2014-12-04 16:15:55 +03:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* @author Lukas Reschke
|
2015-01-30 16:16:16 +03:00
|
|
|
* @copyright 2014-2015 Lukas Reschke lukas@owncloud.com
|
2014-12-04 16:15:55 +03:00
|
|
|
*
|
|
|
|
* This file is licensed under the Affero General Public License version 3 or
|
|
|
|
* later.
|
|
|
|
* See the COPYING-README file.
|
|
|
|
*/
|
|
|
|
namespace OC\Settings\Controller;
|
|
|
|
|
|
|
|
use \OC\Settings\Application;
|
2014-12-08 17:32:59 +03:00
|
|
|
use OCP\AppFramework\Http;
|
2014-12-04 16:15:55 +03:00
|
|
|
use OCP\AppFramework\Http\DataResponse;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @package OC\Settings\Controller
|
|
|
|
*/
|
|
|
|
class UsersControllerTest extends \Test\TestCase {
|
|
|
|
|
|
|
|
/** @var \OCP\AppFramework\IAppContainer */
|
|
|
|
private $container;
|
|
|
|
|
|
|
|
protected function setUp() {
|
|
|
|
$app = new Application();
|
|
|
|
$this->container = $app->getContainer();
|
|
|
|
$this->container['AppName'] = 'settings';
|
|
|
|
$this->container['GroupManager'] = $this->getMockBuilder('\OCP\IGroupManager')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$this->container['UserManager'] = $this->getMockBuilder('\OCP\IUserManager')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$this->container['UserSession'] = $this->getMockBuilder('\OC\User\Session')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$this->container['L10N'] = $this->getMockBuilder('\OCP\IL10N')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$this->container['Config'] = $this->getMockBuilder('\OCP\IConfig')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$this->container['L10N']
|
|
|
|
->expects($this->any())
|
|
|
|
->method('t')
|
|
|
|
->will($this->returnCallback(function($text, $parameters = array()) {
|
|
|
|
return vsprintf($text, $parameters);
|
|
|
|
}));
|
2014-12-16 19:54:30 +03:00
|
|
|
$this->container['Defaults'] = $this->getMockBuilder('\OC_Defaults')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$this->container['Mail'] = $this->getMockBuilder('\OC_Mail')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$this->container['DefaultMailAddress'] = 'no-reply@owncloud.com';
|
|
|
|
$this->container['Logger'] = $this->getMockBuilder('\OCP\ILogger')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$this->container['URLGenerator'] = $this->getMockBuilder('\OCP\IURLGenerator')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
2015-01-23 19:45:45 +03:00
|
|
|
$this->container['OCP\\App\\IAppManager'] = $this->getMockBuilder('OCP\\App\\IAppManager')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
2014-12-04 16:15:55 +03:00
|
|
|
}
|
|
|
|
|
2015-01-30 16:16:16 +03:00
|
|
|
public function testIndexAdmin() {
|
|
|
|
$this->container['IsAdmin'] = true;
|
|
|
|
|
2014-12-04 16:15:55 +03:00
|
|
|
$foo = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-09 00:38:54 +03:00
|
|
|
$foo
|
2014-12-15 14:43:42 +03:00
|
|
|
->expects($this->exactly(4))
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-09 00:38:54 +03:00
|
|
|
->method('getUID')
|
|
|
|
->will($this->returnValue('foo'));
|
|
|
|
$foo
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getDisplayName')
|
|
|
|
->will($this->returnValue('M. Foo'));
|
2014-12-04 16:15:55 +03:00
|
|
|
$foo
|
|
|
|
->method('getLastLogin')
|
|
|
|
->will($this->returnValue(500));
|
|
|
|
$foo
|
|
|
|
->method('getHome')
|
|
|
|
->will($this->returnValue('/home/foo'));
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-09 00:38:54 +03:00
|
|
|
$foo
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getBackendClassName')
|
|
|
|
->will($this->returnValue('OC_User_Database'));
|
|
|
|
$admin = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$admin
|
2014-12-15 14:43:42 +03:00
|
|
|
->expects($this->exactly(4))
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-09 00:38:54 +03:00
|
|
|
->method('getUID')
|
|
|
|
->will($this->returnValue('admin'));
|
|
|
|
$admin
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getDisplayName')
|
|
|
|
->will($this->returnValue('S. Admin'));
|
|
|
|
$admin
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getLastLogin')
|
|
|
|
->will($this->returnValue(12));
|
|
|
|
$admin
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getHome')
|
|
|
|
->will($this->returnValue('/home/admin'));
|
|
|
|
$admin
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getBackendClassName')
|
|
|
|
->will($this->returnValue('OC_User_Dummy'));
|
2014-12-04 16:15:55 +03:00
|
|
|
$bar = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-09 00:38:54 +03:00
|
|
|
$bar
|
2014-12-15 14:43:42 +03:00
|
|
|
->expects($this->exactly(4))
