Skip to content

Commit b4a87ec

Browse files
committed
cleanup double+EOL spaces
1 parent 6c8fcb0 commit b4a87ec

12 files changed

+26
-26
lines changed

.github/workflows/coding-standards.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,6 @@ jobs:
3131

3232
- name: Install Dependencies
3333
run: composer update --prefer-stable --prefer-dist --no-interaction --no-progress
34-
34+
3535
- name: Run Codesniffer
3636
run: vendor/bin/phpcs

.github/workflows/static-analysis.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -34,4 +34,4 @@ jobs:
3434

3535
- name: Run Static Analysis
3636
run: vendor/bin/phpstan analyse
37-
37+

.github/workflows/tests.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ jobs:
2222
steps:
2323
- name: Checkout code
2424
uses: actions/checkout@v4
25-
with:
25+
with:
2626
fetch-depth: 0
2727

2828
- name: Setup PHP

CHANGELOG.md

+11-11
Original file line numberDiff line numberDiff line change
@@ -12,14 +12,14 @@ and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.
1212

1313
### Fixed
1414
- In the Auth Code grant, when requesting an access token with an invalid auth code, we now respond with an invalid_grant error instead of invalid_request (PR #1433)
15-
- Fixed spec compliance issue where device access token request was mistakenly expecting to receive scopes in the request (PR #1412)
15+
- Fixed spec compliance issue where device access token request was mistakenly expecting to receive scopes in the request (PR #1412)
1616
- Refresh tokens pre version 9 might have had user IDs set as ints which meant they were incorrectly rejected. We now cast these values to strings to allow old refresh tokens (PR #1436)
1717

1818
## [9.0.1] - released 2024-10-14
1919
### Fixed
2020
- Auto-generated event emitter is now persisted. Previously, a new emitter was generated every time (PR #1428)
2121
- Fixed bug where you could not omit a redirect uri even if one had not been specified during the auth request (PR #1428)
22-
- Fixed bug where "state" parameter wasn't present on `invalid_scope` error response and wasn't on fragment part of `access_denied` redirect URI on Implicit grant (PR #1298)
22+
- Fixed bug where "state" parameter wasn't present on `invalid_scope` error response and wasn't on fragment part of `access_denied` redirect URI on Implicit grant (PR #1298)
2323
- Fixed bug where disabling refresh token revocation via `revokeRefreshTokens(false)` unintentionally disables issuing new refresh token (PR #1449)
2424

2525
## [9.0.0] - released 2024-05-13
@@ -71,13 +71,13 @@ and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.
7171

7272
## [8.5.3] - released 2023-07-06
7373
### Security
74-
- If a key string is provided to the CryptKey constructor with an invalid
75-
passphrase, the LogicException message generated will expose the given key.
74+
- If a key string is provided to the CryptKey constructor with an invalid
75+
passphrase, the LogicException message generated will expose the given key.
7676
The key is no longer leaked via this exception (PR #1353)
7777

7878
## [8.5.2] - released 2023-06-16
7979
### Changed
80-
- Bumped the versions for laminas/diactoros and psr/http-message to support
80+
- Bumped the versions for laminas/diactoros and psr/http-message to support
8181
PSR-7 v2.0 (PR #1339)
8282

8383
## [8.5.1] - released 2023-04-04
@@ -169,13 +169,13 @@ a PKCE downgrade attack (PR #1326)
169169
- Removed support for PHP 7.2 (PR #1146)
170170

171171
### Fixed
172-
- Fix typo in parameter hint. `code_challenged` changed to `code_challenge`. Thrown by Auth Code Grant when the code challenge does not match the regex. (PR #1130)
172+
- Fix typo in parameter hint. `code_challenged` changed to `code_challenge`. Thrown by Auth Code Grant when the code challenge does not match the regex. (PR #1130)
173173
- Undefined offset was returned when no client redirect URI was set. Now throw an invalidClient exception if no redirect URI is set against a client (PR #1140)
174174

175175
## [8.1.1] - released 2020-07-01
176176

177177
### Fixed
178-
- If you provide a valid redirect_uri with the auth code grant and an invalid scope, the server will use the given
178+
- If you provide a valid redirect_uri with the auth code grant and an invalid scope, the server will use the given
179179
redirect_uri instead of the default client redirect uri (PR #1126)
180180

181181
## [8.1.0] - released 2020-04-29
@@ -195,9 +195,9 @@ redirect_uri instead of the default client redirect uri (PR #1126)
195195
### Fixed
196196
- Clients are now explicitly prevented from using the Client Credentials grant unless they are confidential to conform
197197
with the OAuth2 spec (PR #1035)
198-
- Abstract method `getIdentifier()` added to AccessTokenTrait. The trait cannot be used without the `getIdentifier()`
198+
- Abstract method `getIdentifier()` added to AccessTokenTrait. The trait cannot be used without the `getIdentifier()`
199199
method being defined (PR #1051)
200-
- An exception is now thrown if a refresh token is accidentally sent in place of an authorization code when using the
200+
- An exception is now thrown if a refresh token is accidentally sent in place of an authorization code when using the
201201
Auth Code Grant (PR #1057)
202202
- Can now send access token request without being forced to specify a redirect URI (PR #1096)
203203
- In the BearerTokenValidator, if an implementation is using PDO, there is a possibility that a RuntimeException will be thrown when checking if an access token is revoked. This scenario no longer incorrectly issues an exception with a hint mentioning an issue with JSON decoding. (PR #1107)
@@ -251,7 +251,7 @@ Auth Code Grant (PR #1057)
251251
## [7.3.0] - released 2018-11-13
252252

