88 * @contact eric@zhu.email
99 * @license https://github.com/hyperf-ext/auth/blob/master/LICENSE
1010 */
11+
1112namespace HyperfTest ;
1213
1314use Hyperf \HttpServer \Request ;
@@ -37,7 +38,7 @@ public function testUserCanBeRetrievedByQueryStringVariable()
3738 $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['api_token ' => 'foo ' ])->andReturn ($ user );
3839 $ request = $ this ->createRequest (['api_token ' => 'foo ' ]);
3940
40- $ guard = new TokenGuard ($ request , $ provider );
41+ $ guard = new TokenGuard ($ request , $ provider, ' foo ' );
4142
4243 $ user = $ guard ->user ();
4344
@@ -55,7 +56,7 @@ public function testTokenCanBeHashed()
5556 $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['api_token ' => hash ('sha256 ' , 'foo ' )])->andReturn ($ user );
5657 $ request = $ this ->createRequest (['api_token ' => 'foo ' ]);
5758
58- $ guard = new TokenGuard ($ request , $ provider , [
59+ $ guard = new TokenGuard ($ request , $ provider , ' foo ' , [
5960 'input_key ' => 'api_token ' ,
6061 'storage_key ' => 'api_token ' ,
6162 'hash ' => true ,
@@ -75,7 +76,7 @@ public function testUserCanBeRetrievedByAuthHeaders()
7576 $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['api_token ' => 'foo ' ])->andReturn (new AuthTokenGuardTestUser ());
7677 $ request = $ this ->createRequest ([], ['Authorization ' => 'Basic ' . base64_encode ('foo:foo ' )]);
7778
78- $ guard = new TokenGuard ($ request , $ provider );
79+ $ guard = new TokenGuard ($ request , $ provider, ' foo ' );
7980
8081 $ user = $ guard ->user ();
8182
@@ -88,7 +89,7 @@ public function testUserCanBeRetrievedByBearerToken()
8889 $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['api_token ' => 'foo ' ])->andReturn (new AuthTokenGuardTestUser ());
8990 $ request = $ this ->createRequest ([], ['Authorization ' => 'Bearer foo ' ]);
9091
91- $ guard = new TokenGuard ($ request , $ provider );
92+ $ guard = new TokenGuard ($ request , $ provider, ' foo ' );
9293
9394 $ user = $ guard ->user ();
9495
@@ -103,7 +104,7 @@ public function testValidateCanDetermineIfCredentialsAreValid()
103104 $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['api_token ' => 'foo ' ])->andReturn ($ user );
104105 $ request = $ this ->createRequest (['api_token ' => 'foo ' ]);
105106
106- $ guard = new TokenGuard ($ request , $ provider );
107+ $ guard = new TokenGuard ($ request , $ provider, ' foo ' );
107108
108109 $ this ->assertTrue ($ guard ->validate (['api_token ' => 'foo ' ]));
109110 }
@@ -114,7 +115,7 @@ public function testValidateCanDetermineIfCredentialsAreInvalid()
114115 $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['api_token ' => 'foo ' ])->andReturn (null );
115116 $ request = $ this ->createRequest (['api_token ' => 'foo ' ]);
116117
117- $ guard = new TokenGuard ($ request , $ provider );
118+ $ guard = new TokenGuard ($ request , $ provider, ' foo ' );
118119
119120 $ this ->assertFalse ($ guard ->validate (['api_token ' => 'foo ' ]));
120121 }
@@ -124,7 +125,7 @@ public function testValidateIfApiTokenIsEmpty()
124125 $ provider = m::mock (UserProviderInterface::class);
125126 $ request = $ this ->createRequest (['api_token ' => 'foo ' ]);
126127
127- $ guard = new TokenGuard ($ request , $ provider );
128+ $ guard = new TokenGuard ($ request , $ provider, ' foo ' );
128129
129130 $ this ->assertFalse ($ guard ->validate (['api_token ' => '' ]));
130131 }
@@ -137,7 +138,7 @@ public function testItAllowsToPassCustomRequestInSetterAndUseItForValidation()
137138 $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['api_token ' => 'custom ' ])->andReturn ($ user );
