@@ -196,7 +196,7 @@ |
||
196 | 196 | $id = $this->authState::saveState($state, 'webauthn:request'); |
197 | 197 | if ($debugEnabled === true) { |
198 | 198 | $response = new RunnableResponse( |
199 | - function (WebAuthnRegistrationEvent $regObject, string $id) { |
|
199 | + function(WebAuthnRegistrationEvent $regObject, string $id) { |
|
200 | 200 | echo $regObject->getDebugBuffer(); |
201 | 201 | echo $regObject->getValidateBuffer(); |
202 | 202 | echo "<form id='regform' method='POST' action='" . |
@@ -80,7 +80,7 @@ discard block |
||
80 | 80 | * exception. |
81 | 81 | * |
82 | 82 | */ |
83 | - 'aaguid_whitelist' => [ ], |
|
83 | + 'aaguid_whitelist' => [], |
|
84 | 84 | /* |
85 | 85 | * Some authenticators are more equal than others. Apple TouchID and |
86 | 86 | * FaceID set their AAGUID to all-zeroes so can't be whitelisted. But |
@@ -93,11 +93,11 @@ discard block |
||
93 | 93 | * |
94 | 94 | * https://webkit.org/blog/11312/meet-face-id-and-touch-id-for-the-web/ |
95 | 95 | */ |
96 | - 'attestation_format_whitelist' => [ ], |
|
96 | + 'attestation_format_whitelist' => [], |
|
97 | 97 | ], |
98 | 98 | 'policy_passwordless' => [ |
99 | 99 | 'minimum_certification_level' => WebAuthnRegistrationEvent::FIDO_CERTIFIED_L1, |
100 | - 'aaguid_whitelist' => [ ], |
|
100 | + 'aaguid_whitelist' => [], |
|
101 | 101 | 'attestation_format_whitelist' => ['apple'], |
102 | 102 | ], |
103 | 103 |
@@ -215,7 +215,7 @@ |
||
215 | 215 | $frontendData = []; |
216 | 216 | $frontendData['challengeEncoded'] = $challengeEncoded; |
217 | 217 | $frontendData['state'] = []; |
218 | - foreach (['FIDO2Scope','FIDO2Username','FIDO2Displayname','requestTokenModel'] as $stateItem) { |
|
218 | + foreach (['FIDO2Scope', 'FIDO2Username', 'FIDO2Displayname', 'requestTokenModel'] as $stateItem) { |
|
219 | 219 | $frontendData['state'][$stateItem] = $state[$stateItem]; |
220 | 220 | } |
221 | 221 |
@@ -223,7 +223,7 @@ discard block |
||
223 | 223 | |
224 | 224 | if ($debugEnabled) { |
225 | 225 | $response = new RunnableResponse( |
226 | - function (WebAuthnAuthenticationEvent $authObject, array $state) { |
|
226 | + function(WebAuthnAuthenticationEvent $authObject, array $state) { |
|
227 | 227 | echo $authObject->getDebugBuffer(); |
228 | 228 | echo $authObject->getValidateBuffer(); |
229 | 229 | echo "Debug mode, not continuing to " . ($state['FIDO2WantsRegister'] ? "credential registration page." : "destination."); |
@@ -247,7 +247,7 @@ discard block |
||
247 | 247 | * In passwordless, we're on our own. The one thing we know is the |
248 | 248 | * username. |
249 | 249 | */ |
250 | - $state['Attributes'][$state['FIDO2AttributeStoringUsername']] = [ $state['FIDO2Username'] ]; |
|
250 | + $state['Attributes'][$state['FIDO2AttributeStoringUsername']] = [$state['FIDO2Username']]; |
|
251 | 251 | // now properly return our final state to the framework |
252 | 252 | Source::completeAuth($state); |
253 | 253 | } |
@@ -137,7 +137,7 @@ |
||
137 | 137 | $stateData->aaguidWhitelist = $registrationConfig['aaguid_whitelist']; |
138 | 138 | $stateData->attFmtWhitelist = $registrationConfig['attestation_format_whitelist']; |
139 | 139 | |
140 | ->>>>>>> 9acf80d (Fix codesniffer issues) |
|
140 | +>> >> >> > 9acf80d(Fix codesniffer issues) |
|
141 | 141 | try { |
142 | 142 | $stateData->store = Store::parseStoreConfig($moduleConfig->getArray('store')); |
143 | 143 | } catch (Exception $e) { |
@@ -47,7 +47,7 @@ |
||
47 | 47 | $config, |
48 | 48 | 'authsources[' . var_export($this->authId, true) . ']' |
49 | 49 | ); |
50 | - $this->authnContextClassRef = $this->authSourceConfig->getOptionalString("authncontextclassref",'urn:rsa:names:tc:SAML:2.0:ac:classes:FIDO'); |
|
50 | + $this->authnContextClassRef = $this->authSourceConfig->getOptionalString("authncontextclassref", 'urn:rsa:names:tc:SAML:2.0:ac:classes:FIDO'); |
|
51 | 51 | $moduleConfig = Configuration::getOptionalConfig('module_webauthn.php')->toArray(); |
52 | 52 | |
53 | 53 | $initialStateData = new StateData(); |