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-09 00:38:54 +03:00
|
|
|
->method('getUID')
|
|
|
|
->will($this->returnValue('bar'));
|
|
|
|
$bar
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getDisplayName')
|
|
|
|
->will($this->returnValue('B. Ar'));
|
2014-12-04 16:15:55 +03:00
|
|
|
$bar
|
|
|
|
->method('getLastLogin')
|
|
|
|
->will($this->returnValue(3999));
|
|
|
|
$bar
|
|
|
|
->method('getHome')
|
|
|
|
->will($this->returnValue('/home/bar'));
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-09 00:38:54 +03:00
|
|
|
$bar
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getBackendClassName')
|
|
|
|
->will($this->returnValue('OC_User_Dummy'));
|
2014-12-04 16:15:55 +03:00
|
|
|
|
|
|
|
$this->container['GroupManager']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('displayNamesInGroup')
|
2015-01-18 20:31:03 +03:00
|
|
|
->with('gid', 'pattern')
|
2014-12-04 16:15:55 +03:00
|
|
|
->will($this->returnValue(array('foo' => 'M. Foo', 'admin' => 'S. Admin', 'bar' => 'B. Ar')));
|
|
|
|
$this->container['GroupManager']
|
|
|
|
->expects($this->exactly(3))
|
|
|
|
->method('getUserGroupIds')
|
|
|
|
->will($this->onConsecutiveCalls(array('Users', 'Support'), array('admins', 'Support'), array('External Users')));
|
|
|
|
$this->container['UserManager']
|
2014-12-12 18:42:25 +03:00
|
|
|
->expects($this->at(0))
|
|
|
|
->method('get')
|
|
|
|
->with('foo')
|
|
|
|
->will($this->returnValue($foo));
|
|
|
|
$this->container['UserManager']
|
|
|
|
->expects($this->at(1))
|
2014-12-04 16:15:55 +03:00
|
|
|
->method('get')
|
2014-12-12 18:42:25 +03:00
|
|
|
->with('admin')
|
|
|
|
->will($this->returnValue($admin));
|
|
|
|
$this->container['UserManager']
|
|
|
|
->expects($this->at(2))
|
2014-12-04 16:15:55 +03:00
|
|
|
->method('get')
|
2014-12-12 18:42:25 +03:00
|
|
|
->with('bar')
|
|
|
|
->will($this->returnValue($bar));
|
2014-12-04 16:15:55 +03:00
|
|
|
$this->container['Config']
|
2014-12-15 14:43:42 +03:00
|
|
|
->expects($this->exactly(6))
|
2014-12-04 16:15:55 +03:00
|
|
|
->method('getUserValue')
|
2014-12-15 14:43:42 +03:00
|
|
|
->will($this->onConsecutiveCalls(1024, 'foo@bar.com',
|
|
|
|
404, 'admin@bar.com',
|
|
|
|
2323, 'bar@dummy.com'));
|
2014-12-04 16:15:55 +03:00
|
|
|
|
|
|
|
$expectedResponse = new DataResponse(
|
|
|
|
array(
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-09 00:38:54 +03:00
|
|
|
0 => array(
|
|
|
|
'name' => 'foo',
|
|
|
|
'displayname' => 'M. Foo',
|
|
|
|
'groups' => array('Users', 'Support'),
|
|
|
|
'subadmin' => array(),
|
|
|
|
'quota' => 1024,
|
|
|
|
'storageLocation' => '/home/foo',
|
|
|
|
'lastLogin' => 500,
|
2014-12-15 14:43:42 +03:00
|
|
|
'backend' => 'OC_User_Database',
|
2015-01-23 19:45:45 +03:00
|
|
|
'email' => 'foo@bar.com',
|
|
|
|
'isRestoreDisabled' => false,
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-09 00:38:54 +03:00
|
|
|
),
|
|
|
|
1 => array(
|
|
|
|
'name' => 'admin',
|
|
|
|
'displayname' => 'S. Admin',
|
|
|
|
'groups' => array('admins', 'Support'),
|
|
|
|
'subadmin' => array(),
|
|
|
|
'quota' => 404,
|
|
|
|
'storageLocation' => '/home/admin',
|
|
|
|
'lastLogin' => 12,
|
2014-12-15 14:43:42 +03:00
|
|
|
'backend' => 'OC_User_Dummy',
|
2015-01-23 19:45:45 +03:00
|
|
|
'email' => 'admin@bar.com',
|
|
|
|
'isRestoreDisabled' => false,
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-09 00:38:54 +03:00
|
|
|
),
|
|
|
|
2 => array(
|
|
|
|
'name' => 'bar',
|
|
|
|
'displayname' => 'B. Ar',
|
|
|
|
'groups' => array('External Users'),
|
|
|
|
'subadmin' => array(),
|
|
|
|
'quota' => 2323,
|
|
|
|
'storageLocation' => '/home/bar',
|
|
|
|
'lastLogin' => 3999,
|
2014-12-15 14:43:42 +03:00
|
|
|
'backend' => 'OC_User_Dummy',
|
2015-01-23 19:45:45 +03:00
|
|
|
'email' => 'bar@dummy.com',
|
|
|
|
'isRestoreDisabled' => false,
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-09 00:38:54 +03:00
|
|
|
),
|
2014-12-04 16:15:55 +03:00
|
|
|
)
|
|
|
|
);
|
2015-01-23 19:45:45 +03:00
|
|
|
$response = $this->container['UsersController']->index(0, 10, 'gid', 'pattern');
|
2014-12-04 16:15:55 +03:00
|
|
|
$this->assertEquals($expectedResponse, $response);
|
|
|
|
}
|
|
|
|
|
2015-01-30 16:16:16 +03:00
|
|
|
public function testIndexSubAdmin() {
|
|
|
|
$this->container['IsAdmin'] = false;
|
|
|
|
$this->container['SubAdminOfGroups'] = ['SubGroup1', 'SubGroup2'];
|
|
|
|
|
|
|
|
$foo = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$foo
|
|
|
|
->expects($this->exactly(4))
|
|
|
|
->method('getUID')
|
|
|
|
->will($this->returnValue('foo'));
|
|
|
|
$foo
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getDisplayName')
|
|
|
|
->will($this->returnValue('M. Foo'));
