OauthTest.php 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541
  1. <?php
  2. /**
  3. * CakePHP(tm) : Rapid Development Framework (https://cakephp.org)
  4. * Copyright (c) Cake Software Foundation, Inc. (https://cakefoundation.org)
  5. *
  6. * Licensed under The MIT License
  7. * Redistributions of files must retain the above copyright notice.
  8. *
  9. * @copyright Copyright (c) Cake Software Foundation, Inc. (https://cakefoundation.org)
  10. * @link https://cakephp.org CakePHP(tm) Project
  11. * @since 3.0.0
  12. * @license https://opensource.org/licenses/mit-license.php MIT License
  13. */
  14. namespace Cake\Test\TestCase\Http\Client\Auth;
  15. use Cake\Http\Client\Auth\Oauth;
  16. use Cake\Http\Client\Request;
  17. use Cake\TestSuite\TestCase;
  18. /**
  19. * Oauth test.
  20. */
  21. class OauthTest extends TestCase
  22. {
  23. private $privateKeyString = '-----BEGIN RSA PRIVATE KEY-----
  24. MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBALRiMLAh9iimur8V
  25. A7qVvdqxevEuUkW4K+2KdMXmnQbG9Aa7k7eBjK1S+0LYmVjPKlJGNXHDGuy5Fw/d
  26. 7rjVJ0BLB+ubPK8iA/Tw3hLQgXMRRGRXXCn8ikfuQfjUS1uZSatdLB81mydBETlJ
  27. hI6GH4twrbDJCR2Bwy/XWXgqgGRzAgMBAAECgYBYWVtleUzavkbrPjy0T5FMou8H
  28. X9u2AC2ry8vD/l7cqedtwMPp9k7TubgNFo+NGvKsl2ynyprOZR1xjQ7WgrgVB+mm
  29. uScOM/5HVceFuGRDhYTCObE+y1kxRloNYXnx3ei1zbeYLPCHdhxRYW7T0qcynNmw
  30. rn05/KO2RLjgQNalsQJBANeA3Q4Nugqy4QBUCEC09SqylT2K9FrrItqL2QKc9v0Z
  31. zO2uwllCbg0dwpVuYPYXYvikNHHg+aCWF+VXsb9rpPsCQQDWR9TT4ORdzoj+Nccn
  32. qkMsDmzt0EfNaAOwHOmVJ2RVBspPcxt5iN4HI7HNeG6U5YsFBb+/GZbgfBT3kpNG
  33. WPTpAkBI+gFhjfJvRw38n3g/+UeAkwMI2TJQS4n8+hid0uus3/zOjDySH3XHCUno
  34. cn1xOJAyZODBo47E+67R4jV1/gzbAkEAklJaspRPXP877NssM5nAZMU0/O/NGCZ+
  35. 3jPgDUno6WbJn5cqm8MqWhW1xGkImgRk+fkDBquiq4gPiT898jusgQJAd5Zrr6Q8
  36. AO/0isr/3aa6O6NLQxISLKcPDk2NOccAfS/xOtfOz4sJYM3+Bs4Io9+dZGSDCA54
  37. Lw03eHTNQghS0A==
  38. -----END RSA PRIVATE KEY-----';
  39. private $privateKeyStringEnc = '-----BEGIN RSA PRIVATE KEY-----
  40. Proc-Type: 4,ENCRYPTED
  41. DEK-Info: DES-CBC,E65DB7AE7A05EF23
  42. QCXAQ/Uj1+7uQp0MyDUPlKvW/28PhbT4GxflBYmU6SxKZ2CVFPk0M8RgB6gkJyVv
  43. mwjo1Ch2Tlt7/VrNfLWGIh1XPhsC3gatv8Wv+g0keWWifaHlhXulgMGREJ7QeJg0
  44. 5THvdFuIs2qQnOzPCAwONjM6yMxPb2qxvwq0UKAL5V/CYVFWS6PYdR25f9ogXxBz
  45. c3QjvvnhQ7ipNjpjVp/XKYMYnZPCYkNYvRX+BcsWlqYtclO3m+xPG+mPAFs9hnBI
  46. wHI4yC2fl52giRc7XnSl7NNjun6RpHT/Cn7JDH6ql86pgMO0dw6PDzPf0KY9DCrR
  47. ldQyzQ8WjN3FU55+En+8zmSnxUu7EbdqZwhVEF+UwfJ7IqJUnHll0aDTUA/qq0dk
  48. DqtMKIXvRnDVZJqKxHyRvARf8Zp8USsq3cVdlA9PhtcKrs4CbTDL0lJ3eWj1bDS1
