diff --git a/modules/lemonldap-ng-common/lib/Lemonldap/NG/Common/Apache/Session.pm b/modules/lemonldap-ng-common/lib/Lemonldap/NG/Common/Apache/Session.pm index 0ce48a0e3..bef0872e9 100644 --- a/modules/lemonldap-ng-common/lib/Lemonldap/NG/Common/Apache/Session.pm +++ b/modules/lemonldap-ng-common/lib/Lemonldap/NG/Common/Apache/Session.pm @@ -222,7 +222,7 @@ BEGIN { my ( $class, $args, $data ) = @_; die "Only Redis is supported" unless ( $args->{Driver} eq 'Redis' ); my $redis = Redis->new(%$args); - my @keys = $redis->keys('*'); + my @keys = $redis->keys('*'); my %res; foreach my $k (@keys) { my $v = diff --git a/modules/lemonldap-ng-handler/lib/Lemonldap/NG/Handler/CGI.pm b/modules/lemonldap-ng-handler/lib/Lemonldap/NG/Handler/CGI.pm index 97338c644..bc55f5b46 100644 --- a/modules/lemonldap-ng-handler/lib/Lemonldap/NG/Handler/CGI.pm +++ b/modules/lemonldap-ng-handler/lib/Lemonldap/NG/Handler/CGI.pm @@ -88,7 +88,7 @@ sub new { # If nothing is found, redirects the user to the Lemonldap::NG portal. # @return boolean : true if authentication is good. Exit before else sub authenticate { - my $self = shift; + my $self = shift; $self->abort( "Can't authenticate because configuration has not been loaded", $self->{noConf} ) @@ -136,11 +136,10 @@ sub authorize { # 0 if user isn't granted sub testUri { my $self = shift; - $self->abort( - "Can't test URI because configuration has not been loaded", + $self->abort( "Can't test URI because configuration has not been loaded", $self->{noConf} ) if ( $self->{noConf} ); - my $uri = shift; + my $uri = shift; my $host = ( $uri =~ s#^(?:https?://)?([^/]*)/#/# ) ? $1 : $ENV{SERVER_NAME}; return -1 unless ( Lemonldap::NG::Handler::_CGI->vhostAvailable($host) ); diff --git a/modules/lemonldap-ng-handler/lib/Lemonldap/NG/Handler/Simple.pm b/modules/lemonldap-ng-handler/lib/Lemonldap/NG/Handler/Simple.pm index 3011d34f4..26d9eba95 100644 --- a/modules/lemonldap-ng-handler/lib/Lemonldap/NG/Handler/Simple.pm +++ b/modules/lemonldap-ng-handler/lib/Lemonldap/NG/Handler/Simple.pm @@ -72,7 +72,7 @@ BEGIN { lmSetHeaderOut lmSetErrHeaderOut $cookieName $https $port ) ], - traces => [qw( $whatToTrace $statusPipe $statusOut)], + traces => [qw( $whatToTrace $statusPipe $statusOut)], apache => [ qw( MP OK REDIRECT FORBIDDEN DONE DECLINED SERVER_ERROR useRedirectOnForbidden ) ], @@ -442,7 +442,8 @@ sub childInit { $s->push_handlers( PerlPostConfigHandler => sub { my ( $c, $l, $t, $s ) = splice @_; - $s->add_version_component('Lemonldap::NG::Handler/'.$VERSION); + $s->add_version_component( + 'Lemonldap::NG::Handler/' . $VERSION ); } ) unless ( $args->{hideSignature} ); } @@ -865,7 +866,7 @@ sub forbidden { } else { $class->lmLog( "Return forbidden access", 'debug' ); - return FORBIDDEN; + return FORBIDDEN; } } diff --git a/modules/lemonldap-ng-manager/lib/Lemonldap/NG/Manager/_Struct.pm b/modules/lemonldap-ng-manager/lib/Lemonldap/NG/Manager/_Struct.pm index f38e68ea5..1aa1b86fe 100644 --- a/modules/lemonldap-ng-manager/lib/Lemonldap/NG/Manager/_Struct.pm +++ b/modules/lemonldap-ng-manager/lib/Lemonldap/NG/Manager/_Struct.pm @@ -1340,9 +1340,9 @@ sub testStruct { msgFail => 'Bad module name', }, useRedirectOnForbidden => $boolean, - useXForwardedForIP => $boolean, - variables => $testNotDefined, - whatToTrace => { + useXForwardedForIP => $boolean, + variables => $testNotDefined, + whatToTrace => { test => qr/^\$?