aboutsummaryrefslogtreecommitdiffstats
path: root/tests/lib/Share20
diff options
context:
space:
mode:
Diffstat (limited to 'tests/lib/Share20')
-rw-r--r--tests/lib/Share20/DefaultShareProviderTest.php3114
-rw-r--r--tests/lib/Share20/LegacyHooksTest.php363
-rw-r--r--tests/lib/Share20/ManagerTest.php4936
-rw-r--r--tests/lib/Share20/ShareByMailProviderTest.php296
-rw-r--r--tests/lib/Share20/ShareHelperTest.php213
-rw-r--r--tests/lib/Share20/ShareTest.php88
6 files changed, 9010 insertions, 0 deletions
diff --git a/tests/lib/Share20/DefaultShareProviderTest.php b/tests/lib/Share20/DefaultShareProviderTest.php
new file mode 100644
index 00000000000..bacf2b61ee3
--- /dev/null
+++ b/tests/lib/Share20/DefaultShareProviderTest.php
@@ -0,0 +1,3114 @@
+<?php
+
+/**
+ * SPDX-FileCopyrightText: 2016-2024 Nextcloud GmbH and Nextcloud contributors
+ * SPDX-FileCopyrightText: 2016 ownCloud, Inc.
+ * SPDX-License-Identifier: AGPL-3.0-only
+ */
+
+namespace Test\Share20;
+
+use OC\Files\Node\Node;
+use OC\Share20\DefaultShareProvider;
+use OC\Share20\Exception\ProviderException;
+use OC\Share20\Share;
+use OC\Share20\ShareAttributes;
+use OCP\AppFramework\Utility\ITimeFactory;
+use OCP\Constants;
+use OCP\DB\QueryBuilder\IQueryBuilder;
+use OCP\Defaults;
+use OCP\Files\File;
+use OCP\Files\Folder;
+use OCP\Files\IRootFolder;
+use OCP\IConfig;
+use OCP\IDBConnection;
+use OCP\IGroup;
+use OCP\IGroupManager;
+use OCP\IL10N;
+use OCP\IURLGenerator;
+use OCP\IUser;
+use OCP\IUserManager;
+use OCP\L10N\IFactory;
+use OCP\Mail\IMailer;
+use OCP\Server;
+use OCP\Share\Exceptions\ShareNotFound;
+use OCP\Share\IManager as IShareManager;
+use OCP\Share\IShare;
+use PHPUnit\Framework\MockObject\MockObject;
+use Psr\Log\LoggerInterface;
+
+/**
+ * Class DefaultShareProviderTest
+ *
+ * @package Test\Share20
+ * @group DB
+ */
+class DefaultShareProviderTest extends \Test\TestCase {
+ /** @var IDBConnection */
+ protected $dbConn;
+
+ /** @var IUserManager | MockObject */
+ protected $userManager;
+
+ /** @var IGroupManager | MockObject */
+ protected $groupManager;
+
+ /** @var IRootFolder | MockObject */
+ protected $rootFolder;
+
+ /** @var DefaultShareProvider */
+ protected $provider;
+
+ /** @var MockObject|IMailer */
+ protected $mailer;
+
+ /** @var IFactory|MockObject */
+ protected $l10nFactory;
+
+ /** @var MockObject|IL10N */
+ protected $l10n;
+
+ /** @var MockObject|Defaults */
+ protected $defaults;
+
+ /** @var MockObject|IURLGenerator */
+ protected $urlGenerator;
+
+ /** @var ITimeFactory|MockObject */
+ protected $timeFactory;
+
+ /** @var LoggerInterface|MockObject */
+ protected $logger;
+
+ protected IConfig&MockObject $config;
+
+ protected IShareManager&MockObject $shareManager;
+
+ protected function setUp(): void {
+ $this->dbConn = Server::get(IDBConnection::class);
+ $this->userManager = $this->createMock(IUserManager::class);
+ $this->groupManager = $this->createMock(IGroupManager::class);
+ $this->rootFolder = $this->createMock(IRootFolder::class);
+ $this->mailer = $this->createMock(IMailer::class);
+ $this->l10nFactory = $this->createMock(IFactory::class);
+ $this->l10n = $this->createMock(IL10N::class);
+ $this->defaults = $this->getMockBuilder(Defaults::class)->disableOriginalConstructor()->getMock();
+ $this->urlGenerator = $this->createMock(IURLGenerator::class);
+ $this->timeFactory = $this->createMock(ITimeFactory::class);
+ $this->logger = $this->createMock(LoggerInterface::class);
+ $this->shareManager = $this->createMock(IShareManager::class);
+ $this->config = $this->createMock(IConfig::class);
+
+ $this->userManager->expects($this->any())->method('userExists')->willReturn(true);
+ $this->timeFactory->expects($this->any())->method('now')->willReturn(new \DateTimeImmutable('2023-05-04 00:00 Europe/Berlin'));
+
+ //Empty share table
+ $this->dbConn->getQueryBuilder()->delete('share')->execute();
+
+ $this->provider = new DefaultShareProvider(
+ $this->dbConn,
+ $this->userManager,
+ $this->groupManager,
+ $this->rootFolder,
+ $this->mailer,
+ $this->defaults,
+ $this->l10nFactory,
+ $this->urlGenerator,
+ $this->timeFactory,
+ $this->logger,
+ $this->shareManager,
+ $this->config,
+ );
+ }
+
+ protected function tearDown(): void {
+ $this->dbConn->getQueryBuilder()->delete('share')->execute();
+ $this->dbConn->getQueryBuilder()->delete('filecache')->runAcrossAllShards()->execute();
+ $this->dbConn->getQueryBuilder()->delete('storages')->execute();
+ }
+
+ /**
+ * @param int $shareType
+ * @param string $sharedWith
+ * @param string $sharedBy
+ * @param string $shareOwner
+ * @param string $itemType
+ * @param int $fileSource
+ * @param string $fileTarget
+ * @param int $permissions
+ * @param $token
+ * @param $expiration
+ * @return int
+ */
+ private function addShareToDB($shareType, $sharedWith, $sharedBy, $shareOwner,
+ $itemType, $fileSource, $fileTarget, $permissions, $token, $expiration,
+ $parent = null) {
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share');
+
+ if ($shareType) {
+ $qb->setValue('share_type', $qb->expr()->literal($shareType));
+ }
+ if ($sharedWith) {
+ $qb->setValue('share_with', $qb->expr()->literal($sharedWith));
+ }
+ if ($sharedBy) {
+ $qb->setValue('uid_initiator', $qb->expr()->literal($sharedBy));
+ }
+ if ($shareOwner) {
+ $qb->setValue('uid_owner', $qb->expr()->literal($shareOwner));
+ }
+ if ($itemType) {
+ $qb->setValue('item_type', $qb->expr()->literal($itemType));
+ }
+ if ($fileSource) {
+ $qb->setValue('file_source', $qb->expr()->literal($fileSource));
+ }
+ if ($fileTarget) {
+ $qb->setValue('file_target', $qb->expr()->literal($fileTarget));
+ }
+ if ($permissions) {
+ $qb->setValue('permissions', $qb->expr()->literal($permissions));
+ }
+ if ($token) {
+ $qb->setValue('token', $qb->expr()->literal($token));
+ }
+ if ($expiration) {
+ $qb->setValue('expiration', $qb->createNamedParameter($expiration, IQueryBuilder::PARAM_DATETIME_MUTABLE));
+ }
+ if ($parent) {
+ $qb->setValue('parent', $qb->expr()->literal($parent));
+ }
+
+ $this->assertEquals(1, $qb->execute());
+ return$qb->getLastInsertId();
+ }
+
+
+
+
+ public function testGetShareByIdNotExist(): void {
+ $this->expectException(ShareNotFound::class);
+
+ $this->provider->getShareById(1);
+ }
+
+ public function testGetShareByIdUserShare(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ ]);
+ $qb->execute();
+
+ $id = $qb->getLastInsertId();
+
+ $sharedBy = $this->createMock(IUser::class);
+ $sharedBy->method('getUID')->willReturn('sharedBy');
+ $shareOwner = $this->createMock(IUser::class);
+ $shareOwner->method('getUID')->willReturn('shareOwner');
+
+ $ownerPath = $this->createMock(File::class);
+ $shareOwnerFolder = $this->createMock(Folder::class);
+ $shareOwnerFolder->method('getFirstNodeById')->with(42)->willReturn($ownerPath);
+
+ $this->rootFolder
+ ->method('getUserFolder')
+ ->willReturnMap([
+ ['shareOwner', $shareOwnerFolder],
+ ]);
+
+ $share = $this->provider->getShareById($id);
+
+ $this->assertEquals($id, $share->getId());
+ $this->assertEquals(IShare::TYPE_USER, $share->getShareType());
+ $this->assertEquals('sharedWith', $share->getSharedWith());
+ $this->assertEquals('sharedBy', $share->getSharedBy());
+ $this->assertEquals('shareOwner', $share->getShareOwner());
+ $this->assertEquals($ownerPath, $share->getNode());
+ $this->assertEquals(13, $share->getPermissions());
+ $this->assertEquals(null, $share->getToken());
+ $this->assertEquals(null, $share->getExpirationDate());
+ $this->assertEquals('myTarget', $share->getTarget());
+ }
+
+ public function testGetShareByIdLazy(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ ]);
+ $qb->execute();
+
+ $id = $qb->getLastInsertId();
+
+ $this->rootFolder->expects($this->never())->method('getUserFolder');
+
+ $share = $this->provider->getShareById($id);
+
+ // We do not fetch the node so the rootfolder is never called.
+
+ $this->assertEquals($id, $share->getId());
+ $this->assertEquals(IShare::TYPE_USER, $share->getShareType());
+ $this->assertEquals('sharedWith', $share->getSharedWith());
+ $this->assertEquals('sharedBy', $share->getSharedBy());
+ $this->assertEquals('shareOwner', $share->getShareOwner());
+ $this->assertEquals(13, $share->getPermissions());
+ $this->assertEquals(null, $share->getToken());
+ $this->assertEquals(null, $share->getExpirationDate());
+ $this->assertEquals('myTarget', $share->getTarget());
+ }
+
+ public function testGetShareByIdLazy2(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ ]);
+ $qb->execute();
+
+ $id = $qb->getLastInsertId();
+
+ $ownerPath = $this->createMock(File::class);
+
+ $shareOwnerFolder = $this->createMock(Folder::class);
+ $shareOwnerFolder->method('getFirstNodeById')->with(42)->willReturn($ownerPath);
+
+ $this->rootFolder
+ ->method('getUserFolder')
+ ->with('shareOwner')
+ ->willReturn($shareOwnerFolder);
+
+ $share = $this->provider->getShareById($id);
+
+ // We fetch the node so the root folder is eventually called
+
+ $this->assertEquals($id, $share->getId());
+ $this->assertEquals(IShare::TYPE_USER, $share->getShareType());
+ $this->assertEquals('sharedWith', $share->getSharedWith());
+ $this->assertEquals('sharedBy', $share->getSharedBy());
+ $this->assertEquals('shareOwner', $share->getShareOwner());
+ $this->assertEquals($ownerPath, $share->getNode());
+ $this->assertEquals(13, $share->getPermissions());
+ $this->assertEquals(null, $share->getToken());
+ $this->assertEquals(null, $share->getExpirationDate());
+ $this->assertEquals('myTarget', $share->getTarget());
+ }
+
+ public function testGetShareByIdGroupShare(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_GROUP),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+
+ // Get the id
+ $id = $qb->getLastInsertId();
+
+ $ownerPath = $this->createMock(Folder::class);
+ $shareOwnerFolder = $this->createMock(Folder::class);
+ $shareOwnerFolder->method('getFirstNodeById')->with(42)->willReturn($ownerPath);
+
+ $this->rootFolder
+ ->method('getUserFolder')
+ ->willReturnMap([
+ ['shareOwner', $shareOwnerFolder],
+ ]);
+
+ $share = $this->provider->getShareById($id);
+
+ $this->assertEquals($id, $share->getId());
+ $this->assertEquals(IShare::TYPE_GROUP, $share->getShareType());
+ $this->assertEquals('sharedWith', $share->getSharedWith());
+ $this->assertEquals('sharedBy', $share->getSharedBy());
+ $this->assertEquals('shareOwner', $share->getShareOwner());
+ $this->assertEquals($ownerPath, $share->getNode());
+ $this->assertEquals(13, $share->getPermissions());
+ $this->assertEquals(null, $share->getToken());
+ $this->assertEquals(null, $share->getExpirationDate());
+ $this->assertEquals('myTarget', $share->getTarget());
+ }
+
+ public function testGetShareByIdUserGroupShare(): void {
+ $id = $this->addShareToDB(IShare::TYPE_GROUP, 'group0', 'user0', 'user0', 'file', 42, 'myTarget', 31, null, null);
+ $this->addShareToDB(2, 'user1', 'user0', 'user0', 'file', 42, 'userTarget', 0, null, null, $id);
+
+ $user0 = $this->createMock(IUser::class);
+ $user0->method('getUID')->willReturn('user0');
+ $user1 = $this->createMock(IUser::class);
+ $user1->method('getUID')->willReturn('user1');
+
+ $group0 = $this->createMock(IGroup::class);
+ $group0->method('inGroup')->with($user1)->willReturn(true);
+ $group0->method('getDisplayName')->willReturn('g0-displayname');
+
+ $node = $this->createMock(Folder::class);
+ $node->method('getId')->willReturn(42);
+ $node->method('getName')->willReturn('myTarget');
+
+ $this->rootFolder->method('getUserFolder')->with('user0')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->willReturn($node);
+
+ $this->userManager->method('get')->willReturnMap([
+ ['user0', $user0],
+ ['user1', $user1],
+ ]);
+ $this->groupManager->method('get')->with('group0')->willReturn($group0);
+
+ $share = $this->provider->getShareById($id, 'user1');
+
+ $this->assertEquals($id, $share->getId());
+ $this->assertEquals(IShare::TYPE_GROUP, $share->getShareType());
+ $this->assertSame('group0', $share->getSharedWith());
+ $this->assertSame('user0', $share->getSharedBy());
+ $this->assertSame('user0', $share->getShareOwner());
+ $this->assertSame($node, $share->getNode());
+ $this->assertEquals(0, $share->getPermissions());
+ $this->assertEquals(null, $share->getToken());
+ $this->assertEquals(null, $share->getExpirationDate());
+ $this->assertEquals('userTarget', $share->getTarget());
+ }
+
+ public function testGetShareByIdLinkShare(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_LINK),
+ 'password' => $qb->expr()->literal('password'),
+ 'password_by_talk' => $qb->expr()->literal(true),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ 'token' => $qb->expr()->literal('token'),
+ 'expiration' => $qb->expr()->literal('2000-01-02 00:00:00'),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+
+ $id = $qb->getLastInsertId();
+
+ $ownerPath = $this->createMock(Folder::class);
+ $shareOwnerFolder = $this->createMock(Folder::class);
+ $shareOwnerFolder->method('getFirstNodeById')->with(42)->willReturn($ownerPath);
+
+ $this->rootFolder
+ ->method('getUserFolder')
+ ->willReturnMap([
+ ['shareOwner', $shareOwnerFolder],
+ ]);
+
+ $share = $this->provider->getShareById($id);
+
+ $this->assertEquals($id, $share->getId());
+ $this->assertEquals(IShare::TYPE_LINK, $share->getShareType());
+ $this->assertNull($share->getSharedWith());
+ $this->assertEquals('password', $share->getPassword());
+ $this->assertEquals(true, $share->getSendPasswordByTalk());
+ $this->assertEquals('sharedBy', $share->getSharedBy());
+ $this->assertEquals('shareOwner', $share->getShareOwner());
+ $this->assertEquals($ownerPath, $share->getNode());
+ $this->assertEquals(13, $share->getPermissions());
+ $this->assertEquals('token', $share->getToken());
+ $this->assertEquals(\DateTime::createFromFormat('Y-m-d H:i:s', '2000-01-02 00:00:00'), $share->getExpirationDate());
+ $this->assertEquals('myTarget', $share->getTarget());
+ }
+
+ public function testDeleteSingleShare(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+
+ $id = $qb->getLastInsertId();
+
+ $share = $this->createMock(IShare::class);
+ $share->method('getId')->willReturn($id);
+
+ /** @var DefaultShareProvider $provider */
+ $provider = $this->getMockBuilder(DefaultShareProvider::class)
+ ->setConstructorArgs([
+ $this->dbConn,
+ $this->userManager,
+ $this->groupManager,
+ $this->rootFolder,
+ $this->mailer,
+ $this->defaults,
+ $this->l10nFactory,
+ $this->urlGenerator,
+ $this->timeFactory,
+ $this->logger,
+ $this->shareManager,
+ $this->config,
+ ])
+ ->onlyMethods(['getShareById'])
+ ->getMock();
+
+ $provider->delete($share);
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->select('*')
+ ->from('share');
+
+ $cursor = $qb->execute();
+ $result = $cursor->fetchAll();
+ $cursor->closeCursor();
+
+ $this->assertEmpty($result);
+ }
+
+ public function testDeleteSingleShareLazy(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+
+ $id = $qb->getLastInsertId();
+
+ $this->rootFolder->expects($this->never())->method($this->anything());
+
+ $share = $this->provider->getShareById($id);
+ $this->provider->delete($share);
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->select('*')
+ ->from('share');
+
+ $cursor = $qb->execute();
+ $result = $cursor->fetchAll();
+ $cursor->closeCursor();
+
+ $this->assertEmpty($result);
+ }
+
+ public function testDeleteGroupShareWithUserGroupShares(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_GROUP),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+ $id = $qb->getLastInsertId();
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(2),
+ 'share_with' => $qb->expr()->literal('sharedWithUser'),
+ 'uid_owner' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ 'parent' => $qb->expr()->literal($id),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+
+ $share = $this->createMock(IShare::class);
+ $share->method('getId')->willReturn($id);
+ $share->method('getShareType')->willReturn(IShare::TYPE_GROUP);
+
+ /** @var DefaultShareProvider $provider */
+ $provider = $this->getMockBuilder(DefaultShareProvider::class)
+ ->setConstructorArgs([
+ $this->dbConn,
+ $this->userManager,
+ $this->groupManager,
+ $this->rootFolder,
+ $this->mailer,
+ $this->defaults,
+ $this->l10nFactory,
+ $this->urlGenerator,
+ $this->timeFactory,
+ $this->logger,
+ $this->shareManager,
+ $this->config,
+ ])
+ ->onlyMethods(['getShareById'])
+ ->getMock();
+
+ $provider->delete($share);
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->select('*')
+ ->from('share');
+
+ $cursor = $qb->execute();
+ $result = $cursor->fetchAll();
+ $cursor->closeCursor();
+
+ $this->assertEmpty($result);
+ }
+
+ public function testGetChildren(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ ]);
+ $qb->execute();
+
+ // Get the id
+ $id = $qb->getLastInsertId();
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('user1'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('user2'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(1),
+ 'file_target' => $qb->expr()->literal('myTarget1'),
+ 'permissions' => $qb->expr()->literal(2),
+ 'parent' => $qb->expr()->literal($id),
+ ]);
+ $qb->execute();
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_GROUP),
+ 'share_with' => $qb->expr()->literal('group1'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('user3'),
+ 'item_type' => $qb->expr()->literal('folder'),
+ 'file_source' => $qb->expr()->literal(3),
+ 'file_target' => $qb->expr()->literal('myTarget2'),
+ 'permissions' => $qb->expr()->literal(4),
+ 'parent' => $qb->expr()->literal($id),
+ ]);
+ $qb->execute();
+
+ $ownerPath = $this->createMock(Folder::class);
+ $ownerFolder = $this->createMock(Folder::class);
+ $ownerFolder->method('getFirstNodeById')->willReturn($ownerPath);
+
+ $this->rootFolder
+ ->method('getUserFolder')
+ ->willReturnMap([
+ ['shareOwner', $ownerFolder],
+ ]);
+
+ $share = $this->createMock(IShare::class);
+ $share->method('getId')->willReturn($id);
+
+ $children = $this->provider->getChildren($share);
+
+ $this->assertCount(2, $children);
+
+ //Child1
+ $this->assertEquals(IShare::TYPE_USER, $children[0]->getShareType());
+ $this->assertEquals('user1', $children[0]->getSharedWith());
+ $this->assertEquals('user2', $children[0]->getSharedBy());
+ $this->assertEquals('shareOwner', $children[0]->getShareOwner());
+ $this->assertEquals($ownerPath, $children[0]->getNode());
+ $this->assertEquals(2, $children[0]->getPermissions());
+ $this->assertEquals(null, $children[0]->getToken());
+ $this->assertEquals(null, $children[0]->getExpirationDate());
+ $this->assertEquals('myTarget1', $children[0]->getTarget());
+
+ //Child2
+ $this->assertEquals(IShare::TYPE_GROUP, $children[1]->getShareType());
+ $this->assertEquals('group1', $children[1]->getSharedWith());
+ $this->assertEquals('user3', $children[1]->getSharedBy());
+ $this->assertEquals('shareOwner', $children[1]->getShareOwner());
+ $this->assertEquals($ownerPath, $children[1]->getNode());
+ $this->assertEquals(4, $children[1]->getPermissions());
+ $this->assertEquals(null, $children[1]->getToken());
+ $this->assertEquals(null, $children[1]->getExpirationDate());
+ $this->assertEquals('myTarget2', $children[1]->getTarget());
+ }
+
+ public function testCreateUserShare(): void {
+ $share = new Share($this->rootFolder, $this->userManager);
+
+ $shareOwner = $this->createMock(IUser::class);
+ $shareOwner->method('getUID')->willReturn('shareOwner');
+
+ $path = $this->createMock(File::class);
+ $path->method('getId')->willReturn(100);
+ $path->method('getOwner')->willReturn($shareOwner);
+
+ $ownerFolder = $this->createMock(Folder::class);
+ $userFolder = $this->createMock(Folder::class);
+ $this->rootFolder
+ ->method('getUserFolder')
+ ->willReturnMap([
+ ['sharedBy', $userFolder],
+ ['shareOwner', $ownerFolder],
+ ]);
+
+ $userFolder->method('getFirstNodeById')
+ ->with(100)
+ ->willReturn($path);
+ $ownerFolder->method('getFirstNodeById')
+ ->with(100)
+ ->willReturn($path);
+
+ $share->setShareType(IShare::TYPE_USER);
+ $share->setSharedWith('sharedWith');
+ $share->setSharedBy('sharedBy');
+ $share->setShareOwner('shareOwner');
+ $share->setNode($path);
+ $share->setSharedWithDisplayName('Displayed Name');
+ $share->setSharedWithAvatar('/path/to/image.svg');
+ $share->setPermissions(1);
+
+ $attrs = new ShareAttributes();
+ $attrs->setAttribute('permissions', 'download', true);
+ $share->setAttributes($attrs);
+
+ $share->setTarget('/target');
+
+ $share2 = $this->provider->create($share);
+
+ $this->assertNotNull($share2->getId());
+ $this->assertSame('ocinternal:' . $share2->getId(), $share2->getFullId());
+ $this->assertSame(IShare::TYPE_USER, $share2->getShareType());
+ $this->assertSame('sharedWith', $share2->getSharedWith());
+ $this->assertSame('sharedBy', $share2->getSharedBy());
+ $this->assertSame('shareOwner', $share2->getShareOwner());
+ $this->assertSame(1, $share2->getPermissions());
+ $this->assertSame('/target', $share2->getTarget());
+ $this->assertLessThanOrEqual(new \DateTime(), $share2->getShareTime());
+ $this->assertSame($path, $share2->getNode());
+
+ // Data is kept after creation
+ $this->assertSame('Displayed Name', $share->getSharedWithDisplayName());
+ $this->assertSame('/path/to/image.svg', $share->getSharedWithAvatar());
+ $this->assertSame('Displayed Name', $share2->getSharedWithDisplayName());
+ $this->assertSame('/path/to/image.svg', $share2->getSharedWithAvatar());
+
+ $this->assertSame(
+ [
+ [
+ 'scope' => 'permissions',
+ 'key' => 'download',
+ 'value' => true
+ ]
+ ],
+ $share->getAttributes()->toArray()
+ );
+ }
+
+ public function testCreateGroupShare(): void {
+ $share = new Share($this->rootFolder, $this->userManager);
+
+ $shareOwner = $this->createMock(IUser::class);
+ $shareOwner->method('getUID')->willReturn('shareOwner');
+
+ $path = $this->createMock(Folder::class);
+ $path->method('getId')->willReturn(100);
+ $path->method('getOwner')->willReturn($shareOwner);
+
+ $ownerFolder = $this->createMock(Folder::class);
+ $userFolder = $this->createMock(Folder::class);
+ $this->rootFolder
+ ->method('getUserFolder')
+ ->willReturnMap([
+ ['sharedBy', $userFolder],
+ ['shareOwner', $ownerFolder],
+ ]);
+
+ $userFolder->method('getFirstNodeById')
+ ->with(100)
+ ->willReturn($path);
+ $ownerFolder->method('getFirstNodeById')
+ ->with(100)
+ ->willReturn($path);
+
+ $share->setShareType(IShare::TYPE_GROUP);
+ $share->setSharedWith('sharedWith');
+ $share->setSharedBy('sharedBy');
+ $share->setShareOwner('shareOwner');
+ $share->setNode($path);
+ $share->setPermissions(1);
+ $share->setSharedWithDisplayName('Displayed Name');
+ $share->setSharedWithAvatar('/path/to/image.svg');
+ $share->setTarget('/target');
+ $attrs = new ShareAttributes();
+ $attrs->setAttribute('permissions', 'download', true);
+ $share->setAttributes($attrs);
+
+ $share2 = $this->provider->create($share);
+
+ $this->assertNotNull($share2->getId());
+ $this->assertSame('ocinternal:' . $share2->getId(), $share2->getFullId());
+ $this->assertSame(IShare::TYPE_GROUP, $share2->getShareType());
+ $this->assertSame('sharedWith', $share2->getSharedWith());
+ $this->assertSame('sharedBy', $share2->getSharedBy());
+ $this->assertSame('shareOwner', $share2->getShareOwner());
+ $this->assertSame(1, $share2->getPermissions());
+ $this->assertSame('/target', $share2->getTarget());
+ $this->assertLessThanOrEqual(new \DateTime(), $share2->getShareTime());
+ $this->assertSame($path, $share2->getNode());
+
+ // Data is kept after creation
+ $this->assertSame('Displayed Name', $share->getSharedWithDisplayName());
+ $this->assertSame('/path/to/image.svg', $share->getSharedWithAvatar());
+ $this->assertSame('Displayed Name', $share2->getSharedWithDisplayName());
+ $this->assertSame('/path/to/image.svg', $share2->getSharedWithAvatar());
+
+ $this->assertSame(
+ [
+ [
+ 'scope' => 'permissions',
+ 'key' => 'download',
+ 'value' => true
+ ]
+ ],
+ $share->getAttributes()->toArray()
+ );
+ }
+
+ public function testCreateLinkShare(): void {
+ $share = new Share($this->rootFolder, $this->userManager);
+
+ $shareOwner = $this->createMock(IUser::class);
+ $shareOwner->method('getUID')->willReturn('shareOwner');
+
+ $path = $this->createMock(Folder::class);
+ $path->method('getId')->willReturn(100);
+ $path->method('getOwner')->willReturn($shareOwner);
+
+ $ownerFolder = $this->createMock(Folder::class);
+ $userFolder = $this->createMock(Folder::class);
+ $this->rootFolder
+ ->method('getUserFolder')
+ ->willReturnMap([
+ ['sharedBy', $userFolder],
+ ['shareOwner', $ownerFolder],
+ ]);
+
+ $userFolder->method('getFirstNodeById')
+ ->with(100)
+ ->willReturn($path);
+ $ownerFolder->method('getFirstNodeById')
+ ->with(100)
+ ->willReturn($path);
+
+ $share->setShareType(IShare::TYPE_LINK);
+ $share->setSharedBy('sharedBy');
+ $share->setShareOwner('shareOwner');
+ $share->setNode($path);
+ $share->setPermissions(1);
+ $share->setPassword('password');
+ $share->setSendPasswordByTalk(true);
+ $share->setToken('token');
+ $expireDate = new \DateTime();
+ $share->setExpirationDate($expireDate);
+ $share->setTarget('/target');
+
+ $share2 = $this->provider->create($share);
+
+ $this->assertNotNull($share2->getId());
+ $this->assertSame('ocinternal:' . $share2->getId(), $share2->getFullId());
+ $this->assertSame(IShare::TYPE_LINK, $share2->getShareType());
+ $this->assertSame('sharedBy', $share2->getSharedBy());
+ $this->assertSame('shareOwner', $share2->getShareOwner());
+ $this->assertSame(1, $share2->getPermissions());
+ $this->assertSame('/target', $share2->getTarget());
+ $this->assertLessThanOrEqual(new \DateTime(), $share2->getShareTime());
+ $this->assertSame($path, $share2->getNode());
+ $this->assertSame('password', $share2->getPassword());
+ $this->assertSame(true, $share2->getSendPasswordByTalk());
+ $this->assertSame('token', $share2->getToken());
+ $this->assertEquals($expireDate->getTimestamp(), $share2->getExpirationDate()->getTimestamp());
+ }
+
+ public function testGetShareByToken(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_LINK),
+ 'password' => $qb->expr()->literal('password'),
+ 'password_by_talk' => $qb->expr()->literal(true),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ 'token' => $qb->expr()->literal('secrettoken'),
+ 'label' => $qb->expr()->literal('the label'),
+ ]);
+ $qb->execute();
+ $id = $qb->getLastInsertId();
+
+ $file = $this->createMock(File::class);
+
+ $this->rootFolder->method('getUserFolder')->with('shareOwner')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with(42)->willReturn($file);
+
+ $share = $this->provider->getShareByToken('secrettoken');
+ $this->assertEquals($id, $share->getId());
+ $this->assertSame('shareOwner', $share->getShareOwner());
+ $this->assertSame('sharedBy', $share->getSharedBy());
+ $this->assertSame('secrettoken', $share->getToken());
+ $this->assertSame('password', $share->getPassword());
+ $this->assertSame('the label', $share->getLabel());
+ $this->assertSame(true, $share->getSendPasswordByTalk());
+ $this->assertSame(null, $share->getSharedWith());
+ }
+
+ /**
+ * Assert that if no label is provided the label is correctly,
+ * as types on IShare, a string and not null
+ */
+ public function testGetShareByTokenNullLabel(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_LINK),
+ 'password' => $qb->expr()->literal('password'),
+ 'password_by_talk' => $qb->expr()->literal(true),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ 'token' => $qb->expr()->literal('secrettoken'),
+ ]);
+ $qb->executeStatement();
+ $id = $qb->getLastInsertId();
+
+ $file = $this->createMock(File::class);
+
+ $this->rootFolder->method('getUserFolder')->with('shareOwner')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with(42)->willReturn($file);
+
+ $share = $this->provider->getShareByToken('secrettoken');
+ $this->assertEquals($id, $share->getId());
+ $this->assertSame('', $share->getLabel());
+ }
+
+ public function testGetShareByTokenNotFound(): void {
+ $this->expectException(ShareNotFound::class);
+
+ $this->provider->getShareByToken('invalidtoken');
+ }
+
+ private function createTestStorageEntry($storageStringId) {
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('storages')
+ ->values([
+ 'id' => $qb->expr()->literal($storageStringId),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+ return $qb->getLastInsertId();
+ }
+
+ private function createTestFileEntry($path, $storage = 1) {
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('filecache')
+ ->values([
+ 'storage' => $qb->createNamedParameter($storage, IQueryBuilder::PARAM_INT),
+ 'path' => $qb->createNamedParameter($path),
+ 'path_hash' => $qb->createNamedParameter(md5($path)),
+ 'name' => $qb->createNamedParameter(basename($path)),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+ return $qb->getLastInsertId();
+ }
+
+ public static function storageAndFileNameProvider(): array {
+ return [
+ // regular file on regular storage
+ ['home::shareOwner', 'files/test.txt', 'files/test2.txt'],
+ // regular file on external storage
+ ['smb::whatever', 'files/test.txt', 'files/test2.txt'],
+ // regular file on external storage in trashbin-like folder,
+ ['smb::whatever', 'files_trashbin/files/test.txt', 'files_trashbin/files/test2.txt'],
+ ];
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('storageAndFileNameProvider')]
+ public function testGetSharedWithUser($storageStringId, $fileName1, $fileName2): void {
+ $storageId = $this->createTestStorageEntry($storageStringId);
+ $fileId = $this->createTestFileEntry($fileName1, $storageId);
+ $fileId2 = $this->createTestFileEntry($fileName2, $storageId);
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal($fileId),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+ $id = $qb->getLastInsertId();
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('sharedWith2'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner2'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy2'),
+ 'item_type' => $qb->expr()->literal('file2'),
+ 'file_source' => $qb->expr()->literal($fileId2),
+ 'file_target' => $qb->expr()->literal('myTarget2'),
+ 'permissions' => $qb->expr()->literal(14),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+
+ $file = $this->createMock(File::class);
+ $this->rootFolder->method('getUserFolder')->with('shareOwner')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with($fileId)->willReturn($file);
+
+ $share = $this->provider->getSharedWith('sharedWith', IShare::TYPE_USER, null, 1, 0);
+ $this->assertCount(1, $share);
+
+ $share = $share[0];
+ $this->assertEquals($id, $share->getId());
+ $this->assertEquals('sharedWith', $share->getSharedWith());
+ $this->assertEquals('shareOwner', $share->getShareOwner());
+ $this->assertEquals('sharedBy', $share->getSharedBy());
+ $this->assertEquals(IShare::TYPE_USER, $share->getShareType());
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('storageAndFileNameProvider')]
+ public function testGetSharedWithGroup($storageStringId, $fileName1, $fileName2): void {
+ $storageId = $this->createTestStorageEntry($storageStringId);
+ $fileId = $this->createTestFileEntry($fileName1, $storageId);
+ $fileId2 = $this->createTestFileEntry($fileName2, $storageId);
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_GROUP),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner2'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy2'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal($fileId2),
+ 'file_target' => $qb->expr()->literal('myTarget2'),
+ 'permissions' => $qb->expr()->literal(14),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_GROUP),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal($fileId),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+ $id = $qb->getLastInsertId();
+
+ $groups = [];
+ foreach (range(0, 100) as $i) {
+ $groups[] = 'group' . $i;
+ }
+
+ $groups[] = 'sharedWith';
+
+ $user = $this->createMock(IUser::class);
+ $user->method('getUID')->willReturn('sharedWith');
+ $owner = $this->createMock(IUser::class);
+ $owner->method('getUID')->willReturn('shareOwner');
+ $initiator = $this->createMock(IUser::class);
+ $initiator->method('getUID')->willReturn('sharedBy');
+
+ $this->userManager->method('get')->willReturnMap([
+ ['sharedWith', $user],
+ ['shareOwner', $owner],
+ ['sharedBy', $initiator],
+ ]);
+ $this->groupManager
+ ->method('getUserGroupIds')
+ ->willReturnCallback(fn (IUser $user) => ($user->getUID() === 'sharedWith' ? $groups : []));
+
+ $file = $this->createMock(File::class);
+ $this->rootFolder->method('getUserFolder')->with('shareOwner')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with($fileId)->willReturn($file);
+
+ $share = $this->provider->getSharedWith('sharedWith', IShare::TYPE_GROUP, null, 20, 1);
+ $this->assertCount(1, $share);
+
+ $share = $share[0];
+ $this->assertEquals($id, $share->getId());
+ $this->assertEquals('sharedWith', $share->getSharedWith());
+ $this->assertEquals('shareOwner', $share->getShareOwner());
+ $this->assertEquals('sharedBy', $share->getSharedBy());
+ $this->assertEquals(IShare::TYPE_GROUP, $share->getShareType());
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('storageAndFileNameProvider')]
+ public function testGetSharedWithGroupUserModified($storageStringId, $fileName1, $fileName2): void {
+ $storageId = $this->createTestStorageEntry($storageStringId);
+ $fileId = $this->createTestFileEntry($fileName1, $storageId);
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_GROUP),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal($fileId),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+ $id = $qb->getLastInsertId();
+
+ /*
+ * Wrong share. Should not be taken by code.
+ */
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(2),
+ 'share_with' => $qb->expr()->literal('user2'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal($fileId),
+ 'file_target' => $qb->expr()->literal('wrongTarget'),
+ 'permissions' => $qb->expr()->literal(31),
+ 'parent' => $qb->expr()->literal($id),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+
+ /*
+ * Correct share. should be taken by code path.
