@@ -42,7 +42,7 @@ |
||
| 42 | 42 | */ |
| 43 | 43 | protected function registerBindings(Container $container, ConfigRepository $config) |
| 44 | 44 | { |
| 45 | - $container->bind(OAuth2Service::class, function ($container) use ($config) { |
|
| 45 | + $container->bind(OAuth2Service::class, function($container) use ($config) { |
|
| 46 | 46 | return $this->createService($container, $config[self::CONFIG_KEY]); |
| 47 | 47 | }); |
| 48 | 48 | |
@@ -9,7 +9,6 @@ |
||
| 9 | 9 | use Nord\Lumen\OAuth2\Exceptions\InvalidArgument; |
| 10 | 10 | use Illuminate\Config\Repository as ConfigRepository; |
| 11 | 11 | use Illuminate\Support\ServiceProvider; |
| 12 | -use Laravel\Lumen\Application; |
|
| 13 | 12 | use League\OAuth2\Server\AuthorizationServer; |
| 14 | 13 | use League\OAuth2\Server\Grant\PasswordGrant; |
| 15 | 14 | use League\OAuth2\Server\ResourceServer; |
@@ -34,7 +34,7 @@ discard block |
||
| 34 | 34 | */ |
| 35 | 35 | public function testAssertIssueAccessToken() |
| 36 | 36 | { |
| 37 | - $this->specify('verify service issueAccessToken', function () { |
|
| 37 | + $this->specify('verify service issueAccessToken', function() { |
|
| 38 | 38 | $authorizationServer = $this->createAuthorizationServer(); |
| 39 | 39 | $authorizationServer->expects($this->once()) |
| 40 | 40 | ->method('issueAccessToken') |
@@ -50,7 +50,7 @@ discard block |
||
| 50 | 50 | */ |
| 51 | 51 | public function testAssertValidateAccessToken() |
| 52 | 52 | { |
| 53 | - $this->specify('verify service validateAccessToken', function () { |
|
| 53 | + $this->specify('verify service validateAccessToken', function() { |
|
| 54 | 54 | $service = new OAuth2Service($this->createAuthorizationServer(), $this->createResourceServer()); |
| 55 | 55 | verify($service->validateAccessToken(true, self::$token['access_token']))->true(); |
| 56 | 56 | }); |
@@ -61,7 +61,7 @@ discard block |
||
| 61 | 61 | */ |
| 62 | 62 | public function testAssertGetResourceOwnerId() |
| 63 | 63 | { |
| 64 | - $this->specify('verify service can getResourceOwnerId', function () { |
|
| 64 | + $this->specify('verify service can getResourceOwnerId', function() { |
|
| 65 | 65 | $service = new OAuth2Service($this->createAuthorizationServer(), $this->createResourceServer()); |
| 66 | 66 | $service->validateAccessToken(true, self::$token['access_token']); |
| 67 | 67 | verify($service->getResourceOwnerId())->equals('test'); |
@@ -73,7 +73,7 @@ discard block |
||
| 73 | 73 | */ |
| 74 | 74 | public function testAssertGetResourceOwnerType() |
| 75 | 75 | { |
| 76 | - $this->specify('verify service can getResourceOwnerType', function () { |
|
| 76 | + $this->specify('verify service can getResourceOwnerType', function() { |
|
| 77 | 77 | $service = new OAuth2Service($this->createAuthorizationServer(), $this->createResourceServer()); |
| 78 | 78 | $service->validateAccessToken(true, self::$token['access_token']); |
| 79 | 79 | verify($service->getResourceOwnerType())->equals('test'); |
@@ -85,7 +85,7 @@ discard block |
||
| 85 | 85 | */ |
| 86 | 86 | public function testAssertGetClientId() |
| 87 | 87 | { |
| 88 | - $this->specify('verify service can getClientId', function () { |
|
| 88 | + $this->specify('verify service can getClientId', function() { |
|
| 89 | 89 | $service = new OAuth2Service($this->createAuthorizationServer(), $this->createResourceServer()); |
| 90 | 90 | $service->validateAccessToken(true, self::$token['access_token']); |
| 91 | 91 | verify($service->getClientId())->equals('test'); |
@@ -36,7 +36,7 @@ discard block |
||
| 36 | 36 | */ |
| 37 | 37 | public function testAssertCanBeRegistered() |
| 38 | 38 | { |
| 39 | - $this->specify('verify serviceProvider is registered', function () { |
|
