You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

ApiTest.php 46KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410
  1. <?php
  2. /**
  3. * @copyright Copyright (c) 2016, ownCloud, Inc.
  4. *
  5. * @author Bjoern Schiessle <bjoern@schiessle.org>
  6. * @author Björn Schießle <bjoern@schiessle.org>
  7. * @author Jan-Christoph Borchardt <hey@jancborchardt.net>
  8. * @author Joas Schilling <coding@schilljs.com>
  9. * @author Morris Jobke <hey@morrisjobke.de>
  10. * @author Robin Appelman <robin@icewind.nl>
  11. * @author Robin McCorkell <robin@mccorkell.me.uk>
  12. * @author Roeland Jago Douma <roeland@famdouma.nl>
  13. * @author Thomas Müller <thomas.mueller@tmit.eu>
  14. * @author Vincent Petry <pvince81@owncloud.com>
  15. *
  16. * @license AGPL-3.0
  17. *
  18. * This code is free software: you can redistribute it and/or modify
  19. * it under the terms of the GNU Affero General Public License, version 3,
  20. * as published by the Free Software Foundation.
  21. *
  22. * This program is distributed in the hope that it will be useful,
  23. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  24. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  25. * GNU Affero General Public License for more details.
  26. *
  27. * You should have received a copy of the GNU Affero General Public License, version 3,
  28. * along with this program. If not, see <http://www.gnu.org/licenses/>
  29. *
  30. */
  31. namespace OCA\Files_Sharing\Tests;
  32. use OC\Files\Cache\Scanner;
  33. use OCA\Files_Sharing\Controller\ShareAPIController;
  34. use OCP\AppFramework\OCS\OCSBadRequestException;
  35. use OCP\AppFramework\OCS\OCSException;
  36. use OCP\AppFramework\OCS\OCSForbiddenException;
  37. use OCP\AppFramework\OCS\OCSNotFoundException;
  38. use OCP\IL10N;
  39. use OCP\IRequest;
  40. /**
  41. * Class ApiTest
  42. *
  43. * @group DB
  44. * TODO: convert to real intergration tests
  45. */
  46. class ApiTest extends TestCase {
  47. const TEST_FOLDER_NAME = '/folder_share_api_test';
  48. const APP_NAME = 'files_sharing';
  49. private static $tempStorage;
  50. /** @var \OCP\Files\Folder */
  51. private $userFolder;
  52. /** @var string */
  53. private $subsubfolder;
  54. protected function setUp() {
  55. parent::setUp();
  56. \OC::$server->getAppConfig()->setValue('core', 'shareapi_exclude_groups', 'no');
  57. \OC::$server->getAppConfig()->setValue('core', 'shareapi_expire_after_n_days', '7');
  58. $this->folder = self::TEST_FOLDER_NAME;
  59. $this->subfolder = '/subfolder_share_api_test';
  60. $this->subsubfolder = '/subsubfolder_share_api_test';
  61. $this->filename = '/share-api-test.txt';
  62. // save file with content
  63. $this->view->file_put_contents($this->filename, $this->data);
  64. $this->view->mkdir($this->folder);
  65. $this->view->mkdir($this->folder . $this->subfolder);
  66. $this->view->mkdir($this->folder . $this->subfolder . $this->subsubfolder);
  67. $this->view->file_put_contents($this->folder.$this->filename, $this->data);
  68. $this->view->file_put_contents($this->folder . $this->subfolder . $this->filename, $this->data);
  69. $mount = $this->view->getMount($this->filename);
  70. $mount->getStorage()->getScanner()->scan('', Scanner::SCAN_RECURSIVE);
  71. $this->userFolder = \OC::$server->getUserFolder(self::TEST_FILES_SHARING_API_USER1);
  72. }
  73. protected function tearDown() {
  74. if($this->view instanceof \OC\Files\View) {
  75. $this->view->unlink($this->filename);
  76. $this->view->deleteAll($this->folder);
  77. }
  78. self::$tempStorage = null;
  79. parent::tearDown();
  80. }
  81. /**
  82. * @param string $userId The userId of the caller
  83. * @return \OCA\Files_Sharing\Controller\ShareAPIController
  84. */
  85. private function createOCS($userId) {
  86. $l = $this->getMockBuilder(IL10N::class)->getMock();
  87. $l->method('t')
  88. ->will($this->returnCallback(function($text, $parameters = []) {
  89. return vsprintf($text, $parameters);
  90. }));
  91. return new ShareAPIController(
  92. self::APP_NAME,
  93. $this->getMockBuilder(IRequest::class)->getMock(),
  94. $this->shareManager,
  95. \OC::$server->getGroupManager(),
  96. \OC::$server->getUserManager(),
  97. \OC::$server->getRootFolder(),
  98. \OC::$server->getURLGenerator(),
  99. $userId,
  100. $l
  101. );
  102. }
  103. function testCreateShareUserFile() {
  104. $this->setUp(); // for some reasons phpunit refuses to do this for us only for this test
  105. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  106. $result = $ocs->createShare($this->filename, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_USER, self::TEST_FILES_SHARING_API_USER2);
  107. $ocs->cleanup();
  108. $data = $result->getData();
  109. $this->assertEquals(19, $data['permissions']);
  110. $this->assertEmpty($data['expiration']);
  111. $this->shareManager->getShareById('ocinternal:'.$data['id']);
  112. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  113. $ocs->deleteShare($data['id']);
  114. $ocs->cleanup();
  115. }
  116. function testCreateShareUserFolder() {
  117. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  118. $result = $ocs->createShare($this->folder, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_USER, self::TEST_FILES_SHARING_API_USER2);
  119. $ocs->cleanup();
  120. $data = $result->getData();
  121. $this->assertEquals(31, $data['permissions']);
  122. $this->assertEmpty($data['expiration']);
  123. $this->shareManager->getShareById('ocinternal:'.$data['id']);
  124. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  125. $ocs->deleteShare($data['id']);
  126. $ocs->cleanup();
  127. }
  128. function testCreateShareGroupFile() {
  129. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  130. $result = $ocs->createShare($this->filename, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_GROUP, self::TEST_FILES_SHARING_API_GROUP1);
  131. $ocs->cleanup();
  132. $data = $result->getData();
  133. $this->assertEquals(19, $data['permissions']);
  134. $this->assertEmpty($data['expiration']);
  135. $this->shareManager->getShareById('ocinternal:'.$data['id']);
  136. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  137. $ocs->deleteShare($data['id']);
  138. $ocs->cleanup();
  139. }
  140. function testCreateShareGroupFolder() {
  141. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  142. $result = $ocs->createShare($this->folder, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_GROUP, self::TEST_FILES_SHARING_API_GROUP1);