+ */
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(2),
+ 'share_with' => $qb->expr()->literal('user'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal($fileId),
+ 'file_target' => $qb->expr()->literal('userTarget'),
+ 'permissions' => $qb->expr()->literal(0),
+ 'parent' => $qb->expr()->literal($id),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+
+ $groups = ['sharedWith'];
+
+ $user = $this->createMock(IUser::class);
+ $user->method('getUID')->willReturn('user');
+ $owner = $this->createMock(IUser::class);
+ $owner->method('getUID')->willReturn('shareOwner');
+ $initiator = $this->createMock(IUser::class);
+ $initiator->method('getUID')->willReturn('sharedBy');
+
+ $this->userManager->method('get')->willReturnMap([
+ ['user', $user],
+ ['shareOwner', $owner],
+ ['sharedBy', $initiator],
+ ]);
+ $this->groupManager
+ ->method('getUserGroupIds')
+ ->willReturnCallback(fn (IUser $user) => ($user->getUID() === 'user' ? $groups : []));
+
+ $file = $this->createMock(File::class);
+ $this->rootFolder->method('getUserFolder')->with('shareOwner')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with($fileId)->willReturn($file);
+
+ $share = $this->provider->getSharedWith('user', IShare::TYPE_GROUP, null, -1, 0);
+ $this->assertCount(1, $share);
+
+ $share = $share[0];
+ $this->assertSame((string)$id, $share->getId());
+ $this->assertSame('sharedWith', $share->getSharedWith());
+ $this->assertSame('shareOwner', $share->getShareOwner());
+ $this->assertSame('sharedBy', $share->getSharedBy());
+ $this->assertSame(IShare::TYPE_GROUP, $share->getShareType());
+ $this->assertSame(0, $share->getPermissions());
+ $this->assertSame('userTarget', $share->getTarget());
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('storageAndFileNameProvider')]
+ public function testGetSharedWithUserWithNode($storageStringId, $fileName1, $fileName2): void {
+ $storageId = $this->createTestStorageEntry($storageStringId);
+ $fileId = $this->createTestFileEntry($fileName1, $storageId);
+ $fileId2 = $this->createTestFileEntry($fileName2, $storageId);
+ $this->addShareToDB(IShare::TYPE_USER, 'user0', 'user1', 'user1',
+ 'file', $fileId, 'myTarget', 31, null, null, null);
+ $id = $this->addShareToDB(IShare::TYPE_USER, 'user0', 'user1', 'user1',
+ 'file', $fileId2, 'myTarget', 31, null, null, null);
+
+ $user0 = $this->createMock(IUser::class);
+ $user0->method('getUID')->willReturn('user0');
+ $user0->method('getDisplayName')->willReturn('user0');
+ $user1 = $this->createMock(IUser::class);
+ $user1->method('getUID')->willReturn('user1');
+ $user0->method('getDisplayName')->willReturn('user0');
+
+ $this->userManager->method('get')->willReturnMap([
+ ['user0', $user0],
+ ['user1', $user1],
+ ]);
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn($fileId2);
+
+ $this->rootFolder->method('getUserFolder')->with('user1')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with($fileId2)->willReturn($file);
+
+ $share = $this->provider->getSharedWith('user0', IShare::TYPE_USER, $file, -1, 0);
+ $this->assertCount(1, $share);
+
+ $share = $share[0];
+ $this->assertEquals($id, $share->getId());
+ $this->assertSame('user0', $share->getSharedWith());
+ $this->assertSame('user1', $share->getShareOwner());
+ $this->assertSame('user1', $share->getSharedBy());
+ $this->assertSame($file, $share->getNode());
+ $this->assertEquals(IShare::TYPE_USER, $share->getShareType());
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('storageAndFileNameProvider')]
+ public function testGetSharedWithGroupWithNode($storageStringId, $fileName1, $fileName2): void {
+ $storageId = $this->createTestStorageEntry($storageStringId);
+ $fileId = $this->createTestFileEntry($fileName1, $storageId);
+ $fileId2 = $this->createTestFileEntry($fileName2, $storageId);
+ $this->addShareToDB(IShare::TYPE_GROUP, 'group0', 'user1', 'user1',
+ 'file', $fileId, 'myTarget', 31, null, null, null);
+ $id = $this->addShareToDB(IShare::TYPE_GROUP, 'group0', 'user1', 'user1',
+ 'file', $fileId2, 'myTarget', 31, null, null, null);
+
+ $user0 = $this->createMock(IUser::class);
+ $user0->method('getUID')->willReturn('user0');
+ $user1 = $this->createMock(IUser::class);
+ $user1->method('getUID')->willReturn('user1');
+
+ $this->userManager->method('get')->willReturnMap([
+ ['user0', $user0],
+ ['user1', $user1],
+ ]);
+
+ $this->groupManager
+ ->method('getUserGroupIds')
+ ->willReturnCallback(fn (IUser $user) => ($user->getUID() === 'user0' ? ['group0'] : []));
+
+ $node = $this->createMock(Folder::class);
+ $node->method('getId')->willReturn($fileId2);
+ $this->rootFolder->method('getUserFolder')->with('user1')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with($fileId2)->willReturn($node);
+
+ $share = $this->provider->getSharedWith('user0', IShare::TYPE_GROUP, $node, -1, 0);
+ $this->assertCount(1, $share);
+
+ $share = $share[0];
+ $this->assertEquals($id, $share->getId());
+ $this->assertSame('group0', $share->getSharedWith());
+ $this->assertSame('user1', $share->getShareOwner());
+ $this->assertSame('user1', $share->getSharedBy());
+ $this->assertSame($node, $share->getNode());
+ $this->assertEquals(IShare::TYPE_GROUP, $share->getShareType());
+ }
+
+ public static function shareTypesProvider(): array {
+ return [
+ [IShare::TYPE_USER, false],
+ [IShare::TYPE_GROUP, false],
+ [IShare::TYPE_USER, true],
+ [IShare::TYPE_GROUP, true],
+ ];
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('shareTypesProvider')]
+ public function testGetSharedWithWithDeletedFile($shareType, $trashed): void {
+ if ($trashed) {
+ // exists in database but is in trash
+ $storageId = $this->createTestStorageEntry('home::shareOwner');
+ $deletedFileId = $this->createTestFileEntry('files_trashbin/files/test.txt.d1465553223', $storageId);
+ } else {
+ // fileid that doesn't exist in the database
+ $deletedFileId = 123;
+ }
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal($shareType),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal($deletedFileId),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+
+ $file = $this->createMock(File::class);
+ $this->rootFolder->method('getUserFolder')->with('shareOwner')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with($deletedFileId)->willReturn($file);
+
+ $groups = [];
+ foreach (range(0, 100) as $i) {
+ $groups[] = 'group' . $i;
+ }
+
+ $groups[] = 'sharedWith';
+
+ $user = $this->createMock(IUser::class);
+ $user->method('getUID')->willReturn('sharedWith');
+ $owner = $this->createMock(IUser::class);
+ $owner->method('getUID')->willReturn('shareOwner');
+ $initiator = $this->createMock(IUser::class);
+ $initiator->method('getUID')->willReturn('sharedBy');
+
+ $this->userManager->method('get')->willReturnMap([
+ ['sharedWith', $user],
+ ['shareOwner', $owner],
+ ['sharedBy', $initiator],
+ ]);
+ $this->groupManager
+ ->method('getUserGroupIds')
+ ->willReturnCallback(fn (IUser $user) => ($user->getUID() === 'sharedWith' ? $groups : []));
+
+ $share = $this->provider->getSharedWith('sharedWith', $shareType, null, 1, 0);
+ $this->assertCount(0, $share);
+ }
+
+ public function testGetSharesBy(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+ $id = $qb->getLastInsertId();
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy2'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('userTarget'),
+ 'permissions' => $qb->expr()->literal(0),
+ 'parent' => $qb->expr()->literal($id),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+
+ $file = $this->createMock(File::class);
+ $this->rootFolder->method('getUserFolder')->with('shareOwner')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with(42)->willReturn($file);
+
+ $share = $this->provider->getSharesBy('sharedBy', IShare::TYPE_USER, null, false, 1, 0);
+ $this->assertCount(1, $share);
+
+ /** @var IShare $share */
+ $share = $share[0];
+ $this->assertEquals($id, $share->getId());
+ $this->assertEquals('sharedWith', $share->getSharedWith());
+ $this->assertEquals('shareOwner', $share->getShareOwner());
+ $this->assertEquals('sharedBy', $share->getSharedBy());
+ $this->assertEquals(IShare::TYPE_USER, $share->getShareType());
+ $this->assertEquals(13, $share->getPermissions());
+ $this->assertEquals('myTarget', $share->getTarget());
+ }
+
+ public function testGetSharesNode(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+ $id = $qb->getLastInsertId();
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(43),
+ 'file_target' => $qb->expr()->literal('userTarget'),
+ 'permissions' => $qb->expr()->literal(0),
+ 'parent' => $qb->expr()->literal($id),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(42);
+ $this->rootFolder->method('getUserFolder')->with('shareOwner')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with(42)->willReturn($file);
+
+ $share = $this->provider->getSharesBy('sharedBy', IShare::TYPE_USER, $file, false, 1, 0);
+ $this->assertCount(1, $share);
+
+ /** @var IShare $share */
+ $share = $share[0];
+ $this->assertEquals($id, $share->getId());
+ $this->assertEquals('sharedWith', $share->getSharedWith());
+ $this->assertEquals('shareOwner', $share->getShareOwner());
+ $this->assertEquals('sharedBy', $share->getSharedBy());
+ $this->assertEquals(IShare::TYPE_USER, $share->getShareType());
+ $this->assertEquals(13, $share->getPermissions());
+ $this->assertEquals('myTarget', $share->getTarget());
+ }
+
+ public function testGetSharesReshare(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('shareOwner'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('myTarget'),
+ 'permissions' => $qb->expr()->literal(13),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+ $id1 = $qb->getLastInsertId();
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('sharedWith'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('userTarget'),
+ 'permissions' => $qb->expr()->literal(0),
+ ]);
+ $this->assertEquals(1, $qb->execute());
+ $id2 = $qb->getLastInsertId();
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(42);
+ $this->rootFolder->method('getUserFolder')->with('shareOwner')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with(42)->willReturn($file);
+
+ $shares = $this->provider->getSharesBy('shareOwner', IShare::TYPE_USER, null, true, -1, 0);
+ $this->assertCount(2, $shares);
+
+ /** @var IShare $share */
+ $share = $shares[0];
+ $this->assertEquals($id1, $share->getId());
+ $this->assertSame('sharedWith', $share->getSharedWith());
+ $this->assertSame('shareOwner', $share->getShareOwner());
+ $this->assertSame('shareOwner', $share->getSharedBy());
+ $this->assertEquals(IShare::TYPE_USER, $share->getShareType());
+ $this->assertEquals(13, $share->getPermissions());
+ $this->assertEquals('myTarget', $share->getTarget());
+
+ $share = $shares[1];
+ $this->assertEquals($id2, $share->getId());
+ $this->assertSame('sharedWith', $share->getSharedWith());
+ $this->assertSame('shareOwner', $share->getShareOwner());
+ $this->assertSame('sharedBy', $share->getSharedBy());
+ $this->assertEquals(IShare::TYPE_USER, $share->getShareType());
+ $this->assertEquals(0, $share->getPermissions());
+ $this->assertEquals('userTarget', $share->getTarget());
+ }
+
+ public function testDeleteFromSelfGroupNoCustomShare(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+ $stmt = $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_GROUP),
+ 'share_with' => $qb->expr()->literal('group'),
+ 'uid_owner' => $qb->expr()->literal('user1'),
+ 'uid_initiator' => $qb->expr()->literal('user1'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(1),
+ 'file_target' => $qb->expr()->literal('myTarget1'),
+ 'permissions' => $qb->expr()->literal(2)
+ ])->execute();
+ $this->assertEquals(1, $stmt);
+ $id = $qb->getLastInsertId();
+
+ $user1 = $this->createMock(IUser::class);
+ $user1->method('getUID')->willReturn('user1');
+ $user2 = $this->createMock(IUser::class);
+ $user2->method('getUID')->willReturn('user2');
+ $this->userManager->method('get')->willReturnMap([
+ ['user1', $user1],
+ ['user2', $user2],
+ ]);
+
+ $group = $this->createMock(IGroup::class);
+ $group->method('getGID')->willReturn('group');
+ $group->method('inGroup')->with($user2)->willReturn(true);
+ $group->method('getDisplayName')->willReturn('group-displayname');
+ $this->groupManager->method('get')->with('group')->willReturn($group);
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(1);
+
+ $this->rootFolder->method('getUserFolder')->with('user1')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with(1)->willReturn($file);
+
+ $share = $this->provider->getShareById($id);
+
+ $this->provider->deleteFromSelf($share, 'user2');
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $stmt = $qb->select('*')
+ ->from('share')
+ ->where($qb->expr()->eq('share_type', $qb->createNamedParameter(2)))
+ ->execute();
+
+ $shares = $stmt->fetchAll();
+ $stmt->closeCursor();
+
+ $this->assertCount(1, $shares);
+ $share2 = $shares[0];
+ $this->assertEquals($id, $share2['parent']);
+ $this->assertEquals(0, $share2['permissions']);
+ $this->assertEquals('user2', $share2['share_with']);
+ }
+
+ public function testDeleteFromSelfGroupAlreadyCustomShare(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+ $stmt = $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_GROUP),
+ 'share_with' => $qb->expr()->literal('group'),
+ 'uid_owner' => $qb->expr()->literal('user1'),
+ 'uid_initiator' => $qb->expr()->literal('user1'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(1),
+ 'file_target' => $qb->expr()->literal('myTarget1'),
+ 'permissions' => $qb->expr()->literal(2)
+ ])->execute();
+ $this->assertEquals(1, $stmt);
+ $id = $qb->getLastInsertId();
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $stmt = $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(2),
+ 'share_with' => $qb->expr()->literal('user2'),
+ 'uid_owner' => $qb->expr()->literal('user1'),
+ 'uid_initiator' => $qb->expr()->literal('user1'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(1),
+ 'file_target' => $qb->expr()->literal('myTarget1'),
+ 'permissions' => $qb->expr()->literal(2),
+ 'parent' => $qb->expr()->literal($id),
+ ])->execute();
+ $this->assertEquals(1, $stmt);
+
+ $user1 = $this->createMock(IUser::class);
+ $user1->method('getUID')->willReturn('user1');
+ $user2 = $this->createMock(IUser::class);
+ $user2->method('getUID')->willReturn('user2');
+ $this->userManager->method('get')->willReturnMap([
+ ['user1', $user1],
+ ['user2', $user2],
+ ]);
+
+ $group = $this->createMock(IGroup::class);
+ $group->method('getGID')->willReturn('group');
+ $group->method('inGroup')->with($user2)->willReturn(true);
+ $group->method('getDisplayName')->willReturn('group-displayname');
+ $this->groupManager->method('get')->with('group')->willReturn($group);
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(1);
+
+ $this->rootFolder->method('getUserFolder')->with('user1')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with(1)->willReturn($file);
+
+ $share = $this->provider->getShareById($id);
+
+ $this->provider->deleteFromSelf($share, 'user2');
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $stmt = $qb->select('*')
+ ->from('share')
+ ->where($qb->expr()->eq('share_type', $qb->createNamedParameter(2)))
+ ->execute();
+
+ $shares = $stmt->fetchAll();
+ $stmt->closeCursor();
+
+ $this->assertCount(1, $shares);
+ $share2 = $shares[0];
+ $this->assertEquals($id, $share2['parent']);
+ $this->assertEquals(0, $share2['permissions']);
+ $this->assertEquals('user2', $share2['share_with']);
+ }
+
+
+ public function testDeleteFromSelfGroupUserNotInGroup(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+ $stmt = $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_GROUP),
+ 'share_with' => $qb->expr()->literal('group'),
+ 'uid_owner' => $qb->expr()->literal('user1'),
+ 'uid_initiator' => $qb->expr()->literal('user1'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(1),
+ 'file_target' => $qb->expr()->literal('myTarget1'),
+ 'permissions' => $qb->expr()->literal(2)
+ ])->execute();
+ $this->assertEquals(1, $stmt);
+ $id = $qb->getLastInsertId();
+
+ $user1 = $this->createMock(IUser::class);
+ $user1->method('getUID')->willReturn('user1');
+ $user2 = $this->createMock(IUser::class);
+ $user2->method('getUID')->willReturn('user2');
+ $this->userManager->method('get')->willReturnMap([
+ ['user1', $user1],
+ ['user2', $user2],
+ ]);
+
+ $group = $this->createMock(IGroup::class);
+ $group->method('getGID')->willReturn('group');
+ $group->method('inGroup')->with($user2)->willReturn(false);
+ $group->method('getDisplayName')->willReturn('group-displayname');
+ $this->groupManager->method('get')->with('group')->willReturn($group);
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(1);
+
+ $this->rootFolder->method('getUserFolder')->with('user1')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with(1)->willReturn($file);
+
+ $share = $this->provider->getShareById($id);
+
+ $this->provider->deleteFromSelf($share, 'user2');
+ }
+
+
+ public function testDeleteFromSelfGroupDoesNotExist(): void {
+ $this->expectException(ProviderException::class);
+ $this->expectExceptionMessage('Group "group" does not exist');
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $stmt = $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_GROUP),
+ 'share_with' => $qb->expr()->literal('group'),
+ 'uid_owner' => $qb->expr()->literal('user1'),
+ 'uid_initiator' => $qb->expr()->literal('user1'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(1),
+ 'file_target' => $qb->expr()->literal('myTarget1'),
+ 'permissions' => $qb->expr()->literal(2)
+ ])->execute();
+ $this->assertEquals(1, $stmt);
+ $id = $qb->getLastInsertId();
+
+ $user1 = $this->createMock(IUser::class);
+ $user1->method('getUID')->willReturn('user1');
+ $user2 = $this->createMock(IUser::class);
+ $user2->method('getUID')->willReturn('user2');
+ $this->userManager->method('get')->willReturnMap([
+ ['user1', $user1],
+ ['user2', $user2],
+ ]);
+
+ $this->groupManager->method('get')->with('group')->willReturn(null);
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(1);
+
+ $this->rootFolder->method('getUserFolder')->with('user1')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with(1)->willReturn($file);
+
+ $share = $this->provider->getShareById($id);
+
+ $this->provider->deleteFromSelf($share, 'user2');
+ }
+
+ public function testDeleteFromSelfUser(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+ $stmt = $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('user2'),
+ 'uid_owner' => $qb->expr()->literal('user1'),
+ 'uid_initiator' => $qb->expr()->literal('user1'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(1),
+ 'file_target' => $qb->expr()->literal('myTarget1'),
+ 'permissions' => $qb->expr()->literal(2)
+ ])->execute();
+ $this->assertEquals(1, $stmt);
+ $id = $qb->getLastInsertId();
+
+ $user1 = $this->createMock(IUser::class);
+ $user1->method('getUID')->willReturn('user1');
+ $user1->method('getDisplayName')->willReturn('user1');
+ $user2 = $this->createMock(IUser::class);
+ $user2->method('getUID')->willReturn('user2');
+ $user2->method('getDisplayName')->willReturn('user2');
+ $this->userManager->method('get')->willReturnMap([
+ ['user1', $user1],
+ ['user2', $user2],
+ ]);
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(1);
+
+ $this->rootFolder->method('getUserFolder')->with('user1')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with(1)->willReturn($file);
+
+ $share = $this->provider->getShareById($id);
+
+ $this->provider->deleteFromSelf($share, 'user2');
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $stmt = $qb->select('*')
+ ->from('share')
+ ->where($qb->expr()->eq('id', $qb->createNamedParameter($id)))
+ ->execute();
+
+ $shares = $stmt->fetchAll();
+ $stmt->closeCursor();
+
+ $this->assertCount(0, $shares);
+ }
+
+
+ public function testDeleteFromSelfUserNotRecipient(): void {
+ $this->expectException(ProviderException::class);
+ $this->expectExceptionMessage('Recipient does not match');
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $stmt = $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('user2'),
+ 'uid_owner' => $qb->expr()->literal('user1'),
+ 'uid_initiator' => $qb->expr()->literal('user1'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(1),
+ 'file_target' => $qb->expr()->literal('myTarget1'),
+ 'permissions' => $qb->expr()->literal(2)
+ ])->execute();
+ $this->assertEquals(1, $stmt);
+ $id = $qb->getLastInsertId();
+
+ $user1 = $this->createMock(IUser::class);
+ $user1->method('getUID')->willReturn('user1');
+ $user1->method('getDisplayName')->willReturn('user1');
+ $user2 = $this->createMock(IUser::class);
+ $user2->method('getUID')->willReturn('user2');
+ $user2->method('getDisplayName')->willReturn('user2');
+ $user3 = $this->createMock(IUser::class);
+ $this->userManager->method('get')->willReturnMap([
+ ['user1', $user1],
+ ['user2', $user2],
+ ]);
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(1);
+
+ $this->rootFolder->method('getUserFolder')->with('user1')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with(1)->willReturn($file);
+
+ $share = $this->provider->getShareById($id);
+
+ $this->provider->deleteFromSelf($share, $user3);
+ }
+
+
+ public function testDeleteFromSelfLink(): void {
+ $this->expectException(ProviderException::class);
+ $this->expectExceptionMessage('Invalid shareType');
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $stmt = $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_LINK),
+ 'uid_owner' => $qb->expr()->literal('user1'),
+ 'uid_initiator' => $qb->expr()->literal('user1'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(1),
+ 'file_target' => $qb->expr()->literal('myTarget1'),
+ 'permissions' => $qb->expr()->literal(2),
+ 'token' => $qb->expr()->literal('token'),
+ ])->execute();
+ $this->assertEquals(1, $stmt);
+ $id = $qb->getLastInsertId();
+
+ $user1 = $this->createMock(IUser::class);
+ $user1->method('getUID')->willReturn('user1');
+ $this->userManager->method('get')->willReturnMap([
+ ['user1', $user1],
+ ]);
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(1);
+
+ $this->rootFolder->method('getUserFolder')->with('user1')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->with(1)->willReturn($file);
+
+ $share = $this->provider->getShareById($id);
+
+ $this->provider->deleteFromSelf($share, $user1);
+ }
+
+ public function testUpdateUser(): void {
+ $id = $this->addShareToDB(IShare::TYPE_USER, 'user0', 'user1', 'user2',
+ 'file', 42, 'target', 31, null, null);
+
+ $users = [];
+ for ($i = 0; $i < 6; $i++) {
+ $user = $this->createMock(IUser::class);
+ $user->method('getUID')->willReturn('user' . $i);
+ $user->method('getDisplayName')->willReturn('user' . $i);
+ $users['user' . $i] = $user;
+ }
+
+ $this->userManager->method('get')->willReturnCallback(
+ function ($userId) use ($users) {
+ return $users[$userId];
+ }
+ );
+
+ $file1 = $this->createMock(File::class);
+ $file1->method('getId')->willReturn(42);
+ $file2 = $this->createMock(File::class);
+ $file2->method('getId')->willReturn(43);
+
+ $folder1 = $this->createMock(Folder::class);
+ $folder1->method('getFirstNodeById')->with(42)->willReturn($file1);
+ $folder2 = $this->createMock(Folder::class);
+ $folder2->method('getFirstNodeById')->with(43)->willReturn($file2);
+
+ $this->rootFolder->method('getUserFolder')->willReturnMap([
+ ['user2', $folder1],
+ ['user5', $folder2],
+ ]);
+
+ $share = $this->provider->getShareById($id);
+
+ $share->setSharedWith('user3');
+ $share->setSharedBy('user4');
+ $share->setShareOwner('user5');
+ $share->setNode($file2);
+ $share->setPermissions(1);
+
+ $share2 = $this->provider->update($share);
+
+ $this->assertEquals($id, $share2->getId());
+ $this->assertSame('user3', $share2->getSharedWith());
+ $this->assertSame('user4', $share2->getSharedBy());
+ $this->assertSame('user5', $share2->getShareOwner());
+ $this->assertSame(1, $share2->getPermissions());
+
+ $share2 = $this->provider->getShareById($id);
+
+ $this->assertEquals($id, $share2->getId());
+ $this->assertSame('user3', $share2->getSharedWith());
+ $this->assertSame('user4', $share2->getSharedBy());
+ $this->assertSame('user5', $share2->getShareOwner());
+ $this->assertSame(1, $share2->getPermissions());
+ }
+
+ public function testUpdateLink(): void {
+ $id = $this->addShareToDB(IShare::TYPE_LINK, null, 'user1', 'user2',
+ 'file', 42, 'target', 31, null, null);
+
+ $users = [];
+ for ($i = 0; $i < 6; $i++) {
+ $user = $this->createMock(IUser::class);
+ $user->method('getUID')->willReturn('user' . $i);
+ $users['user' . $i] = $user;
+ }
+
+ $this->userManager->method('get')->willReturnCallback(
+ function ($userId) use ($users) {
+ return $users[$userId];
+ }
+ );
+
+ $file1 = $this->createMock(File::class);
+ $file1->method('getId')->willReturn(42);
+ $file2 = $this->createMock(File::class);
+ $file2->method('getId')->willReturn(43);
+
+ $folder1 = $this->createMock(Folder::class);
+ $folder1->method('getFirstNodeById')->with(42)->willReturn($file1);
+ $folder2 = $this->createMock(Folder::class);
+ $folder2->method('getFirstNodeById')->with(43)->willReturn($file2);
+
+ $this->rootFolder->method('getUserFolder')->willReturnMap([
+ ['user2', $folder1],
+ ['user5', $folder2],
+ ]);
+
+ $share = $this->provider->getShareById($id);
+
+ $share->setPassword('password');
+ $share->setSendPasswordByTalk(true);
+ $share->setSharedBy('user4');
+ $share->setShareOwner('user5');
+ $share->setNode($file2);
+ $share->setPermissions(1);
+
+ $share2 = $this->provider->update($share);
+
+ $this->assertEquals($id, $share2->getId());
+ $this->assertEquals('password', $share2->getPassword());
+ $this->assertSame(true, $share2->getSendPasswordByTalk());
+ $this->assertSame('user4', $share2->getSharedBy());
+ $this->assertSame('user5', $share2->getShareOwner());
+ $this->assertSame(1, $share2->getPermissions());
+
+ $share2 = $this->provider->getShareById($id);
+
+ $this->assertEquals($id, $share2->getId());
+ $this->assertEquals('password', $share2->getPassword());
+ $this->assertSame(true, $share2->getSendPasswordByTalk());
+ $this->assertSame('user4', $share2->getSharedBy());
+ $this->assertSame('user5', $share2->getShareOwner());
+ $this->assertSame(1, $share2->getPermissions());
+ }
+
+ public function testUpdateLinkRemovePassword(): void {
+ $id = $this->addShareToDB(IShare::TYPE_LINK, 'foo', 'user1', 'user2',
+ 'file', 42, 'target', 31, null, null);
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->update('share');
+ $qb->where($qb->expr()->eq('id', $qb->createNamedParameter($id)));
+ $qb->set('password', $qb->createNamedParameter('password'));
+ $this->assertEquals(1, $qb->execute());
+
+ $users = [];
+ for ($i = 0; $i < 6; $i++) {
+ $user = $this->createMock(IUser::class);
+ $user->method('getUID')->willReturn('user' . $i);
+ $users['user' . $i] = $user;
+ }
+
+ $this->userManager->method('get')->willReturnCallback(
+ function ($userId) use ($users) {
+ return $users[$userId];
+ }
+ );
+
+ $file1 = $this->createMock(File::class);
+ $file1->method('getId')->willReturn(42);
+ $file2 = $this->createMock(File::class);
+ $file2->method('getId')->willReturn(43);
+
+ $folder1 = $this->createMock(Folder::class);
+ $folder1->method('getFirstNodeById')->with(42)->willReturn($file1);
+ $folder2 = $this->createMock(Folder::class);
+ $folder2->method('getFirstNodeById')->with(43)->willReturn($file2);
+
+ $this->rootFolder->method('getUserFolder')->willReturnMap([
+ ['user2', $folder1],
+ ['user5', $folder2],
+ ]);
+
+ $share = $this->provider->getShareById($id);
+
+ $share->setPassword(null);
+ $share->setSharedBy('user4');
+ $share->setShareOwner('user5');
+ $share->setNode($file2);
+ $share->setPermissions(1);
+
+ $share2 = $this->provider->update($share);
+
+ $this->assertEquals($id, $share2->getId());
+ $this->assertEquals(null, $share2->getPassword());
+ $this->assertSame('user4', $share2->getSharedBy());
+ $this->assertSame('user5', $share2->getShareOwner());
+ $this->assertSame(1, $share2->getPermissions());
+
+ $share2 = $this->provider->getShareById($id);
+
+ $this->assertEquals($id, $share2->getId());
+ $this->assertEquals(null, $share2->getPassword());
+ $this->assertSame('user4', $share2->getSharedBy());
+ $this->assertSame('user5', $share2->getShareOwner());
+ $this->assertSame(1, $share2->getPermissions());
+ }
+
+ public function testUpdateGroupNoSub(): void {
+ $id = $this->addShareToDB(IShare::TYPE_GROUP, 'group0', 'user1', 'user2',
+ 'file', 42, 'target', 31, null, null);
+
+ $users = [];
+ for ($i = 0; $i < 6; $i++) {
+ $user = $this->createMock(IUser::class);
+ $user->method('getUID')->willReturn('user' . $i);
+ $users['user' . $i] = $user;
+ }
+
+ $this->userManager->method('get')->willReturnCallback(
+ function ($userId) use ($users) {
+ return $users[$userId];
+ }
+ );
+
+ $groups = [];
+ for ($i = 0; $i < 2; $i++) {
+ $group = $this->createMock(IGroup::class);
+ $group->method('getGID')->willReturn('group' . $i);
+ $group->method('getDisplayName')->willReturn('group-displayname' . $i);
+ $groups['group' . $i] = $group;
+ }
+
+ $this->groupManager->method('get')->willReturnCallback(
+ function ($groupId) use ($groups) {
+ return $groups[$groupId];
+ }
+ );
+
+ $file1 = $this->createMock(File::class);
+ $file1->method('getId')->willReturn(42);
+ $file2 = $this->createMock(File::class);
+ $file2->method('getId')->willReturn(43);
+
+ $folder1 = $this->createMock(Folder::class);
+ $folder1->method('getFirstNodeById')->with(42)->willReturn($file1);
+ $folder2 = $this->createMock(Folder::class);
+ $folder2->method('getFirstNodeById')->with(43)->willReturn($file2);
+
+ $this->rootFolder->method('getUserFolder')->willReturnMap([
+ ['user2', $folder1],
+ ['user5', $folder2],
+ ]);
+
+ $share = $this->provider->getShareById($id);
+
+ $share->setSharedWith('group0');
+ $share->setSharedBy('user4');
+ $share->setShareOwner('user5');
+ $share->setNode($file2);
+ $share->setPermissions(1);
+
+ $share2 = $this->provider->update($share);
+
+ $this->assertEquals($id, $share2->getId());
+ // Group shares do not allow updating the recipient
+ $this->assertSame('group0', $share2->getSharedWith());
+ $this->assertSame('user4', $share2->getSharedBy());
+ $this->assertSame('user5', $share2->getShareOwner());
+ $this->assertSame(1, $share2->getPermissions());
+
+ $share2 = $this->provider->getShareById($id);
+
+ $this->assertEquals($id, $share2->getId());
+ // Group shares do not allow updating the recipient
+ $this->assertSame('group0', $share2->getSharedWith());
+ $this->assertSame('user4', $share2->getSharedBy());
+ $this->assertSame('user5', $share2->getShareOwner());
+ $this->assertSame(1, $share2->getPermissions());
+ }
+
+ public function testUpdateGroupSubShares(): void {
+ $id = $this->addShareToDB(IShare::TYPE_GROUP, 'group0', 'user1', 'user2',
+ 'file', 42, 'target', 31, null, null);
+
+ $id2 = $this->addShareToDB(2, 'user0', 'user1', 'user2',
+ 'file', 42, 'mytarget', 31, null, null, $id);
+
+ $id3 = $this->addShareToDB(2, 'user3', 'user1', 'user2',
+ 'file', 42, 'mytarget2', 0, null, null, $id);
+
+ $users = [];
+ for ($i = 0; $i < 6; $i++) {
+ $user = $this->createMock(IUser::class);
+ $user->method('getUID')->willReturn('user' . $i);
+ $users['user' . $i] = $user;
+ }
+
+ $this->userManager->method('get')->willReturnCallback(
+ function ($userId) use ($users) {
+ return $users[$userId];
+ }
+ );
+
+ $groups = [];
+ for ($i = 0; $i < 2; $i++) {
+ $group = $this->createMock(IGroup::class);
+ $group->method('getGID')->willReturn('group' . $i);
+ $group->method('getDisplayName')->willReturn('group-displayname' . $i);
+ $groups['group' . $i] = $group;
+ }
+
+ $this->groupManager->method('get')->willReturnCallback(
+ function ($groupId) use ($groups) {
+ return $groups[$groupId];
+ }
+ );
+
+ $file1 = $this->createMock(File::class);
+ $file1->method('getId')->willReturn(42);
+ $file2 = $this->createMock(File::class);
+ $file2->method('getId')->willReturn(43);
+
+ $folder1 = $this->createMock(Folder::class);
+ $folder1->method('getFirstNodeById')->with(42)->willReturn($file1);
+ $folder2 = $this->createMock(Folder::class);
+ $folder2->method('getFirstNodeById')->with(43)->willReturn($file2);
+
+ $this->rootFolder->method('getUserFolder')->willReturnMap([
+ ['user2', $folder1],
+ ['user5', $folder2],
+ ]);
+
+ $share = $this->provider->getShareById($id);
+
+ $share->setSharedWith('group0');
+ $share->setSharedBy('user4');
+ $share->setShareOwner('user5');
+ $share->setNode($file2);
+ $share->setPermissions(1);
+
+ $share2 = $this->provider->update($share);
+
+ $this->assertEquals($id, $share2->getId());
+ // Group shares do not allow updating the recipient
+ $this->assertSame('group0', $share2->getSharedWith());
+ $this->assertSame('user4', $share2->getSharedBy());
+ $this->assertSame('user5', $share2->getShareOwner());
+ $this->assertSame(1, $share2->getPermissions());
+
+ $share2 = $this->provider->getShareById($id);
+
+ $this->assertEquals($id, $share2->getId());
+ // Group shares do not allow updating the recipient
+ $this->assertSame('group0', $share2->getSharedWith());
+ $this->assertSame('user4', $share2->getSharedBy());
+ $this->assertSame('user5', $share2->getShareOwner());
+ $this->assertSame(1, $share2->getPermissions());
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $stmt = $qb->select('*')
+ ->from('share')
+ ->where($qb->expr()->eq('parent', $qb->createNamedParameter($id)))
+ ->orderBy('id')
+ ->execute();
+
+ $shares = $stmt->fetchAll();
+
+ $this->assertSame('user0', $shares[0]['share_with']);
+ $this->assertSame('user4', $shares[0]['uid_initiator']);
+ $this->assertSame('user5', $shares[0]['uid_owner']);
+ $this->assertSame(1, (int)$shares[0]['permissions']);
+
+ $this->assertSame('user3', $shares[1]['share_with']);
+ $this->assertSame('user4', $shares[1]['uid_initiator']);
+ $this->assertSame('user5', $shares[1]['uid_owner']);
+ $this->assertSame(0, (int)$shares[1]['permissions']);
+
+
+ $stmt->closeCursor();
+ }
+
+ public function testMoveUserShare(): void {
+ $id = $this->addShareToDB(IShare::TYPE_USER, 'user0', 'user1', 'user1', 'file',
+ 42, 'mytaret', 31, null, null);
+
+ $user0 = $this->createMock(IUser::class);
+ $user0->method('getUID')->willReturn('user0');
+ $user0->method('getDisplayName')->willReturn('user0');
+ $user1 = $this->createMock(IUser::class);
+ $user1->method('getUID')->willReturn('user1');
+ $user1->method('getDisplayName')->willReturn('user1');
+
+ $this->userManager->method('get')->willReturnMap([
+ ['user0', $user0],
+ ['user1', $user1],
+ ]);
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(42);
+
+ $this->rootFolder->method('getUserFolder')->with('user1')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->willReturn($file);
+
+ $share = $this->provider->getShareById($id, null);
+
+ $share->setTarget('/newTarget');
+ $this->provider->move($share, $user0);
+
+ $share = $this->provider->getShareById($id, null);
+ $this->assertSame('/newTarget', $share->getTarget());
+ }
+
+ public function testMoveGroupShare(): void {
+ $id = $this->addShareToDB(IShare::TYPE_GROUP, 'group0', 'user1', 'user1', 'file',
+ 42, 'mytaret', 31, null, null);
+
+ $user0 = $this->createMock(IUser::class);
+ $user0->method('getUID')->willReturn('user0');
+ $user1 = $this->createMock(IUser::class);
+ $user1->method('getUID')->willReturn('user1');
+
+ $group0 = $this->createMock(IGroup::class);
+ $group0->method('getGID')->willReturn('group0');
+ $group0->method('inGroup')->with($user0)->willReturn(true);
+ $group0->method('getDisplayName')->willReturn('group0-displayname');
+
+ $this->groupManager->method('get')->with('group0')->willReturn($group0);
+
+ $this->userManager->method('get')->willReturnMap([
+ ['user0', $user0],
+ ['user1', $user1],
+ ]);
+
+ $folder = $this->createMock(Folder::class);
+ $folder->method('getId')->willReturn(42);
+
+ $this->rootFolder->method('getUserFolder')->with('user1')->willReturnSelf();
+ $this->rootFolder->method('getFirstNodeById')->willReturn($folder);
+
+ $share = $this->provider->getShareById($id, 'user0');
+
+ $share->setTarget('/newTarget');
+ $this->provider->move($share, 'user0');
+
+ $share = $this->provider->getShareById($id, 'user0');
+ $this->assertSame('/newTarget', $share->getTarget());
+
+ $share->setTarget('/ultraNewTarget');
+ $this->provider->move($share, 'user0');
+
+ $share = $this->provider->getShareById($id, 'user0');
+ $this->assertSame('/ultraNewTarget', $share->getTarget());
+ }
+
+ public static function dataDeleteUser(): array {
+ return [
+ [IShare::TYPE_USER, 'a', 'b', 'c', 'a', true],
+ [IShare::TYPE_USER, 'a', 'b', 'c', 'b', false],
+ [IShare::TYPE_USER, 'a', 'b', 'c', 'c', true],
+ [IShare::TYPE_USER, 'a', 'b', 'c', 'd', false],
+ [IShare::TYPE_GROUP, 'a', 'b', 'c', 'a', true],
+ [IShare::TYPE_GROUP, 'a', 'b', 'c', 'b', false],
+ // The group c is still valid but user c is deleted so group share stays
+ [IShare::TYPE_GROUP, 'a', 'b', 'c', 'c', false],
+ [IShare::TYPE_GROUP, 'a', 'b', 'c', 'd', false],
+ [IShare::TYPE_LINK, 'a', 'b', 'c', 'a', true],
+ // To avoid invisible link shares delete initiated link shares as well (see #22327)
+ [IShare::TYPE_LINK, 'a', 'b', 'c', 'b', true],
+ [IShare::TYPE_LINK, 'a', 'b', 'c', 'c', false],
+ [IShare::TYPE_LINK, 'a', 'b', 'c', 'd', false],
+ ];
+ }
+
+ /**
+ *
+ * @param int $type The shareType (user/group/link)
+ * @param string $owner The owner of the share (uid)
+ * @param string $initiator The initiator of the share (uid)
+ * @param string $recipient The recipient of the share (uid/gid/pass)
+ * @param string $deletedUser The user that is deleted
+ * @param bool $rowDeleted Is the row deleted in this setup
+ */
+ #[\PHPUnit\Framework\Attributes\DataProvider('dataDeleteUser')]
+ public function testDeleteUser($type, $owner, $initiator, $recipient, $deletedUser, $rowDeleted): void {
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->setValue('share_type', $qb->createNamedParameter($type))
+ ->setValue('uid_owner', $qb->createNamedParameter($owner))
+ ->setValue('uid_initiator', $qb->createNamedParameter($initiator))
+ ->setValue('share_with', $qb->createNamedParameter($recipient))
+ ->setValue('item_type', $qb->createNamedParameter('file'))
+ ->setValue('item_source', $qb->createNamedParameter(42))
+ ->setValue('file_source', $qb->createNamedParameter(42))
+ ->execute();
+
+ $id = $qb->getLastInsertId();
+
+ $this->provider->userDeleted($deletedUser, $type);
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->select('*')
+ ->from('share')
+ ->where(
+ $qb->expr()->eq('id', $qb->createNamedParameter($id))
+ );
+ $cursor = $qb->execute();
+ $data = $cursor->fetchAll();
+ $cursor->closeCursor();
+
+ $this->assertCount($rowDeleted ? 0 : 1, $data);
+ }
+
+ public static function dataDeleteUserGroup(): array {
+ return [
+ ['a', 'b', 'c', 'a', true, true],
+ ['a', 'b', 'c', 'b', false, false],
+ ['a', 'b', 'c', 'c', false, true],
+ ['a', 'b', 'c', 'd', false, false],
+ ];
+ }
+
+ /**
+ *
+ * @param string $owner The owner of the share (uid)
+ * @param string $initiator The initiator of the share (uid)
+ * @param string $recipient The recipient of the usergroup share (uid)
+ * @param string $deletedUser The user that is deleted
+ * @param bool $groupShareDeleted
+ * @param bool $userGroupShareDeleted
+ */
+ #[\PHPUnit\Framework\Attributes\DataProvider('dataDeleteUserGroup')]
+ public function testDeleteUserGroup($owner, $initiator, $recipient, $deletedUser, $groupShareDeleted, $userGroupShareDeleted): void {
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->setValue('share_type', $qb->createNamedParameter(IShare::TYPE_GROUP))
+ ->setValue('uid_owner', $qb->createNamedParameter($owner))
+ ->setValue('uid_initiator', $qb->createNamedParameter($initiator))
+ ->setValue('share_with', $qb->createNamedParameter('group'))
+ ->setValue('item_type', $qb->createNamedParameter('file'))
+ ->setValue('item_source', $qb->createNamedParameter(42))
+ ->setValue('file_source', $qb->createNamedParameter(42))
+ ->execute();
+ $groupId = $qb->getLastInsertId();
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->setValue('share_type', $qb->createNamedParameter(2))
+ ->setValue('uid_owner', $qb->createNamedParameter($owner))
+ ->setValue('uid_initiator', $qb->createNamedParameter($initiator))
+ ->setValue('share_with', $qb->createNamedParameter($recipient))
+ ->setValue('item_type', $qb->createNamedParameter('file'))
+ ->setValue('item_source', $qb->createNamedParameter(42))
+ ->setValue('file_source', $qb->createNamedParameter(42))
+ ->execute();
+ $userGroupId = $qb->getLastInsertId();
+
+ $this->provider->userDeleted($deletedUser, IShare::TYPE_GROUP);
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->select('*')
+ ->from('share')
+ ->where(
+ $qb->expr()->eq('id', $qb->createNamedParameter($userGroupId))
+ );
+ $cursor = $qb->execute();
+ $data = $cursor->fetchAll();
+ $cursor->closeCursor();
+ $this->assertCount($userGroupShareDeleted ? 0 : 1, $data);
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->select('*')
+ ->from('share')
+ ->where(
+ $qb->expr()->eq('id', $qb->createNamedParameter($groupId))
+ );
+ $cursor = $qb->execute();
+ $data = $cursor->fetchAll();
+ $cursor->closeCursor();
+ $this->assertCount($groupShareDeleted ? 0 : 1, $data);
+ }
+
+ public static function dataGroupDeleted(): array {
+ return [
+ [
+ [
+ 'type' => IShare::TYPE_USER,
+ 'recipient' => 'user',
+ 'children' => []
+ ], 'group', false
+ ],
+ [
+ [
+ 'type' => IShare::TYPE_USER,
+ 'recipient' => 'user',
+ 'children' => []
+ ], 'user', false
+ ],
+ [
+ [
+ 'type' => IShare::TYPE_LINK,
+ 'recipient' => 'user',
+ 'children' => []
+ ], 'group', false
+ ],
+ [
+ [
+ 'type' => IShare::TYPE_GROUP,
+ 'recipient' => 'group1',
+ 'children' => [
+ 'foo',
+ 'bar'
+ ]
+ ], 'group2', false
+ ],
+ [
+ [
+ 'type' => IShare::TYPE_GROUP,
+ 'recipient' => 'group1',
+ 'children' => [
+ 'foo',
+ 'bar'
+ ]
+ ], 'group1', true
+ ],
+ ];
+ }
+
+ /**
+ *
+ * @param $shares
+ * @param $groupToDelete
+ * @param $shouldBeDeleted
+ */
+ #[\PHPUnit\Framework\Attributes\DataProvider('dataGroupDeleted')]
+ public function testGroupDeleted($shares, $groupToDelete, $shouldBeDeleted): void {
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->setValue('share_type', $qb->createNamedParameter($shares['type']))
+ ->setValue('uid_owner', $qb->createNamedParameter('owner'))
+ ->setValue('uid_initiator', $qb->createNamedParameter('initiator'))
+ ->setValue('share_with', $qb->createNamedParameter($shares['recipient']))
+ ->setValue('item_type', $qb->createNamedParameter('file'))
+ ->setValue('item_source', $qb->createNamedParameter(42))
+ ->setValue('file_source', $qb->createNamedParameter(42))
+ ->execute();
+ $ids = [$qb->getLastInsertId()];
+
+ foreach ($shares['children'] as $child) {
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->setValue('share_type', $qb->createNamedParameter(2))
+ ->setValue('uid_owner', $qb->createNamedParameter('owner'))
+ ->setValue('uid_initiator', $qb->createNamedParameter('initiator'))
+ ->setValue('share_with', $qb->createNamedParameter($child))
+ ->setValue('item_type', $qb->createNamedParameter('file'))
+ ->setValue('item_source', $qb->createNamedParameter(42))
+ ->setValue('file_source', $qb->createNamedParameter(42))
+ ->setValue('parent', $qb->createNamedParameter($ids[0]))
+ ->execute();
+ $ids[] = $qb->getLastInsertId();
+ }
+
+ $this->provider->groupDeleted($groupToDelete);
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $cursor = $qb->select('*')
+ ->from('share')
+ ->where($qb->expr()->in('id', $qb->createNamedParameter($ids, IQueryBuilder::PARAM_INT_ARRAY)))
+ ->execute();
+ $data = $cursor->fetchAll();
+ $cursor->closeCursor();
+
+ $this->assertCount($shouldBeDeleted ? 0 : count($ids), $data);
+ }
+
+ public static function dataUserDeletedFromGroup(): array {
+ return [
+ ['group1', 'user1', true],
+ ['group1', 'user2', false],
+ ['group2', 'user1', false],
+ ];
+ }
+
+ /**
+ * Given a group share with 'group1'
+ * And a user specific group share with 'user1'.