138139 $ request = $ this ->createRequest (['api_token ' => 'foo ' ]);
139140
140- $ guard = new TokenGuard ($ request , $ provider );
141+ $ guard = new TokenGuard ($ request , $ provider, ' foo ' );
141142 $ guard ->setRequest ($ this ->createRequest (['api_token ' => 'custom ' ]));
142143
143144 $ user = $ guard ->user ();
@@ -151,7 +152,7 @@ public function testUserCanBeRetrievedByBearerTokenWithCustomKey()
151152 $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['custom_token_field ' => 'foo ' ])->andReturn (new AuthTokenGuardTestUser ());
152153 $ request = $ this ->createRequest ([], ['Authorization ' => 'Bearer foo ' ]);
153154
154- $ guard = new TokenGuard ($ request , $ provider , [
155+ $ guard = new TokenGuard ($ request , $ provider , ' foo ' , [
155156 'input_key ' => 'custom_token_field ' ,
156157 'storage_key ' => 'custom_token_field ' ,
157158 ]);
@@ -169,7 +170,7 @@ public function testUserCanBeRetrievedByQueryStringVariableWithCustomKey()
169170 $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['custom_token_field ' => 'foo ' ])->andReturn ($ user );
170171 $ request = $ this ->createRequest (['custom_token_field ' => 'foo ' ]);
171172
172- $ guard = new TokenGuard ($ request , $ provider , [
173+ $ guard = new TokenGuard ($ request , $ provider , ' foo ' , [
173174 'input_key ' => 'custom_token_field ' ,
174175 'storage_key ' => 'custom_token_field ' ,
175176 ]);
@@ -188,7 +189,7 @@ public function testUserCanBeRetrievedByAuthHeadersWithCustomField()
188189 $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['custom_token_field ' => 'foo ' ])->andReturn (new AuthTokenGuardTestUser ());
189190 $ request = $ this ->createRequest ([], ['Authorization ' => 'Basic ' . base64_encode ('foo:foo ' )]);
190191
191- $ guard = new TokenGuard ($ request , $ provider , [
192+ $ guard = new TokenGuard ($ request , $ provider , ' foo ' , [
192193 'input_key ' => 'custom_token_field ' ,
193194 'storage_key ' => 'custom_token_field ' ,
194195 ]);
@@ -206,7 +207,7 @@ public function testValidateCanDetermineIfCredentialsAreValidWithCustomKey()
206207 $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['custom_token_field ' => 'foo ' ])->andReturn ($ user );
207208 $ request = $ this ->createRequest (['custom_token_field ' => 'foo ' ]);
208209
209- $ guard = new TokenGuard ($ request , $ provider , [
210+ $ guard = new TokenGuard ($ request , $ provider , ' foo ' , [
210211 'input_key ' => 'custom_token_field ' ,
211212 'storage_key ' => 'custom_token_field ' ,
212213 ]);
@@ -220,7 +221,7 @@ public function testValidateCanDetermineIfCredentialsAreInvalidWithCustomKey()
220221 $ provider ->shouldReceive ('retrieveByCredentials ' )->once ()->with (['custom_token_field ' => 'foo ' ])->andReturn (null );
221222 $ request = $ this ->createRequest (['custom_token_field ' => 'foo ' ]);
222223
223- $ guard = new TokenGuard ($ request , $ provider , [
224+ $ guard = new TokenGuard ($ request , $ provider , ' foo ' , [
224225 'input_key ' => 'custom_token_field ' ,
225226 'storage_key ' => 'custom_token_field ' ,
226227 ]);
@@ -233,7 +234,7 @@ public function testValidateIfApiTokenIsEmptyWithCustomKey()
233234 $ provider = m::mock (UserProviderInterface::class);
234235 $ request = $ this ->createRequest (['custom_token_field ' => '' ]);
235236
236- $ guard = new TokenGuard ($ request , $ provider , [
237+ $ guard = new TokenGuard ($ request , $ provider , ' foo ' , [
237238 'input_key ' => 'custom_token_field ' ,
238239 'storage_key ' => 'custom_token_field ' ,
239240 ]);
0 commit comments