Completed
Pull Request — master (#11)
by Matt
04:56
created
src/Authenticators/SAMLLoginHandler.php 1 patch
Spacing   +1 added lines, -1 removed lines patch added patch discarded remove patch
@@ -21,7 +21,7 @@
 block discarded – undo
21 21
     ];
22 22
 
23 23
     private static $dependencies = [
24
-        'helper' => '%$' . SAMLHelper::class
24
+        'helper' => '%$'.SAMLHelper::class
25 25
     ];
26 26
 
27 27
     /**
Please login to merge, or discard this patch.
src/Control/SAMLController.php 1 patch
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -72,7 +72,7 @@  discard block
 block discarded – undo
72 72
         try {
73 73
             $auth->processResponse();
74 74
             $error = $auth->getLastErrorReason();
75
-        } catch(Exception $e) {
75
+        } catch (Exception $e) {
76 76
             $caughtException = $e;
77 77
         }
78 78
 
@@ -147,7 +147,7 @@  discard block
 block discarded – undo
147 147
             if (!isset($attributes[$claim][0])) {
148 148
                 $this->getLogger()->warning(
149 149
                     sprintf(
150
-                        'Claim rule \'%s\' configured in LDAPMember.claims_field_mappings, ' .
150
+                        'Claim rule \'%s\' configured in LDAPMember.claims_field_mappings, '.
151 151
                                 'but wasn\'t passed through. Please check IdP claim rules.',
152 152
                         $claim
153 153
                     )
@@ -192,7 +192,7 @@  discard block
 block discarded – undo
192 192
                 echo $metadata;
193 193
             } else {
194 194
                 throw new \OneLogin_Saml2_Error(
195
-                    'Invalid SP metadata: ' . implode(', ', $errors),
195
+                    'Invalid SP metadata: '.implode(', ', $errors),
196 196
                     \OneLogin_Saml2_Error::METADATA_SP_INVALID
197 197
                 );
198 198
             }
@@ -221,7 +221,7 @@  discard block
 block discarded – undo
221 221
 
222 222
         // If a default login dest has been set, redirect to that.
223 223
         if (Security::config()->default_login_dest) {
224
-            return $this->redirect(Director::absoluteBaseURL() . Security::config()->default_login_dest);
224
+            return $this->redirect(Director::absoluteBaseURL().Security::config()->default_login_dest);
225 225
         }
226 226
 
227 227
         // fallback to redirect back to home page
Please login to merge, or discard this patch.
src/Services/SAMLConfiguration.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -74,7 +74,7 @@  discard block
 block discarded – undo
74 74
 
75 75
         $conf['sp']['entityId'] = $sp['entityId'];
76 76
         $conf['sp']['assertionConsumerService'] = [
77
-            'url' => $sp['entityId'] . '/saml/acs',
77
+            'url' => $sp['entityId'].'/saml/acs',
78 78
             'binding' => OneLogin_Saml2_Constants::BINDING_HTTP_POST
79 79
         ];
80 80
         $conf['sp']['NameIDFormat'] = isset($sp['nameIdFormat']) ?
@@ -108,7 +108,7 @@  discard block
 block discarded – undo
108 108
         $authnContexts = $this->config()->get('authn_contexts');
109 109
         $disableAuthnContexts = $this->config()->get('disable_authn_contexts');
110 110
 
111
-        if ((bool)$disableAuthnContexts) {
111
+        if ((bool) $disableAuthnContexts) {
112 112
             $authnContexts = false;
113 113
         } else {
114 114
             if (!is_array($authnContexts)) {
Please login to merge, or discard this patch.