+ * User $user is deleted from group $gid.
+ *
+ *
+ * @param string $group
+ * @param string $user
+ * @param bool $toDelete
+ */
+ #[\PHPUnit\Framework\Attributes\DataProvider('dataUserDeletedFromGroup')]
+ public function testUserDeletedFromGroup($group, $user, $toDelete): void {
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->setValue('share_type', $qb->createNamedParameter(IShare::TYPE_GROUP))
+ ->setValue('uid_owner', $qb->createNamedParameter('owner'))
+ ->setValue('uid_initiator', $qb->createNamedParameter('initiator'))
+ ->setValue('share_with', $qb->createNamedParameter('group1'))
+ ->setValue('item_type', $qb->createNamedParameter('file'))
+ ->setValue('item_source', $qb->createNamedParameter(42))
+ ->setValue('file_source', $qb->createNamedParameter(42));
+ $qb->execute();
+ $id1 = $qb->getLastInsertId();
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share')
+ ->setValue('share_type', $qb->createNamedParameter(2))
+ ->setValue('uid_owner', $qb->createNamedParameter('owner'))
+ ->setValue('uid_initiator', $qb->createNamedParameter('initiator'))
+ ->setValue('share_with', $qb->createNamedParameter('user1'))
+ ->setValue('item_type', $qb->createNamedParameter('file'))
+ ->setValue('item_source', $qb->createNamedParameter(42))
+ ->setValue('file_source', $qb->createNamedParameter(42))
+ ->setValue('parent', $qb->createNamedParameter($id1));
+ $qb->execute();
+ $id2 = $qb->getLastInsertId();
+
+ $this->provider->userDeletedFromGroup($user, $group);
+
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->select('*')
+ ->from('share')
+ ->where($qb->expr()->eq('id', $qb->createNamedParameter($id2)));
+ $cursor = $qb->execute();
+ $data = $cursor->fetchAll();
+ $cursor->closeCursor();
+
+ $this->assertCount($toDelete ? 0 : 1, $data);
+ }
+
+ public function testGetSharesInFolder(): void {
+ $userManager = Server::get(IUserManager::class);
+ $groupManager = Server::get(IGroupManager::class);
+ $rootFolder = Server::get(IRootFolder::class);
+
+ $provider = new DefaultShareProvider(
+ $this->dbConn,
+ $userManager,
+ $groupManager,
+ $rootFolder,
+ $this->mailer,
+ $this->defaults,
+ $this->l10nFactory,
+ $this->urlGenerator,
+ $this->timeFactory,
+ $this->logger,
+ $this->shareManager,
+ $this->config,
+ );
+
+ $password = md5(time());
+
+ $u1 = $userManager->createUser('testShare1', $password);
+ $u2 = $userManager->createUser('testShare2', $password);
+ $u3 = $userManager->createUser('testShare3', $password);
+
+ $g1 = $groupManager->createGroup('group1');
+
+ $u1Folder = $rootFolder->getUserFolder($u1->getUID());
+ $folder1 = $u1Folder->newFolder('foo');
+ $file1 = $folder1->newFile('bar');
+ $folder2 = $folder1->newFolder('baz');
+
+ $shareManager = Server::get(IShareManager::class);
+ $share1 = $shareManager->newShare();
+ $share1->setNode($folder1)
+ ->setSharedBy($u1->getUID())
+ ->setSharedWith($u2->getUID())
+ ->setShareOwner($u1->getUID())
+ ->setShareType(IShare::TYPE_USER)
+ ->setPermissions(Constants::PERMISSION_ALL);
+ $share1 = $this->provider->create($share1);
+
+ $share2 = $shareManager->newShare();
+ $share2->setNode($file1)
+ ->setSharedBy($u2->getUID())
+ ->setSharedWith($u3->getUID())
+ ->setShareOwner($u1->getUID())
+ ->setShareType(IShare::TYPE_USER)
+ ->setPermissions(Constants::PERMISSION_READ);
+ $share2 = $this->provider->create($share2);
+
+ $share3 = $shareManager->newShare();
+ $share3->setNode($folder2)
+ ->setSharedBy($u2->getUID())
+ ->setShareOwner($u1->getUID())
+ ->setShareType(IShare::TYPE_LINK)
+ ->setPermissions(Constants::PERMISSION_READ);
+ $share3 = $this->provider->create($share3);
+
+ $share4 = $shareManager->newShare();
+ $share4->setNode($folder2)
+ ->setSharedBy($u1->getUID())
+ ->setSharedWith($g1->getGID())
+ ->setShareOwner($u1->getUID())
+ ->setShareType(IShare::TYPE_GROUP)
+ ->setPermissions(Constants::PERMISSION_READ);
+ $share4 = $this->provider->create($share4);
+
+ $result = $provider->getSharesInFolder($u1->getUID(), $folder1, false);
+ $this->assertCount(1, $result);
+ $shares = array_pop($result);
+ $this->assertCount(1, $shares);
+ $this->assertSame($folder2->getId(), $shares[0]->getNodeId());
+
+ $result = $provider->getSharesInFolder($u1->getUID(), $folder1, true);
+ $this->assertCount(2, $result);
+
+ $file_shares = $result[$file1->getId()];
+ $this->assertCount(1, $file_shares);
+ $this->assertSame($file1->getId(), $file_shares[0]->getNodeId());
+ $this->assertSame(IShare::TYPE_USER, $file_shares[0]->getShareType());
+
+ $folder_shares = $result[$folder2->getId()];
+ $this->assertCount(2, $folder_shares);
+ $this->assertSame($folder2->getId(), $folder_shares[0]->getNodeId());
+ $this->assertSame($folder2->getId(), $folder_shares[1]->getNodeId());
+ $this->assertSame(IShare::TYPE_LINK, $folder_shares[0]->getShareType());
+ $this->assertSame(IShare::TYPE_GROUP, $folder_shares[1]->getShareType());
+
+ $provider->delete($share1);
+ $provider->delete($share2);
+ $provider->delete($share3);
+ $provider->delete($share4);
+
+ $u1->delete();
+ $u2->delete();
+ $u3->delete();
+ $g1->delete();
+ }
+
+ public function testGetAccessListNoCurrentAccessRequired(): void {
+ $userManager = Server::get(IUserManager::class);
+ $groupManager = Server::get(IGroupManager::class);
+ $rootFolder = Server::get(IRootFolder::class);
+
+ $provider = new DefaultShareProvider(
+ $this->dbConn,
+ $userManager,
+ $groupManager,
+ $rootFolder,
+ $this->mailer,
+ $this->defaults,
+ $this->l10nFactory,
+ $this->urlGenerator,
+ $this->timeFactory,
+ $this->logger,
+ $this->shareManager,
+ $this->config,
+ );
+
+ $u1 = $userManager->createUser('testShare1', 'test');
+ $u2 = $userManager->createUser('testShare2', 'test');
+ $u3 = $userManager->createUser('testShare3', 'test');
+ $u4 = $userManager->createUser('testShare4', 'test');
+ $u5 = $userManager->createUser('testShare5', 'test');
+
+ $g1 = $groupManager->createGroup('group1');
+ $g1->addUser($u3);
+ $g1->addUser($u4);
+
+ $u1Folder = $rootFolder->getUserFolder($u1->getUID());
+ $folder1 = $u1Folder->newFolder('foo');
+ $folder2 = $folder1->newFolder('baz');
+ $file1 = $folder2->newFile('bar');
+
+ $result = $provider->getAccessList([$folder1, $folder2, $file1], false);
+ $this->assertCount(0, $result['users']);
+ $this->assertFalse($result['public']);
+
+ $shareManager = Server::get(IShareManager::class);
+ $share1 = $shareManager->newShare();
+ $share1->setNode($folder1)
+ ->setSharedBy($u1->getUID())
+ ->setSharedWith($u2->getUID())
+ ->setShareOwner($u1->getUID())
+ ->setShareType(IShare::TYPE_USER)
+ ->setPermissions(Constants::PERMISSION_ALL);
+ $share1 = $this->provider->create($share1);
+ $share1 = $provider->acceptShare($share1, $u2->getUid());
+
+ $share2 = $shareManager->newShare();
+ $share2->setNode($folder2)
+ ->setSharedBy($u2->getUID())
+ ->setSharedWith($g1->getGID())
+ ->setShareOwner($u1->getUID())
+ ->setShareType(IShare::TYPE_GROUP)
+ ->setPermissions(Constants::PERMISSION_ALL);
+ $share2 = $this->provider->create($share2);
+
+ $shareManager->deleteFromSelf($share2, $u4->getUID());
+
+ $share2 = $provider->acceptShare($share2, $u3->getUid());
+ $share2 = $provider->acceptShare($share2, $u4->getUid());
+
+ $share3 = $shareManager->newShare();
+ $share3->setNode($file1)
+ ->setSharedBy($u3->getUID())
+ ->setShareOwner($u1->getUID())
+ ->setShareType(IShare::TYPE_LINK)
+ ->setPermissions(Constants::PERMISSION_READ);
+ $share3 = $this->provider->create($share3);
+
+ $share4 = $shareManager->newShare();
+ $share4->setNode($file1)
+ ->setSharedBy($u3->getUID())
+ ->setSharedWith($u5->getUID())
+ ->setShareOwner($u1->getUID())
+ ->setShareType(IShare::TYPE_USER)
+ ->setPermissions(Constants::PERMISSION_READ);
+ $share4 = $this->provider->create($share4);
+ $share4 = $provider->acceptShare($share4, $u5->getUid());
+
+ $result = $provider->getAccessList([$folder1, $folder2, $file1], false);
+
+ $this->assertCount(4, $result['users']);
+ $this->assertContains('testShare2', $result['users']);
+ $this->assertContains('testShare3', $result['users']);
+ $this->assertContains('testShare4', $result['users']);
+ $this->assertContains('testShare5', $result['users']);
+ $this->assertTrue($result['public']);
+
+ $provider->delete($share1);
+ $provider->delete($share2);
+ $provider->delete($share3);
+ $provider->delete($share4);
+
+ $u1->delete();
+ $u2->delete();
+ $u3->delete();
+ $u4->delete();
+ $u5->delete();
+ $g1->delete();
+ }
+
+ public function testGetAccessListCurrentAccessRequired(): void {
+ $userManager = Server::get(IUserManager::class);
+ $groupManager = Server::get(IGroupManager::class);
+ $rootFolder = Server::get(IRootFolder::class);
+
+ $provider = new DefaultShareProvider(
+ $this->dbConn,
+ $userManager,
+ $groupManager,
+ $rootFolder,
+ $this->mailer,
+ $this->defaults,
+ $this->l10nFactory,
+ $this->urlGenerator,
+ $this->timeFactory,
+ $this->logger,
+ $this->shareManager,
+ $this->config,
+ );
+
+ $u1 = $userManager->createUser('testShare1', 'test');
+ $u2 = $userManager->createUser('testShare2', 'test');
+ $u3 = $userManager->createUser('testShare3', 'test');
+ $u4 = $userManager->createUser('testShare4', 'test');
+ $u5 = $userManager->createUser('testShare5', 'test');
+
+ $g1 = $groupManager->createGroup('group1');
+ $g1->addUser($u3);
+ $g1->addUser($u4);
+
+ $u1Folder = $rootFolder->getUserFolder($u1->getUID());
+ $folder1 = $u1Folder->newFolder('foo');
+ $folder2 = $folder1->newFolder('baz');
+ $file1 = $folder2->newFile('bar');
+
+ $result = $provider->getAccessList([$folder1, $folder2, $file1], false);
+ $this->assertCount(0, $result['users']);
+ $this->assertFalse($result['public']);
+
+ $shareManager = Server::get(IShareManager::class);
+ $share1 = $shareManager->newShare();
+ $share1->setNode($folder1)
+ ->setSharedBy($u1->getUID())
+ ->setSharedWith($u2->getUID())
+ ->setShareOwner($u1->getUID())
+ ->setShareType(IShare::TYPE_USER)
+ ->setPermissions(Constants::PERMISSION_ALL);
+ $share1 = $this->provider->create($share1);
+ $share1 = $provider->acceptShare($share1, $u2->getUid());
+
+ $share2 = $shareManager->newShare();
+ $share2->setNode($folder2)
+ ->setSharedBy($u2->getUID())
+ ->setSharedWith($g1->getGID())
+ ->setShareOwner($u1->getUID())
+ ->setShareType(IShare::TYPE_GROUP)
+ ->setPermissions(Constants::PERMISSION_ALL);
+ $share2 = $this->provider->create($share2);
+ $share2 = $provider->acceptShare($share2, $u3->getUid());
+ $share2 = $provider->acceptShare($share2, $u4->getUid());
+
+ $shareManager->deleteFromSelf($share2, $u4->getUID());
+
+ $share3 = $shareManager->newShare();
+ $share3->setNode($file1)
+ ->setSharedBy($u3->getUID())
+ ->setShareOwner($u1->getUID())
+ ->setShareType(IShare::TYPE_LINK)
+ ->setPermissions(Constants::PERMISSION_READ);
+ $share3 = $this->provider->create($share3);
+
+ $share4 = $shareManager->newShare();
+ $share4->setNode($file1)
+ ->setSharedBy($u3->getUID())
+ ->setSharedWith($u5->getUID())
+ ->setShareOwner($u1->getUID())
+ ->setShareType(IShare::TYPE_USER)
+ ->setPermissions(Constants::PERMISSION_READ);
+ $share4 = $this->provider->create($share4);
+ $share4 = $provider->acceptShare($share4, $u5->getUid());
+
+ $result = $provider->getAccessList([$folder1, $folder2, $file1], true);
+
+ $this->assertCount(3, $result['users']);
+ $this->assertArrayHasKey('testShare2', $result['users']);
+ $this->assertArrayHasKey('testShare3', $result['users']);
+ $this->assertArrayHasKey('testShare5', $result['users']);
+ $this->assertTrue($result['public']);
+
+ $provider->delete($share1);
+ $provider->delete($share2);
+ $provider->delete($share3);
+ $provider->delete($share4);
+
+ $u1->delete();
+ $u2->delete();
+ $u3->delete();
+ $u4->delete();
+ $u5->delete();
+ $g1->delete();
+ }
+
+ public function testGetAllShares(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'share_with' => $qb->expr()->literal('sharedWith1'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner1'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy1'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(42),
+ 'file_target' => $qb->expr()->literal('myTarget1'),
+ 'permissions' => $qb->expr()->literal(13),
+ ]);
+ $qb->execute();
+
+ $id1 = $qb->getLastInsertId();
+
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_GROUP),
+ 'share_with' => $qb->expr()->literal('sharedWith2'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner2'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy2'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(43),
+ 'file_target' => $qb->expr()->literal('myTarget2'),
+ 'permissions' => $qb->expr()->literal(14),
+ ]);
+ $qb->execute();
+
+ $id2 = $qb->getLastInsertId();
+
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_LINK),
+ 'token' => $qb->expr()->literal('token3'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner3'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy3'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(44),
+ 'file_target' => $qb->expr()->literal('myTarget3'),
+ 'permissions' => $qb->expr()->literal(15),
+ ]);
+ $qb->execute();
+
+ $id3 = $qb->getLastInsertId();
+
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_EMAIL),
+ 'share_with' => $qb->expr()->literal('shareOwner4'),
+ 'token' => $qb->expr()->literal('token4'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner4'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy4'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(45),
+ 'file_target' => $qb->expr()->literal('myTarget4'),
+ 'permissions' => $qb->expr()->literal(16),
+ ]);
+ $qb->execute();
+
+ $id4 = $qb->getLastInsertId();
+
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_LINK),
+ 'token' => $qb->expr()->literal('token5'),
+ 'uid_owner' => $qb->expr()->literal('shareOwner5'),
+ 'uid_initiator' => $qb->expr()->literal('sharedBy5'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(46),
+ 'file_target' => $qb->expr()->literal('myTarget5'),
+ 'permissions' => $qb->expr()->literal(17),
+ ]);
+ $qb->execute();
+
+ $id5 = $qb->getLastInsertId();
+
+ $ownerPath1 = $this->createMock(File::class);
+ $shareOwner1Folder = $this->createMock(Folder::class);
+ $shareOwner1Folder->method('getFirstNodeById')->willReturn($ownerPath1);
+
+ $ownerPath2 = $this->createMock(File::class);
+ $shareOwner2Folder = $this->createMock(Folder::class);
+ $shareOwner2Folder->method('getFirstNodeById')->willReturn($ownerPath2);
+
+ $ownerPath3 = $this->createMock(File::class);
+ $shareOwner3Folder = $this->createMock(Folder::class);
+ $shareOwner3Folder->method('getFirstNodeById')->willReturn($ownerPath3);
+
+ $ownerPath4 = $this->createMock(File::class);
+ $shareOwner4Folder = $this->createMock(Folder::class);
+ $shareOwner4Folder->method('getFirstNodeById')->willReturn($ownerPath4);
+
+ $ownerPath5 = $this->createMock(File::class);
+ $shareOwner5Folder = $this->createMock(Folder::class);
+ $shareOwner5Folder->method('getFirstNodeById')->willReturn($ownerPath5);
+
+ $this->rootFolder
+ ->method('getUserFolder')
+ ->willReturnMap(
+ [
+ ['shareOwner1', $shareOwner1Folder],
+ ['shareOwner2', $shareOwner2Folder],
+ ['shareOwner3', $shareOwner3Folder],
+ ['shareOwner4', $shareOwner4Folder],
+ ['shareOwner5', $shareOwner5Folder],
+ ]
+ );
+
+ $shares = iterator_to_array($this->provider->getAllShares());
+ $this->assertEquals(4, count($shares));
+
+ $share = $shares[0];
+
+ // We fetch the node so the root folder is eventually called
+
+ $this->assertEquals($id1, $share->getId());
+ $this->assertEquals(IShare::TYPE_USER, $share->getShareType());
+ $this->assertEquals('sharedWith1', $share->getSharedWith());
+ $this->assertEquals('sharedBy1', $share->getSharedBy());
+ $this->assertEquals('shareOwner1', $share->getShareOwner());
+ $this->assertEquals($ownerPath1, $share->getNode());
+ $this->assertEquals(13, $share->getPermissions());
+ $this->assertEquals(null, $share->getToken());
+ $this->assertEquals('myTarget1', $share->getTarget());
+
+ $share = $shares[1];
+
+ $this->assertEquals($id2, $share->getId());
+ $this->assertEquals(IShare::TYPE_GROUP, $share->getShareType());
+ $this->assertEquals('sharedWith2', $share->getSharedWith());
+ $this->assertEquals('sharedBy2', $share->getSharedBy());
+ $this->assertEquals('shareOwner2', $share->getShareOwner());
+ $this->assertEquals($ownerPath2, $share->getNode());
+ $this->assertEquals(14, $share->getPermissions());
+ $this->assertEquals(null, $share->getToken());
+ $this->assertEquals('myTarget2', $share->getTarget());
+
+ $share = $shares[2];
+
+ $this->assertEquals($id3, $share->getId());
+ $this->assertEquals(IShare::TYPE_LINK, $share->getShareType());
+ $this->assertEquals(null, $share->getSharedWith());
+ $this->assertEquals('sharedBy3', $share->getSharedBy());
+ $this->assertEquals('shareOwner3', $share->getShareOwner());
+ $this->assertEquals($ownerPath3, $share->getNode());
+ $this->assertEquals(15, $share->getPermissions());
+ $this->assertEquals('token3', $share->getToken());
+ $this->assertEquals('myTarget3', $share->getTarget());
+
+ $share = $shares[3];
+
+ $this->assertEquals($id5, $share->getId());
+ $this->assertEquals(IShare::TYPE_LINK, $share->getShareType());
+ $this->assertEquals(null, $share->getSharedWith());
+ $this->assertEquals('sharedBy5', $share->getSharedBy());
+ $this->assertEquals('shareOwner5', $share->getShareOwner());
+ $this->assertEquals($ownerPath5, $share->getNode());
+ $this->assertEquals(17, $share->getPermissions());
+ $this->assertEquals('token5', $share->getToken());
+ $this->assertEquals('myTarget5', $share->getTarget());
+ }
+
+
+ public function testGetSharesByPath(): void {
+ $qb = $this->dbConn->getQueryBuilder();
+
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_USER),
+ 'uid_owner' => $qb->expr()->literal('user1'),
+ 'uid_initiator' => $qb->expr()->literal('user1'),
+ 'share_with' => $qb->expr()->literal('user2'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(1),
+ ]);
+ $qb->execute();
+
+ $id1 = $qb->getLastInsertId();
+
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_GROUP),
+ 'uid_owner' => $qb->expr()->literal('user1'),
+ 'uid_initiator' => $qb->expr()->literal('user1'),
+ 'share_with' => $qb->expr()->literal('user2'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(1),
+ ]);
+ $qb->execute();
+
+ $id2 = $qb->getLastInsertId();
+
+ $qb->insert('share')
+ ->values([
+ 'share_type' => $qb->expr()->literal(IShare::TYPE_LINK),
+ 'uid_owner' => $qb->expr()->literal('user1'),
+ 'uid_initiator' => $qb->expr()->literal('user1'),
+ 'share_with' => $qb->expr()->literal('user2'),
+ 'item_type' => $qb->expr()->literal('file'),
+ 'file_source' => $qb->expr()->literal(1),
+ ]);
+ $qb->execute();
+
+ $id3 = $qb->getLastInsertId();
+
+ $ownerPath1 = $this->createMock(File::class);
+ $shareOwner1Folder = $this->createMock(Folder::class);
+ $shareOwner1Folder->method('getFirstNodeById')->willReturn($ownerPath1);
+
+ $ownerPath2 = $this->createMock(File::class);
+ $shareOwner2Folder = $this->createMock(Folder::class);
+ $shareOwner2Folder->method('getFirstNodeById')->willReturn($ownerPath2);
+
+ $ownerPath3 = $this->createMock(File::class);
+ $shareOwner3Folder = $this->createMock(Folder::class);
+ $shareOwner3Folder->method('getFirstNodeById')->willReturn($ownerPath3);
+
+ $this->rootFolder
+ ->method('getUserFolder')
+ ->willReturnMap(
+ [
+ ['shareOwner1', $shareOwner1Folder],
+ ['shareOwner2', $shareOwner2Folder],
+ ['shareOwner3', $shareOwner3Folder],
+ ]
+ );
+
+ $node = $this->createMock(Node::class);
+ $node
+ ->expects($this->once())
+ ->method('getId')
+ ->willReturn(1);
+
+ $shares = $this->provider->getSharesByPath($node);
+ $this->assertCount(3, $shares);
+
+ $this->assertEquals($id1, $shares[0]->getId());
+ $this->assertEquals(IShare::TYPE_USER, $shares[0]->getShareType());
+
+ $this->assertEquals($id2, $shares[1]->getId());
+ $this->assertEquals(IShare::TYPE_GROUP, $shares[1]->getShareType());
+
+ $this->assertEquals($id3, $shares[2]->getId());
+ $this->assertEquals(IShare::TYPE_LINK, $shares[2]->getShareType());
+ }
+}
diff --git a/tests/lib/Share20/LegacyHooksTest.php b/tests/lib/Share20/LegacyHooksTest.php
new file mode 100644
index 00000000000..2ce72b3fc1c
--- /dev/null
+++ b/tests/lib/Share20/LegacyHooksTest.php
@@ -0,0 +1,363 @@
+<?php
+
+/**
+ * SPDX-FileCopyrightText: 2017 Nextcloud GmbH and Nextcloud contributors
+ * SPDX-License-Identifier: AGPL-3.0-or-later
+ */
+
+namespace Test\Share20;
+
+use OC\EventDispatcher\EventDispatcher;
+use OC\Share20\LegacyHooks;
+use OC\Share20\Manager;
+use OCP\Constants;
+use OCP\EventDispatcher\IEventDispatcher;
+use OCP\Files\Cache\ICacheEntry;
+use OCP\Files\File;
+use OCP\IServerContainer;
+use OCP\Server;
+use OCP\Share\Events\BeforeShareCreatedEvent;
+use OCP\Share\Events\BeforeShareDeletedEvent;
+use OCP\Share\Events\ShareCreatedEvent;
+use OCP\Share\Events\ShareDeletedEvent;
+use OCP\Share\Events\ShareDeletedFromSelfEvent;
+use OCP\Share\IManager as IShareManager;
+use OCP\Share\IShare;
+use OCP\Util;
+use Psr\Log\LoggerInterface;
+use Test\TestCase;
+
+class Dummy {
+ public function postShare() {
+ }
+ public function preShare() {
+ }
+ public function postFromSelf() {
+ }
+ public function post() {
+ }
+ public function pre() {
+ }
+}
+
+class LegacyHooksTest extends TestCase {
+ /** @var LegacyHooks */
+ private $hooks;
+
+ /** @var IEventDispatcher */
+ private $eventDispatcher;
+
+ /** @var Manager */
+ private $manager;
+
+ protected function setUp(): void {
+ parent::setUp();
+
+ $symfonyDispatcher = new \Symfony\Component\EventDispatcher\EventDispatcher();
+ $logger = $this->createMock(LoggerInterface::class);
+ $this->eventDispatcher = new EventDispatcher($symfonyDispatcher, Server::get(IServerContainer::class), $logger);
+ $this->hooks = new LegacyHooks($this->eventDispatcher);
+ $this->manager = Server::get(IShareManager::class);
+ }
+
+ public function testPreUnshare(): void {
+ $path = $this->createMock(File::class);
+ $path->method('getId')->willReturn(1);
+
+ $info = $this->createMock(ICacheEntry::class);
+ $info->method('getMimeType')->willReturn('text/plain');
+
+ $share = $this->manager->newShare();
+ $share->setId(42)
+ ->setProviderId('prov')
+ ->setShareType(IShare::TYPE_USER)
+ ->setSharedWith('awesomeUser')
+ ->setSharedBy('sharedBy')
+ ->setNode($path)
+ ->setTarget('myTarget')
+ ->setNodeCacheEntry($info);
+
+ $hookListner = $this->getMockBuilder(Dummy::class)->onlyMethods(['pre'])->getMock();
+ Util::connectHook('OCP\Share', 'pre_unshare', $hookListner, 'pre');
+
+ $hookListnerExpectsPre = [
+ 'id' => 42,
+ 'itemType' => 'file',
+ 'itemSource' => 1,
+ 'shareType' => IShare::TYPE_USER,
+ 'shareWith' => 'awesomeUser',
+ 'itemparent' => null,
+ 'uidOwner' => 'sharedBy',
+ 'fileSource' => 1,
+ 'fileTarget' => 'myTarget',
+ ];
+
+ $hookListner
+ ->expects($this->exactly(1))
+ ->method('pre')
+ ->with($hookListnerExpectsPre);
+
+ $event = new BeforeShareDeletedEvent($share);
+ $this->eventDispatcher->dispatchTyped($event);
+ }
+
+ public function testPostUnshare(): void {
+ $path = $this->createMock(File::class);
+ $path->method('getId')->willReturn(1);
+
+ $info = $this->createMock(ICacheEntry::class);
+ $info->method('getMimeType')->willReturn('text/plain');
+
+ $share = $this->manager->newShare();
+ $share->setId(42)
+ ->setProviderId('prov')
+ ->setShareType(IShare::TYPE_USER)
+ ->setSharedWith('awesomeUser')
+ ->setSharedBy('sharedBy')
+ ->setNode($path)
+ ->setTarget('myTarget')
+ ->setNodeCacheEntry($info);
+
+ $hookListner = $this->getMockBuilder(Dummy::class)->onlyMethods(['post'])->getMock();
+ Util::connectHook('OCP\Share', 'post_unshare', $hookListner, 'post');
+
+ $hookListnerExpectsPost = [
+ 'id' => 42,
+ 'itemType' => 'file',
+ 'itemSource' => 1,
+ 'shareType' => IShare::TYPE_USER,
+ 'shareWith' => 'awesomeUser',
+ 'itemparent' => null,
+ 'uidOwner' => 'sharedBy',
+ 'fileSource' => 1,
+ 'fileTarget' => 'myTarget',
+ 'deletedShares' => [
+ [
+ 'id' => 42,
+ 'itemType' => 'file',
+ 'itemSource' => 1,
+ 'shareType' => IShare::TYPE_USER,
+ 'shareWith' => 'awesomeUser',
+ 'itemparent' => null,
+ 'uidOwner' => 'sharedBy',
+ 'fileSource' => 1,
+ 'fileTarget' => 'myTarget',
+ ],
+ ],
+ ];
+
+ $hookListner
+ ->expects($this->exactly(1))
+ ->method('post')
+ ->with($hookListnerExpectsPost);
+
+ $event = new ShareDeletedEvent($share);
+ $this->eventDispatcher->dispatchTyped($event);
+ }
+
+ public function testPostUnshareFromSelf(): void {
+ $path = $this->createMock(File::class);
+ $path->method('getId')->willReturn(1);
+
+ $info = $this->createMock(ICacheEntry::class);
+ $info->method('getMimeType')->willReturn('text/plain');
+
+ $share = $this->manager->newShare();
+ $share->setId(42)
+ ->setProviderId('prov')
+ ->setShareType(IShare::TYPE_USER)
+ ->setSharedWith('awesomeUser')
+ ->setSharedBy('sharedBy')
+ ->setNode($path)
+ ->setTarget('myTarget')
+ ->setNodeCacheEntry($info);
+
+ $hookListner = $this->getMockBuilder(Dummy::class)->onlyMethods(['postFromSelf'])->getMock();
+ Util::connectHook('OCP\Share', 'post_unshareFromSelf', $hookListner, 'postFromSelf');
+
+ $hookListnerExpectsPostFromSelf = [
+ 'id' => 42,
+ 'itemType' => 'file',
+ 'itemSource' => 1,
+ 'shareType' => IShare::TYPE_USER,
+ 'shareWith' => 'awesomeUser',
+ 'itemparent' => null,
+ 'uidOwner' => 'sharedBy',
+ 'fileSource' => 1,
+ 'fileTarget' => 'myTarget',
+ 'itemTarget' => 'myTarget',
+ 'unsharedItems' => [
+ [
+ 'id' => 42,
+ 'itemType' => 'file',
+ 'itemSource' => 1,
+ 'shareType' => IShare::TYPE_USER,
+ 'shareWith' => 'awesomeUser',
+ 'itemparent' => null,
+ 'uidOwner' => 'sharedBy',
+ 'fileSource' => 1,
+ 'fileTarget' => 'myTarget',
+ 'itemTarget' => 'myTarget',
+ ],
+ ],
+ ];
+
+ $hookListner
+ ->expects($this->exactly(1))
+ ->method('postFromSelf')
+ ->with($hookListnerExpectsPostFromSelf);
+
+ $event = new ShareDeletedFromSelfEvent($share);
+ $this->eventDispatcher->dispatchTyped($event);
+ }
+
+ public function testPreShare(): void {
+ $path = $this->createMock(File::class);
+ $path->method('getId')->willReturn(1);
+
+ $date = new \DateTime();
+
+ $share = $this->manager->newShare();
+ $share->setShareType(IShare::TYPE_LINK)
+ ->setSharedWith('awesomeUser')
+ ->setSharedBy('sharedBy')
+ ->setNode($path)
+ ->setTarget('myTarget')
+ ->setPermissions(Constants::PERMISSION_ALL)
+ ->setExpirationDate($date)
+ ->setPassword('password')
+ ->setToken('token');
+
+
+ $hookListner = $this->getMockBuilder(Dummy::class)->onlyMethods(['preShare'])->getMock();
+ Util::connectHook('OCP\Share', 'pre_shared', $hookListner, 'preShare');
+
+ $run = true;
+ $error = '';
+
+ $expected = [
+ 'itemType' => 'file',
+ 'itemSource' => 1,
+ 'shareType' => IShare::TYPE_LINK,
+ 'shareWith' => 'awesomeUser',
+ 'uidOwner' => 'sharedBy',
+ 'fileSource' => 1,
+ 'itemTarget' => 'myTarget',
+ 'permissions' => Constants::PERMISSION_ALL,
+ 'expiration' => $date,
+ 'token' => 'token',
+ 'run' => &$run,
+ 'error' => &$error,
+ ];
+
+ $hookListner
+ ->expects($this->exactly(1))
+ ->method('preShare')
+ ->with($expected);
+
+ $event = new BeforeShareCreatedEvent($share);
+ $this->eventDispatcher->dispatchTyped($event);
+ }
+
+ public function testPreShareError(): void {
+ $path = $this->createMock(File::class);
+ $path->method('getId')->willReturn(1);
+
+ $date = new \DateTime();
+
+ $share = $this->manager->newShare();
+ $share->setShareType(IShare::TYPE_LINK)
+ ->setSharedWith('awesomeUser')
+ ->setSharedBy('sharedBy')
+ ->setNode($path)
+ ->setTarget('myTarget')
+ ->setPermissions(Constants::PERMISSION_ALL)
+ ->setExpirationDate($date)
+ ->setPassword('password')
+ ->setToken('token');
+
+
+ $hookListner = $this->getMockBuilder(Dummy::class)->onlyMethods(['preShare'])->getMock();
+ Util::connectHook('OCP\Share', 'pre_shared', $hookListner, 'preShare');
+
+ $run = true;
+ $error = '';
+
+ $expected = [
+ 'itemType' => 'file',
+ 'itemSource' => 1,
+ 'shareType' => IShare::TYPE_LINK,
+ 'shareWith' => 'awesomeUser',
+ 'uidOwner' => 'sharedBy',
+ 'fileSource' => 1,
+ 'itemTarget' => 'myTarget',
+ 'permissions' => Constants::PERMISSION_ALL,
+ 'expiration' => $date,
+ 'token' => 'token',
+ 'run' => &$run,
+ 'error' => &$error,
+ ];
+
+ $hookListner
+ ->expects($this->exactly(1))
+ ->method('preShare')
+ ->with($expected)
+ ->willReturnCallback(function ($data): void {
+ $data['run'] = false;
+ $data['error'] = 'I error';
+ });
+
+ $event = new BeforeShareCreatedEvent($share);
+ $this->eventDispatcher->dispatchTyped($event);
+
+ $this->assertTrue($event->isPropagationStopped());
+ $this->assertSame('I error', $event->getError());
+ }
+
+ public function testPostShare(): void {
+ $path = $this->createMock(File::class);
+ $path->method('getId')->willReturn(1);
+
+ $date = new \DateTime();
+
+ $share = $this->manager->newShare();
+ $share->setId(42)
+ ->setShareType(IShare::TYPE_LINK)
+ ->setSharedWith('awesomeUser')
+ ->setSharedBy('sharedBy')
+ ->setNode($path)
+ ->setTarget('myTarget')
+ ->setPermissions(Constants::PERMISSION_ALL)
+ ->setExpirationDate($date)
+ ->setPassword('password')
+ ->setToken('token');
+
+
+ $hookListner = $this->getMockBuilder(Dummy::class)->onlyMethods(['postShare'])->getMock();
+ Util::connectHook('OCP\Share', 'post_shared', $hookListner, 'postShare');
+
+ $expected = [
+ 'id' => 42,
+ 'itemType' => 'file',
+ 'itemSource' => 1,
+ 'shareType' => IShare::TYPE_LINK,
+ 'shareWith' => 'awesomeUser',
+ 'uidOwner' => 'sharedBy',
+ 'fileSource' => 1,
+ 'itemTarget' => 'myTarget',
+ 'fileTarget' => 'myTarget',
+ 'permissions' => Constants::PERMISSION_ALL,
+ 'expiration' => $date,
+ 'token' => 'token',
+ 'path' => null,
+ ];
+
+ $hookListner
+ ->expects($this->exactly(1))
+ ->method('postShare')
+ ->with($expected);
+
+ $event = new ShareCreatedEvent($share);
+ $this->eventDispatcher->dispatchTyped($event);
+ }
+}
diff --git a/tests/lib/Share20/ManagerTest.php b/tests/lib/Share20/ManagerTest.php
new file mode 100644
index 00000000000..0e37934786a
--- /dev/null
+++ b/tests/lib/Share20/ManagerTest.php
@@ -0,0 +1,4936 @@
+<?php
+
+/**
+ * SPDX-FileCopyrightText: 2016-2024 Nextcloud GmbH and Nextcloud contributors
+ * SPDX-FileCopyrightText: 2016 ownCloud, Inc.
