@@ -42,7 +42,7 @@ |
||
42 | 42 | */ |
43 | 43 | protected function registerBindings(Container $container, ConfigRepository $config) |
44 | 44 | { |
45 | - $container->bind(OAuth2Service::class, function ($container) use ($config) { |
|
45 | + $container->bind(OAuth2Service::class, function($container) use ($config) { |
|
46 | 46 | return $this->createService($container, $config[self::CONFIG_KEY]); |
47 | 47 | }); |
48 | 48 |
@@ -9,7 +9,6 @@ |
||
9 | 9 | use Nord\Lumen\OAuth2\Exceptions\InvalidArgument; |
10 | 10 | use Illuminate\Config\Repository as ConfigRepository; |
11 | 11 | use Illuminate\Support\ServiceProvider; |
12 | -use Laravel\Lumen\Application; |
|
13 | 12 | use League\OAuth2\Server\AuthorizationServer; |
14 | 13 | use League\OAuth2\Server\Grant\PasswordGrant; |
15 | 14 | use League\OAuth2\Server\ResourceServer; |
@@ -34,7 +34,7 @@ discard block |
||
34 | 34 | */ |
35 | 35 | public function testAssertIssueAccessToken() |
36 | 36 | { |
37 | - $this->specify('verify service issueAccessToken', function () { |
|
37 | + $this->specify('verify service issueAccessToken', function() { |
|
38 | 38 | $authorizationServer = $this->createAuthorizationServer(); |
39 | 39 | $authorizationServer->expects($this->once()) |
40 | 40 | ->method('issueAccessToken') |
@@ -50,7 +50,7 @@ discard block |
||
50 | 50 | */ |
51 | 51 | public function testAssertValidateAccessToken() |
52 | 52 | { |
53 | - $this->specify('verify service validateAccessToken', function () { |
|
53 | + $this->specify('verify service validateAccessToken', function() { |
|
54 | 54 | $service = new OAuth2Service($this->createAuthorizationServer(), $this->createResourceServer()); |
55 | 55 | verify($service->validateAccessToken(true, self::$token['access_token']))->true(); |
56 | 56 | }); |
@@ -61,7 +61,7 @@ discard block |
||
61 | 61 | */ |
62 | 62 | public function testAssertGetResourceOwnerId() |
63 | 63 | { |
64 | - $this->specify('verify service can getResourceOwnerId', function () { |
|
64 | + $this->specify('verify service can getResourceOwnerId', function() { |
|
65 | 65 | $service = new OAuth2Service($this->createAuthorizationServer(), $this->createResourceServer()); |
66 | 66 | $service->validateAccessToken(true, self::$token['access_token']); |
67 | 67 | verify($service->getResourceOwnerId())->equals('test'); |
@@ -73,7 +73,7 @@ discard block |
||
73 | 73 | */ |
74 | 74 | public function testAssertGetResourceOwnerType() |
75 | 75 | { |
76 | - $this->specify('verify service can getResourceOwnerType', function () { |
|
76 | + $this->specify('verify service can getResourceOwnerType', function() { |
|
77 | 77 | $service = new OAuth2Service($this->createAuthorizationServer(), $this->createResourceServer()); |
78 | 78 | $service->validateAccessToken(true, self::$token['access_token']); |
79 | 79 | verify($service->getResourceOwnerType())->equals('test'); |
@@ -85,7 +85,7 @@ discard block |
||
85 | 85 | */ |
86 | 86 | public function testAssertGetClientId() |
87 | 87 | { |
88 | - $this->specify('verify service can getClientId', function () { |
|
88 | + $this->specify('verify service can getClientId', function() { |
|
89 | 89 | $service = new OAuth2Service($this->createAuthorizationServer(), $this->createResourceServer()); |
90 | 90 | $service->validateAccessToken(true, self::$token['access_token']); |
91 | 91 | verify($service->getClientId())->equals('test'); |
@@ -36,7 +36,7 @@ discard block |
||
36 | 36 | */ |
37 | 37 | public function testAssertCanBeRegistered() |
38 | 38 | { |
39 | - $this->specify('verify serviceProvider is registered', function () { |
|
