2015-02-18 19:44:13 +03:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* Copyright (c) 2015 Thomas Müller <deepdiver@owncloud.com>
|
|
|
|
* This file is licensed under the Affero General Public License version 3 or
|
|
|
|
* later.
|
|
|
|
* See the COPYING-README file. */
|
|
|
|
|
|
|
|
namespace Test\Files;
|
|
|
|
|
|
|
|
use OC\Files\Storage\Local;
|
|
|
|
use OC\Files\View;
|
|
|
|
|
2015-11-27 18:26:16 +03:00
|
|
|
/**
|
2016-05-20 16:38:20 +03:00
|
|
|
* Class PathVerificationTest
|
2015-11-27 18:26:16 +03:00
|
|
|
*
|
|
|
|
* @group DB
|
|
|
|
*
|
|
|
|
* @package Test\Files
|
|
|
|
*/
|
2016-05-19 09:41:01 +03:00
|
|
|
class PathVerificationTest extends \Test\TestCase {
|
2015-02-18 19:44:13 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @var \OC\Files\View
|
|
|
|
*/
|
|
|
|
private $view;
|
|
|
|
|
|
|
|
protected function setUp() {
|
|
|
|
parent::setUp();
|
|
|
|
$this->view = new View();
|
|
|
|
}
|
|
|
|
|
2015-03-10 15:08:22 +03:00
|
|
|
/**
|
|
|
|
* @expectedException \OCP\Files\InvalidPathException
|
|
|
|
* @expectedExceptionMessage File name is too long
|
|
|
|
*/
|
|
|
|
public function testPathVerificationFileNameTooLong() {
|
|
|
|
$fileName = str_repeat('a', 500);
|
|
|
|
$this->view->verifyPath('', $fileName);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-02-18 19:44:13 +03:00
|
|
|
/**
|
|
|
|
* @dataProvider providesEmptyFiles
|
|
|
|
* @expectedException \OCP\Files\InvalidPathException
|
|
|
|
* @expectedExceptionMessage Empty filename is not allowed
|
|
|
|
*/
|
|
|
|
public function testPathVerificationEmptyFileName($fileName) {
|
|
|
|
$this->view->verifyPath('', $fileName);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function providesEmptyFiles() {
|
|
|
|
return [
|
|
|
|
[''],
|
|
|
|
[' '],
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @dataProvider providesDotFiles
|
|
|
|
* @expectedException \OCP\Files\InvalidPathException
|
|
|
|
* @expectedExceptionMessage Dot files are not allowed
|
|
|
|
*/
|
|
|
|
public function testPathVerificationDotFiles($fileName) {
|
|
|
|
$this->view->verifyPath('', $fileName);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function providesDotFiles() {
|
|
|
|
return [
|
|
|
|
['.'],
|
|
|
|
['..'],
|
|
|
|
[' .'],
|
|
|
|
[' ..'],
|
|
|
|
['. '],
|
|
|
|
['.. '],
|
|
|
|
[' . '],
|
|
|
|
[' .. '],
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @dataProvider providesAstralPlane
|
|
|
|
* @expectedException \OCP\Files\InvalidPathException
|
|
|
|
* @expectedExceptionMessage 4-byte characters are not supported in file names
|
|
|
|
*/
|
|
|
|
public function testPathVerificationAstralPlane($fileName) {
|
|
|
|
$this->view->verifyPath('', $fileName);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function providesAstralPlane() {
|
|
|
|
return [
|
|
|
|
// this is the monkey emoji - http://en.wikipedia.org/w/index.php?title=%F0%9F%90%B5&redirect=no
|
|
|
|
['🐵'],
|
2015-07-30 12:22:14 +03:00
|
|
|
['🐵.txt'],
|
|
|
|
['txt.💩'],
|
2015-07-30 12:25:05 +03:00
|
|
|
['💩🐵.txt'],
|
|
|
|
['💩🐵'],
|
2015-02-18 19:44:13 +03:00
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @dataProvider providesInvalidCharsWindows
|
2015-03-04 16:03:47 +03:00
|
|
|
* @expectedException \OCP\Files\InvalidCharacterInPathException
|
2015-02-18 19:44:13 +03:00
|
|
|
*/
|
|
|
|
public function testPathVerificationInvalidCharsWindows($fileName) {
|
|
|
|
$storage = new Local(['datadir' => '']);
|
|
|
|
|
|
|
|
$fileName = " 123{$fileName}456 ";
|
2015-06-03 13:03:02 +03:00
|
|
|
self::invokePrivate($storage, 'verifyWindowsPath', [$fileName]);
|
2015-02-18 19:44:13 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
public function providesInvalidCharsWindows() {
|
|
|
|
return [
|
|
|
|
[\chr(0)],
|
|
|
|
[\chr(1)],
|
|
|
|
[\chr(2)],
|
|
|
|
[\chr(3)],
|
|
|
|
