| @@ -35,7 +35,7 @@ | ||
| 35 | 35 | */ | 
| 36 | 36 | public function getAuthenticatorName() | 
| 37 | 37 |      { | 
| 38 | - return _t(__CLASS__ . '.AUTHENTICATORNAME', 'SAML'); | |
| 38 | + return _t(__CLASS__.'.AUTHENTICATORNAME', 'SAML'); | |
| 39 | 39 | } | 
| 40 | 40 | |
| 41 | 41 | /** | 
| @@ -20,7 +20,7 @@ discard block | ||
| 20 | 20 | * @var array | 
| 21 | 21 | */ | 
| 22 | 22 | private static $dependencies = [ | 
| 23 | - 'SAMLConfService' => '%$' . SAMLConfiguration::class, | |
| 23 | + 'SAMLConfService' => '%$'.SAMLConfiguration::class, | |
| 24 | 24 | ]; | 
| 25 | 25 | |
| 26 | 26 | /** | 
| @@ -70,8 +70,8 @@ discard block | ||
| 70 | 70 |          for ($k = 1; $k <= 2; ++$k) { | 
| 71 | 71 | $hex_guid_to_guid_str .= substr($hex_guid, 16 - 2 * $k, 2); | 
| 72 | 72 | } | 
| 73 | - $hex_guid_to_guid_str .= '-' . substr($hex_guid, 16, 4); | |
| 74 | - $hex_guid_to_guid_str .= '-' . substr($hex_guid, 20); | |
| 73 | + $hex_guid_to_guid_str .= '-'.substr($hex_guid, 16, 4); | |
| 74 | + $hex_guid_to_guid_str .= '-'.substr($hex_guid, 20); | |
| 75 | 75 | return strtoupper($hex_guid_to_guid_str); | 
| 76 | 76 | } | 
| 77 | 77 | } | 
| @@ -21,7 +21,7 @@ | ||
| 21 | 21 | ]; | 
| 22 | 22 | |
| 23 | 23 | private static $dependencies = [ | 
| 24 | - 'helper' => '%$' . SAMLHelper::class | |
| 24 | + 'helper' => '%$'.SAMLHelper::class | |
| 25 | 25 | ]; | 
| 26 | 26 | |
| 27 | 27 | /** | 
| @@ -74,7 +74,7 @@ discard block | ||
| 74 | 74 | |
| 75 | 75 | $conf['sp']['entityId'] = $sp['entityId']; | 
| 76 | 76 | $conf['sp']['assertionConsumerService'] = [ | 
| 77 | - 'url' => $sp['entityId'] . '/saml/acs', | |
| 77 | + 'url' => $sp['entityId'].'/saml/acs', | |
| 78 | 78 | 'binding' => Constants::BINDING_HTTP_POST | 
| 79 | 79 | ]; | 
| 80 | 80 | $conf['sp']['NameIDFormat'] = isset($sp['nameIdFormat']) ? | 
| @@ -108,7 +108,7 @@ discard block | ||
| 108 | 108 |          $authnContexts = $this->config()->get('authn_contexts'); | 
| 109 | 109 |          $disableAuthnContexts = $this->config()->get('disable_authn_contexts'); | 
| 110 | 110 | |
| 111 | -        if ((bool)$disableAuthnContexts) { | |
| 111 | +        if ((bool) $disableAuthnContexts) { | |
| 112 | 112 | $authnContexts = false; | 
| 113 | 113 |          } else { | 
| 114 | 114 |              if (!is_array($authnContexts)) { | 
| @@ -167,7 +167,7 @@ discard block | ||
| 167 | 167 | } | 
| 168 | 168 | |
| 169 | 169 | $member->GUID = $guid; | 
| 170 | -        } else if(!($member && $member->exists())) { | |
| 170 | +        } else if (!($member && $member->exists())) { | |
| 171 | 171 | // If the member doesn't exist and we don't allow linking via email, then create a new member | 
| 172 | 172 | $member = new Member(); | 
| 173 | 173 | $member->GUID = $guid; | 
| @@ -177,7 +177,7 @@ discard block | ||
| 177 | 177 |              if (!isset($attributes[$claim][0])) { | 
| 178 | 178 | $this->getLogger()->warning( | 
| 179 | 179 | sprintf( | 
| 180 | - 'Claim rule \'%s\' configured in SAMLMemberExtension.claims_field_mappings, ' . | |
| 180 | + 'Claim rule \'%s\' configured in SAMLMemberExtension.claims_field_mappings, '. | |
| 181 | 181 | 'but wasn\'t passed through. Please check IdP claim rules.', | 
| 182 | 182 | $claim | 
| 183 | 183 | ) | 
| @@ -223,7 +223,7 @@ discard block | ||
| 223 | 223 | echo $metadata; | 
| 224 | 224 |              } else { | 
| 225 | 225 | throw new Error( | 
| 226 | -                    'Invalid SP metadata: ' . implode(', ', $errors), | |
| 226 | +                    'Invalid SP metadata: '.implode(', ', $errors), | |
| 227 | 227 | Error::METADATA_SP_INVALID | 
| 228 | 228 | ); | 
| 229 | 229 | } | 
| @@ -252,7 +252,7 @@ discard block | ||
| 252 | 252 | |
| 253 | 253 | // If a default login dest has been set, redirect to that. | 
| 254 | 254 |          if (Security::config()->default_login_dest) { | 
| 255 | - return $this->redirect(Director::absoluteBaseURL() . Security::config()->default_login_dest); | |
| 255 | + return $this->redirect(Director::absoluteBaseURL().Security::config()->default_login_dest); | |
| 256 | 256 | } | 
| 257 | 257 | |
| 258 | 258 | // fallback to redirect back to home page |