  49. kIHXYo19lBqcS1oX+6TqvEs69oW/aG8UZIONN0Xh5TbxuJMedXD1dexV9oOA9lGR
  50. cS6Ye0wC7fCdnA6jfAmHFJ5t2qk7FOzcFZwap7m+EWn11z+72GVqz3BDSe5qH2m2
  51. XOHl59rVtJsZFtjyQEV34IFYyb2qBHHqUUdKwIwT1JOZIq+IdTJxaieIb1mnlmDw
  52. DDf4Kwr0C9tti1R1IsPaAmjF7eH0PGbDGAB3fJSCXbHf7EXTz1AUdknd2MHXQ7wO
  53. UBABkD2ETB+EotdHTly5FQt0jwbHfF2najBmezxtEjIygCnDb02Rtuei4HTansBu
  54. shqoyFXJvizZzje7HaTQv/eJTuA6rUOzu/sAv/eBx2YAPkA8oa3qUw==
  55. -----END RSA PRIVATE KEY-----';
  56. /**
  57. */
  58. public function testExceptionUnknownSigningMethod()
  59. {
  60. $this->expectException(\Cake\Core\Exception\Exception::class);
  61. $auth = new Oauth();
  62. $creds = [
  63. 'consumerSecret' => 'it is secret',
  64. 'consumerKey' => 'a key',
  65. 'token' => 'a token value',
  66. 'tokenSecret' => 'also secret',
  67. 'method' => 'silly goose',
  68. ];
  69. $request = new Request();
  70. $auth->authentication($request, $creds);
  71. }
  72. /**
  73. * Test plain-text signing.
  74. *
  75. * @return void
  76. */
  77. public function testPlainTextSigning()
  78. {
  79. $auth = new Oauth();
  80. $creds = [
  81. 'consumerSecret' => 'it is secret',
  82. 'consumerKey' => 'a key',
  83. 'token' => 'a token value',
  84. 'tokenSecret' => 'also secret',
  85. 'method' => 'plaintext',
  86. ];
  87. $request = new Request();
  88. $request = $auth->authentication($request, $creds);
  89. $result = $request->getHeaderLine('Authorization');
  90. $this->assertContains('OAuth', $result);
  91. $this->assertContains('oauth_version="1.0"', $result);
  92. $this->assertContains('oauth_token="a%20token%20value"', $result);
  93. $this->assertContains('oauth_consumer_key="a%20key"', $result);
  94. $this->assertContains('oauth_signature_method="PLAINTEXT"', $result);
  95. $this->assertContains('oauth_signature="it%20is%20secret%26also%20secret"', $result);
  96. $this->assertContains('oauth_timestamp=', $result);
  97. $this->assertContains('oauth_nonce=', $result);
  98. }
  99. /**
  100. * Test that baseString() normalizes the URL.
  101. *
  102. * @return void
  103. */
  104. public function testBaseStringNormalizeUrl()
  105. {
  106. $request = new Request('HTTP://exAmple.com:80/parts/foo');
  107. $auth = new Oauth();
  108. $creds = [];
  109. $result = $auth->baseString($request, $creds);
  110. $this->assertContains('GET&', $result, 'method was missing.');
  111. $this->assertContains('http%3A%2F%2Fexample.com%2Fparts%2Ffoo', $result);
  112. }
  113. /**
  114. * Test that the query string is stripped from the normalized host.
