88 * @contact  eric@zhu.email 
99 * @license  https://github.com/hyperf-ext/auth/blob/master/LICENSE 
1010 */ 
11+ 
1112namespace  HyperfTest ;
1213
1314use  Hyperf \HttpServer \Request ;
@@ -37,7 +38,7 @@ public function testUserCanBeRetrievedByQueryStringVariable()
3738        $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['api_token '  => 'foo ' ])->andReturn ($ user );
3839        $ request  = $ this  ->createRequest (['api_token '  => 'foo ' ]);
3940
40-         $ guard  = new  TokenGuard ($ request , $ provider );
41+         $ guard  = new  TokenGuard ($ request , $ provider,  ' foo '  );
4142
4243        $ user  = $ guard ->user ();
4344
@@ -55,7 +56,7 @@ public function testTokenCanBeHashed()
5556        $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['api_token '  => hash ('sha256 ' , 'foo ' )])->andReturn ($ user );
5657        $ request  = $ this  ->createRequest (['api_token '  => 'foo ' ]);
5758
58-         $ guard  = new  TokenGuard ($ request , $ provider , [
59+         $ guard  = new  TokenGuard ($ request , $ provider , ' foo ' ,  [
5960            'input_key '  => 'api_token ' ,
6061            'storage_key '  => 'api_token ' ,
6162            'hash '  => true ,
@@ -75,7 +76,7 @@ public function testUserCanBeRetrievedByAuthHeaders()
7576        $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['api_token '  => 'foo ' ])->andReturn (new  AuthTokenGuardTestUser ());
7677        $ request  = $ this  ->createRequest ([], ['Authorization '  => 'Basic  '  . base64_encode ('foo:foo ' )]);
7778
78-         $ guard  = new  TokenGuard ($ request , $ provider );
79+         $ guard  = new  TokenGuard ($ request , $ provider,  ' foo '  );
7980
8081        $ user  = $ guard ->user ();
8182
@@ -88,7 +89,7 @@ public function testUserCanBeRetrievedByBearerToken()
8889        $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['api_token '  => 'foo ' ])->andReturn (new  AuthTokenGuardTestUser ());
8990        $ request  = $ this  ->createRequest ([], ['Authorization '  => 'Bearer foo ' ]);
9091
91-         $ guard  = new  TokenGuard ($ request , $ provider );
92+         $ guard  = new  TokenGuard ($ request , $ provider,  ' foo '  );
9293
9394        $ user  = $ guard ->user ();
9495
@@ -103,7 +104,7 @@ public function testValidateCanDetermineIfCredentialsAreValid()
103104        $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['api_token '  => 'foo ' ])->andReturn ($ user );
104105        $ request  = $ this  ->createRequest (['api_token '  => 'foo ' ]);
105106
106-         $ guard  = new  TokenGuard ($ request , $ provider );
107+         $ guard  = new  TokenGuard ($ request , $ provider,  ' foo '  );
107108
108109        $ this  ->assertTrue ($ guard ->validate (['api_token '  => 'foo ' ]));
109110    }
@@ -114,7 +115,7 @@ public function testValidateCanDetermineIfCredentialsAreInvalid()
114115        $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['api_token '  => 'foo ' ])->andReturn (null );
115116        $ request  = $ this  ->createRequest (['api_token '  => 'foo ' ]);
116117
117-         $ guard  = new  TokenGuard ($ request , $ provider );
118+         $ guard  = new  TokenGuard ($ request , $ provider,  ' foo '  );
118119
119120        $ this  ->assertFalse ($ guard ->validate (['api_token '  => 'foo ' ]));
120121    }
@@ -124,7 +125,7 @@ public function testValidateIfApiTokenIsEmpty()
124125        $ provider  = m::mock (UserProviderInterface::class);
125126        $ request  = $ this  ->createRequest (['api_token '  => 'foo ' ]);
126127
127-         $ guard  = new  TokenGuard ($ request , $ provider );
128+         $ guard  = new  TokenGuard ($ request , $ provider,  ' foo '  );
128129
129130        $ this  ->assertFalse ($ guard ->validate (['api_token '  => '' ]));
130131    }
@@ -137,7 +138,7 @@ public function testItAllowsToPassCustomRequestInSetterAndUseItForValidation()
137138        $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['api_token '  => 'custom ' ])->andReturn ($ user );
