@@ -35,7 +35,7 @@ |
||
35 | 35 | */ |
36 | 36 | public function getAuthenticatorName() |
37 | 37 | { |
38 | - return _t(__CLASS__ . '.AUTHENTICATORNAME', 'SAML'); |
|
38 | + return _t(__CLASS__.'.AUTHENTICATORNAME', 'SAML'); |
|
39 | 39 | } |
40 | 40 | |
41 | 41 | /** |
@@ -21,7 +21,7 @@ |
||
21 | 21 | ]; |
22 | 22 | |
23 | 23 | private static $dependencies = [ |
24 | - 'helper' => '%$' . SAMLHelper::class |
|
24 | + 'helper' => '%$'.SAMLHelper::class |
|
25 | 25 | ]; |
26 | 26 | |
27 | 27 | /** |
@@ -74,7 +74,7 @@ discard block |
||
74 | 74 | |
75 | 75 | $conf['sp']['entityId'] = $sp['entityId']; |
76 | 76 | $conf['sp']['assertionConsumerService'] = [ |
77 | - 'url' => $sp['entityId'] . '/saml/acs', |
|
77 | + 'url' => $sp['entityId'].'/saml/acs', |
|
78 | 78 | 'binding' => Constants::BINDING_HTTP_POST |
79 | 79 | ]; |
80 | 80 | $conf['sp']['NameIDFormat'] = isset($sp['nameIdFormat']) ? |
@@ -108,7 +108,7 @@ discard block |
||
108 | 108 | $authnContexts = $this->config()->get('authn_contexts'); |
109 | 109 | $disableAuthnContexts = $this->config()->get('disable_authn_contexts'); |
110 | 110 | |
111 | - if ((bool)$disableAuthnContexts) { |
|
111 | + if ((bool) $disableAuthnContexts) { |
|
112 | 112 | $authnContexts = false; |
113 | 113 | } else { |
114 | 114 | if (!is_array($authnContexts)) { |
@@ -165,7 +165,7 @@ discard block |
||
165 | 165 | if (!isset($attributes[$claim][0])) { |
166 | 166 | $this->getLogger()->warning( |
167 | 167 | sprintf( |
168 | - 'Claim rule \'%s\' configured in SAMLMemberExtension.claims_field_mappings, ' . |
|
168 | + 'Claim rule \'%s\' configured in SAMLMemberExtension.claims_field_mappings, '. |
|
169 | 169 | 'but wasn\'t passed through. Please check IdP claim rules.', |
170 | 170 | $claim |
171 | 171 | ) |
@@ -210,7 +210,7 @@ discard block |
||
210 | 210 | echo $metadata; |
211 | 211 | } else { |
212 | 212 | throw new Error( |
213 | - 'Invalid SP metadata: ' . implode(', ', $errors), |
|
213 | + 'Invalid SP metadata: '.implode(', ', $errors), |
|
214 | 214 | Error::METADATA_SP_INVALID |
215 | 215 | ); |
216 | 216 | } |
@@ -239,7 +239,7 @@ discard block |
||
239 | 239 | |
240 | 240 | // If a default login dest has been set, redirect to that. |
241 | 241 | if (Security::config()->default_login_dest) { |
242 | - return $this->redirect(Director::absoluteBaseURL() . Security::config()->default_login_dest); |
|
242 | + return $this->redirect(Director::absoluteBaseURL().Security::config()->default_login_dest); |
|
243 | 243 | } |
244 | 244 | |
245 | 245 | // fallback to redirect back to home page |
@@ -29,7 +29,7 @@ discard block |
||
29 | 29 | * @var array |
30 | 30 | */ |
31 | 31 | private static $dependencies = [ |
32 | - 'SAMLConfService' => '%$' . SAMLConfiguration::class, |
|
32 | + 'SAMLConfService' => '%$'.SAMLConfiguration::class, |
|
33 | 33 | ]; |
34 | 34 | |
35 | 35 | /** |
@@ -73,7 +73,7 @@ discard block |
||
73 | 73 | } |
74 | 74 | |
75 | 75 | try { |
76 | - $auth->login(Director::absoluteBaseURL() . 'saml/'); |
|
76 | + $auth->login(Director::absoluteBaseURL().'saml/'); |
|
77 | 77 | } catch (Exception $e) { |
78 | 78 | /** @var LoggerInterface $logger */ |
79 | 79 | $logger = Injector::inst()->get(LoggerInterface::class); |
@@ -121,8 +121,8 @@ discard block |
||
121 | 121 | for ($k = 1; $k <= 2; ++$k) { |
122 | 122 | $hex_guid_to_guid_str .= substr($hex_guid, 16 - 2 * $k, 2); |
123 | 123 | } |
124 | - $hex_guid_to_guid_str .= '-' . substr($hex_guid, 16, 4); |
|
125 | - $hex_guid_to_guid_str .= '-' . substr($hex_guid, 20); |
|
124 | + $hex_guid_to_guid_str .= '-'.substr($hex_guid, 16, 4); |
|
125 | + $hex_guid_to_guid_str .= '-'.substr($hex_guid, 20); |
|
126 | 126 | return strtoupper($hex_guid_to_guid_str); |
127 | 127 | } |
128 | 128 | } |