is invalid. Supported scopes : ' . $client->getMetadata()->getScope(),
62
+                    'The request scope is invalid. Supported scopes : '.$client->getMetadata()->getScope(),
63 63
                     'https://tools.ietf.org/html/rfc6749#section-4.1');
64 64
             }
65 65
         }
Please login to merge, or discard this patch.
src/OAuth2/Extensions/OpenID/IdToken.php 1 patch
Indentation   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -25,7 +25,7 @@
 block discarded – undo
25 25
 
26 26
     function getClaims() : array
27 27
     {
28
-       return $this->claims;
28
+        return $this->claims;
29 29
     }
30 30
 
31 31
     /**
Please login to merge, or discard this patch.
src/OAuth2/Extensions/OpenID/Models/AddressClaim.php 1 patch
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -142,22 +142,22 @@
 block discarded – undo
142 142
     function jsonSerialize()
143 143
     {
144 144
         $data = [];
145
-        if($this->formatted) {
145
+        if ($this->formatted) {
146 146
             $data['formatted'] = $this->formatted;
147 147
         }
148
-        if($this->streetAddress) {
148
+        if ($this->streetAddress) {
149 149
             $data['street_address'] = $this->streetAddress;
150 150
         }
151
-        if($this->locality) {
151
+        if ($this->locality) {
152 152
             $data['locality'] = $this->locality;
153 153
         }
154
-        if($this->region) {
154
+        if ($this->region) {
155 155
             $data['region'] = $this->region;
156 156
         }
157
-        if($this->postalCode) {
157
+        if ($this->postalCode) {
158 158
             $data['postal_code'] = $this->postalCode;
159 159
         }
160
-        if($this->country) {
160
+        if ($this->country) {
161 161
             $data['country'] = $this->country;
162 162
         }
163 163
         return empty($data) ? '' : json_encode($data);
Please login to merge, or discard this patch.
src/OAuth2/Extensions/OpenID/Models/StandardClaims.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -445,7 +445,7 @@
 block discarded – undo
445 445
     {
446 446
         $getter = 'get'.ucfirst($this->snakeToCamel($offset));
447 447
         $result = $this->{$getter}();
448
-        if(is_object($result)) {
448
+        if (is_object($result)) {
449 449
             return json_encode($result);
450 450
         }
451 451
         return $result;
Please login to merge, or discard this patch.
src/OAuth2/Endpoints/AuthorizationEndpoint.php 1 patch
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -106,11 +106,11 @@  discard block
 block discarded – undo
106 106
             $this->responseType->verifyAuthorizationRequest($this, $requestData);
107 107
 
108 108
             // Authorization Server Authenticates End-User
109
-            if($response = $this->verifyResourceOwner()) {
109
+            if ($response = $this->verifyResourceOwner()) {
110 110
                 return $response;
111 111
             }
112 112
 
113
-            if($response = $this->verifyConsent()) {
113
+            if ($response = $this->verifyConsent()) {
114 114
                 return $response;
115 115
             }
116 116
 
@@ -187,7 +187,7 @@  discard block
 block discarded – undo
187 187
     {
188 188
         // set the default response in case of invalid response type
189 189
 
190
-        $this->responseMode =  $this->responseModeManager->getDefaultResponseMode();
190
+        $this->responseMode = $this->responseModeManager->getDefaultResponseMode();
191 191
 
192 192
         // response_type required
193 193
         if (empty($requestData['response_type'])) {
@@ -255,7 +255,7 @@  discard block
 block discarded – undo
255 255
 
256 256
             $this->redirectUri = $redirectUri;
257 257
         } catch (\InvalidArgumentException $e) {
258
-            throw new OAuthException('invalid_request', 'The request includes the malformed parameter redirect_uri. ' . $e->getMessage(),
258
+            throw new OAuthException('invalid_request', 'The request includes the malformed parameter redirect_uri. '.$e->getMessage(),
259 259
                 'https://tools.ietf.org/html/rfc6749#section-4.1');
260 260
         }
261 261
     }
Please login to merge, or discard this patch.
src/OAuth2/Extensions/OpenID/Endpoints/AuthorizationEndpoint.php 2 patches
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -96,11 +96,11 @@  discard block
 block discarded – undo
96 96
             return $this->resourceOwner->authenticate($this->prompt == self::PROMPT_SELECT_ACCOUNT, $this->loginHint);
97 97
         }
98 98
 