_?[a-zA-Z]\w*$/, msgFail => 'Bad value', }, @@ -1615,8 +1615,8 @@ sub defaultConf { userDB => 'LDAP', passwordDB => 'LDAP', useRedirectOnForbidden => '0', - useXForwardedForIP => '0', - whatToTrace => '$_whatToTrace', + useXForwardedForIP => '0', + whatToTrace => '$_whatToTrace', ######## # SAML # ######## diff --git a/modules/lemonldap-ng-manager/lib/Lemonldap/NG/Manager/_i18n.pm b/modules/lemonldap-ng-manager/lib/Lemonldap/NG/Manager/_i18n.pm index a730d2fe0..23ef3d127 100644 --- a/modules/lemonldap-ng-manager/lib/Lemonldap/NG/Manager/_i18n.pm +++ b/modules/lemonldap-ng-manager/lib/Lemonldap/NG/Manager/_i18n.pm @@ -393,8 +393,8 @@ sub en { samlAuthnContextMapPassword => 'Password', samlAuthnContextMapPasswordProtectedTransport => 'Password protected transport', - samlAuthnContextMapTLSClient => 'TLS client', - samlAuthnContextMapKerberos => 'Kerberos', + samlAuthnContextMapTLSClient => 'TLS client', + samlAuthnContextMapKerberos => 'Kerberos', samlCommonDomainCookie => 'Common Domain Cookie', samlCommonDomainCookieActivation => 'Activation', samlCommonDomainCookieDomain => 'Common domain', @@ -762,8 +762,8 @@ sub fr { samlAuthnContextMapPassword => 'Mot de passe', samlAuthnContextMapPasswordProtectedTransport => 'Mot de passe protégé', - samlAuthnContextMapTLSClient => 'Client TLS', - samlAuthnContextMapKerberos => 'Kerberos', + samlAuthnContextMapTLSClient => 'Client TLS', + samlAuthnContextMapKerberos => 'Kerberos', samlCommonDomainCookie => 'Cookie de Domaine Commun', samlCommonDomainCookieActivation => 'Activation', samlCommonDomainCookieDomain => 'Domaine commun', diff --git a/modules/lemonldap-ng-portal/example/soaptest.pl b/modules/lemonldap-ng-portal/example/soaptest.pl index f9ad424ad..e9b50886f 100755 --- a/modules/lemonldap-ng-portal/example/soaptest.pl +++ b/modules/lemonldap-ng-portal/example/soaptest.pl @@ -14,15 +14,15 @@ use Data::Dumper; my $session_id = shift @ARGV; # Service -my $soap = SOAP::Lite->new( proxy => 'http://auth.example.com/index.pl/sessions'); +my $soap = + SOAP::Lite->new( proxy => 'http://auth.example.com/index.pl/sessions' ); $soap->default_ns('urn:Lemonldap/NG/Common/CGI/SOAPService'); - # Call some SOAP methods -my $attributes = $soap->call( 'getAttributes', $session_id)->result(); +my $attributes = $soap->call( 'getAttributes', $session_id )->result(); print Dumper $attributes; -my $applications = $soap->call( 'getMenuApplications', $session_id)->result(); +my $applications = $soap->call( 'getMenuApplications', $session_id )->result(); print Dumper $applications; exit;