@@ -31,7 +31,7 @@ public function testSign(): void
31
31
{
32
32
$ audience = 'test. ' . __FUNCTION__ ;
33
33
34
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' , $ audience );
34
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' , $ audience );
35
35
$ plugin ->setTimestamp (1600000000 );
36
36
$ token = $ plugin ->signUrl ('https://host.tld/path ' , 1600000600 );
37
37
@@ -54,7 +54,7 @@ public function testSignQuery(): void
54
54
{
55
55
$ audience = 'test. ' . __FUNCTION__ ;
56
56
57
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' , $ audience );
57
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' , $ audience );
58
58
$ plugin ->setTimestamp (1600000000 );
59
59
$ token = $ plugin ->signUrl ('https://host.tld/path?query=value ' , 1600000600 );
60
60
@@ -77,7 +77,7 @@ public function testSignFragment(): void
77
77
{
78
78
$ audience = 'test. ' . __FUNCTION__ ;
79
79
80
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' , $ audience );
80
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' , $ audience );
81
81
$ plugin ->setTimestamp (1600000000 );
82
82
$ token = $ plugin ->signUrl ('https://host.tld/path?query=value#fragment ' , 1600000600 );
83
83
@@ -100,7 +100,7 @@ public function testGetToken(): void
100
100
{
101
101
$ audience = 'test. ' . __FUNCTION__ ;
102
102
103
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' , $ audience );
103
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' , $ audience );
104
104
$ plugin ->setTimestamp (1600000000 );
105
105
$ token = $ plugin ->getToken (
106
106
'https://host.tld/path?query=value ' ,
@@ -130,7 +130,7 @@ public function testVerifyToken(): void
130
130
$ audience = 'test. ' . __FUNCTION__ ;
131
131
$ timestamp = 1600000000 ;
132
132
133
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' , $ audience );
133
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' , $ audience );
134
134
$ plugin ->setTimestamp ($ timestamp );
135
135
$ token = $ plugin ->getToken (
136
136
'https://host.tld/path?query=value ' ,
@@ -140,7 +140,7 @@ public function testVerifyToken(): void
140
140
SignedUrl::VALUE_ENABLE
141
141
);
142
142
143
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' , $ audience );
143
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' , $ audience );
144
144
$ plugin ->setTimestamp ($ timestamp );
145
145
JWT ::$ timestamp = $ timestamp ;
146
146
$ parsed = $ plugin ->verifyToken ($ token );
@@ -154,11 +154,11 @@ public function testVerifyUrl(): void
154
154
$ timestamp = 1600000000 ;
155
155
$ url = 'https://host.tld/path ' ;
156
156
157
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' , $ audience );
157
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' , $ audience );
158
158
$ plugin ->setTimestamp ($ timestamp );
159
159
$ tokenUrl = $ plugin ->signUrl ($ url , 1600000600 );
160
160
161
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' , $ audience );
161
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' , $ audience );
162
162
$ plugin ->setTimestamp ($ timestamp );
163
163
JWT ::$ timestamp = $ timestamp ;
164
164
$ parsed = $ plugin ->verifyUrl ($ tokenUrl );
@@ -172,11 +172,11 @@ public function testVerifyUrlQuery(): void
172
172
$ timestamp = 1600000000 ;
173
173
$ url = 'https://host.tld/path?query=value ' ;
174
174
175
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' , $ audience );
175
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' , $ audience );
176
176
$ plugin ->setTimestamp ($ timestamp );
177
177
$ tokenUrl = $ plugin ->signUrl ($ url , 1600000600 );
178
178
179
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' , $ audience );
179
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' , $ audience );
180
180
$ plugin ->setTimestamp ($ timestamp );
181
181
JWT ::$ timestamp = $ timestamp ;
182
182
$ parsed = $ plugin ->verifyUrl ($ tokenUrl );
@@ -190,11 +190,11 @@ public function testVerifyRequest(): void
190
190
$ timestamp = 1600000000 ;
191
191
$ url = 'https://host.tld/path?query=value ' ;
192
192
193
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' , $ audience );
193
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' , $ audience );
194
194
$ plugin ->setTimestamp ($ timestamp );
195
195
$ tokenUrl = $ plugin ->signUrl ($ url , 1600000600 );
196
196
197
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' , $ audience );
197
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' , $ audience );
198
198
$ plugin ->setTimestamp ($ timestamp );
199
199