+ * SPDX-License-Identifier: AGPL-3.0-only
+ */
+
+namespace Test\Share20;
+
+use DateTimeZone;
+use OC\Files\Mount\MoveableMount;
+use OC\Files\Utils\PathHelper;
+use OC\KnownUser\KnownUserService;
+use OC\Share20\DefaultShareProvider;
+use OC\Share20\Exception\ProviderException;
+use OC\Share20\Manager;
+use OC\Share20\Share;
+use OC\Share20\ShareDisableChecker;
+use OCP\Constants;
+use OCP\EventDispatcher\Event;
+use OCP\EventDispatcher\IEventDispatcher;
+use OCP\Files\File;
+use OCP\Files\Folder;
+use OCP\Files\IRootFolder;
+use OCP\Files\Mount\IMountManager;
+use OCP\Files\Mount\IMountPoint;
+use OCP\Files\Mount\IShareOwnerlessMount;
+use OCP\Files\Node;
+use OCP\Files\Storage\IStorage;
+use OCP\HintException;
+use OCP\IAppConfig;
+use OCP\IConfig;
+use OCP\IDateTimeZone;
+use OCP\IGroup;
+use OCP\IGroupManager;
+use OCP\IL10N;
+use OCP\IServerContainer;
+use OCP\IURLGenerator;
+use OCP\IUser;
+use OCP\IUserManager;
+use OCP\IUserSession;
+use OCP\L10N\IFactory;
+use OCP\Mail\IMailer;
+use OCP\Security\Events\ValidatePasswordPolicyEvent;
+use OCP\Security\IHasher;
+use OCP\Security\ISecureRandom;
+use OCP\Share\Events\BeforeShareCreatedEvent;
+use OCP\Share\Events\BeforeShareDeletedEvent;
+use OCP\Share\Events\ShareCreatedEvent;
+use OCP\Share\Events\ShareDeletedEvent;
+use OCP\Share\Events\ShareDeletedFromSelfEvent;
+use OCP\Share\Exceptions\AlreadySharedException;
+use OCP\Share\Exceptions\GenericShareException;
+use OCP\Share\Exceptions\ShareNotFound;
+use OCP\Share\IManager;
+use OCP\Share\IProviderFactory;
+use OCP\Share\IShare;
+use OCP\Share\IShareProvider;
+use OCP\Share\IShareProviderSupportsAllSharesInFolder;
+use OCP\Util;
+use PHPUnit\Framework\MockObject\MockBuilder;
+use PHPUnit\Framework\MockObject\MockObject;
+use Psr\Log\LoggerInterface;
+
+class DummyShareManagerListener {
+ public function post() {
+ }
+ public function listener() {
+ }
+}
+
+/**
+ * Class ManagerTest
+ *
+ * @package Test\Share20
+ * @group DB
+ */
+class ManagerTest extends \Test\TestCase {
+ /** @var Manager */
+ protected $manager;
+ /** @var LoggerInterface|MockObject */
+ protected $logger;
+ /** @var IConfig|MockObject */
+ protected $config;
+ /** @var ISecureRandom|MockObject */
+ protected $secureRandom;
+ /** @var IHasher|MockObject */
+ protected $hasher;
+ /** @var IShareProvider|MockObject */
+ protected $defaultProvider;
+ /** @var IMountManager|MockObject */
+ protected $mountManager;
+ /** @var IGroupManager|MockObject */
+ protected $groupManager;
+ /** @var IL10N|MockObject */
+ protected $l;
+ /** @var IFactory|MockObject */
+ protected $l10nFactory;
+ /** @var DummyFactory */
+ protected $factory;
+ /** @var IUserManager|MockObject */
+ protected $userManager;
+ /** @var IRootFolder | MockObject */
+ protected $rootFolder;
+ /** @var IEventDispatcher|MockObject */
+ protected $dispatcher;
+ /** @var IMailer|MockObject */
+ protected $mailer;
+ /** @var IURLGenerator|MockObject */
+ protected $urlGenerator;
+ /** @var \OC_Defaults|MockObject */
+ protected $defaults;
+ /** @var IUserSession|MockObject */
+ protected $userSession;
+ /** @var KnownUserService|MockObject */
+ protected $knownUserService;
+ /** @var ShareDisableChecker|MockObject */
+ protected $shareDisabledChecker;
+ private DateTimeZone $timezone;
+ /** @var IDateTimeZone|MockObject */
+ protected $dateTimeZone;
+ /** @var IAppConfig|MockObject */
+ protected $appConfig;
+
+ protected function setUp(): void {
+ $this->logger = $this->createMock(LoggerInterface::class);
+ $this->config = $this->createMock(IConfig::class);
+ $this->secureRandom = $this->createMock(ISecureRandom::class);
+ $this->hasher = $this->createMock(IHasher::class);
+ $this->mountManager = $this->createMock(IMountManager::class);
+ $this->groupManager = $this->createMock(IGroupManager::class);
+ $this->userManager = $this->createMock(IUserManager::class);
+ $this->rootFolder = $this->createMock(IRootFolder::class);
+ $this->mailer = $this->createMock(IMailer::class);
+ $this->urlGenerator = $this->createMock(IURLGenerator::class);
+ $this->defaults = $this->createMock(\OC_Defaults::class);
+ $this->dispatcher = $this->createMock(IEventDispatcher::class);
+ $this->userSession = $this->createMock(IUserSession::class);
+ $this->knownUserService = $this->createMock(KnownUserService::class);
+
+ $this->shareDisabledChecker = new ShareDisableChecker($this->config, $this->userManager, $this->groupManager);
+ $this->dateTimeZone = $this->createMock(IDateTimeZone::class);
+ $this->timezone = new \DateTimeZone('Pacific/Auckland');
+ $this->dateTimeZone->method('getTimeZone')->willReturnCallback(fn () => $this->timezone);
+
+ $this->appConfig = $this->createMock(IAppConfig::class);
+
+ $this->l10nFactory = $this->createMock(IFactory::class);
+ $this->l = $this->createMock(IL10N::class);
+ $this->l->method('t')
+ ->willReturnCallback(function ($text, $parameters = []) {
+ return vsprintf($text, $parameters);
+ });
+ $this->l->method('n')
+ ->willReturnCallback(function ($singular, $plural, $count, $parameters = []) {
+ return vsprintf(str_replace('%n', $count, ($count === 1) ? $singular : $plural), $parameters);
+ });
+ $this->l10nFactory->method('get')->willReturn($this->l);
+
+ $this->factory = new DummyFactory(\OC::$server);
+
+ $this->manager = $this->createManager($this->factory);
+
+ $this->defaultProvider = $this->createMock(DefaultShareProvider::class);
+ $this->defaultProvider->method('identifier')->willReturn('default');
+ $this->factory->setProvider($this->defaultProvider);
+ }
+
+ private function createManager(IProviderFactory $factory): Manager {
+ return new Manager(
+ $this->logger,
+ $this->config,
+ $this->secureRandom,
+ $this->hasher,
+ $this->mountManager,
+ $this->groupManager,
+ $this->l10nFactory,
+ $factory,
+ $this->userManager,
+ $this->rootFolder,
+ $this->mailer,
+ $this->urlGenerator,
+ $this->defaults,
+ $this->dispatcher,
+ $this->userSession,
+ $this->knownUserService,
+ $this->shareDisabledChecker,
+ $this->dateTimeZone,
+ $this->appConfig,
+ );
+ }
+
+ /**
+ * @return MockBuilder
+ */
+ private function createManagerMock() {
+ return $this->getMockBuilder(Manager::class)
+ ->setConstructorArgs([
+ $this->logger,
+ $this->config,
+ $this->secureRandom,
+ $this->hasher,
+ $this->mountManager,
+ $this->groupManager,
+ $this->l10nFactory,
+ $this->factory,
+ $this->userManager,
+ $this->rootFolder,
+ $this->mailer,
+ $this->urlGenerator,
+ $this->defaults,
+ $this->dispatcher,
+ $this->userSession,
+ $this->knownUserService,
+ $this->shareDisabledChecker,
+ $this->dateTimeZone,
+ $this->appConfig,
+ ]);
+ }
+
+ private function createFolderMock(string $folderPath): MockObject&Folder {
+ $folder = $this->createMock(Folder::class);
+ $folder->method('getPath')->willReturn($folderPath);
+ $folder->method('getRelativePath')->willReturnCallback(
+ fn (string $path): ?string => PathHelper::getRelativePath($folderPath, $path)
+ );
+ return $folder;
+ }
+
+ public function testDeleteNoShareId(): void {
+ $this->expectException(\InvalidArgumentException::class);
+
+ $share = $this->manager->newShare();
+
+ $this->manager->deleteShare($share);
+ }
+
+ public static function dataTestDelete(): array {
+ return [
+ [IShare::TYPE_USER, 'sharedWithUser'],
+ [IShare::TYPE_GROUP, 'sharedWithGroup'],
+ [IShare::TYPE_LINK, ''],
+ [IShare::TYPE_REMOTE, 'foo@bar.com'],
+ ];
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('dataTestDelete')]
+ public function testDelete($shareType, $sharedWith): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods(['getShareById', 'deleteChildren', 'promoteReshares'])
+ ->getMock();
+
+ $manager->method('deleteChildren')->willReturn([]);
+
+ $path = $this->createMock(File::class);
+ $path->method('getId')->willReturn(1);
+
+ $share = $this->manager->newShare();
+ $share->setId(42)
+ ->setProviderId('prov')
+ ->setShareType($shareType)
+ ->setSharedWith($sharedWith)
+ ->setSharedBy('sharedBy')
+ ->setNode($path)
+ ->setTarget('myTarget');
+
+ $manager->expects($this->once())->method('deleteChildren')->with($share);
+ $manager->expects($this->once())->method('promoteReshares')->with($share);
+
+ $this->defaultProvider
+ ->expects($this->once())
+ ->method('delete')
+ ->with($share);
+
+ $calls = [
+ BeforeShareDeletedEvent::class,
+ ShareDeletedEvent::class,
+ ];
+ $this->dispatcher->expects($this->exactly(2))
+ ->method('dispatchTyped')
+ ->willReturnCallback(function ($event) use (&$calls, $share): void {
+ $expected = array_shift($calls);
+ $this->assertInstanceOf($expected, $event);
+ $this->assertEquals($share, $event->getShare());
+ });
+
+ $manager->deleteShare($share);
+ }
+
+ public function testDeleteLazyShare(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods(['getShareById', 'deleteChildren', 'promoteReshares'])
+ ->getMock();
+
+ $manager->method('deleteChildren')->willReturn([]);
+
+ $share = $this->manager->newShare();
+ $share->setId(42)
+ ->setProviderId('prov')
+ ->setShareType(IShare::TYPE_USER)
+ ->setSharedWith('sharedWith')
+ ->setSharedBy('sharedBy')
+ ->setShareOwner('shareOwner')
+ ->setTarget('myTarget')
+ ->setNodeId(1)
+ ->setNodeType('file');
+
+ $this->rootFolder->expects($this->never())->method($this->anything());
+
+ $manager->expects($this->once())->method('deleteChildren')->with($share);
+ $manager->expects($this->once())->method('promoteReshares')->with($share);
+
+ $this->defaultProvider
+ ->expects($this->once())
+ ->method('delete')
+ ->with($share);
+
+ $calls = [
+ BeforeShareDeletedEvent::class,
+ ShareDeletedEvent::class,
+ ];
+ $this->dispatcher->expects($this->exactly(2))
+ ->method('dispatchTyped')
+ ->willReturnCallback(function ($event) use (&$calls, $share): void {
+ $expected = array_shift($calls);
+ $this->assertInstanceOf($expected, $event);
+ $this->assertEquals($share, $event->getShare());
+ });
+
+ $manager->deleteShare($share);
+ }
+
+ public function testDeleteNested(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods(['getShareById', 'promoteReshares'])
+ ->getMock();
+
+ $path = $this->createMock(File::class);
+ $path->method('getId')->willReturn(1);
+
+ $share1 = $this->manager->newShare();
+ $share1->setId(42)
+ ->setProviderId('prov')
+ ->setShareType(IShare::TYPE_USER)
+ ->setSharedWith('sharedWith1')
+ ->setSharedBy('sharedBy1')
+ ->setNode($path)
+ ->setTarget('myTarget1');
+
+ $share2 = $this->manager->newShare();
+ $share2->setId(43)
+ ->setProviderId('prov')
+ ->setShareType(IShare::TYPE_GROUP)
+ ->setSharedWith('sharedWith2')
+ ->setSharedBy('sharedBy2')
+ ->setNode($path)
+ ->setTarget('myTarget2')
+ ->setParent(42);
+
+ $share3 = $this->manager->newShare();
+ $share3->setId(44)
+ ->setProviderId('prov')
+ ->setShareType(IShare::TYPE_LINK)
+ ->setSharedBy('sharedBy3')
+ ->setNode($path)
+ ->setTarget('myTarget3')
+ ->setParent(43);
+
+ $this->defaultProvider
+ ->method('getChildren')
+ ->willReturnMap([
+ [$share1, [$share2]],
+ [$share2, [$share3]],
+ [$share3, []],
+ ]);
+
+ $deleteCalls = [
+ $share3,
+ $share2,
+ $share1,
+ ];
+ $this->defaultProvider->expects($this->exactly(3))
+ ->method('delete')
+ ->willReturnCallback(function ($share) use (&$deleteCalls): void {
+ $expected = array_shift($deleteCalls);
+ $this->assertEquals($expected, $share);
+ });
+
+ $dispatchCalls = [
+ [BeforeShareDeletedEvent::class, $share1],
+ [BeforeShareDeletedEvent::class, $share2],
+ [BeforeShareDeletedEvent::class, $share3],
+ [ShareDeletedEvent::class, $share3],
+ [ShareDeletedEvent::class, $share2],
+ [ShareDeletedEvent::class, $share1],
+ ];
+ $this->dispatcher->expects($this->exactly(6))
+ ->method('dispatchTyped')
+ ->willReturnCallback(function ($event) use (&$dispatchCalls): void {
+ $expected = array_shift($dispatchCalls);
+ $this->assertInstanceOf($expected[0], $event);
+ $this->assertEquals($expected[1]->getId(), $event->getShare()->getId());
+ });
+
+ $manager->deleteShare($share1);
+ }
+
+ public function testDeleteFromSelf(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods(['getShareById'])
+ ->getMock();
+
+ $recipientId = 'unshareFrom';
+ $share = $this->manager->newShare();
+ $share->setId(42)
+ ->setProviderId('prov')
+ ->setShareType(IShare::TYPE_USER)
+ ->setSharedWith('sharedWith')
+ ->setSharedBy('sharedBy')
+ ->setShareOwner('shareOwner')
+ ->setTarget('myTarget')
+ ->setNodeId(1)
+ ->setNodeType('file');
+
+ $this->defaultProvider
+ ->expects($this->once())
+ ->method('deleteFromSelf')
+ ->with($share, $recipientId);
+
+ $this->dispatcher->expects($this->once())
+ ->method('dispatchTyped')
+ ->with(
+ $this->callBack(function (ShareDeletedFromSelfEvent $e) use ($share) {
+ return $e->getShare() === $share;
+ })
+ );
+
+ $manager->deleteFromSelf($share, $recipientId);
+ }
+
+ public function testDeleteChildren(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods(['deleteShare'])
+ ->getMock();
+
+ $share = $this->createMock(IShare::class);
+ $share->method('getShareType')->willReturn(IShare::TYPE_USER);
+
+ $child1 = $this->createMock(IShare::class);
+ $child1->method('getShareType')->willReturn(IShare::TYPE_USER);
+ $child2 = $this->createMock(IShare::class);
+ $child2->method('getShareType')->willReturn(IShare::TYPE_USER);
+ $child3 = $this->createMock(IShare::class);
+ $child3->method('getShareType')->willReturn(IShare::TYPE_USER);
+
+ $shares = [
+ $child1,
+ $child2,
+ $child3,
+ ];
+
+ $this->defaultProvider
+ ->expects($this->exactly(4))
+ ->method('getChildren')
+ ->willReturnCallback(function ($_share) use ($share, $shares) {
+ if ($_share === $share) {
+ return $shares;
+ }
+ return [];
+ });
+
+ $calls = [
+ $child1,
+ $child2,
+ $child3,
+ ];
+ $this->defaultProvider->expects($this->exactly(3))
+ ->method('delete')
+ ->willReturnCallback(function ($share) use (&$calls): void {
+ $expected = array_shift($calls);
+ $this->assertEquals($expected, $share);
+ });
+
+ $result = self::invokePrivate($manager, 'deleteChildren', [$share]);
+ $this->assertSame($shares, $result);
+ }
+
+ public function testPromoteReshareFile(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods(['updateShare', 'getSharesInFolder', 'generalCreateChecks'])
+ ->getMock();
+
+ $file = $this->createMock(File::class);
+
+ $share = $this->createMock(IShare::class);
+ $share->method('getShareType')->willReturn(IShare::TYPE_USER);
+ $share->method('getNodeType')->willReturn('folder');
+ $share->method('getSharedWith')->willReturn('userB');
+ $share->method('getNode')->willReturn($file);
+
+ $reShare = $this->createMock(IShare::class);
+ $reShare->method('getShareType')->willReturn(IShare::TYPE_USER);
+ $reShare->method('getSharedBy')->willReturn('userB');
+ $reShare->method('getSharedWith')->willReturn('userC');
+ $reShare->method('getNode')->willReturn($file);
+
+ $this->defaultProvider->method('getSharesBy')
+ ->willReturnCallback(function ($userId, $shareType, $node, $reshares, $limit, $offset) use ($reShare, $file) {
+ $this->assertEquals($file, $node);
+ if ($shareType === IShare::TYPE_USER) {
+ return match($userId) {
+ 'userB' => [$reShare],
+ };
+ } else {
+ return [];
+ }
+ });
+ $manager->method('generalCreateChecks')->willThrowException(new GenericShareException());
+
+ $manager->expects($this->exactly(1))->method('updateShare')->with($reShare);
+
+ self::invokePrivate($manager, 'promoteReshares', [$share]);
+ }
+
+ public function testPromoteReshare(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods(['updateShare', 'getSharesInFolder', 'generalCreateChecks'])
+ ->getMock();
+
+ $folder = $this->createFolderMock('/path/to/folder');
+
+ $subFolder = $this->createFolderMock('/path/to/folder/sub');
+
+ $otherFolder = $this->createFolderMock('/path/to/otherfolder/');
+
+ $share = $this->createMock(IShare::class);
+ $share->method('getShareType')->willReturn(IShare::TYPE_USER);
+ $share->method('getNodeType')->willReturn('folder');
+ $share->method('getSharedWith')->willReturn('userB');
+ $share->method('getNode')->willReturn($folder);
+
+ $reShare = $this->createMock(IShare::class);
+ $reShare->method('getShareType')->willReturn(IShare::TYPE_USER);
+ $reShare->method('getSharedBy')->willReturn('userB');
+ $reShare->method('getSharedWith')->willReturn('userC');
+ $reShare->method('getNode')->willReturn($folder);
+
+ $reShareInSubFolder = $this->createMock(IShare::class);
+ $reShareInSubFolder->method('getShareType')->willReturn(IShare::TYPE_USER);
+ $reShareInSubFolder->method('getSharedBy')->willReturn('userB');
+ $reShareInSubFolder->method('getNode')->willReturn($subFolder);
+
+ $reShareInOtherFolder = $this->createMock(IShare::class);
+ $reShareInOtherFolder->method('getShareType')->willReturn(IShare::TYPE_USER);
+ $reShareInOtherFolder->method('getSharedBy')->willReturn('userB');
+ $reShareInOtherFolder->method('getNode')->willReturn($otherFolder);
+
+ $this->defaultProvider->method('getSharesBy')
+ ->willReturnCallback(function ($userId, $shareType, $node, $reshares, $limit, $offset) use ($reShare, $reShareInSubFolder, $reShareInOtherFolder) {
+ if ($shareType === IShare::TYPE_USER) {
+ return match($userId) {
+ 'userB' => [$reShare,$reShareInSubFolder,$reShareInOtherFolder],
+ };
+ } else {
+ return [];
+ }
+ });
+ $manager->method('generalCreateChecks')->willThrowException(new GenericShareException());
+
+ $calls = [
+ $reShare,
+ $reShareInSubFolder,
+ ];
+ $manager->expects($this->exactly(2))
+ ->method('updateShare')
+ ->willReturnCallback(function ($share) use (&$calls): void {
+ $expected = array_shift($calls);
+ $this->assertEquals($expected, $share);
+ });
+
+ self::invokePrivate($manager, 'promoteReshares', [$share]);
+ }
+
+ public function testPromoteReshareWhenUserHasAnotherShare(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods(['updateShare', 'getSharesInFolder', 'getSharedWith', 'generalCreateChecks'])
+ ->getMock();
+
+ $folder = $this->createFolderMock('/path/to/folder');
+
+ $share = $this->createMock(IShare::class);
+ $share->method('getShareType')->willReturn(IShare::TYPE_USER);
+ $share->method('getNodeType')->willReturn('folder');
+ $share->method('getSharedWith')->willReturn('userB');
+ $share->method('getNode')->willReturn($folder);
+
+ $reShare = $this->createMock(IShare::class);
+ $reShare->method('getShareType')->willReturn(IShare::TYPE_USER);
+ $reShare->method('getNodeType')->willReturn('folder');
+ $reShare->method('getSharedBy')->willReturn('userB');
+ $reShare->method('getNode')->willReturn($folder);
+
+ $this->defaultProvider->method('getSharesBy')->willReturn([$reShare]);
+ $manager->method('generalCreateChecks')->willReturn(true);
+
+ /* No share is promoted because generalCreateChecks does not throw */
+ $manager->expects($this->never())->method('updateShare');
+
+ self::invokePrivate($manager, 'promoteReshares', [$share]);
+ }
+
+ public function testPromoteReshareOfUsersInGroupShare(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods(['updateShare', 'getSharesInFolder', 'getSharedWith', 'generalCreateChecks'])
+ ->getMock();
+
+ $folder = $this->createFolderMock('/path/to/folder');
+
+ $userA = $this->createMock(IUser::class);
+ $userA->method('getUID')->willReturn('userA');
+
+ $share = $this->createMock(IShare::class);
+ $share->method('getShareType')->willReturn(IShare::TYPE_GROUP);
+ $share->method('getNodeType')->willReturn('folder');
+ $share->method('getSharedWith')->willReturn('Group');
+ $share->method('getNode')->willReturn($folder);
+ $share->method('getShareOwner')->willReturn($userA);
+
+ $reShare1 = $this->createMock(IShare::class);
+ $reShare1->method('getShareType')->willReturn(IShare::TYPE_USER);
+ $reShare1->method('getNodeType')->willReturn('folder');
+ $reShare1->method('getSharedBy')->willReturn('userB');
+ $reShare1->method('getNode')->willReturn($folder);
+
+ $reShare2 = $this->createMock(IShare::class);
+ $reShare2->method('getShareType')->willReturn(IShare::TYPE_USER);
+ $reShare2->method('getNodeType')->willReturn('folder');
+ $reShare2->method('getSharedBy')->willReturn('userC');
+ $reShare2->method('getNode')->willReturn($folder);
+
+ $userB = $this->createMock(IUser::class);
+ $userB->method('getUID')->willReturn('userB');
+ $userC = $this->createMock(IUser::class);
+ $userC->method('getUID')->willReturn('userC');
+ $group = $this->createMock(IGroup::class);
+ $group->method('getUsers')->willReturn([$userB, $userC]);
+ $this->groupManager->method('get')->with('Group')->willReturn($group);
+
+ $this->defaultProvider->method('getSharesBy')
+ ->willReturnCallback(function ($userId, $shareType, $node, $reshares, $limit, $offset) use ($reShare1, $reShare2) {
+ if ($shareType === IShare::TYPE_USER) {
+ return match($userId) {
+ 'userB' => [$reShare1],
+ 'userC' => [$reShare2],
+ };
+ } else {
+ return [];
+ }
+ });
+ $manager->method('generalCreateChecks')->willThrowException(new GenericShareException());
+
+ $manager->method('getSharedWith')->willReturn([]);
+
+ $calls = [
+ $reShare1,
+ $reShare2,
+ ];
+ $manager->expects($this->exactly(2))
+ ->method('updateShare')
+ ->willReturnCallback(function ($share) use (&$calls): void {
+ $expected = array_shift($calls);
+ $this->assertEquals($expected, $share);
+ });
+
+ self::invokePrivate($manager, 'promoteReshares', [$share]);
+ }
+
+ public function testGetShareById(): void {
+ $share = $this->createMock(IShare::class);
+
+ $this->defaultProvider
+ ->expects($this->once())
+ ->method('getShareById')
+ ->with(42)
+ ->willReturn($share);
+
+ $this->assertEquals($share, $this->manager->getShareById('default:42'));
+ }
+
+
+ public function testGetExpiredShareById(): void {
+ $this->expectException(ShareNotFound::class);
+
+ $manager = $this->createManagerMock()
+ ->onlyMethods(['deleteShare'])
+ ->getMock();
+
+ $date = new \DateTime();
+ $date->setTime(0, 0, 0);
+
+ $share = $this->manager->newShare();
+ $share->setExpirationDate($date)
+ ->setShareType(IShare::TYPE_LINK);
+
+ $this->defaultProvider->expects($this->once())
+ ->method('getShareById')
+ ->with('42')
+ ->willReturn($share);
+
+ $manager->expects($this->once())
+ ->method('deleteShare')
+ ->with($share);
+
+ $manager->getShareById('default:42');
+ }
+
+
+ public function testVerifyPasswordNullButEnforced(): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('Passwords are enforced for link and mail shares');
+
+ $this->config->method('getAppValue')->willReturnMap([
+ ['core', 'shareapi_enforce_links_password_excluded_groups', '', ''],
+ ]);
+
+ $this->appConfig->method('getValueBool')->willReturnMap([
+ ['core', 'shareapi_enforce_links_password', true],
+ ]);
+
+ self::invokePrivate($this->manager, 'verifyPassword', [null]);
+ }
+
+ public function testVerifyPasswordNotEnforcedGroup(): void {
+ $this->config->method('getAppValue')->willReturnMap([
+ ['core', 'shareapi_enforce_links_password_excluded_groups', '', '["admin"]'],
+ ['core', 'shareapi_enforce_links_password', 'no', 'yes'],
+ ]);
+
+ // Create admin user
+ $user = $this->createMock(IUser::class);
+ $this->userSession->method('getUser')->willReturn($user);
+ $this->groupManager->method('getUserGroupIds')->with($user)->willReturn(['admin']);
+
+ $result = self::invokePrivate($this->manager, 'verifyPassword', [null]);
+ $this->assertNull($result);
+ }
+
+ public function testVerifyPasswordNotEnforcedMultipleGroups(): void {
+ $this->config->method('getAppValue')->willReturnMap([
+ ['core', 'shareapi_enforce_links_password_excluded_groups', '', '["admin", "special"]'],
+ ['core', 'shareapi_enforce_links_password', 'no', 'yes'],
+ ]);
+
+ // Create admin user
+ $user = $this->createMock(IUser::class);
+ $this->userSession->method('getUser')->willReturn($user);
+ $this->groupManager->method('getUserGroupIds')->with($user)->willReturn(['special']);
+
+ $result = self::invokePrivate($this->manager, 'verifyPassword', [null]);
+ $this->assertNull($result);
+ }
+
+ public function testVerifyPasswordNull(): void {
+ $this->config->method('getAppValue')->willReturnMap([
+ ['core', 'shareapi_enforce_links_password_excluded_groups', '', ''],
+ ['core', 'shareapi_enforce_links_password', 'no', 'no'],
+ ]);
+
+ $result = self::invokePrivate($this->manager, 'verifyPassword', [null]);
+ $this->assertNull($result);
+ }
+
+ public function testVerifyPasswordHook(): void {
+ $this->config->method('getAppValue')->willReturnMap([
+ ['core', 'shareapi_enforce_links_password_excluded_groups', '', ''],
+ ['core', 'shareapi_enforce_links_password', 'no', 'no'],
+ ]);
+
+ $this->dispatcher->expects($this->once())->method('dispatchTyped')
+ ->willReturnCallback(function (Event $event): void {
+ $this->assertInstanceOf(ValidatePasswordPolicyEvent::class, $event);
+ /** @var ValidatePasswordPolicyEvent $event */
+ $this->assertSame('password', $event->getPassword());
+ }
+ );
+
+ $result = self::invokePrivate($this->manager, 'verifyPassword', ['password']);
+ $this->assertNull($result);
+ }
+
+
+ public function testVerifyPasswordHookFails(): void {
+ $this->expectException(\Exception::class);
+ $this->expectExceptionMessage('password not accepted');
+
+ $this->config->method('getAppValue')->willReturnMap([
+ ['core', 'shareapi_enforce_links_password_excluded_groups', '', ''],
+ ['core', 'shareapi_enforce_links_password', 'no', 'no'],
+ ]);
+
+ $this->dispatcher->expects($this->once())->method('dispatchTyped')
+ ->willReturnCallback(function (Event $event): void {
+ $this->assertInstanceOf(ValidatePasswordPolicyEvent::class, $event);
+ /** @var ValidatePasswordPolicyEvent $event */
+ $this->assertSame('password', $event->getPassword());
+ throw new HintException('password not accepted');
+ }
+ );
+
+ self::invokePrivate($this->manager, 'verifyPassword', ['password']);
+ }
+
+ public function createShare($id, $type, $node, $sharedWith, $sharedBy, $shareOwner,
+ $permissions, $expireDate = null, $password = null, $attributes = null) {
+ $share = $this->createMock(IShare::class);
+
+ $share->method('getShareType')->willReturn($type);
+ $share->method('getSharedWith')->willReturn($sharedWith);
+ $share->method('getSharedBy')->willReturn($sharedBy);
+ $share->method('getShareOwner')->willReturn($shareOwner);
+ $share->method('getNode')->willReturn($node);
+ if ($node && $node->getId()) {
+ $share->method('getNodeId')->willReturn($node->getId());
+ }
+ $share->method('getPermissions')->willReturn($permissions);
+ $share->method('getAttributes')->willReturn($attributes);
+ $share->method('getExpirationDate')->willReturn($expireDate);
+ $share->method('getPassword')->willReturn($password);
+
+ return $share;
+ }
+
+ public function dataGeneralChecks() {
+ $user0 = 'user0';
+ $user2 = 'user1';
+ $group0 = 'group0';
+ $owner = $this->createMock(IUser::class);
+ $owner->method('getUID')
+ ->willReturn($user0);
+
+ $file = $this->createMock(File::class);
+ $node = $this->createMock(Node::class);
+ $storage = $this->createMock(IStorage::class);
+ $storage->method('instanceOfStorage')
+ ->with('\OCA\Files_Sharing\External\Storage')
+ ->willReturn(false);
+ $file->method('getStorage')
+ ->willReturn($storage);
+ $file->method('getId')->willReturn(108);
+ $node->method('getStorage')
+ ->willReturn($storage);
+ $node->method('getId')->willReturn(108);
+
+ $data = [
+ [$this->createShare(null, IShare::TYPE_USER, $file, null, $user0, $user0, 31, null, null), 'Share recipient is not a valid user', true],
+ [$this->createShare(null, IShare::TYPE_USER, $file, $group0, $user0, $user0, 31, null, null), 'Share recipient is not a valid user', true],
+ [$this->createShare(null, IShare::TYPE_USER, $file, 'foo@bar.com', $user0, $user0, 31, null, null), 'Share recipient is not a valid user', true],
+ [$this->createShare(null, IShare::TYPE_GROUP, $file, null, $user0, $user0, 31, null, null), 'Share recipient is not a valid group', true],
+ [$this->createShare(null, IShare::TYPE_GROUP, $file, $user2, $user0, $user0, 31, null, null), 'Share recipient is not a valid group', true],
+ [$this->createShare(null, IShare::TYPE_GROUP, $file, 'foo@bar.com', $user0, $user0, 31, null, null), 'Share recipient is not a valid group', true],
+ [$this->createShare(null, IShare::TYPE_LINK, $file, $user2, $user0, $user0, 31, null, null), 'Share recipient should be empty', true],
+ [$this->createShare(null, IShare::TYPE_LINK, $file, $group0, $user0, $user0, 31, null, null), 'Share recipient should be empty', true],
+ [$this->createShare(null, IShare::TYPE_LINK, $file, 'foo@bar.com', $user0, $user0, 31, null, null), 'Share recipient should be empty', true],
+ [$this->createShare(null, -1, $file, null, $user0, $user0, 31, null, null), 'Unknown share type', true],
+
+ [$this->createShare(null, IShare::TYPE_USER, $file, $user2, null, $user0, 31, null, null), 'Share initiator must be set', true],
+ [$this->createShare(null, IShare::TYPE_GROUP, $file, $group0, null, $user0, 31, null, null), 'Share initiator must be set', true],
+ [$this->createShare(null, IShare::TYPE_LINK, $file, null, null, $user0, 31, null, null), 'Share initiator must be set', true],
+
+ [$this->createShare(null, IShare::TYPE_USER, $file, $user0, $user0, $user0, 31, null, null), 'Cannot share with yourself', true],
+
+ [$this->createShare(null, IShare::TYPE_USER, null, $user2, $user0, $user0, 31, null, null), 'Shared path must be set', true],
+ [$this->createShare(null, IShare::TYPE_GROUP, null, $group0, $user0, $user0, 31, null, null), 'Shared path must be set', true],
+ [$this->createShare(null, IShare::TYPE_LINK, null, null, $user0, $user0, 31, null, null), 'Shared path must be set', true],
+
+ [$this->createShare(null, IShare::TYPE_USER, $node, $user2, $user0, $user0, 31, null, null), 'Shared path must be either a file or a folder', true],
+ [$this->createShare(null, IShare::TYPE_GROUP, $node, $group0, $user0, $user0, 31, null, null), 'Shared path must be either a file or a folder', true],
+ [$this->createShare(null, IShare::TYPE_LINK, $node, null, $user0, $user0, 31, null, null), 'Shared path must be either a file or a folder', true],
+ ];
+
+ $nonShareAble = $this->createMock(Folder::class);
+ $nonShareAble->method('getId')->willReturn(108);
+ $nonShareAble->method('isShareable')->willReturn(false);
+ $nonShareAble->method('getPath')->willReturn('path');
+ $nonShareAble->method('getName')->willReturn('name');
+ $nonShareAble->method('getOwner')
+ ->willReturn($owner);
+ $nonShareAble->method('getStorage')
+ ->willReturn($storage);
+
+ $data[] = [$this->createShare(null, IShare::TYPE_USER, $nonShareAble, $user2, $user0, $user0, 31, null, null), 'You are not allowed to share name', true];
+ $data[] = [$this->createShare(null, IShare::TYPE_GROUP, $nonShareAble, $group0, $user0, $user0, 31, null, null), 'You are not allowed to share name', true];
+ $data[] = [$this->createShare(null, IShare::TYPE_LINK, $nonShareAble, null, $user0, $user0, 31, null, null), 'You are not allowed to share name', true];
+
+ $limitedPermssions = $this->createMock(File::class);
+ $limitedPermssions->method('isShareable')->willReturn(true);
+ $limitedPermssions->method('getPermissions')->willReturn(Constants::PERMISSION_READ);
+ $limitedPermssions->method('getId')->willReturn(108);
+ $limitedPermssions->method('getPath')->willReturn('path');
+ $limitedPermssions->method('getName')->willReturn('name');
+ $limitedPermssions->method('getOwner')
+ ->willReturn($owner);
+ $limitedPermssions->method('getStorage')
+ ->willReturn($storage);
+
+ $data[] = [$this->createShare(null, IShare::TYPE_USER, $limitedPermssions, $user2, $user0, $user0, null, null, null), 'Valid permissions are required for sharing', true];
+ $data[] = [$this->createShare(null, IShare::TYPE_GROUP, $limitedPermssions, $group0, $user0, $user0, null, null, null), 'Valid permissions are required for sharing', true];
+ $data[] = [$this->createShare(null, IShare::TYPE_LINK, $limitedPermssions, null, $user0, $user0, null, null, null), 'Valid permissions are required for sharing', true];
+
+ $mount = $this->createMock(MoveableMount::class);
+ $limitedPermssions->method('getMountPoint')->willReturn($mount);
+
+ // increase permissions of a re-share
+ $data[] = [$this->createShare(null, IShare::TYPE_GROUP, $limitedPermssions, $group0, $user0, $user0, 17, null, null), 'Cannot increase permissions of path', true];
+ $data[] = [$this->createShare(null, IShare::TYPE_USER, $limitedPermssions, $user2, $user0, $user0, 3, null, null), 'Cannot increase permissions of path', true];
+
+ $nonMovableStorage = $this->createMock(IStorage::class);
+ $nonMovableStorage->method('instanceOfStorage')
+ ->with('\OCA\Files_Sharing\External\Storage')
+ ->willReturn(false);
+ $nonMovableStorage->method('getPermissions')->willReturn(Constants::PERMISSION_ALL);
+ $nonMoveableMountPermssions = $this->createMock(Folder::class);
+ $nonMoveableMountPermssions->method('isShareable')->willReturn(true);
+ $nonMoveableMountPermssions->method('getPermissions')->willReturn(Constants::PERMISSION_READ);
+ $nonMoveableMountPermssions->method('getId')->willReturn(108);
+ $nonMoveableMountPermssions->method('getPath')->willReturn('path');
+ $nonMoveableMountPermssions->method('getName')->willReturn('name');
+ $nonMoveableMountPermssions->method('getInternalPath')->willReturn('');
+ $nonMoveableMountPermssions->method('getOwner')
+ ->willReturn($owner);
+ $nonMoveableMountPermssions->method('getStorage')
+ ->willReturn($nonMovableStorage);
+
+ $data[] = [$this->createShare(null, IShare::TYPE_USER, $nonMoveableMountPermssions, $user2, $user0, $user0, 11, null, null), 'Cannot increase permissions of path', false];
+ $data[] = [$this->createShare(null, IShare::TYPE_GROUP, $nonMoveableMountPermssions, $group0, $user0, $user0, 11, null, null), 'Cannot increase permissions of path', false];
+
+ $rootFolder = $this->createMock(Folder::class);
+ $rootFolder->method('isShareable')->willReturn(true);
+ $rootFolder->method('getPermissions')->willReturn(Constants::PERMISSION_ALL);
+ $rootFolder->method('getId')->willReturn(42);
+
+ $data[] = [$this->createShare(null, IShare::TYPE_USER, $rootFolder, $user2, $user0, $user0, 30, null, null), 'You cannot share your root folder', true];
+ $data[] = [$this->createShare(null, IShare::TYPE_GROUP, $rootFolder, $group0, $user0, $user0, 2, null, null), 'You cannot share your root folder', true];
+ $data[] = [$this->createShare(null, IShare::TYPE_LINK, $rootFolder, null, $user0, $user0, 16, null, null), 'You cannot share your root folder', true];
+
+ $allPermssionsFiles = $this->createMock(File::class);
+ $allPermssionsFiles->method('isShareable')->willReturn(true);
+ $allPermssionsFiles->method('getPermissions')->willReturn(Constants::PERMISSION_ALL);
+ $allPermssionsFiles->method('getId')->willReturn(187);
+ $allPermssionsFiles->method('getOwner')
+ ->willReturn($owner);
+ $allPermssionsFiles->method('getStorage')
+ ->willReturn($storage);
+
+ // test invalid CREATE or DELETE permissions
+ $data[] = [$this->createShare(null, IShare::TYPE_USER, $allPermssionsFiles, $user2, $user0, $user0, Constants::PERMISSION_ALL, null, null), 'File shares cannot have create or delete permissions', true];
+ $data[] = [$this->createShare(null, IShare::TYPE_GROUP, $allPermssionsFiles, $group0, $user0, $user0, Constants::PERMISSION_READ | Constants::PERMISSION_CREATE, null, null), 'File shares cannot have create or delete permissions', true];
+ $data[] = [$this->createShare(null, IShare::TYPE_LINK, $allPermssionsFiles, null, $user0, $user0, Constants::PERMISSION_READ | Constants::PERMISSION_DELETE, null, null), 'File shares cannot have create or delete permissions', true];
+
+ $allPermssions = $this->createMock(Folder::class);
+ $allPermssions->method('isShareable')->willReturn(true);
+ $allPermssions->method('getPermissions')->willReturn(Constants::PERMISSION_ALL);
+ $allPermssions->method('getId')->willReturn(108);
+ $allPermssions->method('getOwner')
+ ->willReturn($owner);
+ $allPermssions->method('getStorage')
+ ->willReturn($storage);
+
+ $data[] = [$this->createShare(null, IShare::TYPE_USER, $allPermssions, $user2, $user0, $user0, 30, null, null), 'Shares need at least read permissions', true];
+ $data[] = [$this->createShare(null, IShare::TYPE_GROUP, $allPermssions, $group0, $user0, $user0, 2, null, null), 'Shares need at least read permissions', true];
+
+ // test invalid permissions
+ $data[] = [$this->createShare(null, IShare::TYPE_USER, $allPermssions, $user2, $user0, $user0, 32, null, null), 'Valid permissions are required for sharing', true];
+ $data[] = [$this->createShare(null, IShare::TYPE_GROUP, $allPermssions, $group0, $user0, $user0, 63, null, null), 'Valid permissions are required for sharing', true];
+ $data[] = [$this->createShare(null, IShare::TYPE_LINK, $allPermssions, null, $user0, $user0, -1, null, null), 'Valid permissions are required for sharing', true];
+
+ // working shares
+ $data[] = [$this->createShare(null, IShare::TYPE_USER, $allPermssions, $user2, $user0, $user0, 31, null, null), null, false];
+ $data[] = [$this->createShare(null, IShare::TYPE_GROUP, $allPermssions, $group0, $user0, $user0, 3, null, null), null, false];
+ $data[] = [$this->createShare(null, IShare::TYPE_LINK, $allPermssions, null, $user0, $user0, 17, null, null), null, false];
+
+
+ $remoteStorage = $this->createMock(IStorage::class);
+ $remoteStorage->method('instanceOfStorage')
+ ->with('\OCA\Files_Sharing\External\Storage')
+ ->willReturn(true);
+ $remoteFile = $this->createMock(Folder::class);
+ $remoteFile->method('isShareable')->willReturn(true);
+ $remoteFile->method('getPermissions')->willReturn(Constants::PERMISSION_READ ^ Constants::PERMISSION_UPDATE);
+ $remoteFile->method('getId')->willReturn(108);
+ $remoteFile->method('getOwner')
+ ->willReturn($owner);
+ $remoteFile->method('getStorage')
+ ->willReturn($storage);
+ $data[] = [$this->createShare(null, IShare::TYPE_REMOTE, $remoteFile, $user2, $user0, $user0, 1, null, null), null, false];
+ $data[] = [$this->createShare(null, IShare::TYPE_REMOTE, $remoteFile, $user2, $user0, $user0, 3, null, null), null, false];
+ $data[] = [$this->createShare(null, IShare::TYPE_REMOTE, $remoteFile, $user2, $user0, $user0, 31, null, null), 'Cannot increase permissions of ', true];
+
+ return $data;
+ }
+
+ /**
+ *
+ * @param $share
+ * @param $exceptionMessage
+ * @param $exception
+ */
+ #[\PHPUnit\Framework\Attributes\DataProvider('dataGeneralChecks')]
+ public function testGeneralChecks($share, $exceptionMessage, $exception): void {
+ $thrown = null;
+
+ $this->userManager->method('userExists')->willReturnMap([
+ ['user0', true],
+ ['user1', true],
+ ]);
+
+ $this->groupManager->method('groupExists')->willReturnMap([
+ ['group0', true],
+ ]);
+
+ $userFolder = $this->createMock(Folder::class);
+ $userFolder->expects($this->any())
+ ->method('getId')
+ ->willReturn(42);
+ // Id 108 is used in the data to refer to the node of the share.
