@@ -21,7 +21,7 @@ |
||
21 | 21 | ]; |
22 | 22 | |
23 | 23 | private static $dependencies = [ |
24 | - 'helper' => '%$' . SAMLHelper::class |
|
24 | + 'helper' => '%$'.SAMLHelper::class |
|
25 | 25 | ]; |
26 | 26 | |
27 | 27 | /** |
@@ -72,7 +72,7 @@ discard block |
||
72 | 72 | try { |
73 | 73 | $auth->processResponse(); |
74 | 74 | $error = $auth->getLastErrorReason(); |
75 | - } catch(Exception $e) { |
|
75 | + } catch (Exception $e) { |
|
76 | 76 | $caughtException = $e; |
77 | 77 | } |
78 | 78 | |
@@ -147,7 +147,7 @@ discard block |
||
147 | 147 | if (!isset($attributes[$claim][0])) { |
148 | 148 | $this->getLogger()->warning( |
149 | 149 | sprintf( |
150 | - 'Claim rule \'%s\' configured in LDAPMember.claims_field_mappings, ' . |
|
150 | + 'Claim rule \'%s\' configured in LDAPMember.claims_field_mappings, '. |
|
151 | 151 | 'but wasn\'t passed through. Please check IdP claim rules.', |
152 | 152 | $claim |
153 | 153 | ) |
@@ -192,7 +192,7 @@ discard block |
||
192 | 192 | echo $metadata; |
193 | 193 | } else { |
194 | 194 | throw new \OneLogin_Saml2_Error( |
195 | - 'Invalid SP metadata: ' . implode(', ', $errors), |
|
195 | + 'Invalid SP metadata: '.implode(', ', $errors), |
|
196 | 196 | \OneLogin_Saml2_Error::METADATA_SP_INVALID |
197 | 197 | ); |
198 | 198 | } |
@@ -221,7 +221,7 @@ discard block |
||
221 | 221 | |
222 | 222 | // If a default login dest has been set, redirect to that. |
223 | 223 | if (Security::config()->default_login_dest) { |
224 | - return $this->redirect(Director::absoluteBaseURL() . Security::config()->default_login_dest); |
|
224 | + return $this->redirect(Director::absoluteBaseURL().Security::config()->default_login_dest); |
|
225 | 225 | } |
226 | 226 | |
227 | 227 | // fallback to redirect back to home page |
@@ -74,7 +74,7 @@ discard block |
||
74 | 74 | |
75 | 75 | $conf['sp']['entityId'] = $sp['entityId']; |
76 | 76 | $conf['sp']['assertionConsumerService'] = [ |
77 | - 'url' => $sp['entityId'] . '/saml/acs', |
|
77 | + 'url' => $sp['entityId'].'/saml/acs', |
|
78 | 78 | 'binding' => OneLogin_Saml2_Constants::BINDING_HTTP_POST |
79 | 79 | ]; |
80 | 80 | $conf['sp']['NameIDFormat'] = isset($sp['nameIdFormat']) ? |
@@ -108,7 +108,7 @@ discard block |
||
108 | 108 | $authnContexts = $this->config()->get('authn_contexts'); |
109 | 109 | $disableAuthnContexts = $this->config()->get('disable_authn_contexts'); |
110 | 110 | |
111 | - if ((bool)$disableAuthnContexts) { |
|
111 | + if ((bool) $disableAuthnContexts) { |
|
112 | 112 | $authnContexts = false; |
113 | 113 | } else { |
114 | 114 | if (!is_array($authnContexts)) { |