@@ -46,7 +46,7 @@ |
||
| 46 | 46 | $certsRepository = $this->sqlOauth->getRepository(Cert::class); |
| 47 | 47 | |
| 48 | 48 | $actualCerts = $certsRepository->findBy([], ['createdAt' => 'DESC'], 2); |
| 49 | - if(!isset($actualCerts[0])) { |
|
| 49 | + if (!isset($actualCerts[0])) { |
|
| 50 | 50 | list('privKey' => $privKey, 'pubKey' => $pubKey, 'rsa' => $rsa) = $this->generateRSAKeys(); |
| 51 | 51 | |
| 52 | 52 | $oldCert = new Cert(); |
@@ -30,12 +30,12 @@ |
||
| 30 | 30 | { |
| 31 | 31 | $missingClaims = array_diff(self::REQUIRED_CLAIMS, array_keys($claims)); |
| 32 | 32 | if (!empty($missingClaims)) { |
| 33 | - throw new \Exception('Missing claims : ' . implode(', ', $missingClaims)); |
|
| 33 | + throw new \Exception('Missing claims : '.implode(', ', $missingClaims)); |
|
| 34 | 34 | } |
| 35 | 35 | |
| 36 | 36 | $undefinedClaims = array_diff(array_keys($claims), self::DEFINED_CLAIMS); |
| 37 | 37 | if (!empty($undefinedClaims)) { |
| 38 | - throw new \Exception('Undefined claims : ' . implode(', ', $undefinedClaims)); |
|
| 38 | + throw new \Exception('Undefined claims : '.implode(', ', $undefinedClaims)); |
|
| 39 | 39 | } |
| 40 | 40 | |
| 41 | 41 | // todo check nonce required if present in authentication request |
@@ -445,7 +445,7 @@ |
||
| 445 | 445 | { |
| 446 | 446 | $getter = 'get'.ucfirst($this->snakeToCamel($offset)); |
| 447 | 447 | $result = $this->{$getter}(); |
| 448 | - if(is_object($result)) { |
|
| 448 | + if (is_object($result)) { |
|
| 449 | 449 | return json_encode($result); |
| 450 | 450 | } |
| 451 | 451 | return $result; |
@@ -142,22 +142,22 @@ |
||
| 142 | 142 | function jsonSerialize() |
| 143 | 143 | { |
| 144 | 144 | $data = []; |
| 145 | - if($this->formatted) { |
|
| 145 | + if ($this->formatted) { |
|
| 146 | 146 | $data['formatted'] = $this->formatted; |
| 147 | 147 | } |
| 148 | - if($this->streetAddress) { |
|
| 148 | + if ($this->streetAddress) { |
|
| 149 | 149 | $data['street_address'] = $this->streetAddress; |
| 150 | 150 | } |
| 151 | - if($this->locality) { |
|
| 151 | + if ($this->locality) { |
|
| 152 | 152 | $data['locality'] = $this->locality; |
| 153 | 153 | } |
| 154 | - if($this->region) { |
|
| 154 | + if ($this->region) { |
|
| 155 | 155 | $data['region'] = $this->region; |
| 156 | 156 | } |
| 157 | - if($this->postalCode) { |
|
| 157 | + if ($this->postalCode) { |
|
| 158 | 158 | $data['postal_code'] = $this->postalCode; |
| 159 | 159 | } |
| 160 | - if($this->country) { |
|
| 160 | + if ($this->country) { |
|
| 161 | 161 | $data['country'] = $this->country; |
| 162 | 162 | } |
| 163 | 163 | return empty($data) ? '' : json_encode($data); |
@@ -75,7 +75,7 @@ |
||
| 75 | 75 | $clientCredentialsGrantType = new ClientCredentialsGrantType($scopePolicyManager, $accessTokenStorage); |
| 76 | 76 | $resourceOwnerPasswordCredentialsGrantType = new ResourceOwnerPasswordCredentialsGrantType( |
| 77 | 77 | $resourceOwnerProvider, $scopePolicyManager, $accessTokenStorage, $refreshTokenStorage); |
| 78 | - $refreshTokenGrantType = new RefreshTokenGrantType($configurationRepository , $scopePolicyManager, $accessTokenStorage, $refreshTokenStorage); |
|
| 78 | + $refreshTokenGrantType = new RefreshTokenGrantType($configurationRepository, $scopePolicyManager, $accessTokenStorage, $refreshTokenStorage); |
|
| 79 | 79 | return [ |
| 80 | 80 | $authorizationCodeGrantType->getUri() => $authorizationCodeGrantType, |