+ $userFolder->method('getById')
+ ->with(108)
+ ->willReturn([$share->getNode()]);
+ $userFolder->expects($this->any())
+ ->method('getRelativePath')
+ ->willReturnArgument(0);
+ $this->rootFolder->method('getUserFolder')->willReturn($userFolder);
+
+
+ try {
+ self::invokePrivate($this->manager, 'generalCreateChecks', [$share]);
+ $thrown = false;
+ } catch (GenericShareException $e) {
+ $this->assertEquals($exceptionMessage, $e->getHint());
+ $thrown = true;
+ } catch (\InvalidArgumentException $e) {
+ $this->assertEquals($exceptionMessage, $e->getMessage());
+ $thrown = true;
+ }
+
+ $this->assertSame($exception, $thrown);
+ }
+
+
+ public function testGeneralCheckShareRoot(): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('You cannot share your root folder');
+
+ $thrown = null;
+
+ $this->userManager->method('userExists')->willReturnMap([
+ ['user0', true],
+ ['user1', true],
+ ]);
+
+ $userFolder = $this->createMock(Folder::class);
+ $userFolder->method('isSubNode')->with($userFolder)->willReturn(false);
+ $this->rootFolder->method('getUserFolder')->willReturn($userFolder);
+
+ $share = $this->manager->newShare();
+
+ $share->setShareType(IShare::TYPE_USER)
+ ->setSharedWith('user0')
+ ->setSharedBy('user1')
+ ->setNode($userFolder);
+
+ self::invokePrivate($this->manager, 'generalCreateChecks', [$share]);
+ }
+
+ public static function validateExpirationDateInternalProvider() {
+ return [[IShare::TYPE_USER], [IShare::TYPE_REMOTE], [IShare::TYPE_REMOTE_GROUP]];
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('validateExpirationDateInternalProvider')]
+ public function testValidateExpirationDateInternalInPast($shareType): void {
+ $this->expectException(GenericShareException::class);
+ $this->expectExceptionMessage('Expiration date is in the past');
+
+ // Expire date in the past
+ $past = new \DateTime();
+ $past->sub(new \DateInterval('P1D'));
+
+ $share = $this->manager->newShare();
+ $share->setShareType($shareType);
+ $share->setExpirationDate($past);
+
+ self::invokePrivate($this->manager, 'validateExpirationDateInternal', [$share]);
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('validateExpirationDateInternalProvider')]
+ public function testValidateExpirationDateInternalEnforceButNotSet($shareType): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('Expiration date is enforced');
+
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')->setId('bar');
+ $share->setShareType($shareType);
+ if ($shareType === IShare::TYPE_USER) {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_default_internal_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_enforce_internal_expire_date', 'no', 'yes'],
+ ]);
+ } else {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_default_remote_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_enforce_remote_expire_date', 'no', 'yes'],
+ ]);
+ }
+
+ self::invokePrivate($this->manager, 'validateExpirationDateInternal', [$share]);
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('validateExpirationDateInternalProvider')]
+ public function testValidateExpirationDateInternalEnforceButNotEnabledAndNotSet($shareType): void {
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')->setId('bar');
+ $share->setShareType($shareType);
+
+ if ($shareType === IShare::TYPE_USER) {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_enforce_internal_expire_date', 'no', 'yes'],
+ ]);
+ } else {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_enforce_remote_expire_date', 'no', 'yes'],
+ ]);
+ }
+
+ self::invokePrivate($this->manager, 'validateExpirationDateInternal', [$share]);
+
+ $this->assertNull($share->getExpirationDate());
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('validateExpirationDateInternalProvider')]
+ public function testValidateExpirationDateInternalEnforceButNotSetNewShare($shareType): void {
+ $share = $this->manager->newShare();
+ $share->setShareType($shareType);
+
+ if ($shareType === IShare::TYPE_USER) {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_enforce_internal_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_internal_expire_after_n_days', '7', '3'],
+ ['core', 'shareapi_default_internal_expire_date', 'no', 'yes'],
+ ['core', 'internal_defaultExpDays', '3', '3'],
+ ]);
+ } else {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_enforce_remote_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_remote_expire_after_n_days', '7', '3'],
+ ['core', 'shareapi_default_remote_expire_date', 'no', 'yes'],
+ ['core', 'remote_defaultExpDays', '3', '3'],
+ ]);
+ }
+
+ $expected = new \DateTime('now', $this->timezone);
+ $expected->setTime(0, 0, 0);
+ $expected->add(new \DateInterval('P3D'));
+
+ self::invokePrivate($this->manager, 'validateExpirationDateInternal', [$share]);
+
+ $this->assertNotNull($share->getExpirationDate());
+ $this->assertEquals($expected, $share->getExpirationDate());
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('validateExpirationDateInternalProvider')]
+ public function testValidateExpirationDateInternalEnforceRelaxedDefaultButNotSetNewShare($shareType): void {
+ $share = $this->manager->newShare();
+ $share->setShareType($shareType);
+
+ if ($shareType === IShare::TYPE_USER) {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_enforce_internal_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_internal_expire_after_n_days', '7', '3'],
+ ['core', 'shareapi_default_internal_expire_date', 'no', 'yes'],
+ ['core', 'internal_defaultExpDays', '3', '1'],
+ ]);
+ } else {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_enforce_remote_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_remote_expire_after_n_days', '7', '3'],
+ ['core', 'shareapi_default_remote_expire_date', 'no', 'yes'],
+ ['core', 'remote_defaultExpDays', '3', '1'],
+ ]);
+ }
+
+ $expected = new \DateTime('now', $this->timezone);
+ $expected->setTime(0, 0, 0);
+ $expected->add(new \DateInterval('P1D'));
+
+ self::invokePrivate($this->manager, 'validateExpirationDateInternal', [$share]);
+
+ $this->assertNotNull($share->getExpirationDate());
+ $this->assertEquals($expected, $share->getExpirationDate());
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('validateExpirationDateInternalProvider')]
+ public function testValidateExpirationDateInternalEnforceTooFarIntoFuture($shareType): void {
+ $this->expectException(GenericShareException::class);
+ $this->expectExceptionMessage('Cannot set expiration date more than 3 days in the future');
+
+ $future = new \DateTime();
+ $future->add(new \DateInterval('P7D'));
+
+ $share = $this->manager->newShare();
+ $share->setShareType($shareType);
+ $share->setExpirationDate($future);
+
+ if ($shareType === IShare::TYPE_USER) {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_enforce_internal_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_internal_expire_after_n_days', '7', '3'],
+ ['core', 'shareapi_default_internal_expire_date', 'no', 'yes'],
+ ]);
+ } else {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_enforce_remote_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_remote_expire_after_n_days', '7', '3'],
+ ['core', 'shareapi_default_remote_expire_date', 'no', 'yes'],
+ ]);
+ }
+
+ self::invokePrivate($this->manager, 'validateExpirationDateInternal', [$share]);
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('validateExpirationDateInternalProvider')]
+ public function testValidateExpirationDateInternalEnforceValid($shareType): void {
+ $future = new \DateTime('now', $this->dateTimeZone->getTimeZone());
+ $future->add(new \DateInterval('P2D'));
+ $future->setTime(1, 2, 3);
+
+ $expected = clone $future;
+ $expected->setTime(0, 0, 0);
+
+ $share = $this->manager->newShare();
+ $share->setShareType($shareType);
+ $share->setExpirationDate($future);
+
+ if ($shareType === IShare::TYPE_USER) {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_enforce_internal_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_internal_expire_after_n_days', '7', '3'],
+ ['core', 'shareapi_default_internal_expire_date', 'no', 'yes'],
+ ]);
+ } else {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_enforce_remote_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_remote_expire_after_n_days', '7', '3'],
+ ['core', 'shareapi_default_remote_expire_date', 'no', 'yes'],
+ ]);
+ }
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('\OC\Share', 'verifyExpirationDate', $hookListener, 'listener');
+ $hookListener->expects($this->once())->method('listener')->with($this->callback(function ($data) use ($future) {
+ return $data['expirationDate'] == $future;
+ }));
+
+ self::invokePrivate($this->manager, 'validateExpirationDateInternal', [$share]);
+
+ $this->assertEquals($expected, $share->getExpirationDate());
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('validateExpirationDateInternalProvider')]
+ public function testValidateExpirationDateInternalNoDefault($shareType): void {
+ $date = new \DateTime('now', $this->dateTimeZone->getTimeZone());
+ $date->add(new \DateInterval('P5D'));
+ $date->setTime(1, 2, 3);
+
+ $expected = clone $date;
+ $expected->setTime(0, 0, 0);
+
+ $share = $this->manager->newShare();
+ $share->setShareType($shareType);
+ $share->setExpirationDate($date);
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('\OC\Share', 'verifyExpirationDate', $hookListener, 'listener');
+ $hookListener->expects($this->once())->method('listener')->with($this->callback(function ($data) use ($expected) {
+ return $data['expirationDate'] == $expected && $data['passwordSet'] === false;
+ }));
+
+ self::invokePrivate($this->manager, 'validateExpirationDateInternal', [$share]);
+
+ $this->assertEquals($expected, $share->getExpirationDate());
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('validateExpirationDateInternalProvider')]
+ public function testValidateExpirationDateInternalNoDateNoDefault($shareType): void {
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('\OC\Share', 'verifyExpirationDate', $hookListener, 'listener');
+ $hookListener->expects($this->once())->method('listener')->with($this->callback(function ($data) {
+ return $data['expirationDate'] === null && $data['passwordSet'] === true;
+ }));
+
+ $share = $this->manager->newShare();
+ $share->setShareType($shareType);
+ $share->setPassword('password');
+
+ self::invokePrivate($this->manager, 'validateExpirationDateInternal', [$share]);
+
+ $this->assertNull($share->getExpirationDate());
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('validateExpirationDateInternalProvider')]
+ public function testValidateExpirationDateInternalNoDateDefault($shareType): void {
+ $share = $this->manager->newShare();
+ $share->setShareType($shareType);
+
+ $expected = new \DateTime('now', $this->timezone);
+ $expected->setTime(0, 0);
+ $expected->add(new \DateInterval('P3D'));
+ $expected->setTimezone(new \DateTimeZone(date_default_timezone_get()));
+
+ if ($shareType === IShare::TYPE_USER) {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_default_internal_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_internal_expire_after_n_days', '7', '3'],
+ ['core', 'internal_defaultExpDays', '3', '3'],
+ ]);
+ } else {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_default_remote_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_remote_expire_after_n_days', '7', '3'],
+ ['core', 'remote_defaultExpDays', '3', '3'],
+ ]);
+ }
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('\OC\Share', 'verifyExpirationDate', $hookListener, 'listener');
+ $hookListener->expects($this->once())->method('listener')->with($this->callback(function ($data) use ($expected) {
+ return $data['expirationDate'] == $expected;
+ }));
+
+ self::invokePrivate($this->manager, 'validateExpirationDateInternal', [$share]);
+
+ $this->assertEquals($expected, $share->getExpirationDate());
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('validateExpirationDateInternalProvider')]
+ public function testValidateExpirationDateInternalDefault($shareType): void {
+ $future = new \DateTime('now', $this->timezone);
+ $future->add(new \DateInterval('P5D'));
+ $future->setTime(1, 2, 3);
+
+ $expected = clone $future;
+ $expected->setTime(0, 0);
+
+ $share = $this->manager->newShare();
+ $share->setShareType($shareType);
+ $share->setExpirationDate($future);
+
+ if ($shareType === IShare::TYPE_USER) {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_default_internal_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_internal_expire_after_n_days', '7', '3'],
+ ['core', 'internal_defaultExpDays', '3', '1'],
+ ]);
+ } else {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_default_remote_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_remote_expire_after_n_days', '7', '3'],
+ ['core', 'remote_defaultExpDays', '3', '1'],
+ ]);
+ }
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('\OC\Share', 'verifyExpirationDate', $hookListener, 'listener');
+ $hookListener->expects($this->once())->method('listener')->with($this->callback(function ($data) use ($expected) {
+ return $data['expirationDate'] == $expected;
+ }));
+
+ self::invokePrivate($this->manager, 'validateExpirationDateInternal', [$share]);
+
+ $this->assertEquals($expected, $share->getExpirationDate());
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('validateExpirationDateInternalProvider')]
+ public function testValidateExpirationDateInternalHookModification($shareType): void {
+ $nextWeek = new \DateTime('now', $this->timezone);
+ $nextWeek->add(new \DateInterval('P7D'));
+ $nextWeek->setTime(0, 0, 0);
+
+ $save = clone $nextWeek;
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('\OC\Share', 'verifyExpirationDate', $hookListener, 'listener');
+ $hookListener->expects($this->once())->method('listener')->willReturnCallback(function ($data): void {
+ $data['expirationDate']->sub(new \DateInterval('P2D'));
+ });
+
+ $share = $this->manager->newShare();
+ $share->setShareType($shareType);
+ $share->setExpirationDate($nextWeek);
+
+ self::invokePrivate($this->manager, 'validateExpirationDateInternal', [$share]);
+
+ $save->sub(new \DateInterval('P2D'));
+ $this->assertEquals($save, $share->getExpirationDate());
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('validateExpirationDateInternalProvider')]
+ public function testValidateExpirationDateInternalHookException($shareType): void {
+ $this->expectException(\Exception::class);
+ $this->expectExceptionMessage('Invalid date!');
+
+ $nextWeek = new \DateTime();
+ $nextWeek->add(new \DateInterval('P7D'));
+ $nextWeek->setTime(0, 0, 0);
+
+ $share = $this->manager->newShare();
+ $share->setShareType($shareType);
+ $share->setExpirationDate($nextWeek);
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('\OC\Share', 'verifyExpirationDate', $hookListener, 'listener');
+ $hookListener->expects($this->once())->method('listener')->willReturnCallback(function ($data): void {
+ $data['accepted'] = false;
+ $data['message'] = 'Invalid date!';
+ });
+
+ self::invokePrivate($this->manager, 'validateExpirationDateInternal', [$share]);
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('validateExpirationDateInternalProvider')]
+ public function testValidateExpirationDateInternalExistingShareNoDefault($shareType): void {
+ $share = $this->manager->newShare();
+ $share->setShareType($shareType);
+ $share->setId('42')->setProviderId('foo');
+
+ if ($shareType === IShare::TYPE_USER) {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_default_internal_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_internal_expire_after_n_days', '7', '6'],
+ ]);
+ } else {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_default_remote_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_remote_expire_after_n_days', '7', '6'],
+ ]);
+ }
+
+ self::invokePrivate($this->manager, 'validateExpirationDateInternal', [$share]);
+
+ $this->assertEquals(null, $share->getExpirationDate());
+ }
+
+ public function testValidateExpirationDateInPast(): void {
+ $this->expectException(GenericShareException::class);
+ $this->expectExceptionMessage('Expiration date is in the past');
+
+ // Expire date in the past
+ $past = new \DateTime();
+ $past->sub(new \DateInterval('P1D'));
+
+ $share = $this->manager->newShare();
+ $share->setExpirationDate($past);
+
+ self::invokePrivate($this->manager, 'validateExpirationDateLink', [$share]);
+ }
+
+ public function testValidateExpirationDateEnforceButNotSet(): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('Expiration date is enforced');
+
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')->setId('bar');
+
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_default_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_enforce_expire_date', 'no', 'yes'],
+ ]);
+
+ self::invokePrivate($this->manager, 'validateExpirationDateLink', [$share]);
+ }
+
+ public function testValidateExpirationDateEnforceButNotEnabledAndNotSet(): void {
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')->setId('bar');
+
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_enforce_expire_date', 'no', 'yes'],
+ ]);
+
+ self::invokePrivate($this->manager, 'validateExpirationDateLink', [$share]);
+
+ $this->assertNull($share->getExpirationDate());
+ }
+
+ public function testValidateExpirationDateEnforceButNotSetNewShare(): void {
+ $share = $this->manager->newShare();
+
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_enforce_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_expire_after_n_days', '7', '3'],
+ ['core', 'shareapi_default_expire_date', 'no', 'yes'],
+ ['core', 'link_defaultExpDays', '3', '3'],
+ ]);
+
+ $expected = new \DateTime('now', $this->timezone);
+ $expected->setTime(0, 0, 0);
+ $expected->add(new \DateInterval('P3D'));
+
+ self::invokePrivate($this->manager, 'validateExpirationDateLink', [$share]);
+
+ $this->assertNotNull($share->getExpirationDate());
+ $this->assertEquals($expected, $share->getExpirationDate());
+ }
+
+ public function testValidateExpirationDateEnforceRelaxedDefaultButNotSetNewShare(): void {
+ $share = $this->manager->newShare();
+
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_enforce_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_expire_after_n_days', '7', '3'],
+ ['core', 'shareapi_default_expire_date', 'no', 'yes'],
+ ['core', 'link_defaultExpDays', '3', '1'],
+ ]);
+
+ $expected = new \DateTime('now', $this->timezone);
+ $expected->setTime(0, 0, 0);
+ $expected->add(new \DateInterval('P1D'));
+
+ self::invokePrivate($this->manager, 'validateExpirationDateLink', [$share]);
+
+ $this->assertNotNull($share->getExpirationDate());
+ $this->assertEquals($expected, $share->getExpirationDate());
+ }
+
+ public function testValidateExpirationDateEnforceTooFarIntoFuture(): void {
+ $this->expectException(GenericShareException::class);
+ $this->expectExceptionMessage('Cannot set expiration date more than 3 days in the future');
+
+ $future = new \DateTime();
+ $future->add(new \DateInterval('P7D'));
+
+ $share = $this->manager->newShare();
+ $share->setExpirationDate($future);
+
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_enforce_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_expire_after_n_days', '7', '3'],
+ ['core', 'shareapi_default_expire_date', 'no', 'yes'],
+ ]);
+
+ self::invokePrivate($this->manager, 'validateExpirationDateLink', [$share]);
+ }
+
+ public function testValidateExpirationDateEnforceValid(): void {
+ $future = new \DateTime('now', $this->timezone);
+ $future->add(new \DateInterval('P2D'));
+ $future->setTime(1, 2, 3);
+
+ $expected = clone $future;
+ $expected->setTime(0, 0, 0);
+
+ $share = $this->manager->newShare();
+ $share->setExpirationDate($future);
+
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_enforce_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_expire_after_n_days', '7', '3'],
+ ['core', 'shareapi_default_expire_date', 'no', 'yes'],
+ ]);
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('\OC\Share', 'verifyExpirationDate', $hookListener, 'listener');
+ $hookListener->expects($this->once())->method('listener')->with($this->callback(function ($data) use ($future) {
+ return $data['expirationDate'] == $future;
+ }));
+
+ self::invokePrivate($this->manager, 'validateExpirationDateLink', [$share]);
+
+ $this->assertEquals($expected, $share->getExpirationDate());
+ }
+
+ public function testValidateExpirationDateNoDefault(): void {
+ $date = new \DateTime('now', $this->timezone);
+ $date->add(new \DateInterval('P5D'));
+ $date->setTime(1, 2, 3);
+
+ $expected = clone $date;
+ $expected->setTime(0, 0);
+ $expected->setTimezone(new \DateTimeZone(date_default_timezone_get()));
+
+ $share = $this->manager->newShare();
+ $share->setExpirationDate($date);
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('\OC\Share', 'verifyExpirationDate', $hookListener, 'listener');
+ $hookListener->expects($this->once())->method('listener')->with($this->callback(function ($data) use ($expected) {
+ return $data['expirationDate'] == $expected && $data['passwordSet'] === false;
+ }));
+
+ self::invokePrivate($this->manager, 'validateExpirationDateLink', [$share]);
+
+ $this->assertEquals($expected, $share->getExpirationDate());
+ }
+
+ public function testValidateExpirationDateNoDateNoDefault(): void {
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('\OC\Share', 'verifyExpirationDate', $hookListener, 'listener');
+ $hookListener->expects($this->once())->method('listener')->with($this->callback(function ($data) {
+ return $data['expirationDate'] === null && $data['passwordSet'] === true;
+ }));
+
+ $share = $this->manager->newShare();
+ $share->setPassword('password');
+
+ self::invokePrivate($this->manager, 'validateExpirationDateLink', [$share]);
+
+ $this->assertNull($share->getExpirationDate());
+ }
+
+ public function testValidateExpirationDateNoDateDefault(): void {
+ $share = $this->manager->newShare();
+
+ $expected = new \DateTime('now', $this->timezone);
+ $expected->add(new \DateInterval('P3D'));
+ $expected->setTime(0, 0);
+ $expected->setTimezone(new \DateTimeZone(date_default_timezone_get()));
+
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_default_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_expire_after_n_days', '7', '3'],
+ ['core', 'link_defaultExpDays', '3', '3'],
+ ]);
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('\OC\Share', 'verifyExpirationDate', $hookListener, 'listener');
+ $hookListener->expects($this->once())->method('listener')->with($this->callback(function ($data) use ($expected) {
+ return $data['expirationDate'] == $expected;
+ }));
+
+ self::invokePrivate($this->manager, 'validateExpirationDateLink', [$share]);
+
+ $this->assertEquals($expected, $share->getExpirationDate());
+ }
+
+ public function testValidateExpirationDateDefault(): void {
+ $future = new \DateTime('now', $this->timezone);
+ $future->add(new \DateInterval('P5D'));
+ $future->setTime(1, 2, 3);
+
+ $expected = clone $future;
+ $expected->setTime(0, 0);
+ $expected->setTimezone(new \DateTimeZone(date_default_timezone_get()));
+
+ $share = $this->manager->newShare();
+ $share->setExpirationDate($future);
+
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_default_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_expire_after_n_days', '7', '3'],
+ ['core', 'link_defaultExpDays', '3', '1'],
+ ]);
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('\OC\Share', 'verifyExpirationDate', $hookListener, 'listener');
+ $hookListener->expects($this->once())->method('listener')->with($this->callback(function ($data) use ($expected) {
+ return $data['expirationDate'] == $expected;
+ }));
+
+ self::invokePrivate($this->manager, 'validateExpirationDateLink', [$share]);
+
+ $this->assertEquals($expected, $share->getExpirationDate());
+ }
+
+ public function testValidateExpirationNegativeOffsetTimezone(): void {
+ $this->timezone = new \DateTimeZone('Pacific/Tahiti');
+ $future = new \DateTime();
+ $future->add(new \DateInterval('P5D'));
+
+ $expected = clone $future;
+ $expected->setTimezone($this->timezone);
+ $expected->setTime(0, 0);
+ $expected->setTimezone(new \DateTimeZone(date_default_timezone_get()));
+
+ $share = $this->manager->newShare();
+ $share->setExpirationDate($future);
+
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_default_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_expire_after_n_days', '7', '3'],
+ ['core', 'link_defaultExpDays', '3', '1'],
+ ]);
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('\OC\Share', 'verifyExpirationDate', $hookListener, 'listener');
+ $hookListener->expects($this->once())->method('listener')->with($this->callback(function ($data) use ($expected) {
+ return $data['expirationDate'] == $expected;
+ }));
+
+ self::invokePrivate($this->manager, 'validateExpirationDateLink', [$share]);
+
+ $this->assertEquals($expected, $share->getExpirationDate());
+ }
+
+ public function testValidateExpirationDateHookModification(): void {
+ $nextWeek = new \DateTime('now', $this->timezone);
+ $nextWeek->add(new \DateInterval('P7D'));
+
+ $save = clone $nextWeek;
+ $save->setTime(0, 0);
+ $save->sub(new \DateInterval('P2D'));
+ $save->setTimezone(new \DateTimeZone(date_default_timezone_get()));
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('\OC\Share', 'verifyExpirationDate', $hookListener, 'listener');
+ $hookListener->expects($this->once())->method('listener')->willReturnCallback(function ($data): void {
+ $data['expirationDate']->sub(new \DateInterval('P2D'));
+ });
+
+ $share = $this->manager->newShare();
+ $share->setExpirationDate($nextWeek);
+
+ self::invokePrivate($this->manager, 'validateExpirationDateLink', [$share]);
+
+ $this->assertEquals($save, $share->getExpirationDate());
+ }
+
+ public function testValidateExpirationDateHookException(): void {
+ $this->expectException(\Exception::class);
+ $this->expectExceptionMessage('Invalid date!');
+
+ $nextWeek = new \DateTime();
+ $nextWeek->add(new \DateInterval('P7D'));
+ $nextWeek->setTime(0, 0, 0);
+
+ $share = $this->manager->newShare();
+ $share->setExpirationDate($nextWeek);
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('\OC\Share', 'verifyExpirationDate', $hookListener, 'listener');
+ $hookListener->expects($this->once())->method('listener')->willReturnCallback(function ($data): void {
+ $data['accepted'] = false;
+ $data['message'] = 'Invalid date!';
+ });
+
+ self::invokePrivate($this->manager, 'validateExpirationDateLink', [$share]);
+ }
+
+ public function testValidateExpirationDateExistingShareNoDefault(): void {
+ $share = $this->manager->newShare();
+
+ $share->setId('42')->setProviderId('foo');
+
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_default_expire_date', 'no', 'yes'],
+ ['core', 'shareapi_expire_after_n_days', '7', '6'],
+ ]);
+
+ self::invokePrivate($this->manager, 'validateExpirationDateLink', [$share]);
+
+ $this->assertEquals(null, $share->getExpirationDate());
+ }
+
+ public function testUserCreateChecksShareWithGroupMembersOnlyDifferentGroups(): void {
+ $this->expectException(\Exception::class);
+ $this->expectExceptionMessage('Sharing is only allowed with group members');
+
+ $share = $this->manager->newShare();
+
+ $sharedBy = $this->createMock(IUser::class);
+ $sharedWith = $this->createMock(IUser::class);
+ $share->setSharedBy('sharedBy')->setSharedWith('sharedWith');
+
+ $this->groupManager
+ ->method('getUserGroupIds')
+ ->willReturnMap(
+ [
+ [$sharedBy, ['group1']],
+ [$sharedWith, ['group2']],
+ ]
+ );
+
+ $this->userManager->method('get')->willReturnMap([
+ ['sharedBy', $sharedBy],
+ ['sharedWith', $sharedWith],
+ ]);
+
+ $this->config
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_only_share_with_group_members', 'no', 'yes'],
+ ['core', 'shareapi_only_share_with_group_members_exclude_group_list', '', '[]'],
+ ]);
+
+ self::invokePrivate($this->manager, 'userCreateChecks', [$share]);
+ }
+
+ public function testUserCreateChecksShareWithGroupMembersOnlySharedGroup(): void {
+ $share = $this->manager->newShare();
+
+ $sharedBy = $this->createMock(IUser::class);
+ $sharedWith = $this->createMock(IUser::class);
+ $share->setSharedBy('sharedBy')->setSharedWith('sharedWith');
+
+ $path = $this->createMock(Node::class);
+ $share->setNode($path);
+
+ $this->groupManager
+ ->method('getUserGroupIds')
+ ->willReturnMap(
+ [
+ [$sharedBy, ['group1', 'group3']],
+ [$sharedWith, ['group2', 'group3']],
+ ]
+ );
+
+ $this->userManager->method('get')->willReturnMap([
+ ['sharedBy', $sharedBy],
+ ['sharedWith', $sharedWith],
+ ]);
+
+ $this->config
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_only_share_with_group_members', 'no', 'yes'],
+ ['core', 'shareapi_only_share_with_group_members_exclude_group_list', '', '[]'],
+ ]);
+
+ $this->defaultProvider
+ ->method('getSharesByPath')
+ ->with($path)
+ ->willReturn([]);
+
+ self::invokePrivate($this->manager, 'userCreateChecks', [$share]);
+ $this->addToAssertionCount(1);
+ }
+
+
+ public function testUserCreateChecksIdenticalShareExists(): void {
+ $this->expectException(AlreadySharedException::class);
+ $this->expectExceptionMessage('Sharing name.txt failed, because this item is already shared with the account user');
+
+ $share = $this->manager->newShare();
+ $share->setSharedWithDisplayName('user');
+ $share2 = $this->manager->newShare();
+
+ $sharedWith = $this->createMock(IUser::class);
+ $path = $this->createMock(Node::class);
+
+ $share->setSharedWith('sharedWith')->setNode($path)
+ ->setProviderId('foo')->setId('bar');
+
+ $share2->setSharedWith('sharedWith')->setNode($path)
+ ->setProviderId('foo')->setId('baz');
+
+ $this->defaultProvider
+ ->method('getSharesByPath')
+ ->with($path)
+ ->willReturn([$share2]);
+
+ $path->method('getName')
+ ->willReturn('name.txt');
+
+ self::invokePrivate($this->manager, 'userCreateChecks', [$share]);
+ }
+
+
+ public function testUserCreateChecksIdenticalPathSharedViaGroup(): void {
+ $this->expectException(AlreadySharedException::class);
+ $this->expectExceptionMessage('Sharing name2.txt failed, because this item is already shared with the account userName');
+
+ $share = $this->manager->newShare();
+
+ $sharedWith = $this->createMock(IUser::class);
+ $sharedWith->method('getUID')->willReturn('sharedWith');
+
+ $this->userManager->method('get')->with('sharedWith')->willReturn($sharedWith);
+
+ $path = $this->createMock(Node::class);
+
+ $share->setSharedWith('sharedWith')
+ ->setNode($path)
+ ->setShareOwner('shareOwner')
+ ->setSharedWithDisplayName('userName')
+ ->setProviderId('foo')
+ ->setId('bar');
+
+ $share2 = $this->manager->newShare();
+ $share2->setShareType(IShare::TYPE_GROUP)