253253
### Changed
254-
- Moved the `finalizeScopes()` call from `validateAuthorizationRequest` method to the `completeAuthorizationRequest` method so it is called just before the access token is issued (PR #923)
254+
- Moved the `finalizeScopes()` call from `validateAuthorizationRequest` method to the `completeAuthorizationRequest` method so it is called just before the access token is issued (PR #923)
255255

256256
### Added
257257
- Added a ScopeTrait to provide an implementation for jsonSerialize (PR #952)
@@ -353,7 +353,7 @@ To address feedback from the security release the following change has been made
353353
## [5.1.4] - 2017-07-01
354354

355355
- Fixed multiple security vulnerabilities as a result of a security audit paid for by the [Mozilla Secure Open Source Fund](https://wiki.mozilla.org/MOSS/Secure_Open_Source). All users of this library are encouraged to update as soon as possible to this version or version 6.0 or greater.
356-
- It is recommended on each `AuthorizationServer` instance you set the `setEncryptionKey()`. This will result in stronger encryption being used. If this method is not set messages will be sent to the defined error handling routines (using `error_log`). Please see the examples and documentation for examples.
356+
- It is recommended on each `AuthorizationServer` instance you set the `setEncryptionKey()`. This will result in stronger encryption being used. If this method is not set messages will be sent to the defined error handling routines (using `error_log`). Please see the examples and documentation for examples.
357357
- TravisCI now tests PHP 7.1 (Issue #671)
358358
- Fix middleware example fatal error (Issue #682)
359359
- Fix typo in the first README sentence (Issue #690)

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Out of the box it supports the following grants:
2121
The following RFCs are implemented:
2222

2323
* [RFC6749 "OAuth 2.0"](https://tools.ietf.org/html/rfc6749)
24-
* [RFC6750 " The OAuth 2.0 Authorization Framework: Bearer Token Usage"](https://tools.ietf.org/html/rfc6750)
24+
* [RFC6750 "The OAuth 2.0 Authorization Framework: Bearer Token Usage"](https://tools.ietf.org/html/rfc6750)
2525
* [RFC7519 "JSON Web Token (JWT)"](https://tools.ietf.org/html/rfc7519)
2626
* [RFC7636 "Proof Key for Code Exchange by OAuth Public Clients"](https://tools.ietf.org/html/rfc7636)
2727
* [RFC8628 "OAuth 2.0 Device Authorization Grant](https://tools.ietf.org/html/rfc8628)

examples/README.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -63,12 +63,12 @@ curl -X "POST" "http://localhost:4444/device_code.php/device_authorization" \
6363
--data-urlencode "client_id=myawesomeapp" \
6464
--data-urlencode "client_secret=abc123" \
6565
--data-urlencode "scope=basic email"
66-
```
66+
```
6767

6868
We have set up the example so that a user ID is already associated with the device code. In a production application you
6969
would implement an authorization view to allow a user to authorize the device.
7070

71-
Issue the following cURL request to exchange your device code for an access token. Replace `{{DEVICE_CODE}}` with the
71+
Issue the following cURL request to exchange your device code for an access token. Replace `{{DEVICE_CODE}}` with the
7272
device code returned from your first cURL post:
7373

7474
```
@@ -79,4 +79,4 @@ curl -X "POST" "http://localhost:4444/device_code.php/access_token" \
7979
--data-urlencode "device_code={{DEVICE_CODE}}" \
8080
--data-urlencode "client_id=myawesomeapp" \
8181
--data-urlencode "client_secret=abc123"
82-
```
82+
```

examples/public/auth_code.php

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@
2727
use Slim\App;
2828

2929
$app = new App([
30-
'settings' => [
30+
'settings' => [
3131
'displayErrorDetails' => true,
3232
],
3333
AuthorizationServer::class => function () {

examples/public/client_credentials.php

+1-1
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@
2424
use Slim\App;
2525

2626
$app = new App([
27-
'settings' => [
27+
'settings' => [
2828
'displayErrorDetails' => true,
2929
],
3030
AuthorizationServer::class => function () {

examples/public/implicit.php

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
use Slim\App;
2626

2727
$app = new App([
28-
'settings' => [
28+
'settings' => [
2929
'displayErrorDetails' => true,
3030
],
3131
AuthorizationServer::class => function () {

examples/public/middleware_use.php

+1-1
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@
2929
use Slim\App;
3030

3131
$app = new App([
32-
'settings' => [
32+
'settings' => [
3333
'displayErrorDetails' => true,
3434
],
3535
AuthorizationServer::class => function () {

examples/public/refresh_token.php

+1-1
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@
2424
use Slim\App;
2525

2626
$app = new App([
27-
'settings' => [
27+
'settings' => [
2828
'displayErrorDetails' => true,
2929
],
3030
AuthorizationServer::class => function () {

src/ResponseTypes/DeviceCodeResponse.php

+3-3
Original file line numberDiff line numberDiff line change
@@ -35,10 +35,10 @@ public function generateHttpResponse(ResponseInterface $response): ResponseInter
3535
$expireDateTime = $this->deviceCodeEntity->getExpiryDateTime()->getTimestamp();
3636

3737
$responseParams = [
38-
'device_code' => $this->deviceCodeEntity->getIdentifier(),
39-
'user_code' => $this->deviceCodeEntity->getUserCode(),
38+
'device_code' => $this->deviceCodeEntity->getIdentifier(),
39+
'user_code' => $this->deviceCodeEntity->getUserCode(),
4040
'verification_uri' => $this->deviceCodeEntity->getVerificationUri(),
41-
'expires_in' => $expireDateTime - time(),
41+
'expires_in' => $expireDateTime - time(),
4242
];
4343

4444
if ($this->includeVerificationUriComplete === true) {

0 commit comments

Comments
 (0)