@@ -171,7 +171,7 @@ discard block |
||
171 | 171 | // value is scalar |
172 | 172 | if (array_key_exists($x509_attr, $client_cert_data['subject'])) { |
173 | 173 | $value = $client_cert_data['subject'][$x509_attr]; |
174 | - Logger::info('authX509: cert ' . $x509_attr . ' = ' . $value); |
|
174 | + Logger::info('authX509: cert '.$x509_attr.' = '.$value); |
|
175 | 175 | $entry = $this->findUserByAttribute($attr, $value); |
176 | 176 | if ($entry !== null) { |
177 | 177 | $dn = $attr; |
@@ -203,7 +203,7 @@ discard block |
||
203 | 203 | |
204 | 204 | $ldap_certs = array_map([$entry, 'getAttribute'], $this->ldapusercert); |
205 | 205 | if (empty($ldap_certs)) { |
206 | - Logger::error('authX509: no certificate found in LDAP for dn=' . $dn); |
|
206 | + Logger::error('authX509: no certificate found in LDAP for dn='.$dn); |
|
207 | 207 | $state['authX509.error'] = "UNKNOWNCERT"; |
208 | 208 | $this->authFailed($state); |
209 | 209 | |
@@ -222,7 +222,7 @@ discard block |
||
222 | 222 | $pem = $cryptoUtils->der2pem($ldap_cert); |
223 | 223 | $ldap_cert_data = openssl_x509_parse($pem); |
224 | 224 | if ($ldap_cert_data === false) { |
225 | - Logger::error('authX509: cert in LDAP is invalid for dn=' . $dn); |
|
225 | + Logger::error('authX509: cert in LDAP is invalid for dn='.$dn); |
|
226 | 226 | continue; |
227 | 227 | } |
228 | 228 | |
@@ -238,7 +238,7 @@ discard block |
||
238 | 238 | } |
239 | 239 | } |
240 | 240 | |
241 | - Logger::error('authX509: no matching cert in LDAP for dn=' . $dn); |
|
241 | + Logger::error('authX509: no matching cert in LDAP for dn='.$dn); |
|
242 | 242 | $state['authX509.error'] = "UNKNOWNCERT"; |
243 | 243 | $this->authFailed($state); |
244 | 244 |