+ ->setShareOwner('shareOwner2')
+ ->setProviderId('foo')
+ ->setId('baz')
+ ->setSharedWith('group');
+
+ $group = $this->createMock(IGroup::class);
+ $group->method('inGroup')
+ ->with($sharedWith)
+ ->willReturn(true);
+
+ $this->groupManager->method('get')->with('group')->willReturn($group);
+
+ $this->defaultProvider
+ ->method('getSharesByPath')
+ ->with($path)
+ ->willReturn([$share2]);
+
+ $path->method('getName')
+ ->willReturn('name2.txt');
+
+ self::invokePrivate($this->manager, 'userCreateChecks', [$share]);
+ }
+
+ public function testUserCreateChecksIdenticalPathSharedViaDeletedGroup(): void {
+ $share = $this->manager->newShare();
+
+ $sharedWith = $this->createMock(IUser::class);
+ $sharedWith->method('getUID')->willReturn('sharedWith');
+
+ $this->userManager->method('get')->with('sharedWith')->willReturn($sharedWith);
+
+ $path = $this->createMock(Node::class);
+
+ $share->setSharedWith('sharedWith')
+ ->setNode($path)
+ ->setShareOwner('shareOwner')
+ ->setProviderId('foo')
+ ->setId('bar');
+
+ $share2 = $this->manager->newShare();
+ $share2->setShareType(IShare::TYPE_GROUP)
+ ->setShareOwner('shareOwner2')
+ ->setProviderId('foo')
+ ->setId('baz')
+ ->setSharedWith('group');
+
+ $this->groupManager->method('get')->with('group')->willReturn(null);
+
+ $this->defaultProvider
+ ->method('getSharesByPath')
+ ->with($path)
+ ->willReturn([$share2]);
+
+ $this->assertNull($this->invokePrivate($this->manager, 'userCreateChecks', [$share]));
+ }
+
+ public function testUserCreateChecksIdenticalPathNotSharedWithUser(): void {
+ $share = $this->manager->newShare();
+ $sharedWith = $this->createMock(IUser::class);
+ $path = $this->createMock(Node::class);
+ $share->setSharedWith('sharedWith')
+ ->setNode($path)
+ ->setShareOwner('shareOwner')
+ ->setProviderId('foo')
+ ->setId('bar');
+
+ $this->userManager->method('get')->with('sharedWith')->willReturn($sharedWith);
+
+ $share2 = $this->manager->newShare();
+ $share2->setShareType(IShare::TYPE_GROUP)
+ ->setShareOwner('shareOwner2')
+ ->setProviderId('foo')
+ ->setId('baz');
+
+ $group = $this->createMock(IGroup::class);
+ $group->method('inGroup')
+ ->with($sharedWith)
+ ->willReturn(false);
+
+ $this->groupManager->method('get')->with('group')->willReturn($group);
+
+ $share2->setSharedWith('group');
+
+ $this->defaultProvider
+ ->method('getSharesByPath')
+ ->with($path)
+ ->willReturn([$share2]);
+
+ self::invokePrivate($this->manager, 'userCreateChecks', [$share]);
+ $this->addToAssertionCount(1);
+ }
+
+
+ public function testGroupCreateChecksShareWithGroupMembersGroupSharingNotAllowed(): void {
+ $this->expectException(\Exception::class);
+ $this->expectExceptionMessage('Group sharing is now allowed');
+
+ $share = $this->manager->newShare();
+
+ $this->config
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_allow_group_sharing', 'yes', 'no'],
+ ]);
+
+ self::invokePrivate($this->manager, 'groupCreateChecks', [$share]);
+ }
+
+
+ public function testGroupCreateChecksShareWithGroupMembersOnlyNotInGroup(): void {
+ $this->expectException(\Exception::class);
+ $this->expectExceptionMessage('Sharing is only allowed within your own groups');
+
+ $share = $this->manager->newShare();
+
+ $user = $this->createMock(IUser::class);
+ $group = $this->createMock(IGroup::class);
+ $share->setSharedBy('user')->setSharedWith('group');
+
+ $group->method('inGroup')->with($user)->willReturn(false);
+
+ $this->groupManager->method('get')->with('group')->willReturn($group);
+ $this->userManager->method('get')->with('user')->willReturn($user);
+
+ $this->config
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_only_share_with_group_members', 'no', 'yes'],
+ ['core', 'shareapi_allow_group_sharing', 'yes', 'yes'],
+ ['core', 'shareapi_only_share_with_group_members_exclude_group_list', '', '[]'],
+ ]);
+
+ self::invokePrivate($this->manager, 'groupCreateChecks', [$share]);
+ }
+
+
+ public function testGroupCreateChecksShareWithGroupMembersOnlyNullGroup(): void {
+ $this->expectException(\Exception::class);
+ $this->expectExceptionMessage('Sharing is only allowed within your own groups');
+
+ $share = $this->manager->newShare();
+
+ $user = $this->createMock(IUser::class);
+ $share->setSharedBy('user')->setSharedWith('group');
+
+ $this->groupManager->method('get')->with('group')->willReturn(null);
+ $this->userManager->method('get')->with('user')->willReturn($user);
+
+ $this->config
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_only_share_with_group_members', 'no', 'yes'],
+ ['core', 'shareapi_allow_group_sharing', 'yes', 'yes'],
+ ['core', 'shareapi_only_share_with_group_members_exclude_group_list', '', '[]'],
+ ]);
+
+ $this->assertNull($this->invokePrivate($this->manager, 'groupCreateChecks', [$share]));
+ }
+
+ public function testGroupCreateChecksShareWithGroupMembersOnlyInGroup(): void {
+ $share = $this->manager->newShare();
+
+ $user = $this->createMock(IUser::class);
+ $group = $this->createMock(IGroup::class);
+ $share->setSharedBy('user')->setSharedWith('group');
+
+ $this->userManager->method('get')->with('user')->willReturn($user);
+ $this->groupManager->method('get')->with('group')->willReturn($group);
+
+ $group->method('inGroup')->with($user)->willReturn(true);
+
+ $path = $this->createMock(Node::class);
+ $share->setNode($path);
+
+ $this->defaultProvider->method('getSharesByPath')
+ ->with($path)
+ ->willReturn([]);
+
+ $this->config
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_only_share_with_group_members', 'no', 'yes'],
+ ['core', 'shareapi_allow_group_sharing', 'yes', 'yes'],
+ ['core', 'shareapi_only_share_with_group_members_exclude_group_list', '', '[]'],
+ ]);
+
+ self::invokePrivate($this->manager, 'groupCreateChecks', [$share]);
+ $this->addToAssertionCount(1);
+ }
+
+
+ public function testGroupCreateChecksPathAlreadySharedWithSameGroup(): void {
+ $this->expectException(\Exception::class);
+ $this->expectExceptionMessage('Path is already shared with this group');
+
+ $share = $this->manager->newShare();
+
+ $path = $this->createMock(Node::class);
+ $share->setSharedWith('sharedWith')
+ ->setNode($path)
+ ->setProviderId('foo')
+ ->setId('bar');
+
+ $share2 = $this->manager->newShare();
+ $share2->setSharedWith('sharedWith')
+ ->setProviderId('foo')
+ ->setId('baz');
+
+ $this->defaultProvider->method('getSharesByPath')
+ ->with($path)
+ ->willReturn([$share2]);
+
+ $this->config
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_allow_group_sharing', 'yes', 'yes'],
+ ]);
+
+ self::invokePrivate($this->manager, 'groupCreateChecks', [$share]);
+ }
+
+ public function testGroupCreateChecksPathAlreadySharedWithDifferentGroup(): void {
+ $share = $this->manager->newShare();
+
+ $share->setSharedWith('sharedWith');
+
+ $path = $this->createMock(Node::class);
+ $share->setNode($path);
+
+ $share2 = $this->manager->newShare();
+ $share2->setSharedWith('sharedWith2');
+
+ $this->defaultProvider->method('getSharesByPath')
+ ->with($path)
+ ->willReturn([$share2]);
+
+ $this->config
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_allow_group_sharing', 'yes', 'yes'],
+ ]);
+
+ self::invokePrivate($this->manager, 'groupCreateChecks', [$share]);
+ $this->addToAssertionCount(1);
+ }
+
+
+ public function testLinkCreateChecksNoLinkSharesAllowed(): void {
+ $this->expectException(\Exception::class);
+ $this->expectExceptionMessage('Link sharing is not allowed');
+
+ $share = $this->manager->newShare();
+
+ $this->config
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_allow_links', 'yes', 'no'],
+ ]);
+
+ self::invokePrivate($this->manager, 'linkCreateChecks', [$share]);
+ }
+
+
+ public function testFileLinkCreateChecksNoPublicUpload(): void {
+ $share = $this->manager->newShare();
+
+ $share->setPermissions(Constants::PERMISSION_CREATE | Constants::PERMISSION_UPDATE);
+ $share->setNodeType('file');
+
+ $this->config
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_allow_links', 'yes', 'yes'],
+ ['core', 'shareapi_allow_public_upload', 'yes', 'no']
+ ]);
+
+ self::invokePrivate($this->manager, 'linkCreateChecks', [$share]);
+ $this->addToAssertionCount(1);
+ }
+
+ public function testFolderLinkCreateChecksNoPublicUpload(): void {
+ $this->expectException(\Exception::class);
+ $this->expectExceptionMessage('Public upload is not allowed');
+
+ $share = $this->manager->newShare();
+
+ $share->setPermissions(Constants::PERMISSION_CREATE | Constants::PERMISSION_UPDATE);
+ $share->setNodeType('folder');
+
+ $this->config
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_allow_links', 'yes', 'yes'],
+ ['core', 'shareapi_allow_public_upload', 'yes', 'no']
+ ]);
+
+ self::invokePrivate($this->manager, 'linkCreateChecks', [$share]);
+ }
+
+ public function testLinkCreateChecksPublicUpload(): void {
+ $share = $this->manager->newShare();
+
+ $share->setPermissions(Constants::PERMISSION_CREATE | Constants::PERMISSION_UPDATE);
+ $share->setSharedWith('sharedWith');
+ $folder = $this->createMock(\OC\Files\Node\Folder::class);
+ $share->setNode($folder);
+
+ $this->config
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_allow_links', 'yes', 'yes'],
+ ['core', 'shareapi_allow_public_upload', 'yes', 'yes']
+ ]);
+
+ self::invokePrivate($this->manager, 'linkCreateChecks', [$share]);
+ $this->addToAssertionCount(1);
+ }
+
+ public function testLinkCreateChecksReadOnly(): void {
+ $share = $this->manager->newShare();
+
+ $share->setPermissions(Constants::PERMISSION_READ);
+ $share->setSharedWith('sharedWith');
+ $folder = $this->createMock(\OC\Files\Node\Folder::class);
+ $share->setNode($folder);
+
+ $this->config
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_allow_links', 'yes', 'yes'],
+ ['core', 'shareapi_allow_public_upload', 'yes', 'no']
+ ]);
+
+ self::invokePrivate($this->manager, 'linkCreateChecks', [$share]);
+ $this->addToAssertionCount(1);
+ }
+
+
+ public function testPathCreateChecksContainsSharedMount(): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('You cannot share a folder that contains other shares');
+
+ $path = $this->createMock(Folder::class);
+ $path->method('getPath')->willReturn('path');
+
+ $mount = $this->createMock(IMountPoint::class);
+ $storage = $this->createMock(IStorage::class);
+ $mount->method('getStorage')->willReturn($storage);
+ $storage->method('instanceOfStorage')->with('\OCA\Files_Sharing\ISharedStorage')->willReturn(true);
+
+ $this->mountManager->method('findIn')->with('path')->willReturn([$mount]);
+
+ self::invokePrivate($this->manager, 'pathCreateChecks', [$path]);
+ }
+
+ public function testPathCreateChecksContainsNoSharedMount(): void {
+ $path = $this->createMock(Folder::class);
+ $path->method('getPath')->willReturn('path');
+
+ $mount = $this->createMock(IMountPoint::class);
+ $storage = $this->createMock(IStorage::class);
+ $mount->method('getStorage')->willReturn($storage);
+ $storage->method('instanceOfStorage')->with('\OCA\Files_Sharing\ISharedStorage')->willReturn(false);
+
+ $this->mountManager->method('findIn')->with('path')->willReturn([$mount]);
+
+ self::invokePrivate($this->manager, 'pathCreateChecks', [$path]);
+ $this->addToAssertionCount(1);
+ }
+
+ public function testPathCreateChecksContainsNoFolder(): void {
+ $path = $this->createMock(File::class);
+
+ self::invokePrivate($this->manager, 'pathCreateChecks', [$path]);
+ $this->addToAssertionCount(1);
+ }
+
+ public static function dataIsSharingDisabledForUser() {
+ $data = [];
+
+ // No exclude groups
+ $data[] = ['no', null, null, [], false];
+
+ // empty exclude / allow list, user no groups
+ $data[] = ['yes', '', json_encode(['']), [], false];
+ $data[] = ['allow', '', json_encode(['']), [], true];
+
+ // empty exclude / allow list, user groups
+ $data[] = ['yes', '', json_encode(['']), ['group1', 'group2'], false];
+ $data[] = ['allow', '', json_encode(['']), ['group1', 'group2'], true];
+
+ // Convert old list to json
+ $data[] = ['yes', 'group1,group2', json_encode(['group1', 'group2']), [], false];
+ $data[] = ['allow', 'group1,group2', json_encode(['group1', 'group2']), [], true];
+
+ // Old list partly groups in common
+ $data[] = ['yes', 'group1,group2', json_encode(['group1', 'group2']), ['group1', 'group3'], false];
+ $data[] = ['allow', 'group1,group2', json_encode(['group1', 'group2']), ['group1', 'group3'], false];
+
+ // Old list only groups in common
+ $data[] = ['yes', 'group1,group2', json_encode(['group1', 'group2']), ['group1'], true];
+ $data[] = ['allow', 'group1,group2', json_encode(['group1', 'group2']), ['group1'], false];
+
+ // New list partly in common
+ $data[] = ['yes', json_encode(['group1', 'group2']), null, ['group1', 'group3'], false];
+ $data[] = ['allow', json_encode(['group1', 'group2']), null, ['group1', 'group3'], false];
+
+ // New list only groups in common
+ $data[] = ['yes', json_encode(['group1', 'group2']), null, ['group2'], true];
+ $data[] = ['allow', json_encode(['group1', 'group2']), null, ['group2'], false];
+
+ return $data;
+ }
+
+ /**
+ *
+ * @param string $excludeGroups
+ * @param string $groupList
+ * @param string $setList
+ * @param string[] $groupIds
+ * @param bool $expected
+ */
+ #[\PHPUnit\Framework\Attributes\DataProvider('dataIsSharingDisabledForUser')]
+ public function testIsSharingDisabledForUser($excludeGroups, $groupList, $setList, $groupIds, $expected): void {
+ $user = $this->createMock(IUser::class);
+
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_exclude_groups', 'no', $excludeGroups],
+ ['core', 'shareapi_exclude_groups_list', '', $groupList],
+ ]);
+
+ if ($setList !== null) {
+ $this->config->expects($this->once())
+ ->method('setAppValue')
+ ->with('core', 'shareapi_exclude_groups_list', $setList);
+ } else {
+ $this->config->expects($this->never())
+ ->method('setAppValue');
+ }
+
+ $this->groupManager->method('getUserGroupIds')
+ ->with($user)
+ ->willReturn($groupIds);
+
+ $this->userManager->method('get')->with('user')->willReturn($user);
+
+ $res = $this->manager->sharingDisabledForUser('user');
+ $this->assertEquals($expected, $res);
+ }
+
+ public static function dataCanShare() {
+ $data = [];
+
+ /*
+ * [expected, sharing enabled, disabled for user]
+ */
+
+ $data[] = [false, 'no', false];
+ $data[] = [false, 'no', true];
+ $data[] = [true, 'yes', false];
+ $data[] = [false, 'yes', true];
+
+ return $data;
+ }
+
+ /**
+ *
+ * @param bool $expected
+ * @param string $sharingEnabled
+ * @param bool $disabledForUser
+ */
+ #[\PHPUnit\Framework\Attributes\DataProvider('dataCanShare')]
+ public function testCanShare($expected, $sharingEnabled, $disabledForUser): void {
+ $this->config->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_enabled', 'yes', $sharingEnabled],
+ ]);
+
+ $manager = $this->createManagerMock()
+ ->onlyMethods(['sharingDisabledForUser'])
+ ->getMock();
+
+ $manager->method('sharingDisabledForUser')
+ ->with('user')
+ ->willReturn($disabledForUser);
+
+ $share = $this->manager->newShare();
+ $share->setSharedBy('user');
+
+ $exception = false;
+ try {
+ $res = self::invokePrivate($manager, 'canShare', [$share]);
+ } catch (\Exception $e) {
+ $exception = true;
+ }
+
+ $this->assertEquals($expected, !$exception);
+ }
+
+ public function testCreateShareUser(): void {
+ /** @var Manager&MockObject $manager */
+ $manager = $this->createManagerMock()
+ ->onlyMethods(['canShare', 'generalCreateChecks', 'userCreateChecks', 'pathCreateChecks'])
+ ->getMock();
+
+ $shareOwner = $this->createMock(IUser::class);
+ $shareOwner->method('getUID')->willReturn('shareOwner');
+
+ $storage = $this->createMock(IStorage::class);
+ $path = $this->createMock(File::class);
+ $path->method('getOwner')->willReturn($shareOwner);
+ $path->method('getName')->willReturn('target');
+ $path->method('getStorage')->willReturn($storage);
+
+ $share = $this->createShare(
+ null,
+ IShare::TYPE_USER,
+ $path,
+ 'sharedWith',
+ 'sharedBy',
+ null,
+ Constants::PERMISSION_ALL);
+
+ $manager->expects($this->once())
+ ->method('canShare')
+ ->with($share)
+ ->willReturn(true);
+ $manager->expects($this->once())
+ ->method('generalCreateChecks')
+ ->with($share);
+ ;
+ $manager->expects($this->once())
+ ->method('userCreateChecks')
+ ->with($share);
+ ;
+ $manager->expects($this->once())
+ ->method('pathCreateChecks')
+ ->with($path);
+
+ $this->defaultProvider
+ ->expects($this->once())
+ ->method('create')
+ ->with($share)
+ ->willReturnArgument(0);
+
+ $share->expects($this->once())
+ ->method('setShareOwner')
+ ->with('shareOwner');
+ $share->expects($this->once())
+ ->method('setTarget')
+ ->with('/target');
+
+ $manager->createShare($share);
+ }
+
+ public function testCreateShareGroup(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods(['canShare', 'generalCreateChecks', 'groupCreateChecks', 'pathCreateChecks'])
+ ->getMock();
+
+ $shareOwner = $this->createMock(IUser::class);
+ $shareOwner->method('getUID')->willReturn('shareOwner');
+
+ $storage = $this->createMock(IStorage::class);
+ $path = $this->createMock(File::class);
+ $path->method('getOwner')->willReturn($shareOwner);
+ $path->method('getName')->willReturn('target');
+ $path->method('getStorage')->willReturn($storage);
+
+ $share = $this->createShare(
+ null,
+ IShare::TYPE_GROUP,
+ $path,
+ 'sharedWith',
+ 'sharedBy',
+ null,
+ Constants::PERMISSION_ALL);
+
+ $manager->expects($this->once())
+ ->method('canShare')
+ ->with($share)
+ ->willReturn(true);
+ $manager->expects($this->once())
+ ->method('generalCreateChecks')
+ ->with($share);
+ ;
+ $manager->expects($this->once())
+ ->method('groupCreateChecks')
+ ->with($share);
+ ;
+ $manager->expects($this->once())
+ ->method('pathCreateChecks')
+ ->with($path);
+
+ $this->defaultProvider
+ ->expects($this->once())
+ ->method('create')
+ ->with($share)
+ ->willReturnArgument(0);
+
+ $share->expects($this->once())
+ ->method('setShareOwner')
+ ->with('shareOwner');
+ $share->expects($this->once())
+ ->method('setTarget')
+ ->with('/target');
+
+ $manager->createShare($share);
+ }
+
+ public function testCreateShareLink(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'generalCreateChecks',
+ 'linkCreateChecks',
+ 'pathCreateChecks',
+ 'validateExpirationDateLink',
+ 'verifyPassword',
+ 'setLinkParent',
+ ])
+ ->getMock();
+
+ $shareOwner = $this->createMock(IUser::class);
+ $shareOwner->method('getUID')->willReturn('shareOwner');
+
+ $storage = $this->createMock(IStorage::class);
+ $path = $this->createMock(File::class);
+ $path->method('getOwner')->willReturn($shareOwner);
+ $path->method('getName')->willReturn('target');
+ $path->method('getId')->willReturn(1);
+ $path->method('getStorage')->willReturn($storage);
+
+ $date = new \DateTime();
+
+ $share = $this->manager->newShare();
+ $share->setShareType(IShare::TYPE_LINK)
+ ->setNode($path)
+ ->setSharedBy('sharedBy')
+ ->setPermissions(Constants::PERMISSION_ALL)
+ ->setExpirationDate($date)
+ ->setPassword('password');
+
+ $manager->expects($this->once())
+ ->method('canShare')
+ ->with($share)
+ ->willReturn(true);
+ $manager->expects($this->once())
+ ->method('generalCreateChecks')
+ ->with($share);
+ ;
+ $manager->expects($this->once())
+ ->method('linkCreateChecks')
+ ->with($share);
+ ;
+ $manager->expects($this->once())
+ ->method('pathCreateChecks')
+ ->with($path);
+ $manager->expects($this->once())
+ ->method('validateExpirationDateLink')
+ ->with($share)
+ ->willReturn($share);
+ $manager->expects($this->once())
+ ->method('verifyPassword')
+ ->with('password');
+ $manager->expects($this->once())
+ ->method('setLinkParent')
+ ->with($share);
+
+ $this->hasher->expects($this->once())
+ ->method('hash')
+ ->with('password')
+ ->willReturn('hashed');
+
+ $this->secureRandom->method('generate')
+ ->willReturn('token');
+
+ $this->defaultProvider
+ ->expects($this->once())
+ ->method('create')
+ ->with($share)
+ ->willReturnCallback(function (Share $share) {
+ return $share->setId(42);
+ });
+
+ $calls = [
+ BeforeShareCreatedEvent::class,
+ ShareCreatedEvent::class,
+ ];
+ $this->dispatcher->expects($this->exactly(2))
+ ->method('dispatchTyped')
+ ->willReturnCallback(function ($event) use (&$calls, $date, $path): void {
+ $expected = array_shift($calls);
+ $this->assertInstanceOf($expected, $event);
+ $share = $event->getShare();
+
+ $this->assertEquals(IShare::TYPE_LINK, $share->getShareType(), 'getShareType');
+ $this->assertEquals($path, $share->getNode(), 'getNode');
+ $this->assertEquals('sharedBy', $share->getSharedBy(), 'getSharedBy');
+ $this->assertEquals(Constants::PERMISSION_ALL, $share->getPermissions(), 'getPermissions');
+ $this->assertEquals($date, $share->getExpirationDate(), 'getExpirationDate');
+ $this->assertEquals('hashed', $share->getPassword(), 'getPassword');
+ $this->assertEquals('token', $share->getToken(), 'getToken');
+
+ if ($expected === ShareCreatedEvent::class) {
+ $this->assertEquals('42', $share->getId(), 'getId');
+ $this->assertEquals('/target', $share->getTarget(), 'getTarget');
+ }
+ });
+
+ /** @var IShare $share */
+ $share = $manager->createShare($share);
+
+ $this->assertSame('shareOwner', $share->getShareOwner());
+ $this->assertEquals('/target', $share->getTarget());
+ $this->assertSame($date, $share->getExpirationDate());
+ $this->assertEquals('token', $share->getToken());
+ $this->assertEquals('hashed', $share->getPassword());
+ }
+
+ public function testCreateShareMail(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'generalCreateChecks',
+ 'linkCreateChecks',
+ 'pathCreateChecks',
+ 'validateExpirationDateLink',
+ 'verifyPassword',
+ 'setLinkParent',
+ ])
+ ->getMock();
+
+ $shareOwner = $this->createMock(IUser::class);
+ $shareOwner->method('getUID')->willReturn('shareOwner');
+
+ $storage = $this->createMock(IStorage::class);
+ $path = $this->createMock(File::class);
+ $path->method('getOwner')->willReturn($shareOwner);
+ $path->method('getName')->willReturn('target');
+ $path->method('getId')->willReturn(1);
+ $path->method('getStorage')->willReturn($storage);
+
+ $share = $this->manager->newShare();
+ $share->setShareType(IShare::TYPE_EMAIL)
+ ->setNode($path)
+ ->setSharedBy('sharedBy')
+ ->setPermissions(Constants::PERMISSION_ALL);
+
+ $manager->expects($this->once())
+ ->method('canShare')
+ ->with($share)
+ ->willReturn(true);
+ $manager->expects($this->once())
+ ->method('generalCreateChecks')
+ ->with($share);
+
+ $manager->expects($this->once())
+ ->method('linkCreateChecks');
+ $manager->expects($this->once())
+ ->method('pathCreateChecks')
+ ->with($path);
+ $manager->expects($this->once())
+ ->method('validateExpirationDateLink')
+ ->with($share)
+ ->willReturn($share);
+ $manager->expects($this->once())
+ ->method('verifyPassword');
+ $manager->expects($this->once())
+ ->method('setLinkParent');
+
+ $this->secureRandom->method('generate')
+ ->willReturn('token');
+
+ $this->defaultProvider
+ ->expects($this->once())
+ ->method('create')
+ ->with($share)
+ ->willReturnCallback(function (Share $share) {
+ return $share->setId(42);
+ });
+
+ $calls = [
+ BeforeShareCreatedEvent::class,
+ ShareCreatedEvent::class,
+ ];
+ $this->dispatcher->expects($this->exactly(2))
+ ->method('dispatchTyped')
+ ->willReturnCallback(function ($event) use (&$calls, $path): void {
+ $expected = array_shift($calls);
+ $this->assertInstanceOf($expected, $event);
+ $share = $event->getShare();
+
+ $this->assertEquals(IShare::TYPE_EMAIL, $share->getShareType(), 'getShareType');
+ $this->assertEquals($path, $share->getNode(), 'getNode');
+ $this->assertEquals('sharedBy', $share->getSharedBy(), 'getSharedBy');
+ $this->assertEquals(Constants::PERMISSION_ALL, $share->getPermissions(), 'getPermissions');
+ $this->assertNull($share->getExpirationDate(), 'getExpirationDate');
+ $this->assertNull($share->getPassword(), 'getPassword');
+ $this->assertEquals('token', $share->getToken(), 'getToken');
+
+ if ($expected === ShareCreatedEvent::class) {
+ $this->assertEquals('42', $share->getId(), 'getId');
+ $this->assertEquals('/target', $share->getTarget(), 'getTarget');
+ }
+ });
+
+ /** @var IShare $share */
+ $share = $manager->createShare($share);
+
+ $this->assertSame('shareOwner', $share->getShareOwner());
+ $this->assertEquals('/target', $share->getTarget());
+ $this->assertEquals('token', $share->getToken());
+ }
+
+
+ public function testCreateShareHookError(): void {
+ $this->expectException(\Exception::class);
+ $this->expectExceptionMessage('I won\'t let you share');
+
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'generalCreateChecks',
+ 'userCreateChecks',
+ 'pathCreateChecks',
+ ])
+ ->getMock();
+
+ $shareOwner = $this->createMock(IUser::class);
+ $shareOwner->method('getUID')->willReturn('shareOwner');
+
+ $storage = $this->createMock(IStorage::class);
+ $path = $this->createMock(File::class);
+ $path->method('getOwner')->willReturn($shareOwner);
+ $path->method('getName')->willReturn('target');
+ $path->method('getStorage')->willReturn($storage);
+
+ $share = $this->createShare(
+ null,
+ IShare::TYPE_USER,
+ $path,
+ 'sharedWith',
+ 'sharedBy',
+ null,
+ Constants::PERMISSION_ALL);
+
+ $manager->expects($this->once())
+ ->method('canShare')
+ ->with($share)
+ ->willReturn(true);
+ $manager->expects($this->once())
+ ->method('generalCreateChecks')
+ ->with($share);
+ ;
+ $manager->expects($this->once())
+ ->method('userCreateChecks')
+ ->with($share);
+ ;
+ $manager->expects($this->once())
+ ->method('pathCreateChecks')
+ ->with($path);
+
+ $share->expects($this->once())
+ ->method('setShareOwner')
+ ->with('shareOwner');
+ $share->expects($this->once())
+ ->method('setTarget')
+ ->with('/target');
+
+ // Pre share
+ $this->dispatcher->expects($this->once())
+ ->method('dispatchTyped')
+ ->with(
+ $this->isInstanceOf(BeforeShareCreatedEvent::class)
+ )->willReturnCallback(function (BeforeShareCreatedEvent $e): void {
+ $e->setError('I won\'t let you share!');
+ $e->stopPropagation();
+ }
+ );
+
+ $manager->createShare($share);
+ }
+
+ public function testCreateShareOfIncomingFederatedShare(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods(['canShare', 'generalCreateChecks', 'userCreateChecks', 'pathCreateChecks'])
+ ->getMock();
+
+ $shareOwner = $this->createMock(IUser::class);
+ $shareOwner->method('getUID')->willReturn('shareOwner');
+
+ $storage = $this->createMock(IStorage::class);
+ $storage->method('instanceOfStorage')
+ ->with('OCA\Files_Sharing\External\Storage')
+ ->willReturn(true);
+
+ $storage2 = $this->createMock(IStorage::class);
+ $storage2->method('instanceOfStorage')
+ ->with('OCA\Files_Sharing\External\Storage')
+ ->willReturn(false);
+
+ $path = $this->createMock(File::class);
+ $path->expects($this->never())->method('getOwner');
+ $path->method('getName')->willReturn('target');
+ $path->method('getStorage')->willReturn($storage);
+
+ $parent = $this->createMock(Folder::class);
+ $parent->method('getStorage')->willReturn($storage);
+
+ $parentParent = $this->createMock(Folder::class);
+ $parentParent->method('getStorage')->willReturn($storage2);
+ $parentParent->method('getOwner')->willReturn($shareOwner);
+
+ $path->method('getParent')->willReturn($parent);
+ $parent->method('getParent')->willReturn($parentParent);
+
+ $share = $this->createShare(
+ null,
+ IShare::TYPE_USER,
+ $path,
+ 'sharedWith',
+ 'sharedBy',
+ null,
+ Constants::PERMISSION_ALL);
+
+ $manager->expects($this->once())
+ ->method('canShare')
+ ->with($share)
+ ->willReturn(true);
+ $manager->expects($this->once())
+ ->method('generalCreateChecks')
+ ->with($share);
+ ;
+ $manager->expects($this->once())
+ ->method('userCreateChecks')
+ ->with($share);
+ ;
+ $manager->expects($this->once())
+ ->method('pathCreateChecks')
+ ->with($path);
+
+ $this->defaultProvider
+ ->expects($this->once())
+ ->method('create')
+ ->with($share)
+ ->willReturnArgument(0);
+
+ $share->expects($this->once())
+ ->method('setShareOwner')
+ ->with('shareOwner');
+ $share->expects($this->once())
+ ->method('setTarget')
+ ->with('/target');
+
+ $manager->createShare($share);
+ }
+
+ public function testGetSharesBy(): void {
+ $share = $this->manager->newShare();
+
+ $node = $this->createMock(Folder::class);
+
+ $this->defaultProvider->expects($this->once())
+ ->method('getSharesBy')
+ ->with(
+ $this->equalTo('user'),
+ $this->equalTo(IShare::TYPE_USER),
+ $this->equalTo($node),
+ $this->equalTo(true),
+ $this->equalTo(1),
+ $this->equalTo(1)
+ )->willReturn([$share]);
+
+ $shares = $this->manager->getSharesBy('user', IShare::TYPE_USER, $node, true, 1, 1);
+
+ $this->assertCount(1, $shares);
+ $this->assertSame($share, $shares[0]);
+ }
+
+ public function testGetSharesByOwnerless(): void {
+ $mount = $this->createMock(IShareOwnerlessMount::class);
+
+ $node = $this->createMock(Folder::class);
+ $node
+ ->expects($this->once())
+ ->method('getMountPoint')
+ ->willReturn($mount);
+
+ $share = $this->manager->newShare();
+ $share->setNode($node);
+ $share->setShareType(IShare::TYPE_USER);
+
+ $this->defaultProvider
+ ->expects($this->once())
+ ->method('getSharesByPath')
+ ->with($this->equalTo($node))
+ ->willReturn([$share]);
+
+ $shares = $this->manager->getSharesBy('user', IShare::TYPE_USER, $node, true, 1, 1);
+
+ $this->assertCount(1, $shares);
+ $this->assertSame($share, $shares[0]);
+ }
+
+ /**
+ * Test to ensure we correctly remove expired link shares
+ *
+ * We have 8 Shares and we want the 3 first valid shares.
+ * share 3-6 and 8 are expired. Thus at the end of this test we should
+ * have received share 1,2 and 7. And from the manager. Share 3-6 should be
+ * deleted (as they are evaluated). but share 8 should still be there.
+ */
+ public function testGetSharesByExpiredLinkShares(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods(['deleteShare'])
+ ->getMock();
+
+ /** @var IShare[] $shares */
+ $shares = [];
+
+ /*
+ * This results in an array of 8 IShare elements
+ */
+ for ($i = 0; $i < 8; $i++) {
+ $share = $this->manager->newShare();
+ $share->setId($i);
+ $shares[] = $share;
+ }
+
+ $today = new \DateTime();
+ $today->setTime(0, 0, 0);
+
+ /*
+ * Set the expiration date to today for some shares
+ */
+ $shares[2]->setExpirationDate($today);
+ $shares[3]->setExpirationDate($today);
+ $shares[4]->setExpirationDate($today);
+ $shares[5]->setExpirationDate($today);
+
+ /** @var IShare[] $i */
+ $shares2 = [];
+ for ($i = 0; $i < 8; $i++) {
+ $shares2[] = clone $shares[$i];
+ }
+
+ $node = $this->createMock(File::class);
+
+ /*
+ * Simulate the getSharesBy call.
+ */
+ $this->defaultProvider
+ ->method('getSharesBy')
+ ->willReturnCallback(function ($uid, $type, $node, $reshares, $limit, $offset) use (&$shares2) {
+ return array_slice($shares2, $offset, $limit);
+ });
+
+ /*
+ * Simulate the deleteShare call.
