Security update for Core, with self-updated composer
[yaffs-website] / web / core / modules / rest / tests / src / Functional / CookieResourceTestTrait.php
index 8975c3fa285ce426928369bb1b8d3659eb636a68..a63e41aa72fe0c9f7d397ce7462badab64eaa2b3 100644 (file)
@@ -71,7 +71,7 @@ trait CookieResourceTestTrait {
     $this->sessionCookie = explode(';', $response->getHeader('Set-Cookie')[0], 2)[0];
 
     // Parse and store the CSRF token and logout token.
-    $data = $this->serializer->decode((string)$response->getBody(), static::$format);
+    $data = $this->serializer->decode((string) $response->getBody(), static::$format);
     $this->csrfToken = $data['csrf_token'];
     $this->logoutToken = $data['logout_token'];
   }
@@ -109,23 +109,18 @@ trait CookieResourceTestTrait {
       return;
     }
 
-
     unset($request_options[RequestOptions::HEADERS]['X-CSRF-Token']);
 
-
     // DX: 403 when missing X-CSRF-Token request header.
     $response = $this->request($method, $url, $request_options);
     $this->assertResourceErrorResponse(403, 'X-CSRF-Token request header is missing', $response);
 
-
     $request_options[RequestOptions::HEADERS]['X-CSRF-Token'] = 'this-is-not-the-token-you-are-looking-for';
 
-
     // DX: 403 when invalid X-CSRF-Token request header.
     $response = $this->request($method, $url, $request_options);
     $this->assertResourceErrorResponse(403, 'X-CSRF-Token request header is invalid', $response);
 
-
     $request_options[RequestOptions::HEADERS]['X-CSRF-Token'] = $this->csrfToken;
   }