| 39 | + $this->specify('verify serviceProvider is registered', function() { |
|
| 40 | 40 | $service = $this->app->make(OAuth2Service::class); |
| 41 | 41 | verify($service)->isInstanceOf(OAuth2Service::class); |
| 42 | 42 | }); |
@@ -47,7 +47,7 @@ discard block |
||
| 47 | 47 | */ |
| 48 | 48 | public function testAssertFacade() |
| 49 | 49 | { |
| 50 | - $this->specify('verify serviceProvider facade', function () { |
|
| 50 | + $this->specify('verify serviceProvider facade', function() { |
|
| 51 | 51 | verify(OAuth2Facade::getFacadeRoot())->isInstanceOf(OAuth2Service::class); |
| 52 | 52 | }); |
| 53 | 53 | } |
@@ -1,13 +1,13 @@ |
||
| 1 | 1 | <?php |
| 2 | 2 | // Here you can initialize variables that will be available to your tests |
| 3 | 3 | |
| 4 | -require_once __DIR__ . '/../_support/Mock/MockAccessToken.php'; |
|
| 5 | -require_once __DIR__ . '/../_support/Mock/MockApplication.php'; |
|
| 6 | -require_once __DIR__ . '/../_support/Mock/MockAuthorizationServer.php'; |
|
| 7 | -require_once __DIR__ . '/../_support/Mock/MockStorageServiceProvider.php'; |
|
| 8 | -require_once __DIR__ . '/../_support/Mock/Storages/MockStorage.php'; |
|
| 9 | -require_once __DIR__ . '/../_support/Mock/Storages/MockSessionStorage.php'; |
|
| 10 | -require_once __DIR__ . '/../_support/Mock/Storages/MockScopeStorage.php'; |
|
| 11 | -require_once __DIR__ . '/../_support/Mock/Storages/MockRefreshTokenStorage.php'; |
|
| 12 | -require_once __DIR__ . '/../_support/Mock/Storages/MockClientStorage.php'; |
|
| 13 | -require_once __DIR__ . '/../_support/Mock/Storages/MockAccessTokenStorage.php'; |
|
| 4 | +require_once __DIR__.'/../_support/Mock/MockAccessToken.php'; |
|
| 5 | +require_once __DIR__.'/../_support/Mock/MockApplication.php'; |
|
| 6 | +require_once __DIR__.'/../_support/Mock/MockAuthorizationServer.php'; |
|
| 7 | +require_once __DIR__.'/../_support/Mock/MockStorageServiceProvider.php'; |
|
| 8 | +require_once __DIR__.'/../_support/Mock/Storages/MockStorage.php'; |
|
| 9 | +require_once __DIR__.'/../_support/Mock/Storages/MockSessionStorage.php'; |
|
| 10 | +require_once __DIR__.'/../_support/Mock/Storages/MockScopeStorage.php'; |
|
| 11 | +require_once __DIR__.'/../_support/Mock/Storages/MockRefreshTokenStorage.php'; |
|
| 12 | +require_once __DIR__.'/../_support/Mock/Storages/MockClientStorage.php'; |
|
| 13 | +require_once __DIR__.'/../_support/Mock/Storages/MockAccessTokenStorage.php'; |
|
@@ -39,9 +39,9 @@ discard block |
||
| 39 | 39 | */ |
| 40 | 40 | public function testAssertValidAccessToken() |
| 41 | 41 | { |
| 42 | - $this->specify('verify middleware valid access token', function () { |
|
| 42 | + $this->specify('verify middleware valid access token', function() { |
|
| 43 | 43 | Unit::setAuthorizationHeader(); |
| 44 | - verify($this->middleware->handle(new Request(), function () { |
|
| 44 | + verify($this->middleware->handle(new Request(), function() { |
|
| 45 | 45 | return true; |
| 46 | 46 | }))->equals(true); |
| 47 | 47 | }); |
@@ -52,12 +52,12 @@ discard block |
||
| 52 | 52 | */ |
| 53 | 53 | public function testAssertInvalidAccessToken() |
| 54 | 54 | { |
| 55 | - $this->specify('verify middleware invalid access token', function () { |
|
| 56 | - $res = $this->middleware->handle(new Request(), function () { |
|
| 55 | + $this->specify('verify middleware invalid access token', function() { |
|
| 56 | + $res = $this->middleware->handle(new Request(), function() { |
|
| 57 | 57 | return true; |
| 58 | 58 | }); |
| 59 | 59 | verify($res)->isInstanceOf(JsonResponse::class); |
| 60 | - verify((array)$res->getData())->equals(['message' => 'ERROR.ACCESS_DENIED']); |
|
| 60 | + verify((array) $res->getData())->equals(['message' => 'ERROR.ACCESS_DENIED']); |
|
| 61 | 61 | }); |
| 62 | 62 | } |
| 63 | 63 | } |