  115. *
  116. * @return void
  117. */
  118. public function testBaseStringWithQueryString()
  119. {
  120. $request = new Request('http://example.com/search?q=pogo&cat=2');
  121. $auth = new Oauth();
  122. $values = [
  123. 'oauth_version' => '1.0',
  124. 'oauth_nonce' => uniqid(),
  125. 'oauth_timestamp' => time(),
  126. 'oauth_signature_method' => 'HMAC-SHA1',
  127. 'oauth_token' => 'token',
  128. 'oauth_consumer_key' => 'consumer-key',
  129. ];
  130. $result = $auth->baseString($request, $values);
  131. $this->assertContains('GET&', $result, 'method was missing.');
  132. $this->assertContains(
  133. 'http%3A%2F%2Fexample.com%2Fsearch&',
  134. $result
  135. );
  136. $this->assertContains(
  137. 'cat%3D2%26oauth_consumer_key%3Dconsumer-key' .
  138. '%26oauth_nonce%3D' . $values['oauth_nonce'] .
  139. '%26oauth_signature_method%3DHMAC-SHA1' .
  140. '%26oauth_timestamp%3D' . $values['oauth_timestamp'] .
  141. '%26oauth_token%3Dtoken' .
  142. '%26oauth_version%3D1.0' .
  143. '%26q%3Dpogo',
  144. $result
  145. );
  146. }
  147. /**
  148. * Ensure that post data is sorted and encoded.
  149. *
  150. * Keys with array values have to be serialized using
  151. * a more standard HTTP approach. PHP flavoured HTTP
  152. * is not part of the Oauth spec.
  153. *
  154. * See Normalize Request Parameters (section 9.1.1)
  155. *
  156. * @return void
  157. */
  158. public function testBaseStringWithPostDataNestedArrays()
  159. {
  160. $request = new Request(
  161. 'http://example.com/search?q=pogo',
  162. Request::METHOD_POST,
  163. [],
  164. [
  165. 'search' => [
  166. 'filters' => [
  167. 'field' => 'date',
  168. 'value' => 'one two'
  169. ]
  170. ]
  171. ]
  172. );
  173. $auth = new Oauth();
  174. $values = [
  175. 'oauth_version' => '1.0',
  176. 'oauth_nonce' => uniqid(),
  177. 'oauth_timestamp' => time(),
  178. 'oauth_signature_method' => 'HMAC-SHA1',
  179. 'oauth_token' => 'token',
  180. 'oauth_consumer_key' => 'consumer-key',
  181. ];
  182. $result = $auth->baseString($request, $values);
  183. $this->assertContains('POST&', $result, 'method was missing.');
  184. $this->assertContains(
  185. 'http%3A%2F%2Fexample.com%2Fsearch&',
  186. $result
  187. );
  188. $this->assertContains(
  189. '&oauth_consumer_key%3Dconsumer-key' .
  190. '%26oauth_nonce%3D' . $values['oauth_nonce'] .
  191. '%26oauth_signature_method%3DHMAC-SHA1' .
  192. '%26oauth_timestamp%3D' . $values['oauth_timestamp'] .
  193. '%26oauth_token%3Dtoken' .
  194. '%26oauth_version%3D1.0' .
  195. '%26q%3Dpogo' .
  196. '%26search%5Bfilters%5D%5Bfield%5D%3Ddate' .
  197. '%26search%5Bfilters%5D%5Bvalue%5D%3Done%20two',
  198. $result
  199. );
  200. }
  201. /**
  202. * Ensure that post data is sorted and encoded.
  203. *
  204. * Keys with array values have to be serialized using
  205. * a more standard HTTP approach. PHP flavoured HTTP
  206. * is not part of the Oauth spec.
