@@ -277,7 +277,6 @@ component extends="coldbox.system.testing.BaseInterceptorTest" interceptor="cbse
277277 } );
278278
279279 describe ( " URL validation for open redirect prevention" , () = > {
280-
281280 beforeEach ( ( currentSpec ) = > {
282281 mockValidator = mockWireBox .getInstance ( settings .firewall .validator );
283282 security
@@ -291,39 +290,55 @@ component extends="coldbox.system.testing.BaseInterceptorTest" interceptor="cbse
291290 mockEvent = createMock ( " coldbox.system.web.context.RequestContext" )
292291 .$( " getCurrentRoutedURL" , " /account" )
293292 .$( " buildLink" )
294- .$args ( to = " /account" , queryString = " " , translate = false )
293+ .$args (
294+ to = " /account" ,
295+ queryString = " " ,
296+ translate = false
297+ )
295298 .$results ( " /account" )
296299 .$( " setValue" );
297300
298301 mockFlash = createStub ().$( " put" );
299302 security .$property ( " flash" , " variables" , mockFlash );
300303
301- makePublic ( security , " isSafeRedirectUrl" );
302- makePublic ( security , " saveSecuredUrl" );
304+ makePublic ( security , " isSafeRedirectUrl" );
305+ makePublic ( security , " saveSecuredUrl" );
303306 } );
304307
305308 it ( " allows relative URLs without a host" , () = > {
306- var result = security .isSafeRedirectUrl ( targetUrl = " /account" , event = mockEvent );
309+ var result = security .isSafeRedirectUrl ( targetUrl = " /account" , event = mockEvent );
307310 expect ( result ).toBeTrue ();
308311 } );
309312
310313 it ( " allows URLs with the same host" , () = > {
311- var result = security .isSafeRedirectUrl ( targetUrl = " https://mysite.com/account" , event = mockEvent );
314+ var result = security .isSafeRedirectUrl (
315+ targetUrl = " https://mysite.com/account" ,
316+ event = mockEvent
317+ );
312318 expect ( result ).toBeTrue ();
313319 } );
314320
315321 it ( " blocks URLs with different hosts" , () = > {
316- var result = security .isSafeRedirectUrl ( targetUrl = " https://malicioussite.com/phishing" , event = mockEvent );
322+ var result = security .isSafeRedirectUrl (
323+ targetUrl = " https://malicioussite.com/phishing" ,
324+ event = mockEvent
325+ );
317326 expect ( result ).toBeFalse ();
318327 } );
319328
320329 it ( " blocks URLs with subdomain differences" , () = > {
321- var result = security .isSafeRedirectUrl ( targetUrl = " https://evil.mysite.com/account" , event = mockEvent );
330+ var result = security .isSafeRedirectUrl (
331+ targetUrl = " https://evil.mysite.com/account" ,
332+ event = mockEvent
333+ );
322334 expect ( result ).toBeFalse ();
323335 } );
324336
325337 it ( " is case-insensitive when comparing hosts" , () = > {
326- var result = security .isSafeRedirectUrl ( targetUrl = " https://MySite.COM/account" , event = mockEvent );
338+ var result = security .isSafeRedirectUrl (
339+ targetUrl = " https://MySite.COM/account" ,
340+ event = mockEvent
341+ );
327342 expect ( result ).toBeTrue ();
328343 } );
329344
@@ -333,10 +348,14 @@ component extends="coldbox.system.testing.BaseInterceptorTest" interceptor="cbse
333348 } );
334349
335350 it ( " saves secured URL when it is safe" , () = > {
336- mockEvent .$( " getCurrentRoutedURL" , " /account" );
351+ mockEvent .$( " getCurrentRoutedURL" , " /account" );
337352 mockEvent
338- .$( " buildLink" )
339- .$args ( to = " /account" , queryString = cgi .QUERY_STRING , translate = false )
353+ .$( " buildLink" )
354+ .$args (
355+ to = " /account" ,
356+ queryString = cgi .QUERY_STRING ,
357+ translate = false
358+ )
340359 .$results ( " /account" );
341360
342361 security .saveSecuredUrl ( mockEvent );
0 commit comments