summaryrefslogtreecommitdiffstats
path: root/tests/lib/SubAdminTest.php
diff options
context:
space:
mode:
authorJoas Schilling <nickvergessen@gmx.de>2016-05-20 15:38:20 +0200
committerThomas Müller <DeepDiver1975@users.noreply.github.com>2016-05-20 15:38:20 +0200
commit94ad54ec9b96d41a614fbbad4a97b34c41a6901f (patch)
treef3eb7cdda2704aaf0cd59d58efe66bcbd34cb67d /tests/lib/SubAdminTest.php
parent2ef751b1ec28f7b5c7113af60ec8c9fa0ae1cf87 (diff)
downloadnextcloud-server-94ad54ec9b96d41a614fbbad4a97b34c41a6901f.tar.gz
nextcloud-server-94ad54ec9b96d41a614fbbad4a97b34c41a6901f.zip
Move tests/ to PSR-4 (#24731)
* Move a-b to PSR-4 * Move c-d to PSR-4 * Move e+g to PSR-4 * Move h-l to PSR-4 * Move m-r to PSR-4 * Move s-u to PSR-4 * Move files/ to PSR-4 * Move remaining tests to PSR-4 * Remove Test\ from old autoloader
Diffstat (limited to 'tests/lib/SubAdminTest.php')
-rw-r--r--tests/lib/SubAdminTest.php295
1 files changed, 295 insertions, 0 deletions
diff --git a/tests/lib/SubAdminTest.php b/tests/lib/SubAdminTest.php
new file mode 100644
index 00000000000..c1159132a50
--- /dev/null
+++ b/tests/lib/SubAdminTest.php
@@ -0,0 +1,295 @@
+<?php
+/**
+ * @author Roeland Jago Douma <roeland@famdouma.nl>
+ *
+ * @copyright Copyright (c) 2015, ownCloud, Inc.
+ * @license AGPL-3.0
+ *
+ * This code is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU Affero General Public License, version 3,
+ * as published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU Affero General Public License for more details.
+ *
+ * You should have received a copy of the GNU Affero General Public License, version 3,
+ * along with this program. If not, see <http://www.gnu.org/licenses/>
+ *
+ */
+namespace Test;
+
+class SubAdminTest extends \Test\TestCase {
+
+ /** @var \OCP\IUserManager */
+ private $userManager;
+
+ /** @var \OCP\IGroupManager */
+ private $groupManager;
+
+ /** @var \OCP\IDBConnection */
+ private $dbConn;
+
+ /** @var \OCP\IUser[] */
+ private $users;
+
+ /** @var \OCP\IGroup[] */
+ private $groups;
+
+ public function setup() {
+ $this->users = [];
+ $this->groups = [];
+
+ $this->userManager = \OC::$server->getUserManager();
+ $this->groupManager = \OC::$server->getGroupManager();
+ $this->dbConn = \OC::$server->getDatabaseConnection();
+
+ // Create 3 users and 3 groups
+ for ($i = 0; $i < 3; $i++) {
+ $this->users[] = $this->userManager->createUser('user'.$i, 'user');
+ $this->groups[] = $this->groupManager->createGroup('group'.$i);
+ }
+
+ // Create admin group
+ if (!$this->groupManager->groupExists('admin')) {
+ $this->groupManager->createGroup('admin');
+ }
+
+ // Create "orphaned" users and groups (scenario: temporarily disabled
+ // backend)
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('group_admin')
+ ->values([
+ 'gid' => $qb->createNamedParameter($this->groups[0]->getGID()),
+ 'uid' => $qb->createNamedParameter('orphanedUser')
+ ])
+ ->execute();
+ $qb->insert('group_admin')
+ ->values([
+ 'gid' => $qb->createNamedParameter('orphanedGroup'),
+ 'uid' => $qb->createNamedParameter('orphanedUser')
+ ])
+ ->execute();
+ $qb->insert('group_admin')
+ ->values([
+ 'gid' => $qb->createNamedParameter('orphanedGroup'),
+ 'uid' => $qb->createNamedParameter($this->users[0]->getUID())
+ ])
+ ->execute();
+ }
+
+ public function tearDown() {
+ foreach($this->users as $user) {
+ $user->delete();
+ }
+
+ foreach($this->groups as $group) {
+ $group->delete();
+ }
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->delete('group_admin')
+ ->where($qb->expr()->eq('uid', $qb->createNamedParameter('orphanedUser')))
+ ->orWhere($qb->expr()->eq('gid', $qb->createNamedParameter('orphanedGroup')))
+ ->execute();
+ }
+
+ public function testCreateSubAdmin() {
+ $subAdmin = new \OC\SubAdmin($this->userManager, $this->groupManager, $this->dbConn);
+ $this->assertTrue($subAdmin->createSubAdmin($this->users[0], $this->groups[0]));
+
+ // Look for subadmin in the database
+ $qb = $this->dbConn->getQueryBuilder();