  207. *
  208. * See Normalize Request Parameters (section 9.1.1)
  209. * http://wiki.oauth.net/w/page/12238556/TestCases
  210. *
  211. * @return void
  212. */
  213. public function testBaseStringWithPostData()
  214. {
  215. $request = new Request(
  216. 'http://example.com/search?q=pogo',
  217. Request::METHOD_POST,
  218. [],
  219. [
  220. 'address' => 'post',
  221. 'zed' => 'last',
  222. 'tags' => ['oauth', 'cake']
  223. ]
  224. );
  225. $auth = new Oauth();
  226. $values = [
  227. 'oauth_version' => '1.0',
  228. 'oauth_nonce' => uniqid(),
  229. 'oauth_timestamp' => time(),
  230. 'oauth_signature_method' => 'HMAC-SHA1',
  231. 'oauth_token' => 'token',
  232. 'oauth_consumer_key' => 'consumer-key',
  233. ];
  234. $result = $auth->baseString($request, $values);
  235. $this->assertContains('POST&', $result, 'method was missing.');
  236. $this->assertContains(
  237. 'http%3A%2F%2Fexample.com%2Fsearch&',
  238. $result
  239. );
  240. $this->assertContains(
  241. '&address%3Dpost' .
  242. '%26oauth_consumer_key%3Dconsumer-key' .
  243. '%26oauth_nonce%3D' . $values['oauth_nonce'] .
  244. '%26oauth_signature_method%3DHMAC-SHA1' .
  245. '%26oauth_timestamp%3D' . $values['oauth_timestamp'] .
  246. '%26oauth_token%3Dtoken' .
  247. '%26oauth_version%3D1.0' .
  248. '%26q%3Dpogo' .
  249. '%26tags%3Dcake' .
  250. '%26tags%3Doauth' .
  251. '%26zed%3Dlast',
  252. $result
  253. );
  254. }
  255. /**
  256. * Test HMAC-SHA1 signing
  257. *
  258. * Hash result + parameters taken from
  259. * http://wiki.oauth.net/w/page/12238556/TestCases
  260. *
  261. * @return void
  262. */
  263. public function testHmacSigning()
  264. {
  265. $request = new Request(
  266. 'http://photos.example.net/photos',
  267. 'GET',
  268. [],
  269. ['file' => 'vacation.jpg', 'size' => 'original']
  270. );
  271. $options = [
  272. 'consumerKey' => 'dpf43f3p2l4k3l03',
  273. 'consumerSecret' => 'kd94hf93k423kf44',
  274. 'tokenSecret' => 'pfkkdhi9sl3r4s00',
  275. 'token' => 'nnch734d00sl2jdk',
  276. 'nonce' => 'kllo9940pd9333jh',
  277. 'timestamp' => '1191242096'
  278. ];
  279. $auth = new Oauth();
  280. $request = $auth->authentication($request, $options);
  281. $result = $request->getHeaderLine('Authorization');
  282. $expected = 'tR3+Ty81lMeYAr/Fid0kMTYa/WM=';
  283. $this->assertContains(
  284. 'oauth_signature="' . $expected . '"',
  285. urldecode($result)
  286. );
  287. }
  288. /**
  289. * Test RSA-SHA1 signing with a private key string
  290. *
  291. * Hash result + parameters taken from
  292. * http://wiki.oauth.net/w/page/12238556/TestCases
  293. *
  294. * @return void
  295. */
  296. public function testRsaSigningString()
  297. {
  298. $request = new Request(
  299. 'http://photos.example.net/photos',
  300. 'GET',
  301. [],
  302. ['file' => 'vacaction.jpg', 'size' => 'original']
  303. );
  304. $privateKey = $this->privateKeyString;
  305. $options = [
  306. 'method' => 'RSA-SHA1',
  307. 'consumerKey' => 'dpf43f3p2l4k3l03',
  308. 'nonce' => '13917289812797014437',
  309. 'timestamp' => '1196666512',
  310. 'privateKey' => $privateKey
  311. ];
  312. $auth = new Oauth();
  313. $request = $auth->authentication($request, $options);
  314. $result = $request->getHeaderLine('Authorization');