+ */
+ $manager->method('deleteShare')
+ ->willReturnCallback(function ($share) use (&$shares2): void {
+ for ($i = 0; $i < count($shares2); $i++) {
+ if ($shares2[$i]->getId() === $share->getId()) {
+ array_splice($shares2, $i, 1);
+ break;
+ }
+ }
+ });
+
+ $res = $manager->getSharesBy('user', IShare::TYPE_LINK, $node, true, 3, 0);
+
+ $this->assertCount(3, $res);
+ $this->assertEquals($shares[0]->getId(), $res[0]->getId());
+ $this->assertEquals($shares[1]->getId(), $res[1]->getId());
+ $this->assertEquals($shares[6]->getId(), $res[2]->getId());
+
+ $this->assertCount(4, $shares2);
+ $this->assertEquals(0, $shares2[0]->getId());
+ $this->assertEquals(1, $shares2[1]->getId());
+ $this->assertEquals(6, $shares2[2]->getId());
+ $this->assertEquals(7, $shares2[3]->getId());
+ $this->assertSame($today, $shares[3]->getExpirationDate());
+ }
+
+ public function testGetShareByToken(): void {
+ $this->config
+ ->expects($this->exactly(2))
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_allow_links', 'yes', 'yes'],
+ ['files_sharing', 'hide_disabled_user_shares', 'no', 'no'],
+ ]);
+
+ $factory = $this->createMock(IProviderFactory::class);
+
+ $manager = $this->createManager($factory);
+
+ $share = $this->createMock(IShare::class);
+
+ $factory->expects($this->once())
+ ->method('getProviderForType')
+ ->with(IShare::TYPE_LINK)
+ ->willReturn($this->defaultProvider);
+
+ $this->defaultProvider->expects($this->once())
+ ->method('getShareByToken')
+ ->with('token')
+ ->willReturn($share);
+
+ $ret = $manager->getShareByToken('token');
+ $this->assertSame($share, $ret);
+ }
+
+ public function testGetShareByTokenRoom(): void {
+ $this->config
+ ->expects($this->exactly(2))
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_allow_links', 'yes', 'no'],
+ ['files_sharing', 'hide_disabled_user_shares', 'no', 'no'],
+ ]);
+
+ $factory = $this->createMock(IProviderFactory::class);
+
+ $manager = $this->createManager($factory);
+
+ $share = $this->createMock(IShare::class);
+
+ $roomShareProvider = $this->createMock(IShareProvider::class);
+
+ $factory->expects($this->any())
+ ->method('getProviderForType')
+ ->willReturnCallback(function ($shareType) use ($roomShareProvider) {
+ if ($shareType !== IShare::TYPE_ROOM) {
+ throw new ProviderException();
+ }
+
+ return $roomShareProvider;
+ });
+
+ $roomShareProvider->expects($this->once())
+ ->method('getShareByToken')
+ ->with('token')
+ ->willReturn($share);
+
+ $ret = $manager->getShareByToken('token');
+ $this->assertSame($share, $ret);
+ }
+
+ public function testGetShareByTokenWithException(): void {
+ $this->config
+ ->expects($this->exactly(2))
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_allow_links', 'yes', 'yes'],
+ ['files_sharing', 'hide_disabled_user_shares', 'no', 'no'],
+ ]);
+
+ $factory = $this->createMock(IProviderFactory::class);
+
+ $manager = $this->createManager($factory);
+
+ $share = $this->createMock(IShare::class);
+
+ $calls = [
+ [IShare::TYPE_LINK],
+ [IShare::TYPE_REMOTE],
+ ];
+ $factory->expects($this->exactly(2))
+ ->method('getProviderForType')
+ ->willReturnCallback(function () use (&$calls) {
+ $expected = array_shift($calls);
+ $this->assertEquals($expected, func_get_args());
+ return $this->defaultProvider;
+ });
+
+ $this->defaultProvider->expects($this->exactly(2))
+ ->method('getShareByToken')
+ ->with('token')
+ ->willReturnOnConsecutiveCalls(
+ $this->throwException(new ShareNotFound()),
+ $share
+ );
+
+ $ret = $manager->getShareByToken('token');
+ $this->assertSame($share, $ret);
+ }
+
+
+ public function testGetShareByTokenHideDisabledUser(): void {
+ $this->expectException(ShareNotFound::class);
+ $this->expectExceptionMessage('The requested share comes from a disabled user');
+
+ $this->config
+ ->expects($this->exactly(2))
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_allow_links', 'yes', 'yes'],
+ ['files_sharing', 'hide_disabled_user_shares', 'no', 'yes'],
+ ]);
+
+ $this->l->expects($this->once())
+ ->method('t')
+ ->willReturnArgument(0);
+
+ $manager = $this->createManagerMock()
+ ->onlyMethods(['deleteShare'])
+ ->getMock();
+
+ $date = new \DateTime();
+ $date->setTime(0, 0, 0);
+ $date->add(new \DateInterval('P2D'));
+ $share = $this->manager->newShare();
+ $share->setExpirationDate($date);
+ $share->setShareOwner('owner');
+ $share->setSharedBy('sharedBy');
+
+ $sharedBy = $this->createMock(IUser::class);
+ $owner = $this->createMock(IUser::class);
+
+ $this->userManager->method('get')->willReturnMap([
+ ['sharedBy', $sharedBy],
+ ['owner', $owner],
+ ]);
+
+ $owner->expects($this->once())
+ ->method('isEnabled')
+ ->willReturn(true);
+ $sharedBy->expects($this->once())
+ ->method('isEnabled')
+ ->willReturn(false);
+
+ $this->defaultProvider->expects($this->once())
+ ->method('getShareByToken')
+ ->with('expiredToken')
+ ->willReturn($share);
+
+ $manager->expects($this->never())
+ ->method('deleteShare');
+
+ $manager->getShareByToken('expiredToken');
+ }
+
+
+ public function testGetShareByTokenExpired(): void {
+ $this->expectException(ShareNotFound::class);
+ $this->expectExceptionMessage('The requested share does not exist anymore');
+
+ $this->config
+ ->expects($this->once())
+ ->method('getAppValue')
+ ->with('core', 'shareapi_allow_links', 'yes')
+ ->willReturn('yes');
+
+ $this->l->expects($this->once())
+ ->method('t')
+ ->willReturnArgument(0);
+
+ $manager = $this->createManagerMock()
+ ->onlyMethods(['deleteShare'])
+ ->getMock();
+
+ $date = new \DateTime();
+ $date->setTime(0, 0, 0);
+ $share = $this->manager->newShare();
+ $share->setExpirationDate($date);
+
+ $this->defaultProvider->expects($this->once())
+ ->method('getShareByToken')
+ ->with('expiredToken')
+ ->willReturn($share);
+
+ $manager->expects($this->once())
+ ->method('deleteShare')
+ ->with($this->equalTo($share));
+
+ $manager->getShareByToken('expiredToken');
+ }
+
+ public function testGetShareByTokenNotExpired(): void {
+ $this->config
+ ->expects($this->exactly(2))
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_allow_links', 'yes', 'yes'],
+ ['files_sharing', 'hide_disabled_user_shares', 'no', 'no'],
+ ]);
+
+ $date = new \DateTime();
+ $date->setTime(0, 0, 0);
+ $date->add(new \DateInterval('P2D'));
+ $share = $this->manager->newShare();
+ $share->setExpirationDate($date);
+
+ $this->defaultProvider->expects($this->once())
+ ->method('getShareByToken')
+ ->with('expiredToken')
+ ->willReturn($share);
+
+ $res = $this->manager->getShareByToken('expiredToken');
+
+ $this->assertSame($share, $res);
+ }
+
+
+ public function testGetShareByTokenWithPublicLinksDisabled(): void {
+ $this->expectException(ShareNotFound::class);
+
+ $this->config
+ ->expects($this->once())
+ ->method('getAppValue')
+ ->with('core', 'shareapi_allow_links', 'yes')
+ ->willReturn('no');
+ $this->manager->getShareByToken('validToken');
+ }
+
+ public function testGetShareByTokenPublicUploadDisabled(): void {
+ $this->config
+ ->expects($this->exactly(3))
+ ->method('getAppValue')
+ ->willReturnMap([
+ ['core', 'shareapi_allow_links', 'yes', 'yes'],
+ ['core', 'shareapi_allow_public_upload', 'yes', 'no'],
+ ['files_sharing', 'hide_disabled_user_shares', 'no', 'no'],
+ ]);
+
+ $share = $this->manager->newShare();
+ $share->setShareType(IShare::TYPE_LINK)
+ ->setPermissions(Constants::PERMISSION_READ | Constants::PERMISSION_CREATE | Constants::PERMISSION_UPDATE);
+ $share->setSharedWith('sharedWith');
+ $folder = $this->createMock(\OC\Files\Node\Folder::class);
+ $share->setNode($folder);
+
+ $this->defaultProvider->expects($this->once())
+ ->method('getShareByToken')
+ ->willReturn('validToken')
+ ->willReturn($share);
+
+ $res = $this->manager->getShareByToken('validToken');
+
+ $this->assertSame(Constants::PERMISSION_READ, $res->getPermissions());
+ }
+
+ public function testCheckPasswordNoLinkShare(): void {
+ $share = $this->createMock(IShare::class);
+ $share->method('getShareType')->willReturn(IShare::TYPE_USER);
+ $this->assertFalse($this->manager->checkPassword($share, 'password'));
+ }
+
+ public function testCheckPasswordNoPassword(): void {
+ $share = $this->createMock(IShare::class);
+ $share->method('getShareType')->willReturn(IShare::TYPE_LINK);
+ $this->assertFalse($this->manager->checkPassword($share, 'password'));
+
+ $share->method('getPassword')->willReturn('password');
+ $this->assertFalse($this->manager->checkPassword($share, null));
+ }
+
+ public function testCheckPasswordInvalidPassword(): void {
+ $share = $this->createMock(IShare::class);
+ $share->method('getShareType')->willReturn(IShare::TYPE_LINK);
+ $share->method('getPassword')->willReturn('password');
+
+ $this->hasher->method('verify')->with('invalidpassword', 'password', '')->willReturn(false);
+
+ $this->assertFalse($this->manager->checkPassword($share, 'invalidpassword'));
+ }
+
+ public function testCheckPasswordValidPassword(): void {
+ $share = $this->createMock(IShare::class);
+ $share->method('getShareType')->willReturn(IShare::TYPE_LINK);
+ $share->method('getPassword')->willReturn('passwordHash');
+
+ $this->hasher->method('verify')->with('password', 'passwordHash', '')->willReturn(true);
+
+ $this->assertTrue($this->manager->checkPassword($share, 'password'));
+ }
+
+ public function testCheckPasswordUpdateShare(): void {
+ $share = $this->manager->newShare();
+ $share->setShareType(IShare::TYPE_LINK)
+ ->setPassword('passwordHash');
+
+ $this->hasher->method('verify')->with('password', 'passwordHash', '')
+ ->willReturnCallback(function ($pass, $hash, &$newHash) {
+ $newHash = 'newHash';
+
+ return true;
+ });
+
+ $this->defaultProvider->expects($this->once())
+ ->method('update')
+ ->with($this->callback(function (IShare $share) {
+ return $share->getPassword() === 'newHash';
+ }));
+
+ $this->assertTrue($this->manager->checkPassword($share, 'password'));
+ }
+
+
+ public function testUpdateShareCantChangeShareType(): void {
+ $this->expectException(\Exception::class);
+ $this->expectExceptionMessage('Cannot change share type');
+
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'getShareById'
+ ])
+ ->getMock();
+
+ $originalShare = $this->manager->newShare();
+ $originalShare->setShareType(IShare::TYPE_GROUP);
+
+ $manager->expects($this->once())->method('canShare')->willReturn(true);
+ $manager->expects($this->once())->method('getShareById')->with('foo:42')->willReturn($originalShare);
+
+ $share = $this->manager->newShare();
+ $attrs = $this->manager->newShare()->newAttributes();
+ $attrs->setAttribute('app1', 'perm1', true);
+ $share->setProviderId('foo')
+ ->setId('42')
+ ->setShareType(IShare::TYPE_USER);
+
+ $manager->updateShare($share);
+ }
+
+
+ public function testUpdateShareCantChangeRecipientForGroupShare(): void {
+ $this->expectException(\Exception::class);
+ $this->expectExceptionMessage('Can only update recipient on user shares');
+
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'getShareById'
+ ])
+ ->getMock();
+
+ $originalShare = $this->manager->newShare();
+ $originalShare->setShareType(IShare::TYPE_GROUP)
+ ->setSharedWith('origGroup');
+
+ $manager->expects($this->once())->method('canShare')->willReturn(true);
+ $manager->expects($this->once())->method('getShareById')->with('foo:42')->willReturn($originalShare);
+
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')
+ ->setId('42')
+ ->setShareType(IShare::TYPE_GROUP)
+ ->setSharedWith('newGroup');
+
+ $manager->updateShare($share);
+ }
+
+
+ public function testUpdateShareCantShareWithOwner(): void {
+ $this->expectException(\Exception::class);
+ $this->expectExceptionMessage('Cannot share with the share owner');
+
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'getShareById'
+ ])
+ ->getMock();
+
+ $originalShare = $this->manager->newShare();
+ $originalShare->setShareType(IShare::TYPE_USER)
+ ->setSharedWith('sharedWith');
+
+ $manager->expects($this->once())->method('canShare')->willReturn(true);
+ $manager->expects($this->once())->method('getShareById')->with('foo:42')->willReturn($originalShare);
+
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')
+ ->setId('42')
+ ->setShareType(IShare::TYPE_USER)
+ ->setSharedWith('newUser')
+ ->setShareOwner('newUser');
+
+ $manager->updateShare($share);
+ }
+
+ public function testUpdateShareUser(): void {
+ $this->userManager->expects($this->any())->method('userExists')->willReturn(true);
+
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'getShareById',
+ 'generalCreateChecks',
+ 'userCreateChecks',
+ 'pathCreateChecks',
+ ])
+ ->getMock();
+
+ $originalShare = $this->manager->newShare();
+ $originalShare->setShareType(IShare::TYPE_USER)
+ ->setSharedWith('origUser')
+ ->setPermissions(1);
+
+ $node = $this->createMock(File::class);
+ $node->method('getId')->willReturn(100);
+ $node->method('getPath')->willReturn('/newUser/files/myPath');
+
+ $manager->expects($this->once())->method('canShare')->willReturn(true);
+ $manager->expects($this->once())->method('getShareById')->with('foo:42')->willReturn($originalShare);
+
+ $share = $this->manager->newShare();
+ $attrs = $this->manager->newShare()->newAttributes();
+ $attrs->setAttribute('app1', 'perm1', true);
+ $share->setProviderId('foo')
+ ->setId('42')
+ ->setShareType(IShare::TYPE_USER)
+ ->setSharedWith('origUser')
+ ->setShareOwner('newUser')
+ ->setSharedBy('sharer')
+ ->setPermissions(31)
+ ->setAttributes($attrs)
+ ->setNode($node);
+
+ $this->defaultProvider->expects($this->once())
+ ->method('update')
+ ->with($share)
+ ->willReturn($share);
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_set_expiration_date', $hookListener, 'post');
+ $hookListener->expects($this->never())->method('post');
+
+ $this->rootFolder->method('getUserFolder')->with('newUser')->willReturnSelf();
+ $this->rootFolder->method('getRelativePath')->with('/newUser/files/myPath')->willReturn('/myPath');
+
+ $hookListener2 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_permissions', $hookListener2, 'post');
+ $hookListener2->expects($this->once())->method('post')->with([
+ 'itemType' => 'file',
+ 'itemSource' => 100,
+ 'shareType' => IShare::TYPE_USER,
+ 'shareWith' => 'origUser',
+ 'uidOwner' => 'sharer',
+ 'permissions' => 31,
+ 'path' => '/myPath',
+ 'attributes' => $attrs->toArray(),
+ ]);
+
+ $manager->updateShare($share);
+ }
+
+ public function testUpdateShareGroup(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'getShareById',
+ 'generalCreateChecks',
+ 'groupCreateChecks',
+ 'pathCreateChecks',
+ ])
+ ->getMock();
+
+ $originalShare = $this->manager->newShare();
+ $originalShare->setShareType(IShare::TYPE_GROUP)
+ ->setSharedWith('origUser')
+ ->setPermissions(31);
+
+ $manager->expects($this->once())->method('canShare')->willReturn(true);
+ $manager->expects($this->once())->method('getShareById')->with('foo:42')->willReturn($originalShare);
+
+ $node = $this->createMock(File::class);
+
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')
+ ->setId('42')
+ ->setShareType(IShare::TYPE_GROUP)
+ ->setSharedWith('origUser')
+ ->setShareOwner('owner')
+ ->setNode($node)
+ ->setPermissions(31);
+
+ $this->defaultProvider->expects($this->once())
+ ->method('update')
+ ->with($share)
+ ->willReturn($share);
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_set_expiration_date', $hookListener, 'post');
+ $hookListener->expects($this->never())->method('post');
+
+ $hookListener2 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_permissions', $hookListener2, 'post');
+ $hookListener2->expects($this->never())->method('post');
+
+ $manager->updateShare($share);
+ }
+
+ public function testUpdateShareLink(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'getShareById',
+ 'generalCreateChecks',
+ 'linkCreateChecks',
+ 'pathCreateChecks',
+ 'verifyPassword',
+ 'validateExpirationDateLink',
+ ])
+ ->getMock();
+
+ $originalShare = $this->manager->newShare();
+ $originalShare->setShareType(IShare::TYPE_LINK)
+ ->setPermissions(15);
+
+ $tomorrow = new \DateTime();
+ $tomorrow->setTime(0, 0, 0);
+ $tomorrow->add(new \DateInterval('P1D'));
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(100);
+
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')
+ ->setId('42')
+ ->setShareType(IShare::TYPE_LINK)
+ ->setToken('token')
+ ->setSharedBy('owner')
+ ->setShareOwner('owner')
+ ->setPassword('password')
+ ->setExpirationDate($tomorrow)
+ ->setNode($file)
+ ->setPermissions(15);
+
+ $manager->expects($this->once())->method('canShare')->willReturn(true);
+ $manager->expects($this->once())->method('getShareById')->with('foo:42')->willReturn($originalShare);
+ $manager->expects($this->once())->method('validateExpirationDateLink')->with($share);
+ $manager->expects($this->once())->method('verifyPassword')->with('password');
+
+ $this->hasher->expects($this->once())
+ ->method('hash')
+ ->with('password')
+ ->willReturn('hashed');
+
+ $this->defaultProvider->expects($this->once())
+ ->method('update')
+ ->with($share)
+ ->willReturn($share);
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_set_expiration_date', $hookListener, 'post');
+ $hookListener->expects($this->once())->method('post')->with([
+ 'itemType' => 'file',
+ 'itemSource' => 100,
+ 'date' => $tomorrow,
+ 'uidOwner' => 'owner',
+ ]);
+
+ $hookListener2 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_password', $hookListener2, 'post');
+ $hookListener2->expects($this->once())->method('post')->with([
+ 'itemType' => 'file',
+ 'itemSource' => 100,
+ 'uidOwner' => 'owner',
+ 'token' => 'token',
+ 'disabled' => false,
+ ]);
+
+ $hookListener3 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_permissions', $hookListener3, 'post');
+ $hookListener3->expects($this->never())->method('post');
+
+
+ $manager->updateShare($share);
+ }
+
+ public function testUpdateShareLinkEnableSendPasswordByTalkWithNoPassword(): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('Cannot enable sending the password by Talk with an empty password');
+
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'getShareById',
+ 'generalCreateChecks',
+ 'linkCreateChecks',
+ 'pathCreateChecks',
+ 'verifyPassword',
+ 'validateExpirationDateLink',
+ ])
+ ->getMock();
+
+ $originalShare = $this->manager->newShare();
+ $originalShare->setShareType(IShare::TYPE_LINK)
+ ->setPermissions(15);
+
+ $tomorrow = new \DateTime();
+ $tomorrow->setTime(0, 0, 0);
+ $tomorrow->add(new \DateInterval('P1D'));
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(100);
+
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')
+ ->setId('42')
+ ->setShareType(IShare::TYPE_LINK)
+ ->setToken('token')
+ ->setSharedBy('owner')
+ ->setShareOwner('owner')
+ ->setPassword(null)
+ ->setSendPasswordByTalk(true)
+ ->setExpirationDate($tomorrow)
+ ->setNode($file)
+ ->setPermissions(15);
+
+ $manager->expects($this->once())->method('canShare')->willReturn(true);
+ $manager->expects($this->once())->method('getShareById')->with('foo:42')->willReturn($originalShare);
+ $manager->expects($this->once())->method('generalCreateChecks')->with($share);
+ $manager->expects($this->once())->method('linkCreateChecks')->with($share);
+ $manager->expects($this->never())->method('verifyPassword');
+ $manager->expects($this->never())->method('pathCreateChecks');
+ $manager->expects($this->never())->method('validateExpirationDateLink');
+
+ $this->hasher->expects($this->never())
+ ->method('hash');
+
+ $this->defaultProvider->expects($this->never())
+ ->method('update');
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_set_expiration_date', $hookListener, 'post');
+ $hookListener->expects($this->never())->method('post');
+
+ $hookListener2 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_password', $hookListener2, 'post');
+ $hookListener2->expects($this->never())->method('post');
+
+ $hookListener3 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_permissions', $hookListener3, 'post');
+ $hookListener3->expects($this->never())->method('post');
+
+ $manager->updateShare($share);
+ }
+
+ public function testUpdateShareMail(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'getShareById',
+ 'generalCreateChecks',
+ 'verifyPassword',
+ 'pathCreateChecks',
+ 'linkCreateChecks',
+ 'validateExpirationDateLink',
+ ])
+ ->getMock();
+
+ $originalShare = $this->manager->newShare();
+ $originalShare->setShareType(IShare::TYPE_EMAIL)
+ ->setPermissions(Constants::PERMISSION_ALL);
+
+ $tomorrow = new \DateTime();
+ $tomorrow->setTime(0, 0, 0);
+ $tomorrow->add(new \DateInterval('P1D'));
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(100);
+
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')
+ ->setId('42')
+ ->setShareType(IShare::TYPE_EMAIL)
+ ->setToken('token')
+ ->setSharedBy('owner')
+ ->setShareOwner('owner')
+ ->setPassword('password')
+ ->setExpirationDate($tomorrow)
+ ->setNode($file)
+ ->setPermissions(Constants::PERMISSION_ALL);
+
+ $manager->expects($this->once())->method('canShare')->willReturn(true);
+ $manager->expects($this->once())->method('getShareById')->with('foo:42')->willReturn($originalShare);
+ $manager->expects($this->once())->method('generalCreateChecks')->with($share);
+ $manager->expects($this->once())->method('verifyPassword')->with('password');
+ $manager->expects($this->once())->method('pathCreateChecks')->with($file);
+ $manager->expects($this->once())->method('linkCreateChecks');
+ $manager->expects($this->once())->method('validateExpirationDateLink');
+
+ $this->hasher->expects($this->once())
+ ->method('hash')
+ ->with('password')
+ ->willReturn('hashed');
+
+ $this->defaultProvider->expects($this->once())
+ ->method('update')
+ ->with($share, 'password')
+ ->willReturn($share);
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_set_expiration_date', $hookListener, 'post');
+ $hookListener->expects($this->once())->method('post')->with([
+ 'itemType' => 'file',
+ 'itemSource' => 100,
+ 'date' => $tomorrow,
+ 'uidOwner' => 'owner',
+ ]);
+
+ $hookListener2 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_password', $hookListener2, 'post');
+ $hookListener2->expects($this->once())->method('post')->with([
+ 'itemType' => 'file',
+ 'itemSource' => 100,
+ 'uidOwner' => 'owner',
+ 'token' => 'token',
+ 'disabled' => false,
+ ]);
+
+ $hookListener3 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_permissions', $hookListener3, 'post');
+ $hookListener3->expects($this->never())->method('post');
+
+ $manager->updateShare($share);
+ }
+
+ public function testUpdateShareMailEnableSendPasswordByTalk(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'getShareById',
+ 'generalCreateChecks',
+ 'verifyPassword',
+ 'pathCreateChecks',
+ 'linkCreateChecks',
+ 'validateExpirationDateLink',
+ ])
+ ->getMock();
+
+ $originalShare = $this->manager->newShare();
+ $originalShare->setShareType(IShare::TYPE_EMAIL)
+ ->setPermissions(Constants::PERMISSION_ALL)
+ ->setPassword(null)
+ ->setSendPasswordByTalk(false);
+
+ $tomorrow = new \DateTime();
+ $tomorrow->setTime(0, 0, 0);
+ $tomorrow->add(new \DateInterval('P1D'));
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(100);
+
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')
+ ->setId('42')
+ ->setShareType(IShare::TYPE_EMAIL)
+ ->setToken('token')
+ ->setSharedBy('owner')
+ ->setShareOwner('owner')
+ ->setPassword('password')
+ ->setSendPasswordByTalk(true)
+ ->setExpirationDate($tomorrow)
+ ->setNode($file)
+ ->setPermissions(Constants::PERMISSION_ALL);
+
+ $manager->expects($this->once())->method('canShare')->willReturn(true);
+ $manager->expects($this->once())->method('getShareById')->with('foo:42')->willReturn($originalShare);
+ $manager->expects($this->once())->method('generalCreateChecks')->with($share);
+ $manager->expects($this->once())->method('verifyPassword')->with('password');
+ $manager->expects($this->once())->method('pathCreateChecks')->with($file);
+ $manager->expects($this->once())->method('linkCreateChecks');
+ $manager->expects($this->once())->method('validateExpirationDateLink');
+
+ $this->hasher->expects($this->once())
+ ->method('hash')
+ ->with('password')
+ ->willReturn('hashed');
+
+ $this->defaultProvider->expects($this->once())
+ ->method('update')
+ ->with($share, 'password')
+ ->willReturn($share);
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_set_expiration_date', $hookListener, 'post');
+ $hookListener->expects($this->once())->method('post')->with([
+ 'itemType' => 'file',
+ 'itemSource' => 100,
+ 'date' => $tomorrow,
+ 'uidOwner' => 'owner',
+ ]);
+
+ $hookListener2 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_password', $hookListener2, 'post');
+ $hookListener2->expects($this->once())->method('post')->with([
+ 'itemType' => 'file',
+ 'itemSource' => 100,
+ 'uidOwner' => 'owner',
+ 'token' => 'token',
+ 'disabled' => false,
+ ]);
+
+ $hookListener3 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_permissions', $hookListener3, 'post');
+ $hookListener3->expects($this->never())->method('post');
+
+ $manager->updateShare($share);
+ }
+
+ public function testUpdateShareMailEnableSendPasswordByTalkWithDifferentPassword(): void {
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'getShareById',
+ 'generalCreateChecks',
+ 'verifyPassword',
+ 'pathCreateChecks',
+ 'linkCreateChecks',
+ 'validateExpirationDateLink',
+ ])
+ ->getMock();
+
+ $originalShare = $this->manager->newShare();
+ $originalShare->setShareType(IShare::TYPE_EMAIL)
+ ->setPermissions(Constants::PERMISSION_ALL)
+ ->setPassword('anotherPasswordHash')
+ ->setSendPasswordByTalk(false);
+
+ $tomorrow = new \DateTime();
+ $tomorrow->setTime(0, 0, 0);
+ $tomorrow->add(new \DateInterval('P1D'));
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(100);
+
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')
+ ->setId('42')
+ ->setShareType(IShare::TYPE_EMAIL)
+ ->setToken('token')
+ ->setSharedBy('owner')
+ ->setShareOwner('owner')
+ ->setPassword('password')
+ ->setSendPasswordByTalk(true)
+ ->setExpirationDate($tomorrow)
+ ->setNode($file)
+ ->setPermissions(Constants::PERMISSION_ALL);
+
+ $manager->expects($this->once())->method('canShare')->willReturn(true);
+ $manager->expects($this->once())->method('getShareById')->with('foo:42')->willReturn($originalShare);
+ $manager->expects($this->once())->method('generalCreateChecks')->with($share);
+ $manager->expects($this->once())->method('verifyPassword')->with('password');
+ $manager->expects($this->once())->method('pathCreateChecks')->with($file);
+ $manager->expects($this->once())->method('linkCreateChecks');
+ $manager->expects($this->once())->method('validateExpirationDateLink');
+
+ $this->hasher->expects($this->once())
+ ->method('verify')
+ ->with('password', 'anotherPasswordHash')
+ ->willReturn(false);
+
+ $this->hasher->expects($this->once())
+ ->method('hash')
+ ->with('password')
+ ->willReturn('hashed');
+
+ $this->defaultProvider->expects($this->once())
+ ->method('update')
+ ->with($share, 'password')
+ ->willReturn($share);
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_set_expiration_date', $hookListener, 'post');
+ $hookListener->expects($this->once())->method('post')->with([
+ 'itemType' => 'file',
+ 'itemSource' => 100,
+ 'date' => $tomorrow,
+ 'uidOwner' => 'owner',
+ ]);
+
+ $hookListener2 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_password', $hookListener2, 'post');
+ $hookListener2->expects($this->once())->method('post')->with([
+ 'itemType' => 'file',
+ 'itemSource' => 100,
+ 'uidOwner' => 'owner',
+ 'token' => 'token',
+ 'disabled' => false,
+ ]);
+
+ $hookListener3 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_permissions', $hookListener3, 'post');
+ $hookListener3->expects($this->never())->method('post');
+
+ $manager->updateShare($share);
+ }
+
+ public function testUpdateShareMailEnableSendPasswordByTalkWithNoPassword(): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('Cannot enable sending the password by Talk with an empty password');
+
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'getShareById',
+ 'generalCreateChecks',
+ 'verifyPassword',
+ 'pathCreateChecks',
+ 'linkCreateChecks',
+ 'validateExpirationDateLink',
+ ])
+ ->getMock();
+
+ $originalShare = $this->manager->newShare();
+ $originalShare->setShareType(IShare::TYPE_EMAIL)
+ ->setPermissions(Constants::PERMISSION_ALL)
+ ->setPassword(null)
+ ->setSendPasswordByTalk(false);
+
+ $tomorrow = new \DateTime();
+ $tomorrow->setTime(0, 0, 0);
+ $tomorrow->add(new \DateInterval('P1D'));
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(100);
+
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')
+ ->setId('42')
+ ->setShareType(IShare::TYPE_EMAIL)
+ ->setToken('token')
+ ->setSharedBy('owner')
+ ->setShareOwner('owner')
+ ->setPassword(null)
+ ->setSendPasswordByTalk(true)
+ ->setExpirationDate($tomorrow)
+ ->setNode($file)
+ ->setPermissions(Constants::PERMISSION_ALL);
+
+ $manager->expects($this->once())->method('canShare')->willReturn(true);
+ $manager->expects($this->once())->method('getShareById')->with('foo:42')->willReturn($originalShare);
+ $manager->expects($this->once())->method('generalCreateChecks')->with($share);
+ $manager->expects($this->never())->method('verifyPassword');
+ $manager->expects($this->never())->method('pathCreateChecks');
+ $manager->expects($this->once())->method('linkCreateChecks');
+ $manager->expects($this->never())->method('validateExpirationDateLink');
+
+ // If the password is empty, we have nothing to hash
+ $this->hasher->expects($this->never())
+ ->method('hash');
+
+ $this->defaultProvider->expects($this->never())
+ ->method('update');
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_set_expiration_date', $hookListener, 'post');
+ $hookListener->expects($this->never())->method('post');
+
+ $hookListener2 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_password', $hookListener2, 'post');
+ $hookListener2->expects($this->never())->method('post');
+
+ $hookListener3 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_permissions', $hookListener3, 'post');
+ $hookListener3->expects($this->never())->method('post');
+
+ $manager->updateShare($share);
+ }
+
+
+ public function testUpdateShareMailEnableSendPasswordByTalkRemovingPassword(): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('Cannot enable sending the password by Talk with an empty password');
+
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'getShareById',
+ 'generalCreateChecks',
+ 'verifyPassword',
+ 'pathCreateChecks',
+ 'linkCreateChecks',
+ 'validateExpirationDateLink',
+ ])
+ ->getMock();
+
+ $originalShare = $this->manager->newShare();
+ $originalShare->setShareType(IShare::TYPE_EMAIL)
+ ->setPermissions(Constants::PERMISSION_ALL)
+ ->setPassword('passwordHash')
+ ->setSendPasswordByTalk(false);
+
+ $tomorrow = new \DateTime();
+ $tomorrow->setTime(0, 0, 0);
+ $tomorrow->add(new \DateInterval('P1D'));
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(100);
+
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')
+ ->setId('42')
+ ->setShareType(IShare::TYPE_EMAIL)
+ ->setToken('token')
+ ->setSharedBy('owner')
+ ->setShareOwner('owner')
+ ->setPassword(null)
+ ->setSendPasswordByTalk(true)
+ ->setExpirationDate($tomorrow)
+ ->setNode($file)
+ ->setPermissions(Constants::PERMISSION_ALL);
+
+ $manager->expects($this->once())->method('canShare')->willReturn(true);
+ $manager->expects($this->once())->method('getShareById')->with('foo:42')->willReturn($originalShare);
+ $manager->expects($this->once())->method('generalCreateChecks')->with($share);
+ $manager->expects($this->once())->method('verifyPassword');
+ $manager->expects($this->never())->method('pathCreateChecks');
+ $manager->expects($this->once())->method('linkCreateChecks');
+ $manager->expects($this->never())->method('validateExpirationDateLink');
+
+ // If the password is empty, we have nothing to hash
+ $this->hasher->expects($this->never())
+ ->method('hash');
+
+ $this->defaultProvider->expects($this->never())
+ ->method('update');
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_set_expiration_date', $hookListener, 'post');
+ $hookListener->expects($this->never())->method('post');
+
+ $hookListener2 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_password', $hookListener2, 'post');
+ $hookListener2->expects($this->never())->method('post');
+
+ $hookListener3 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_permissions', $hookListener3, 'post');
+ $hookListener3->expects($this->never())->method('post');
+
+ $manager->updateShare($share);
+ }
+
+
+ public function testUpdateShareMailEnableSendPasswordByTalkRemovingPasswordWithEmptyString(): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('Cannot enable sending the password by Talk with an empty password');
+
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'getShareById',
+ 'generalCreateChecks',
+ 'verifyPassword',
+ 'pathCreateChecks',
+ 'linkCreateChecks',
+ 'validateExpirationDateLink',
+ ])
+ ->getMock();
+
+ $originalShare = $this->manager->newShare();
+ $originalShare->setShareType(IShare::TYPE_EMAIL)
+ ->setPermissions(Constants::PERMISSION_ALL)
+ ->setPassword('passwordHash')
+ ->setSendPasswordByTalk(false);
+
+ $tomorrow = new \DateTime();
+ $tomorrow->setTime(0, 0, 0);
+ $tomorrow->add(new \DateInterval('P1D'));
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(100);
+
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')
+ ->setId('42')
+ ->setShareType(IShare::TYPE_EMAIL)
+ ->setToken('token')
+ ->setSharedBy('owner')
+ ->setShareOwner('owner')
+ ->setPassword('')
+ ->setSendPasswordByTalk(true)
+ ->setExpirationDate($tomorrow)
+ ->setNode($file)
+ ->setPermissions(Constants::PERMISSION_ALL);
+
+ $manager->expects($this->once())->method('canShare')->willReturn(true);
+ $manager->expects($this->once())->method('getShareById')->with('foo:42')->willReturn($originalShare);
+ $manager->expects($this->once())->method('generalCreateChecks')->with($share);
+ $manager->expects($this->once())->method('verifyPassword');
+ $manager->expects($this->never())->method('pathCreateChecks');
+ $manager->expects($this->once())->method('linkCreateChecks');
+ $manager->expects($this->never())->method('validateExpirationDateLink');
+
+ // If the password is empty, we have nothing to hash
+ $this->hasher->expects($this->never())
+ ->method('hash');
+
+ $this->defaultProvider->expects($this->never())
+ ->method('update');
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_set_expiration_date', $hookListener, 'post');
+ $hookListener->expects($this->never())->method('post');
+
+ $hookListener2 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_password', $hookListener2, 'post');
+ $hookListener2->expects($this->never())->method('post');
+
+ $hookListener3 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_permissions', $hookListener3, 'post');
+ $hookListener3->expects($this->never())->method('post');
+
+ $manager->updateShare($share);
+ }
+
+
+ public function testUpdateShareMailEnableSendPasswordByTalkWithPreviousPassword(): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('Cannot enable sending the password by Talk without setting a new password');
+
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'getShareById',
+ 'generalCreateChecks',
+ 'verifyPassword',
+ 'pathCreateChecks',
+ 'linkCreateChecks',
+ 'validateExpirationDateLink',
+ ])
+ ->getMock();
+
+ $originalShare = $this->manager->newShare();
+ $originalShare->setShareType(IShare::TYPE_EMAIL)
+ ->setPermissions(Constants::PERMISSION_ALL)
+ ->setPassword('password')
+ ->setSendPasswordByTalk(false);
+
+ $tomorrow = new \DateTime();
+ $tomorrow->setTime(0, 0, 0);
+ $tomorrow->add(new \DateInterval('P1D'));
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(100);
+
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')
+ ->setId('42')
+ ->setShareType(IShare::TYPE_EMAIL)
+ ->setToken('token')
+ ->setSharedBy('owner')
+ ->setShareOwner('owner')
+ ->setPassword('password')
+ ->setSendPasswordByTalk(true)
+ ->setExpirationDate($tomorrow)
+ ->setNode($file)
+ ->setPermissions(Constants::PERMISSION_ALL);
+
+ $manager->expects($this->once())->method('canShare')->willReturn(true);
+ $manager->expects($this->once())->method('getShareById')->with('foo:42')->willReturn($originalShare);
+ $manager->expects($this->once())->method('generalCreateChecks')->with($share);
+ $manager->expects($this->never())->method('verifyPassword');
+ $manager->expects($this->never())->method('pathCreateChecks');
+ $manager->expects($this->once())->method('linkCreateChecks');
+ $manager->expects($this->never())->method('validateExpirationDateLink');
+
+ // If the old & new passwords are the same, we don't do anything
+ $this->hasher->expects($this->never())
+ ->method('verify');
+ $this->hasher->expects($this->never())
+ ->method('hash');
+
+ $this->defaultProvider->expects($this->never())
+ ->method('update');
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_set_expiration_date', $hookListener, 'post');
+ $hookListener->expects($this->never())->method('post');
+
+ $hookListener2 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_password', $hookListener2, 'post');
+ $hookListener2->expects($this->never())->method('post');
+
+ $hookListener3 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_permissions', $hookListener3, 'post');
+ $hookListener3->expects($this->never())->method('post');
+
+ $manager->updateShare($share);
+ }
+
+ public function testUpdateShareMailDisableSendPasswordByTalkWithPreviousPassword(): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('Cannot disable sending the password by Talk without setting a new password');
+
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'getShareById',
+ 'generalCreateChecks',
+ 'verifyPassword',
+ 'pathCreateChecks',
+ 'linkCreateChecks',
+ 'validateExpirationDateLink',
+ ])
+ ->getMock();
+
+ $originalShare = $this->manager->newShare();
