We could not synchronize checks via GitHub's checks API since Scrutinizer's GitHub App is not installed for this repository.
@@ -23,108 +23,3 @@ |
||
23 | 23 | public function testNodeInterfaceAndFields(): void |
24 | 24 | { |
25 | 25 | $query = <<<'EOF' |
26 | - { |
|
27 | - usernames(usernames:["dschafer", "leebyron", "schrockn"]) { |
|
28 | - username |
|
29 | - url |
|
30 | - } |
|
31 | - } |
|
32 | - EOF; |
|
33 | - |
|
34 | - $expectedData = [ |
|
35 | - 'usernames' => [ |
|
36 | - [ |
|
37 | - 'username' => 'dschafer', |
|
38 | - 'url' => 'www.facebook.com/dschafer?lang=en', |
|
39 | - ], |
|
40 | - [ |
|
41 | - 'username' => 'leebyron', |
|
42 | - 'url' => 'www.facebook.com/leebyron?lang=en', |
|
43 | - ], |
|
44 | - [ |
|
45 | - 'username' => 'schrockn', |
|
46 | - 'url' => 'www.facebook.com/schrockn?lang=en', |
|
47 | - ], |
|
48 | - ], |
|
49 | - ]; |
|
50 | - |
|
51 | - $this->assertGraphQL($query, $expectedData, null, ['lang' => 'en']); |
|
52 | - } |
|
53 | - |
|
54 | - public function testCorrectlyIntrospects(): void |
|
55 | - { |
|
56 | - $query = <<<'EOF' |
|
57 | - { |
|
58 | - __schema { |
|
59 | - queryType { |
|
60 | - fields { |
|
61 | - name |
|
62 | - args { |
|
63 | - name |
|
64 | - type { |
|
65 | - kind |
|
66 | - ofType { |
|
67 | - kind |
|
68 | - ofType { |
|
69 | - kind |
|
70 | - ofType { |
|
71 | - name |
|
72 | - kind |
|
73 | - } |
|
74 | - } |
|
75 | - } |
|
76 | - } |
|
77 | - } |
|
78 | - type { |
|
79 | - kind |
|
80 | - ofType { |
|
81 | - name |
|
82 | - kind |
|
83 | - } |
|
84 | - } |
|
85 | - } |
|
86 | - } |
|
87 | - } |
|
88 | - } |
|
89 | - EOF; |
|
90 | - |
|
91 | - $expectedData = [ |
|
92 | - '__schema' => [ |
|
93 | - 'queryType' => [ |
|
94 | - 'fields' => [ |
|
95 | - [ |
|
96 | - 'name' => 'usernames', |
|
97 | - 'args' => [ |
|
98 | - [ |
|
99 | - 'name' => 'usernames', |
|
100 | - 'type' => [ |
|
101 | - 'kind' => 'NON_NULL', |
|
102 | - 'ofType' => [ |
|
103 | - 'kind' => 'LIST', |
|
104 | - 'ofType' => [ |
|
105 | - 'kind' => 'NON_NULL', |
|
106 | - 'ofType' => [ |
|
107 | - 'name' => 'String', |
|
108 | - 'kind' => 'SCALAR', |
|
109 | - ], |
|
110 | - ], |
|
111 | - ], |
|
112 | - ], |
|
113 | - ], |
|
114 | - ], |
|
115 | - 'type' => [ |
|
116 | - 'kind' => 'LIST', |
|
117 | - 'ofType' => [ |
|
118 | - 'name' => 'User', |
|
119 | - 'kind' => 'OBJECT', |
|
120 | - ], |
|
121 | - ], |
|
122 | - ], |
|
123 | - ], |
|
124 | - ], |
|
125 | - ], |
|
126 | - ]; |
|
127 | - |
|
128 | - $this->assertGraphQL($query, $expectedData); |
|
129 | - } |
|
130 | -} |
@@ -23,119 +23,3 @@ |
||
23 | 23 | public function testIncludesConnectionAndEdgeFields(): void |
24 | 24 | { |
25 | 25 | $query = <<<'EOF' |
26 | - query FriendsQuery { |
|
27 | - user { |
|
28 | - friends(first: 2) { |
|
29 | - totalCount |
|
30 | - edges { |
|
31 | - friendshipTime |
|
32 | - node { |
|
33 | - name |
|
34 | - } |
|
35 | - } |
|
36 | - } |
|
37 | - } |
|
38 | - } |
|
39 | - EOF; |
|
40 | - |
|
41 | - $expectedData = [ |
|
42 | - 'user' => [ |
|
43 | - 'friends' => [ |