  315. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  316. $this->assertContains(
  317. 'oauth_signature="' . $expected . '"',
  318. urldecode($result)
  319. );
  320. }
  321. /**
  322. * Test RSA-SHA1 signing with a private key file
  323. *
  324. * Hash result + parameters taken from
  325. * http://wiki.oauth.net/w/page/12238556/TestCases
  326. *
  327. * @return void
  328. */
  329. public function testRsaSigningFile()
  330. {
  331. $request = new Request(
  332. 'http://photos.example.net/photos',
  333. 'GET',
  334. [],
  335. ['file' => 'vacaction.jpg', 'size' => 'original']
  336. );
  337. $privateKey = fopen(TEST_APP . DS . 'config' . DS . 'key.pem', 'r');
  338. $options = [
  339. 'method' => 'RSA-SHA1',
  340. 'consumerKey' => 'dpf43f3p2l4k3l03',
  341. 'nonce' => '13917289812797014437',
  342. 'timestamp' => '1196666512',
  343. 'privateKey' => $privateKey
  344. ];
  345. $auth = new Oauth();
  346. $request = $auth->authentication($request, $options);
  347. $result = $request->getHeaderLine('Authorization');
  348. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  349. $this->assertContains(
  350. 'oauth_signature="' . $expected . '"',
  351. urldecode($result)
  352. );
  353. }
  354. /**
  355. * Test RSA-SHA1 signing with a private key file passphrase string
  356. *
  357. * Hash result + parameters taken from
  358. * http://wiki.oauth.net/w/page/12238556/TestCases
  359. *
  360. * @return void
  361. */
  362. public function testRsaSigningWithPassphraseString()
  363. {
  364. $request = new Request(
  365. 'http://photos.example.net/photos',
  366. 'GET',
  367. [],
  368. ['file' => 'vacaction.jpg', 'size' => 'original']
  369. );
  370. $privateKey = fopen(TEST_APP . DS . 'config' . DS . 'key_with_passphrase.pem', 'r');
  371. $passphrase = 'fancy-cakephp-passphrase';
  372. $options = [
  373. 'method' => 'RSA-SHA1',
  374. 'consumerKey' => 'dpf43f3p2l4k3l03',
  375. 'nonce' => '13917289812797014437',
  376. 'timestamp' => '1196666512',
  377. 'privateKey' => $privateKey,
  378. 'privateKeyPassphrase' => $passphrase,
  379. ];
  380. $auth = new Oauth();
  381. $request = $auth->authentication($request, $options);
  382. $result = $request->getHeaderLine('Authorization');
  383. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  384. $this->assertContains(
  385. 'oauth_signature="' . $expected . '"',
  386. urldecode($result)
  387. );
  388. }
  389. /**
  390. * Test RSA-SHA1 signing with a private key string and passphrase string
  391. *
  392. * Hash result + parameters taken from
  393. * http://wiki.oauth.net/w/page/12238556/TestCases
  394. *
  395. * @return void
  396. */
  397. public function testRsaSigningStringWithPassphraseString()
  398. {
  399. $request = new Request(
  400. 'http://photos.example.net/photos',
  401. 'GET',
  402. [],
  403. ['file' => 'vacaction.jpg', 'size' => 'original']
  404. );
  405. $privateKey = $this->privateKeyStringEnc;
  406. $passphrase = 'fancy-cakephp-passphrase';
  407. $options = [
  408. 'method' => 'RSA-SHA1',
  409. 'consumerKey' => 'dpf43f3p2l4k3l03',
  410. 'nonce' => '13917289812797014437',
  411. 'timestamp' => '1196666512',
  412. 'privateKey' => $privateKey,
  413. 'privateKeyPassphrase' => $passphrase,
  414. ];
  415. $auth = new Oauth();