+ $originalShare->setShareType(IShare::TYPE_EMAIL)
+ ->setPermissions(Constants::PERMISSION_ALL)
+ ->setPassword('passwordHash')
+ ->setSendPasswordByTalk(true);
+
+ $tomorrow = new \DateTime();
+ $tomorrow->setTime(0, 0, 0);
+ $tomorrow->add(new \DateInterval('P1D'));
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(100);
+
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')
+ ->setId('42')
+ ->setShareType(IShare::TYPE_EMAIL)
+ ->setToken('token')
+ ->setSharedBy('owner')
+ ->setShareOwner('owner')
+ ->setPassword('passwordHash')
+ ->setSendPasswordByTalk(false)
+ ->setExpirationDate($tomorrow)
+ ->setNode($file)
+ ->setPermissions(Constants::PERMISSION_ALL);
+
+ $manager->expects($this->once())->method('canShare')->willReturn(true);
+ $manager->expects($this->once())->method('getShareById')->with('foo:42')->willReturn($originalShare);
+ $manager->expects($this->once())->method('generalCreateChecks')->with($share);
+ $manager->expects($this->never())->method('verifyPassword');
+ $manager->expects($this->never())->method('pathCreateChecks');
+ $manager->expects($this->once())->method('linkCreateChecks');
+ $manager->expects($this->never())->method('validateExpirationDateLink');
+
+ // If the old & new passwords are the same, we don't do anything
+ $this->hasher->expects($this->never())
+ ->method('verify');
+ $this->hasher->expects($this->never())
+ ->method('hash');
+
+ $this->defaultProvider->expects($this->never())
+ ->method('update');
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_set_expiration_date', $hookListener, 'post');
+ $hookListener->expects($this->never())->method('post');
+
+ $hookListener2 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_password', $hookListener2, 'post');
+ $hookListener2->expects($this->never())->method('post');
+
+ $hookListener3 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_permissions', $hookListener3, 'post');
+ $hookListener3->expects($this->never())->method('post');
+
+ $manager->updateShare($share);
+ }
+
+ public function testUpdateShareMailDisableSendPasswordByTalkWithoutChangingPassword(): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('Cannot disable sending the password by Talk without setting a new password');
+
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'canShare',
+ 'getShareById',
+ 'generalCreateChecks',
+ 'verifyPassword',
+ 'pathCreateChecks',
+ 'linkCreateChecks',
+ 'validateExpirationDateLink',
+ ])
+ ->getMock();
+
+ $originalShare = $this->manager->newShare();
+ $originalShare->setShareType(IShare::TYPE_EMAIL)
+ ->setPermissions(Constants::PERMISSION_ALL)
+ ->setPassword('passwordHash')
+ ->setSendPasswordByTalk(true);
+
+ $tomorrow = new \DateTime();
+ $tomorrow->setTime(0, 0, 0);
+ $tomorrow->add(new \DateInterval('P1D'));
+
+ $file = $this->createMock(File::class);
+ $file->method('getId')->willReturn(100);
+
+ $share = $this->manager->newShare();
+ $share->setProviderId('foo')
+ ->setId('42')
+ ->setShareType(IShare::TYPE_EMAIL)
+ ->setToken('token')
+ ->setSharedBy('owner')
+ ->setShareOwner('owner')
+ ->setPassword('passwordHash')
+ ->setSendPasswordByTalk(false)
+ ->setExpirationDate($tomorrow)
+ ->setNode($file)
+ ->setPermissions(Constants::PERMISSION_ALL);
+
+ $manager->expects($this->once())->method('canShare')->willReturn(true);
+ $manager->expects($this->once())->method('getShareById')->with('foo:42')->willReturn($originalShare);
+ $manager->expects($this->once())->method('generalCreateChecks')->with($share);
+ $manager->expects($this->never())->method('verifyPassword');
+ $manager->expects($this->never())->method('pathCreateChecks');
+ $manager->expects($this->once())->method('linkCreateChecks');
+ $manager->expects($this->never())->method('validateExpirationDateLink');
+
+ // If the old & new passwords are the same, we don't do anything
+ $this->hasher->expects($this->never())
+ ->method('verify');
+ $this->hasher->expects($this->never())
+ ->method('hash');
+
+ $this->defaultProvider->expects($this->never())
+ ->method('update');
+
+ $hookListener = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_set_expiration_date', $hookListener, 'post');
+ $hookListener->expects($this->never())->method('post');
+
+ $hookListener2 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_password', $hookListener2, 'post');
+ $hookListener2->expects($this->never())->method('post');
+
+ $hookListener3 = $this->createMock(DummyShareManagerListener::class);
+ Util::connectHook('OCP\Share', 'post_update_permissions', $hookListener3, 'post');
+ $hookListener3->expects($this->never())->method('post');
+
+ $manager->updateShare($share);
+ }
+
+ public function testMoveShareLink(): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('Cannot change target of link share');
+
+ $share = $this->manager->newShare();
+ $share->setShareType(IShare::TYPE_LINK);
+
+ $recipient = $this->createMock(IUser::class);
+
+ $this->manager->moveShare($share, $recipient);
+ }
+
+
+ public function testMoveShareUserNotRecipient(): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('Invalid share recipient');
+
+ $share = $this->manager->newShare();
+ $share->setShareType(IShare::TYPE_USER);
+
+ $share->setSharedWith('sharedWith');
+
+ $this->manager->moveShare($share, 'recipient');
+ }
+
+ public function testMoveShareUser(): void {
+ $share = $this->manager->newShare();
+ $share->setShareType(IShare::TYPE_USER)
+ ->setId('42')
+ ->setProviderId('foo');
+
+ $share->setSharedWith('recipient');
+
+ $this->defaultProvider->method('move')->with($share, 'recipient')->willReturnArgument(0);
+
+ $this->manager->moveShare($share, 'recipient');
+ $this->addToAssertionCount(1);
+ }
+
+
+ public function testMoveShareGroupNotRecipient(): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('Invalid share recipient');
+
+ $share = $this->manager->newShare();
+ $share->setShareType(IShare::TYPE_GROUP);
+
+ $sharedWith = $this->createMock(IGroup::class);
+ $share->setSharedWith('shareWith');
+
+ $recipient = $this->createMock(IUser::class);
+ $sharedWith->method('inGroup')->with($recipient)->willReturn(false);
+
+ $this->groupManager->method('get')->with('shareWith')->willReturn($sharedWith);
+ $this->userManager->method('get')->with('recipient')->willReturn($recipient);
+
+ $this->manager->moveShare($share, 'recipient');
+ }
+
+
+ public function testMoveShareGroupNull(): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('Group "shareWith" does not exist');
+
+ $share = $this->manager->newShare();
+ $share->setShareType(IShare::TYPE_GROUP);
+ $share->setSharedWith('shareWith');
+
+ $recipient = $this->createMock(IUser::class);
+
+ $this->groupManager->method('get')->with('shareWith')->willReturn(null);
+ $this->userManager->method('get')->with('recipient')->willReturn($recipient);
+
+ $this->manager->moveShare($share, 'recipient');
+ }
+
+ public function testMoveShareGroup(): void {
+ $share = $this->manager->newShare();
+ $share->setShareType(IShare::TYPE_GROUP)
+ ->setId('42')
+ ->setProviderId('foo');
+
+ $group = $this->createMock(IGroup::class);
+ $share->setSharedWith('group');
+
+ $recipient = $this->createMock(IUser::class);
+ $group->method('inGroup')->with($recipient)->willReturn(true);
+
+ $this->groupManager->method('get')->with('group')->willReturn($group);
+ $this->userManager->method('get')->with('recipient')->willReturn($recipient);
+
+ $this->defaultProvider->method('move')->with($share, 'recipient')->willReturnArgument(0);
+
+ $this->manager->moveShare($share, 'recipient');
+ $this->addToAssertionCount(1);
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('dataTestShareProviderExists')]
+ public function testShareProviderExists($shareType, $expected): void {
+ $factory = $this->getMockBuilder('OCP\Share\IProviderFactory')->getMock();
+ $factory->expects($this->any())->method('getProviderForType')
+ ->willReturnCallback(function ($id) {
+ if ($id === IShare::TYPE_USER) {
+ return true;
+ }
+ throw new ProviderException();
+ });
+
+ $manager = $this->createManager($factory);
+ $this->assertSame($expected,
+ $manager->shareProviderExists($shareType)
+ );
+ }
+
+ public static function dataTestShareProviderExists() {
+ return [
+ [IShare::TYPE_USER, true],
+ [42, false],
+ ];
+ }
+
+ public function testGetSharesInFolder(): void {
+ $factory = new DummyFactory2($this->createMock(IServerContainer::class));
+
+ $manager = $this->createManager($factory);
+
+ $factory->setProvider($this->defaultProvider);
+ $extraProvider = $this->createMock(IShareProvider::class);
+ $factory->setSecondProvider($extraProvider);
+
+ $share1 = $this->createMock(IShare::class);
+ $share2 = $this->createMock(IShare::class);
+ $share3 = $this->createMock(IShare::class);
+ $share4 = $this->createMock(IShare::class);
+
+ $folder = $this->createMock(Folder::class);
+
+ $this->defaultProvider->method('getSharesInFolder')
+ ->with(
+ $this->equalTo('user'),
+ $this->equalTo($folder),
+ $this->equalTo(false)
+ )->willReturn([
+ 1 => [$share1],
+ 2 => [$share2],
+ ]);
+
+ $extraProvider->method('getSharesInFolder')
+ ->with(
+ $this->equalTo('user'),
+ $this->equalTo($folder),
+ $this->equalTo(false)
+ )->willReturn([
+ 2 => [$share3],
+ 3 => [$share4],
+ ]);
+
+ $result = $manager->getSharesInFolder('user', $folder, false);
+
+ $expects = [
+ 1 => [$share1],
+ 2 => [$share2, $share3],
+ 3 => [$share4],
+ ];
+
+ $this->assertSame($expects, $result);
+ }
+
+ public function testGetSharesInFolderOwnerless(): void {
+ $factory = new DummyFactory2($this->createMock(IServerContainer::class));
+
+ $manager = $this->createManager($factory);
+
+ $factory->setProvider($this->defaultProvider);
+ $extraProvider = $this->createMock(IShareProviderSupportsAllSharesInFolder::class);
+ $factory->setSecondProvider($extraProvider);
+
+ $share1 = $this->createMock(IShare::class);
+ $share2 = $this->createMock(IShare::class);
+
+ $mount = $this->createMock(IShareOwnerlessMount::class);
+
+ $folder = $this->createMock(Folder::class);
+ $folder
+ ->method('getMountPoint')
+ ->willReturn($mount);
+
+ $this->defaultProvider
+ ->method('getAllSharesInFolder')
+ ->with($folder)
+ ->willReturn([1 => [$share1]]);
+
+ $extraProvider
+ ->method('getAllSharesInFolder')
+ ->with($folder)
+ ->willReturn([1 => [$share2]]);
+
+ $this->assertSame([
+ 1 => [$share1, $share2],
+ ], $manager->getSharesInFolder('user', $folder));
+ }
+
+
+ public function testGetAccessList(): void {
+ $factory = new DummyFactory2($this->createMock(IServerContainer::class));
+
+ $manager = $this->createManager($factory);
+
+ $factory->setProvider($this->defaultProvider);
+ $extraProvider = $this->createMock(IShareProvider::class);
+ $factory->setSecondProvider($extraProvider);
+
+ $nodeOwner = $this->createMock(IUser::class);
+ $nodeOwner->expects($this->once())
+ ->method('getUID')
+ ->willReturn('user1');
+
+ $node = $this->createMock(Node::class);
+ $node->expects($this->once())
+ ->method('getOwner')
+ ->willReturn($nodeOwner);
+ $node->method('getId')
+ ->willReturn(42);
+
+ $userFolder = $this->createMock(Folder::class);
+ $file = $this->createMock(File::class);
+ $folder = $this->createMock(Folder::class);
+
+ $owner = $this->createMock(IUser::class);
+ $owner->expects($this->once())
+ ->method('getUID')
+ ->willReturn('owner');
+
+ $file->method('getParent')
+ ->willReturn($folder);
+ $file->method('getPath')
+ ->willReturn('/owner/files/folder/file');
+ $file->method('getOwner')
+ ->willReturn($owner);
+ $file->method('getId')
+ ->willReturn(23);
+ $folder->method('getParent')
+ ->willReturn($userFolder);
+ $folder->method('getPath')
+ ->willReturn('/owner/files/folder');
+ $userFolder->method('getFirstNodeById')
+ ->with($this->equalTo(42))
+ ->willReturn($file);
+ $userFolder->method('getPath')
+ ->willReturn('/user1/files');
+
+ $this->userManager->method('userExists')
+ ->with($this->equalTo('user1'))
+ ->willReturn(true);
+
+ $this->defaultProvider->method('getAccessList')
+ ->with(
+ $this->equalTo([$file, $folder]),
+ false
+ )
+ ->willReturn([
+ 'users' => [
+ 'user1',
+ 'user2',
+ 'user3',
+ '123456',
+ ],
+ 'public' => true,
+ ]);
+
+ $extraProvider->method('getAccessList')
+ ->with(
+ $this->equalTo([$file, $folder]),
+ false
+ )
+ ->willReturn([
+ 'users' => [
+ 'user3',
+ 'user4',
+ 'user5',
+ '234567',
+ ],
+ 'remote' => true,
+ ]);
+
+ $this->rootFolder->method('getUserFolder')
+ ->with($this->equalTo('user1'))
+ ->willReturn($userFolder);
+
+ $expected = [
+ 'users' => ['owner', 'user1', 'user2', 'user3', '123456','user4', 'user5', '234567'],
+ 'remote' => true,
+ 'public' => true,
+ ];
+
+ $result = $manager->getAccessList($node, true, false);
+
+ $this->assertSame($expected['public'], $result['public']);
+ $this->assertSame($expected['remote'], $result['remote']);
+ $this->assertSame($expected['users'], $result['users']);
+ }
+
+ public function testGetAccessListWithCurrentAccess(): void {
+ $factory = new DummyFactory2($this->createMock(IServerContainer::class));
+
+ $manager = $this->createManager($factory);
+
+ $factory->setProvider($this->defaultProvider);
+ $extraProvider = $this->createMock(IShareProvider::class);
+ $factory->setSecondProvider($extraProvider);
+
+ $nodeOwner = $this->createMock(IUser::class);
+ $nodeOwner->expects($this->once())
+ ->method('getUID')
+ ->willReturn('user1');
+
+ $node = $this->createMock(Node::class);
+ $node->expects($this->once())
+ ->method('getOwner')
+ ->willReturn($nodeOwner);
+ $node->method('getId')
+ ->willReturn(42);
+
+ $userFolder = $this->createMock(Folder::class);
+ $file = $this->createMock(File::class);
+
+ $owner = $this->createMock(IUser::class);
+ $owner->expects($this->once())
+ ->method('getUID')
+ ->willReturn('owner');
+ $folder = $this->createMock(Folder::class);
+
+ $file->method('getParent')
+ ->willReturn($folder);
+ $file->method('getPath')
+ ->willReturn('/owner/files/folder/file');
+ $file->method('getOwner')
+ ->willReturn($owner);
+ $file->method('getId')
+ ->willReturn(23);
+ $folder->method('getParent')
+ ->willReturn($userFolder);
+ $folder->method('getPath')
+ ->willReturn('/owner/files/folder');
+ $userFolder->method('getFirstNodeById')
+ ->with($this->equalTo(42))
+ ->willReturn($file);
+ $userFolder->method('getPath')
+ ->willReturn('/user1/files');
+
+ $this->userManager->method('userExists')
+ ->with($this->equalTo('user1'))
+ ->willReturn(true);
+
+ $this->defaultProvider->method('getAccessList')
+ ->with(
+ $this->equalTo([$file, $folder]),
+ true
+ )
+ ->willReturn([
+ 'users' => [
+ 'user1' => [],
+ 'user2' => [],
+ 'user3' => [],
+ '123456' => [],
+ ],
+ 'public' => true,
+ ]);
+
+ $extraProvider->method('getAccessList')
+ ->with(
+ $this->equalTo([$file, $folder]),
+ true
+ )
+ ->willReturn([
+ 'users' => [
+ 'user3' => [],
+ 'user4' => [],
+ 'user5' => [],
+ '234567' => [],
+ ],
+ 'remote' => [
+ 'remote1',
+ ],
+ ]);
+
+ $this->rootFolder->method('getUserFolder')
+ ->with($this->equalTo('user1'))
+ ->willReturn($userFolder);
+
+ $expected = [
+ 'users' => [
+ 'owner' => [
+ 'node_id' => 23,
+ 'node_path' => '/folder/file'
+ ]
+ , 'user1' => [], 'user2' => [], 'user3' => [], '123456' => [], 'user4' => [], 'user5' => [], '234567' => []],
+ 'remote' => [
+ 'remote1',
+ ],
+ 'public' => true,
+ ];
+
+ $result = $manager->getAccessList($node, true, true);
+
+ $this->assertSame($expected['public'], $result['public']);
+ $this->assertSame($expected['remote'], $result['remote']);
+ $this->assertSame($expected['users'], $result['users']);
+ }
+
+ public function testGetAllShares(): void {
+ $factory = new DummyFactory2($this->createMock(IServerContainer::class));
+
+ $manager = $this->createManager($factory);
+
+ $factory->setProvider($this->defaultProvider);
+ $extraProvider = $this->createMock(IShareProvider::class);
+ $factory->setSecondProvider($extraProvider);
+
+ $share1 = $this->createMock(IShare::class);
+ $share2 = $this->createMock(IShare::class);
+ $share3 = $this->createMock(IShare::class);
+ $share4 = $this->createMock(IShare::class);
+
+ $this->defaultProvider->method('getAllShares')
+ ->willReturnCallback(function () use ($share1, $share2) {
+ yield $share1;
+ yield $share2;
+ });
+ $extraProvider->method('getAllShares')
+ ->willReturnCallback(function () use ($share3, $share4) {
+ yield $share3;
+ yield $share4;
+ });
+
+ // "yield from", used in "getAllShares()", does not reset the keys, so
+ // "use_keys" has to be disabled to collect all the values while
+ // ignoring the keys returned by the generator.
+ $result = iterator_to_array($manager->getAllShares(), $use_keys = false);
+
+ $expects = [$share1, $share2, $share3, $share4];
+
+ $this->assertSame($expects, $result);
+ }
+
+ public static function dataCurrentUserCanEnumerateTargetUser(): array {
+ return [
+ 'Full match guest' => [true, true, false, false, false, false, false, true],
+ 'Full match user' => [false, true, false, false, false, false, false, true],
+ 'Enumeration off guest' => [true, false, false, false, false, false, false, false],
+ 'Enumeration off user' => [false, false, false, false, false, false, false, false],
+ 'Enumeration guest' => [true, false, true, false, false, false, false, true],
+ 'Enumeration user' => [false, false, true, false, false, false, false, true],
+
+ // Restricted enumerations guests never works
+ 'Guest phone' => [true, false, true, true, false, false, false, false],
+ 'Guest group' => [true, false, true, false, true, false, false, false],
+ 'Guest both' => [true, false, true, true, true, false, false, false],
+
+ // Restricted enumerations users
+ 'User phone but not known' => [false, false, true, true, false, false, false, false],
+ 'User phone known' => [false, false, true, true, false, true, false, true],
+ 'User group but no match' => [false, false, true, false, true, false, false, false],
+ 'User group with match' => [false, false, true, false, true, false, true, true],
+ ];
+ }
+
+ /**
+ * @param bool $expected
+ */
+ #[\PHPUnit\Framework\Attributes\DataProvider('dataCurrentUserCanEnumerateTargetUser')]
+ public function testCurrentUserCanEnumerateTargetUser(bool $currentUserIsGuest, bool $allowEnumerationFullMatch, bool $allowEnumeration, bool $limitEnumerationToPhone, bool $limitEnumerationToGroups, bool $isKnownToUser, bool $haveCommonGroup, bool $expected): void {
+ /** @var IManager|MockObject $manager */
+ $manager = $this->createManagerMock()
+ ->onlyMethods([
+ 'allowEnumerationFullMatch',
+ 'allowEnumeration',
+ 'limitEnumerationToPhone',
+ 'limitEnumerationToGroups',
+ ])
+ ->getMock();
+
+ $manager->method('allowEnumerationFullMatch')
+ ->willReturn($allowEnumerationFullMatch);
+ $manager->method('allowEnumeration')
+ ->willReturn($allowEnumeration);
+ $manager->method('limitEnumerationToPhone')
+ ->willReturn($limitEnumerationToPhone);
+ $manager->method('limitEnumerationToGroups')
+ ->willReturn($limitEnumerationToGroups);
+
+ $this->knownUserService->method('isKnownToUser')
+ ->with('current', 'target')
+ ->willReturn($isKnownToUser);
+
+ $currentUser = null;
+ if (!$currentUserIsGuest) {
+ $currentUser = $this->createMock(IUser::class);
+ $currentUser->method('getUID')
+ ->willReturn('current');
+ }
+ $targetUser = $this->createMock(IUser::class);
+ $targetUser->method('getUID')
+ ->willReturn('target');
+
+ if ($haveCommonGroup) {
+ $this->groupManager->method('getUserGroupIds')
+ ->willReturnMap([
+ [$targetUser, ['gid1', 'gid2']],
+ [$currentUser, ['gid2', 'gid3']],
+ ]);
+ } else {
+ $this->groupManager->method('getUserGroupIds')
+ ->willReturnMap([
+ [$targetUser, ['gid1', 'gid2']],
+ [$currentUser, ['gid3', 'gid4']],
+ ]);
+ }
+
+ $this->assertSame($expected, $manager->currentUserCanEnumerateTargetUser($currentUser, $targetUser));
+ }
+}
+
+class DummyFactory implements IProviderFactory {
+ /** @var IShareProvider */
+ protected $provider;
+
+ public function __construct(IServerContainer $serverContainer) {
+ }
+
+ /**
+ * @param IShareProvider $provider
+ */
+ public function setProvider($provider) {
+ $this->provider = $provider;
+ }
+
+ /**
+ * @param string $id
+ * @return IShareProvider
+ */
+ public function getProvider($id) {
+ return $this->provider;
+ }
+
+ /**
+ * @param int $shareType
+ * @return IShareProvider
+ */
+ public function getProviderForType($shareType) {
+ return $this->provider;
+ }
+
+ /**
+ * @return IShareProvider[]
+ */
+ public function getAllProviders() {
+ return [$this->provider];
+ }
+
+ public function registerProvider(string $shareProvier): void {
+ }
+}
+
+class DummyFactory2 extends DummyFactory {
+ /** @var IShareProvider */
+ private $provider2;
+
+ /**
+ * @param IShareProvider $provider
+ */
+ public function setSecondProvider($provider) {
+ $this->provider2 = $provider;
+ }
+
+ public function getAllProviders() {
+ return [$this->provider, $this->provider2];
+ }
+
+ public function registerProvider(string $shareProvier): void {
+ }
+}
diff --git a/tests/lib/Share20/ShareByMailProviderTest.php b/tests/lib/Share20/ShareByMailProviderTest.php
new file mode 100644
index 00000000000..de4dc1a820c
--- /dev/null
+++ b/tests/lib/Share20/ShareByMailProviderTest.php
@@ -0,0 +1,296 @@
+<?php
+
+declare(strict_types=1);
+
+/**
+ * SPDX-FileCopyrightText: 2022 Nextcloud GmbH and Nextcloud contributors
+ * SPDX-License-Identifier: AGPL-3.0-or-later
+ */
+
+namespace Test\Share20;
+
+use OC\Files\Node\Node;
+use OCA\ShareByMail\Settings\SettingsManager;
+use OCA\ShareByMail\ShareByMailProvider;
+use OCP\DB\QueryBuilder\IQueryBuilder;
+use OCP\Defaults;
+use OCP\EventDispatcher\IEventDispatcher;
+use OCP\Files\IRootFolder;
+use OCP\IConfig;
+use OCP\IDBConnection;
+use OCP\IL10N;
+use OCP\IURLGenerator;
+use OCP\IUserManager;
+use OCP\Mail\IMailer;
+use OCP\Security\IHasher;
+use OCP\Security\ISecureRandom;
+use OCP\Server;
+use OCP\Share\IShare;
+use PHPUnit\Framework\MockObject\MockObject;
+use Psr\Log\LoggerInterface;
+use Test\TestCase;
+
+/**
+ * Class ShareByMailProviderTest
+ *
+ * @package Test\Share20
+ * @group DB
+ */
+class ShareByMailProviderTest extends TestCase {
+ /** @var IDBConnection */
+ protected $dbConn;
+
+ /** @var IUserManager | \PHPUnit\Framework\MockObject\MockObject */
+ protected $userManager;
+
+ /** @var IRootFolder | \PHPUnit\Framework\MockObject\MockObject */
+ protected $rootFolder;
+
+ /** @var ShareByMailProvider */
+ protected $provider;
+
+ /** @var \PHPUnit\Framework\MockObject\MockObject|IMailer */
+ protected $mailer;
+
+ /** @var \PHPUnit\Framework\MockObject\MockObject|IL10N */
+ protected $l10n;
+
+ /** @var \PHPUnit\Framework\MockObject\MockObject|Defaults */
+ protected $defaults;
+
+ /** @var \PHPUnit\Framework\MockObject\MockObject|IURLGenerator */
+ protected $urlGenerator;
+
+ /** @var IConfig|MockObject */
+ protected $config;
+
+ /** @var LoggerInterface|MockObject */
+ private $logger;
+
+ /** @var IHasher|MockObject */
+ private $hasher;
+
+ /** @var \OCP\Activity\IManager|MockObject */
+ private $activityManager;
+
+ /** @var IEventDispatcher|MockObject */
+ private $eventDispatcher;
+
+ /** @var \OCP\Share\IManager|MockObject */
+ private $shareManager;
+
+ /** @var ISecureRandom|MockObject */
+ private $secureRandom;
+
+ /** @var SettingsManager|MockObject */
+ private $settingsManager;
+
+ protected function setUp(): void {
+ $this->dbConn = Server::get(IDBConnection::class);
+ $this->userManager = $this->createMock(IUserManager::class);
+ $this->rootFolder = $this->createMock(IRootFolder::class);
+ $this->mailer = $this->createMock(IMailer::class);
+ $this->l10n = $this->createMock(IL10N::class);
+ $this->defaults = $this->getMockBuilder(Defaults::class)->disableOriginalConstructor()->getMock();
+ $this->urlGenerator = $this->createMock(IURLGenerator::class);
+ $this->logger = $this->createMock(LoggerInterface::class);
+ $this->activityManager = $this->createMock(\OCP\Activity\IManager::class);
+ $this->settingsManager = $this->createMock(SettingsManager::class);
+ $this->hasher = $this->createMock(IHasher::class);
+ $this->eventDispatcher = $this->createMock(IEventDispatcher::class);
+ $this->shareManager = $this->createMock(\OCP\Share\IManager::class);
+ $this->secureRandom = $this->createMock(ISecureRandom::class);
+ $this->config = $this->createMock(IConfig::class);
+
+ // Empty share table
+ $this->dbConn->getQueryBuilder()->delete('share')->execute();
+
+ $this->provider = new ShareByMailProvider(
+ $this->config,
+ $this->dbConn,
+ $this->secureRandom,
+ $this->userManager,
+ $this->rootFolder,
+ $this->l10n,
+ $this->logger,
+ $this->mailer,
+ $this->urlGenerator,
+ $this->activityManager,
+ $this->settingsManager,
+ $this->defaults,
+ $this->hasher,
+ $this->eventDispatcher,
+ $this->shareManager,
+ );
+ }
+
+ protected function tearDown(): void {
+ $this->dbConn->getQueryBuilder()->delete('share')->execute();
+ $this->dbConn->getQueryBuilder()->delete('filecache')->runAcrossAllShards()->execute();
+ $this->dbConn->getQueryBuilder()->delete('storages')->execute();
+ }
+
+ /**
+ * @param int $shareType
+ * @param string $sharedWith
+ * @param string $sharedBy
+ * @param string $shareOwner
+ * @param string $itemType
+ * @param int $fileSource
+ * @param string $fileTarget
+ * @param int $permissions
+ * @param $token
+ * @param $expiration
+ * @param $parent
+ * @return int
+ *
+ * @throws \OCP\DB\Exception
+ */
+ private function addShareToDB($shareType, $sharedWith, $sharedBy, $shareOwner,
+ $itemType, $fileSource, $fileTarget, $permissions, $token, $expiration,
+ $parent) {
+ $qb = $this->dbConn->getQueryBuilder();
+ $qb->insert('share');
+
+ if ($shareType) {
+ $qb->setValue('share_type', $qb->expr()->literal($shareType));
+ }
+ if ($sharedWith) {
+ $qb->setValue('share_with', $qb->expr()->literal($sharedWith));
+ }
+ if ($sharedBy) {
+ $qb->setValue('uid_initiator', $qb->expr()->literal($sharedBy));
+ }
+ if ($shareOwner) {
+ $qb->setValue('uid_owner', $qb->expr()->literal($shareOwner));
+ }
+ if ($itemType) {
+ $qb->setValue('item_type', $qb->expr()->literal($itemType));
+ }
+ if ($fileSource) {
+ $qb->setValue('file_source', $qb->expr()->literal($fileSource));
+ }
+ if ($fileTarget) {
+ $qb->setValue('file_target', $qb->expr()->literal($fileTarget));
+ }
+ if ($permissions) {
+ $qb->setValue('permissions', $qb->expr()->literal($permissions));
+ }
+ if ($token) {
+ $qb->setValue('token', $qb->expr()->literal($token));
+ }
+ if ($expiration) {
+ $qb->setValue('expiration', $qb->createNamedParameter($expiration, IQueryBuilder::PARAM_DATETIME_MUTABLE));
+ }
+ if ($parent) {
+ $qb->setValue('parent', $qb->expr()->literal($parent));
+ }
+
+ $this->assertEquals(1, $qb->execute());
+ return $qb->getLastInsertId();
+ }
+
+ public function testGetSharesByWithResharesAndNoNode(): void {
+ $this->addShareToDB(
+ IShare::TYPE_EMAIL,
+ 'external.one@domain.tld',
+ 'user1',
+ 'user1',
+ 'folder',
+ 42,
+ null,
+ 17,
+ 'foobar',
+ null,
+ null,
+ );
+ $this->addShareToDB(
+ IShare::TYPE_EMAIL,
+ 'external.two@domain.tld',
+ 'user2',
+ 'user2',
+ 'folder',
+ 42,
+ null,
+ 17,
+ 'barfoo',
+ null,
+ null,
+ );
+
+ // Return own shares only if not asked for a specific node
+ /** @var IShare[] $actual */
+ $actual = $this->provider->getSharesBy(
+ 'user1',
+ IShare::TYPE_EMAIL,
+ null,
+ true,
+ -1,
+ 0,
+ );
+
+ $this->assertCount(1, $actual);
+
+ $this->assertEquals(IShare::TYPE_EMAIL, $actual[0]->getShareType());
+ $this->assertEquals('user1', $actual[0]->getSharedBy());
+ $this->assertEquals('user1', $actual[0]->getShareOwner());
+ $this->assertEquals('external.one@domain.tld', $actual[0]->getSharedWith());
+ }
+
+ public function testGetSharesByWithResharesAndNode(): void {
+ $this->addShareToDB(
+ IShare::TYPE_EMAIL,
+ 'external.one@domain.tld',
+ 'user1',
+ 'user1',
+ 'folder',
+ 42,
+ null,
+ 17,
+ 'foobar',
+ null,
+ null,
+ );
+ $this->addShareToDB(
+ IShare::TYPE_EMAIL,
+ 'external.two@domain.tld',
+ 'user2',
+ 'user2',
+ 'folder',
+ 42,
+ null,
+ 17,
+ 'barfoo',
+ null,
+ null,
+ );
+
+ $node = $this->createMock(Node::class);
+ $node->expects($this->once())
+ ->method('getId')
+ ->willReturn(42);
+
+ // Return all shares if asked for specific node
+ /** @var IShare[] $actual */
+ $actual = $this->provider->getSharesBy(
+ 'user1',
+ IShare::TYPE_EMAIL,
+ $node,
+ true,
+ -1,
+ 0,
+ );
+
+ $this->assertCount(2, $actual);
+
+ $this->assertEquals(IShare::TYPE_EMAIL, $actual[0]->getShareType());
+ $this->assertEquals('user1', $actual[0]->getSharedBy());
+ $this->assertEquals('user1', $actual[0]->getShareOwner());
+ $this->assertEquals('external.one@domain.tld', $actual[0]->getSharedWith());
+
+ $this->assertEquals(IShare::TYPE_EMAIL, $actual[1]->getShareType());
+ $this->assertEquals('user2', $actual[1]->getSharedBy());
+ $this->assertEquals('user2', $actual[1]->getShareOwner());
+ $this->assertEquals('external.two@domain.tld', $actual[1]->getSharedWith());
+ }
+}
diff --git a/tests/lib/Share20/ShareHelperTest.php b/tests/lib/Share20/ShareHelperTest.php
new file mode 100644
index 00000000000..3928843cf7d
--- /dev/null
+++ b/tests/lib/Share20/ShareHelperTest.php
@@ -0,0 +1,213 @@
+<?php
+
+/**
+ * SPDX-FileCopyrightText: 2017 Nextcloud GmbH and Nextcloud contributors
+ * SPDX-License-Identifier: AGPL-3.0-or-later
+ */
+
+namespace Test\Share20;
+
+use OC\Share20\ShareHelper;
+use OCP\Files\Node;
+use OCP\Files\NotFoundException;
+use OCP\Share\IManager;
+use Test\TestCase;
+
+class ShareHelperTest extends TestCase {
+ /** @var IManager|\PHPUnit\Framework\MockObject\MockObject */
+ private $manager;
+
+ /** @var ShareHelper */
+ private $helper;
+
+ protected function setUp(): void {
+ parent::setUp();
+
+ $this->manager = $this->createMock(IManager::class);
+
+ $this->helper = new ShareHelper($this->manager);
+ }
+
+ public static function dataGetPathsForAccessList(): array {
+ return [
+ [[], [], false, [], [], false, [
+ 'users' => [],
+ 'remotes' => [],
+ ]],
+ [['user1', 'user2'], ['user1' => 'foo', 'user2' => 'bar'], true, [], [], false, [
+ 'users' => ['user1' => 'foo', 'user2' => 'bar'],
+ 'remotes' => [],
+ ]],
+ [[], [], false, ['remote1', 'remote2'], ['remote1' => 'qwe', 'remote2' => 'rtz'], true, [
+ 'users' => [],
+ 'remotes' => ['remote1' => 'qwe', 'remote2' => 'rtz'],
+ ]],
+ [['user1', 'user2'], ['user1' => 'foo', 'user2' => 'bar'], true, ['remote1', 'remote2'], ['remote1' => 'qwe', 'remote2' => 'rtz'], true, [
+ 'users' => ['user1' => 'foo', 'user2' => 'bar'],
+ 'remotes' => ['remote1' => 'qwe', 'remote2' => 'rtz'],
+ ]],
+ ];
+ }
+
+ #[\PHPUnit\Framework\Attributes\DataProvider('dataGetPathsForAccessList')]
+ public function testGetPathsForAccessList(array $userList, array $userMap, $resolveUsers, array $remoteList, array $remoteMap, $resolveRemotes, array $expected): void {
+ $this->manager->expects($this->once())
+ ->method('getAccessList')
+ ->willReturn([
+ 'users' => $userList,
+ 'remote' => $remoteList,
+ ]);
+
+ /** @var Node|\PHPUnit\Framework\MockObject\MockObject $node */
+ $node = $this->createMock(Node::class);
+ /** @var ShareHelper|\PHPUnit\Framework\MockObject\MockObject $helper */
+ $helper = $this->getMockBuilder(ShareHelper::class)
+ ->setConstructorArgs([$this->manager])
+ ->onlyMethods(['getPathsForUsers', 'getPathsForRemotes'])
+ ->getMock();
+
+ $helper->expects($resolveUsers ? $this->once() : $this->never())
+ ->method('getPathsForUsers')
+ ->with($node, $userList)
+ ->willReturn($userMap);
+
+ $helper->expects($resolveRemotes ? $this->once() : $this->never())
+ ->method('getPathsForRemotes')
+ ->with($node, $remoteList)
+ ->willReturn($remoteMap);
+
+ $this->assertSame($expected, $helper->getPathsForAccessList($node));
+ }
+
+ public static function dataGetPathsForUsers(): array {
+ return [
+ [[], [23 => 'TwentyThree', 42 => 'FortyTwo'], []],
+ [
+ [
+ 'test1' => ['node_id' => 16, 'node_path' => '/foo'],
+ 'test2' => ['node_id' => 23, 'node_path' => '/bar'],
+ 'test3' => ['node_id' => 42, 'node_path' => '/cat'],
+ 'test4' => ['node_id' => 48, 'node_path' => '/dog'],
+ ],
+ [16 => 'SixTeen', 23 => 'TwentyThree', 42 => 'FortyTwo'],
+ [
+ 'test1' => '/foo/TwentyThree/FortyTwo',
+ 'test2' => '/bar/FortyTwo',
+ 'test3' => '/cat',
+ ],
+ ],
+ ];
+ }
+
+ /**
+ *
+ * @param array $users
+ * @param array $nodes
+ * @param array $expected
+ */
+ #[\PHPUnit\Framework\Attributes\DataProvider('dataGetPathsForUsers')]
+ public function testGetPathsForUsers(array $users, array $nodes, array $expected): void {
+ $lastNode = null;
+ foreach ($nodes as $nodeId => $nodeName) {
+ /** @var Node|\PHPUnit\Framework\MockObject\MockObject $node */
+ $node = $this->createMock(Node::class);
+ $node->expects($this->any())
+ ->method('getId')
+ ->willReturn($nodeId);
+ $node->expects($this->any())
+ ->method('getName')
+ ->willReturn($nodeName);
+ if ($lastNode === null) {
+ $node->expects($this->any())
+ ->method('getParent')
+ ->willThrowException(new NotFoundException());
+ } else {
+ $node->expects($this->any())
+ ->method('getParent')
+ ->willReturn($lastNode);
+ }
+ $lastNode = $node;
+ }
+
+ $this->assertEquals($expected, self::invokePrivate($this->helper, 'getPathsForUsers', [$lastNode, $users]));
+ }
+
+ public static function dataGetPathsForRemotes(): array {
+ return [
+ [[], [23 => 'TwentyThree', 42 => 'FortyTwo'], []],
+ [
+ [
+ 'test1' => ['node_id' => 16, 'token' => 't1'],
+ 'test2' => ['node_id' => 23, 'token' => 't2'],
+ 'test3' => ['node_id' => 42, 'token' => 't3'],
+ 'test4' => ['node_id' => 48, 'token' => 't4'],
+ ],
+ [
+ 16 => '/admin/files/SixTeen',
+ 23 => '/admin/files/SixTeen/TwentyThree',
+ 42 => '/admin/files/SixTeen/TwentyThree/FortyTwo',
+ ],
+ [
+ 'test1' => ['token' => 't1', 'node_path' => '/SixTeen'],
+ 'test2' => ['token' => 't2', 'node_path' => '/SixTeen/TwentyThree'],
+ 'test3' => ['token' => 't3', 'node_path' => '/SixTeen/TwentyThree/FortyTwo'],
+ ],
+ ],
+ ];
+ }
+
+ /**
+ *
+ * @param array $remotes
+ * @param array $nodes
+ * @param array $expected
+ */
+ #[\PHPUnit\Framework\Attributes\DataProvider('dataGetPathsForRemotes')]
+ public function testGetPathsForRemotes(array $remotes, array $nodes, array $expected): void {
+ $lastNode = null;
+ foreach ($nodes as $nodeId => $nodePath) {
+ /** @var Node|\PHPUnit\Framework\MockObject\MockObject $node */
+ $node = $this->createMock(Node::class);
+ $node->expects($this->any())
+ ->method('getId')
+ ->willReturn($nodeId);
+ $node->expects($this->any())
+ ->method('getPath')
+ ->willReturn($nodePath);
+ if ($lastNode === null) {
+ $node->expects($this->any())
+ ->method('getParent')
+ ->willThrowException(new NotFoundException());
+ } else {
+ $node->expects($this->any())
+ ->method('getParent')
+ ->willReturn($lastNode);
+ }
+ $lastNode = $node;
+ }
+
+ $this->assertEquals($expected, self::invokePrivate($this->helper, 'getPathsForRemotes', [$lastNode, $remotes]));
+ }
+
+ public static function dataGetMountedPath(): array {
+ return [
+ ['/admin/files/foobar', '/foobar'],
+ ['/admin/files/foo/bar', '/foo/bar'],
+ ];
+ }
+
+ /**
+ * @param string $path
+ * @param string $expected
+ */
+ #[\PHPUnit\Framework\Attributes\DataProvider('dataGetMountedPath')]
+ public function testGetMountedPath($path, $expected): void {
+ /** @var Node|\PHPUnit\Framework\MockObject\MockObject $node */
+ $node = $this->createMock(Node::class);
+ $node->expects($this->once())
+ ->method('getPath')
+ ->willReturn($path);
+
+ $this->assertSame($expected, self::invokePrivate($this->helper, 'getMountedPath', [$node]));
+ }
+}
diff --git a/tests/lib/Share20/ShareTest.php b/tests/lib/Share20/ShareTest.php
new file mode 100644
index 00000000000..f15fbb860db
--- /dev/null
+++ b/tests/lib/Share20/ShareTest.php
@@ -0,0 +1,88 @@
+<?php
+
+/**
+ * SPDX-FileCopyrightText: 2016-2024 Nextcloud GmbH and Nextcloud contributors
+ * SPDX-FileCopyrightText: 2016 ownCloud, Inc.
+ * SPDX-License-Identifier: AGPL-3.0-only
+ */
+
+namespace Test\Share20;
+
+use OC\Share20\Share;
+use OCP\Files\IRootFolder;
+use OCP\IUserManager;
+use OCP\Share\Exceptions\IllegalIDChangeException;
+use OCP\Share\IShare;
+use PHPUnit\Framework\MockObject\MockObject;
+
+/**
+ * Class ShareTest
+ *
+ * @package Test\Share20
+ */
+class ShareTest extends \Test\TestCase {
+ /** @var IRootFolder|MockObject */
+ protected $rootFolder;
+ /** @var IUserManager|MockObject */
+ protected $userManager;
+ /** @var IShare */
+ protected $share;
+
+ protected function setUp(): void {
+ $this->rootFolder = $this->createMock(IRootFolder::class);
+ $this->userManager = $this->createMock(IUserManager::class);
+ $this->share = new Share($this->rootFolder, $this->userManager);
+ }
+
+
+ public function testSetIdInvalid(): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('String expected.');
+
+ $this->share->setId(1.2);
+ }
+
+ public function testSetIdInt(): void {
+ $this->share->setId(42);
+ $this->assertEquals('42', $this->share->getId());
+ }
+
+
+ public function testSetIdString(): void {
+ $this->share->setId('foo');
+ $this->assertEquals('foo', $this->share->getId());
+ }
+
+
+ public function testSetIdOnce(): void {
+ $this->expectException(IllegalIDChangeException::class);
+ $this->expectExceptionMessage('Not allowed to assign a new internal id to a share');
+
+ $this->share->setId('foo');
+ $this->share->setId('bar');
+ }
+
+
+ public function testSetProviderIdInt(): void {
+ $this->expectException(\InvalidArgumentException::class);
+ $this->expectExceptionMessage('String expected.');
+
+ $this->share->setProviderId(42);
+ }
+
+
+ public function testSetProviderIdString(): void {
+ $this->share->setProviderId('foo');
+ $this->share->setId('bar');
+ $this->assertEquals('foo:bar', $this->share->getFullId());
+ }
+
+
+ public function testSetProviderIdOnce(): void {
+ $this->expectException(IllegalIDChangeException::class);
+ $this->expectExceptionMessage('Not allowed to assign a new provider id to a share');
+
+ $this->share->setProviderId('foo');
+ $this->share->setProviderId('bar');
+ }
+}