| 81 | 81 | $clientCredentialsGrantType->getUri() => $clientCredentialsGrantType, |
@@ -40,7 +40,7 @@ discard block |
||
| 40 | 40 | public function __construct(array $config = []) |
| 41 | 41 | { |
| 42 | 42 | if (array_diff(self::MINIMAL_CONFIG, array_keys($config))) { |
| 43 | - throw new \Exception('Missing minimal configuration. Required : ' . implode(', ', self::MINIMAL_CONFIG)); |
|
| 43 | + throw new \Exception('Missing minimal configuration. Required : '.implode(', ', self::MINIMAL_CONFIG)); |
|
| 44 | 44 | } |
| 45 | 45 | |
| 46 | 46 | $this->config = array_merge(self::DEFAULT_CONFIG, $config); |
@@ -52,7 +52,7 @@ discard block |
||
| 52 | 52 | * @throws \Exception |
| 53 | 53 | */ |
| 54 | 54 | public function getConfig(string $name) { |
| 55 | - if(!array_key_exists($name, $this->config)) { |
|
| 55 | + if (!array_key_exists($name, $this->config)) { |
|
| 56 | 56 | throw new \Exception("Unknown config '$name' in ".implode(', ', array_keys($this->config))); |
| 57 | 57 | } |
| 58 | 58 | return $this->config[$name]; |
@@ -34,10 +34,10 @@ discard block |
||
| 34 | 34 | public function __construct(array $storages) |
| 35 | 35 | { |
| 36 | 36 | foreach (static::STORAGES_INTERFACES as $name => $interface) { |
| 37 | - if(!isset($storages[$name])) { |
|
| 37 | + if (!isset($storages[$name])) { |
|
| 38 | 38 | throw new \Exception("Missing storage '$name'"); |
| 39 | 39 | } |
| 40 | - if(!is_a($storages[$name], $interface)) { |
|
| 40 | + if (!is_a($storages[$name], $interface)) { |
|
| 41 | 41 | throw new \Exception("Storage '$name' must implement '$interface'"); |
| 42 | 42 | } |
| 43 | 43 | $this->storages[$name] = $storages[$name]; |
@@ -50,7 +50,7 @@ discard block |
||
| 50 | 50 | * @throws \Exception |
| 51 | 51 | */ |
| 52 | 52 | public function getStorage(string $name) { |
| 53 | - if(!isset($this->storages[$name])) { |
|
| 53 | + if (!isset($this->storages[$name])) { |
|
| 54 | 54 | throw new \Exception("Unknown storage '$name'"); |
| 55 | 55 | } |
| 56 | 56 | return $this->storages[$name]; |
@@ -29,7 +29,7 @@ |
||
| 29 | 29 | */ |
| 30 | 30 | public function __construct(array $authenticators) |
| 31 | 31 | { |
| 32 | - if(!isset($authenticators[ClientPasswordAuthenticator::class])) { |
|
| 32 | + if (!isset($authenticators[ClientPasswordAuthenticator::class])) { |
|
| 33 | 33 | throw new \Exception('Authorization server MUST support the HTTP Basic authentication scheme'); |
| 34 | 34 | } |
| 35 | 35 | $this->authenticators = $authenticators; |
@@ -49,7 +49,7 @@ discard block |
||
| 49 | 49 | */ |
| 50 | 50 | public function verifyScopes(ClientInterface $client, array $scopes): void |
| 51 | 51 | { |
| 52 | - if(empty($scopes)) { |
|
| 52 | + if (empty($scopes)) { |
|
| 53 | 53 | throw new OAuthException('invalid_scope', |
| 54 | 54 | 'The request scope is unknown.', |
| 55 | 55 | 'https://tools.ietf.org/html/rfc6749#section-4.1'); |
@@ -57,7 +57,7 @@ discard block |
||
| 57 | 57 | |
| 58 | 58 | if ($client instanceof RegisteredClient && is_array($client->getMetadata()->getScope())) { |
| 59 | 59 | $supportedScopes = explode(' ', $client->getMetadata()->getScope()); |
| 60 | - if(!empty(array_diff($scopes, $supportedScopes))) { |
|
| 60 | + if (!empty(array_diff($scopes, $supportedScopes))) { |
|
| 61 | 61 | throw new OAuthException('invalid_scope', |
| 62 | 62 | 'The request scope is invalid. Supported scopes : '.$client->getMetadata()->getScope(), |
| 63 | 63 | 'https://tools.ietf.org/html/rfc6749#section-4.1'); |