Passed
Push — master ( f18c04...fb67eb )
by Thomas Mauro
02:46
created
src/Service/ClientRegistration.php 1 patch
Spacing   +4 added lines, -4 removed lines patch added patch discarded remove patch
@@ -52,7 +52,7 @@  discard block
 block discarded – undo
52 52
     ): array {
53 53
         $registrationEndpoint = $issuer->getMetadata()->getRegistrationEndpoint();
54 54
 
55
-        if (! $registrationEndpoint) {
55
+        if (!$registrationEndpoint) {
56 56
             throw new InvalidArgumentException('Issuer does not support dynamic client registration');
57 57
         }
58 58
 
@@ -80,7 +80,7 @@  discard block
 block discarded – undo
80 80
 
81 81
         $data = parse_metadata_response($response, 201);
82 82
 
83
-        if (! \array_key_exists('client_id', $data)) {
83
+        if (!\array_key_exists('client_id', $data)) {
84 84
             throw new RuntimeException('Registration response did not return a client_id field');
85 85
         }
86 86
 
@@ -101,7 +101,7 @@  discard block
 block discarded – undo
101 101
 
102 102
         $claims = parse_metadata_response($response, 200);
103 103
 
104
-        if (! \array_key_exists('client_id', $claims)) {
104
+        if (!\array_key_exists('client_id', $claims)) {
105 105
             throw new RuntimeException('Registration response did not return a client_id field');
106 106
         }
107 107
 
@@ -139,7 +139,7 @@  discard block
 block discarded – undo
139 139
 
140 140
         $data = parse_metadata_response($response, 200);
141 141
 
142
-        if (! \array_key_exists('client_id', $data)) {
142
+        if (!\array_key_exists('client_id', $data)) {
143 143
             throw new RuntimeException('Registration response did not return a client_id field');
144 144
         }
145 145
 
Please login to merge, or discard this patch.
src/Service/AuthorizationService.php 1 patch
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -98,7 +98,7 @@  discard block
 block discarded – undo
98 98
                 unset($params[$key]);
99 99
             } elseif ('claims' === $key && (\is_array($value) || $value instanceof JsonSerializable)) {
100 100
                 $params['claims'] = \json_encode($value);
101
-            } elseif (! \is_string($value)) {
101
+            } elseif (!\is_string($value)) {
102 102
                 $params[$key] = (string) $value;
103 103
             }
104 104
         }
@@ -132,7 +132,7 @@  discard block
 block discarded – undo
132 132
             $this->tokenSetVerifier->validate($tokenSet, $client, $authSession, true, $maxAge);
133 133
         }
134 134
 
135
-        if (! $tokenSet->getCode()) {
135
+        if (!$tokenSet->getCode()) {
136 136
             return $tokenSet;
137 137
         }
138 138
 
@@ -149,15 +149,15 @@  discard block
 block discarded – undo
149 149
     ): TokenSetInterface {
150 150
         $code = $tokenSet->getCode();
151 151
 
152
-        if (! $code) {
152
+        if (!$code) {
153 153
             throw new RuntimeException('Unable to fetch token without a code');
154 154
         }
155 155
 
156
-        if (! $redirectUri) {
156
+        if (!$redirectUri) {
157 157
             $redirectUri = $client->getMetadata()->getRedirectUris()[0] ?? null;
158 158
         }
159 159
 
160
-        if (! $redirectUri) {
160
+        if (!$redirectUri) {
161 161
             throw new InvalidArgumentException('A redirect_uri should be provided');
162 162
         }
163 163
 
@@ -167,7 +167,7 @@  discard block
 block discarded – undo
167 167
             'redirect_uri' => $redirectUri,
168 168
         ]);
169 169
 
170
-        if (! ($params['id_token'] ?? null)) {
170
+        if (!($params['id_token'] ?? null)) {
171 171
             return TokenSet::fromParams($params);
172 172
         }
173 173
 
Please login to merge, or discard this patch.
src/Token/TokenDecrypter.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -39,7 +39,7 @@  discard block
 block discarded – undo
39 39
         $expectedAlg = $metadata->get($use . '_encrypted_response_alg');
40 40
         $expectedEnc = $metadata->get($use . '_encrypted_response_enc');
41 41
 
42
-        if (! $expectedAlg) {
42
+        if (!$expectedAlg) {
43 43
             return $token;
44 44
         }
45 45
 
@@ -53,7 +53,7 @@  discard block
 block discarded – undo
53 53
             throw new RuntimeException(\sprintf('Unexpected JWE enc received, expected %s, got: %s', $expectedEnc, $header['enc'] ?? ''));
54 54
         }
55 55
 
56
-        if (! \class_exists(JWELoader::class)) {
56
+        if (!\class_exists(JWELoader::class)) {
57 57
             throw new LogicException('In order to decrypt JWT you should install web-token/jwt-encryption package');
58 58
         }
59 59
 
Please login to merge, or discard this patch.
src/AuthMethod/ClientSecretJwt.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -47,7 +47,7 @@  discard block
 block discarded – undo
47 47
             return $this->jwsBuilder;
48 48
         }
49 49
 
50
-        if (! \class_exists(HS256::class)) {
50
+        if (!\class_exists(HS256::class)) {
51 51
             throw new LogicException('To use the client_secret_jwt auth method you should install web-token/jwt-signature-algorithm-hmac package');
52 52
         }
53 53
 
@@ -62,7 +62,7 @@  discard block
 block discarded – undo
62 62
         $clientId = $client->getMetadata()->getClientId();
63 63
         $clientSecret = $client->getMetadata()->getClientSecret();
64 64
 