138139        $ request  = $ this  ->createRequest (['api_token '  => 'foo ' ]);
139140
140-         $ guard  = new  TokenGuard ($ request , $ provider );
141+         $ guard  = new  TokenGuard ($ request , $ provider,  ' foo '  );
141142        $ guard ->setRequest ($ this  ->createRequest (['api_token '  => 'custom ' ]));
142143
143144        $ user  = $ guard ->user ();
@@ -151,7 +152,7 @@ public function testUserCanBeRetrievedByBearerTokenWithCustomKey()
151152        $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['custom_token_field '  => 'foo ' ])->andReturn (new  AuthTokenGuardTestUser ());
152153        $ request  = $ this  ->createRequest ([], ['Authorization '  => 'Bearer foo ' ]);
153154
154-         $ guard  = new  TokenGuard ($ request , $ provider , [
155+         $ guard  = new  TokenGuard ($ request , $ provider , ' foo ' ,  [
155156            'input_key '  => 'custom_token_field ' ,
156157            'storage_key '  => 'custom_token_field ' ,
157158        ]);
@@ -169,7 +170,7 @@ public function testUserCanBeRetrievedByQueryStringVariableWithCustomKey()
169170        $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['custom_token_field '  => 'foo ' ])->andReturn ($ user );
170171        $ request  = $ this  ->createRequest (['custom_token_field '  => 'foo ' ]);
171172
172-         $ guard  = new  TokenGuard ($ request , $ provider , [
173+         $ guard  = new  TokenGuard ($ request , $ provider , ' foo ' ,  [
173174            'input_key '  => 'custom_token_field ' ,
174175            'storage_key '  => 'custom_token_field ' ,
175176        ]);
@@ -188,7 +189,7 @@ public function testUserCanBeRetrievedByAuthHeadersWithCustomField()
188189        $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['custom_token_field '  => 'foo ' ])->andReturn (new  AuthTokenGuardTestUser ());
189190        $ request  = $ this  ->createRequest ([], ['Authorization '  => 'Basic  '  . base64_encode ('foo:foo ' )]);
190191
191-         $ guard  = new  TokenGuard ($ request , $ provider , [
192+         $ guard  = new  TokenGuard ($ request , $ provider , ' foo ' ,  [
192193            'input_key '  => 'custom_token_field ' ,
193194            'storage_key '  => 'custom_token_field ' ,
194195        ]);
@@ -206,7 +207,7 @@ public function testValidateCanDetermineIfCredentialsAreValidWithCustomKey()
206207        $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['custom_token_field '  => 'foo ' ])->andReturn ($ user );
207208        $ request  = $ this  ->createRequest (['custom_token_field '  => 'foo ' ]);
208209
209-         $ guard  = new  TokenGuard ($ request , $ provider , [
210+         $ guard  = new  TokenGuard ($ request , $ provider , ' foo ' ,  [
210211            'input_key '  => 'custom_token_field ' ,
211212            'storage_key '  => 'custom_token_field ' ,
212213        ]);
@@ -220,7 +221,7 @@ public function testValidateCanDetermineIfCredentialsAreInvalidWithCustomKey()
220221        $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['custom_token_field '  => 'foo ' ])->andReturn (null );
221222        $ request  = $ this  ->createRequest (['custom_token_field '  => 'foo ' ]);
222223
223-         $ guard  = new  TokenGuard ($ request , $ provider , [
224+         $ guard  = new  TokenGuard ($ request , $ provider , ' foo ' ,  [
224225            'input_key '  => 'custom_token_field ' ,
225226            'storage_key '  => 'custom_token_field ' ,
226227        ]);
@@ -233,7 +234,7 @@ public function testValidateIfApiTokenIsEmptyWithCustomKey()
233234        $ provider  = m::mock (UserProviderInterface::class);
234235        $ request  = $ this  ->createRequest (['custom_token_field '  => '' ]);
235236
236-         $ guard  = new  TokenGuard ($ request , $ provider , [
237+         $ guard  = new  TokenGuard ($ request , $ provider , ' foo ' ,  [
237238            'input_key '  => 'custom_token_field ' ,
238239            'storage_key '  => 'custom_token_field ' ,
239240        ]);
0 commit comments