2014-10-31 13:41:07 +03:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 17:49:16 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2020-03-31 11:49:10 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2016-07-21 17:49:16 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
2020-03-31 11:49:10 +03:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2016-01-12 17:02:16 +03:00
|
|
|
* @author Robin McCorkell <robin@mccorkell.me.uk>
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Roeland Jago Douma <roeland@famdouma.nl>
|
2020-12-16 16:54:15 +03:00
|
|
|
* @author Vincent Petry <vincent@nextcloud.com>
|
2014-10-31 13:41:07 +03:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* @license AGPL-3.0
|
2014-10-31 13:41:07 +03:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
2014-10-31 13:41:07 +03:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* This program is distributed in the hope that it will be useful,
|
2014-10-31 13:41:07 +03:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2015-03-26 13:44:34 +03:00
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
2014-10-31 13:41:07 +03:00
|
|
|
*
|
2015-03-26 13:44:34 +03:00
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2014-10-31 13:41:07 +03:00
|
|
|
*
|
|
|
|
*/
|
2019-11-22 22:52:10 +03:00
|
|
|
|
2016-05-13 12:22:28 +03:00
|
|
|
namespace OCA\Files_External\Tests\Controller;
|
2014-10-31 13:41:07 +03:00
|
|
|
|
2019-11-22 22:52:10 +03:00
|
|
|
use OCA\Files_External\Controller\GlobalStoragesController;
|
2017-10-24 16:26:53 +03:00
|
|
|
use OCA\Files_External\Lib\Auth\AuthMechanism;
|
|
|
|
use OCA\Files_External\Lib\Backend\Backend;
|
2014-10-31 13:41:07 +03:00
|
|
|
|
2016-05-13 12:56:47 +03:00
|
|
|
use OCA\Files_External\Lib\StorageConfig;
|
|
|
|
use OCA\Files_External\NotFoundException;
|
2019-11-22 22:52:10 +03:00
|
|
|
use OCA\Files_External\Service\GlobalStoragesService;
|
|
|
|
use OCP\AppFramework\Http;
|
2014-10-31 13:41:07 +03:00
|
|
|
|
|
|
|
abstract class StoragesControllerTest extends \Test\TestCase {
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @var GlobalStoragesController
|
|
|
|
*/
|
|
|
|
protected $controller;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @var GlobalStoragesService
|
|
|
|
*/
|
|
|
|
protected $service;
|
|
|
|
|
2019-11-27 17:27:18 +03:00
|
|
|
protected function setUp(): void {
|
2020-07-10 00:39:58 +03:00
|
|
|
\OCA\Files_External\MountConfig::$skipTest = true;
|
2014-10-31 13:41:07 +03:00
|
|
|
}
|
|
|
|
|
2019-11-27 17:27:18 +03:00
|
|
|
protected function tearDown(): void {
|
2020-07-10 00:39:58 +03:00
|
|
|
\OCA\Files_External\MountConfig::$skipTest = false;
|
2014-10-31 13:41:07 +03:00
|
|
|
}
|
|
|
|
|
2015-12-07 15:05:27 +03:00
|
|
|
/**
|
|
|
|
* @return \OCA\Files_External\Lib\Backend\Backend
|
|
|
|
*/
|
2016-04-14 01:18:07 +03:00
|
|
|
protected function getBackendMock($class = '\OCA\Files_External\Lib\Backend\SMB', $storageClass = '\OCA\Files_External\Lib\Storage\SMB') {
|
2017-10-24 16:26:53 +03:00
|
|
|
$backend = $this->getMockBuilder(Backend::class)
|
2015-08-11 20:45:07 +03:00
|
|
|
->disableOriginalConstructor()
|
|
|
|
->getMock();
|
|
|
|
$backend->method('getStorageClass')
|
|
|
|
->willReturn($storageClass);
|
2015-08-12 22:03:11 +03:00
|
|
|
$backend->method('getIdentifier')
|
|
|
|
->willReturn('identifier:'.$class);
|
2020-03-13 17:33:47 +03:00
|
|
|
