summaryrefslogtreecommitdiffstats
path: root/tests
diff options
context:
space:
mode:
authorVincent Petry <pvince81@owncloud.com>2016-05-23 20:50:25 +0200
committerVincent Petry <pvince81@owncloud.com>2016-05-23 20:50:25 +0200
commit4f6670d759c7840f774a69c42460107a8e1ebce4 (patch)
tree59ba8d9ef6a67697911d9a33e0ba6abff8877822 /tests
parent87fa86a69ae8df7aadcb882eb3a9a7f767e453a7 (diff)
parentc20cdc2213f99c6faa500e908b13fed8d0bbe5a1 (diff)
downloadnextcloud-server-4f6670d759c7840f774a69c42460107a8e1ebce4.tar.gz
nextcloud-server-4f6670d759c7840f774a69c42460107a8e1ebce4.zip
Merge pull request #24658 from owncloud/invalidate-disabled-user-session
invalidate user session if the user was disabled
Diffstat (limited to 'tests')
-rw-r--r--tests/lib/User/SessionTest.php47
1 files changed, 47 insertions, 0 deletions
diff --git a/tests/lib/User/SessionTest.php b/tests/lib/User/SessionTest.php
index 4438487e2a0..140c4321c51 100644
--- a/tests/lib/User/SessionTest.php
+++ b/tests/lib/User/SessionTest.php
@@ -509,4 +509,51 @@ class SessionTest extends \Test\TestCase {
$this->assertFalse($userSession->tryTokenLogin($request));
}
+ public function testValidateSessionDisabledUser() {
+ $userManager = $this->getMock('\OCP\IUserManager');
+ $session = $this->getMock('\OCP\ISession');
+ $timeFactory = $this->getMock('\OCP\AppFramework\Utility\ITimeFactory');
+ $tokenProvider = $this->getMock('\OC\Authentication\Token\IProvider');
+ $userSession = $this->getMockBuilder('\OC\User\Session')
+ ->setConstructorArgs([$userManager, $session, $timeFactory, $tokenProvider])
+ ->setMethods(['logout'])
+ ->getMock();
+
+ $user = $this->getMock('\OCP\IUser');
+ $token = $this->getMock('\OC\Authentication\Token\IToken');
+
+ $session->expects($this->once())
+ ->method('getId')
+ ->will($this->returnValue('sessionid'));
+ $tokenProvider->expects($this->once())
+ ->method('getToken')
+ ->with('sessionid')
+ ->will($this->returnValue($token));
+ $session->expects($this->once())
+ ->method('get')
+ ->with('last_login_check')
+ ->will($this->returnValue(1000));
+ $timeFactory->expects($this->once())
+ ->method('getTime')
+ ->will($this->returnValue(5000));
+ $tokenProvider->expects($this->once())
+ ->method('getPassword')
+ ->with($token, 'sessionid')
+ ->will($this->returnValue('123456'));
+ $user->expects($this->once())
+ ->method('getUID')
+ ->will($this->returnValue('user5'));
+ $userManager->expects($this->once())
+ ->method('checkPassword')
+ ->with('user5', '123456')
+ ->will($this->returnValue(true));
+ $user->expects($this->once())
+ ->method('isEnabled')
+ ->will($this->returnValue(false));
+ $userSession->expects($this->once())
+ ->method('logout');
+
+ $this->invokePrivate($userSession, 'validateSession', [$user]);
+ }
+
}