  143. $ocs->cleanup();
  144. $data = $result->getData();
  145. $this->assertEquals(31, $data['permissions']);
  146. $this->assertEmpty($data['expiration']);
  147. $this->shareManager->getShareById('ocinternal:'.$data['id']);
  148. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  149. $ocs->deleteShare($data['id']);
  150. $ocs->cleanup();
  151. }
  152. public function testCreateShareLink() {
  153. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  154. $result = $ocs->createShare($this->folder, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_LINK);
  155. $ocs->cleanup();
  156. $data = $result->getData();
  157. $this->assertEquals(1, $data['permissions']);
  158. $this->assertEmpty($data['expiration']);
  159. $this->assertTrue(is_string($data['token']));
  160. // check for correct link
  161. $url = \OC::$server->getURLGenerator()->getAbsoluteURL('/index.php/s/' . $data['token']);
  162. $this->assertEquals($url, $data['url']);
  163. $this->shareManager->getShareById('ocinternal:'.$data['id']);
  164. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  165. $ocs->deleteShare($data['id']);
  166. $ocs->cleanup();
  167. }
  168. public function testCreateShareLinkPublicUpload() {
  169. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  170. $result = $ocs->createShare($this->folder, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_LINK, null, 'true');
  171. $ocs->cleanup();
  172. $data = $result->getData();
  173. $this->assertEquals(
  174. \OCP\Constants::PERMISSION_READ |
  175. \OCP\Constants::PERMISSION_CREATE |
  176. \OCP\Constants::PERMISSION_UPDATE |
  177. \OCP\Constants::PERMISSION_DELETE,
  178. $data['permissions']
  179. );
  180. $this->assertEmpty($data['expiration']);
  181. $this->assertTrue(is_string($data['token']));
  182. // check for correct link
  183. $url = \OC::$server->getURLGenerator()->getAbsoluteURL('/index.php/s/' . $data['token']);
  184. $this->assertEquals($url, $data['url']);
  185. $this->shareManager->getShareById('ocinternal:'.$data['id']);
  186. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  187. $ocs->deleteShare($data['id']);
  188. $ocs->cleanup();
  189. }
  190. function testEnfoceLinkPassword() {
  191. $password = md5(time());
  192. $appConfig = \OC::$server->getAppConfig();
  193. $appConfig->setValue('core', 'shareapi_enforce_links_password', 'yes');
  194. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  195. try {
  196. $ocs->createShare($this->folder, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_LINK);
  197. $this->fail();
  198. } catch (OCSForbiddenException $e) {
  199. }
  200. $ocs->cleanup();
  201. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  202. try {
  203. $ocs->createShare($this->folder, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_LINK, null, 'false', '');
  204. $this->fail();
  205. } catch (OCSForbiddenException $e) {
  206. }
  207. $ocs->cleanup();
  208. // share with password should succeed
  209. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  210. $result = $ocs->createShare($this->folder, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_LINK, null, 'false', $password);
  211. $ocs->cleanup();
  212. $data = $result->getData();
  213. // setting new password should succeed
  214. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  215. $ocs->updateShare($data['id'], null, $password);
  216. $ocs->cleanup();
  217. // removing password should fail
  218. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  219. try {
  220. $ocs->updateShare($data['id']);
  221. $this->fail();
  222. } catch (OCSBadRequestException $e) {
  223. }
  224. $ocs->cleanup();
  225. // cleanup
  226. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  227. $ocs->deleteShare($data['id']);
  228. $ocs->cleanup();
  229. $appConfig->setValue('core', 'shareapi_enforce_links_password', 'no');
  230. }
  231. /**
  232. * @medium
  233. */
  234. function testSharePermissions() {
  235. // sharing file to a user should work if shareapi_exclude_groups is set
  236. // to no
  237. \OC::$server->getAppConfig()->setValue('core', 'shareapi_exclude_groups', 'no');
  238. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  239. $result = $ocs->createShare($this->filename, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_USER, self::TEST_FILES_SHARING_API_USER2);
  240. $ocs->cleanup();
  241. $data = $result->getData();
  242. $this->shareManager->getShareById('ocinternal:'.$data['id']);
  243. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  244. $ocs->deleteShare($data['id']);
  245. $ocs->cleanup();
  246. // exclude groups, but not the group the user belongs to. Sharing should still work
  247. \OC::$server->getAppConfig()->setValue('core', 'shareapi_exclude_groups', 'yes');
  248. \OC::$server->getAppConfig()->setValue('core', 'shareapi_exclude_groups_list', 'admin,group1,group2');
  249. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  250. $result = $ocs->createShare($this->filename, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_USER, self::TEST_FILES_SHARING_API_USER2);
  251. $ocs->cleanup();
  252. $data = $result->getData();
  253. $this->shareManager->getShareById('ocinternal:' . $data['id']);
  254. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  255. $ocs->deleteShare($data['id']);
  256. $ocs->cleanup();
  257. // now we exclude the group the user belongs to ('group'), sharing should fail now
  258. \OC::$server->getAppConfig()->setValue('core', 'shareapi_exclude_groups_list', 'admin,group');
  259. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  260. $ocs->createShare($this->filename, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_USER, self::TEST_FILES_SHARING_API_USER2);
  261. $ocs->cleanup();
  262. // cleanup
  263. \OC::$server->getAppConfig()->setValue('core', 'shareapi_exclude_groups', 'no');
  264. \OC::$server->getAppConfig()->setValue('core', 'shareapi_exclude_groups_list', '');
  265. }
  266. /**
  267. * @medium
  268. */
  269. function testGetAllShares() {
  270. $node = $this->userFolder->get($this->filename);
  271. $share = $this->shareManager->newShare();
  272. $share->setNode($node)
  273. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  274. ->setSharedWith(self::TEST_FILES_SHARING_API_USER2)
  275. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  276. ->setPermissions(19);
