diff options
author | Joas Schilling <coding@schilljs.com> | 2016-09-30 09:58:02 +0200 |
---|---|---|
committer | Joas Schilling <coding@schilljs.com> | 2016-09-30 10:21:08 +0200 |
commit | a1e4b17ff44cc4476574b8d335ac3fdf2c2dc561 (patch) | |
tree | 04629eb4b3a036b7e2a55a58f1bafd571ec6b50c /tests/Core | |
parent | 877cb06bfed4524beb62e4cc52f946406ef7d5ea (diff) | |
download | nextcloud-server-a1e4b17ff44cc4476574b8d335ac3fdf2c2dc561.tar.gz nextcloud-server-a1e4b17ff44cc4476574b8d335ac3fdf2c2dc561.zip |
Remove unused endpoint
Signed-off-by: Joas Schilling <coding@schilljs.com>
Diffstat (limited to 'tests/Core')
-rw-r--r-- | tests/Core/Controller/TokenControllerTest.php | 130 |
1 files changed, 0 insertions, 130 deletions
diff --git a/tests/Core/Controller/TokenControllerTest.php b/tests/Core/Controller/TokenControllerTest.php deleted file mode 100644 index 0e965aac2e5..00000000000 --- a/tests/Core/Controller/TokenControllerTest.php +++ /dev/null @@ -1,130 +0,0 @@ -<?php - -/** - * @author Christoph Wurst <christoph@owncloud.com> - * - * @copyright Copyright (c) 2016, ownCloud, Inc. - * @license AGPL-3.0 - * - * This code is free software: you can redistribute it and/or modify - * it under the terms of the GNU Affero General Public License, version 3, - * as published by the Free Software Foundation. - * - * This program is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU Affero General Public License for more details. - * - * You should have received a copy of the GNU Affero General Public License, version 3, - * along with this program. If not, see <http://www.gnu.org/licenses/> - * - */ - -namespace Tests\Core\Controller; - -use OC\AppFramework\Http; -use OC\Authentication\Token\IToken; -use OC\Core\Controller\TokenController; -use OCP\AppFramework\Http\JSONResponse; -use Test\TestCase; - -class TokenControllerTest extends TestCase { - - /** \OC\Core\Controller\TokenController */ - private $tokenController; - private $request; - private $userManager; - private $tokenProvider; - private $twoFactorAuthManager; - private $secureRandom; - - protected function setUp() { - parent::setUp(); - - $this->request = $this->getMockBuilder('\OCP\IRequest')->getMock(); - $this->userManager = $this->getMockBuilder('\OC\User\Manager') - ->disableOriginalConstructor() - ->getMock(); - $this->tokenProvider = $this->getMockBuilder('\OC\Authentication\Token\IProvider') - ->getMock(); - $this->twoFactorAuthManager = $this->getMockBuilder('\OC\Authentication\TwoFactorAuth\Manager') - ->disableOriginalConstructor() - ->getMock(); - $this->secureRandom = $this->getMockBuilder('\OCP\Security\ISecureRandom') - ->getMock(); - - $this->tokenController = new TokenController('core', $this->request, $this->userManager, $this->tokenProvider, $this->twoFactorAuthManager, $this->secureRandom); - } - - public function testWithoutCredentials() { - $expected = new JSONResponse(); - $expected->setStatus(Http::STATUS_UNPROCESSABLE_ENTITY); - - $actual = $this->tokenController->generateToken(null, null); - - $this->assertEquals($expected, $actual); - } - - public function testWithInvalidCredentials() { - $this->userManager->expects($this->once()) - ->method('checkPassword') - ->with('john', 'passme') - ->will($this->returnValue(false)); - $expected = new JSONResponse(); - $expected->setStatus(Http::STATUS_UNAUTHORIZED); - - $actual = $this->tokenController->generateToken('john', 'passme'); - - $this->assertEquals($expected, $actual); - } - - public function testWithValidCredentials() { - $user = $this->getMockBuilder('\OCP\IUser')->getMock(); - $this->userManager->expects($this->once()) - ->method('checkPassword') - ->with('john', '123456') - ->will($this->returnValue($user)); - $user->expects($this->once()) - ->method('getUID') - ->will($this->returnValue('john')); - $this->twoFactorAuthManager->expects($this->once()) - ->method('isTwoFactorAuthenticated') - ->with($user) - ->will($this->returnValue(false)); - $this->secureRandom->expects($this->once()) - ->method('generate') - ->with(128) - ->will($this->returnValue('verysecurerandomtoken')); - $this->tokenProvider->expects($this->once()) - ->method('generateToken') - ->with('verysecurerandomtoken', 'john', 'john', '123456', 'unknown client', IToken::PERMANENT_TOKEN); - $expected = new JSONResponse([ - 'token' => 'verysecurerandomtoken' - ]); - - $actual = $this->tokenController->generateToken('john', '123456'); - - $this->assertEquals($expected, $actual); - } - - public function testWithValidCredentialsBut2faEnabled() { - $user = $this->getMockBuilder('\OCP\IUser')->getMock(); - $this->userManager->expects($this->once()) - ->method('checkPassword') - ->with('john', '123456') - ->will($this->returnValue($user)); - $this->twoFactorAuthManager->expects($this->once()) - ->method('isTwoFactorAuthenticated') - ->with($user) - ->will($this->returnValue(true)); - $this->secureRandom->expects($this->never()) - ->method('generate'); - $expected = new JSONResponse(); - $expected->setStatus(Http::STATUS_UNAUTHORIZED); - - $actual = $this->tokenController->generateToken('john', '123456'); - - $this->assertEquals($expected, $actual); - } - -} |