@@ -111,7 +111,7 @@ discard block |
||
111 | 111 | ]; |
112 | 112 | } |
113 | 113 | |
114 | - $adfs_service_location = Module::getModuleURL('adfs') . '/idp/prp.php'; |
|
114 | + $adfs_service_location = Module::getModuleURL('adfs').'/idp/prp.php'; |
|
115 | 115 | $metaArray = [ |
116 | 116 | 'metadata-set' => 'adfs-idp-remote', |
117 | 117 | 'entityid' => $idpentityid, |
@@ -173,7 +173,7 @@ discard block |
||
173 | 173 | $metaArray['RegistrationInfo'] = $idpmeta->getArray('RegistrationInfo'); |
174 | 174 | } |
175 | 175 | |
176 | - $metaflat = '$metadata[' . var_export($idpentityid, true) . '] = ' . var_export($metaArray, true) . ';'; |
|
176 | + $metaflat = '$metadata['.var_export($idpentityid, true).'] = '.var_export($metaArray, true).';'; |
|
177 | 177 | |
178 | 178 | $metaBuilder = new Metadata\SAMLBuilder($idpentityid); |
179 | 179 | $metaBuilder->addSecurityTokenServiceType($metaArray); |
@@ -203,12 +203,12 @@ discard block |
||
203 | 203 | $certdata = []; |
204 | 204 | foreach (array_keys($availableCerts) as $availableCert) { |
205 | 205 | $certdata[$availableCert]['name'] = $availableCert; |
206 | - $certdata[$availableCert]['url'] = Module::getModuleURL('saml/idp/certs.php') . |
|
207 | - '/' . $availableCert; |
|
206 | + $certdata[$availableCert]['url'] = Module::getModuleURL('saml/idp/certs.php'). |
|
207 | + '/'.$availableCert; |
|
208 | 208 | |
209 | 209 | $certdata[$availableCert]['comment'] = ''; |
210 | 210 | if ($availableCerts[$availableCert]['certFingerprint'][0] === 'afe71c28ef740bc87425be13a2263d37971da1f9') { |
211 | - $certdata[$availableCert]['comment'] = 'This is the default certificate.' . |
|
211 | + $certdata[$availableCert]['comment'] = 'This is the default certificate.'. |
|
212 | 212 | ' Generate a new certificate if this is a production system.'; |
213 | 213 | } |
214 | 214 | } |
@@ -250,20 +250,20 @@ discard block |
||
250 | 250 | Logger::info('ADFS - IdP.prp: Accessing ADFS IdP endpoint prp'); |
251 | 251 | |
252 | 252 | $idpEntityId = $this->metadata->getMetaDataCurrentEntityID('adfs-idp-hosted'); |
253 | - $idp = IdP::getById('adfs:' . $idpEntityId); |
|
253 | + $idp = IdP::getById('adfs:'.$idpEntityId); |
|
254 | 254 | |
255 | 255 | if (isset($_GET['wa'])) { |
256 | 256 | if ($_GET['wa'] === 'wsignout1.0') { |
257 | 257 | return new StreamedResponse( |
258 | 258 | /** @return void */ |
259 | - function () use ($idp) { |
|
259 | + function() use ($idp) { |
|
260 | 260 | ADFS::receiveLogoutMessage($idp); |
261 | 261 | } |
262 | 262 | ); |
263 | 263 | } elseif ($_GET['wa'] === 'wsignin1.0') { |
264 | 264 | return new StreamedResponse( |
265 | 265 | /** @return void */ |
266 | - function () use ($idp) { |
|
266 | + function() use ($idp) { |
|
267 | 267 | ADFS::receiveAuthnRequest($idp); |
268 | 268 | } |
269 | 269 | ); |
@@ -277,7 +277,7 @@ discard block |
||
277 | 277 | |
278 | 278 | return new StreamedResponse( |
279 | 279 | /** @return void */ |
280 | - function () use ($idp, $assocId, $relayState, $logoutError) { |
|
280 | + function() use ($idp, $assocId, $relayState, $logoutError) { |
|
281 | 281 | $idp->handleLogoutResponse($assocId, $relayState, $logoutError); |
282 | 282 | } |
283 | 283 | ); |
@@ -32,7 +32,7 @@ discard block |
||
32 | 32 | $metadata = MetaDataStorageHandler::getMetadataHandler(); |
33 | 33 | $spMetadata = $metadata->getMetaDataConfig($issuer, 'adfs-sp-remote'); |
34 | 34 | |
35 | - Logger::info('ADFS - IdP.prp: Incoming Authentication request: ' . $issuer . ' id ' . $requestid); |
|
35 | + Logger::info('ADFS - IdP.prp: Incoming Authentication request: '.$issuer.' id '.$requestid); |
|
36 | 36 | } catch (\Exception $exception) { |
37 | 37 | throw new Error\Error('PROCESSAUTHNREQUEST', $exception); |
38 | 38 | } |
@@ -347,7 +347,7 @@ discard block |
||
347 | 347 | $spEntityId = $spMetadata['entityid']; |
348 | 348 | $spMetadata = Configuration::loadFromArray( |
349 | 349 | $spMetadata, |
350 | - '$metadata[' . var_export($spEntityId, true) . ']' |
|
350 | + '$metadata['.var_export($spEntityId, true).']' |
|
351 | 351 | ); |
352 | 352 | |
353 | 353 | $attributes = $state['Attributes']; |
@@ -367,7 +367,7 @@ discard block |
||
367 | 367 | $idpEntityId = $idpMetadata->getString('entityid'); |
368 | 368 | |
369 | 369 | $idp->addAssociation([ |
370 | - 'id' => 'adfs:' . $spEntityId, |
|
370 | + 'id' => 'adfs:'.$spEntityId, |
|
371 | 371 | 'Handler' => ADFS::class, |
372 | 372 | 'adfs:entityID' => $spEntityId, |
373 | 373 | ]); |
@@ -390,7 +390,7 @@ discard block |
||
390 | 390 | $wresult = ADFS::signResponse($response, $privateKeyFile, $certificateFile, $algo, $passphrase); |
391 | 391 | |
392 | 392 | $wctx = $state['adfs:wctx']; |
393 | - $wreply = $state['adfs:wreply'] ? : $spMetadata->getValue('prp'); |
|
393 | + $wreply = $state['adfs:wreply'] ?: $spMetadata->getValue('prp'); |
|
394 | 394 | ADFS::postResponse($wreply, $wresult, $wctx); |
395 | 395 | } |
396 | 396 | |
@@ -448,8 +448,8 @@ discard block |
||
448 | 448 | $metadata = MetaDataStorageHandler::getMetadataHandler(); |
449 | 449 | $spMetadata = $metadata->getMetaDataConfig($association['adfs:entityID'], 'adfs-sp-remote'); |
450 | 450 | $returnTo = Module::getModuleURL( |
451 | - 'adfs/idp/prp.php?assocId=' . urlencode($association["id"]) . '&relayState=' . urlencode($relayState) |
|
451 | + 'adfs/idp/prp.php?assocId='.urlencode($association["id"]).'&relayState='.urlencode($relayState) |
|
452 | 452 | ); |
453 | - return $spMetadata->getValue('prp') . '?wa=wsignoutcleanup1.0&wreply=' . urlencode($returnTo); |
|
453 | + return $spMetadata->getValue('prp').'?wa=wsignoutcleanup1.0&wreply='.urlencode($returnTo); |
|
454 | 454 | } |
455 | 455 | } |