+ $result = $qb->select(['gid', 'uid'])
+ ->from('group_admin')
+ ->where($qb->expr()->eq('gid', $qb->createNamedParameter($this->groups[0]->getGID())))
+ ->andWHere($qb->expr()->eq('uid', $qb->createNamedParameter($this->users[0]->getUID())))
+ ->execute()
+ ->fetch();
+ $this->assertEquals(
+ [
+ 'gid' => $this->groups[0]->getGID(),
+ 'uid' => $this->users[0]->getUID()
+ ], $result);
+
+ // Delete subadmin
+ $result = $qb->delete('*PREFIX*group_admin')
+ ->where($qb->expr()->eq('gid', $qb->createNamedParameter($this->groups[0]->getGID())))
+ ->andWHere($qb->expr()->eq('uid', $qb->createNamedParameter($this->users[0]->getUID())))
+ ->execute();
+ }
+
+ public function testDeleteSubAdmin() {
+ $subAdmin = new \OC\SubAdmin($this->userManager, $this->groupManager, $this->dbConn);
+ $this->assertTrue($subAdmin->createSubAdmin($this->users[0], $this->groups[0]));
+ $this->assertTrue($subAdmin->deleteSubAdmin($this->users[0], $this->groups[0]));
+
+ // DB query should be empty
+ $qb = $this->dbConn->getQueryBuilder();
+ $result = $qb->select(['gid', 'uid'])
+ ->from('group_admin')
+ ->where($qb->expr()->eq('gid', $qb->createNamedParameter($this->groups[0]->getGID())))
+ ->andWHere($qb->expr()->eq('uid', $qb->createNamedParameter($this->users[0]->getUID())))
+ ->execute()
+ ->fetch();
+ $this->assertEmpty($result);
+ }
+
+ public function testGetSubAdminsGroups() {
+ $subAdmin = new \OC\SubAdmin($this->userManager, $this->groupManager, $this->dbConn);
+ $this->assertTrue($subAdmin->createSubAdmin($this->users[0], $this->groups[0]));
+ $this->assertTrue($subAdmin->createSubAdmin($this->users[0], $this->groups[1]));
+
+ $result = $subAdmin->getSubAdminsGroups($this->users[0]);
+
+ $this->assertContains($this->groups[0], $result);
+ $this->assertContains($this->groups[1], $result);
+ $this->assertNotContains($this->groups[2], $result);
+ $this->assertNotContains(null, $result);
+
+ $this->assertTrue($subAdmin->deleteSubAdmin($this->users[0], $this->groups[0]));
+ $this->assertTrue($subAdmin->deleteSubAdmin($this->users[0], $this->groups[1]));
+ }
+
+ public function testGetGroupsSubAdmins() {
+ $subAdmin = new \OC\SubAdmin($this->userManager, $this->groupManager, $this->dbConn);
+ $this->assertTrue($subAdmin->createSubAdmin($this->users[0], $this->groups[0]));
+ $this->assertTrue($subAdmin->createSubAdmin($this->users[1], $this->groups[0]));
+
+ $result = $subAdmin->getGroupsSubAdmins($this->groups[0]);
+
+ $this->assertContains($this->users[0], $result);
+ $this->assertContains($this->users[1], $result);
+ $this->assertNotContains($this->users[2], $result);
+ $this->assertNotContains(null, $result);
+
+ $this->assertTrue($subAdmin->deleteSubAdmin($this->users[0], $this->groups[0]));
+ $this->assertTrue($subAdmin->deleteSubAdmin($this->users[1], $this->groups[0]));
+ }
+
+ public function testGetAllSubAdmin() {
+ $subAdmin = new \OC\SubAdmin($this->userManager, $this->groupManager, $this->dbConn);
+
+ $this->assertTrue($subAdmin->createSubAdmin($this->users[0], $this->groups[0]));
+ $this->assertTrue($subAdmin->createSubAdmin($this->users[1], $this->groups[1]));
+ $this->assertTrue($subAdmin->createSubAdmin($this->users[2], $this->groups[1]));
+
+ $result = $subAdmin->getAllSubAdmins();
+
+ $this->assertContains(['user' => $this->users[0], 'group' => $this->groups[0]], $result);
+ $this->assertContains(['user' => $this->users[1], 'group' => $this->groups[1]], $result);
+ $this->assertContains(['user' => $this->users[2], 'group' => $this->groups[1]], $result);
+ $this->assertNotContains(['user' => null, 'group' => null], $result);
+ }
+
+ public function testIsSubAdminofGroup() {
+ $subAdmin = new \OC\SubAdmin($this->userManager, $this->groupManager, $this->dbConn);
+ $this->assertTrue($subAdmin->createSubAdmin($this->users[0], $this->groups[0]));
+
+ $this->assertTrue($subAdmin->isSubAdminOfGroup($this->users[0], $this->groups[0]));
+ $this->assertFalse($subAdmin->isSubAdminOfGroup($this->users[0], $this->groups[1]));