  277. $share = $this->shareManager->createShare($share);
  278. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  279. $result = $ocs->getShares();
  280. $ocs->cleanup();
  281. $this->assertTrue(count($result->getData()) === 1);
  282. $this->shareManager->deleteShare($share);
  283. }
  284. function testGetAllSharesWithMe() {
  285. $node1 = $this->userFolder->get($this->filename);
  286. $share1 = $this->shareManager->newShare();
  287. $share1->setNode($node1)
  288. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  289. ->setSharedWith(self::TEST_FILES_SHARING_API_USER2)
  290. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  291. ->setPermissions(19);
  292. $share1 = $this->shareManager->createShare($share1);
  293. $node2 = $this->userFolder->get($this->folder);
  294. $share2 = $this->shareManager->newShare();
  295. $share2->setNode($node2)
  296. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  297. ->setSharedWith(self::TEST_FILES_SHARING_API_USER2)
  298. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  299. ->setPermissions(31);
  300. $share2 = $this->shareManager->createShare($share2);
  301. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER2);
  302. $result = $ocs->getShares('true');
  303. $ocs->cleanup();
  304. $this->assertCount(2, $result->getData());
  305. $this->shareManager->deleteShare($share1);
  306. $this->shareManager->deleteShare($share2);
  307. }
  308. /**
  309. * @medium
  310. */
  311. function testPublicLinkUrl() {
  312. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  313. $result = $ocs->createShare($this->folder, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_LINK);
  314. $ocs->cleanup();
  315. $data = $result->getData();
  316. // check if we have a token
  317. $this->assertTrue(is_string($data['token']));
  318. $id = $data['id'];
  319. // check for correct link
  320. $url = \OC::$server->getURLGenerator()->getAbsoluteURL('/index.php/s/' . $data['token']);
  321. $this->assertEquals($url, $data['url']);
  322. // check for link in getall shares
  323. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  324. $result = $ocs->getShares();
  325. $ocs->cleanup();
  326. $data = $result->getData();
  327. $this->assertEquals($url, current($data)['url']);
  328. // check for path
  329. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  330. $result = $ocs->getShares();
  331. $ocs->cleanup();
  332. $data = $result->getData();
  333. $this->assertEquals($url, current($data)['url']);
  334. // check in share id
  335. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  336. $result = $ocs->getShare($id);
  337. $ocs->cleanup();
  338. $data = $result->getData();
  339. $this->assertEquals($url, current($data)['url']);
  340. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  341. $ocs->deleteShare($id);
  342. $ocs->cleanup();
  343. }
  344. /**
  345. * @medium
  346. * @depends testCreateShareUserFile
  347. * @depends testCreateShareLink
  348. */
  349. function testGetShareFromSource() {
  350. $node = $this->userFolder->get($this->filename);
  351. $share = $this->shareManager->newShare();
  352. $share->setNode($node)
  353. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  354. ->setSharedWith(self::TEST_FILES_SHARING_API_USER2)
  355. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  356. ->setPermissions(19);
  357. $share1 = $this->shareManager->createShare($share);
  358. $share = $this->shareManager->newShare();
  359. $share->setNode($node)
  360. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  361. ->setShareType(\OCP\Share::SHARE_TYPE_LINK)
  362. ->setPermissions(1);
  363. $share2 = $this->shareManager->createShare($share);
  364. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  365. $result = $ocs->getShares();
  366. $ocs->cleanup();
  367. // test should return one share created from testCreateShare()
  368. $this->assertTrue(count($result->getData()) === 2);
  369. $this->shareManager->deleteShare($share1);
  370. $this->shareManager->deleteShare($share2);
  371. }
  372. /**
  373. * @medium
  374. * @depends testCreateShareUserFile
  375. * @depends testCreateShareLink
  376. */
  377. function testGetShareFromSourceWithReshares() {
  378. $node = $this->userFolder->get($this->filename);
  379. $share1 = $this->shareManager->newShare();
  380. $share1->setNode($node)
  381. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  382. ->setSharedWith(self::TEST_FILES_SHARING_API_USER2)
  383. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  384. ->setPermissions(19);
  385. $share1 = $this->shareManager->createShare($share1);
  386. $share2 = $this->shareManager->newShare();
  387. $share2->setNode($node)
  388. ->setSharedBy(self::TEST_FILES_SHARING_API_USER2)
  389. ->setSharedWith(self::TEST_FILES_SHARING_API_USER3)
  390. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  391. ->setPermissions(19);
  392. $share2 = $this->shareManager->createShare($share2);
  393. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  394. $result = $ocs->getShares();
  395. $ocs->cleanup();
  396. // test should return one share
  397. $this->assertTrue(count($result->getData()) === 1);
  398. // now also ask for the reshares
  399. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  400. $result = $ocs->getShares('false', 'true', 'false', $this->filename);
  401. $ocs->cleanup();
  402. // now we should get two shares, the initial share and the reshare
  403. $this->assertCount(2, $result->getData());
  404. $this->shareManager->deleteShare($share1);
  405. $this->shareManager->deleteShare($share2);
  406. }
  407. /**
  408. * @medium
  409. * @depends testCreateShareUserFile
  410. */
  411. function testGetShareFromId() {
  412. $node = $this->userFolder->get($this->filename);
  413. $share1 = $this->shareManager->newShare();
  414. $share1->setNode($node)
  415. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  416. ->setSharedWith(self::TEST_FILES_SHARING_API_USER2)
  417. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  418. ->setPermissions(19);
  419. $share1 = $this->shareManager->createShare($share1);
  420. // call getShare() with share ID
  421. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  422. $result = $ocs->getShare($share1->getId());
  423. $ocs->cleanup();
  424. // test should return one share created from testCreateShare()
  425. $this->assertEquals(1, count($result->getData()));
