X-Git-Url: http://source.bookstackapp.com/bookstack/blobdiff_plain/a6633642232efd164d4708967ab59e498fbff896..refs/pull/2902/head:/tests/SecurityHeaderTest.php diff --git a/tests/SecurityHeaderTest.php b/tests/SecurityHeaderTest.php index db095ff70..888dac810 100644 --- a/tests/SecurityHeaderTest.php +++ b/tests/SecurityHeaderTest.php @@ -1,40 +1,40 @@ -get("/"); + $resp = $this->get('/'); foreach ($resp->headers->getCookies() as $cookie) { - $this->assertEquals("lax", $cookie->getSameSite()); + $this->assertEquals('lax', $cookie->getSameSite()); } } public function test_cookies_samesite_none_when_iframe_hosts_set() { - $this->runWithEnv("ALLOWED_IFRAME_HOSTS", "http://example.com", function() { - $resp = $this->get("/"); + $this->runWithEnv('ALLOWED_IFRAME_HOSTS', 'http://example.com', function () { + $resp = $this->get('/'); foreach ($resp->headers->getCookies() as $cookie) { - $this->assertEquals("none", $cookie->getSameSite()); + $this->assertEquals('none', $cookie->getSameSite()); } }); } public function test_secure_cookies_controlled_by_app_url() { - $this->runWithEnv("APP_URL", "http://example.com", function() { - $resp = $this->get("/"); + $this->runWithEnv('APP_URL', 'http://example.com', function () { + $resp = $this->get('/'); foreach ($resp->headers->getCookies() as $cookie) { $this->assertFalse($cookie->isSecure()); } }); - $this->runWithEnv("APP_URL", "https://example.com", function() { - $resp = $this->get("/"); + $this->runWithEnv('APP_URL', 'https://example.com', function () { + $resp = $this->get('/'); foreach ($resp->headers->getCookies() as $cookie) { $this->assertTrue($cookie->isSecure()); } @@ -43,7 +43,7 @@ class SecurityHeaderTest extends TestCase public function test_iframe_csp_self_only_by_default() { - $resp = $this->get("/"); + $resp = $this->get('/'); $cspHeaders = collect($resp->headers->get('Content-Security-Policy')); $frameHeaders = $cspHeaders->filter(function ($val) { return Str::startsWith($val, 'frame-ancestors'); @@ -55,17 +55,15 @@ class SecurityHeaderTest extends TestCase public function test_iframe_csp_includes_extra_hosts_if_configured() { - $this->runWithEnv("ALLOWED_IFRAME_HOSTS", "https://a.example.com https://b.example.com", function() { - $resp = $this->get("/"); + $this->runWithEnv('ALLOWED_IFRAME_HOSTS', 'https://a.example.com https://b.example.com', function () { + $resp = $this->get('/'); $cspHeaders = collect($resp->headers->get('Content-Security-Policy')); - $frameHeaders = $cspHeaders->filter(function($val) { + $frameHeaders = $cspHeaders->filter(function ($val) { return Str::startsWith($val, 'frame-ancestors'); }); $this->assertTrue($frameHeaders->count() === 1); $this->assertEquals('frame-ancestors \'self\' https://a.example.com https://b.example.com', $frameHeaders->first()); }); - } - -} \ No newline at end of file +}