|
44 | - 'totalCount' => 4, |
|
45 | - 'edges' => [ |
|
46 | - [ |
|
47 | - 'friendshipTime' => 'Yesterday', |
|
48 | - 'node' => [ |
|
49 | - 'name' => 'Nick', |
|
50 | - ], |
|
51 | - ], |
|
52 | - [ |
|
53 | - 'friendshipTime' => 'Yesterday', |
|
54 | - 'node' => [ |
|
55 | - 'name' => 'Lee', |
|
56 | - ], |
|
57 | - ], |
|
58 | - ], |
|
59 | - ], |
|
60 | - ], |
|
61 | - ]; |
|
62 | - |
|
63 | - $this->assertGraphQL($query, $expectedData); |
|
64 | - } |
|
65 | - |
|
66 | - public function testWorksWithForwardConnectionArgs(): void |
|
67 | - { |
|
68 | - $query = <<<'EOF' |
|
69 | - query FriendsQuery { |
|
70 | - user { |
|
71 | - friendsForward(first: 2) { |
|
72 | - edges { |
|
73 | - node { |
|
74 | - name |
|
75 | - } |
|
76 | - } |
|
77 | - } |
|
78 | - } |
|
79 | - } |
|
80 | - EOF; |
|
81 | - |
|
82 | - $expectedData = [ |
|
83 | - 'user' => [ |
|
84 | - 'friendsForward' => [ |
|
85 | - 'edges' => [ |
|
86 | - [ |
|
87 | - 'node' => [ |
|
88 | - 'name' => 'Nick', |
|
89 | - ], |
|
90 | - ], |
|
91 | - [ |
|
92 | - 'node' => [ |
|
93 | - 'name' => 'Lee', |
|
94 | - ], |
|
95 | - ], |
|
96 | - ], |
|
97 | - ], |
|
98 | - ], |
|
99 | - ]; |
|
100 | - |
|
101 | - $this->assertGraphQL($query, $expectedData); |
|
102 | - } |
|
103 | - |
|
104 | - public function testWorksWithBackwardConnectionArgs(): void |
|
105 | - { |
|
106 | - $query = <<<'EOF' |
|
107 | - query FriendsQuery { |
|
108 | - user { |
|
109 | - friendsBackward(last: 2) { |
|
110 | - edges { |
|
111 | - node { |
|
112 | - name |
|
113 | - } |
|
114 | - } |
|
115 | - } |
|
116 | - } |
|
117 | - } |
|
118 | - EOF; |
|
119 | - |
|
120 | - $expectedData = [ |
|
121 | - 'user' => [ |
|
122 | - 'friendsBackward' => [ |
|
123 | - 'edges' => [ |
|
124 | - [ |
|
125 | - 'node' => [ |
|
126 | - 'name' => 'Joe', |
|
127 | - ], |
|
128 | - ], |
|
129 | - [ |
|
130 | - 'node' => [ |
|
131 | - 'name' => 'Tim', |
|
132 | - ], |
|
133 | - ], |
|
134 | - ], |
|
135 | - ], |
|
136 | - ], |
|
137 | - ]; |
|
138 | - |
|
139 | - $this->assertGraphQL($query, $expectedData); |
|
140 | - } |
|
141 | -} |
@@ -32,7 +32,7 @@ |
||
32 | 32 | |
33 | 33 | public function getPrivatePropertyWithoutGetterUsingCallBack(): Closure |
34 | 34 | { |
35 | - return fn () => $this->privatePropertyWithoutGetter; |
|
35 | + return fn() => $this->privatePropertyWithoutGetter; |
|
36 | 36 | } |
37 | 37 | |
38 | 38 | public function resolve(): array |
@@ -261,7 +261,7 @@ |
||
261 | 261 | public function testUnionAutoguessed(): void |
262 | 262 | { |
263 | 263 | $this->expect('Killable', 'union', [ |
264 | - 'types' => ['Hero', 'Mandalorian', 'Sith'], |
|
264 | + 'types' => ['Hero', 'Mandalorian', 'Sith'], |
|
265 | 265 | 'resolveType' => '@=value.getType()', |
266 | 266 | ]); |
267 | 267 | } |
@@ -35,6 +35,6 @@ |
||
35 | 35 | } |
36 | 36 | } |
37 | 37 | |
38 | - return array_filter($config, fn ($item) => !is_array($item) || !empty($item)); |
|
38 | + return array_filter($config, fn($item) => !is_array($item) || !empty($item)); |
|
39 | 39 | } |