  426. $this->shareManager->deleteShare($share1);
  427. }
  428. /**
  429. * @medium
  430. */
  431. function testGetShareFromFolder() {
  432. $node1 = $this->userFolder->get($this->filename);
  433. $share1 = $this->shareManager->newShare();
  434. $share1->setNode($node1)
  435. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  436. ->setSharedWith(self::TEST_FILES_SHARING_API_USER2)
  437. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  438. ->setPermissions(19);
  439. $share1 = $this->shareManager->createShare($share1);
  440. $node2 = $this->userFolder->get($this->folder.'/'.$this->filename);
  441. $share2 = $this->shareManager->newShare();
  442. $share2->setNode($node2)
  443. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  444. ->setShareType(\OCP\Share::SHARE_TYPE_LINK)
  445. ->setPermissions(1);
  446. $share2 = $this->shareManager->createShare($share2);
  447. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  448. $result = $ocs->getShares('false', 'false', 'true', $this->folder);
  449. $ocs->cleanup();
  450. // test should return one share within $this->folder
  451. $this->assertTrue(count($result->getData()) === 1);
  452. $this->shareManager->deleteShare($share1);
  453. $this->shareManager->deleteShare($share2);
  454. }
  455. function testGetShareFromFolderWithFile() {
  456. $node1 = $this->userFolder->get($this->filename);
  457. $share1 = $this->shareManager->newShare();
  458. $share1->setNode($node1)
  459. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  460. ->setSharedWith(self::TEST_FILES_SHARING_API_USER2)
  461. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  462. ->setPermissions(19);
  463. $share1 = $this->shareManager->createShare($share1);
  464. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  465. try {
  466. $ocs->getShares('false', 'false', 'true', $this->filename);
  467. $this->fail();
  468. } catch (OCSBadRequestException $e) {
  469. $this->assertEquals('Not a directory', $e->getMessage());
  470. }
  471. $ocs->cleanup();
  472. $this->shareManager->deleteShare($share1);
  473. }
  474. /**
  475. * share a folder, than reshare a file within the shared folder and check if we construct the correct path
  476. * @medium
  477. */
  478. function testGetShareFromFolderReshares() {
  479. $node1 = $this->userFolder->get($this->folder);
  480. $share1 = $this->shareManager->newShare();
  481. $share1->setNode($node1)
  482. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  483. ->setSharedWith(self::TEST_FILES_SHARING_API_USER2)
  484. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  485. ->setPermissions(31);
  486. $share1 = $this->shareManager->createShare($share1);
  487. $node2 = $this->userFolder->get($this->folder.'/'.$this->filename);
  488. $share2 = $this->shareManager->newShare();
  489. $share2->setNode($node2)
  490. ->setSharedBy(self::TEST_FILES_SHARING_API_USER2)
  491. ->setShareType(\OCP\Share::SHARE_TYPE_LINK)
  492. ->setPermissions(1);
  493. $share2 = $this->shareManager->createShare($share2);
  494. $node3 = $this->userFolder->get($this->folder.'/'.$this->subfolder.'/'.$this->filename);
  495. $share3 = $this->shareManager->newShare();
  496. $share3->setNode($node3)
  497. ->setSharedBy(self::TEST_FILES_SHARING_API_USER2)
  498. ->setShareType(\OCP\Share::SHARE_TYPE_LINK)
  499. ->setPermissions(1);
  500. $share3 = $this->shareManager->createShare($share3);
  501. $testValues=array(
  502. array('query' => $this->folder,
  503. 'expectedResult' => $this->folder . $this->filename),
  504. array('query' => $this->folder . $this->subfolder,
  505. 'expectedResult' => $this->folder . $this->subfolder . $this->filename),
  506. );
  507. foreach ($testValues as $value) {
  508. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER2);
  509. $result = $ocs->getShares('false', 'false', 'true', $value['query']);
  510. $ocs->cleanup();
  511. // test should return one share within $this->folder
  512. $data = $result->getData();
  513. $this->assertEquals($value['expectedResult'], $data[0]['path']);
  514. }
  515. // cleanup
  516. $this->shareManager->deleteShare($share1);
  517. $this->shareManager->deleteShare($share2);
  518. $this->shareManager->deleteShare($share3);
  519. }
  520. /**
  521. * reshare a sub folder and check if we get the correct path
  522. * @medium
  523. */
  524. function testGetShareFromSubFolderReShares() {
  525. $node1 = $this->userFolder->get($this->folder . $this->subfolder);
  526. $share1 = $this->shareManager->newShare();
  527. $share1->setNode($node1)
  528. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  529. ->setSharedWith(self::TEST_FILES_SHARING_API_USER2)
  530. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  531. ->setPermissions(31);
  532. $share1 = $this->shareManager->createShare($share1);
  533. $node2 = \OC::$server->getRootFolder()->getUserFolder(self::TEST_FILES_SHARING_API_USER2)->get($this->subfolder);
  534. $share2 = $this->shareManager->newShare();
  535. $share2->setNode($node2)
  536. ->setSharedBy(self::TEST_FILES_SHARING_API_USER2)
  537. ->setShareType(\OCP\Share::SHARE_TYPE_LINK)
  538. ->setPermissions(1);
  539. $share2 = $this->shareManager->createShare($share2);
  540. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER2);
  541. $result = $ocs->getShares();
  542. $ocs->cleanup();
  543. // test should return one share within $this->folder
  544. $data = $result->getData();
  545. // we should get exactly one result
  546. $this->assertCount(1, $data);
  547. $this->assertEquals($this->subfolder, $data[0]['path']);
  548. $this->shareManager->deleteShare($share2);
  549. $this->shareManager->deleteShare($share1);
  550. }
  551. /**
  552. * test re-re-share of folder if the path gets constructed correctly
  553. * @medium
  554. */
  555. function XtestGetShareFromFolderReReShares() {
  556. $node1 = $this->userFolder->get($this->folder . $this->subfolder);
  557. $share1 = $this->shareManager->newShare();
  558. $share1->setNode($node1)
  559. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  560. ->setSharedWith(self::TEST_FILES_SHARING_API_USER2)
  561. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  562. ->setPermissions(31);
  563. $share1 = $this->shareManager->createShare($share1);
  564. $node2 = $this->userFolder->get($this->folder . $this->subfolder . $this->subsubfolder);
  565. $share2 = $this->shareManager->newShare();
  566. $share2->setNode($node2)
