RPKeyRotationOPSignKeyNativeTest   A
last analyzed

Complexity

Total Complexity 2

Size/Duplication

Total Lines 30
Duplicated Lines 0 %

Importance

Changes 1
Bugs 0 Features 0
Metric Value
eloc 13
dl 0
loc 30
rs 10
c 1
b 0
f 0
wmc 2

2 Methods

Rating   Name   Duplication   Size   Complexity  
A getTestId() 0 3 1
A execute() 0 22 1
1
<?php
2
3
declare(strict_types=1);
4
5
namespace Facile\OpenIDClient\ConformanceTest\RpTest\KeyRotation;
6
7
use PHPUnit\Framework\Assert;
8
use Facile\OpenIDClient\ConformanceTest\RpTest\AbstractRpTest;
9
use Facile\OpenIDClient\ConformanceTest\TestInfo;
10
use Facile\OpenIDClient\Session\AuthSession;
11
use Facile\OpenIDClient\Service\AuthorizationService;
12
use function Facile\OpenIDClient\base64url_encode;
13
14
/**
15
 * Request an ID Token and verify its signature.
16
 * Will have to retrieve new keys from the OP to be able to verify the ID Token
17
 *
18
 * Successfully verify the ID Token signature, fetching the rotated signing keys if the 'kid' claim in the
19
 * JOSE header is unknown.
20
 */
21
class RPKeyRotationOPSignKeyNativeTest extends AbstractRpTest
22
{
23
24
    public function getTestId(): string
25
    {
26
        return 'rp-key-rotation-op-sign-key-native';
27
    }
28
29
    public function execute(TestInfo $testInfo): void
30
    {
31
        $client = $this->registerClient($testInfo);
32
33
        // Get authorization redirect uri
34
        $authorizationService = new AuthorizationService();
0 ignored issues
show
Bug introduced by
The call to Facile\OpenIDClient\Serv...nService::__construct() has too few arguments starting with tokenSetFactory. ( Ignorable by Annotation )

If this is a false-positive, you can also ignore this issue in your code via the ignore-call  annotation

34
        $authorizationService = /** @scrutinizer ignore-call */ new AuthorizationService();

This check compares calls to functions or methods with their respective definitions. If the call has less arguments than are defined, it raises an issue.

If a function is defined several times with a different number of parameters, the check may pick up the wrong definition and report false positives. One codebase where this has been known to happen is Wordpress. Please note the @ignore annotation hint above.

Loading history...
35
        $authSession = AuthSession::fromArray([
36
            'state' => base64url_encode(\random_bytes(32)),
37
            'nonce' => base64url_encode(\random_bytes(32)),
38
        ]);
39
        $uri = $authorizationService->getAuthorizationUri($client, [
40
            'state' => $authSession->getState(),
41
            'nonce' => $authSession->getNonce(),
42
        ]);
43
44
        // Simulate a redirect and create the server request
45
        $serverRequest = $this->simulateAuthRedirect($uri);
46
47
        $params = $authorizationService->getCallbackParams($serverRequest, $client);
48
        $tokenSet = $authorizationService->callback($client, $params, null, $authSession);
49
50
        Assert::assertNotNull($tokenSet->getIdToken());
51
    }
52
}
53