@@ -62,11 +62,11 @@ |
||
62 | 62 | */ |
63 | 63 | private $encryptionKey; |
64 | 64 | |
65 | - /** |
|
66 | - * The earliest time this assertion is valid, as an UNIX timestamp. |
|
67 | - * |
|
68 | - * @var int |
|
69 | - */ |
|
65 | + /** |
|
66 | + * The earliest time this assertion is valid, as an UNIX timestamp. |
|
67 | + * |
|
68 | + * @var int |
|
69 | + */ |
|
70 | 70 | private $notBefore; |
71 | 71 | |
72 | 72 | /** |
@@ -48,7 +48,7 @@ |
||
48 | 48 | public function getPrivateKey($name, $required = false) |
49 | 49 | { |
50 | 50 | $privateKeys = $this->get('privateKeys'); |
51 | - $key = array_filter($privateKeys, function (PrivateKey $key) use ($name) { |
|
51 | + $key = array_filter($privateKeys, function(PrivateKey $key) use ($name) { |
|
52 | 52 | return $key->getName() === $name; |
53 | 53 | }); |
54 | 54 |
@@ -50,7 +50,7 @@ |
||
50 | 50 | public function getPrivateKey($name, $required = false) |
51 | 51 | { |
52 | 52 | $privateKeys = $this->get('privateKeys'); |
53 | - $key = array_filter($privateKeys, function (PrivateKey $key) use ($name) { |
|
53 | + $key = array_filter($privateKeys, function(PrivateKey $key) use ($name) { |
|
54 | 54 | return $key->getName() === $name; |
55 | 55 | }); |
56 | 56 |
@@ -53,7 +53,7 @@ |
||
53 | 53 | CertificateProvider $configuration |
54 | 54 | ) { |
55 | 55 | $logger = $this->logger; |
56 | - $pemCandidates = $this->configuredKeys->filter(function (Key $key) use ($logger) { |
|
56 | + $pemCandidates = $this->configuredKeys->filter(function(Key $key) use ($logger) { |
|
57 | 57 | if (!$key instanceof X509) { |
58 | 58 | $logger->debug(sprintf('Skipping unknown key type: "%s"', $key['type'])); |
59 | 59 | return false; |
@@ -49,21 +49,21 @@ discard block |
||
49 | 49 | $msg .= urlencode($msgStr); |
50 | 50 | |
51 | 51 | if ($relayState !== null) { |
52 | - $msg .= '&RelayState=' . urlencode($relayState); |
|
52 | + $msg .= '&RelayState='.urlencode($relayState); |
|
53 | 53 | } |
54 | 54 | |
55 | 55 | if ($key !== null) { |
56 | 56 | /* Add the signature. */ |
57 | - $msg .= '&SigAlg=' . urlencode($key->type); |
|
57 | + $msg .= '&SigAlg='.urlencode($key->type); |
|
58 | 58 | |
59 | 59 | $signature = $key->signData($msg); |
60 | - $msg .= '&Signature=' . urlencode(base64_encode($signature)); |
|
60 | + $msg .= '&Signature='.urlencode(base64_encode($signature)); |
|
61 | 61 | } |
62 | 62 | |
63 | 63 | if (strpos($destination, '?') === false) { |
64 | - $destination .= '?' . $msg; |
|
64 | + $destination .= '?'.$msg; |
|
65 | 65 | } else { |
66 | - $destination .= '&' . $msg; |
|
66 | + $destination .= '&'.$msg; |
|
67 | 67 | } |
68 | 68 | |
69 | 69 | return $destination; |
@@ -79,7 +79,7 @@ discard block |
||
79 | 79 | public function send(Message $message) |
80 | 80 | { |
81 | 81 | $destination = $this->getRedirectURL($message); |
82 | - Utils::getContainer()->getLogger()->debug('Redirect to ' . strlen($destination) . ' byte URL: ' . $destination); |
|
82 | + Utils::getContainer()->getLogger()->debug('Redirect to '.strlen($destination).' byte URL: '.$destination); |
|
83 | 83 | Utils::getContainer()->redirect($destination); |
84 | 84 | } |
85 | 85 | |
@@ -106,7 +106,7 @@ discard block |
||
106 | 106 | } |
107 | 107 | |
108 | 108 | if (isset($data['SAMLEncoding']) && $data['SAMLEncoding'] !== self::DEFLATE) { |
109 | - throw new \Exception('Unknown SAMLEncoding: ' . var_export($data['SAMLEncoding'], true)); |
|
109 | + throw new \Exception('Unknown SAMLEncoding: '.var_export($data['SAMLEncoding'], true)); |
|
110 | 110 | } |
111 | 111 | |
112 | 112 | $message = base64_decode($message); |
@@ -182,18 +182,18 @@ discard block |
||
182 | 182 | switch ($name) { |
183 | 183 | case 'SAMLRequest': |
184 | 184 | case 'SAMLResponse': |
185 | - $sigQuery = $name . '=' . $value; |
|
185 | + $sigQuery = $name.'='.$value; |
|
186 | 186 | break; |
187 | 187 | case 'RelayState': |
188 | - $relayState = '&RelayState=' . $value; |
|
188 | + $relayState = '&RelayState='.$value; |
|
189 | 189 | break; |
190 | 190 | case 'SigAlg': |
191 | - $sigAlg = '&SigAlg=' . $value; |
|
191 | + $sigAlg = '&SigAlg='.$value; |
|
192 | 192 | break; |
193 | 193 | } |
194 | 194 | } |
195 | 195 | |
196 | - $data['SignedQuery'] = $sigQuery . $relayState . $sigAlg; |
|
196 | + $data['SignedQuery'] = $sigQuery.$relayState.$sigAlg; |
|
197 | 197 | |
198 | 198 | return $data; |
199 | 199 | } |
@@ -70,7 +70,7 @@ |
||
70 | 70 | SignedElement $signedElement, |
71 | 71 | CertificateProvider $configuration |
72 | 72 | ) { |
73 | - $this->certificates = array_map(function ($certificate) { |
|
73 | + $this->certificates = array_map(function($certificate) { |
|
74 | 74 | return X509::createFromCertificateData($certificate); |
75 | 75 | }, $this->certificates); |
76 | 76 |
@@ -463,8 +463,8 @@ |
||
463 | 463 | * namespaces needed to parse the XML. |
464 | 464 | */ |
465 | 465 | $xml = '<root xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" '. |
466 | - 'xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">' . |
|
467 | - $decrypted . |
|
466 | + 'xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">'. |
|
467 | + $decrypted. |
|
468 | 468 | '</root>'; |
469 | 469 | |
470 | 470 | try { |
@@ -118,7 +118,7 @@ |
||
118 | 118 | } |
119 | 119 | |
120 | 120 | if (!$xml->hasAttribute('protocolSupportEnumeration')) { |
121 | - throw new \Exception('Missing protocolSupportEnumeration attribute on ' . $xml->localName); |
|
121 | + throw new \Exception('Missing protocolSupportEnumeration attribute on '.$xml->localName); |
|
122 | 122 | } |
123 | 123 | $this->setProtocolSupportEnumeration(preg_split('/[\s]+/', $xml->getAttribute('protocolSupportEnumeration'))); |
124 | 124 |