|
|
|
|
$foo
|
|
|
|
->method('getLastLogin')
|
|
|
|
->will($this->returnValue(500));
|
|
|
|
$foo
|
|
|
|
->method('getHome')
|
|
|
|
->will($this->returnValue('/home/foo'));
|
|
|
|
$foo
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getBackendClassName')
|
|
|
|
->will($this->returnValue('OC_User_Database'));
|
|
|
|
$admin = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$admin
|
|
|
|
->expects($this->exactly(4))
|
|
|
|
->method('getUID')
|
|
|
|
->will($this->returnValue('admin'));
|
|
|
|
$admin
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getDisplayName')
|
|
|
|
->will($this->returnValue('S. Admin'));
|
|
|
|
$admin
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getLastLogin')
|
|
|
|
->will($this->returnValue(12));
|
|
|
|
$admin
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getHome')
|
|
|
|
->will($this->returnValue('/home/admin'));
|
|
|
|
$admin
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getBackendClassName')
|
|
|
|
->will($this->returnValue('OC_User_Dummy'));
|
|
|
|
$bar = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$bar
|
|
|
|
->expects($this->exactly(4))
|
|
|
|
->method('getUID')
|
|
|
|
->will($this->returnValue('bar'));
|
|
|
|
$bar
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getDisplayName')
|
|
|
|
->will($this->returnValue('B. Ar'));
|
|
|
|
$bar
|
|
|
|
->method('getLastLogin')
|
|
|
|
->will($this->returnValue(3999));
|
|
|
|
$bar
|
|
|
|
->method('getHome')
|
|
|
|
->will($this->returnValue('/home/bar'));
|
|
|
|
$bar
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getBackendClassName')
|
|
|
|
->will($this->returnValue('OC_User_Dummy'));
|
|
|
|
|
|
|
|
$this->container['GroupManager']
|
|
|
|
->expects($this->at(0))
|
|
|
|
->method('displayNamesInGroup')
|
|
|
|
->with('SubGroup1', 'pattern')
|
|
|
|
->will($this->returnValue(['foo' => 'M. Foo', 'admin' => 'S. Admin']));
|
|
|
|
$this->container['GroupManager']
|
|
|
|
->expects($this->at(1))
|
|
|
|
->method('displayNamesInGroup')
|
|
|
|
->with('SubGroup2', 'pattern')
|
|
|
|
->will($this->returnValue(['bar' => 'B. Ar']));
|
|
|
|
$this->container['GroupManager']
|
|
|
|
->expects($this->exactly(3))
|
|
|
|
->method('getUserGroupIds')
|
|
|
|
->will($this->onConsecutiveCalls(
|
|
|
|
['SubGroup2', 'SubGroup1'],
|
|
|
|
['SubGroup2', 'Foo'],
|
|
|
|
['admin', 'SubGroup1', 'testGroup']
|
|
|
|
));
|
|
|
|
$this->container['UserManager']
|
|
|
|
->expects($this->at(0))
|
|
|
|
->method('get')
|
|
|
|
->with('foo')
|
|
|
|
->will($this->returnValue($foo));
|
|
|
|
$this->container['UserManager']
|
|
|
|
->expects($this->at(1))
|
|
|
|
->method('get')
|
|
|
|
->with('admin')
|
|
|
|
->will($this->returnValue($admin));
|
|
|
|
$this->container['UserManager']
|
|
|
|
->expects($this->at(2))
|
|
|
|
->method('get')
|
|
|
|
->with('bar')
|
|
|
|
->will($this->returnValue($bar));
|
|
|
|
$this->container['Config']
|
|
|
|
->expects($this->exactly(6))
|
|
|
|
->method('getUserValue')
|
|
|
|
->will($this->onConsecutiveCalls(
|
|
|
|
1024, 'foo@bar.com',
|
|
|
|
404, 'admin@bar.com',
|
|
|
|
2323, 'bar@dummy.com'
|
|
|
|
));
|
|
|
|
|
|
|
|
$expectedResponse = new DataResponse(
|
|
|
|
[
|
|
|
|
0 => [
|
|
|
|
'name' => 'foo',
|
|
|
|
'displayname' => 'M. Foo',
|
|
|
|
'groups' => ['SubGroup2', 'SubGroup1'],
|
|
|
|
'subadmin' => [],
|
|
|
|
'quota' => 1024,
|
|
|
|
'storageLocation' => '/home/foo',
|
|
|
|
'lastLogin' => 500,
|
|
|
|
'backend' => 'OC_User_Database',
|
|
|
|
'email' => 'foo@bar.com',
|
|
|
|
'isRestoreDisabled' => false,
|
|
|
|
],
|
|
|
|
1 => [
|
|
|
|
'name' => 'admin',
|
|
|
|
'displayname' => 'S. Admin',
|
|
|
|
'groups' => ['SubGroup2'],
|
|
|
|
'subadmin' => [],
|
|
|
|
'quota' => 404,
|
|
|
|
'storageLocation' => '/home/admin',
|
|
|
|
'lastLogin' => 12,
|
|
|
|
'backend' => 'OC_User_Dummy',
|
|
|
|
'email' => 'admin@bar.com',
|
|
|
|
'isRestoreDisabled' => false,
|
|
|
|
],
|
|
|
|
2 => [
|
|
|
|
'name' => 'bar',
|
|
|
|
'displayname' => 'B. Ar',
|
|
|
|
'groups' => ['SubGroup1'],
|
|
|
|
'subadmin' => [],
|
|
|
|
'quota' => 2323,
|
|
|
|
'storageLocation' => '/home/bar',
|
|
|
|
'lastLogin' => 3999,
|
|
|
|
'backend' => 'OC_User_Dummy',
|
|
|
|
'email' => 'bar@dummy.com',
|
|
|
|
'isRestoreDisabled' => false,
|
|
|
|
],
|
|
|
|
]
|
|
|
|
);
|
|
|
|
|
|
|
|
$response = $this->container['UsersController']->index(0, 10, '', 'pattern');
|
|
|
|
$this->assertEquals($expectedResponse, $response);
|
|
|
|
}
|
|
|
|
|
2015-01-18 20:31:03 +03:00
|
|
|
/**
|
|
|
|
* TODO: Since the function uses the static OC_Subadmin class it can't be mocked
|
|
|
|
* to test for subadmins. Thus the test always assumes you have admin permissions...