JWT ::$ timestamp = $ timestamp ;
200
200
$ parsed = $ plugin ->verifyRequest (false , $ tokenUrl , 'GET ' );
@@ -206,7 +206,7 @@ public function testSignInvalidUrl(): void
206
206
{
207
207
Assert::exception (static function () {
208
208
$ url = (string )base64_decode ('Ly8Eijrg+qawZw== ' );
209
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' );
209
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' );
210
210
$ plugin ->signUrl ($ url , 1600000600 );
211
211
}, LogicException::class);
212
212
}
@@ -215,7 +215,7 @@ public function testSignRelativeUrl(): void
215
215
{
216
216
Assert::exception (static function () {
217
217
$ url = '/login?email=foo@bar.cz ' ;
218
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' );
218
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' );
219
219
$ plugin ->signUrl ($ url , 1600000600 );
220
220
}, LogicException::class);
221
221
}
@@ -226,11 +226,11 @@ public function testVerifyPostRequest(): void
226
226
$ timestamp = 1600000000 ;
227
227
$ url = 'https://host.tld/path?query=value ' ;
228
228
229
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' , $ audience );
229
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' , $ audience );
230
230
$ plugin ->setTimestamp ($ timestamp );
231
231
$ tokenUrl = $ plugin ->signUrl ($ url , 1600000600 );
232
232
233
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' , $ audience );
233
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' , $ audience );
234
234
$ plugin ->setTimestamp ($ timestamp );
235
235
JWT ::$ timestamp = $ timestamp ;
236
236
Assert::exception (static function () use ($ plugin , $ tokenUrl ) {
@@ -241,7 +241,7 @@ public function testVerifyPostRequest(): void
241
241
public function testVerifyInvalidRequest (): void
242
242
{
243
243
Assert::exception (static function () {
244
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' );
244
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' );
245
245
$ url = (string )base64_decode ('Ly8Eijrg+qawZw== ' );
246
246
$ plugin ->verifyRequest (false , $ url , 'GET ' );
247
247
}, SignedUrlVerificationException::class, 'Url is invalid ' );
@@ -250,7 +250,7 @@ public function testVerifyInvalidRequest(): void
250
250
public function testVerifyInvalidUrl (): void
251
251
{
252
252
Assert::exception (static function () {
253
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' );
253
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' );
254
254
$ plugin ->verifyUrl ('https://host.tld/path?query=value ' );
255
255
}, SignedUrlVerificationException::class, 'No token in URL ' );
256
256
}
@@ -260,15 +260,15 @@ public function testVerifyUrlWithSuffix(): void
260
260
$ timestamp = 1600000000 ;
261
261
$ url = 'https://host.tld/path?query=value ' ;
262
262
263
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' );
263
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' );
264
264
$ plugin ->setTimestamp ($ timestamp );
265
265
$ tokenUrl = $ plugin ->signUrl ($ url , 1600000600 );
266
266
267
267
$ tokenUrl .= '&fbclid=123456789 ' ;
268
268
269
269
Assert::exception (
270
270
static function () use ($ timestamp , $ tokenUrl ) {
271
- $ plugin = new SignedUrl (self ::KEY_HS256 , 'HS256 ' );
271
+ $ plugin = SignedUrl:: create (self ::KEY_HS256 , 'HS256 ' );
272
272
$ plugin ->setTimestamp ($ timestamp );
273
273
JWT ::$ timestamp = $ timestamp ;
274
274
$ plugin ->verifyUrl ($ tokenUrl );
@@ -288,7 +288,7 @@ public function testVerifyUrlWithSuffixRedirect(): void
288
288
. '&fbclid=123456789 ' ;
289
289
290
290
// Mock plugin without redirect
291
- $ plugin = new class (self ::KEY_HS256 , ' HS256 ' , 'test.testSign ' ) extends SignedUrl {
291
+ $ plugin = new class (SignedUrl:: create ( self ::KEY_HS256 )-> getJwt () , 'test.testSign ' ) extends SignedUrl {
292
292
protected function sendRedirectResponse (string $ canonicalUrl ): void
293
293
{
294
294
$ expected = 'https://host.tld/path?query=value&_debug=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJj '
@@ -315,7 +315,7 @@ public function testVerifyUrlWithSuffixRedirectFragment(): void
315
315
. '#hash ' ;
316
316
317
317
// Mock plugin without redirect
318
- $ plugin = new class (self ::KEY_HS256 , ' HS256 ' , 'test.testSign ' ) extends SignedUrl {
318
+ $ plugin = new class (SignedUrl:: create ( self ::KEY_HS256 )-> getJwt () , 'test.testSign ' ) extends SignedUrl {
319
319
protected function sendRedirectResponse (string $ canonicalUrl ): void
320
320
{
321
321
$ expected = 'https://host.tld/path?query=value '
0 commit comments