@@ -55,7 +55,10 @@ public function testHashIsReadFromCookie()
55
55
56
56
$ security = new MockSecurity (new MockAppConfig ());
57
57
58
- $ this ->assertSame ('8b9218a55906f9dcc1dc263dce7f005a ' , $ security ->getHash ());
58
+ $ this ->assertSame (
59
+ '8b9218a55906f9dcc1dc263dce7f005a ' ,
60
+ $ security ->getHash ()
61
+ );
59
62
}
60
63
61
64
public function testGetHashSetsCookieWhenGETWithoutCSRFCookie ()
@@ -89,7 +92,12 @@ public function testCSRFVerifyPostThrowsExceptionOnNoMatch()
89
92
$ _COOKIE ['csrf_cookie_name ' ] = '8b9218a55906f9dcc1dc263dce7f005b ' ;
90
93
91
94
$ security = new MockSecurity (new MockAppConfig ());
92
- $ request = new IncomingRequest (new MockAppConfig (), new URI ('http://badurl.com ' ), null , new UserAgent ());
95
+ $ request = new IncomingRequest (
96
+ new MockAppConfig (),
97
+ new URI ('http://badurl.com ' ),
98
+ null ,
99
+ new UserAgent ()
100
+ );
93
101
94
102
$ this ->expectException (SecurityException::class);
95
103
$ security ->verify ($ request );
@@ -103,7 +111,12 @@ public function testCSRFVerifyPostReturnsSelfOnMatch()
103
111
$ _COOKIE ['csrf_cookie_name ' ] = '8b9218a55906f9dcc1dc263dce7f005a ' ;
104
112
105
113
$ security = new MockSecurity (new MockAppConfig ());
106
- $ request = new IncomingRequest (new MockAppConfig (), new URI ('http://badurl.com ' ), null , new UserAgent ());
114
+ $ request = new IncomingRequest (
115
+ new MockAppConfig (),
116
+ new URI ('http://badurl.com ' ),
117
+ null ,
118
+ new UserAgent ()
119
+ );
107
120
108
121
$ this ->assertInstanceOf (Security::class, $ security ->verify ($ request ));
109
122
$ this ->assertLogged ('info ' , 'CSRF token verified. ' );
@@ -117,7 +130,12 @@ public function testCSRFVerifyHeaderThrowsExceptionOnNoMatch()
117
130
$ _COOKIE ['csrf_cookie_name ' ] = '8b9218a55906f9dcc1dc263dce7f005b ' ;
118
131
119
132
$ security = new MockSecurity (new MockAppConfig ());
120
- $ request = new IncomingRequest (new MockAppConfig (), new URI ('http://badurl.com ' ), null , new UserAgent ());
133
+ $ request = new IncomingRequest (
134
+ new MockAppConfig (),
135
+ new URI ('http://badurl.com ' ),
136
+ null ,
137
+ new UserAgent ()
138
+ );
121
139
122
140
$ request ->setHeader ('X-CSRF-TOKEN ' , '8b9218a55906f9dcc1dc263dce7f005a ' );
123
141
@@ -132,7 +150,12 @@ public function testCSRFVerifyHeaderReturnsSelfOnMatch()
132
150
$ _COOKIE ['csrf_cookie_name ' ] = '8b9218a55906f9dcc1dc263dce7f005a ' ;
133
151
134
152
$ security = new MockSecurity (new MockAppConfig ());
135
- $ request = new IncomingRequest (new MockAppConfig (), new URI ('http://badurl.com ' ), null , new UserAgent ());
153
+ $ request = new IncomingRequest (
154
+ new MockAppConfig (),
155
+ new URI ('http://badurl.com ' ),
156
+ null ,
157
+ new UserAgent ()
158
+ );
136
159
137
160
$ request ->setHeader ('X-CSRF-TOKEN ' , '8b9218a55906f9dcc1dc263dce7f005a ' );
138
161
@@ -148,9 +171,16 @@ public function testCSRFVerifyJsonThrowsExceptionOnNoMatch()
148
171
$ _COOKIE ['csrf_cookie_name ' ] = '8b9218a55906f9dcc1dc263dce7f005b ' ;
149
172
150
173
$ security = new MockSecurity (new MockAppConfig ());
151
- $ request = new IncomingRequest (new MockAppConfig (), new URI ('http://badurl.com ' ), null , new UserAgent ());
174
+ $ request = new IncomingRequest (
175
+ new MockAppConfig (),
176
+ new URI ('http://badurl.com ' ),
177
+ null ,
178
+ new UserAgent ()
179
+ );
152
180
153
- $ request ->setBody ('{"csrf_test_name":"8b9218a55906f9dcc1dc263dce7f005a"} ' );
181
+ $ request ->setBody (
182
+ '{"csrf_test_name":"8b9218a55906f9dcc1dc263dce7f005a"} '
183
+ );
154
184
155
185
$ this ->expectException (SecurityException::class);
156
186
$ security ->verify ($ request );
@@ -162,9 +192,16 @@ public function testCSRFVerifyJsonReturnsSelfOnMatch()
162
192
$ _COOKIE ['csrf_cookie_name ' ] = '8b9218a55906f9dcc1dc263dce7f005a ' ;
163
193
164
194
$ security = new MockSecurity (new MockAppConfig ());
165
- $ request = new IncomingRequest (new MockAppConfig (), new URI ('http://badurl.com ' ), null , new UserAgent ());
195
+ $ request = new IncomingRequest (
196
+ new MockAppConfig (),
197
+ new URI ('http://badurl.com ' ),
198
+ null ,
199
+ new UserAgent ()
200
+ );
166
201
167
- $ request ->setBody ('{"csrf_test_name":"8b9218a55906f9dcc1dc263dce7f005a","foo":"bar"} ' );
202
+ $ request ->setBody (
203
+ '{"csrf_test_name":"8b9218a55906f9dcc1dc263dce7f005a","foo":"bar"} '
204
+ );
168
205
169
206
$ this ->assertInstanceOf (Security::class, $ security ->verify ($ request ));
170
207
$ this ->assertLogged ('info ' , 'CSRF token verified. ' );
@@ -192,7 +229,12 @@ public function testRegenerateWithFalseSecurityRegenerateProperty()
192
229
Factories::injectMock ('config ' , 'Security ' , $ config );
193
230
194
231
$ security = new MockSecurity (new MockAppConfig ());
195
- $ request = new IncomingRequest (new MockAppConfig (), new URI ('http://badurl.com ' ), null , new UserAgent ());
232
+ $ request = new IncomingRequest (
233
+ new MockAppConfig (),
234
+ new URI ('http://badurl.com ' ),
235
+ null ,
236
+ new UserAgent ()
237
+ );
196
238
197
239
$ oldHash = $ security ->getHash ();
198
240
$ security ->verify ($ request );
@@ -212,7 +254,12 @@ public function testRegenerateWithTrueSecurityRegenerateProperty()
212
254
Factories::injectMock ('config ' , 'Security ' , $ config );
213
255
214
256
$ security = new MockSecurity (new MockAppConfig ());
215
- $ request = new IncomingRequest (new MockAppConfig (), new URI ('http://badurl.com ' ), null , new UserAgent ());
257
+ $ request = new IncomingRequest (
258
+ new MockAppConfig (),
259
+ new URI ('http://badurl.com ' ),
260
+ null ,
261
+ new UserAgent ()
262
+ );
216
263
217
264
$ oldHash = $ security ->getHash ();
218
265
$ security ->verify ($ request );
0 commit comments