@@ -37,8 +37,8 @@ |
||
37 | 37 | $this->specify('verify service issueAccessToken', function () { |
38 | 38 | $authorizationServer = $this->createAuthorizationServer(); |
39 | 39 | $authorizationServer->expects($this->once()) |
40 | - ->method('issueAccessToken') |
|
41 | - ->will($this->returnValue(self::$token)); |
|
40 | + ->method('issueAccessToken') |
|
41 | + ->will($this->returnValue(self::$token)); |
|
42 | 42 | |
43 | 43 | $service = new OAuth2Service($authorizationServer, $this->createResourceServer()); |
44 | 44 | verify($service->issueAccessToken())->equals(self::$token); |
@@ -34,7 +34,7 @@ discard block |
||
34 | 34 | */ |
35 | 35 | public function testAssertIssueAccessToken() |
36 | 36 | { |
37 | - $this->specify('verify service issueAccessToken', function () { |
|
37 | + $this->specify('verify service issueAccessToken', function() { |
|
38 | 38 | $authorizationServer = $this->createAuthorizationServer(); |
39 | 39 | $authorizationServer->expects($this->once()) |
40 | 40 | ->method('issueAccessToken') |
@@ -50,7 +50,7 @@ discard block |
||
50 | 50 | */ |
51 | 51 | public function testAssertValidateAccessToken() |
52 | 52 | { |
53 | - $this->specify('verify service validateAccessToken', function () { |
|
53 | + $this->specify('verify service validateAccessToken', function() { |
|
54 | 54 | $service = new OAuth2Service($this->createAuthorizationServer(), $this->createResourceServer()); |
55 | 55 | verify($service->validateAccessToken(true, self::$token['access_token']))->true(); |
56 | 56 | }); |
@@ -61,7 +61,7 @@ discard block |
||
61 | 61 | */ |
62 | 62 | public function testAssertGetResourceOwnerId() |
63 | 63 | { |
64 | - $this->specify('verify service can getResourceOwnerId', function () { |
|
64 | + $this->specify('verify service can getResourceOwnerId', function() { |
|
65 | 65 | $service = new OAuth2Service($this->createAuthorizationServer(), $this->createResourceServer()); |
66 | 66 | $service->validateAccessToken(true, self::$token['access_token']); |
67 | 67 | verify($service->getResourceOwnerId())->equals('test'); |
@@ -73,7 +73,7 @@ discard block |
||
73 | 73 | */ |
74 | 74 | public function testAssertGetResourceOwnerType() |
75 | 75 | { |
76 | - $this->specify('verify service can getResourceOwnerType', function () { |
|
76 | + $this->specify('verify service can getResourceOwnerType', function() { |
|
77 | 77 | $service = new OAuth2Service($this->createAuthorizationServer(), $this->createResourceServer()); |
78 | 78 | $service->validateAccessToken(true, self::$token['access_token']); |
79 | 79 | verify($service->getResourceOwnerType())->equals('test'); |
@@ -85,7 +85,7 @@ discard block |
||
85 | 85 | */ |
86 | 86 | public function testAssertGetClientId() |
87 | 87 | { |
88 | - $this->specify('verify service can getClientId', function () { |
|
88 | + $this->specify('verify service can getClientId', function() { |
|
89 | 89 | $service = new OAuth2Service($this->createAuthorizationServer(), $this->createResourceServer()); |
90 | 90 | $service->validateAccessToken(true, self::$token['access_token']); |
91 | 91 | verify($service->getClientId())->equals('test'); |
@@ -1,6 +1,6 @@ discard block |
||
1 | 1 | <?php |
2 | 2 | |
3 | -require_once __DIR__ . '/../_support/Mock/MockStorageServiceProvider.php'; |
|
3 | +require_once __DIR__.'/../_support/Mock/MockStorageServiceProvider.php'; |
|
4 | 4 | |
5 | 5 | use Nord\Lumen\OAuth2\OAuth2ServiceProvider; |
6 | 6 | use Nord\Lumen\OAuth2\Middleware\OAuth2Middleware; |
@@ -34,10 +34,10 @@ discard block |
||
34 | 34 | */ |
35 | 35 | public function testAssertValidAccessToken() |
36 | 36 | { |
37 | - $this->specify('verify middleware valid access token', function () { |
|
37 | + $this->specify('verify middleware valid access token', function() { |
|
38 | 38 | $_SERVER['HTTP_AUTHORIZATION'] = 'Bearer mF_9.B5f-4.1JqM'; |
39 | 39 | $middleware = new OAuth2Middleware(); |
40 | - verify($middleware->handle($this->createRequest(), function () { |
|
40 | + verify($middleware->handle($this->createRequest(), function() { |
|
41 | 41 | return true; |
42 | 42 | }))->equals(true); |
43 | 43 | }); |
@@ -48,13 +48,13 @@ discard block |
||
48 | 48 | */ |
49 | 49 | public function testAssertInvalidAccessToken() |
50 | 50 | { |
51 | - $this->specify('verify middleware invalid access token', function () { |
|
51 | + $this->specify('verify middleware invalid access token', function() { |
|
52 | 52 | $middleware = new OAuth2Middleware(); |
53 | - $res = $middleware->handle($this->createRequest(), function () { |
|
53 | + $res = $middleware->handle($this->createRequest(), function() { |
|
54 | 54 | return true; |
55 | 55 | }); |
56 | 56 | verify($res)->isInstanceOf(Illuminate\Http\JsonResponse::class); |
57 | - verify((array)$res->getData())->equals(['message' => 'ERROR.ACCESS_DENIED']); |
|
57 | + verify((array) $res->getData())->equals(['message' => 'ERROR.ACCESS_DENIED']); |
|
58 | 58 | }); |
59 | 59 | } |
60 | 60 |
@@ -29,23 +29,23 @@ |
||
29 | 29 | */ |
30 | 30 | protected function registerContainerBindings(Container $container) |
31 | 31 | { |
32 | - $container->bind(MockAccessTokenStorage::class, function () { |
|
32 | + $container->bind(MockAccessTokenStorage::class, function() { |
|
33 | 33 | return new MockAccessTokenStorage; |
34 | 34 | }); |
35 | 35 | |
36 | - $container->bind(MockClientStorage::class, function () { |
|
36 | + $container->bind(MockClientStorage::class, function() { |
|
37 | 37 | return new MockClientStorage; |
38 | 38 | }); |
39 | 39 | |
40 | - $container->bind(MockRefreshTokenStorage::class, function () { |
|
40 | + $container->bind(MockRefreshTokenStorage::class, function() { |
|
41 | 41 | return new MockRefreshTokenStorage; |
42 | 42 | }); |
43 | 43 | |
44 | - $container->bind(MockScopeStorage::class, function () { |
|
44 | + $container->bind(MockScopeStorage::class, function() { |
|
45 | 45 | return new MockScopeStorage; |
46 | 46 | }); |
47 | 47 | |
48 | - $container->bind(MockSessionStorage::class, function () { |
|
48 | + $container->bind(MockSessionStorage::class, function() { |
|
49 | 49 | return new MockSessionStorage; |
50 | 50 | }); |
51 | 51 |