@@ -27,7 +27,7 @@ discard block |
||
27 | 27 | { |
28 | 28 | $data = \json_decode($response->getBody()->getContents(), true); |
29 | 29 | |
30 | - if (! \is_array($data) || ! isset($data['error'])) { |
|
30 | + if (!\is_array($data) || !isset($data['error'])) { |
|
31 | 31 | throw new RemoteException($response, $response->getReasonPhrase(), $response->getStatusCode(), $previous); |
32 | 32 | } |
33 | 33 | |
@@ -41,7 +41,7 @@ discard block |
||
41 | 41 | */ |
42 | 42 | public static function fromParameters(array $params, Throwable $previous = null): self |
43 | 43 | { |
44 | - if (! \array_key_exists('error', $params)) { |
|
44 | + if (!\array_key_exists('error', $params)) { |
|
45 | 45 | throw new RuntimeException('Invalid OAuth2 exception', 0, $previous); |
46 | 46 | } |
47 | 47 |
@@ -39,7 +39,7 @@ |
||
39 | 39 | |
40 | 40 | $data = parseMetadataResponse($response, 200); |
41 | 41 | |
42 | - if (! \array_key_exists('issuer', $data)) { |
|
42 | + if (!\array_key_exists('issuer', $data)) { |
|
43 | 43 | throw new RuntimeException('Invalid metadata content, no "issuer" key found'); |
44 | 44 | } |
45 | 45 |
@@ -45,7 +45,7 @@ discard block |
||
45 | 45 | { |
46 | 46 | $endpointUri = $client->getUserinfoEndpoint(); |
47 | 47 | |
48 | - if (! $endpointUri) { |
|
48 | + if (!$endpointUri) { |
|
49 | 49 | throw new InvalidArgumentException('Invalid issuer userinfo endpoint'); |
50 | 50 | } |
51 | 51 | |
@@ -75,13 +75,13 @@ discard block |
||
75 | 75 | $payload = $response->getBody()->getContents(); |
76 | 76 | } |
77 | 77 | |
78 | - if (! \is_string($payload)) { |
|
78 | + if (!\is_string($payload)) { |
|
79 | 79 | throw new RuntimeException('Unable to parse userinfo claims'); |
80 | 80 | } |
81 | 81 | |
82 | 82 | $claims = \json_decode($payload, true); |
83 | 83 | |
84 | - if (! \is_array($claims)) { |
|
84 | + if (!\is_array($claims)) { |
|
85 | 85 | throw new RuntimeException('Unable to parse userinfo claims'); |
86 | 86 | } |
87 | 87 |
@@ -147,7 +147,7 @@ |
||
147 | 147 | 'code_verifier' => $this->codeVerifier, |
148 | 148 | ]; |
149 | 149 | |
150 | - return \array_filter($data, static function ($value) { |
|
150 | + return \array_filter($data, static function($value) { |
|
151 | 151 | return null !== $value; |
152 | 152 | }); |
153 | 153 | } |
@@ -116,11 +116,11 @@ discard block |
||
116 | 116 | /** @var string|null $endpointUri */ |
117 | 117 | $endpointUri = $this->getIssuer()->getMetadata()->get($endpointClaim); |
118 | 118 | |
119 | - if (! $endpointUri) { |
|
119 | + if (!$endpointUri) { |
|
120 | 120 | return null; |
121 | 121 | } |
122 | 122 | |
123 | - if (! \in_array($authMethod, AuthMethodInterface::TLS_METHODS, true)) { |
|
123 | + if (!\in_array($authMethod, AuthMethodInterface::TLS_METHODS, true)) { |
|
124 | 124 | return $endpointUri; |
125 | 125 | } |
126 | 126 | |
@@ -133,7 +133,7 @@ discard block |
||
133 | 133 | { |
134 | 134 | $uri = $this->getEndpointUri('token_endpoint'); |
135 | 135 | |
136 | - if (! $uri) { |
|
136 | + if (!$uri) { |
|
137 | 137 | throw new RuntimeException('Unable to retrieve the token endpoint'); |
138 | 138 | } |
139 | 139 |
@@ -45,7 +45,7 @@ |
||
45 | 45 | |
46 | 46 | $claims = \json_decode($jws->getPayload(), true); |
47 | 47 | |
48 | - if (! \is_array($claims)) { |
|
48 | + if (!\is_array($claims)) { |
|
49 | 49 | throw new RuntimeException('Unable to decode claims'); |
50 | 50 | } |
51 | 51 |
@@ -37,7 +37,7 @@ |
||
37 | 37 | $clientId = $client->getMetadata()->getClientId(); |
38 | 38 | $clientSecret = $client->getMetadata()->getClientSecret(); |
39 | 39 | |
40 | - if (! $clientSecret) { |
|
40 | + if (!$clientSecret) { |
|
41 | 41 | throw new InvalidArgumentException($this->getSupportedMethod() . ' cannot be used without client_secret metadata'); |
42 | 42 | } |
43 | 43 |
@@ -37,7 +37,7 @@ |
||
37 | 37 | $clientId = $client->getMetadata()->getClientId(); |
38 | 38 | $clientSecret = $client->getMetadata()->getClientSecret(); |
39 | 39 | |
40 | - if (! $clientSecret) { |
|
40 | + if (!$clientSecret) { |
|
41 | 41 | throw new InvalidArgumentException($this->getSupportedMethod() . ' cannot be used without client_secret metadata'); |
42 | 42 | } |
43 | 43 |
@@ -147,7 +147,7 @@ |
||
147 | 147 | 'code_verifier' => $this->codeVerifier, |
148 | 148 | ]; |
149 | 149 | |
150 | - return \array_filter($data, static function ($value) { |
|
150 | + return \array_filter($data, static function($value) { |
|
151 | 151 | return null !== $value; |
152 | 152 | }); |
153 | 153 | } |