+ $this->assertFalse($subAdmin->isSubAdminOfGroup($this->users[1], $this->groups[0]));
+
+ $this->assertTrue($subAdmin->deleteSubAdmin($this->users[0], $this->groups[0]));
+ }
+
+ public function testIsSubAdmin() {
+ $subAdmin = new \OC\SubAdmin($this->userManager, $this->groupManager, $this->dbConn);
+ $this->assertTrue($subAdmin->createSubAdmin($this->users[0], $this->groups[0]));
+
+ $this->assertTrue($subAdmin->isSubAdmin($this->users[0]));
+ $this->assertFalse($subAdmin->isSubAdmin($this->users[1]));
+
+ $this->assertTrue($subAdmin->deleteSubAdmin($this->users[0], $this->groups[0]));
+ }
+
+ public function testIsSubAdminAsAdmin() {
+ $subAdmin = new \OC\SubAdmin($this->userManager, $this->groupManager, $this->dbConn);
+ $this->groupManager->get('admin')->addUser($this->users[0]);
+
+ $this->assertTrue($subAdmin->isSubAdmin($this->users[0]));
+ }
+
+ public function testIsUserAccessible() {
+ $subAdmin = new \OC\SubAdmin($this->userManager, $this->groupManager, $this->dbConn);
+ $this->groups[0]->addUser($this->users[1]);
+ $this->groups[1]->addUser($this->users[1]);
+ $this->groups[1]->addUser($this->users[2]);
+ $this->assertTrue($subAdmin->createSubAdmin($this->users[0], $this->groups[0]));
+ $this->assertTrue($subAdmin->createSubAdmin($this->users[2], $this->groups[2]));
+
+ $this->assertTrue($subAdmin->isUserAccessible($this->users[0], $this->users[1]));
+ $this->assertFalse($subAdmin->isUserAccessible($this->users[0], $this->users[2]));
+ $this->assertFalse($subAdmin->isUserAccessible($this->users[2], $this->users[0]));
+
+ $this->assertTrue($subAdmin->deleteSubAdmin($this->users[0], $this->groups[0]));
+ $this->assertTrue($subAdmin->deleteSubAdmin($this->users[2], $this->groups[2]));
+ }
+
+ public function testIsUserAccessibleAsUser() {
+ $subAdmin = new \OC\SubAdmin($this->userManager, $this->groupManager, $this->dbConn);
+ $this->assertFalse($subAdmin->isUserAccessible($this->users[0], $this->users[1]));
+ }
+
+ public function testIsUserAccessibleAdmin() {
+ $subAdmin = new \OC\SubAdmin($this->userManager, $this->groupManager, $this->dbConn);
+ $this->assertTrue($subAdmin->createSubAdmin($this->users[0], $this->groups[0]));
+ $this->groupManager->get('admin')->addUser($this->users[1]);
+
+ $this->assertFalse($subAdmin->isUserAccessible($this->users[0], $this->users[1]));
+
+ }
+
+ public function testPostDeleteUser() {
+ $subAdmin = new \OC\SubAdmin($this->userManager, $this->groupManager, $this->dbConn);
+
+ $user = array_shift($this->users);
+ foreach($this->groups as $group) {
+ $this->assertTrue($subAdmin->createSubAdmin($user, $group));
+ }
+
+ $user->delete();
+ $this->assertEmpty($subAdmin->getAllSubAdmins());
+ }
+
+ public function testPostDeleteGroup() {
+ $subAdmin = new \OC\SubAdmin($this->userManager, $this->groupManager, $this->dbConn);
+
+ $group = array_shift($this->groups);
+ foreach($this->users as $user) {
+ $this->assertTrue($subAdmin->createSubAdmin($user, $group));
+ }
+
+ $group->delete();
+ $this->assertEmpty($subAdmin->getAllSubAdmins());
+ }
+
+ public function testHooks() {
+ $subAdmin = new \OC\SubAdmin($this->userManager, $this->groupManager, $this->dbConn);
+
+ $test = $this;
+ $u = $this->users[0];
+ $g = $this->groups[0];
+ $count = 0;
+
+ $subAdmin->listen('\OC\SubAdmin', 'postCreateSubAdmin', function ($user, $group) use ($test, $u, $g, &$count) {
+ $test->assertEquals($u->getUID(), $user->getUID());
+ $test->assertEquals($g->getGID(), $group->getGID());
+ $count++;
+ });
+
+ $subAdmin->listen('\OC\SubAdmin', 'postDeleteSubAdmin', function ($user, $group) use ($test, $u, $g, &$count) {
+ $test->assertEquals($u->getUID(), $user->getUID());
+ $test->assertEquals($g->getGID(), $group->getGID());
+ $count++;
+ });
+
+ $this->assertTrue($subAdmin->createSubAdmin($u, $g));
+ $this->assertEquals(1, $count);
+
+ $this->assertTrue($subAdmin->deleteSubAdmin($u, $g));
+ $this->assertEquals(2, $count);
+ }
+
+}