|
|
|
|
*/
|
|
|
|
public function testIndexWithSearch() {
|
2015-01-30 16:16:16 +03:00
|
|
|
$this->container['IsAdmin'] = true;
|
|
|
|
|
2015-01-18 20:31:03 +03:00
|
|
|
$foo = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$foo
|
|
|
|
->expects($this->exactly(4))
|
|
|
|
->method('getUID')
|
|
|
|
->will($this->returnValue('foo'));
|
|
|
|
$foo
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getDisplayName')
|
|
|
|
->will($this->returnValue('M. Foo'));
|
|
|
|
$foo
|
|
|
|
->method('getLastLogin')
|
|
|
|
->will($this->returnValue(500));
|
|
|
|
$foo
|
|
|
|
->method('getHome')
|
|
|
|
->will($this->returnValue('/home/foo'));
|
|
|
|
$foo
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getBackendClassName')
|
|
|
|
->will($this->returnValue('OC_User_Database'));
|
|
|
|
$admin = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$admin
|
|
|
|
->expects($this->exactly(4))
|
|
|
|
->method('getUID')
|
|
|
|
->will($this->returnValue('admin'));
|
|
|
|
$admin
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getDisplayName')
|
|
|
|
->will($this->returnValue('S. Admin'));
|
|
|
|
$admin
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getLastLogin')
|
|
|
|
->will($this->returnValue(12));
|
|
|
|
$admin
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getHome')
|
|
|
|
->will($this->returnValue('/home/admin'));
|
|
|
|
$admin
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getBackendClassName')
|
|
|
|
->will($this->returnValue('OC_User_Dummy'));
|
|
|
|
$bar = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$bar
|
|
|
|
->expects($this->exactly(4))
|
|
|
|
->method('getUID')
|
|
|
|
->will($this->returnValue('bar'));
|
|
|
|
$bar
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getDisplayName')
|
|
|
|
->will($this->returnValue('B. Ar'));
|
|
|
|
$bar
|
|
|
|
->method('getLastLogin')
|
|
|
|
->will($this->returnValue(3999));
|
|
|
|
$bar
|
|
|
|
->method('getHome')
|
|
|
|
->will($this->returnValue('/home/bar'));
|
|
|
|
$bar
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getBackendClassName')
|
|
|
|
->will($this->returnValue('OC_User_Dummy'));
|
|
|
|
|
|
|
|
$this->container['UserManager']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('search')
|
|
|
|
->with('pattern', 10, 0)
|
|
|
|
->will($this->returnValue([$foo, $admin, $bar]));
|
|
|
|
$this->container['GroupManager']
|
|
|
|
->expects($this->exactly(3))
|
|
|
|
->method('getUserGroupIds')
|
|
|
|
->will($this->onConsecutiveCalls(array('Users', 'Support'), array('admins', 'Support'), array('External Users')));
|
|
|
|
$this->container['Config']
|
|
|
|
->expects($this->exactly(6))
|
|
|
|
->method('getUserValue')
|
|
|
|
->will($this->onConsecutiveCalls(1024, 'foo@bar.com',
|
|
|
|
404, 'admin@bar.com',
|
|
|
|
2323, 'bar@dummy.com'));
|
|
|
|
|
|
|
|
$expectedResponse = new DataResponse(
|
|
|
|
array(
|
|
|
|
0 => array(
|
|
|
|
'name' => 'foo',
|
|
|
|
'displayname' => 'M. Foo',
|
|
|
|
'groups' => array('Users', 'Support'),
|
|
|
|
'subadmin' => array(),
|
|
|
|
'quota' => 1024,
|
|
|
|
'storageLocation' => '/home/foo',
|
|
|
|
'lastLogin' => 500,
|
|
|
|
'backend' => 'OC_User_Database',
|
2015-01-23 19:45:45 +03:00
|
|
|
'email' => 'foo@bar.com',
|
|
|
|
'isRestoreDisabled' => false,
|
2015-01-18 20:31:03 +03:00
|
|
|
),
|
|
|
|
1 => array(
|
|
|
|
'name' => 'admin',
|
|
|
|
'displayname' => 'S. Admin',
|
|
|
|
'groups' => array('admins', 'Support'),
|
|
|
|
'subadmin' => array(),
|
|
|
|
'quota' => 404,
|
|
|
|
'storageLocation' => '/home/admin',
|
|
|
|
'lastLogin' => 12,
|
|
|
|
'backend' => 'OC_User_Dummy',
|
2015-01-23 19:45:45 +03:00
|
|
|
'email' => 'admin@bar.com',
|
|
|
|
'isRestoreDisabled' => false,
|
2015-01-18 20:31:03 +03:00
|
|
|
),
|
|
|
|
2 => array(
|
|
|
|
'name' => 'bar',
|
|
|
|
'displayname' => 'B. Ar',
|
|
|
|
'groups' => array('External Users'),
|
|
|
|
'subadmin' => array(),
|
|
|
|
'quota' => 2323,
|
|
|
|
'storageLocation' => '/home/bar',
|
|
|
|
'lastLogin' => 3999,
|
|
|
|
'backend' => 'OC_User_Dummy',
|
2015-01-23 19:45:45 +03:00
|
|
|
'email' => 'bar@dummy.com',
|
|
|
|
'isRestoreDisabled' => false,
|
2015-01-18 20:31:03 +03:00
|
|
|
),
|
|
|
|
)
|
|
|
|
);
|
2015-01-23 19:45:45 +03:00
|
|
|
$response = $this->container['UsersController']->index(0, 10, '', 'pattern');
|
2015-01-18 20:31:03 +03:00
|
|
|
$this->assertEquals($expectedResponse, $response);
|
|
|
|
}
|
|
|
|
|
2014-12-09 20:36:40 +03:00
|
|
|
public function testIndexWithBackend() {
|
2015-01-30 16:16:16 +03:00
|
|
|
$this->container['IsAdmin'] = true;
|
|
|
|
|
2014-12-09 20:36:40 +03:00
|
|
|
$user = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$user
|
2014-12-15 14:43:42 +03:00
|
|
|
->expects($this->exactly(4))
|
2014-12-09 20:36:40 +03:00
|
|
|
->method('getUID')
|
|
|
|
->will($this->returnValue('foo'));
|
|
|
|
$user
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getDisplayName')
|
|
|
|
->will($this->returnValue('M. Foo'));
|
|
|
|
$user
|
|
|
|
->method('getLastLogin')
|
|
|
|
->will($this->returnValue(500));
|
|
|
|
$user
|
|
|
|
->method('getHome')
|
|
|
|
->will($this->returnValue('/home/foo'));
|
|
|
|
$user
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getBackendClassName')
|
|
|
|
->will($this->returnValue('OC_User_Database'));
|
|
|
|
$this->container['UserManager']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getBackends')
|
|
|
|
->will($this->returnValue([new \OC_User_Dummy(), new \OC_User_Database()]));
|
|
|
|
$this->container['UserManager']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('clearBackends');
|
|
|
|
$this->container['UserManager']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('registerBackend')
|
|
|
|
->with(new \OC_User_Dummy());
|
|
|
|
$this->container['UserManager']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('search')
|
|
|
|
->with('')
|
|
|
|
->will($this->returnValue([$user]));
|
|
|
|
|
|
|
|
$expectedResponse = new DataResponse(
|
|
|
|
array(
|
|
|
|
0 => array(
|
|
|
|
'name' => 'foo',
|
|
|
|
'displayname' => 'M. Foo',
|
|
|
|
'groups' => null,
|
|
|
|
'subadmin' => array(),
|
|
|
|
'quota' => null,
|
|
|
|
'storageLocation' => '/home/foo',
|
|
|
|
'lastLogin' => 500,
|
2014-12-15 14:43:42 +03:00
|
|
|
