@@ -67,9 +67,9 @@ discard block |
||
67 | 67 | if (file_exists($signerKey)) { |
68 | 68 | $this->signer = new RsaSha256(); |
69 | 69 | $password = getenv('JWT_KEY_PASSWORD'); |
70 | - $this->privateKey = new Key('file://' . $signerKey, $password ?: null); |
|
70 | + $this->privateKey = new Key('file://'.$signerKey, $password ?: null); |
|
71 | 71 | // We're having an RSA signed key instead of a string |
72 | - $this->publicKey = new Key('file://' . getenv('JWT_PUBLIC_KEY')); |
|
72 | + $this->publicKey = new Key('file://'.getenv('JWT_PUBLIC_KEY')); |
|
73 | 73 | } else { |
74 | 74 | $this->signer = new Sha256(); |
75 | 75 | $this->privateKey = $signerKey; |
@@ -95,7 +95,7 @@ discard block |
||
95 | 95 | * @throws OutOfBoundsException |
96 | 96 | * @throws BadMethodCallException |
97 | 97 | */ |
98 | - public function authenticate(array $data, HTTPRequest $request, ValidationResult &$result = null) |
|
98 | + public function authenticate(array $data, HTTPRequest $request, ValidationResult & $result = null) |
|
99 | 99 | { |
100 | 100 | if (!$result) { |
101 | 101 | $result = new ValidationResult(); |
@@ -46,8 +46,8 @@ discard block |
||
46 | 46 | public function testValidToken() |
47 | 47 | { |
48 | 48 | $authenticator = Injector::inst()->get(JWTAuthenticator::class); |
49 | - $request = new HTTPRequest('POST', Director::absoluteBaseURL() . '/graphql'); |
|
50 | - $request->addHeader('Authorization', 'Bearer ' . $this->token); |
|
49 | + $request = new HTTPRequest('POST', Director::absoluteBaseURL().'/graphql'); |
|
50 | + $request->addHeader('Authorization', 'Bearer '.$this->token); |
|
51 | 51 | |
52 | 52 | $result = $authenticator->authenticate(['token' => $this->token], $request); |
53 | 53 | |
@@ -60,8 +60,8 @@ discard block |
||
60 | 60 | putenv('JWT_SIGNER_KEY=string'); |
61 | 61 | |
62 | 62 | $authenticator = Injector::inst()->get(JWTAuthenticator::class); |
63 | - $request = new HTTPRequest('POST', Director::absoluteBaseURL() . '/graphql'); |
|
64 | - $request->addHeader('Authorization', 'Bearer ' . $this->token); |
|
63 | + $request = new HTTPRequest('POST', Director::absoluteBaseURL().'/graphql'); |
|
64 | + $request->addHeader('Authorization', 'Bearer '.$this->token); |
|
65 | 65 | |
66 | 66 | $result = $authenticator->authenticate(['token' => $this->token], $request); |
67 | 67 | |
@@ -73,8 +73,8 @@ discard block |
||
73 | 73 | public function testInvalidUniqueID() |
74 | 74 | { |
75 | 75 | $authenticator = Injector::inst()->get(JWTAuthenticator::class); |
76 | - $request = new HTTPRequest('POST', Director::absoluteBaseURL() . '/graphql'); |
|
77 | - $request->addHeader('Authorization', 'Bearer ' . $this->token); |
|
76 | + $request = new HTTPRequest('POST', Director::absoluteBaseURL().'/graphql'); |
|
77 | + $request->addHeader('Authorization', 'Bearer '.$this->token); |
|
78 | 78 | |
79 | 79 | // Invalidate the Unique ID by making it something arbitrarily wrong |
80 | 80 | $member = Member::get()->filter(['Email' => '[email protected]'])->first(); |
@@ -103,8 +103,8 @@ discard block |
||
103 | 103 | $token = $response->Token; |
104 | 104 | |
105 | 105 | $authenticator = Injector::inst()->get(JWTAuthenticator::class); |
106 | - $request = new HTTPRequest('POST', Director::absoluteBaseURL() . '/graphql'); |
|
107 | - $request->addHeader('Authorization', 'Bearer ' . $token); |
|
106 | + $request = new HTTPRequest('POST', Director::absoluteBaseURL().'/graphql'); |
|
107 | + $request->addHeader('Authorization', 'Bearer '.$token); |
|
108 | 108 | |
109 | 109 | $result = $authenticator->authenticate(['token' => $token], $request); |
110 | 110 |
@@ -48,8 +48,8 @@ |
||
48 | 48 | |
49 | 49 | private function buildRequest() |
50 | 50 | { |
51 | - $request = new HTTPRequest('POST', Director::absoluteBaseURL() . '/graphql'); |
|
52 | - $request->addHeader('Authorization', 'Bearer ' . $this->token); |
|
51 | + $request = new HTTPRequest('POST', Director::absoluteBaseURL().'/graphql'); |
|
52 | + $request->addHeader('Authorization', 'Bearer '.$this->token); |
|
53 | 53 | |
54 | 54 | $request->setSession(new Session(['hello' => 'bye'])); // We need a session |
55 | 55 | Controller::curr()->setRequest($request); |
@@ -46,8 +46,8 @@ discard block |
||
46 | 46 | { |
47 | 47 | putenv('JWT_SIGNER_KEY=string'); |
48 | 48 | |
49 | - $request = new HTTPRequest('POST', Director::absoluteBaseURL() . '/graphql'); |
|
50 | - $request->addHeader('Authorization', 'Bearer ' . $this->token); |
|
49 | + $request = new HTTPRequest('POST', Director::absoluteBaseURL().'/graphql'); |
|
50 | + $request->addHeader('Authorization', 'Bearer '.$this->token); |
|
51 | 51 | |
52 | 52 | $handler = Injector::inst()->get(JWTAuthenticationHandler::class); |
53 | 53 | |
@@ -59,8 +59,8 @@ discard block |
||
59 | 59 | |
60 | 60 | public function testAuthenticateRequest() |
61 | 61 | { |
62 | - $request = new HTTPRequest('POST', Director::absoluteBaseURL() . '/graphql'); |
|
63 | - $request->addHeader('Authorization', 'Bearer ' . $this->token); |
|
62 | + $request = new HTTPRequest('POST', Director::absoluteBaseURL().'/graphql'); |
|
63 | + $request->addHeader('Authorization', 'Bearer '.$this->token); |
|
64 | 64 | |
65 | 65 | $handler = Injector::inst()->get(JWTAuthenticationHandler::class); |
66 | 66 |
@@ -64,8 +64,8 @@ |
||
64 | 64 | if ($anonymous) { |
65 | 65 | $token = $this->anonymousToken; |
66 | 66 | } |
67 | - $request = new HTTPRequest('POST', Director::absoluteBaseURL() . '/graphql'); |
|
68 | - $request->addHeader('Authorization', 'Bearer ' . $token); |
|
67 | + $request = new HTTPRequest('POST', Director::absoluteBaseURL().'/graphql'); |
|
68 | + $request->addHeader('Authorization', 'Bearer '.$token); |
|
69 | 69 | |
70 | 70 | $request->setSession(new Session(['hello' => 'bye'])); // We need a session |
71 | 71 | Controller::curr()->setRequest($request); |