$backend->method('getParameters')
|
|
|
|
->willReturn([]);
|
2015-08-11 20:45:07 +03:00
|
|
|
return $backend;
|
|
|
|
}
|
|
|
|
|
2015-12-07 15:05:27 +03:00
|
|
|
/**
|
|
|
|
* @return \OCA\Files_External\Lib\Auth\AuthMechanism
|
|
|
|
*/
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
protected function getAuthMechMock($scheme = 'null', $class = '\OCA\Files_External\Lib\Auth\NullMechanism') {
|
2017-10-24 16:26:53 +03:00
|
|
|
$authMech = $this->getMockBuilder(AuthMechanism::class)
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
->disableOriginalConstructor()
|
|
|
|
->getMock();
|
|
|
|
$authMech->method('getScheme')
|
|
|
|
->willReturn($scheme);
|
2015-08-12 22:03:11 +03:00
|
|
|
$authMech->method('getIdentifier')
|
|
|
|
->willReturn('identifier:'.$class);
|
2020-03-13 17:33:47 +03:00
|
|
|
$authMech->method('getParameters')
|
|
|
|
->willReturn([]);
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
|
|
|
|
return $authMech;
|
|
|
|
}
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
public function testAddStorage() {
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
$authMech = $this->getAuthMechMock();
|
|
|
|
$authMech->method('validateStorage')
|
|
|
|
->willReturn(true);
|
2015-09-17 12:24:19 +03:00
|
|
|
$authMech->method('isVisibleFor')
|
2015-08-28 18:15:21 +03:00
|
|
|
->willReturn(true);
|
2015-08-11 20:45:07 +03:00
|
|
|
$backend = $this->getBackendMock();
|
|
|
|
$backend->method('validateStorage')
|
|
|
|
->willReturn(true);
|
2015-09-17 12:24:19 +03:00
|
|
|
$backend->method('isVisibleFor')
|
2015-08-11 20:45:07 +03:00
|
|
|
->willReturn(true);
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
$storageConfig = new StorageConfig(1);
|
|
|
|
$storageConfig->setMountPoint('mount');
|
2015-08-11 20:45:07 +03:00
|
|
|
$storageConfig->setBackend($backend);
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
$storageConfig->setAuthMechanism($authMech);
|
2015-08-11 20:45:07 +03:00
|
|
|
$storageConfig->setBackendOptions([]);
|
2014-10-31 13:41:07 +03:00
|
|
|
|
2015-08-11 20:45:07 +03:00
|
|
|
$this->service->expects($this->once())
|
|
|
|
->method('createStorage')
|
2020-03-26 00:21:27 +03:00
|
|
|
->willReturn($storageConfig);
|
2014-10-31 13:41:07 +03:00
|
|
|
$this->service->expects($this->once())
|
|
|
|
->method('addStorage')
|
2020-03-26 00:21:27 +03:00
|
|
|
->willReturn($storageConfig);
|
2014-10-31 13:41:07 +03:00
|
|
|
|
|
|
|
$response = $this->controller->create(
|
|
|
|
'mount',
|
2016-04-14 01:18:07 +03:00
|
|
|
'\OCA\Files_External\Lib\Storage\SMB',
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
'\OCA\Files_External\Lib\Auth\NullMechanism',
|
2020-03-26 11:30:18 +03:00
|
|
|
[],
|
2014-10-31 13:41:07 +03:00
|
|
|
[],
|
|
|
|
[],
|
2015-03-13 14:49:11 +03:00
|
|
|
[],
|
2014-10-31 13:41:07 +03:00
|
|
|
null
|
|
|
|
);
|
|
|
|
|
|
|
|
$data = $response->getData();
|
|
|
|
$this->assertEquals(Http::STATUS_CREATED, $response->getStatus());
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
$this->assertEquals($storageConfig, $data);
|
2014-10-31 13:41:07 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
public function testUpdateStorage() {
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
$authMech = $this->getAuthMechMock();
|
|
|
|
$authMech->method('validateStorage')
|
|
|
|
->willReturn(true);
|
2015-09-17 12:24:19 +03:00
|
|
|
$authMech->method('isVisibleFor')
|