40 | 40 | } |
@@ -81,6 +81,4 @@ |
||
81 | 81 | $reactAdapter->convertThenable($promise); |
82 | 82 | |
83 | 83 | $this->assertInstanceOf(Promise::class, $promise); |
84 | - $this->assertInstanceOf(FulfilledPromise::class, $promise->adoptedPromise); // @phpstan-ignore-line |
|
85 | - } |
|
86 | -} |
|
84 | + $this->assertInstanceOf(FulfilledPromise::class, $promise->adoptedPromise |
|
87 | 85 | \ No newline at end of file |
@@ -106,13 +106,13 @@ |
||
106 | 106 | protected function createGraphQLServices(array $services = []): GraphQLServices |
107 | 107 | { |
108 | 108 | $locateableServices = [ |
109 | - 'typeResolver' => fn () => $this->createMock(TypeResolver::class), |
|
110 | - 'queryResolver' => fn () => $this->createMock(TypeResolver::class), |
|
111 | - 'mutationResolver' => fn () => $$this->createMock(MutationResolver::class), |
|
109 | + 'typeResolver' => fn() => $this->createMock(TypeResolver::class), |
|
110 | + 'queryResolver' => fn() => $this->createMock(TypeResolver::class), |
|
111 | + 'mutationResolver' => fn() => $$this->createMock(MutationResolver::class), |
|
112 | 112 | ]; |
113 | 113 | |
114 | 114 | foreach ($services as $id => $service) { |
115 | - $locateableServices[$id] = fn () => $service; |
|
115 | + $locateableServices[$id] = fn() => $service; |
|
116 | 116 | } |
117 | 117 | |
118 | 118 | return new GraphQLServices($locateableServices); |
@@ -281,6 +281,4 @@ |
||
281 | 281 | ], |
282 | 282 | ]; |
283 | 283 | |
284 | - $this->assertGraphQL($query, $expectedData); |
|
285 | - } |
|
286 | -} |
|
284 | + $this->assertGraphQL($query, $expectedData |
|
287 | 285 | \ No newline at end of file |
@@ -26,343 +26,3 @@ |
||
26 | 26 | private string $userIsEnabledQuery = 'query ($hasAccess: Boolean = true) { user { isEnabled(hasAccess: $hasAccess) } }'; |
27 | 27 | |
28 | 28 | private string $userFriendsQuery = <<<'QUERY' |
29 | - query { |
|
30 | - user { |
|
31 | - friends(first: 2) { |
|
32 | - edges { |
|
33 | - node { |
|
34 | - name |
|
35 | - } |
|
36 | - } |
|
37 | - } |
|
38 | - } |
|
39 | - } |
|
40 | - QUERY; |
|
41 | - |
|
42 | - private string $simpleMutationWithThunkQuery = <<<'MUTATION' |
|
43 | - mutation M { |
|
44 | - simpleMutationWithThunkFields(input: {inputData: %d, clientMutationId: "bac"}) { |
|
45 | - result |
|
46 | - clientMutationId |
|
47 | - } |
|
48 | - } |
|
49 | - MUTATION; |
|
50 | - |
|
51 | - public function setUp(): void |
|
52 | - { |
|
53 | - parent::setUp(); |
|
54 | - // load types |
|
55 | - $this->loader = function ($class): void { |
|
56 | - if (preg_match('@^'.preg_quote('Overblog\GraphQLBundle\Access\__DEFINITIONS__\\').'(.*)$@', $class, $matches)) { |
|
57 | - $file = sys_get_temp_dir().'/OverblogGraphQLBundle/'.Kernel::VERSION.'/access/cache/testaccess/overblog/graphql-bundle/__definitions__/'.$matches[1].'.php'; |
|
58 | - if (file_exists($file)) { |
|
59 | - require $file; |
|
60 | - } |
|
61 | - } |
|
62 | - }; |
|
63 | - spl_autoload_register($this->loader); |
|
64 | - } |
|
65 | - |
|
66 | - public function testCustomClassLoaderNotRegister(): void |
