@@ -74,7 +74,7 @@ discard block |
||
74 | 74 | |
75 | 75 | $conf['sp']['entityId'] = $sp['entityId']; |
76 | 76 | $conf['sp']['assertionConsumerService'] = [ |
77 | - 'url' => $sp['entityId'] . '/saml/acs', |
|
77 | + 'url' => $sp['entityId'].'/saml/acs', |
|
78 | 78 | 'binding' => Constants::BINDING_HTTP_POST |
79 | 79 | ]; |
80 | 80 | $conf['sp']['NameIDFormat'] = isset($sp['nameIdFormat']) ? |
@@ -108,7 +108,7 @@ discard block |
||
108 | 108 | $authnContexts = $this->config()->get('authn_contexts'); |
109 | 109 | $disableAuthnContexts = $this->config()->get('disable_authn_contexts'); |
110 | 110 | |
111 | - if ((bool)$disableAuthnContexts) { |
|
111 | + if ((bool) $disableAuthnContexts) { |
|
112 | 112 | $authnContexts = false; |
113 | 113 | } else { |
114 | 114 | if (!is_array($authnContexts)) { |
@@ -148,7 +148,7 @@ discard block |
||
148 | 148 | if (!isset($attributes[$claim][0])) { |
149 | 149 | $this->getLogger()->warning( |
150 | 150 | sprintf( |
151 | - 'Claim rule \'%s\' configured in LDAPMember.claims_field_mappings, ' . |
|
151 | + 'Claim rule \'%s\' configured in LDAPMember.claims_field_mappings, '. |
|
152 | 152 | 'but wasn\'t passed through. Please check IdP claim rules.', |
153 | 153 | $claim |
154 | 154 | ) |
@@ -193,7 +193,7 @@ discard block |
||
193 | 193 | echo $metadata; |
194 | 194 | } else { |
195 | 195 | throw new Error( |
196 | - 'Invalid SP metadata: ' . implode(', ', $errors), |
|
196 | + 'Invalid SP metadata: '.implode(', ', $errors), |
|
197 | 197 | Error::METADATA_SP_INVALID |
198 | 198 | ); |
199 | 199 | } |
@@ -222,7 +222,7 @@ discard block |
||
222 | 222 | |
223 | 223 | // If a default login dest has been set, redirect to that. |
224 | 224 | if (Security::config()->default_login_dest) { |
225 | - return $this->redirect(Director::absoluteBaseURL() . Security::config()->default_login_dest); |
|
225 | + return $this->redirect(Director::absoluteBaseURL().Security::config()->default_login_dest); |
|
226 | 226 | } |
227 | 227 | |
228 | 228 | // fallback to redirect back to home page |