  416. $request = $auth->authentication($request, $options);
  417. $result = $request->getHeaderLine('Authorization');
  418. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  419. $this->assertContains(
  420. 'oauth_signature="' . $expected . '"',
  421. urldecode($result)
  422. );
  423. }
  424. /**
  425. * Test RSA-SHA1 signing with passphrase file
  426. *
  427. * Hash result + parameters taken from
  428. * http://wiki.oauth.net/w/page/12238556/TestCases
  429. *
  430. * @return void
  431. */
  432. public function testRsaSigningWithPassphraseFile()
  433. {
  434. $this->skipIf(PHP_EOL != "\n", 'Just the line ending "\n" is supported. You can run the test again e.g. on a linux system.');
  435. $request = new Request(
  436. 'http://photos.example.net/photos',
  437. 'GET',
  438. [],
  439. ['file' => 'vacaction.jpg', 'size' => 'original']
  440. );
  441. $privateKey = fopen(TEST_APP . DS . 'config' . DS . 'key_with_passphrase.pem', 'r');
  442. $passphrase = fopen(TEST_APP . DS . 'config' . DS . 'key_passphrase_lf', 'r');
  443. $options = [
  444. 'method' => 'RSA-SHA1',
  445. 'consumerKey' => 'dpf43f3p2l4k3l03',
  446. 'nonce' => '13917289812797014437',
  447. 'timestamp' => '1196666512',
  448. 'privateKey' => $privateKey,
  449. 'privateKeyPassphrase' => $passphrase,
  450. ];
  451. $auth = new Oauth();
  452. $request = $auth->authentication($request, $options);
  453. $result = $request->getHeaderLine('Authorization');
  454. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  455. $this->assertContains(
  456. 'oauth_signature="' . $expected . '"',
  457. urldecode($result)
  458. );
  459. $expected = 0;
  460. $this->assertEquals($expected, ftell($passphrase));
  461. }
  462. /**
  463. * Test RSA-SHA1 signing with a private key string and passphrase file
  464. *
  465. * Hash result + parameters taken from
  466. * http://wiki.oauth.net/w/page/12238556/TestCases
  467. *
  468. * @return void
  469. */
  470. public function testRsaSigningStringWithPassphraseFile()
  471. {
  472. $this->skipIf(PHP_EOL != "\n", 'Just the line ending "\n" is supported. You can run the test again e.g. on a linux system.');
  473. $request = new Request(
  474. 'http://photos.example.net/photos',
  475. 'GET',
  476. [],
  477. ['file' => 'vacaction.jpg', 'size' => 'original']
  478. );
  479. $privateKey = $this->privateKeyStringEnc;
  480. $passphrase = fopen(TEST_APP . DS . 'config' . DS . 'key_passphrase_lf', 'r');
  481. $options = [
  482. 'method' => 'RSA-SHA1',
  483. 'consumerKey' => 'dpf43f3p2l4k3l03',
  484. 'nonce' => '13917289812797014437',
  485. 'timestamp' => '1196666512',
  486. 'privateKey' => $privateKey,
  487. 'privateKeyPassphrase' => $passphrase,
  488. ];
  489. $auth = new Oauth();
  490. $request = $auth->authentication($request, $options);
  491. $result = $request->getHeaderLine('Authorization');
  492. $expected = 'jvTp/wX1TYtByB1m+Pbyo0lnCOLIsyGCH7wke8AUs3BpnwZJtAuEJkvQL2/9n4s5wUmUl4aCI4BwpraNx4RtEXMe5qg5T1LVTGliMRpKasKsW//e+RinhejgCuzoH26dyF8iY2ZZ/5D1ilgeijhV/vBka5twt399mXwaYdCwFYE=';
  493. $this->assertContains(
  494. 'oauth_signature="' . $expected . '"',
  495. urldecode($result)
  496. );
  497. $expected = 0;
  498. $this->assertEquals($expected, ftell($passphrase));
  499. }
  500. }