'backend' => 'OC_User_Database',
|
2015-01-23 19:45:45 +03:00
|
|
|
'email' => null,
|
|
|
|
'isRestoreDisabled' => false,
|
2014-12-09 20:36:40 +03:00
|
|
|
)
|
|
|
|
)
|
|
|
|
);
|
2015-01-23 19:45:45 +03:00
|
|
|
$response = $this->container['UsersController']->index(0, 10, '','', 'OC_User_Dummy');
|
2014-12-09 20:36:40 +03:00
|
|
|
$this->assertEquals($expectedResponse, $response);
|
|
|
|
}
|
|
|
|
|
2014-12-12 14:39:31 +03:00
|
|
|
public function testIndexWithBackendNoUser() {
|
2015-01-30 16:16:16 +03:00
|
|
|
$this->container['IsAdmin'] = true;
|
|
|
|
|
2014-12-12 14:39:31 +03:00
|
|
|
$this->container['UserManager']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getBackends')
|
|
|
|
->will($this->returnValue([new \OC_User_Dummy(), new \OC_User_Database()]));
|
|
|
|
$this->container['UserManager']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('search')
|
|
|
|
->with('')
|
|
|
|
->will($this->returnValue([]));
|
|
|
|
|
|
|
|
$expectedResponse = new DataResponse([]);
|
2015-01-23 19:45:45 +03:00
|
|
|
$response = $this->container['UsersController']->index(0, 10, '','', 'OC_User_Dummy');
|
2014-12-04 16:15:55 +03:00
|
|
|
$this->assertEquals($expectedResponse, $response);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* TODO: Since the function uses the static OC_Subadmin class it can't be mocked
|
|
|
|
* to test for subadmins. Thus the test always assumes you have admin permissions...
|
|
|
|
*/
|
|
|
|
public function testCreateSuccessfulWithoutGroup() {
|
2015-01-30 16:16:16 +03:00
|
|
|
$this->container['IsAdmin'] = true;
|
|
|
|
|
2014-12-04 16:15:55 +03:00
|
|
|
$user = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$user
|
|
|
|
->method('getHome')
|
|
|
|
->will($this->returnValue('/home/user'));
|
2014-12-15 14:43:42 +03:00
|
|
|
$user
|
|
|
|
->method('getUID')
|
|
|
|
->will($this->returnValue('foo'));
|
2014-12-12 12:21:50 +03:00
|
|
|
$user
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getBackendClassName')
|
|
|
|
->will($this->returnValue('bar'));
|
2014-12-04 16:15:55 +03:00
|
|
|
|
|
|
|
$this->container['UserManager']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('createUser')
|
|
|
|
->will($this->onConsecutiveCalls($user));
|
|
|
|
|
|
|
|
|
|
|
|
$expectedResponse = new DataResponse(
|
|
|
|
array(
|
2014-12-15 14:43:42 +03:00
|
|
|
'name' => 'foo',
|
2014-12-08 18:35:13 +03:00
|
|
|
'groups' => null,
|
2014-12-12 12:21:50 +03:00
|
|
|
'storageLocation' => '/home/user',
|
2014-12-15 14:43:42 +03:00
|
|
|
'backend' => 'bar',
|
|
|
|
'lastLogin' => null,
|
|
|
|
'displayname' => null,
|
|
|
|
'quota' => null,
|
|
|
|
'subadmin' => array(),
|
2015-01-23 19:45:45 +03:00
|
|
|
'email' => null,
|
|
|
|
'isRestoreDisabled' => false,
|
2014-12-08 17:32:59 +03:00
|
|
|
),
|
|
|
|
Http::STATUS_CREATED
|
2014-12-04 16:15:55 +03:00
|
|
|
);
|
2015-01-23 19:45:45 +03:00
|
|
|
$response = $this->container['UsersController']->create('foo', 'password', array());
|
2014-12-04 16:15:55 +03:00
|
|
|
$this->assertEquals($expectedResponse, $response);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* TODO: Since the function uses the static OC_Subadmin class it can't be mocked
|
|
|
|
* to test for subadmins. Thus the test always assumes you have admin permissions...
|
|
|
|
*/
|
|
|
|
public function testCreateSuccessfulWithGroup() {
|
2015-01-30 16:16:16 +03:00
|
|
|
$this->container['IsAdmin'] = true;
|
|
|
|
|
2014-12-04 16:15:55 +03:00
|
|
|
$user = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$user
|
|
|
|
->method('getHome')
|
|
|
|
->will($this->returnValue('/home/user'));
|
|
|
|
$user
|
|
|
|
->method('getHome')
|
|
|
|
->will($this->returnValue('/home/user'));
|
2014-12-15 14:43:42 +03:00
|
|
|
$user
|
|
|
|
->method('getUID')
|
|
|
|
->will($this->returnValue('foo'));
|
2014-12-12 12:21:50 +03:00
|
|
|
$user
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getBackendClassName')
|
|
|
|
->will($this->returnValue('bar'));
|
2014-12-04 16:15:55 +03:00
|
|
|
$existingGroup = $this->getMockBuilder('\OCP\IGroup')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$existingGroup
|
|
|
|
->expects($this->once())
|
|
|
|
->method('addUser')
|
|
|
|
->with($user);
|
|
|
|
$newGroup = $this->getMockBuilder('\OCP\IGroup')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$newGroup
|
|
|
|
->expects($this->once())
|
|
|
|
->method('addUser')
|
|
|
|
->with($user);
|
|
|
|
|
|
|
|
$this->container['UserManager']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('createUser')
|
|
|
|
->will($this->onConsecutiveCalls($user));
|
|
|
|
$this->container['GroupManager']
|
|
|
|
->expects($this->exactly(2))
|
|
|
|
->method('get')
|
|
|
|
->will($this->onConsecutiveCalls(null, $existingGroup));
|
|
|
|
$this->container['GroupManager']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('createGroup')
|
|
|
|
->with('NewGroup')
|
|
|
|
->will($this->onConsecutiveCalls($newGroup));
|
|
|
|
$this->container['GroupManager']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getUserGroupIds')
|
|
|
|
->with($user)
|
|
|
|
->will($this->onConsecutiveCalls(array('NewGroup', 'ExistingGroup')));
|
|
|
|
|
|
|
|
$expectedResponse = new DataResponse(
|
|
|
|
array(
|
2014-12-15 14:43:42 +03:00
|
|
|
'name' => 'foo',
|
2014-12-08 18:35:13 +03:00
|
|
|
'groups' => array('NewGroup', 'ExistingGroup'),
|
2014-12-12 12:21:50 +03:00
|
|
|
'storageLocation' => '/home/user',
|
2014-12-15 14:43:42 +03:00
|
|
|
'backend' => 'bar',
|
|
|
|
'lastLogin' => null,
|
|
|
|
'displayname' => null,
|
|
|
|
'quota' => null,
|
|
|
|
'subadmin' => array(),
|
2015-01-23 19:45:45 +03:00
|
|
|
'email' => null,
|
|
|
|
'isRestoreDisabled' => false,
|
2014-12-08 17:32:59 +03:00
|
|
|
),
|
|
|
|
Http::STATUS_CREATED
|
2014-12-04 16:15:55 +03:00
|
|
|
);
|
2015-01-23 19:45:45 +03:00
|
|
|
$response = $this->container['UsersController']->create('foo', 'password', array('NewGroup', 'ExistingGroup'));
|
2014-12-04 16:15:55 +03:00
|
|
|
$this->assertEquals($expectedResponse, $response);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* TODO: Since the function uses the static OC_Subadmin class it can't be mocked
|
|
|
|
* to test for subadmins. Thus the test always assumes you have admin permissions...