2015-08-28 18:15:21 +03:00
|
|
|
->willReturn(true);
|
2015-08-11 20:45:07 +03:00
|
|
|
$backend = $this->getBackendMock();
|
|
|
|
$backend->method('validateStorage')
|
|
|
|
->willReturn(true);
|
2015-09-17 12:24:19 +03:00
|
|
|
$backend->method('isVisibleFor')
|
2015-08-11 20:45:07 +03:00
|
|
|
->willReturn(true);
|
|
|
|
|
2014-10-31 13:41:07 +03:00
|
|
|
$storageConfig = new StorageConfig(1);
|
|
|
|
$storageConfig->setMountPoint('mount');
|
2015-08-11 20:45:07 +03:00
|
|
|
$storageConfig->setBackend($backend);
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
$storageConfig->setAuthMechanism($authMech);
|
2015-08-11 20:45:07 +03:00
|
|
|
$storageConfig->setBackendOptions([]);
|
2014-10-31 13:41:07 +03:00
|
|
|
|
2015-08-11 20:45:07 +03:00
|
|
|
$this->service->expects($this->once())
|
|
|
|
->method('createStorage')
|
2020-03-26 00:21:27 +03:00
|
|
|
->willReturn($storageConfig);
|
2014-10-31 13:41:07 +03:00
|
|
|
$this->service->expects($this->once())
|
|
|
|
->method('updateStorage')
|
2020-03-26 00:21:27 +03:00
|
|
|
->willReturn($storageConfig);
|
2014-10-31 13:41:07 +03:00
|
|
|
|
|
|
|
$response = $this->controller->update(
|
|
|
|
1,
|
|
|
|
'mount',
|
2016-04-14 01:18:07 +03:00
|
|
|
'\OCA\Files_External\Lib\Storage\SMB',
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
'\OCA\Files_External\Lib\Auth\NullMechanism',
|
2020-03-26 11:30:18 +03:00
|
|
|
[],
|
2014-10-31 13:41:07 +03:00
|
|
|
[],
|
|
|
|
[],
|
2015-03-13 14:49:11 +03:00
|
|
|
[],
|
2014-10-31 13:41:07 +03:00
|
|
|
null
|
|
|
|
);
|
|
|
|
|
|
|
|
$data = $response->getData();
|
|
|
|
$this->assertEquals(Http::STATUS_OK, $response->getStatus());
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
$this->assertEquals($storageConfig, $data);
|
2014-10-31 13:41:07 +03:00
|
|
|
}
|
|
|
|
|
2020-04-10 17:51:06 +03:00
|
|
|
public function mountPointNamesProvider() {
|
2020-03-26 11:30:18 +03:00
|
|
|
return [
|
|
|
|
[''],
|
|
|
|
['/'],
|
|
|
|
['//'],
|
|
|
|
];
|
2014-10-31 13:41:07 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @dataProvider mountPointNamesProvider
|
|
|
|
*/
|
|
|
|
public function testAddOrUpdateStorageInvalidMountPoint($mountPoint) {
|
2015-08-11 20:45:07 +03:00
|
|
|
$storageConfig = new StorageConfig(1);
|
|
|
|
$storageConfig->setMountPoint($mountPoint);
|
|
|
|
$storageConfig->setBackend($this->getBackendMock());
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
$storageConfig->setAuthMechanism($this->getAuthMechMock());
|
2015-08-11 20:45:07 +03:00
|
|
|
$storageConfig->setBackendOptions([]);
|
|
|
|
|
|
|
|
$this->service->expects($this->exactly(2))
|
|
|
|
->method('createStorage')
|
2020-03-26 00:21:27 +03:00
|
|
|
->willReturn($storageConfig);
|
2014-10-31 13:41:07 +03:00
|
|
|
$this->service->expects($this->never())
|
|
|
|
->method('addStorage');
|
|
|
|
$this->service->expects($this->never())
|
|
|
|
->method('updateStorage');
|
|
|
|
|
|
|
|
$response = $this->controller->create(
|
|
|
|
$mountPoint,
|
2016-04-14 01:18:07 +03:00
|
|
|
'\OCA\Files_External\Lib\Storage\SMB',
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
'\OCA\Files_External\Lib\Auth\NullMechanism',
|
2020-03-26 11:30:18 +03:00
|
|
|
[],
|
2014-10-31 13:41:07 +03:00
|
|
|
[],
|
|
|
|
[],
|
2015-03-13 14:49:11 +03:00
|
|
|
[],
|
2014-10-31 13:41:07 +03:00
|
|
|
null
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->assertEquals(Http::STATUS_UNPROCESSABLE_ENTITY, $response->getStatus());
