@@ -171,7 +171,7 @@ discard block |
||
| 171 | 171 | // value is scalar |
| 172 | 172 | if (array_key_exists($x509_attr, $client_cert_data['subject'])) { |
| 173 | 173 | $value = $client_cert_data['subject'][$x509_attr]; |
| 174 | - Logger::info('authX509: cert ' . $x509_attr . ' = ' . $value); |
|
| 174 | + Logger::info('authX509: cert '.$x509_attr.' = '.$value); |
|
| 175 | 175 | $entry = $this->findUserByAttribute($attr, $value); |
| 176 | 176 | if ($entry !== null) { |
| 177 | 177 | $dn = $attr; |
@@ -203,7 +203,7 @@ discard block |
||
| 203 | 203 | |
| 204 | 204 | $ldap_certs = array_map([$entry, 'getAttribute'], $this->ldapusercert); |
| 205 | 205 | if (empty($ldap_certs)) { |
| 206 | - Logger::error('authX509: no certificate found in LDAP for dn=' . $dn); |
|
| 206 | + Logger::error('authX509: no certificate found in LDAP for dn='.$dn); |
|
| 207 | 207 | $state['authX509.error'] = "UNKNOWNCERT"; |
| 208 | 208 | $this->authFailed($state); |
| 209 | 209 | |
@@ -222,7 +222,7 @@ discard block |
||
| 222 | 222 | $pem = $cryptoUtils->der2pem($ldap_cert); |
| 223 | 223 | $ldap_cert_data = openssl_x509_parse($pem); |
| 224 | 224 | if ($ldap_cert_data === false) { |
| 225 | - Logger::error('authX509: cert in LDAP is invalid for dn=' . $dn); |
|
| 225 | + Logger::error('authX509: cert in LDAP is invalid for dn='.$dn); |
|
| 226 | 226 | continue; |
| 227 | 227 | } |
| 228 | 228 | |
@@ -238,7 +238,7 @@ discard block |
||
| 238 | 238 | } |
| 239 | 239 | } |
| 240 | 240 | |
| 241 | - Logger::error('authX509: no matching cert in LDAP for dn=' . $dn); |
|
| 241 | + Logger::error('authX509: no matching cert in LDAP for dn='.$dn); |
|
| 242 | 242 | $state['authX509.error'] = "UNKNOWNCERT"; |
| 243 | 243 | $this->authFailed($state); |
| 244 | 244 | |