99
-        if($this->idTokenHint) {
99
+        if ($this->idTokenHint) {
100 100
             // check if user associated to this id token is the current user.
101 101
 //                var_dump($this->idTokenHint['sub']);die;
102
-            if($this->idTokenHint['sub'] !== $this->resourceOwner->getIdentifier()) {
103
-                if($this->prompt == self::PROMPT_NONE) {
102
+            if ($this->idTokenHint['sub'] !== $this->resourceOwner->getIdentifier()) {
103
+                if ($this->prompt == self::PROMPT_NONE) {
104 104
                     throw new OAuthException('invalid_request');
105 105
                 }
106 106
                 else {
@@ -160,7 +160,7 @@  discard block
 block discarded – undo
160 160
         $this->maxAge = empty($requestData['max_age']) ? null : $requestData['max_age'];
161 161
         $this->uiLocales = empty($requestData['ui_locales']) ? null : explode(' ', $requestData['ui_locales']);
162 162
 
163
-        if(!empty($requestData['id_token_hint'])) {
163
+        if (!empty($requestData['id_token_hint'])) {
164 164
             try {
165 165
                 $this->idTokenHint = $this->idTokenManager->decode($requestData['id_token_hint']);
166 166
             } catch (\Exception $exception) {
Please login to merge, or discard this patch.
Braces   +1 added lines, -2 removed lines patch added patch discarded remove patch
@@ -102,8 +102,7 @@
 block discarded – undo
102 102
             if($this->idTokenHint['sub'] !== $this->resourceOwner->getIdentifier()) {
103 103
                 if($this->prompt == self::PROMPT_NONE) {
104 104
                     throw new OAuthException('invalid_request');
105
-                }
106
-                else {
105
+                } else {
107 106
                     throw new OAuthException('login_required');
108 107
                 }
109 108
             }
Please login to merge, or discard this patch.
src/OAuth2/Extensions/OpenID/IdTokenManager.php 2 patches
Indentation   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -50,8 +50,8 @@
 block discarded – undo
50 50
     }
51 51
 
52 52
     public function issueIdToken(ClientInterface $client,
53
-                                 ResourceOwnerInterface $resourceOwner,
54
-                                 array $additionalClaims = []): string
53
+                                    ResourceOwnerInterface $resourceOwner,
54
+                                    array $additionalClaims = []): string
55 55
     {
56 56
         $metadata = $client->getMetadata();
57 57
 
Please login to merge, or discard this patch.
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -45,7 +45,7 @@  discard block
 block discarded – undo
45 45
     public function decode(string $idToken): IdTokenInterface
46 46
     {
47 47
         $claims = $this->jwt->decode($idToken, self::KEY, 'HS256');
48
-        $idToken = new IdToken((array)$claims);
48
+        $idToken = new IdToken((array) $claims);
49 49
         return $idToken;
50 50
     }
51 51
 
@@ -142,7 +142,7 @@  discard block
 block discarded – undo
142 142
             throw new \UnexpectedValueException('Client metadata Id token signed response alg value is unexpected. 
143 143
             It must end with "256", "384" or "513"');
144 144
         }
145
-        $macAlgorithm = 'sha' . $macAlgorithm;
145
+        $macAlgorithm = 'sha'.$macAlgorithm;
146 146
 
147 147
         $hash = hash($macAlgorithm, $target, true);
148 148
         $hash = substr($hash, 0, strlen($hash) / 2);
Please login to merge, or discard this patch.
src/OAuth2/Extensions/OpenID/Flows/ImplicitFlow.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -120,7 +120,7 @@
 block discarded – undo
120 120
         if (!in_array($macAlgorithm, [256, 384, 512])) {
121 121
             die("algotihmn not supported");
122 122
         }
123
-        $macAlgorithm = 'sha' . $macAlgorithm;
123
+        $macAlgorithm = 'sha'.$macAlgorithm;
124 124
 
125 125
 
126 126
         $atHash = hash($macAlgorithm, $accessToken['access_token'], true);
Please login to merge, or discard this patch.