  567. ->setSharedBy(self::TEST_FILES_SHARING_API_USER2)
  568. ->setSharedWith(self::TEST_FILES_SHARING_API_USER3)
  569. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  570. ->setPermissions(31);
  571. $share2 = $this->shareManager->createShare($share2);
  572. $share3 = $this->shareManager->newShare();
  573. $share3->setNode($node2)
  574. ->setSharedBy(self::TEST_FILES_SHARING_API_USER3)
  575. ->setShareType(\OCP\Share::SHARE_TYPE_LINK)
  576. ->setPermissions(1);
  577. $share3 = $this->shareManager->createShare($share3);
  578. /*
  579. * Test as recipient
  580. */
  581. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER3);
  582. $result = $ocs->getShares();
  583. $ocs->cleanup();
  584. // test should return one share within $this->folder
  585. $data = $result->getData();
  586. // we should get exactly one result
  587. $this->assertCount(1, $data);
  588. $this->assertEquals($this->subsubfolder, $data[0]['path']);
  589. /*
  590. * Test for first owner/initiator
  591. */
  592. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  593. $result = $ocs->getShares();
  594. $ocs->cleanup();
  595. // test should return one share within $this->folder
  596. $data = $result->getData();
  597. // we should get exactly one result
  598. $this->assertCount(1, $data);
  599. $this->assertEquals($this->folder . $this->subfolder, $data[0]['path']);
  600. /*
  601. * Test for second initiator
  602. */
  603. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER2);
  604. $result = $ocs->getShares();
  605. $ocs->cleanup();
  606. // test should return one share within $this->folder
  607. $data = $result->getData();
  608. // we should get exactly one result
  609. $this->assertCount(1, $data);
  610. $this->assertEquals($this->subfolder . $this->subsubfolder, $data[0]['path']);
  611. $this->shareManager->deleteShare($share1);
  612. $this->shareManager->deleteShare($share2);
  613. $this->shareManager->deleteShare($share3);
  614. }
  615. /**
  616. * test multiple shared folder if the path gets constructed correctly
  617. * @medium
  618. */
  619. function testGetShareMultipleSharedFolder() {
  620. $this->setUp();
  621. $node1 = $this->userFolder->get($this->folder . $this->subfolder);
  622. $share1 = $this->shareManager->newShare();
  623. $share1->setNode($node1)
  624. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  625. ->setSharedWith(self::TEST_FILES_SHARING_API_USER2)
  626. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  627. ->setPermissions(31);
  628. $share1 = $this->shareManager->createShare($share1);
  629. $node2 = $this->userFolder->get($this->folder);
  630. $share2 = $this->shareManager->newShare();
  631. $share2->setNode($node2)
  632. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  633. ->setSharedWith(self::TEST_FILES_SHARING_API_USER2)
  634. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  635. ->setPermissions(31);
  636. $share2 = $this->shareManager->createShare($share2);
  637. $share3 = $this->shareManager->newShare();
  638. $share3->setNode($node1)
  639. ->setSharedBy(self::TEST_FILES_SHARING_API_USER2)
  640. ->setShareType(\OCP\Share::SHARE_TYPE_LINK)
  641. ->setPermissions(1);
  642. $share3 = $this->shareManager->createShare($share3);
  643. // $request = $this->createRequest(['path' => $this->subfolder]);
  644. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER2);
  645. $result1 = $ocs->getShares('false','false','false', $this->subfolder);
  646. $ocs->cleanup();
  647. // test should return one share within $this->folder
  648. $data1 = $result1->getData();
  649. $this->assertCount(1, $data1);
  650. $s1 = reset($data1);
  651. //$request = $this->createRequest(['path' => $this->folder.$this->subfolder]);
  652. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER2);
  653. $result2 = $ocs->getShares('false', 'false', 'false', $this->folder . $this->subfolder);
  654. $ocs->cleanup();
  655. // test should return one share within $this->folder
  656. $data2 = $result2->getData();
  657. $this->assertCount(1, $data2);
  658. $s2 = reset($data2);
  659. $this->assertEquals($this->subfolder, $s1['path']);
  660. $this->assertEquals($this->folder.$this->subfolder, $s2['path']);
  661. $this->shareManager->deleteShare($share1);
  662. $this->shareManager->deleteShare($share2);
  663. $this->shareManager->deleteShare($share3);
  664. }
  665. /**
  666. * test re-re-share of folder if the path gets constructed correctly
  667. * @medium
  668. */
  669. function testGetShareFromFileReReShares() {
  670. $node1 = $this->userFolder->get($this->folder . $this->subfolder);
  671. $share1 = $this->shareManager->newShare();
  672. $share1->setNode($node1)
  673. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  674. ->setSharedWith(self::TEST_FILES_SHARING_API_USER2)
  675. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  676. ->setPermissions(31);
  677. $share1 = $this->shareManager->createShare($share1);
  678. $user2Folder = \OC::$server->getUserFolder(self::TEST_FILES_SHARING_API_USER2);
  679. $node2 = $user2Folder->get($this->subfolder . $this->filename);
  680. $share2 = $this->shareManager->newShare();
  681. $share2->setNode($node2)
  682. ->setSharedBy(self::TEST_FILES_SHARING_API_USER2)
  683. ->setSharedWith(self::TEST_FILES_SHARING_API_USER3)
  684. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  685. ->setPermissions(19);
  686. $share2 = $this->shareManager->createShare($share2);
  687. $user3Folder = \OC::$server->getUserFolder(self::TEST_FILES_SHARING_API_USER3);
  688. $node3 = $user3Folder->get($this->filename);
  689. $share3 = $this->shareManager->newShare();
  690. $share3->setNode($node3)
  691. ->setSharedBy(self::TEST_FILES_SHARING_API_USER3)
  692. ->setShareType(\OCP\Share::SHARE_TYPE_LINK)
  693. ->setPermissions(1);
  694. $share3 = $this->shareManager->createShare($share3);
  695. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER3);
  696. $result = $ocs->getShares();
  697. $ocs->cleanup();
  698. // test should return one share within $this->folder
  699. $data = $result->getData();
  700. // we should get exactly one result
  701. $this->assertCount(1, $data);
  702. $this->assertEquals($this->filename, $data[0]['path']);
  703. $this->shareManager->deleteShare($share1);
  704. $this->shareManager->deleteShare($share2);
  705. $this->shareManager->deleteShare($share3);
  706. }
  707. /**
  708. * @medium
