@@ -73,7 +73,7 @@ discard block |
||
73 | 73 | |
74 | 74 | $this->ldapcf = new ConfigHelper( |
75 | 75 | $config, |
76 | - 'Authentication source ' . var_export($this->authId, true) |
|
76 | + 'Authentication source '.var_export($this->authId, true) |
|
77 | 77 | ); |
78 | 78 | } |
79 | 79 | |
@@ -138,7 +138,7 @@ discard block |
||
138 | 138 | // value is scalar |
139 | 139 | if (array_key_exists($x509_attr, $client_cert_data['subject'])) { |
140 | 140 | $value = $client_cert_data['subject'][$x509_attr]; |
141 | - Logger::info('authX509: cert ' . $x509_attr . ' = ' . $value); |
|
141 | + Logger::info('authX509: cert '.$x509_attr.' = '.$value); |
|
142 | 142 | |
143 | 143 | if (isset($this->dnpattern)) { |
144 | 144 | $dn = str_replace('%username%', $value, $this->dnpattern); |
@@ -172,7 +172,7 @@ discard block |
||
172 | 172 | $ldap_certs = $ldapcf->getAttributes($dn, $this->ldapusercert); |
173 | 173 | |
174 | 174 | if (empty($ldap_certs)) { |
175 | - Logger::error('authX509: no certificate found in LDAP for dn=' . $dn); |
|
175 | + Logger::error('authX509: no certificate found in LDAP for dn='.$dn); |
|
176 | 176 | $state['authX509.error'] = "UNKNOWNCERT"; |
177 | 177 | $this->authFailed($state); |
178 | 178 | |
@@ -189,7 +189,7 @@ discard block |
||
189 | 189 | foreach ($ldap_certs as $ldap_cert) { |
190 | 190 | $ldap_cert_data = openssl_x509_parse($ldap_cert); |
191 | 191 | if ($ldap_cert_data === false) { |
192 | - Logger::error('authX509: cert in LDAP is invalid for dn=' . $dn); |
|
192 | + Logger::error('authX509: cert in LDAP is invalid for dn='.$dn); |
|
193 | 193 | continue; |
194 | 194 | } |
195 | 195 | |
@@ -202,7 +202,7 @@ discard block |
||
202 | 202 | } |
203 | 203 | } |
204 | 204 | |
205 | - Logger::error('authX509: no matching cert in LDAP for dn=' . $dn); |
|
205 | + Logger::error('authX509: no matching cert in LDAP for dn='.$dn); |
|
206 | 206 | $state['authX509.error'] = "UNKNOWNCERT"; |
207 | 207 | $this->authFailed($state); |
208 | 208 |