@@ -55,7 +55,10 @@ public function testHashIsReadFromCookie()
5555
5656 $ security = new MockSecurity (new MockAppConfig ());
5757
58- $ this ->assertSame ('8b9218a55906f9dcc1dc263dce7f005a ' , $ security ->getHash ());
58+ $ this ->assertSame (
59+ '8b9218a55906f9dcc1dc263dce7f005a ' ,
60+ $ security ->getHash ()
61+ );
5962 }
6063
6164 public function testGetHashSetsCookieWhenGETWithoutCSRFCookie ()
@@ -89,7 +92,12 @@ public function testCSRFVerifyPostThrowsExceptionOnNoMatch()
8992 $ _COOKIE ['csrf_cookie_name ' ] = '8b9218a55906f9dcc1dc263dce7f005b ' ;
9093
9194 $ security = new MockSecurity (new MockAppConfig ());
92- $ request = new IncomingRequest (new MockAppConfig (), new URI ('http://badurl.com ' ), null , new UserAgent ());
95+ $ request = new IncomingRequest (
96+ new MockAppConfig (),
97+ new URI ('http://badurl.com ' ),
98+ null ,
99+ new UserAgent ()
100+ );
93101
94102 $ this ->expectException (SecurityException::class);
95103 $ security ->verify ($ request );
@@ -103,7 +111,12 @@ public function testCSRFVerifyPostReturnsSelfOnMatch()
103111 $ _COOKIE ['csrf_cookie_name ' ] = '8b9218a55906f9dcc1dc263dce7f005a ' ;
104112
105113 $ security = new MockSecurity (new MockAppConfig ());
106- $ request = new IncomingRequest (new MockAppConfig (), new URI ('http://badurl.com ' ), null , new UserAgent ());
114+ $ request = new IncomingRequest (
115+ new MockAppConfig (),
116+ new URI ('http://badurl.com ' ),
117+ null ,
118+ new UserAgent ()
119+ );
107120
108121 $ this ->assertInstanceOf (Security::class, $ security ->verify ($ request ));
109122 $ this ->assertLogged ('info ' , 'CSRF token verified. ' );
@@ -117,7 +130,12 @@ public function testCSRFVerifyHeaderThrowsExceptionOnNoMatch()
117130 $ _COOKIE ['csrf_cookie_name ' ] = '8b9218a55906f9dcc1dc263dce7f005b ' ;
118131
119132 $ security = new MockSecurity (new MockAppConfig ());
120- $ request = new IncomingRequest (new MockAppConfig (), new URI ('http://badurl.com ' ), null , new UserAgent ());
133+ $ request = new IncomingRequest (
134+ new MockAppConfig (),
135+ new URI ('http://badurl.com ' ),
136+ null ,
137+ new UserAgent ()
138+ );
121139
122140 $ request ->setHeader ('X-CSRF-TOKEN ' , '8b9218a55906f9dcc1dc263dce7f005a ' );
123141
@@ -132,7 +150,12 @@ public function testCSRFVerifyHeaderReturnsSelfOnMatch()
132150 $ _COOKIE ['csrf_cookie_name ' ] = '8b9218a55906f9dcc1dc263dce7f005a ' ;
133151
134152 $ security = new MockSecurity (new MockAppConfig ());
135- $ request = new IncomingRequest (new MockAppConfig (), new URI ('http://badurl.com ' ), null , new UserAgent ());
153+ $ request = new IncomingRequest (
154+ new MockAppConfig (),
155+ new URI ('http://badurl.com ' ),
156+ null ,
157+ new UserAgent ()
158+ );
136159
137160 $ request ->setHeader ('X-CSRF-TOKEN ' , '8b9218a55906f9dcc1dc263dce7f005a ' );
138161
@@ -148,9 +171,16 @@ public function testCSRFVerifyJsonThrowsExceptionOnNoMatch()
148171 $ _COOKIE ['csrf_cookie_name ' ] = '8b9218a55906f9dcc1dc263dce7f005b ' ;
149172
150173 $ security = new MockSecurity (new MockAppConfig ());
151- $ request = new IncomingRequest (new MockAppConfig (), new URI ('http://badurl.com ' ), null , new UserAgent ());
174+ $ request = new IncomingRequest (
175+ new MockAppConfig (),
176+ new URI ('http://badurl.com ' ),
177+ null ,
178+ new UserAgent ()
179+ );
152180
153- $ request ->setBody ('{"csrf_test_name":"8b9218a55906f9dcc1dc263dce7f005a"} ' );
181+ $ request ->setBody (
182+ '{"csrf_test_name":"8b9218a55906f9dcc1dc263dce7f005a"} '
183+ );
154184
155185 $ this ->expectException (SecurityException::class);
156186 $ security ->verify ($ request );
@@ -162,9 +192,16 @@ public function testCSRFVerifyJsonReturnsSelfOnMatch()
162192 $ _COOKIE ['csrf_cookie_name ' ] = '8b9218a55906f9dcc1dc263dce7f005a ' ;
163193
164194 $ security = new MockSecurity (new MockAppConfig ());
165- $ request = new IncomingRequest (new MockAppConfig (), new URI ('http://badurl.com ' ), null , new UserAgent ());
195+ $ request = new IncomingRequest (
196+ new MockAppConfig (),
197+ new URI ('http://badurl.com ' ),
198+ null ,
199+ new UserAgent ()
200+ );
166201
167- $ request ->setBody ('{"csrf_test_name":"8b9218a55906f9dcc1dc263dce7f005a","foo":"bar"} ' );
202+ $ request ->setBody (
203+ '{"csrf_test_name":"8b9218a55906f9dcc1dc263dce7f005a","foo":"bar"} '
204+ );
168205
169206 $ this ->assertInstanceOf (Security::class, $ security ->verify ($ request ));
170207 $ this ->assertLogged ('info ' , 'CSRF token verified. ' );
@@ -192,7 +229,12 @@ public function testRegenerateWithFalseSecurityRegenerateProperty()
192229 Factories::injectMock ('config ' , 'Security ' , $ config );
193230
194231 $ security = new MockSecurity (new MockAppConfig ());
195- $ request = new IncomingRequest (new MockAppConfig (), new URI ('http://badurl.com ' ), null , new UserAgent ());
232+ $ request = new IncomingRequest (
233+ new MockAppConfig (),
234+ new URI ('http://badurl.com ' ),
235+ null ,
236+ new UserAgent ()
237+ );
196238
197239 $ oldHash = $ security ->getHash ();
198240 $ security ->verify ($ request );
@@ -212,7 +254,12 @@ public function testRegenerateWithTrueSecurityRegenerateProperty()
212254 Factories::injectMock ('config ' , 'Security ' , $ config );
213255
214256 $ security = new MockSecurity (new MockAppConfig ());
215- $ request = new IncomingRequest (new MockAppConfig (), new URI ('http://badurl.com ' ), null , new UserAgent ());
257+ $ request = new IncomingRequest (
258+ new MockAppConfig (),
259+ new URI ('http://badurl.com ' ),
260+ null ,
261+ new UserAgent ()
262+ );
216263
217264 $ oldHash = $ security ->getHash ();
218265 $ security ->verify ($ request );
0 commit comments