|
|
|
|
|
|
|
|
$response = $this->controller->update(
|
|
|
|
1,
|
|
|
|
$mountPoint,
|
2016-04-14 01:18:07 +03:00
|
|
|
'\OCA\Files_External\Lib\Storage\SMB',
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
'\OCA\Files_External\Lib\Auth\NullMechanism',
|
2020-03-26 11:30:18 +03:00
|
|
|
[],
|
2014-10-31 13:41:07 +03:00
|
|
|
[],
|
|
|
|
[],
|
2015-03-13 14:49:11 +03:00
|
|
|
[],
|
2014-10-31 13:41:07 +03:00
|
|
|
null
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->assertEquals(Http::STATUS_UNPROCESSABLE_ENTITY, $response->getStatus());
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testAddOrUpdateStorageInvalidBackend() {
|
2015-08-11 20:45:07 +03:00
|
|
|
$this->service->expects($this->exactly(2))
|
|
|
|
->method('createStorage')
|
|
|
|
->will($this->throwException(new \InvalidArgumentException()));
|
2014-10-31 13:41:07 +03:00
|
|
|
$this->service->expects($this->never())
|
|
|
|
->method('addStorage');
|
|
|
|
$this->service->expects($this->never())
|
|
|
|
->method('updateStorage');
|
|
|
|
|
|
|
|
$response = $this->controller->create(
|
|
|
|
'mount',
|
|
|
|
'\OC\Files\Storage\InvalidStorage',
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
'\OCA\Files_External\Lib\Auth\NullMechanism',
|
2020-03-26 11:30:18 +03:00
|
|
|
[],
|
2014-10-31 13:41:07 +03:00
|
|
|
[],
|
|
|
|
[],
|
2015-03-13 14:49:11 +03:00
|
|
|
[],
|
2014-10-31 13:41:07 +03:00
|
|
|
null
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->assertEquals(Http::STATUS_UNPROCESSABLE_ENTITY, $response->getStatus());
|
|
|
|
|
|
|
|
$response = $this->controller->update(
|
|
|
|
1,
|
|
|
|
'mount',
|
|
|
|
'\OC\Files\Storage\InvalidStorage',
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
'\OCA\Files_External\Lib\Auth\NullMechanism',
|
2020-03-26 11:30:18 +03:00
|
|
|
[],
|
2014-10-31 13:41:07 +03:00
|
|
|
[],
|
|
|
|
[],
|
2015-03-13 14:49:11 +03:00
|
|
|
[],
|
2014-10-31 13:41:07 +03:00
|
|
|
null
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->assertEquals(Http::STATUS_UNPROCESSABLE_ENTITY, $response->getStatus());
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testUpdateStorageNonExisting() {
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
$authMech = $this->getAuthMechMock();
|
|
|
|
$authMech->method('validateStorage')
|
|
|
|
->willReturn(true);
|
2015-09-17 12:24:19 +03:00
|
|
|
$authMech->method('isVisibleFor')
|
2015-08-28 18:15:21 +03:00
|
|
|
->willReturn(true);
|
2015-08-11 20:45:07 +03:00
|
|
|
$backend = $this->getBackendMock();
|
|
|
|
$backend->method('validateStorage')
|
|
|
|
->willReturn(true);
|
2015-09-17 12:24:19 +03:00
|
|
|
$backend->method('isVisibleFor')
|
2015-08-11 20:45:07 +03:00
|
|
|
->willReturn(true);
|
|
|
|
|
|
|
|
$storageConfig = new StorageConfig(255);
|
|
|
|
$storageConfig->setMountPoint('mount');
|
|
|
|
$storageConfig->setBackend($backend);
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
$storageConfig->setAuthMechanism($authMech);
|
2015-08-11 20:45:07 +03:00
|
|
|
$storageConfig->setBackendOptions([]);
|
|
|
|
|
|
|
|
$this->service->expects($this->once())
|
|
|
|
->method('createStorage')
|
2020-03-26 00:21:27 +03:00
|
|
|
->willReturn($storageConfig);
|
2014-10-31 13:41:07 +03:00
|
|
|
$this->service->expects($this->once())
|
|
|
|
->method('updateStorage')
|
|
|
|
->will($this->throwException(new NotFoundException()));
