nextcloud/apps/encryption/tests/controller/SettingsControllerTest.php

225 lines
5.9 KiB
PHP
Raw Normal View History

<?php
/**
* @author Björn Schießle <schiessle@owncloud.com>
2015-06-25 12:43:55 +03:00
* @author Joas Schilling <nickvergessen@owncloud.com>
* @author Morris Jobke <hey@morrisjobke.de>
*
* @copyright Copyright (c) 2015, ownCloud, Inc.
* @license AGPL-3.0
*
* This code is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License, version 3,
* as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License, version 3,
* along with this program. If not, see <http://www.gnu.org/licenses/>
*
*/
namespace OCA\Encryption\Tests\Controller;
use OCA\Encryption\Controller\SettingsController;
use OCA\Encryption\Session;
2015-04-20 18:44:34 +03:00
use OCP\AppFramework\Http;
use Test\TestCase;
class SettingsControllerTest extends TestCase {
/** @var SettingsController */
private $controller;
/** @var \PHPUnit_Framework_MockObject_MockObject */
private $requestMock;
/** @var \PHPUnit_Framework_MockObject_MockObject */
private $l10nMock;
/** @var \PHPUnit_Framework_MockObject_MockObject */
private $userManagerMock;
/** @var \PHPUnit_Framework_MockObject_MockObject */
private $userSessionMock;
/** @var \PHPUnit_Framework_MockObject_MockObject */
private $keyManagerMock;
/** @var \PHPUnit_Framework_MockObject_MockObject */
private $cryptMock;
/** @var \PHPUnit_Framework_MockObject_MockObject */
private $sessionMock;
2015-04-20 18:44:34 +03:00
protected function setUp() {
parent::setUp();
$this->requestMock = $this->getMock('OCP\IRequest');
$this->l10nMock = $this->getMockBuilder('OCP\IL10N')
->disableOriginalConstructor()->getMock();
$this->l10nMock->expects($this->any())
->method('t')
->will($this->returnCallback(function($message) {
2015-04-20 18:44:34 +03:00
return $message;
}));
$this->userManagerMock = $this->getMockBuilder('OCP\IUserManager')
->disableOriginalConstructor()->getMock();
$this->keyManagerMock = $this->getMockBuilder('OCA\Encryption\KeyManager')
->disableOriginalConstructor()->getMock();
$this->cryptMock = $this->getMockBuilder('OCA\Encryption\Crypto\Crypt')
->disableOriginalConstructor()->getMock();
$this->userSessionMock = $this->getMockBuilder('OCP\IUserSession')
->disableOriginalConstructor()
->setMethods([
'isLoggedIn',
'getUID',
'login',
'logout',
'setUser',
'getUser',
2015-04-20 18:44:34 +03:00
'canChangePassword',
])
->getMock();
$this->userSessionMock->expects($this->any())
->method('getUID')
->willReturn('testUser');
$this->userSessionMock->expects($this->any())
->method($this->anything())
->will($this->returnSelf());
$this->sessionMock = $this->getMockBuilder('OCA\Encryption\Session')
->disableOriginalConstructor()->getMock();
$this->controller = new SettingsController(
'encryption',
$this->requestMock,
$this->l10nMock,
$this->userManagerMock,
$this->userSessionMock,
$this->keyManagerMock,
$this->cryptMock,
$this->sessionMock
);
}
/**
* test updatePrivateKeyPassword() if wrong new password was entered
*/
public function testUpdatePrivateKeyPasswordWrongNewPassword() {
$oldPassword = 'old';
$newPassword = 'new';
$this->userManagerMock
->expects($this->once())
->method('checkPassword')
->willReturn(false);
$result = $this->controller->updatePrivateKeyPassword($oldPassword, $newPassword);
$data = $result->getData();
2015-04-20 18:44:34 +03:00
$this->assertSame(Http::STATUS_BAD_REQUEST, $result->getStatus());
$this->assertSame('The current log-in password was not correct, please try again.',
2015-04-20 19:15:06 +03:00
$data['message']);
}
/**
* test updatePrivateKeyPassword() if wrong old password was entered
*/
public function testUpdatePrivateKeyPasswordWrongOldPassword() {
$oldPassword = 'old';
$newPassword = 'new';
$this->userManagerMock
->expects($this->once())
->method('checkPassword')
->willReturn(true);
$this->cryptMock
->expects($this->once())
->method('decryptPrivateKey')
->willReturn(false);
$result = $this->controller->updatePrivateKeyPassword($oldPassword, $newPassword);
$data = $result->getData();
2015-04-20 18:44:34 +03:00
$this->assertSame(Http::STATUS_BAD_REQUEST, $result->getStatus());
$this->assertSame('The old password was not correct, please try again.',
2015-04-20 19:15:06 +03:00
$data['message']);
}
/**
* test updatePrivateKeyPassword() with the correct old and new password
*/
public function testUpdatePrivateKeyPassword() {
$oldPassword = 'old';
$newPassword = 'new';
$this->userSessionMock
->expects($this->once())
->method('getUID')
->willReturn('testUser');
$this->userManagerMock
->expects($this->once())
->method('checkPassword')
->willReturn(true);
$this->cryptMock
->expects($this->once())
->method('decryptPrivateKey')
->willReturn('decryptedKey');
$this->cryptMock
->expects($this->once())
->method('symmetricEncryptFileContent')
->willReturn('encryptedKey');
$this->cryptMock
->expects($this->once())
->method('generateHeader')
->willReturn('header.');
// methods which must be called after successful changing the key password
$this->keyManagerMock
->expects($this->once())
->method('setPrivateKey')
->with($this->equalTo('testUser'), $this->equalTo('header.encryptedKey'));
$this->sessionMock
->expects($this->once())
->method('setPrivateKey')
->with($this->equalTo('decryptedKey'));
$this->sessionMock
->expects($this->once())
->method('setStatus')
->with($this->equalTo(Session::INIT_SUCCESSFUL));
$result = $this->controller->updatePrivateKeyPassword($oldPassword, $newPassword);
$data = $result->getData();
2015-04-20 18:44:34 +03:00
$this->assertSame(Http::STATUS_OK, $result->getStatus());
$this->assertSame('Private key password successfully updated.',
2015-04-20 19:15:06 +03:00
$data['message']);
}
}