65
-        if (! $clientSecret) {
65
+        if (!$clientSecret) {
66 66
             throw new InvalidArgumentException($this->getSupportedMethod() . ' cannot be used without client_secret metadata');
67 67
         }
68 68
 
Please login to merge, or discard this patch.
src/Token/IdTokenVerifier.php 1 patch
Spacing   +6 added lines, -6 removed lines patch added patch discarded remove patch
@@ -83,7 +83,7 @@  discard block
 block discarded – undo
83 83
             ? $metadata->getUserinfoSignedResponseAlg()
84 84
             : $metadata->getIdTokenSignedResponseAlg();
85 85
 
86
-        if (! $expectedAlg) {
86
+        if (!$expectedAlg) {
87 87
             throw new RuntimeException('Unable to verify id_token without an alg value');
88 88
         }
89 89
 
@@ -95,7 +95,7 @@  discard block
 block discarded – undo
95 95
 
96 96
         $payload = \json_decode(base64url_decode(\explode('.', $idToken)[1] ?? '{}'), true);
97 97
 
98
-        if (! \is_array($payload)) {
98
+        if (!\is_array($payload)) {
99 99
             throw new InvalidArgumentException('Unable to decode token payload');
100 100
         }
101 101
 
@@ -120,7 +120,7 @@  discard block
 block discarded – undo
120 120
 
121 121
         $requiredClaims = [];
122 122
 
123
-        if (! $fromUserInfo) {
123
+        if (!$fromUserInfo) {
124 124
             $requiredClaims = ['iss', 'sub', 'aud', 'exp', 'iat'];
125 125
         }
126 126
 
@@ -146,7 +146,7 @@  discard block
 block discarded – undo
146 146
         if (0 === \strpos($expectedAlg, 'HS')) {
147 147
             $clientSecret = $metadata->getClientSecret();
148 148
 
149
-            if (! $clientSecret) {
149
+            if (!$clientSecret) {
150 150
                 throw new RuntimeException('Unable to verify token without client_secret');
151 151
             }
152 152
 
@@ -159,7 +159,7 @@  discard block
 block discarded – undo
159 159
 
160 160
         if ($kid) {
161 161
             $jwk = $jwks->selectKey('sig', null, ['kid' => $kid]);
162
-            if (! $jwk) {
162
+            if (!$jwk) {
163 163
                 throw new RuntimeException('Unable to find the jwk with the provided kid: ' . $kid);
164 164
             }
165 165
 
@@ -168,7 +168,7 @@  discard block
 block discarded – undo
168 168
             $result = $jwsVerifier->verifyWithKeySet($jws, $jwks, 0);
169 169
         }
170 170
 
171
-        if (! $result) {
171
+        if (!$result) {
172 172
             throw new InvalidArgumentException('Failed to validate JWT signature');
173 173
         }
174 174
 
Please login to merge, or discard this patch.
src/Middleware/UserInfoMiddleware.php 1 patch
Spacing   +2 added lines, -2 removed lines patch added patch discarded remove patch
@@ -37,11 +37,11 @@
 block discarded – undo
37 37
         $tokenSet = $request->getAttribute(TokenSetInterface::class);
38 38
         $client = $this->client ?: $request->getAttribute(ClientInterface::class);
39 39
 
40
-        if (! $client instanceof ClientInterface) {
40
+        if (!$client instanceof ClientInterface) {
41 41
             throw new LogicException('No OpenID client provided');
42 42
         }
43 43
 
44
-        if (! $tokenSet instanceof TokenSetInterface) {
44
+        if (!$tokenSet instanceof TokenSetInterface) {
45 45
             throw new RuntimeException('Unable to get token response attribute');
46 46
         }
47 47
 
Please login to merge, or discard this patch.
src/Service/UserinfoService.php 1 patch
Spacing   +5 added lines, -5 removed lines patch added patch discarded remove patch
@@ -57,7 +57,7 @@  discard block
 block discarded – undo
57 57
     {
58 58
         $accessToken = $tokenSet->getAccessToken();
59 59
 
60
-        if (! $accessToken) {
60
+        if (!$accessToken) {
61 61
             throw new RuntimeException('Unable to get an access token from the token set');
62 62
         }
63 63
 
@@ -72,7 +72,7 @@  discard block
 block discarded – undo
72 72
             $endpointUri = $issuerMetadata->getMtlsEndpointAliases()['userinfo_endpoint'] ?? $endpointUri;
73 73
         }
74 74
 
75
-        if (! $endpointUri) {
75
+        if (!$endpointUri) {
76 76
             throw new InvalidArgumentException('Invalid issuer userinfo endpoint');
77 77
         }
78 78
 
@@ -101,20 +101,20 @@  discard block
 block discarded – undo
101 101
             $payload = \json_decode((string) $response->getBody(), true);
102 102
         }
103 103
 
104
-        if (! \is_array($payload)) {
104
+        if (!\is_array($payload)) {
105 105
             throw new RuntimeException('Unable to parse userinfo claims');
106 106
         }
107 107
 
108 108
         $idToken = $tokenSet->getIdToken();
109 109
 
110
-        if (! $idToken) {
110
+        if (!$idToken) {
111 111
             return $payload;
112 112
         }
113 113
 
114 114
         // check expected sub
115 115
         $expectedSub = $tokenSet->claims()['sub'] ?? null;
116 116
 
117
-        if (! $expectedSub) {
117
+        if (!$expectedSub) {
118 118
             throw new RuntimeException('Unable to get sub claim from id_token');
119 119
         }
120 120
 
Please login to merge, or discard this patch.