|
|
|
|
|
|
|
|
$response = $this->controller->update(
|
|
|
|
255,
|
|
|
|
'mount',
|
2016-04-14 01:18:07 +03:00
|
|
|
'\OCA\Files_External\Lib\Storage\SMB',
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
'\OCA\Files_External\Lib\Auth\NullMechanism',
|
2020-03-26 11:30:18 +03:00
|
|
|
[],
|
2014-10-31 13:41:07 +03:00
|
|
|
[],
|
|
|
|
[],
|
2015-03-13 14:49:11 +03:00
|
|
|
[],
|
2014-10-31 13:41:07 +03:00
|
|
|
null
|
|
|
|
);
|
|
|
|
|
|
|
|
$this->assertEquals(Http::STATUS_NOT_FOUND, $response->getStatus());
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testDeleteStorage() {
|
|
|
|
$this->service->expects($this->once())
|
|
|
|
->method('removeStorage');
|
|
|
|
|
|
|
|
$response = $this->controller->destroy(1);
|
|
|
|
$this->assertEquals(Http::STATUS_NO_CONTENT, $response->getStatus());
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testDeleteStorageNonExisting() {
|
|
|
|
$this->service->expects($this->once())
|
|
|
|
->method('removeStorage')
|
|
|
|
->will($this->throwException(new NotFoundException()));
|
|
|
|
|
|
|
|
$response = $this->controller->destroy(255);
|
|
|
|
$this->assertEquals(Http::STATUS_NOT_FOUND, $response->getStatus());
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testGetStorage() {
|
2015-08-11 20:45:07 +03:00
|
|
|
$backend = $this->getBackendMock();
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
$authMech = $this->getAuthMechMock();
|
2014-10-31 13:41:07 +03:00
|
|
|
$storageConfig = new StorageConfig(1);
|
|
|
|
$storageConfig->setMountPoint('test');
|
2015-08-11 20:45:07 +03:00
|
|
|
$storageConfig->setBackend($backend);
|
Authentication mechanisms for external storage backends
A backend can now specify generic authentication schemes that it
supports, instead of specifying the parameters for its authentication
method directly. This allows multiple authentication mechanisms to be
implemented for a single scheme, providing altered functionality.
This commit introduces the backend framework for this feature, and so at
this point the UI will be broken as the frontend does not specify the
required information.
Terminology:
- authentication scheme
Parameter interface for the authentication method. A backend
supporting the 'password' scheme accepts two parameters, 'user' and
'password'.
- authentication mechanism
Specific mechanism implementing a scheme. Basic mechanisms may
forward configuration options directly to the backend, more advanced
ones may lookup parameters or retrieve them from the session
New dropdown selector for external storage configurations to select the
authentication mechanism to be used.
Authentication mechanisms can have visibilities, just like backends.
The API was extended too to make it easier to add/remove visibilities.
In addition, the concept of 'allowed visibility' has been introduced, so
a backend/auth mechanism can force a maximum visibility level (e.g.
Local storage type) that cannot be overridden by configuration in the
web UI.
An authentication mechanism is a fully instantiated implementation. This
allows an implementation to have dependencies injected into it, e.g. an
\OCP\IDB for database operations.
When a StorageConfig is being prepared for mounting, the authentication
mechanism implementation has manipulateStorage() called,
which inserts the relevant authentication method options into the
storage ready for mounting.