  709. */
  710. function testGetShareFromUnknownId() {
  711. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER3);
  712. try {
  713. $ocs->getShare(0);
  714. $this->fail();
  715. } catch (OCSNotFoundException $e) {
  716. $this->assertEquals('Wrong share ID, share doesn\'t exist', $e->getMessage());
  717. }
  718. $ocs->cleanup();
  719. }
  720. /**
  721. * @medium
  722. * @depends testCreateShareUserFile
  723. * @depends testCreateShareLink
  724. */
  725. function testUpdateShare() {
  726. $password = md5(time());
  727. $node1 = $this->userFolder->get($this->filename);
  728. $share1 = $this->shareManager->newShare();
  729. $share1->setNode($node1)
  730. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  731. ->setSharedWith(self::TEST_FILES_SHARING_API_USER2)
  732. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  733. ->setPermissions(19);
  734. $share1 = $this->shareManager->createShare($share1);
  735. $share2 = $this->shareManager->newShare();
  736. $share2->setNode($node1)
  737. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  738. ->setShareType(\OCP\Share::SHARE_TYPE_LINK)
  739. ->setPermissions(1);
  740. $share2 = $this->shareManager->createShare($share2);
  741. // update permissions
  742. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  743. $ocs->updateShare($share1->getId(), 1);
  744. $ocs->cleanup();
  745. $share1 = $this->shareManager->getShareById('ocinternal:' . $share1->getId());
  746. $this->assertEquals(1, $share1->getPermissions());
  747. // update password for link share
  748. $this->assertNull($share2->getPassword());
  749. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  750. $ocs->updateShare($share2->getId(), null, $password);
  751. $ocs->cleanup();
  752. $share2 = $this->shareManager->getShareById('ocinternal:' . $share2->getId());
  753. $this->assertNotNull($share2->getPassword());
  754. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  755. $ocs->updateShare($share2->getId(), null, '');
  756. $ocs->cleanup();
  757. $share2 = $this->shareManager->getShareById('ocinternal:' . $share2->getId());
  758. $this->assertNull($share2->getPassword());
  759. $this->shareManager->deleteShare($share1);
  760. $this->shareManager->deleteShare($share2);
  761. }
  762. /**
  763. * @medium
  764. */
  765. function testUpdateShareUpload() {
  766. $node1 = $this->userFolder->get($this->folder);
  767. $share1 = $this->shareManager->newShare();
  768. $share1->setNode($node1)
  769. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  770. ->setShareType(\OCP\Share::SHARE_TYPE_LINK)
  771. ->setPermissions(1);
  772. $share1 = $this->shareManager->createShare($share1);
  773. // update public upload
  774. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  775. $ocs->updateShare($share1->getId(), null, null, 'true');
  776. $ocs->cleanup();
  777. $share1 = $this->shareManager->getShareById($share1->getFullId());
  778. $this->assertEquals(
  779. \OCP\Constants::PERMISSION_READ |
  780. \OCP\Constants::PERMISSION_CREATE |
  781. \OCP\Constants::PERMISSION_UPDATE |
  782. \OCP\Constants::PERMISSION_DELETE,
  783. $share1->getPermissions()
  784. );
  785. // cleanup
  786. $this->shareManager->deleteShare($share1);
  787. }
  788. /**
  789. * @medium
  790. */
  791. function testUpdateShareExpireDate() {
  792. $node1 = $this->userFolder->get($this->folder);
  793. $share1 = $this->shareManager->newShare();
  794. $share1->setNode($node1)
  795. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  796. ->setShareType(\OCP\Share::SHARE_TYPE_LINK)
  797. ->setPermissions(1);
  798. $share1 = $this->shareManager->createShare($share1);
  799. $config = \OC::$server->getConfig();
  800. // enforce expire date, by default 7 days after the file was shared
  801. $config->setAppValue('core', 'shareapi_default_expire_date', 'yes');
  802. $config->setAppValue('core', 'shareapi_enforce_expire_date', 'yes');
  803. $dateWithinRange = new \DateTime();
  804. $dateWithinRange->setTime(0,0,0);
  805. $dateWithinRange->add(new \DateInterval('P5D'));
  806. $dateOutOfRange = new \DateTime();
  807. $dateOutOfRange->setTime(0,0,0);
  808. $dateOutOfRange->add(new \DateInterval('P8D'));
  809. // update expire date to a valid value
  810. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  811. $ocs->updateShare($share1->getId(), null, null, null, $dateWithinRange->format('Y-m-d'));
  812. $ocs->cleanup();
  813. $share1 = $this->shareManager->getShareById($share1->getFullId());
  814. // date should be changed
  815. $this->assertEquals($dateWithinRange, $share1->getExpirationDate());
  816. // update expire date to a value out of range
  817. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  818. try {
  819. $ocs->updateShare($share1->getId());
  820. $this->fail();
  821. } catch (OCSBadRequestException $e) {
  822. }
  823. $ocs->cleanup();
  824. $share1 = $this->shareManager->getShareById($share1->getFullId());
  825. // date shouldn't be changed
  826. $this->assertEquals($dateWithinRange, $share1->getExpirationDate());
  827. // Try to remove expire date
  828. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  829. try {
  830. $ocs->updateShare($share1->getId());
  831. $this->fail();
  832. } catch (OCSBadRequestException $e) {
  833. }
  834. $ocs->cleanup();
  835. $share1 = $this->shareManager->getShareById($share1->getFullId());
  836. // date shouldn't be changed
  837. $this->assertEquals($dateWithinRange, $share1->getExpirationDate());
  838. // cleanup
  839. $config->setAppValue('core', 'shareapi_default_expire_date', 'no');
  840. $config->setAppValue('core', 'shareapi_enforce_expire_date', 'no');
  841. $this->shareManager->deleteShare($share1);
  842. }
  843. /**
  844. * @medium
  845. * @depends testCreateShareUserFile
  846. */
  847. function testDeleteShare() {
  848. $node1 = $this->userFolder->get($this->filename);
  849. $share1 = $this->shareManager->newShare();
  850. $share1->setNode($node1)
  851. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  852. ->setSharedWith(self::TEST_FILES_SHARING_API_USER2)
  853. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  854. ->setPermissions(19);
  855. $share1 = $this->shareManager->createShare($share1);
  856. $share2 = $this->shareManager->newShare();
  857. $share2->setNode($node1)
  858. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  859. ->setShareType(\OCP\Share::SHARE_TYPE_LINK)