|
67 | - { |
|
68 | - $this->expectException(Error::class); |
|
69 | - if ((int) phpversion() <= 7) { |
|
70 | - $this->expectExceptionMessage('Class \'Overblog\GraphQLBundle\Access\__DEFINITIONS__\RootQueryType\' not found'); |
|
71 | - } else { |
|
72 | - $this->expectExceptionMessage('Class "Overblog\GraphQLBundle\Access\__DEFINITIONS__\RootQueryType" not found'); |
|
73 | - } |
|
74 | - spl_autoload_unregister($this->loader); |
|
75 | - $this->assertResponse($this->userNameQuery, [], static::ANONYMOUS_USER, 'access'); |
|
76 | - } |
|
77 | - |
|
78 | - public function testNotAuthenticatedUserAccessAsPromisedFulfilledTrue(): void |
|
79 | - { |
|
80 | - $this->assertResponse( |
|
81 | - $this->userIsEnabledQuery, |
|
82 | - ['data' => ['user' => ['isEnabled' => true]]], |
|
83 | - static::ANONYMOUS_USER, |
|
84 | - 'access' |
|
85 | - ); |
|
86 | - } |
|
87 | - |
|
88 | - public function testNotAuthenticatedUserAccessAsPromisedFulfilledFalse(): void |
|
89 | - { |
|
90 | - $this->assertResponse( |
|
91 | - $this->userIsEnabledQuery, |
|
92 | - [ |
|
93 | - 'data' => [ |
|
94 | - 'user' => [ |
|
95 | - 'isEnabled' => null, |
|
96 | - ], |
|
97 | - ], |
|
98 | - 'extensions' => [ |
|
99 | - 'warnings' => [ |
|
100 | - [ |
|
101 | - 'message' => 'Access denied to this field.', |
|
102 | - 'locations' => [['line' => 1, 'column' => 45]], |
|
103 | - 'path' => ['user', 'isEnabled'], |
|
104 | - ], |
|
105 | - ], |
|
106 | - ], |
|
107 | - ], |
|
108 | - static::ANONYMOUS_USER, |
|
109 | - 'access', |
|
110 | - '', |
|
111 | - ['hasAccess' => false] |
|
112 | - ); |
|
113 | - } |
|
114 | - |
|
115 | - public function testNotAuthenticatedUserAccessToUserName(): void |
|
116 | - { |
|
117 | - $expected = [ |
|
118 | - 'data' => [ |
|
119 | - 'user' => [ |
|
120 | - 'name' => null, |
|
121 | - ], |
|
122 | - ], |
|
123 | - 'extensions' => [ |
|
124 | - 'warnings' => [ |
|
125 | - [ |
|
126 | - 'message' => 'Access denied to this field.', |
|
127 | - 'locations' => [['line' => 1, 'column' => 16]], |
|
128 | - 'path' => ['user', 'name'], |
|
129 | - ], |
|
130 | - ], |
|
131 | - ], |
|
132 | - ]; |
|
133 | - |
|
134 | - $this->assertResponse($this->userNameQuery, $expected, static::ANONYMOUS_USER, 'access'); |
|
135 | - } |
|
136 | - |
|
137 | - public function testNonAuthenticatedUserAccessSecuredFieldWhichInitiallyResolvesToArray(): void |
|
138 | - { |
|
139 | - $expected = [ |
|
140 | - 'data' => [ |
|
141 | - 'youShallNotSeeThisUnauthenticated' => null, |
|
142 | - ], |
|
143 | - 'extensions' => [ |
|
144 | - 'warnings' => [ |
|
145 | - [ |
|
146 | - 'message' => 'Access denied to this field.', |
|
147 | - 'locations' => [ |
|
148 | - [ |
|
149 | - 'line' => 2, |
|
150 | - 'column' => 3, |
|
151 | - ], |
|
152 | - ], |
|
153 | - 'path' => ['youShallNotSeeThisUnauthenticated'], |
|
154 | - ], |
|
155 | - ], |
|
156 | - ], |
|
157 | - ]; |
|
158 | - |
|
159 | - $query = <<<'QUERY' |
|
160 | - { |
|
161 | - youShallNotSeeThisUnauthenticated { |
|
162 | - secretValue |