[\chr(4)],
|
|
|
|
[\chr(5)],
|
|
|
|
[\chr(6)],
|
|
|
|
[\chr(7)],
|
|
|
|
[\chr(8)],
|
|
|
|
[\chr(9)],
|
|
|
|
[\chr(10)],
|
|
|
|
[\chr(11)],
|
|
|
|
[\chr(12)],
|
|
|
|
[\chr(13)],
|
|
|
|
[\chr(14)],
|
|
|
|
[\chr(15)],
|
|
|
|
[\chr(16)],
|
|
|
|
[\chr(17)],
|
|
|
|
[\chr(18)],
|
|
|
|
[\chr(19)],
|
|
|
|
[\chr(20)],
|
|
|
|
[\chr(21)],
|
|
|
|
[\chr(22)],
|
|
|
|
[\chr(23)],
|
|
|
|
[\chr(24)],
|
|
|
|
[\chr(25)],
|
|
|
|
[\chr(26)],
|
|
|
|
[\chr(27)],
|
|
|
|
[\chr(28)],
|
|
|
|
[\chr(29)],
|
|
|
|
[\chr(30)],
|
|
|
|
[\chr(31)],
|
|
|
|
['<'],
|
|
|
|
['>'],
|
|
|
|
[':'],
|
|
|
|
['"'],
|
|
|
|
['/'],
|
|
|
|
['\\'],
|
|
|
|
['|'],
|
|
|
|
['?'],
|
|
|
|
['*'],
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @dataProvider providesInvalidCharsPosix
|
2015-03-04 16:03:47 +03:00
|
|
|
* @expectedException \OCP\Files\InvalidCharacterInPathException
|
2015-02-18 19:44:13 +03:00
|
|
|
*/
|
|
|
|
public function testPathVerificationInvalidCharsPosix($fileName) {
|
|
|
|
$storage = new Local(['datadir' => '']);
|
|
|
|
|
|
|
|
$fileName = " 123{$fileName}456 ";
|
2015-06-03 13:03:02 +03:00
|
|
|
self::invokePrivate($storage, 'verifyWindowsPath', [$fileName]);
|
2015-02-18 19:44:13 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
public function providesInvalidCharsPosix() {
|
|
|
|
return [
|
|
|
|
[\chr(0)],
|
|
|
|
[\chr(1)],
|
|
|
|
[\chr(2)],
|
|
|
|
[\chr(3)],
|
|
|
|
[\chr(4)],
|
|
|
|
[\chr(5)],
|
|
|
|
[\chr(6)],
|
|
|
|
[\chr(7)],
|
|
|
|
[\chr(8)],
|
|
|
|
[\chr(9)],
|
|
|
|
[\chr(10)],
|
|
|
|
[\chr(11)],
|
|
|
|
[\chr(12)],
|
|
|
|
[\chr(13)],
|
|
|
|
[\chr(14)],
|
|
|
|
[\chr(15)],
|
|
|
|
[\chr(16)],
|
|
|
|
[\chr(17)],
|
|
|
|
[\chr(18)],
|
|
|
|
[\chr(19)],
|
|
|
|
[\chr(20)],
|
|
|
|
[\chr(21)],
|
|
|
|
[\chr(22)],
|
|
|
|
[\chr(23)],
|
|
|
|
[\chr(24)],
|
|
|
|
[\chr(25)],
|
|
|
|
[\chr(26)],
|
|
|
|
[\chr(27)],
|
|
|
|
[\chr(28)],
|
|
|
|
[\chr(29)],
|
|
|
|
[\chr(30)],
|
|
|
|
[\chr(31)],
|
|
|
|
['/'],
|
|
|
|
['\\'],
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @dataProvider providesReservedNamesWindows
|
2015-03-04 16:03:47 +03:00
|
|
|
* @expectedException \OCP\Files\ReservedWordException
|
2015-02-18 19:44:13 +03:00
|
|
|
*/
|
|
|
|
public function testPathVerificationReservedNamesWindows($fileName) {
|
|
|
|
$storage = new Local(['datadir' => '']);
|
|
|
|
|
2015-06-03 13:03:02 +03:00
|
|
|
self::invokePrivate($storage, 'verifyWindowsPath', [$fileName]);
|
2015-02-18 19:44:13 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
public function providesReservedNamesWindows() {
|
|
|
|
return [
|
|
|
|
[' CON '],
|
|
|
|
['prn '],
|
|
|
|
['AUX'],
|
|
|
|
['NUL'],
|
|
|
|
['COM1'],
|
|
|
|
['COM2'],
|
|
|
|
['COM3'],
|
|
|
|
['COM4'],
|
|
|
|
['COM5'],
|
|
|
|
['COM6'],
|
|
|
|
['COM7'],
|
|
|
|
['COM8'],
|
|
|
|
['COM9'],
|
|
|
|
['LPT1'],
|
|
|
|
['LPT2'],
|
|
|
|
['LPT3'],
|
|
|
|
['LPT4'],
|
|
|
|
['LPT5'],
|
|
|
|
['LPT6'],
|
|
|
|
['LPT7'],
|
|
|
|
['LPT8'],
|
|
|
|
['LPT9']
|
|
|
|
];
|
|
|
|
}
|
|
|
|
|
2015-03-17 20:16:28 +03:00
|
|
|
/**
|
|
|
|
* @dataProvider providesValidPosixPaths
|
|
|
|
*/
|
|
|
|
public function testPathVerificationValidPaths($fileName) {
|
|
|
|
$storage = new Local(['datadir' => '']);
|
|
|
|
|
2015-06-03 13:03:02 +03:00
|
|
|
self::invokePrivate($storage, 'verifyPosixPath', [$fileName]);
|
|
|
|
self::invokePrivate($storage, 'verifyWindowsPath', [$fileName]);
|
2015-03-17 20:16:28 +03:00
|
|
|
// nothing thrown
|
|
|
|
$this->assertTrue(true);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function providesValidPosixPaths() {
|
|
|
|
return [
|
|
|
|
['simple'],
|
|
|
|
['simple.txt'],
|
|
|
|
['\''],
|
|
|
|
['`'],
|
|
|
|
['%'],
|
|
|
|
['()'],
|
|
|
|
['[]'],
|
|
|
|
['!'],
|
|
|
|
['$'],
|
|
|
|
['_'],
|
|
|
|
];
|
|
|
|
}
|
2015-02-18 19:44:13 +03:00
|
|
|
}
|