  860. ->setPermissions(1);
  861. $share2 = $this->shareManager->createShare($share1);
  862. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  863. $ocs->deleteShare($share1->getId());
  864. $ocs->cleanup();
  865. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  866. $ocs->deleteShare($share2->getId());
  867. $ocs->cleanup();
  868. $this->assertEmpty($this->shareManager->getSharesBy(self::TEST_FILES_SHARING_API_USER2, \OCP\Share::SHARE_TYPE_USER));
  869. $this->assertEmpty($this->shareManager->getSharesBy(self::TEST_FILES_SHARING_API_USER2, \OCP\Share::SHARE_TYPE_LINK));
  870. }
  871. /**
  872. * test unshare of a reshared file
  873. */
  874. function testDeleteReshare() {
  875. $node1 = $this->userFolder->get($this->folder);
  876. $share1 = $this->shareManager->newShare();
  877. $share1->setNode($node1)
  878. ->setSharedBy(self::TEST_FILES_SHARING_API_USER1)
  879. ->setSharedWith(self::TEST_FILES_SHARING_API_USER2)
  880. ->setShareType(\OCP\Share::SHARE_TYPE_USER)
  881. ->setPermissions(31);
  882. $share1 = $this->shareManager->createShare($share1);
  883. $user2folder = \OC::$server->getUserFolder(self::TEST_FILES_SHARING_API_USER2);
  884. $node2 = $user2folder->get($this->folder.'/'.$this->filename);
  885. $share2 = $this->shareManager->newShare();
  886. $share2->setNode($node2)
  887. ->setSharedBy(self::TEST_FILES_SHARING_API_USER2)
  888. ->setShareType(\OCP\Share::SHARE_TYPE_LINK)
  889. ->setPermissions(1);
  890. $share2 = $this->shareManager->createShare($share2);
  891. // test if we can unshare the link again
  892. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER2);
  893. $ocs->deleteShare($share2->getId());
  894. $ocs->cleanup();
  895. $this->shareManager->deleteShare($share1);
  896. }
  897. /**
  898. * share a folder which contains a share mount point, should be forbidden
  899. */
  900. public function testShareFolderWithAMountPoint() {
  901. // user 1 shares a folder with user2
  902. self::loginHelper(self::TEST_FILES_SHARING_API_USER1);
  903. $share = $this->share(
  904. \OCP\Share::SHARE_TYPE_USER,
  905. $this->folder,
  906. self::TEST_FILES_SHARING_API_USER1,
  907. self::TEST_FILES_SHARING_API_USER2,
  908. \OCP\Constants::PERMISSION_ALL
  909. );
  910. // user2 shares a file from the folder as link
  911. self::loginHelper(self::TEST_FILES_SHARING_API_USER2);
  912. $view = new \OC\Files\View('/' . self::TEST_FILES_SHARING_API_USER2 . '/files');
  913. $view->mkdir("localDir");
  914. // move mount point to the folder "localDir"
  915. $result = $view->rename($this->folder, 'localDir/'.$this->folder);
  916. $this->assertTrue($result !== false);
  917. // try to share "localDir"
  918. $fileInfo2 = $view->getFileInfo('localDir');
  919. $this->assertTrue($fileInfo2 instanceof \OC\Files\FileInfo);
  920. $pass = true;
  921. try {
  922. $this->share(
  923. \OCP\Share::SHARE_TYPE_USER,
  924. 'localDir',
  925. self::TEST_FILES_SHARING_API_USER2,
  926. self::TEST_FILES_SHARING_API_USER3,
  927. \OCP\Constants::PERMISSION_ALL
  928. );
  929. } catch (\Exception $e) {
  930. $pass = false;
  931. }
  932. $this->assertFalse($pass);
  933. //cleanup
  934. $result = $view->rename('localDir/' . $this->folder, $this->folder);
  935. $this->assertTrue($result !== false);
  936. $view->unlink('localDir');
  937. self::loginHelper(self::TEST_FILES_SHARING_API_USER1);
  938. $this->shareManager->deleteShare($share);
  939. }
  940. /**
  941. * Post init mount points hook for mounting simulated ext storage
  942. */
  943. public static function initTestMountPointsHook($data) {
  944. if ($data['user'] === self::TEST_FILES_SHARING_API_USER1) {
  945. \OC\Files\Filesystem::mount(self::$tempStorage, array(), '/' . self::TEST_FILES_SHARING_API_USER1 . '/files' . self::TEST_FOLDER_NAME);
  946. }
  947. }
  948. /**
  949. * Tests mounting a folder that is an external storage mount point.
  950. */
  951. public function testShareStorageMountPoint() {
  952. $tempStorage = new \OC\Files\Storage\Temporary(array());
  953. $tempStorage->file_put_contents('test.txt', 'abcdef');
  954. $tempStorage->getScanner()->scan('');
  955. $this->registerMount(self::TEST_FILES_SHARING_API_USER1, $tempStorage, self::TEST_FILES_SHARING_API_USER1 . '/files' . self::TEST_FOLDER_NAME);
  956. // logging in will auto-mount the temp storage for user1 as well
  957. self::loginHelper(self::TEST_FILES_SHARING_API_USER1);
  958. // user 1 shares the mount point folder with user2
  959. $share = $this->share(
  960. \OCP\Share::SHARE_TYPE_USER,
  961. $this->folder,
  962. self::TEST_FILES_SHARING_API_USER1,
  963. self::TEST_FILES_SHARING_API_USER2,
  964. \OCP\Constants::PERMISSION_ALL
  965. );
  966. // user2: check that mount point name appears correctly
  967. self::loginHelper(self::TEST_FILES_SHARING_API_USER2);
  968. $view = new \OC\Files\View('/' . self::TEST_FILES_SHARING_API_USER2 . '/files');
  969. $this->assertTrue($view->file_exists($this->folder));
  970. $this->assertTrue($view->file_exists($this->folder . '/test.txt'));
  971. self::loginHelper(self::TEST_FILES_SHARING_API_USER1);
  972. $this->shareManager->deleteShare($share);
  973. \OC_Hook::clear('OC_Filesystem', 'post_initMountPoints');
  974. \OC_Hook::clear('\OCA\Files_Sharing\Tests\ApiTest', 'initTestMountPointsHook');
  975. }
  976. /**
  977. * @expectedException \Exception
  978. */
  979. public function XtestShareNonExisting() {
  980. self::loginHelper(self::TEST_FILES_SHARING_API_USER1);
  981. $id = PHP_INT_MAX - 1;
  982. \OC\Share\Share::shareItem('file', $id, \OCP\Share::SHARE_TYPE_LINK, self::TEST_FILES_SHARING_API_USER2, 31);
  983. }
  984. /**
  985. * @expectedException \Exception
  986. */
  987. public function testShareNotOwner() {
  988. self::loginHelper(self::TEST_FILES_SHARING_API_USER2);
  989. \OC\Files\Filesystem::file_put_contents('foo.txt', 'bar');
  990. $info = \OC\Files\Filesystem::getFileInfo('foo.txt');
  991. self::loginHelper(self::TEST_FILES_SHARING_API_USER1);
  992. \OC\Share\Share::shareItem('file', $info->getId(), \OCP\Share::SHARE_TYPE_LINK, self::TEST_FILES_SHARING_API_USER2, 31);
  993. }
  994. public function datesProvider() {
  995. $date = new \DateTime();
  996. $date->add(new \DateInterval('P5D'));
  997. return [
  998. [$date->format('Y-m-d'), true],
  999. ['abc', false],
  1000. [$date->format('Y-m-d') . 'xyz', false],
  1001. ];
  1002. }
  1003. /**
  1004. * Make sure only ISO 8601 dates are accepted