|
|
|
|
*/
|
|
|
|
public function testCreateUnsuccessful() {
|
2015-01-30 16:16:16 +03:00
|
|
|
$this->container['IsAdmin'] = true;
|
|
|
|
|
2014-12-04 16:15:55 +03:00
|
|
|
$this->container['UserManager']
|
|
|
|
->method('createUser')
|
|
|
|
->will($this->throwException(new \Exception()));
|
|
|
|
|
|
|
|
$expectedResponse = new DataResponse(
|
|
|
|
array(
|
2014-12-08 18:35:13 +03:00
|
|
|
'message' => 'Unable to create user.'
|
2014-12-08 17:32:59 +03:00
|
|
|
),
|
|
|
|
Http::STATUS_FORBIDDEN
|
2014-12-04 16:15:55 +03:00
|
|
|
);
|
2015-01-23 19:45:45 +03:00
|
|
|
$response = $this->container['UsersController']->create('foo', 'password', array());
|
2014-12-04 16:15:55 +03:00
|
|
|
$this->assertEquals($expectedResponse, $response);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* TODO: Since the function uses the static OC_Subadmin class it can't be mocked
|
|
|
|
* to test for subadmins. Thus the test always assumes you have admin permissions...
|
|
|
|
*/
|
|
|
|
public function testDestroySelf() {
|
2015-01-30 16:16:16 +03:00
|
|
|
$this->container['IsAdmin'] = true;
|
|
|
|
|
2014-12-04 16:15:55 +03:00
|
|
|
$user = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$user
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getUID')
|
|
|
|
->will($this->returnValue('myself'));
|
|
|
|
$this->container['UserSession']
|
|
|
|
->method('getUser')
|
|
|
|
->will($this->returnValue($user));
|
|
|
|
|
|
|
|
$expectedResponse = new DataResponse(
|
|
|
|
array(
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => array(
|
|
|
|
'message' => 'Unable to delete user.'
|
|
|
|
)
|
2014-12-08 17:32:59 +03:00
|
|
|
),
|
|
|
|
Http::STATUS_FORBIDDEN
|
2014-12-04 16:15:55 +03:00
|
|
|
);
|
2015-01-23 19:45:45 +03:00
|
|
|
$response = $this->container['UsersController']->destroy('myself');
|
2014-12-04 16:15:55 +03:00
|
|
|
$this->assertEquals($expectedResponse, $response);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* TODO: Since the function uses the static OC_Subadmin class it can't be mocked
|
|
|
|
* to test for subadmins. Thus the test always assumes you have admin permissions...
|
|
|
|
*/
|
|
|
|
public function testDestroy() {
|
2015-01-30 16:16:16 +03:00
|
|
|
$this->container['IsAdmin'] = true;
|
|
|
|
|
2014-12-04 16:15:55 +03:00
|
|
|
$user = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$user
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getUID')
|
|
|
|
->will($this->returnValue('Admin'));
|
|
|
|
$toDeleteUser = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$toDeleteUser
|
|
|
|
->expects($this->once())
|
|
|
|
->method('delete')
|
|
|
|
->will($this->returnValue(true));
|
|
|
|
$this->container['UserSession']
|
|
|
|
->method('getUser')
|
|
|
|
->will($this->returnValue($user));
|
|
|
|
$this->container['UserManager']
|
|
|
|
->method('get')
|
|
|
|
->with('UserToDelete')
|
|
|
|
->will($this->returnValue($toDeleteUser));
|
|
|
|
|
|
|
|
$expectedResponse = new DataResponse(
|
|
|
|
array(
|
|
|
|
'status' => 'success',
|
|
|
|
'data' => array(
|
|
|
|
'username' => 'UserToDelete'
|
|
|
|
)
|
2014-12-08 17:32:59 +03:00
|
|
|
),
|
|
|
|
Http::STATUS_NO_CONTENT
|
|
|
|
);
|
2015-01-23 19:45:45 +03:00
|
|
|
$response = $this->container['UsersController']->destroy('UserToDelete');
|
2014-12-08 17:32:59 +03:00
|
|
|
$this->assertEquals($expectedResponse, $response);
|
|
|
|
}
|
|
|
|
/**
|
|
|
|
* TODO: Since the function uses the static OC_Subadmin class it can't be mocked
|
|
|
|
* to test for subadmins. Thus the test always assumes you have admin permissions...