|
163 | - youAreAuthenticated |
|
164 | - } |
|
165 | - } |
|
166 | - QUERY; |
|
167 | - |
|
168 | - $this->assertResponse($query, $expected, static::ANONYMOUS_USER, 'access'); |
|
169 | - } |
|
170 | - |
|
171 | - public function testFullyAuthenticatedUserAccessToUserName(): void |
|
172 | - { |
|
173 | - $expected = [ |
|
174 | - 'data' => [ |
|
175 | - 'user' => [ |
|
176 | - 'name' => 'Dan', |
|
177 | - ], |
|
178 | - ], |
|
179 | - ]; |
|
180 | - |
|
181 | - $this->assertResponse($this->userNameQuery, $expected, static::USER_RYAN, 'access'); |
|
182 | - } |
|
183 | - |
|
184 | - public function testNotAuthenticatedUserAccessToUserRoles(): void |
|
185 | - { |
|
186 | - $this->assertResponse($this->userRolesQuery, $this->expectedFailedUserRoles(), static::ANONYMOUS_USER, 'access'); |
|
187 | - } |
|
188 | - |
|
189 | - public function testAuthenticatedUserAccessToUserRolesWithoutEnoughRights(): void |
|
190 | - { |
|
191 | - $this->assertResponse($this->userRolesQuery, $this->expectedFailedUserRoles(), static::USER_RYAN, 'access'); |
|
192 | - } |
|
193 | - |
|
194 | - public function testUserWithCorrectRightsAccessToUserRoles(): void |
|
195 | - { |
|
196 | - $expected = [ |
|
197 | - 'data' => [ |
|
198 | - 'user' => [ |
|
199 | - 'roles' => ['ROLE_USER'], |
|
200 | - ], |
|
201 | - ], |
|
202 | - ]; |
|
203 | - |
|
204 | - $this->assertResponse($this->userRolesQuery, $expected, static::USER_ADMIN, 'access'); |
|
205 | - } |
|
206 | - |
|
207 | - public function testUserForbiddenField(): void |
|
208 | - { |
|
209 | - $expected = [ |
|
210 | - 'data' => [ |
|
211 | - 'user' => null, |
|
212 | - ], |
|
213 | - 'extensions' => [ |
|
214 | - 'warnings' => [ |
|
215 | - [ |
|
216 | - 'message' => 'Access denied to this field.', |
|
217 | - 'locations' => [ |
|
218 | - [ |
|
219 | - 'line' => 3, |
|
220 | - 'column' => 5, |
|
221 | - ], |
|
222 | - ], |
|
223 | - 'path' => ['user', 'forbidden'], |
|
224 | - ], |
|
225 | - ], |
|
226 | - ], |
|
227 | - ]; |
|
228 | - |
|
229 | - $query = <<<'QUERY' |
|
230 | - query MyQuery { |
|
231 | - user { |
|
232 | - forbidden |
|
233 | - } |
|
234 | - } |
|
235 | - QUERY; |
|
236 | - |
|
237 | - $this->assertResponse($query, $expected, static::USER_ADMIN, 'access'); |
|
238 | - } |
|
239 | - |
|
240 | - public function testUserAccessToUserFriends(): void |
|
241 | - { |
|
242 | - $expected = [ |
|
243 | - 'data' => [ |
|
244 | - 'user' => [ |
|
245 | - 'friends' => [ |
|
246 | - 'edges' => [ |
|
247 | - ['node' => ['name' => 'Nick']], |
|
248 | - ['node' => null], |
|
249 | - ], |
|
250 | - ], |
|
251 | - ], |
|
252 | - ], |
|
253 | - ]; |
|
254 | - |
|
255 | - $this->assertResponse($this->userFriendsQuery, $expected, static::USER_ADMIN, 'access'); |
|
256 | - } |
|
257 | - |
|
258 | - public function testUserAccessToUserFriendsAsArray(): void |
|
259 | - { |
|
260 | - $expected = [ |
|
261 | - 'data' => [ |
|
262 | - 'user' => [ |
|
263 | - 'friendsAsArray' => [1, null, 3], |
|
264 | - ], |
|
265 | - ], |
|
266 | - ]; |
|
267 | - |
|