2015-08-12 12:54:03 +03:00
|
|
|
$storageConfig->setAuthMechanism($authMech);
|
2014-10-31 13:41:07 +03:00
|
|
|
$storageConfig->setBackendOptions(['user' => 'test', 'password', 'password123']);
|
2015-03-13 14:49:11 +03:00
|
|
|
$storageConfig->setMountOptions(['priority' => false]);
|
2014-10-31 13:41:07 +03:00
|
|
|
|
|
|
|
$this->service->expects($this->once())
|
|
|
|
->method('getStorage')
|
|
|
|
->with(1)
|
2020-03-26 00:21:27 +03:00
|
|
|
->willReturn($storageConfig);
|
2014-10-31 13:41:07 +03:00
|
|
|
$response = $this->controller->show(1);
|
|
|
|
|
|
|
|
$this->assertEquals(Http::STATUS_OK, $response->getStatus());
|
2021-01-08 18:14:44 +03:00
|
|
|
$expected = $storageConfig->jsonSerialize();
|
|
|
|
$expected['can_edit'] = false;
|
|
|
|
$this->assertEquals($expected, $response->getData());
|
2014-10-31 13:41:07 +03:00
|
|
|
}
|
2015-08-12 12:00:37 +03:00
|
|
|
|
|
|
|
public function validateStorageProvider() {
|
|
|
|
return [
|
|
|
|
[true, true, true],
|
|
|
|
[false, true, false],
|
|
|
|
[true, false, false],
|
|
|
|
[false, false, false]
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @dataProvider validateStorageProvider
|
|
|
|
*/
|
|
|
|
public function testValidateStorage($backendValidate, $authMechValidate, $expectSuccess) {
|
|
|
|
$backend = $this->getBackendMock();
|
|
|
|
$backend->method('validateStorage')
|
|
|
|
->willReturn($backendValidate);
|
2015-09-17 12:24:19 +03:00
|
|
|
$backend->method('isVisibleFor')
|
2015-08-12 12:00:37 +03:00
|
|
|
->willReturn(true);
|
|
|
|
|
|
|
|
$authMech = $this->getAuthMechMock();
|
|
|
|
$authMech->method('validateStorage')
|
2020-03-26 00:21:27 +03:00
|
|
|
->willReturn($authMechValidate);
|
2015-09-17 12:24:19 +03:00
|
|
|
$authMech->method('isVisibleFor')
|
2015-08-28 18:15:21 +03:00
|
|
|
->willReturn(true);
|
2015-08-12 12:00:37 +03:00
|
|
|
|
|
|
|
$storageConfig = new StorageConfig();
|
|
|
|
$storageConfig->setMountPoint('mount');
|
|
|
|
$storageConfig->setBackend($backend);
|
|
|
|
$storageConfig->setAuthMechanism($authMech);
|
|
|
|
$storageConfig->setBackendOptions([]);
|
|
|
|
|
|
|
|
$this->service->expects($this->once())
|
|
|
|
->method('createStorage')
|
2020-03-26 00:21:27 +03:00
|
|
|
->willReturn($storageConfig);
|
2015-08-12 12:00:37 +03:00
|
|
|
|
|
|
|
if ($expectSuccess) {
|
|
|
|
$this->service->expects($this->once())
|
|
|
|
->method('addStorage')
|
|
|
|
->with($storageConfig)
|
2020-03-26 00:21:27 +03:00
|
|
|
->willReturn($storageConfig);
|
2015-08-12 12:00:37 +03:00
|
|
|
} else {
|
|
|
|
$this->service->expects($this->never())
|
|
|
|
->method('addStorage');
|
|
|
|
}
|
|
|
|
|
|
|
|
$response = $this->controller->create(
|
|
|
|
'mount',
|
2016-04-14 01:18:07 +03:00
|
|
|
'\OCA\Files_External\Lib\Storage\SMB',
|
2015-08-12 12:00:37 +03:00
|
|
|
'\OCA\Files_External\Lib\Auth\NullMechanism',
|
2020-03-26 11:30:18 +03:00
|
|
|
[],
|
2015-08-12 12:00:37 +03:00
|
|
|
[],
|
|
|
|
[],
|
|
|
|
[],
|
|
|
|
null
|
|
|
|
);
|
|
|
|
|
|
|
|
if ($expectSuccess) {
|
|
|
|
$this->assertEquals(Http::STATUS_CREATED, $response->getStatus());
|
|
|
|
} else {
|
|
|
|
$this->assertEquals(Http::STATUS_UNPROCESSABLE_ENTITY, $response->getStatus());
|
|
|
|
}
|
|
|
|
}
|
2014-10-31 13:41:07 +03:00
|
|
|
}
|