|
|
|
|
*/
|
|
|
|
public function testDestroyUnsuccessful() {
|
2015-01-30 16:16:16 +03:00
|
|
|
$this->container['IsAdmin'] = true;
|
|
|
|
|
2014-12-08 17:32:59 +03:00
|
|
|
$user = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$user
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getUID')
|
|
|
|
->will($this->returnValue('Admin'));
|
|
|
|
$toDeleteUser = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$toDeleteUser
|
|
|
|
->expects($this->once())
|
|
|
|
->method('delete')
|
|
|
|
->will($this->returnValue(false));
|
|
|
|
$this->container['UserSession']
|
|
|
|
->method('getUser')
|
|
|
|
->will($this->returnValue($user));
|
|
|
|
$this->container['UserManager']
|
|
|
|
->method('get')
|
|
|
|
->with('UserToDelete')
|
|
|
|
->will($this->returnValue($toDeleteUser));
|
|
|
|
|
|
|
|
$expectedResponse = new DataResponse(
|
|
|
|
array(
|
|
|
|
'status' => 'error',
|
|
|
|
'data' => array(
|
|
|
|
'message' => 'Unable to delete user.'
|
|
|
|
)
|
|
|
|
),
|
|
|
|
Http::STATUS_FORBIDDEN
|
2014-12-04 16:15:55 +03:00
|
|
|
);
|
2015-01-23 19:45:45 +03:00
|
|
|
$response = $this->container['UsersController']->destroy('UserToDelete');
|
2014-12-04 16:15:55 +03:00
|
|
|
$this->assertEquals($expectedResponse, $response);
|
|
|
|
}
|
Expose backend type via REST API
This change will expose the user backend via the REST API which is a pre-requisite for https://github.com/owncloud/core/issues/12620.
For example:
````json
[{"name":"9707A09E-CA9A-4ABE-A66A-3F632F16C409","displayname":"Document Conversion User Account","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/9707A09E-CA9A-4ABE-A66A-3F632F16C409","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"ED86733E-745C-4E4D-90CB-278A9737DB3C","displayname":"Hacker","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/ED86733E-745C-4E4D-90CB-278A9737DB3C","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"71CDF45B-E125-450D-983C-D9192F36EC88","displayname":"admin","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/71CDF45B-E125-450D-983C-D9192F36EC88","lastLogin":0,"backend":"OCA\\user_ldap\\USER_LDAP"},{"name":"admin","displayname":"admin","groups":["admin"],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/admin","lastLogin":"1418057287","backend":"OC_User_Database"},{"name":"test","displayname":"test","groups":[],"subadmin":[],"quota":"default","storageLocation":"\/Users\/lreschke\/Programming\/core\/data\/test","lastLogin":0,"backend":"OC_User_Database"}]
```
2014-12-09 00:38:54 +03:00
|
|
|
|
2014-12-16 19:54:30 +03:00
|
|
|
/**
|
|
|
|
* test if an invalid mail result in a failure response
|
|
|
|
*/
|
|
|
|
public function testCreateUnsuccessfulWithInvalidEMail() {
|
2015-01-30 16:16:16 +03:00
|
|
|
$this->container['IsAdmin'] = true;
|
|
|
|
|
2014-12-16 19:54:30 +03:00
|
|
|
/**
|
|
|
|
* FIXME: Disabled due to missing DI on mail class.
|
|
|
|
* TODO: Re-enable when https://github.com/owncloud/core/pull/12085 is merged.
|
|
|
|
*/
|
|
|
|
$this->markTestSkipped('Disable test until OC_Mail is rewritten.');
|
|
|
|
|
|
|
|
$this->container['Mail']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('validateAddress')
|
|
|
|
->will($this->returnValue(false));
|
|
|
|
|
|
|
|
$expectedResponse = new DataResponse(
|
|
|
|
array(
|
|
|
|
'message' => 'Invalid mail address'
|
|
|
|
),
|
|
|
|
Http::STATUS_UNPROCESSABLE_ENTITY
|
|
|
|
);
|
2015-01-23 19:45:45 +03:00
|
|
|
$response = $this->container['UsersController']->create('foo', 'password', array(), 'invalidMailAdress');
|
2014-12-16 19:54:30 +03:00
|
|
|
$this->assertEquals($expectedResponse, $response);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* test if a valid mail result in a successful mail send
|
|
|
|
*/
|
|
|
|
public function testCreateSuccessfulWithValidEMail() {
|
2015-01-30 16:16:16 +03:00
|
|
|
$this->container['IsAdmin'] = true;
|
|
|
|
|
2014-12-16 19:54:30 +03:00
|
|
|
/**
|
|
|
|
* FIXME: Disabled due to missing DI on mail class.
|
|
|
|
* TODO: Re-enable when https://github.com/owncloud/core/pull/12085 is merged.