39 | + $this->specify('verify serviceProvider is registered', function() { |
|
40 | 40 | $service = $this->app->make(OAuth2Service::class); |
41 | 41 | verify($service)->isInstanceOf(OAuth2Service::class); |
42 | 42 | }); |
@@ -47,7 +47,7 @@ discard block |
||
47 | 47 | */ |
48 | 48 | public function testAssertFacade() |
49 | 49 | { |
50 | - $this->specify('verify serviceProvider facade', function () { |
|
50 | + $this->specify('verify serviceProvider facade', function() { |
|
51 | 51 | verify(OAuth2Facade::getFacadeRoot())->isInstanceOf(OAuth2Service::class); |
52 | 52 | }); |
53 | 53 | } |
@@ -1,13 +1,13 @@ |
||
1 | 1 | <?php |
2 | 2 | // Here you can initialize variables that will be available to your tests |
3 | 3 | |
4 | -require_once __DIR__ . '/../_support/Mock/MockAccessToken.php'; |
|
5 | -require_once __DIR__ . '/../_support/Mock/MockApplication.php'; |
|
6 | -require_once __DIR__ . '/../_support/Mock/MockAuthorizationServer.php'; |
|
7 | -require_once __DIR__ . '/../_support/Mock/MockStorageServiceProvider.php'; |
|
8 | -require_once __DIR__ . '/../_support/Mock/Storages/MockStorage.php'; |
|
9 | -require_once __DIR__ . '/../_support/Mock/Storages/MockSessionStorage.php'; |
|
10 | -require_once __DIR__ . '/../_support/Mock/Storages/MockScopeStorage.php'; |
|
11 | -require_once __DIR__ . '/../_support/Mock/Storages/MockRefreshTokenStorage.php'; |
|
12 | -require_once __DIR__ . '/../_support/Mock/Storages/MockClientStorage.php'; |
|
13 | -require_once __DIR__ . '/../_support/Mock/Storages/MockAccessTokenStorage.php'; |
|
4 | +require_once __DIR__.'/../_support/Mock/MockAccessToken.php'; |
|
5 | +require_once __DIR__.'/../_support/Mock/MockApplication.php'; |
|
6 | +require_once __DIR__.'/../_support/Mock/MockAuthorizationServer.php'; |
|
7 | +require_once __DIR__.'/../_support/Mock/MockStorageServiceProvider.php'; |
|
8 | +require_once __DIR__.'/../_support/Mock/Storages/MockStorage.php'; |
|
9 | +require_once __DIR__.'/../_support/Mock/Storages/MockSessionStorage.php'; |
|
10 | +require_once __DIR__.'/../_support/Mock/Storages/MockScopeStorage.php'; |
|
11 | +require_once __DIR__.'/../_support/Mock/Storages/MockRefreshTokenStorage.php'; |
|
12 | +require_once __DIR__.'/../_support/Mock/Storages/MockClientStorage.php'; |
|
13 | +require_once __DIR__.'/../_support/Mock/Storages/MockAccessTokenStorage.php'; |
@@ -39,9 +39,9 @@ discard block |
||
39 | 39 | */ |
40 | 40 | public function testAssertValidAccessToken() |
41 | 41 | { |
42 | - $this->specify('verify middleware valid access token', function () { |
|
42 | + $this->specify('verify middleware valid access token', function() { |
|
43 | 43 | Unit::setAuthorizationHeader(); |
44 | - verify($this->middleware->handle(new Request(), function () { |
|
44 | + verify($this->middleware->handle(new Request(), function() { |
|
45 | 45 | return true; |
46 | 46 | }))->equals(true); |
47 | 47 | }); |
@@ -52,12 +52,12 @@ discard block |
||
52 | 52 | */ |
53 | 53 | public function testAssertInvalidAccessToken() |
54 | 54 | { |
55 | - $this->specify('verify middleware invalid access token', function () { |
|
56 | - $res = $this->middleware->handle(new Request(), function () { |
|
55 | + $this->specify('verify middleware invalid access token', function() { |
|
56 | + $res = $this->middleware->handle(new Request(), function() { |
|
57 | 57 | return true; |
58 | 58 | }); |
59 | 59 | verify($res)->isInstanceOf(JsonResponse::class); |
60 | - verify((array)$res->getData())->equals(['message' => 'ERROR.ACCESS_DENIED']); |
|
60 | + verify((array) $res->getData())->equals(['message' => 'ERROR.ACCESS_DENIED']); |
|
61 | 61 | }); |
62 | 62 | } |
63 | 63 | } |