268 | - $this->assertResponse('query { user { friendsAsArray } }', $expected, static::USER_ADMIN, 'access'); |
|
269 | - } |
|
270 | - |
|
271 | - public function testMutationAllowedUser(): void |
|
272 | - { |
|
273 | - $result = 123; |
|
274 | - |
|
275 | - $expected = [ |
|
276 | - 'data' => [ |
|
277 | - 'simpleMutationWithThunkFields' => [ |
|
278 | - 'result' => $result, |
|
279 | - 'clientMutationId' => 'bac', |
|
280 | - ], |
|
281 | - ], |
|
282 | - ]; |
|
283 | - |
|
284 | - $this->assertResponse(sprintf($this->simpleMutationWithThunkQuery, $result), $expected, static::USER_ADMIN, 'access'); |
|
285 | - $this->assertTrue(SimpleMutationWithThunkFieldsMutation::hasMutate(true)); |
|
286 | - } |
|
287 | - |
|
288 | - public function testMutationAllowedButNoRightsToDisplayPayload(): void |
|
289 | - { |
|
290 | - $expected = [ |
|
291 | - 'data' => [ |
|
292 | - 'simpleMutationWithThunkFields' => [ |
|
293 | - 'result' => null, |
|
294 | - 'clientMutationId' => 'bac', |
|
295 | - ], |
|
296 | - ], |
|
297 | - 'extensions' => [ |
|
298 | - 'warnings' => [ |
|
299 | - [ |
|
300 | - 'message' => 'Access denied to this field.', |
|
301 | - 'locations' => [ |
|
302 | - [ |
|
303 | - 'line' => 3, |
|
304 | - 'column' => 5, |
|
305 | - ], |
|
306 | - ], |
|
307 | - 'path' => ['simpleMutationWithThunkFields', 'result'], |
|
308 | - ], |
|
309 | - ], |
|
310 | - ], |
|
311 | - ]; |
|
312 | - |
|
313 | - $this->assertResponse(sprintf($this->simpleMutationWithThunkQuery, 321), $expected, static::USER_ADMIN, 'access'); |
|
314 | - $this->assertTrue(SimpleMutationWithThunkFieldsMutation::hasMutate(true)); |
|
315 | - } |
|
316 | - |
|
317 | - public function testMutationNotAllowedUser(): void |
|
318 | - { |
|
319 | - $expected = [ |
|
320 | - 'errors' => [ |
|
321 | - [ |
|
322 | - 'message' => 'Access denied to this field.', |
|
323 | - 'locations' => [ |
|
324 | - [ |
|
325 | - 'line' => 2, |
|
326 | - 'column' => 3, |
|
327 | - ], |
|
328 | - ], |
|
329 | - 'path' => ['simpleMutationWithThunkFields'], |
|
330 | - ], |
|
331 | - ], |
|
332 | - 'data' => [ |
|
333 | - 'simpleMutationWithThunkFields' => null, |
|
334 | - ], |
|
335 | - ]; |
|
336 | - |
|
337 | - $this->assertResponse(sprintf($this->simpleMutationWithThunkQuery, 123), $expected, static::USER_RYAN, 'access'); |
|
338 | - $this->assertFalse(SimpleMutationWithThunkFieldsMutation::hasMutate(true)); |
|
339 | - } |
|
340 | - |
|
341 | - private function expectedFailedUserRoles(): array |
|
342 | - { |
|
343 | - return [ |
|
344 | - 'data' => [ |
|
345 | - 'user' => [ |
|
346 | - 'roles' => null, |
|
347 | - ], |
|
348 | - ], |
|
349 | - 'extensions' => [ |
|
350 | - 'warnings' => [ |
|
351 | - [ |
|
352 | - 'message' => 'Access denied to this field.', |
|
353 | - 'locations' => [ |
|
354 | - [ |
|
355 | - 'line' => 1, |
|
356 | - 'column' => 16, |
|
357 | - ], |
|
358 | - ], |
|
359 | - 'path' => [ |
|
360 | - 'user', |
|
361 | - 'roles', |
|
362 | - ], |
|
363 | - ], |
|
364 | - ], |
|
365 | - ], |
|
366 | - ]; |
|
367 | - } |
|
368 | -} |