From 051a33591af14fabaaf869cf19e9b9561ba06a4c Mon Sep 17 00:00:00 2001 From: Thijs Kinkhorst <thijs@kinkhorst.com> Date: Tue, 18 Jan 2022 15:39:08 +0000 Subject: [PATCH] Placate code style checker --- modules/saml/lib/IdP/SAML2.php | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/modules/saml/lib/IdP/SAML2.php b/modules/saml/lib/IdP/SAML2.php index ee2dc1132..f5bbb817d 100644 --- a/modules/saml/lib/IdP/SAML2.php +++ b/modules/saml/lib/IdP/SAML2.php @@ -254,7 +254,7 @@ class SAML2 } $skipEndpointValidation = false; - if ($authnRequestSigned === true) { + if ($authnRequestSigned === true) { $skipEndpointValidationWhenSigned = $spMetadata->getValue('skipEndpointValidationWhenSigned', false); if (is_bool($skipEndpointValidationWhenSigned) === true) { $skipEndpointValidation = $skipEndpointValidationWhenSigned; @@ -268,11 +268,12 @@ class SAML2 if (($AssertionConsumerServiceURL !== null) && ($skipEndpointValidation === true)) { Logger::info( - 'AssertionConsumerService specified in AuthnRequest not in metadata, using anyway because AuthnRequest signed and skipEndpointValidationWhenSigned was true' + 'AssertionConsumerService specified in AuthnRequest not in metadata, ' . + 'using anyway because AuthnRequest signed and skipEndpointValidationWhenSigned was true' ); return ['Location' => $AssertionConsumerServiceURL, 'Binding' => $ProtocolBinding]; } - + Logger::warning('Authentication request specifies invalid AssertionConsumerService:'); if ($AssertionConsumerServiceURL !== null) { Logger::warning('AssertionConsumerServiceURL: ' . var_export($AssertionConsumerServiceURL, true)); @@ -315,7 +316,7 @@ class SAML2 } $authnRequestSigned = false; - + if (isset($_REQUEST['spentityid']) || isset($_REQUEST['providerId'])) { /* IdP initiated authentication. */ -- GitLab