|
|
|
|
*/
|
|
|
|
$this->markTestSkipped('Disable test until OC_Mail is rewritten.');
|
|
|
|
|
|
|
|
$this->container['Mail']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('validateAddress')
|
|
|
|
->will($this->returnValue(true));
|
|
|
|
$this->container['Mail']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('send')
|
|
|
|
->with(
|
|
|
|
$this->equalTo('validMail@Adre.ss'),
|
|
|
|
$this->equalTo('foo'),
|
|
|
|
$this->anything(),
|
|
|
|
$this->anything(),
|
|
|
|
$this->anything(),
|
|
|
|
$this->equalTo('no-reply@owncloud.com'),
|
|
|
|
$this->equalTo(1),
|
|
|
|
$this->anything()
|
|
|
|
);
|
|
|
|
$this->container['Logger']
|
|
|
|
->expects($this->never())
|
|
|
|
->method('error');
|
|
|
|
|
2015-01-23 19:45:45 +03:00
|
|
|
$response = $this->container['UsersController']->create('foo', 'password', array(), 'validMail@Adre.ss');
|
2014-12-16 19:54:30 +03:00
|
|
|
$this->assertEquals(Http::STATUS_CREATED, $response->getStatus());
|
|
|
|
}
|
|
|
|
|
2015-01-23 19:45:45 +03:00
|
|
|
private function mockUser($userId = 'foo', $displayName = 'M. Foo',
|
|
|
|
$lastLogin = 500, $home = '/home/foo', $backend = 'OC_User_Database') {
|
|
|
|
$user = $this->getMockBuilder('\OC\User\User')
|
|
|
|
->disableOriginalConstructor()->getMock();
|
|
|
|
$user
|
|
|
|
->expects($this->any())
|
|
|
|
->method('getUID')
|
|
|
|
->will($this->returnValue($userId));
|
|
|
|
$user
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getDisplayName')
|
|
|
|
->will($this->returnValue($displayName));
|
|
|
|
$user
|
|
|
|
->method('getLastLogin')
|
|
|
|
->will($this->returnValue($lastLogin));
|
|
|
|
$user
|
|
|
|
->method('getHome')
|
|
|
|
->will($this->returnValue($home));
|
|
|
|
$user
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getBackendClassName')
|
|
|
|
->will($this->returnValue($backend));
|
|
|
|
|
|
|
|
$result = [
|
|
|
|
'name' => $userId,
|
|
|
|
'displayname' => $displayName,
|
|
|
|
'groups' => null,
|
|
|
|
'subadmin' => array(),
|
|
|
|
'quota' => null,
|
|
|
|
'storageLocation' => $home,
|
|
|
|
'lastLogin' => $lastLogin,
|
|
|
|
'backend' => $backend,
|
|
|
|
'email' => null,
|
|
|
|
'isRestoreDisabled' => false,
|
|
|
|
];
|
|
|
|
|
|
|
|
return [$user, $result];
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testRestorePossibleWithoutEncryption() {
|
2015-01-30 16:16:16 +03:00
|
|
|
$this->container['IsAdmin'] = true;
|
|
|
|
|
2015-01-23 19:45:45 +03:00
|
|
|
list($user, $expectedResult) = $this->mockUser();
|
|
|
|
|
|
|
|
$result = \Test_Helper::invokePrivate($this->container['UsersController'], 'formatUserForIndex', [$user]);
|
|
|
|
$this->assertEquals($expectedResult, $result);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testRestorePossibleWithAdminAndUserRestore() {
|
2015-01-30 16:16:16 +03:00
|
|
|
$this->container['IsAdmin'] = true;
|
|
|
|
|
2015-01-23 19:45:45 +03:00
|
|
|
list($user, $expectedResult) = $this->mockUser();
|
|
|
|
|
|
|
|
$this->container['OCP\\App\\IAppManager']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('isEnabledForUser')
|
|
|
|
->with(
|
|
|
|
$this->equalTo('files_encryption')
|
|
|
|
)
|
|
|
|
->will($this->returnValue(true));
|
|
|
|
$this->container['Config']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getAppValue')
|
|
|
|
->with(
|
|
|
|
$this->equalTo('files_encryption'),
|
|
|
|
$this->equalTo('recoveryAdminEnabled'),
|
|
|
|
$this->anything()
|
|
|
|
)
|
|
|
|
->will($this->returnValue('1'));
|
|
|
|
|
|
|
|
$this->container['Config']
|
|
|
|
->expects($this->at(1))
|
|
|
|
->method('getUserValue')
|
|
|
|
->with(
|
|
|
|
$this->anything(),
|
|
|
|
$this->equalTo('files_encryption'),
|
|
|
|
$this->equalTo('recovery_enabled'),
|
|
|
|
$this->anything()
|
|
|
|
)
|
|
|
|
->will($this->returnValue('1'));
|
|
|
|
|
|
|
|
$result = \Test_Helper::invokePrivate($this->container['UsersController'], 'formatUserForIndex', [$user]);
|
|
|
|
$this->assertEquals($expectedResult, $result);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testRestoreNotPossibleWithoutAdminRestore() {
|
2015-01-30 16:16:16 +03:00
|
|
|
$this->container['IsAdmin'] = true;
|
|
|
|
|
2015-01-23 19:45:45 +03:00
|
|
|
list($user, $expectedResult) = $this->mockUser();
|
|
|
|
|
|
|
|
$this->container['OCP\\App\\IAppManager']
|
|
|
|
->method('isEnabledForUser')
|
|
|
|
->with(
|
|
|
|
$this->equalTo('files_encryption')
|
|
|
|
)
|
|
|
|
->will($this->returnValue(true));
|
|
|
|
|
|
|
|
$expectedResult['isRestoreDisabled'] = true;
|
|
|
|
|
|
|
|
$result = \Test_Helper::invokePrivate($this->container['UsersController'], 'formatUserForIndex', [$user]);
|
|
|
|
$this->assertEquals($expectedResult, $result);
|
|
|
|
}
|
|
|
|
|
|
|
|
public function testRestoreNotPossibleWithoutUserRestore() {
|
2015-01-30 16:16:16 +03:00
|
|
|
$this->container['IsAdmin'] = true;
|
|
|
|
|
2015-01-23 19:45:45 +03:00
|
|
|
list($user, $expectedResult) = $this->mockUser();
|
|
|
|
|
|
|
|
$this->container['OCP\\App\\IAppManager']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('isEnabledForUser')
|
|
|
|
->with(
|
|
|
|
$this->equalTo('files_encryption')
|
|
|
|
)
|
|
|
|
->will($this->returnValue(true));
|
|
|
|
$this->container['Config']
|
|
|
|
->expects($this->once())
|
|
|
|
->method('getAppValue')
|
|
|
|
->with(
|
|
|
|
$this->equalTo('files_encryption'),
|
|
|
|
$this->equalTo('recoveryAdminEnabled'),
|
|
|
|
$this->anything()
|
|
|
|
)
|
|
|
|
->will($this->returnValue('1'));
|
|
|
|
|
|
|
|
$this->container['Config']
|
|
|
|
->expects($this->at(1))
|
|
|
|
->method('getUserValue')
|
|
|
|
->with(
|
|
|
|
$this->anything(),
|
|
|
|
$this->equalTo('files_encryption'),
|
|
|
|
$this->equalTo('recovery_enabled'),
|
|
|
|
$this->anything()
|
|
|
|
)
|
|
|
|
->will($this->returnValue('0'));
|
|
|
|
|
|
|
|
$expectedResult['isRestoreDisabled'] = true;
|
|
|
|
|
|
|
|
$result = \Test_Helper::invokePrivate($this->container['UsersController'], 'formatUserForIndex', [$user]);
|
|
|
|
$this->assertEquals($expectedResult, $result);
|
|
|
|
}
|
|
|
|
|
2014-12-04 16:15:55 +03:00
|
|
|
}
|