  1005. *
  1006. * @dataProvider datesProvider
  1007. */
  1008. public function testPublicLinkExpireDate($date, $valid) {
  1009. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  1010. try {
  1011. $result = $ocs->createShare($this->folder, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_LINK, null, 'false', '', $date);
  1012. $this->assertTrue($valid);
  1013. } catch (OCSNotFoundException $e) {
  1014. $this->assertFalse($valid);
  1015. $this->assertEquals('Invalid date, date format must be YYYY-MM-DD', $e->getMessage());
  1016. $ocs->cleanup();
  1017. return;
  1018. }
  1019. $ocs->cleanup();
  1020. $data = $result->getData();
  1021. $this->assertTrue(is_string($data['token']));
  1022. $this->assertEquals($date, substr($data['expiration'], 0, 10));
  1023. // check for correct link
  1024. $url = \OC::$server->getURLGenerator()->getAbsoluteURL('/index.php/s/' . $data['token']);
  1025. $this->assertEquals($url, $data['url']);
  1026. $share = $this->shareManager->getShareById('ocinternal:'.$data['id']);
  1027. $this->assertEquals($date, $share->getExpirationDate()->format('Y-m-d'));
  1028. $this->shareManager->deleteShare($share);
  1029. }
  1030. public function testCreatePublicLinkExpireDateValid() {
  1031. $config = \OC::$server->getConfig();
  1032. // enforce expire date, by default 7 days after the file was shared
  1033. $config->setAppValue('core', 'shareapi_default_expire_date', 'yes');
  1034. $config->setAppValue('core', 'shareapi_enforce_expire_date', 'yes');
  1035. $date = new \DateTime();
  1036. $date->add(new \DateInterval('P5D'));
  1037. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  1038. $result = $ocs->createShare($this->filename, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_LINK, null, 'false', '', $date->format('Y-m-d'));
  1039. $ocs->cleanup();
  1040. $data = $result->getData();
  1041. $this->assertTrue(is_string($data['token']));
  1042. $this->assertEquals($date->format('Y-m-d') . ' 00:00:00', $data['expiration']);
  1043. // check for correct link
  1044. $url = \OC::$server->getURLGenerator()->getAbsoluteURL('/index.php/s/' . $data['token']);
  1045. $this->assertEquals($url, $data['url']);
  1046. $share = $this->shareManager->getShareById('ocinternal:'.$data['id']);
  1047. $date->setTime(0,0,0);
  1048. $this->assertEquals($date, $share->getExpirationDate());
  1049. $this->shareManager->deleteShare($share);
  1050. $config->setAppValue('core', 'shareapi_default_expire_date', 'no');
  1051. $config->setAppValue('core', 'shareapi_enforce_expire_date', 'no');
  1052. }
  1053. public function testCreatePublicLinkExpireDateInvalidFuture() {
  1054. $config = \OC::$server->getConfig();
  1055. // enforce expire date, by default 7 days after the file was shared
  1056. $config->setAppValue('core', 'shareapi_default_expire_date', 'yes');
  1057. $config->setAppValue('core', 'shareapi_enforce_expire_date', 'yes');
  1058. $date = new \DateTime();
  1059. $date->add(new \DateInterval('P8D'));
  1060. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  1061. try {
  1062. $ocs->createShare($this->filename, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_LINK, null, 'false', '', $date->format('Y-m-d'));
  1063. $this->fail();
  1064. } catch (OCSException $e) {
  1065. $this->assertEquals(404, $e->getCode());
  1066. $this->assertEquals('Can’t set expiration date more than 7 days in the future', $e->getMessage());
  1067. }
  1068. $ocs->cleanup();
  1069. $config->setAppValue('core', 'shareapi_default_expire_date', 'no');
  1070. $config->setAppValue('core', 'shareapi_enforce_expire_date', 'no');
  1071. }
  1072. public function XtestCreatePublicLinkExpireDateInvalidPast() {
  1073. $config = \OC::$server->getConfig();
  1074. $date = new \DateTime();
  1075. $date->sub(new \DateInterval('P8D'));
  1076. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  1077. try {
  1078. $ocs->createShare($this->filename, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_LINK, null, 'false', '', $date->format('Y-m-d'));
  1079. $this->fail();
  1080. } catch(OCSException $e) {
  1081. $this->assertEquals(404, $e->getCode());
  1082. $this->assertEquals('Expiration date is in the past', $e->getMessage());
  1083. }
  1084. $ocs->cleanup();
  1085. $config->setAppValue('core', 'shareapi_default_expire_date', 'no');
  1086. $config->setAppValue('core', 'shareapi_enforce_expire_date', 'no');
  1087. }
  1088. /**
  1089. * test for no invisible shares
  1090. * See: https://github.com/owncloud/core/issues/22295
  1091. */
  1092. public function testInvisibleSharesUser() {
  1093. // simulate a post request
  1094. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  1095. $result = $ocs->createShare($this->folder, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_USER, self::TEST_FILES_SHARING_API_USER2);
  1096. $ocs->cleanup();
  1097. $data = $result->getData();
  1098. $topId = $data['id'];
  1099. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER2);
  1100. $ocs->createShare($this->folder, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_LINK);
  1101. $ocs->cleanup();
  1102. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  1103. $ocs->deleteShare($topId);
  1104. $ocs->cleanup();
  1105. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  1106. $result = $ocs->getShares();
  1107. $ocs->cleanup();
  1108. $this->assertEmpty($result->getData());
  1109. }
  1110. /**
  1111. * test for no invisible shares
  1112. * See: https://github.com/owncloud/core/issues/22295
  1113. */
  1114. public function testInvisibleSharesGroup() {
  1115. // simulate a post request
  1116. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  1117. $result = $ocs->createShare($this->folder, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_GROUP, self::TEST_FILES_SHARING_API_GROUP1);
  1118. $ocs->cleanup();
  1119. $data = $result->getData();
  1120. $topId = $data['id'];
  1121. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER2);
  1122. $ocs->createShare($this->folder, \OCP\Constants::PERMISSION_ALL, \OCP\Share::SHARE_TYPE_LINK);
  1123. $ocs->cleanup();
  1124. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  1125. $ocs->deleteShare($topId);
  1126. $ocs->cleanup();
  1127. $ocs = $this->createOCS(self::TEST_FILES_SHARING_API_USER1);
  1128. $result = $ocs->getShares();
  1129. $ocs->cleanup();
  1130. $this->assertEmpty($result->getData());
  1131. }
  1132. }